Filters








81 Hits in 8.8 sec

RoboCup@Home Education: A New Format for Educational Competitions [chapter]

Luca Iocchi, Jeffrey Too Chuan Tan, Sebastian Castro
2021 Lecture Notes in Networks and Systems  
are tailored to participant teams to maximize the educational experience for students.  ...  AbstractIn this paper we describe a novel methodology for holding educational robot competitions that has been developed within the RoboCup@Home Educational initiative.  ...  Thus, the methodology, hardware, software and courseware described here are still evolving.  ... 
doi:10.1007/978-3-030-77040-2_31 fatcat:hcaeb2uttvhs3ey7nms7yb3h24

Embedded Deep Neural Network Processing: Algorithmic and Processor Techniques Bring Deep Learning to IoT and Edge Devices

Marian Verhelst, Bert Moons
2017 IEEE Solid-State Circuits Magazine  
This article surveys such tightly interwoven hardware-software processing techniques for energy efficiency and shows how implementationdriven algorithmic innovations, together with customized yet flexible  ...  This optimization is, of course, highly interwoven with the parallelization scheme.  ...  About the Authors  ... 
doi:10.1109/mssc.2017.2745818 fatcat:fhm3cbpzb5dyjbncbgozertsfe

Nexos

Dennis Brylow, Bina Ramamurthy
2009 ACM SIGBED Review  
We report on the infrastructure we have developed, the goals and content of our initial course offerings at both schools, and an evaluation of our success thus far.  ...  The Nexos Project is a joint effort at Marquette University (MU) and University of Buffalo (UB) to build curriculum materials and a supporting experimental laboratory for hands-on projects in embedded  ...  The authors are grateful for the students in MU's COSC 198 and UB's CSE 321 courses who persevered through our experimentation in the 2007-2008 school year.  ... 
doi:10.1145/1534480.1534487 fatcat:sro3pti66jap5fo37b4x35wzvy

Smart Card Security [chapter]

2010 Smart Card Handbook  
Although security is an inherent aspect of hardware, software and applications, there are differences between various players.  ...  Basically there are three levels of defence: hardware, software and application level.  ...  Later he worked in the field of testing theory, which resulted in a couple of scientific papers and patent applications. In 1994 he moved to the area of smartcards.  ... 
doi:10.1002/9780470660911.ch16 fatcat:rl53pku6srgxrmkli54leixjje

Spiking Neural Networks Hardware Implementations and Challenges

Maxence Bouvier, Alexandre Valentian, Thomas Mesquida, Francois Rummens, Marina Reyboz, Elisa Vianello, Edith Beigne
2019 ACM Journal on Emerging Technologies in Computing Systems  
The scope of existing solutions is extensive; we thus present the general framework and study on a case-by-case basis the relevant particularities.  ...  They are expected to improve the computational performance and efficiency of neural networks, but are best suited for hardware able to support their temporal dynamics.  ...  Closer to the hardware, software training can also be used to adapt the program onto defective hardware, for example high variability between novel nanodevices can be autonomously compensated for [108  ... 
doi:10.1145/3304103 fatcat:p3frra3osnhybj4hkor4y5cyqm

Virtual memory on data diffusion architectures

Jorge Buenabad-Chávez, Henk L Muller, Paul W.A Stallard, David H.D Warren
2003 Parallel Computing  
For the provision of diffusion space to be adequate, our results on set-associative memory suggest the need for a simple interaction between virtual memory software and the data diffusing hardware. i Acknowledgements  ...  We argue that AMVM will offer greater advantages on applications with higher degrees of parallelism or larger data sets.  ...  Acknowledgements It is a pleasure to thank the people who made possible the completion of this work. The British Council, CINVESTAV 1 , CONACyT 2 and SEP 3 provided the necessary funds.  ... 
doi:10.1016/s0167-8191(03)00088-7 fatcat:gsvwk6bp2na2zbturcplocdpr4

Developing Virtual CD-ROM Collections: The Voyager Company Publications

Geoffrey Brown
2012 International Journal of Digital Curation  
The current trend appears to be one of abandonment – for example, the Indiana University Libraries no longer maintain machines capable of accessing early CD-ROM titles.In previous work, we proposed an  ...  geographically sparse base of patrons, who may have limited technical knowledge.In this paper, we extend this idea to CD-ROMs designed to operate on 'classic' Macintosh systems with an extensive case study  ...  Any opinions, findings, conclusions or recommendations expressed in this material are those of the author and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.2218/ijdc.v7i2.226 fatcat:ewdyvpzcwvbufblosjozu24e44

Fast XML/HTML for Haskell: XML TypeLift [article]

Michał J. Gajda, Dmitry Krylov
2020 arXiv   pre-print
from a simple internet search, without the need for specialist prior knowledge or skills.  ...  The best performing parser competes favorably with the fastest tools available in other languages and is, thus, suitable for use in large-scale data analysis.  ...  Invalid documents that cannot be parsed to Haskell data types return an error message that identifies the error location.  ... 
arXiv:2011.03536v1 fatcat:2x7u7navyvbonnlddwyb7chfyu

Lynx D1.3 Technical architecture design

Filippo Maganza, Kennedy Junior Anagbo
2019 Zenodo  
Architecture design in any software development project as in the case of Lynx serves as a blueprint that drives the smooth design and implementation of the software system.  ...  For the Lynx platform, we adopted the MSA pattern which supports loose coupling between services; a feature that allows for easy separation of work and which makes this pattern most adaptable to the Lynx  ...  The application can run in different environments which are: • Development: in this environment, all the hardware, software and/or computing resources, and programming tools required to get the application  ... 
doi:10.5281/zenodo.2580244 fatcat:42i7qv4jefgdjhqjgzwz5qd5si

Internet of Things (IoT) – A Research Agenda for Information Systems

Abayomi Baiyere, University of Turku, Finland, Heikki Topi, Viswanath Venkatesh, John Wyatt, Brian Donnellan, Bentley University, University of Arkansas, Redline Design, Maynooth University
2020 Communications of the Association for Information Systems  
The Internet of things (IoT) is emerging as an integrated set of digital innovations with the potential to unleash unprecedented opportunities and create significant challenges from both technological  ...  We outline the IoT's distinctive attributes and their implications for existing IS research traditions.  ...  Acknowledgements We thank the editor and associate editor for their insightful guidance throughout the whole process.  ... 
doi:10.17705/1cais.04725 fatcat:k3ucrc5hbveibgehpniim7usme

The quest for runware: on compositional, executable and intuitive models

David Harel, Assaf Marron
2012 Journal of Software and Systems Modeling  
The presence of these three traits in a single artifact will blur the boundaries between natural-language requirements, formal models, and actual software, bringing in its wake a major advance in the way  ...  We propose the term runware 1 to refer to this kind of higher level artifact.  ...  Acknowledgments We thank the anonymous reviewers for their constructive and valuable comments.  ... 
doi:10.1007/s10270-012-0258-8 fatcat:6poq52g47jfuhl2wfxn7vr4lqe

Toxicity Analysis and Cry Gene Profiling of Bacillus Thuringiensis Isolated from Western Ghats of Tamil Nadu State, India

A. Ramalakshmi, P. Annakodi, V. Udayasurian, V. Balasubramani
2018 Proceedings of the Indian National Science Academy  
The thesis, which had a far-reaching impact on this field, is informally stated below: Any algorithmic problem for which an algorithm can be found in any programming language on any computer (existing  ...  There are various evidences of calculation as an ancient activity [Tedre, 2014] that dates back to Babylonian days used for varieties of navigational, astronomical and other day-to-day needs.  ...  , (4) hardware/software firewalls, intrusion detection systems, etc.  ... 
doi:10.16943/ptinsa/2018/49413 fatcat:2w6rohpbava5zh6m26tsiz7qky

CONCEPTUALISING AUTHENTICATION OF RURALNESS

Svein Frisvoll
2013 Annals of Tourism Research  
(representations, locality and lives -i.e. practices and performativity) of the rural, and more specifically on the issues raised within the six boxes (product, consumption, hardware, software, intra-coherency  ...  and 'What can an application of the proposed framework tell us about 'authentication' in cases of rural tourism?'  ... 
doi:10.1016/j.annals.2013.07.006 fatcat:epdbh2w3jzha7cldarc3mjofey

BYOC: A

Jonathan Balkind, Katie Lim, Michael Schaffner, Fei Gao, Grigory Chirkov, Ang Li, Alexey Lavrov, Tri M. Nguyen, Yaosheng Fu, Florian Zaruba, Kunal Gulati, Luca Benini (+1 others)
2020 Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems  
BYOC is an open-source hardware framework that provides a scalable cache coherence system, that includes out-of-the-box support for four different ISAs (RISC-V 32-bit, RISC-V 64-bit, x86, and SPARCv9)  ...  The framework also supports multiple loosely coupled accelerators and is a fully working system supporting SMP Linux.  ...  In addition, BYOC is fully open source 1 (hardware, software, and firmware) and is built using industry standard hardware description languages (Verilog and SystemVerilog).  ... 
doi:10.1145/3373376.3378479 dblp:conf/asplos/BalkindLSGCLLNF20 fatcat:o4pjn4bfjjaejbho2wju2lguam

Automated Staging for Built-to-Order Application Systems

G.S. Swint, Gueyoung Jung, C. Pu, A. Sahai
2006 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006  
The Elba project extracts test parameters from production specifications, such as SLAs, and deployment specifications, and via the Mulini generator, creates staging plans for the application.  ...  Feedback from staging, especially when coupled with appropriate resource costs, can be used to ensure correct functionality and provisioning for the application.  ...  Note that TPC-W is used as an illustrative complex distributed application for our automated staging tools and process, not necessarily as a performance measure of our hardware/software stack.  ... 
doi:10.1109/noms.2006.1687566 dblp:conf/noms/SwintJPS06 fatcat:xw3js3csrjcyxihhw72mlxm4f4
« Previous Showing results 1 — 15 out of 81 results