To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Since Findler and Felleisen (Findler, R. B. & Felleisen, M. 2002) introduced higher-order contracts, many variants have been proposed. Broadly, these fall into two groups: some follow Findler and Felleisen (2002) in using latent contracts, purely dynamic checks that are transparent to the type system; others use manifest contracts, where refinement types record the most recent check that has been applied to each value. These two approaches are commonly assumed to be equivalent—different ways of implementing the same idea, one retaining a simple type system, and the other providing more static information. Our goal is to formalize and clarify this folklore understanding. Our work extends that of Gronski and Flanagan (Gronski, J. & Flanagan, C. 2007), who defined a latent calculus λC and a manifest calculus λH, gave a translation φ from λC to λH, and proved that if a λC term reduces to a constant, so does its φ-image. We enrich their account with a translation ψ from λH to λC and prove an analogous theorem. We then generalize the whole framework to dependent contracts, whose predicates can mention free variables. This extension is both pragmatically crucial, supporting a much more interesting range of contracts, and theoretically challenging. We define dependent versions of λH and two dialects (“lax” and “picky”) of λC, establish type soundness—a substantial result in itself, for λH — and extend φ and ψ accordingly. Surprisingly, the intuition that the latent and manifest systems are equivalent now breaks down: the extended translations preserve behavior in one direction, but in the other, sometimes yield terms that blame more.
Region-based memory management (RBMM) is a form of compile time memory management, well-known from the world of functional programming. In this paper we describe our work on implementing RBMM for the logic programming language Mercury. One interesting point about Mercury is that it is designed with strong type, mode, and determinism systems. These systems not only provide Mercury programmers with several direct software engineering benefits, such as self-documenting code and clear program logic, but also give language implementors a large amount of information that is useful for program analyses. In this work, we make use of this information to develop program analyses that determine the distribution of data into regions and transform Mercury programs by inserting into them the necessary region operations. We prove the correctness of our program analyses and transformation. To execute annotated programs, we have implemented runtime support that tackles the two main challenges posed by backtracking. First, backtracking can require regions removed during forward execution to be “resurrected”; and second, any memory allocated during computation that has been backtracked over must be recovered promptly without waiting for the regions involved to come to the end of their life. We describe in detail our solution of both these problems. We study in detail how our RBMM system performs on a selection of benchmark programs, including some well-known difficult cases for RBMM. Even with these difficult cases, our RBMM-enabled Mercury system obtains clearly faster runtimes for 15 out of 18 benchmarks compared to the base Mercury system with its Boehm runtime garbage collector, with an average runtime speedup of 24%, and an average reduction in memory requirements of 95%. In fact, our system achieves optimal memory consumption in some programs.
David L. Waltz died on March 22, 2012 after suffering from brain cancer.
Dave was a good friend to Natural Language Engineering, and provided some sage advice when Roberto Garigliano and I started working on the proposed journal in the early 1990s; he subsequently agreed to serve as a founding editorial board member.
This paper presents biped walking control using a library of optimal trajectories. Biped walking control is formulated as an optimal control problem. We use a parametric trajectory optimization method to find the periodic steady-state walking trajectory. As a second stage, we use Differential Dynamic Programming to generate a library of optimal trajectories and locally linear models of the optimal control law, which are used to construct a more global control law. The proposed controller is compared with a trajectory tracking controller using optimal gains. The utility and performance of the proposed method are evaluated using simulated walking control of a planar five-link biped robot.
Binary-actuated robots offer a discrete workspace with the advantage that no feedback control is needed, as their actuators have two mechanical end-positions. This contribution focuses on a planar parallel robot with a PRRRP structure and driven by rodless pneumatic cylinders. Thus, the robot's workspace only features four destination points, which can be reached quickly and with high repeatability. Because of the fact that there is no possibility to reach in discrete points, an adapted task configuration is essential. The objective of this work is to establish and validate a synthesis and calibration technique for binary parallel robots with a PRRRP structure.
Most of the past research in swarm robotics has considered object capture and transport using a specified and very large number of agents. The objects therein were either stationary or moving deterministically (i.e., along a known path). In most previous efforts, the obstacles were also considered stationary. Here we present a modified projective path planning algorithm and illustrate via laboratory experiments that an object exhibiting stochastic (unplanned) but low-speed motion can be restrained by a limited number of agents guided in real-time across randomly moving obstacles. Relaxation of certain restrictions in the grasping objective allows for the determination of a minimum number and placement of agents around the perimeter of any generically shaped prismatic object. A closed loop experiment is designed using a single overhead camera that provides the visual feedback and helps determine the instantaneous positions of all entities in the workspace. Control signals are sent to the robots via wireless modules by a central processing unit to navigate and guide them to their respective new positions in the subsequent time-step. Agents continue to receive signals until they restrict the moving object in form closure.
Electric-powered wheelchairs improve the mobility of people with physical disabilities, but the problem to deal with certain architectural barriers has not been resolved satisfactorily. In order to solve this problem, a stair-climbing mobility system (SCMS) was developed. This paper presents a practical dynamic control system that allows the SCMS to exhibit a successful climbing process when faced with typical architectural barriers such as curbs, ramps, or staircases. The implemented control system depicts high simplicity, computational efficiency, and the possibility of an easy implementation in a microprocessor-/microcontroller-based system. Finally, experiments are included to support theoretical results.
This paper presents an indirect adaptive fuzzy control scheme for a class of unknown multi-input multi-output (MIMO) nonlinear systems with external disturbances. Within this scheme, the dynamic fuzzy logic system (DFLS) is employed to identify the unknown nonlinear MIMO systems. The control law and parameter adaptation laws of DFLS are derived based on the Lyapunov synthesis approach. The control law is robustified in H∞ sense to attenuate external disturbance, model uncertainties, and fuzzy approximation errors. It is shown that under appropriate assumptions it guarantees the boundness of all signals in the closed-loop system and the asymptotic convergence to zero of tracking errors. An extensive simulation on the tracking control of a two-link rigid robotic manipulator verifies the effectiveness of the proposed algorithms.
This paper presents an approach to visual obstacle avoidance and reactive robot navigation for outdoor and indoor environments. The obstacle detection algorithm includes an image feature tracking procedure followed by a feature classification process based on the IPT (Inverse Perspective Transformation). The classifier discriminates obstacle points from ground points. Obstacle features permit to draw out the obstacle boundaries which are used to construct a local and qualitative polar occupancy grid, analogously to a visual sonar. The navigation task is completed with a robocentric localization algorithm to compute the robot pose by means of an EKF (Extended Kalman Filter). The filter integrates the world coordinates of the ground points and the robot position in its state vector. The visual pose estimation process is intended to correct possible drifts on the dead-reckoning data provided by the proprioceptive robot sensors. The experiments, conducted indoors and outdoors, illustrate the range of scenarios where our proposal has proved to be useful, and show, both qualitatively and quantitatively, the benefits it provides.
This paper summarizes the recent standardization activities in the field of robotics by ISO (International Organization for Standardization), IEC (International Electrotechnical Commission), OMG (Object Management Group), and other organizations. While the standards in industrial robots have been mainly developed by ISO, the standards on the emerging service robots are initiated by many organizations. One of the goals of this paper is to coordinate the efforts among these groups so that more effective standardization activity can be executed. Standardization in the emerging service robots will eventually promote the proliferation of service robot markets in the near future.
The use of extra sensors in parallel robots can provide an increase in control performance, making it possible to fully exploit the potential of these mechanisms. In this paper, a comprehensive redundant dynamic modelling procedure for the six-degree-of-freedom Gough platform is presented. The proposed methodology makes it possible to define the model in terms of all sensorized joint variables in order to implement redundant information-based control, and an example, the Extended Computed Torque Control (Extended CTC) approach, is developed. This, applied to parallel robots, ensures better dynamic performance than the traditional CTC approach. In order to validate dynamic modelling, a two-step procedure is used in this paper. First, the redundant dynamic model is validated by comparing its dynamic performance with the previous research in the field. Second, an exhaustive study is carried out that demonstrates the advantages of the redundant dynamic model when used in the Extended CTC approach.
My main reason for wanting to read this book was to find out what a well-known publicist from the world of OO would have to say about the state of the art of domain specific languages (DSLs), in particular when it comes to type error feedback, functional programming, and the combination. As most readers will be aware, languages like Scheme and Haskell are very well suited to embed DSLs in: Scheme can be considered a core language to which new language facilities can be easily added by means of hygienic syntax macro's (Abelson et al. 1998), and there are so many papers on embedded DSLs in Haskell (Hudak, 1998), that any realistic selection would aggravate more people than I would please. Great was my disappointment when I read on page XXV that these topics were not discussed at all in the book. Although I can imagine that Fowler does not feel comfortable writing about subjects he is not sufficiently at home with, the question does arise whether the title of this book is sufficiently covered by its contents.
We study bialgebras and Hopf algebras in the compact closed category Rel of sets and binary relations. Various monoidal categories with extra structure arise as the categories of (co)modules of bialgebras and Hopf algebras in Rel. In particular, for any group G, we derive a ribbon category of crossed G-sets as the category of modules of a Hopf algebra in Rel that is obtained by the quantum double construction. This category of crossed G-sets serves as a model of the braided variant of propositional linear logic.
This is a tutorial on some basic non-asymptotic methods and concepts in random matrix theory. The reader will learn several tools for the analysis of the extreme singular values of random matrices with independent rows or columns. Many of these methods sprung off from the development of geometric functional analysis since the 1970s. They have applications in several fields, most notably in theoretical computer science, statistics and signal processing. A few basic applications are covered in this text, particularly for the problem of estimating covariance matrices in statistics and for validating probabilistic constructions of measurement matrices in compressed sensing. This tutorial is written particularly for graduate students and beginning researchers in different areas, including functional analysts, probabilists, theoretical statisticians, electrical engineers, and theoretical computer scientists.
Introduction
Asymptotic and non-asymptotic regimes
Random matrix theory studies properties of N × n matrices A chosen from some distribution on the set of all matrices. As dimensions N and n grow to infinity, one observes that the spectrum of A tends to stabilize. This is manifested in several limit laws, which may be regarded as random matrix versions of the central limit theorem. Among them is Wigner's semicircle law for the eigenvalues of symmetric Gaussian matrices, the circular law for Gaussian matrices, the Marchenko–Pastur law for Wishart matrices W = A* A where A is a Gaussian matrix, the Bai–Yin and Tracy–Widom laws for the extreme eigenvalues of Wishart matrices W.