排序方式: 共有9条查询结果,搜索用时 15 毫秒
1
1.
2.
Benjamin Balaguer Stephen Balakirsky Stefano Carpin Arnoud Visser 《Autonomous Robots》2009,27(4):449-464
This paper presents the map evaluation methodology developed for the Virtual Robots Rescue competition held as part of RoboCup.
The procedure aims to evaluate the quality of maps produced by multi-robot systems with respect to a number of factors, including
usability, exploration, annotation and other aspects relevant to robots and first responders. In addition to the design choices,
we illustrate practical examples of maps and scores coming from the latest RoboCup contest, outlining strengths and weaknesses
of our modus operandi. We also show how a benchmarking methodology developed for a simulation testbed effortlessly and faithfully
transfers to maps built by a real robot. A number of conclusions may be derived from the experience reported in this paper
and a thorough discussion is offered. 相似文献
3.
Stephen Balakirsky Zeid Kootbally Thomas Kramer Anthony Pietromartire Craig Schlenoff Satyandra Gupta 《Robotics and Autonomous Systems》2013,61(11):1205-1214
This article presents a newly developed knowledge methodology/model that was designed to support the IEEE Robotics and Automation Society’s Ontologies for Robotics and Automation Working Group. This methodology/model allows for the creation of systems that demonstrate flexibility, agility, and the ability to be rapidly re-tasked. The methodology/model will be illustrated through a case study in the area of robotic kit building. Through this case study, the knowledge model will be presented, and automatic tools for optimizing the knowledge representation for planning systems and execution systems will be discussed. 相似文献
4.
We address the problem of joint source-channel coding when variable-length codes are used for information transmission over a discrete memoryless channel. Data transmitted over the channel are interpreted as pairs (m
k
,t
k
), where m
k
is a message generated by the source and t
k
is a time instant when the transmission of the kth codeword begins. The decoder constructs an estimate of the transmitted sequence of pairs, and the kth decoding error is introduced as the event that the pair (m
k
,t
k
) does not belong to this sequence. We describe the maximum likelihood decoding algorithm and prove a lower bound on the exponent of the decoding error probability. For a subclass of discrete memoryless sources and discrete memoryless channels, this bound is asymptotically tight. 相似文献
5.
Craig Schlenoff Anthony Pietromartire Zeid Kootbally Stephen Balakirsky Sebti Foufou 《Robotics and Autonomous Systems》2013,61(11):1224-1234
In this paper, we describe a novel approach for representing state information for the purpose of intention recognition in cooperative human–robot environments. States are represented by a combination of spatial relationships in a Cartesian frame along with cardinal direction information. This approach is applied to a manufacturing kitting operation, where humans and robots are working together to develop kits. Based upon a set of predefined high-level state relationships that must be true for future actions to occur, a robot can use the detailed state information described in this paper to infer the probability of subsequent actions occurring. This would allow the robot to better help the human with the task or, at a minimum, better stay out of his or her way. 相似文献
6.
7.
Permutation coding for multi-user communication schemes that originate from the Fast Frequency Hopping/Multiple Frequency Shift Keying modulation is investigated. Each sender is either passive or sends some signal formed as the concatenation of M elementary signals having M different specified frequencies. There is also a jammer, who can introduce disturbances. A single disturbance is either sending the signal that contains all M frequencies at a certain time instant or sending some elementary signal at all time instants. Each receiver receives a vector of M sets, where a set at each time instant contains a fixed frequency if and only if the corresponding elementary signal was sent by either some sender or the jammer. The task of the receiver is to uniquely decode the message of his sender. We present regular constructions of permutation codes for this scheme given the following parameters: the number of frequencies, number of pairs (sender, receiver), number of messages per sender, and maximum number of disturbances of the jammer. 相似文献
8.
9.
Balakirsky V.B. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1996,42(2):399-408
The computational distribution of sequential decoding for discrete memoryless multiple-access channels is examined. It is shown that all possible collections of incorrect paths in the code tree may be described by bipartite graphs. Using this fact and a new decoding metric it is proved that the number of computations in the first incorrect subtree is a Paretean random variable, and that the parameter of the Pareto distribution is estimated similarly to the parameter for systems of information transmission with one source 相似文献
1