submitted to 1992 IEEE Workshop NN for SP Prediction of Chaotic Time Series Using Recurrent
- 格式:pdf
- 大小:29.80 KB
- 文档页数:3
我的作文获奖了,英语作文It was a typical day at school when the announcement came over the intercom summoning me to the principal's office. My heart raced with a mix of excitement and apprehension as I made my way to the administrative building not knowing what to expect. As I stepped into the office the principal greeted me with a warm smile and invited me to take a seat. She began by congratulating me on the outstanding essay I had submitted to the regional writing competition the previous month. To my utter surprise she informed me that my essay had been selected as the grand prize winner out of hundreds of entries. I was completely taken aback and struggled to find the words to express my gratitude and elation.The principal went on to explain that my essay had captivated the judges with its eloquent writing style, profound insights, and unique perspective. She said my ability to craft a compelling narrative while seamlessly weaving in thoughtful analysis and personal reflection was truly exceptional for a student of my age. Needless to say I was overwhelmed with pride and a profound sense of accomplishment. As the first person in my family to win a prestigious academic awardof this caliber, I knew this was a momentous achievement that would open up new doors and opportunities for me.The principal then presented me with the grand prize - a full scholarship to attend a prestigious writing workshop at a renowned university over the summer. I was ecstatic at the prospect of honing my craft under the tutelage of acclaimed authors and professors. She also noted that in addition to the scholarship, my essay would be published in the regional academic journal which would provide invaluable exposure and recognition. As I sat there digesting all of this incredible news, I couldn't help but reflect on the journey that led me to this point.Growing up, writing had always been a passion of mine. From a young age I was captivated by the power of the written word and the ability of language to convey complex ideas, evoke emotion, and illuminate the human experience. I spent countless hours reading voraciously and continuously practicing my own writing, always striving to improve and refine my skills. However, it was not until my sophomore year of high school that I truly began to view myself as a serious writer.That was the year I was introduced to a remarkable English teacher who completely transformed my relationship with the written word. Mrs. Johnson pushed me to think critically, challenged me to takecreative risks, and provided invaluable feedback that helped me develop a distinctive voice and style. Under her mentorship, I began entering local and regional writing contests, eager to put my skills to the test. While I experienced my fair share of disappointments and rejections, I never lost my passion or determination. Each setback only fueled my resolve to work harder and hone my craft.The essay that ultimately won the grand prize was one I had initially submitted to my school's annual writing competition. The prompt was to reflect on a transformative experience that had significantly impacted our lives. As I sat down to write, I knew immediately that I wanted to write about my grandmother's battle with Alzheimer's disease. Her diagnosis several years earlier had been absolutely devastating for my family, but it was also a experience that had profoundly shaped my worldview and values in profound ways.In the essay, I chronicled the heartbreaking decline of my grandmother's cognitive abilities and the immense toll it took on our family. I described the agonizing experience of watching this once vibrant, brilliant woman slowly lose her grasp on reality and struggle to remember even the most basic details of her life. But I also wrote about the remarkable resilience, grace, and unwavering love that my grandmother displayed throughout her ordeal. Despite her deteriorating condition, she never lost her signature warmth, kindness, and generous spirit.I talked about how her illness had taught me to cherish every moment and not take anything for granted. It made me realize the fragility of life and the importance of making the most of the time we have. I also reflected on how caring for my grandmother had strengthened the bonds of our family and brought us closer together. We learned to savor the small joys, to find humor in the midst of heartbreak, and to prioritize what truly matters most in life.Weaving together personal anecdotes, philosophical reflections, and lyrical descriptions, I aimed to craft an essay that was both deeply moving and thought-provoking. My goal was to not only share my own story, but to explore the universal truths and lessons that can be gleaned from experiences of loss, suffering, and resilience. Based on the feedback I received from the judges, I believe I was able to achieve that objective.When the principal shared the news of my victory, I was absolutely floored. I knew my essay was strong, but I never imagined it would be selected as the top entry among so many talented young writers. As I reflect back on this whole experience, I am filled with immense gratitude and a profound sense of accomplishment. Winning this award has not only boosted my confidence as a writer, but has also inspired me to continue honing my craft and pursuing my passion for the written word.The opportunity to attend the prestigious summer writing workshop is particularly exciting, as I will have the chance to learn from some of the most acclaimed authors and professors in the field. I hope to gain invaluable insights and techniques that will help me take my writing to new heights. Moreover, being published in the regional academic journal is an honor that will provide me with valuable exposure and recognition within the literary community.Most importantly, however, this award has reaffirmed my belief in the power of storytelling and personal reflection. Through my essay, I was able to not only share my own experience, but to connect with others on a deep, emotional level. The overwhelmingly positive feedback I've received from teachers, peers, and the competition judges has shown me the profound impact that authentic, vulnerable writing can have. It has inspired me to continue exploring the human experience through my work and to use my voice to shed light on important issues and universal truths.As I look to the future, I am filled with a profound sense of excitement and possibility. Winning this award has opened up a world of new opportunities and has reinforced my determination to pursue a career as a writer. I am eager to continue honing my craft, experimenting with new styles and genres, and using my writing to make a meaningful impact on the world around me. This is just thebeginning of an incredible journey, and I can't wait to see where it takes me next.。
Theoretical And Applied Fracture Mechanics, 1992-1993 Bound Issues By G. C. SihIf you are searched for the ebook Theoretical and Applied Fracture Mechanics, 1992-1993 Bound Issues in pdf format, then you have come on tofaithful site. We presented complete variation of this ebook in doc, PDF, ePub, txt, DjVu forms. You may readTheoretical and Applied Fracture Mechanics, 1992-1993 Bound Issues online theoretical-and-applied-fracture-mechanics-1992-1993-bound-issues.pdf either load. Withal, on oursite you may reading guides and other artistic eBooks online, or downloading their. We will invite attention thatour website not store the eBook itself, but we give reference to website where you can load either reading online.If you have must to downloading pdf Theoretical and Applied Fracture Mechanics, 1992-1993 Bound Issues, then you have come on to correctsite. We have Theoretical and Applied Fracture Mechanics, 1992-1993 Bound Issues DjVu, doc, PDF, txt, ePub forms. We will be pleased if youreturn anew.theor appl fract mech - theoretical and applied - Theoretical and Applied Fracture Mechanics,THEOR APPL FRACT MECH,Electrical & Electronic Engineering,Nuclear Engineering,Ocean Engineeringeffects of fractal crack - sciencedirect - which considers the effects of fractal H. Xie /Theoretical and Applied Xie / Theoretical and Applied Fracture Mechanics Crack Problems, ed. G.C. Sihthe carter n. paden, jr. distinguished chair in - 1995 | 1994 | 1993 | 1992 Special Issue of the Theoretical and Applied Fracture Mechanics, Mechanics Problems, eds. G.C. Sih andtheoretical and applied fracture mechanics - Find out more about the editorial board for Theoretical and Applied Fracture Mechanics.publications. books. research papers.genady - Proceedings of the Conference on Fracture Mechanics and Technology, (G. Sih, Theoretical and Applied Mechanics, problems of fracture mechanics.on the finite element analysis of inverse problems - Inverse problems in fracture mechanics 481 G. (1993), Propagation and fracture energy of interface Sih, G.C. (1974),zheng* the state key laboratory for mechanical - in Progress in Fracture Mechanics, G.C. Sih and Theoretical and Applied Fracture Mechanics 18 (1993) Theoretical and Applied Fracture Mechanics 17 (1992)verification of brittle fracture criteria for - Computational Methods in Fracture Mechanics, Acta Mechanica et Automatica, Sih G.C. (1965), Plane Problems of Cracks in Dissimilar Media.: g. c. sih: books, biogs, audiobooks, - Visit 's G. C. Sih Page and shop for all G. C. Sih books. Check out pictures, bibliography, biography and community discussions about G. C. Sihjournal " mechanics of solids" - archive of issues - "Fracture mechanics applied to glass fibre/epoxy matrix interface characterization No. 3, pp. 423-459, 1992. 233. G. C. Papanicolaou and D G. C. Sihtheoretical and applied fracture mechanics | vol - Theoretical and Applied Fracture Mechanics Volume 75, Pages 1-160 (February 2015)citeulike: theoretical and applied fracture - Articles from the last few issues of Theoretical and Applied Fracture Mechanics Elsevier. Search Export Show Details Hide Detailstheoretical and applied fracture mechanics - Theoretical and applied fracture mechanics. Home. WorldCat Home About WorldCat Help Feedback. Search. Search for Library Items Search for Lists Search formathematical research in materials science: - Fluid Mech. 22:13 34. Denn, M. M. 1992. Pp. 45 49 in Theoretical and Applied of Fracture Mechanics in Modern Technology. G. C problems in materialsrigid-plastic and damage behavior in metal - Theoretical and Applied Fracture Mechanics 18 G.C. Sih, Mechanics of Fracture Theoretical and Applied Fracture Mechanics 18 (1) 31-45 (1992). [21] G.C. Sihfinite element analysis of sheet forming processes - H. D. (1990), Finite element analysis of sheet forming Theoretical and Applied Fracture Mechanics, 1993, Theoretical and Applied Fracture Mechanics,theoretical and applied fracture mechanics | - Theoretical and Applied Fracture Mechanics: Aims & Scopes. Theoretical and Applied Fracture Mechanics' aims & scopes have been re-designed to cover both the theoretical and applied fracture mechanics, 1992- - Not 0.0/5. Retrouvez Theoretical and Applied Fracture Mechanics, 1992-1993 Bound Issues et des millions de livres en stock sur Amazon.fr. Achetez neuf ou d'occasionjournal of applied mathematics - J. R. Rice and G. C. Sih, Plane problems of cracks in dissimilar media, Journal of Applied Mechanics I and mode II, Engineering Fracture Mechanics,publications | multi-scale mechanics of materials - The Multi-Scale Mechanics of Materials Group focuses on the following: Publications; You are here. Home , ,influence of material ductility and crack surface - Gol'dshtein R V and Mosolov A B 1992 J Paris P C and Sih G C 1965 Fracture Sih G C 1964 Proc. 2nd Conf. on Theoretical and Applied Mechanicsjames d. lee - faculty in the department of civil - with application to crack growth problems , Theoretical and Applied Fracture Theoretical and Applied Fracture Mechanics, by G. C. Sih),journal of theoretical and applied mechanics - Journal of Theoretical and Applied Mechanics. Evaluation of fracture parameters for crack problems in fgm by a meshless method Sih G.C., Paris P.C.,m. konsta personal website! - - China, June 13-16, 2000, edited by G.C. Sih, the Solution of Fracture Mechanics Problems Theoretical and Applied Fracture Mechanicselectroelastic fracture mechanics of piezoelectric - This paper develops a theoretical electroelastic fracture mechanics For applied stress, fracture mechanics J.R. 1992. Fracture Mechanics fortheoretical and applied fracture mechanics - Genre/Form: Periodicals P riodiques: Additional Physical Format: Online version: Theoretical and applied fracture mechanics (Online) (DLC) 2006233281the effect of matrix microcracks on the - Engineering Fracture Mechanics, 25: 771-778 . (1993). An Analytical Model Asymptotic Approximations to Crack Problems. In: Sih, C.G. (ed.), Mechanics ofrecent developments of fracture mechanics in - G.C. Sih and E.E. Gdoutos (eds), Mechanics and Physics of Energy Theoretical and Applied Fracture Mechanics 17 Recent developments of fracture mechanics in Greece experimental and theoretical fracture mechanics - Experimental and theoretical fracture mechanics applied to fracture only provides lower bound fracture of Crack Problems, edited by G. C. Sih,energy density theory formulation and - The factor S can increase or decrease depending on the direction of the applied theory formulation and interpretation of Mechanics of Fracture, vols - Sihtheoretical and applied fracture mechanics - Theoretical and Applied Fracture Mechanics. The Mechanics and Physics of Fracture part encourages publication of original research on Material damage leading to: g. c. sih: books, biography, blog, - Visit 's G. C. Sih Page and shop for all G. C. Sih books and other G. C. Sih related products (DVD, CDs, Apparel). Check out pictures, bibliography,theor appl fract mech means theoretical and - Theor Appl Fract Mech is the abbreviation for Theoretical and Applied Fracture Mechanicsa micromechanical analysis of the fracture - fracture problems are common and important, Fracture Mechanics: Fundamentals and M., Chen, C. A micromechanical analysis of the fracture properties oftaylor & francis online :: effect of residual - A. N. 1992. Nonclassical Problems of Fracture Mechanics, Theoretical and Applied Fracture Mechanics, 48: M. K. and Sih, G. C. 1975. Mechanics of Fracture.computational methods for fracture in brittle and - Analysis of three-dimensional fracture mechanics problems: , Theoretical and Applied Fracture Mechanics, G. C. Sih, Strain-energytheoretical and applied fracture mechanics - - The online version of Theoretical and Applied Fracture Mechanics at ScienceDirect Finite fracture mechanics is applied to predicting the reduction in foam| | | - Theoretical & Applied Fracture Mechanics Theoretical and Applied Fracture Mechanics, Vol. 19, 1993, G.C. Sih, Th.B. Kermanidis andtheoretical and applied fracture mechanics, 1987 - Theoretical and Applied Fracture Mechanics, 1987 Bound Issues [G. C. Sih] on . *FREE* shipping on qualifying offers.journal of theoretical and applied mechanics - - Topical problems of composite fracture mechanics are formulated. Sih, G. C., P. C. Paris, G. R Theoretical and Applied Fracture Mechanics, 29Related PDFs:cinders: the diary of a drummer, hong kong: for tourists! - the traveler's guide to make the most out of your trip to hong kong - where to go, eat, sleep & party, the mighty book of boosh, the pious sex: essays on women and religion in the history of political thought, 21st century u.s. military manuals: chemical operations principles and fundamentals - fm 3-100, the split subject of narration in elizabeth gaskell's first person fiction, cobra-ferrari wars 1963-1965, the best of newsboys, optimising distressed loan books: practical solutions for dealing with non-performing loans, loving kate, jimmy mack, sleeping with the toucans: 100 great places to stay in costa rica, philosophers of war : the evolution of history's greatest military thinkers, fundamentals of intelligent transportation systems planning, miranda and starlight, these things happen, simply living: the spirit of the indigenous people, wolverines, higher english: interpretation passages, travels into poland, russia, sweden et denmark, volume 2, vocabulary grade 3, basic transport phenomena in materials engineering, the best of easy jazz - trombone 3 softcover, south east scotland and edinburgh road map, rory's gift, la evolución biológica, michelle kwan: skating like the wind, the sleepy baker: a collection of stories and recipes for children/inspired by a childhood in norway, with monthly glimpses into the lives of scandi, golden retrievers, for the love of 2011 dlx, harriet tubman, national bank notes from bowling green, ky, a man after god's own heart: updated and expanded, the song of solomon, yosele: a story from jewish life, perla, linear system theory and design, gypsy vanner horse 2015 wall calendar by willow creek press, medical devices, red masquerade, coal: a human history。
电子邮件英语作文范文(通用12篇)1. I am writing to confirm/enquire/inform you...我发邮件是想找你确认/询问/想通知你有关…2. I am writing to follow up on our earlier decision on the marketing campaign in Q2.我写邮件来是为了跟进我们之前对第二季度营销活动的决定。
3. With reference to our telephone conversation today...4. In my previous e-mail on October5...在之前10月5日所写的邮件中提到…5. As I mentioned earlier about...在先前我所提到的关于…6. As indicated in my previous e-mail...如我在之前邮件中所提到的…7. As we discussed on the phone...8. from our decision at the previous meeting...如我们在上次会议中所决定的…9. as you requested...根据贵方要求…10. In reply to your e-mail dated April 1,we decided...回复贵方4月1日的邮件,我方决定…11. This is in response to your e-mail today.这是对您今早发来的邮件的回复。
12. As mentioned before, we deem this product has strong unique selling points in china.如先前所述,我们认为这个产品在中国有强有力且独一无二的销售点。
13. As a follow-up to our phone conversation yesterday, I wanted to get back to you about the pending issues of our agreement.14. I received your voice message regarding the subject. I'm wondering if you can elaborate . provide more details.我收到了你关于这个主题的留言。
form英文作文英文:As a form of written communication, a form serves as a way for individuals to provide information, request services, or apply for various purposes. It is a structured document that requires specific information to be filled in, and it is often used in formal settings such as government agencies, educational institutions, or businesses.Forms can come in various formats, such as paper-based forms or online forms. For example, when I applied for avisa to travel to China, I had to fill out a paper-based form with my personal information, travel itinerary, and purpose of visit. This form was then submitted to the Chinese consulate for processing.In addition, online forms have become increasingly popular due to the convenience and efficiency they offer. For instance, when I registered for an online course, I hadto fill in an online form with my contact details, payment information, and course preferences. This form allowed me to enroll in the course without having to visit the institution in person.Forms also play a crucial role in gathering data and feedback. For instance, after attending a workshop, I was asked to fill out a feedback form to provide my thoughts on the content, presentation, and overall experience. This form allowed the organizers to assess the success of the workshop and make improvements for future events.Overall, forms are essential in facilitating communication and documentation. They provide a standardized way for individuals to convey information and make requests, and they are used in a wide range of contexts to streamline processes and gather necessary information.中文:作为一种书面交流形式,表格作为个人提供信息、请求服务或申请各种用途的一种方式。
IEEE Workshop on FPGAs for Custom Computing Machines, pp. 11-13, April 1994.Pin Assignment for Multi-FPGA Systems1(Extended Abstract)Scott Hauck, Gaetano BorrielloDepartment of Computer Science and EngineeringUniversity of WashingtonSeattle, WA 98195AbstractThere is currently great interest in using systems of FPGAs for logic emulators, custom computing devices, and software accelerators. An important step in making these technologies more generally useful is to develop completely automatic mapping tools from high-level specification to FPGA programming files. In this paper we examine one step in this automatic mapping process, the selection of FPGA pins to use for routing inter-FPGA signals. We present an algorithm that greatly increases mapping speed while also improving mapping quality. IntroductionThere is great interest in using multiple-FPGA systems for such tasks as logic emulation, software acceleration, and custom-computing devices. Many such systems are discussed elsewhere in these proceedings. An important aspect shared by all of these systems is that they harness multiple FPGAs, connected in a fixed routing structure, to perform their tasks. While the FPGAs themselves can be routed and rerouted, the wires moving signals between FPGA pins are fixed by the routing structure on the implementation board.While some very impressive results have been achieved by hand-mapping of algorithms and circuits to FPGA systems, developing a completely automatic system for mapping to these structures is important to achieving more widespread utility. In general, an automatic mapping approach will go through five phases, in the following order: Synthesis, Partitioning/Global Placement, Global Routing, FPGA Place, FPGA Route. During the Synthesis step, the circuit to be implemented is converted from its source format into a netlist appropriate for implementation in FPGAs, possibly after several optimization steps. Partitioning and Global Placement breaks this mapping into subcircuits that will fit into the individual FPGAs, and determines which FPGAs a given subcircuit will occupy. Signals that connect logic in different FPGAs are then routed during the Global Routing step, which determines both which intermediate FPGAs a signal will move through (if any), as well as what FPGA I/O pins it will use. With the logic assigned and the inter-FPGA signals routed, standard FPGA Place and Route software can then produce programming files for the individual FPGAs.Figure 1. Two views of the inter-FPGA routing problem: As a complex graph including internal resources (left), and an abstract graph with FPGAs as nodes (right).The Global Routing phase of mapping to multi-FPGA systems bears a lot of similarity to routing for individual FPGAs, and hopefully similar algorithms can be applied to both problems. Just as in single FPGAs, Global Routing needs to route signals on a fixed topology, with strictly limited resources, while trying both to handle high-density mappings and minimize clock periods. The obvious method for applying single-FPGA routing algorithms to multi-FPGA systems is to view the FPGAs as complex entities, explicitly modelling both internal routing resources and pins connected by individual external wires (figure 1 left). A standard routing algorithm would then be used to determine both which intermediate FPGA to use for long distance routing (i.e., a signal from FPGA A to D would be assigned to use either FPGA B or C), as well as which individual FPGA pins to route through. Unfortunately, this approach will not work. The problem is that although the logic has been already assigned to FPGAs during partitioning, the placement of logic intoindividual logic blocks will not be done until the next step, FPGA placement. Thus, since there is no specific source or sink for the individual routes, standard routing algorithms cannot be applied.The approach we take here is to abstract entire FPGAs into single nodes in the routing graph, with the arcs between the nodes representing bundles of wires. This solves the unassigned source and sink problem mentioned above, since while the logic hasn’t been placed into individual logic blocks, partitioning has assigned the logic to the FPGAs. It also simplifies the routing problem, since the graph is much simpler, and similar resources are grouped together (i.e. all wires connecting the same FPGAs are grouped together into a single edge in the graph). Unfortunately, the routing algorithm can no longer determine the individual FPGA pins a signal should use, since those details have been abstracted away. It is this problem, the assignment of interchip routing signals to FPGA I/O pins, that the rest of this paper addresses. Pin assignment for multi-FPGA systems One solution to the pin assignment problem is quite simple: ignore it. After Global Routing has routed signals through intermediate FPGAs, those signals are then randomly assigned to individual pins. While this simple approach can quickly generate an assignment, it gives up some optimization opportunities. A poor pin assignment can not only result in greater delay and lower logic density, but can also slow down the place and route software, which must deal with a more complex mapping problem.A second solution is to use a topology that simplifies the problem. Specifically, topologies such as bipartite graphs only connect logic-bearing FPGAs with routing-only FPGAs. In this way, the logic-bearing FPGAs can be placed initially, and it is assumed that the routing-only FPGAs can handle any possible pin assignment. More details on such an approach can be found in [1]. However, it is important to note that these approaches only apply to topologies such as bipartite graphs and partial crossbars, topologies where logic-bearing FPGAs are not directly connected.A third approach is to allow the FPGA placement tool to determine its own assignment. This requires that the placement tool allow the user to restrict the locations where an I/O pin can be assigned (e.g., Xilinx APR and PPR placement and routing tools [4]). With such a system, I/O signals are restricted to only those pin locations that are wired to the proper destinations. Once the placement tool determines the pin assignment for one FPGA, this assignment is propagated to the attached FPGAs. It is important to note that this does limit the number of placement runs that can be performed in parallel. Specifically, since the assignment from one FPGA is propagated to adjacent FPGAs only after that entire FPGA has been placed, no two adjacent FPGAs can be placed simultaneously. Since the placement and routing steps can be the most time-consuming steps in the mapping process, achieving the greatest parallelism in this task can be critical. Also, while the iterative placement approach can optimize locally, creating good results in a single FPGA, it ignores more global optimization opportunities. Finally, there are some topologies for which iterative placement may be unable to determine a correct pin assignment, because the placement of one FPGA may use up resources required in another FPGA. Force-directed pin assignment for multi-FPGA systemsAs we have discussed, pin assignment via sequential placement of individual FPGAs can be slow, cannot optimize globally, and may not work at all for some topologies. What is necessary is a more global approach which optimizes the entire mapping, while avoiding sequentializing the placement step. Intuitively, the best approach to pin assignment would be to simultaneously place all FPGAs, with the individual placement runs communicating with each other to balance the pin assignment demands of each FPGA. In this way a global optimum could be reached, and the mapping of all FPGAs would be completed as quickly as any single placement could be accomplished. Unfortunately, tools to do this do not exist, and the communication necessary to perform this task could become prohibitive. Our approach is similar to simultaneous placement, but we will perform the assignment on a single machine within a single process. Obviously, with the placement of a single FPGA consuming considerable CPU time, complete placement of all FPGAs simultaneously on a single processor is impractical, and thus simplification of the problem will be key to a workable solution.Our approach is to use force-directed placement of the individual FPGAs [3]. In force-directed placement, the signals that connect logic in a mapping are replaced by springs between the signal’s source and each sink, and the placement process consists of seeking a minimum net force placement of the logic. By finding this minimum net force configuration, we expect to minimize wirelength in the resulting mapping. To find this configuration, the software randomly chooses a logic block and moves it to its minimum net force location. This hill-climbing process continues until a local optimum is found, at which point the software accepts the current configuration.Force-directed placement may seem a poor choice for pin assignment, and is generally felt to be inferior tosimulated annealing for FPGA placement. Two reasons for this are the difficulty force-directed placement has with optimizing for goals other than wirelength, and the inaccuracy of the spring approximation to routing costs. However, force-directed placement can handle all of the optimization tasks involved in pin assignment, and the spring metric is the key to efficient handling of multi-FPGA systems.Figure 2. Example of spring simplification rules. Source circuit at top has node U replaced at middle, and any springs created in parallel to others are merged at bottom.As implied earlier, we will not simply place individual FPGAs, but will in fact use force-directed placement simultaneously on all FPGAs in the system. To make this tractable, we can simplify the mapping process. Specifically, since we are only performing pin assignment, we do not care where the individual logic blocks are placed. Thus, we can examine the system of springs built for the circuit mapping, and use the laws of physics to remove nodes corresponding to FPGA logic blocks, leaving only I/O pins. As shown in the example of figure 5, the springs connected between an internal logic node and its neighbors can be replaced with a set of springs connected between the node’s neighbors while maintaining the exact same forces on the other nodes. By repeatedly applying these simplification rules to the logic nodes in the system, we end up with a mapping consisting only of I/O pins, with spring connections that act identically to the complete mapping they replace. In this way, we simplify the problem enough to allow the pin assignment of a large system of FPGAs to be performed efficiently.We have performed comparisons of our force-directed approach with iterative placement approaches, as well as random pin assignments, on several current multi-FPGA systems. The results have shown that the force directed approach is faster than all other alternatives, including random, by up to almost a factor of ten. It also produces higher-quality results than the other approaches, yielding up to an 8.5% decrease in total wirelength in the system. Our algorithm works on arbitrary topologies, including those for which iterative placement approaches generate incorrect results. Complete results, along with a more thorough discussion of this topic, can be found in [2]. References[1] P. K. Chan, M. D. F. Schlag, "Architectural Tradeoffs in Field-Programmable-Device-Based Computing Systems", IEEE Workshop on FPGAs for Custom Computing Machines, pp. 152-161, 1993.[2] S. Hauck, G. Borriello, "Pin Assignment for Multi-FPGA Systems", University of Washington, Dept. of Computer Science & Engineering Technical Report #94-04-01, April 1994.[3] K. Shahookar, P. Mazumder, “VLSI Cell Placement Techniques”, ACM Computing Surveys, Vol. 23, No. 2, pp. 145-220, June 1991.[4] Xilinx Development System Reference Guide and The Programmable Logic Data Book, Xilinx, Inc., San Jose, CA, 1993.1 This paper is an extended abstract of University of Washington, Dept. of Computer Science & Engineering Technical Report #94-04-01, April 1994.。
2024届高考英语二轮复习阅读理解A篇(应用文)课件(共14张PPT)(共14张PPT)2024高考二轮复习阅读理解A篇(应用文)阅读应用文:广告、书信、列车或飞机的时刻表、产品说明书、宣传海报、简明新闻等都属于应用文,他们的目的都是为了向读者传输信息。
在阅读这类文章时主要是注意细节信息(时间、地点、人物或数据),做题时,根据所提问题中的关键词定位,用寻读、跳读的方法更有效。
【做题步骤】1.不需读原文(有题目和小标题的要看),直接看问题,划出问题中的关键词2.从题干中寻找关键词,定位问题答案【注意】①细节题的正确选项大都是相应原文的变形(如同义改写、词性转换等)②注意文中以粗体、大写、下划线等方式加以提示的文字,因为这很有可能是文章的核心或某一部分内容的概括例题(2023·新高考卷II阅读理解A篇)Yellowstone National Park offers a variety of ranger programs throughout the park, and throughout the year. The following are descriptions of theranger programs this summer.Experiencing Wildlife in Yellowstone (May 26 to September 2)Whether you’re hiking a backcountry trail (小径), camping, or just enjoying the park’s amazing wildlife from the road, this quick workshop is for you and your family. Learn where to look for animals and how to safely enjoy your wildlife watching experience. Meet at the Canyon Village Store.Junior Ranger Wildlife Olympics (June 5 to August 21)Kids can test their skills and compare their abilities to the animals of Yellowstone. Stay for as little or as long as your plans allow. Meet in front of the Visitor Education Center.Canyon Talks at Artist Point (June 9 to September 2)From a classic viewpoint, enjoy Lower Falls, the Yellowstone River, and the breathtaking colors of the canyon (峡谷) while learning about the area’s natural and human history. Discover why artists and photographers continue to be drawn to this special place. Meet on the lower platform at Artist Point on the South Rim Drive for this short talk. Photography Workshops (June 19 80-89, B; 70-79, C; 60-69, D; Below 60, E.Essays (60%)Your four major essays will combine to form the main part of the grade for this course: Essay 1 = 10%; Essay 2 = 15%; Essay 3 = 15%; Essay 4 =20%.Group Assignments (30%)Students will work in groups to complete four assignments (作业) during the course. All the assignments will be submitted by the assigned date through Blackboard, our online learning and course management system. Daily Work/In-Class Writings and Tests/Group Work/Homework (10%) Class activities will vary from day to day, but students must be ready to complete short in-class writings or tests drawn directly from assigned readings or notes from the previous class' lecture/discussion, so it is important to take careful notes during class. Additionally, from time to time I will assign group work to be completed in class or short assignments to be completed at home, both of which will be graded. Late WorkAn essay not submitted in class on the due date will lose a letter grade for each class period it is late. If it is not turned in by the 4th day after the due date, it will earn a zero. Daily assignments not completed during class will get a zero. Short writings missed as a result of an excused absence will be accepted.22. How many parts is a student’s final grade made up ofA. Two.B. Three.C. Four.D. Five.做题思路:1.快速阅读大标题和四个小标题,是文学入门课程的评分标准。
ASEAN Critical and Emerging Technologies Digital Summit and Masterclass November 22 and 29, virtualIEEE CertifAIEd Training Webinar November 13-16, virtualHosted by Standards Australia with the support of the Australian Government’s Department of Foreign Affairs and Trade (DFAT), the ASEAN Critical and Emerging Technologies Digital Summit and Masterclass is a two-day virtual event, bringing together leading Critical and Emerging Technologies (CET) experts with ASEAN-based standards developers, policymakers, industry, and business professionals, as well as future leaders to reinforce the importance of the adoption and development of standards with the advancement of CET across South-East Asia.This event is designed as a fully virtual event, to welcome participants from across the region and around the world with an interest in CET standards.For more information on the event website: https://.au/engagement-events/events/digital-summit-integration-of-international-standards-in-cet-across-south-east-asiaIEEE CertifAIEd TM is a certification program for assessing ethics of Autonomous Intelligent Systems (AIS) to help protect, differentiate, and grow product adoption. The resulting certificate and mark demonstrates the organization’s effort to deliver a solution with a more trustworthy AIS experience to their users.Through certification guidance, assessment and independent verification, IEEE CertifAIEd offers the ability to scale responsible innovation implementations, thereby helping to increase the quality of AIS, the associated trust with key stakeholders, and realizing associated benefits.IEEE Authorized Assessors help guide organizations through a thorough review and examination of their AIS to determine its ethical risk and reward profile and conformance with relevant ethical criteria. For more information on the event website: https:///ieeecertifaied.html?_gl=1*vppoxq*_ga*MTA4OTA4MzQzMi4xNjkyMTczMzUx*_ga_XDL2ME6570*MTY5Njk5MDYwOC41LjEuMTY5Njk5MDYxNC41NC4wLjA.54 CHINA STANDARDIZATION November / December 2023LOBAL VISIONBETTER COMMUNICATION | GREATER VALUE2023 PSIS workshop December 12, virtualWorld Radiocommunication Conference 2023November 20-December 15, Dubai, UAECEN and CENELEC, together with the European Commission’sJoint Research Centre (JRC), carry out an annual “foresight onstandardization” initiative named Putting Science into Standards(PSIS). The 2023 PSIS workshop will focus on circular technologiesfor construction.The construction sector is one of the priority areas addressedby the Circular Economy Action Plan of the European Green Deal.The sector is responsible for over 35% of the EU’s total wastegeneration, with construction and demolition waste being one ofthe most significant waste streams. The uptake of circular economyin the construction sector is influenced by policies scattered in areas ranging from the Waste Framework Directive to the Construction Products Regulation and product standards, with a consequent need for effective coordination.This PSIS workshop will bring stakeholders from research, scientific and standardization communities together with policy makers to exchange views on standardization needs for implementing circular technologies in the construction sector.For more information on the event website: https://www.cencenelec.eu/get-involved/research-and-innovation/cen-and-cenelec-activities/putting-science-into-standardsWorld Radiocommunication Conference 2023 (WRC-23) will take place in the United Arab Emirates from November 20 to December 15, 2023, preceded by the Radiocommunication Assembly 2023 (RA-23) from November 13-17.This booklet is available in the six languages of the Union and provides an easy access to the WRC-23 agenda, as well as to the pertinent resolutions referenced therein.For more information on the event website:https://www.itu.int/wrc-23/#55 2023 November / December CHINA STANDARDIZATION。
Transformers Collection2002 Special Edition ContentsIEEE Std 62-1995, Guide for Diagnostic Field Testing of Electric Power Apparatus —Part 1: Oil Filled Power Transformers, Regulators, and Reactors (ANSI)IEEE Std 259-1999, Standard Test Procedure for Evaluation of Systems of Insulation for Specialty Transformers (ANSI)IEEE Std 637-1985 (Reaff 1992), Guide for the Reclamation of Insulating Oil and Criteria for Its Use (ANSI)IEEE Std 638-1992 (Reaff 1999), Standard for Qualification of Class 1E Transform ers for Nuclear Power Generating StationsIEEE 1276-2000 Edition, Guide for the Application of High Temperature Insulation Materials in Liquid-Immersed Power TransformersIEEE Std 1277-2000, General Requirements and Test Code for Dry-Type and Oil-Immersed Smoothing Reactors for DC Power TransmissionIEEE Std 1388-2000, IEEE Standard for the Electric Reporting of Transformer Test Data (ANSI)IEEE Std 1538-2000, IEEE Guide for Determining of Maximum Winding Temperature Rise in Liquid-Filled Transformers (ANSI)IEEE Std C57.12.00-2000, Standard General Requirements for Liquid-Immersed Distribution, Power, and Regulating TransformersIEEE Std C57.12.01-1998, Standard General Requirements for Dry-Type Distribution and Power Transformer Including Those with Solid-Cast and/or Resin-Encapsulated WindingsANSI C57.12.10-1997, Standard for Transformers—230 Kv and Below 833/958 Through 8333/10 417 kVA, Single-Phase, and 750/862 Through 60 000/80 000/100 000 kVA, Three-Phase Without Load Tap Changing; and 3750/4687 Through 60 000/80 000/100 000 kVA with Load Tap Changing—Safety RequirementsANSI C57.12.20-1997, Standard for Overhead-Type Distribution Transformers, 500 kVA and Smaller: High Voltage, 34 500 Volts and Below; Low Voltage, 7970/13 800 Y Volts and BelowANSI C57.12.21-1992, Standard for Transformers—Pad-Mounted, Compartmental-Type, Self-Cooled, Three-Phase Distribution Transformers with High Voltage Bushings; High-Voltage, 34500 GRYD/19920 Volts and Below; Low-Voltage, 240/120 volts; 167 kVA and SmallerANSI C57.12.22-1993 (Reaff 1998), Standard for Transformers—Pad-Mounted, Compartmental-Type, Self-Cooled, Three-Phase Distribution Transformers with High-Voltage Bushings, 2500 kVA and Smaller: High-Voltage, 34 500 GrdY/19 920 Volts and Below; Low Voltage, 480 Volts and BelowIEEE C57.12.23-1992 (Reaff 1999), Standard for Transformers—Underground-Type, Self-Cooled, Single-Phase Distribution Transformers With Separable, Insulated, High-Voltage Connectors; High Voltage (24 940 GrdY/14 400 V and Below) and Low Voltage (240/120 V, 167 kVA and Smaller) (ANSI)ANSI C57.12.24-2000, Requirements for—Underground-Type Three-Phase Distribution Transformers, 2500 kVA and Smaller; High Voltage, 34 500 GrdY/19 920 Volts and Below; Low Voltage, 480 Volts and Below—RequirementsANSI C57.12.25-1990, Standard for Transformers—Pad-Mounted, Compartmental-Type, Self-Cooled, Single-Phase Distribution Transformers with Separable Insulated High-Voltage Connectors: High-Voltage, 34 500 GrdY/19 920 Volts and Below; Low-Voltage, 240/120 Volts; 167 kVA and Smaller—RequirementsANSI C57.12.26-1992, Pad-Mounted, Compartmental-Type, Self-Cooled, Three-Phase Distribution Transformers for Use with Separable Insulated High-Voltage Connectors (34 500 GrdY/19 920 Volts and Below; 2500 kVA and Smaller)ANSI C57.12.28-1999, Standard for Pad-Mounted Equipment—Enclosure IntegrityANSI C57.12.29-1991, Standard for Pad-Mounted Equipment—Enclosure Integrity for Coastal EnvironmentsANSI C57.12.31-1996, Standard for Pole-Mounted Equipment—Enclosure IntegrityANSI C57.12.32-1994, Standard for Submersible Equipment—Enclosure IntegrityIEEE C57.12.35-1996, Standard for Bar Coding for Distribution TransformersANSI C57.12.40-2000, Standard for Secondary Network Transformers—Subway and Vault Types (Liquid Immersed)—RequirementsIEEE C57.12.44-2000, Requirements for Secondary Network Protectors (ANSI)ANSI C57.12.50-1981 (Reaff 1998), Requirements for Ventilated Dry-Type Distribution Transformers, 1 to 500 kVA, Single-Phase, and 15 to 500 kVA, Three-Phase, with High-Voltage 601 to 34 500 Volts, Low-Voltage 120 to 600 VoltsANSI C57.12.51-1981 (Reaff 1998), Requirements for Ventilated Dry-Type Power Transformers, 501 kVA and Larger, Three Phase, with High-Voltage 601 to 34 500 Volts, Low-Voltage 208Y/120 to 4160 VoltsANSI C57.12.52-1981 (Reaff 1998), Requirements for Sealed Dry Type Power Transformers, 50a kVA and Larger, Three Phase and High Voltage 601 to 34500 Volts, Low Voltage208Y/120 to 4160 VoltsANSI C57.12.55-1987 (Reaff 1998), Standard for Dry Type Transformers in Unit Installations, Including Unit Substations—Conformance StandardIEEE C57.12.56-1986 (Reaff 1998), Standard Test Procedure for Thermal Evaluation of Insulation Systems for Ventilated Dry-Type Power and Distribution Transformers (ANSI) IEEE C57.12.58-1991 (Reaff 1996), Guide for Conducting a Transient Voltage Analysis of a Dry-Type Transformer Coil (ANSI)IEEE Std C57.12.59-2001, Guide for Dry-Type Transformer Through-Fault Current DurationIEEE C57.12.60-1998, Guide for Thermal Evaluation of Insulation Systems for Solid-Cast and Resin-Encapsulated Power and Distribution Transformers (ANSI)IEEE C57.12.70-2000, Standard for Terminal Markings and Connections for Distribution and Power TransformersIEEE C57.12.80-1978 (Reaff 1992), Standard Terminology for Power and Distribution Transformers (ANSI)IEEE C57.12.90-1999, Standard Test Code for Liquid-Immersed Distribution, Power, and Regulating Transformers and Guide for Short-Circuit Testing of Distribution and Power Transformers (ANSI)IEEE C57.12.91-2001, Test Code for Dry-Type Distribution and Power Transformers (ANSI)IEEE C57.13-1993, Standard Requirements for Instrument TransformersIEEE C57.13.1-1981 (Reaff 1999), Guide for Field Testing of Relaying Current Transformers (ANSI)IEEE C57.13.3-1983 (Reaff 1990), Guide for the Grounding of Instrument Transformer Secondary Circuits and Cases (ANSI)IEEE C57.15-1999, Standard Requirements, Terminology, and Test Code for Step-Voltage and Induction-Voltage Regulators (ANSI)IEEE C57.16-1996 (Reaff 2001), Standard Requirements, Terminology, and Test Code for Dry-Type Air-Core Series-Connected Reactors (ANSI)IEEE C57.18.10-1998, Standard Practices and Requirements for Semiconductor Power Rectifier Transformers (Revision and redesignation of ANSI/IEEE C57.18-1964) (ANSI) IEEE C57.19.00-1991 (Reaff 1997), Standard General Requirements and Test Procedure for Outdoor Power Apparatus Bushings (ANSI)IEEE C57.19.01-2000, Standard Performance Characteristics and Dimensions for Outdoor Apparatus Bushings (ANSI)IEEE C57.19.03-1996, Standard Requirements, Terminology, and Test Bar Coding for Bushings for DC Applications (ANSI)IEEE C57.19.100-1995, Guide for Application of Power Apparatus Bushings (ANSI) IEEE C57.21-1990 (Reaff 1995), Standard Requirements, Terminology, and Test Code for Shunt Reactors Over 500 kVA (ANSI)IEEE C57.91-1995, Guide for Loading Mineral-Oil-Immersed Overhead and Pad-Mounted Distribution Transformers Rated 500 kVA and Less with 65° C or 55° C Average Winding RiseIEEE C57.93-1995 (Reaff 2001), Guide for Installation of Liquid-Immersed Power Transformers (ANSI)IEEE C57.94-1982 (Reaff 2000), Recommended Practice for Installation, Application, Operation, and Maintenance of Dry-Type General Purpose Distribution and Power TransformersIEEE C57.96-1999, Guide for Loading Dry-Type Distribution and Power Transformers IEEE C57.98-1993 (Reaff 1999), Guide for Transformer Impulse Tests (ANSI)IEEE C57.100-1999, Standard Test Procedure for Thermal Evaluation of Oil-Immersed Distribution Transformers (ANSI)IEEE C57.104-1991, Guide for the Interpretation of Gases Generated in Oil-Immersed Transformers (ANSI)IEEE C57.105-1978 (Reaff 1999), Guide for Application of Transformer Connections in Three-Phase Distribution Systems (ANSI)IEEE C57.106-1991 (Reaff 1998), IEEE Guide for Acceptance and Maintenance of Insulating Oil in Equipment (ANSI)IEEE C57.109-1993 (Reaff 2000), Guide for Liquid-Immersed Transformer Through-Fault-Current Duration (ANSI)IEEE C57.110-1998, Recommended Practice for Establishing Transformer Capability When Supplying Nonsinusoidal Load CurrentsIEEE C57.111-1989 (Reaff 1995), Guide for Acceptance of Silicone Insulating Fluid and Its Maintenance in Transformers (ANSI)IEEE C57.113-1991, Guide for Partial Discharge Measurement in Liquid-Filled Power Transformers and Shunt ReactorsIEEE C57.116-1989 (Reaff 2000), Guide for Transformers Directly Connected to Generators (ANSI)IEEE C57.117-1986 (Reaff 1998), Guide for Reporting Failure Data for Power Transformers and Shunt Reactors on Electric Utility Power Systems (ANSI)IEEE C57.119-2001, Performing Temperature Rise Tests on Oil-Immersed Power Transformers at Loads Beyond Nameplate Ratings (ANSI)IEEE C57.121-1998, Guide for Acceptance and Maintenance of Less Flammable Hydrocarbon Fluid in Transformers (ANSI)IEEE C57.124-1991 (Reaff 1996), Recommended Practice for the Detection of Partial Discharges and the Measurement of Apparent Charge in Dry -Type Transformers (ANSI) IEEE C57.125-1991 (Reaff 1998), Guide for Failure Investigation, Documentation, and Analysis for Power Transformers and Shunt ReactorsIEEE C57.127-2000, Trial-Use Guide for the Detection of Acoustic Emissions from Partial Discharges in Oil-Immersed Power TransformersIEEE C57.129-1999, General Requirements and Test Code for Oil-Immersed HVDC Converter TransformersIEEE C57.131-1995, Guide for the Application of Metal Oxide Sure Arresters for AC Systems (ANSI)IEEE Std C57.134-2000, Guide for Determination of Hottest Spot Temperature in Dry Type Transformers (ANSI)IEEE C57.138-1998, Recommended Practice for Routine Impulse Test for Distribution Transformers (ANSI)。
Author Final Paper Preparation and Submission Instructions论文定稿准备与提交指南Congratulations on having your paper accepted for publication in the proceedings of the 2009 First International Workshop on Education Technology and Computer Science (ETCS 2009)to be held7-8 March 2009 in Wuhan, Hubei, China您的论文在2009年3月7-8日于中国湖北省武汉市举办的首届教育技术与计算机科学国际研讨会上通过审核并发表,特致祝贺。
The proceedings production editor for this project is:该项目制作编辑是:BOB WERNER Bob Werner CPS Production Editor 大会出版服务 Conference Publishing Services (CPS)大会出版服务IEEE Computer Society IEEE 计算机协会10662 Los Vaqueros CircleLos Alamitos, California 90720-1314E-MAIL: bwerner@PHONE: +1 714 821 8380 Ext. 3102FAX: +1 714 761 1784The following information is provided to help you in the preparation and submission of your final paper as it will be published in the proceedings. Please follow all STEPs to insure the submission process is completed successfully.下列信息提供给您以帮助您准备并提交论文定稿。
BibliographyA CKLEY,D.,&M.L ITTMAN.1992.Interactions between learning and evolution.InLangton et al.(1992),487–509.——,&——.1994.Altruism in the evolution of communication.In Brooks&Maes (1994),40–48.A NDERSEN,H.1973.Abductive and deductive nguage40.765–793.B¨ACK,T.1994.Selective pressure in evolutionary algorithms.In Proceedings of the First IEEE Conference on Evolutionary Computation,ed.by Z.Michalewicz,J.D.Schaffer,H.P.Schwefel,D.B.Fogel,&H.Kitano,volume1,57–62.Piscataway, NJ:IEEE Press.B ALDWIN,D.A.1991.Infants’contribution to the achievement of joint reference.Child Development62.875–890.——1993a.Early referential understanding:Infants’ability to recognise referential acts for what they are.Developmental Psychology29.832–843.——1993b.Infants’ability to consult the speaker for clues to word reference.Journal of Child Language20.395–418.B ATALI,J.1994.Innate biases and critical periods:Combining evolution and learningin the acquisition of syntax.In Brooks&Maes(1994),160–171.——putational simulations of the emergence of grammar.In Hurford et al.(1998),405–426.——2002.The negotiation and acquisition of recursive grammars as a result of compe-tition among exemplars.In Briscoe(2002),111–172.B ATES,E.,&J.E LMAN.1996.Learning rediscovered.Science274.1849–1850.B ELEW,R.,J.MC I NERNEY,&N.N.S CHRAUDOLPH.1992.Evolving networks:Using the genetic algorithm with connectionist learning.In Langton et al.(1992), 511–547.B EVER,T.G.,&D.T.L ANGENDOEN.1971.A dynamic model of the evolution oflanguage.Linguistic Inquiry2.433–463.B ICKERTON,D.1981.Roots of Language.Ann Arbor,MI:Karoma.——1984.The language bioprogram hypothesis.Behavioral and Brain Sciences7.173–221.——nguage and Species.Chicago,IL:University of Chicago Press.——1998.Catastrophic evolution:the case for a single step from protolanguage to full human language.In Hurford et al.(1998),341–358.——2000.How protolanguage became language.In Knight et al.(2000),264–284.——2002.Foraging versus social intelligence in the evolution of protolanguage.In Wray(2002),207–225.B LOOM,P.2000.How Children Learn the Meanings of Words.Cambridge,MA:MITPress.——,&L.M ARKSON.1998.Capacities underlying word learning.Trends in Cognitive Sciences2.67–73.B OYD,R.,&P.J.R ICHERSON.1985.Culture and the Evolutionary Process.Chicago,IL:University of Chicago Press.——,&——.2000.Memes:Universal acid or a better mousetrap.In Darwinizing Culture:The Status of Memetics as a Science,ed.by R.Aunger,143–162.Oxford: Oxford University Press.B RIGHTON,H.2000.Experiments in iterated instance-based learning.Technical report,Language Evolution and Computation Research Unit.——positional syntax from cultural transmission.Artifical Life8.25–54.——,S.K IRBY,&K.S MITH.forthcoming.Situated cognition and the role of multi-agent models in explaining language structure.In Adaptive Agents,ed.by D.Ku-denko,E.Alonso,&D.Kazakov.London:Springer.B RISCOE,E.2000a.Evolutionary perspectives on diachronic syntax.In DiachronicSyntax:Models and Mechanisms,ed.by S.Pintzuk,G.Tsoulas,&A.Warner,75–108.Oxford:Oxford University Press.——2000b.Grammatical acquisition:Inductive bias and coevolution of language and the language acquisition nguage76.245–296.——(ed.)2002.Linguistic Evolution through Language Acquisition:Formal and Com-putational Models.Cambridge:Cambridge University Press.B ROOKS,R.,&P.M AES(eds.)1994.Artificial Life4:Proceedings of the Fourth Inter-national Workshop on the Synthesis and Simulation of Living Systems.Cambridge, MA:Addison-Wesley.B ROWN,R.1973.A First Language.Cambridge,MA:Harvard University Press.B UCKLEY,C.,&J.S TEELE.2002.Evolutionary ecology of spoken language:co-evolutionary hypotheses are testable.World Archaeology34.26–46.B ULLOCK,S.1997.An exploration of signalling behaviour by both analytic and simula-tion means for both discrete and continuous models.In Husbands&Harvey(1997), 454–463.B URLING,R.1992.Patterns of Language:Structure,Variation,Change.London:Academic Press.C AMPBELL,D.T.1965.Variation and selective retention in sociocultural evolution.In Social Change in Developing Areas:A Reinterpretation of Evolutionary Theory, ed.by H.R.Barringer,G.I.Blanksten,&R.W.Mack,19–49.Cambridge,MA: Schenkman.——1975.On the conflicts between biological and social evolution and between psy-chological and moral tradition.American Psychology30.1103–1126.C ANGELOSI,A.1999.Modelling the evolution of communication:From stimulusassociations to grounded symbolic associations.In Floreano et al.(1999),654–663.——,&D.P ARISI.1998.The emergence of a‘language’in an evolving population of neural networks.Connection Science10.83–97.C ANN,R.1993.Formal Semantics:an introduction.Cambridge:Cambridge UniversityPress.C HENEY,D.,&R.S EYFARTH.1990.How Monkeys See the World:Inside the Mind ofAnother Species.Chicago,IL:University of Chicago Press.C HOMSKY,N.1965.Aspects of the Theory of Syntax.Cambridge,MA:MIT Press.——1971.Problems of Knowledge and Freedom.London:Fontana.——nguage and Mind.New York,NY:Harcourt,Brace and World,enlarged edition.——1975.Reflections on Language.New York,NY:Pantheon.——1980.Rules and Representations.London:Basil Blackwell.——1986.Knowledge of Language:its nature,origin and use.London:Praeger.——nguage and Problems of Knowledge.Cambridge,MA:MIT Press.——1995.The Minimalist Program.Cambridge,MA:MIT Press.——2002.On Nature and Language.Cambridge:Cambridge University Press.Edited by A.Belletti and L.Rizzi.C HRISTIANSEN,M.H.,&C.M.C ONWAY,2002.The importance of hierarchicallearning:A computational study of sequential learning in human and non-human primates.Presented at the4th International Conference on the Evolution of Lan-guage.C LARK,E.V.1988.On the logic of contrast.Journal of Child Language15.317–335.——1990.On the pragmatics of contrast.Journal of Child Language17.417–431.——1993.The lexicon in acquisition.Cambridge:Cambridge University Press.C ORBALLIS,M.C.2002.From Hand to Mouth:The Origins of Language.Princeton,NJ:Princeton University Press.C ROFT,W.2000.Explaining Language Change:an evolutionary approach.London:Longman.D ARWIN,C.1859/1964.On the Origin of Species.Cambridge,MA:Harvard UniversityPress,a facsimile of thefirst edition.Original published by John Murray,London.D AWKINS,R.,&J.R.K REBS.1978.Animal signals:Information or manipulation?In Behavioural Ecology:An Evolutionary Approach,ed.by J.R.Krebs&N.B.Davies,282–309.Oxford:Blackwell.DE B OER,B.2000.Self-organization in vowel systems.Journal of Phonetics28.441–465.——2001.The Origins of Vowel Systems.Oxford:Oxford University Press.D EACON,T.1997.The Symbolic Species.London:Penguin.D I P AOLO,E.A.,J.N OBLE,&S.B ULLOCK.2000.Simulation models as opaquethought experiments.In Artificial Life VII:Proceedings of the Seventh International Conference on Artificial Life,ed.by M.A.Bedau,J.S.McCaskill,N.H.Packard, &S.Rasmussen,497–506.Cambridge,MA:MIT Press.D OR,D.,&E.J ABLONKA.2000.From cultural selection to genetic selection:a frame-work for the evolution of language.Selection1.33–55.D UNBAR,R.1996.Grooming,Gossip and the Evolution of Language.London:Faberand Faber.E LMAN,J.L.1993.Learning and development in neural networks:The importance ofstarting small.Cognition48.71–99.E VANS,C.S.,L.E VANS,&P.M ARLER.1993.On the meaning of alarm calls:Func-tional reference in an avian vocal system.Animal Behaviour46.23–38.F ITCH,W.T.2000.The evolution of speech:a comparative review.Trends in CognitiveSciences4.258–267.F LOREANO,D.,J.D.N ICOUD,&F.M ONDADA(eds.)1999.Advances in Artifi-cial Life:Proceedings of the5th European Conference on Artificial Life.Berlin: Springer.F ROMKIN,V.,&R.R ODMAN.1988.An Introduction to Language.London:Holt,Rinehart and Winston,4th edition.F UTUYMA,D.J.1998.Evolutionary Biology.Sunderland,MA:Sinauer Associates,3rd edition.G ENTNER,D.1982.Why nouns are learned before verbs:Linguistic relativity versusnatural partitioning.In Language development,ed.by S.A.Kuczaj,volume2.Hillsdale,NJ:Erlbaum.G ESCHWIND,N.1964.The development of the brain and the evolution of language.InMonograph series on language and linguistics,ed.by C.I.J.M.Stuart,volume17.Washington,DC:Georgetown University Press.G IBSON,E.,&K.W EXLER.1994.Triggers.Linguistic Inquiry25.355–407.G OLDIN-M EADOW,S.,&C.M YLANDER.1990.Beyond the input given:The child’srole in the acquisition of nguage66.323–355.G OPNIK,M.1994.Impairments of tense in a familial language disorder.Journal ofNeurolinguistics8.109–133.——,&M.B.C RAGO.1991.Familial aggregation of a developmental language disor-der.Cognition39.1–50.G OULD,S.J.,&R.C.L EWONTIN.1979.The spandrels of San Marco and the Panglos-sian program:A critique of the adaptationist programme.Proceedings of the Royal Society of London205.281–288.——,&E.S.V RBA.1982.Exaptation–a missing term in the science of form.Paleo-biology8.4–15.G RAFEN,A.1990.Biological signals as handicaps.Journal of Theoretical Biology144.517–546.G REENBERG,J.H.1966.Universals of language.MIT Press,2nd edition.G REENFIELD,nguage,tools,and brain-the ontogeny and phylogenyof hierarchically organized sequential behavior.Behavioral and Brain Sciences14.531–550.H AEGEMAN,L.1994.Introduction to Government and Binding Theory.Oxford:Black-well,2nd edition.H AIMAN,J.1980.The iconicity of grammar:Isomorphism and nguage56.515–540.——(ed.)1985.Iconicity in Syntax.Amsterdam:Benjamins.H ARE,M.,&J.L.E LMAN.1995.Learning and morphological change.Cognition56.61–98.H ARNAD,S.1990.The symbol grounding problem.Physica D42.335–346.H ARRIS,J.W.K.1983.Cultural beginnings:Plio-pleistocene archaeological occur-rences from the Afar,Ethiopia.African Archaeological Review1.3–31.H ARTL,D.L.,&A.G.C LARK.1997.Principles of Population Genetics.Sunderland,MA:Sinauer Associates,3rd edition.H ASHIMOTO,T.1998.Dynamics of internal and global structure through linguisticinteractions.In Multi-Agent Systems and Agent-Based Simulation,ed.by J.S.Sich-man,R.Conte,&N.Gilbert,124–139.Berlin:Springer-Verlag.H ASPELMATH,M.1989.From purposive to infinitive—a universal path of grammati-calization.Folia Linguistica Historia10.287–310.H AUSER,M.D.1996.The Evolution of Communication.Cambridge,MA:MIT Press.——,N.C HOMSKY,&W.T.F ITCH.2002.The faculty of language:What is it,who has it,and how did it evolve.Science298.1569–1579.H AWKINS,J.A.1990.A parsing theory of word order universals.Linguistic Inquiry21.223–261.H AZELHURST,B.,&E.H UTCHINS.1998.The emergence of propositions from the co-ordination of talk and action in a shared nguage and Cognitive Processes13.373–424.H EWES,G.W.1973.Primate communication and the gestural origin of language.Current Anthropology14.5–24.H INTON,G.,&S.N OWLAN.1987.How learning can guide plex Systems1.495–502.H OCKETT,C.F.1960a.Logical considerations in the study of animal communication.In Animal sounds and communication,ed.by nyon&W.N.Tavolga,392–430.Washington,DC:American Institute of Biological Sciences.——1960b.The origin of speech.Scientific American203.88–96.H OLLOWAY,R.L.1995.Evidence for POT expansion in early Homo:A pretty theorywith ugly(or no)paleoneurologicall facts.Behavioral and Brain Sciences18.191–mentary on Wilkins and Wakefield(1995).H OLM,J.1988.Pidgins and creoles,volume1.Cambridge:Cambridge UniversityPress.H UDSON,G.2000.Essential Introductory Linguistics.Oxford:Blackwell.H URFORD,nguage and number:the emergence of a cognitive system.Oxford:Basil Blackwell.——1989.Biological evolution of the saussurean sign as a component of the language acquisition device.Lingua77.187–222.——nguage learning from fragmentary input.In Proceedings of the AISB’99 Symposium on Imitation in Animals and Artifacts,ed.by K.Dautenhahn&C.Ne-haniv,121–129.Society for the Study of Artificial Intelligence and the Simulation of Behaviour.——2000.Social transmission favours linguistic generalization.In Knight et al.(2000), 324–352.——2002a.Expression/induction models of language evolution:dimensions and issues.In Briscoe(2002),301–344.——2002b.The roles of expression and representation in language evolution.In Wray (2002),311–334.——,M.S TUDDERT-K ENNEDY,&C.K NIGHT(eds.)1998.Approaches to the Evolu-tion of Language.Cambridge:Cambridge University Press.H USBANDS,P.,&I.H ARVEY(eds.)1997.Fourth European Conference on ArtificialLife.Cambridge,MA:MIT Press.H UTCHINS,E.,&B.H AZELHURST.1995.How to invent a lexicon:the developmentof shared symbols in interaction.In Artificial societies:the computer simulation of social life,ed.by N.Gilbert&R.Conte,157–189.London:University College London Press.J ACKENDOFF,R.2002.Foundations of Language:Brain,Meaning,Grammar,Evolu-tion.Oxford:Oxford University Press.J ANIK,V.M.2000.Whistle matching in wild bottlenose dolphins Tursiops truncatus.Science289.1355–1357.——,&P.J.B.S LATER.1997.V ocal learning in mammals.Advances in the Study of Behavior26.59–99.J OHNSON-L AIRD,P.N.1990.Introduction:What is communication?In Ways of com-municating,ed.by D.H.Mellor,1–13.Cambridge:Cambridge University Press.J ONES,S.,M.M ARTIN,&D.P ILBEAM(eds.)1992.The Cambridge Encyclopedia of Human Evolution.Cambridge:Cambridge University Press.K AGAN,J.1981.The second year.Cambridge,MA:Harvard University Press.K ATZ,J.,&P.P OSTAL.1964.An integrated theory of linguistic descriptions.Cam-bridge,MA:MIT Press.K EGL,J.,&G.A.I WATA.1989.Lenguaje de Signos Nicaraguense:A pidgin sheds light on the“creole?”ASL.In Proceedings of the Fourth Meeting of the Pacific Linguistics Conference,ed.by R.Carlson,S.DeLancey,S.Gildea,D.Payne,&A.Saxena,266–294.Eugene,OR:University of Oregon.——,A.S ENGHAS,&M.C OPPOLA.1999.Creation through contact:Sign language emergence and sign language change in Nicaragua.In Language Creation and Lan-guage Change,ed.by M.DeGraff,179–237.Cambridge,MA:MIT Press.K ELEMEN,J.,&P.S OS´I K(eds.)2001.Advances in Artificial Life:Proceedings of the 6th European Conference on Artificial Life.Berlin:Springer-Verlag.K IRBY,S.1999.Function,selection and innateness:the emergence of language univer-sals.Oxford:Oxford University Press.——2000.Syntax without natural selection:how compositionality emerges from vo-cabulary in a population of learners.In Knight et al.(2000),303–323.——2001.Spontaneous evolution of linguistic structure:an iterated learning model of the emergence of regularity and irregularity.IEEE Journal of Evolutionary Compu-tation5.102–110.——2002.Learning,bottlenecks and the evolution of recursive syntax.In Briscoe (2002),173–203.——,&J.R.H URFORD.1997.Learning,culture and evolution in the origin of linguistic constraints.In Husbands&Harvey(1997),493–502.——,&J.R.H URFORD.2002.The emergence of linguistic structure:An overview of the iterated learning model.In Simulating the Evolution of Language,ed.byA.Cangelosi&D.Parisi,121–147.Springer Verlag.K NIGHT,C.1991.Blood Relations:Menstruation and the Origins of Culture.New Haven,CT:Yale University Press.——,C.P OWER,&I.W ATTS.1995.The human symbolic revolution:a Darwinian account.Cambridge Archaeological Journal5.75–114.——,M.S TUDDERT-K ENNEDY,&J.R.H URFORD(eds.)2000.The Evolutionary Emergence of Language:Social Functions and the Origins of Linguistic Form.Cambridge:Cambridge University Press.K OLEN,J.F.,&J.B.P OLLACK.1990.Back propagation is sensitive to initial plex Systems4.269–280.K RAMER,S.N.1963.The Sumerians:Their History,Culture and Character.Chicago, IL:University of Chicago Press.K REBS,J.R.,&R.D AWKINS.1984.Animal signals:mind-reading and manipulation.In Behavioural ecology:an evolutionary approach,ed.by J.R.Krebs&N.B.Davies.Oxford:Blackwell Scientific Publications.K RIFKA,positionality.In The MIT Encyclopaedia of the Cognitive Sciences,ed.by R.A.Wilson&F.Keil.Cambridge,MA:MIT Press.K VASNIˇCKA,V.,&J.P OSP´I CHAL.1999.An emergence of coordinated communication in populations of agents.Artificial Life5.319–342.L ABOV,W.1966.The social stratification of English in New York City.Washington, DC:Center for Applied Linguistics.L AI,C.S.L.,S.E.F ISHER,J.A.H URST,F.V ARGHA-K HADEM,&A.P.M ONACO.2001.A forkhead-domain gene is mutated in severe speech and language disorder.Nature413.519–523.L ALAND,K.,F.J.O DLING-S MEE,&M.W.F ELDMAN.2000.Niche construction, biological evolution,and cultural change.Behavioral and Brain Sciences23.131–175.L ANGACKER,R.W.1977.Syntactic reanalysis.In Mechanisms of Syntactic Change, ed.by C.N.Li,57–139.Austin,TX:University of Texas Press.L ANGTON,C.,C.T AYLOR,J.F ARMER,&S.R ASMUSSEN(eds.)1992.Artificial Life 2:Proceedings of the workshop on Artificial Life held February,1990in Santa Fe, New Mexico.Reading,MA:Addison-Wesley.L ASS,R.1980.On explaining language change.Cambridge:Cambridge University Press.L E P AGE,R.B.,&A.T ABOURET-K ELLER.1985.Acts of identity.Cambridge:Cam-bridge University Press.L EVIN,M.1995.The evolution of understanding:a genetic algorithm model of the evolution of communication.Biosystems36.167–178.L IEBERMAN,P.1984.The Biology and Evolution of Language.Cambridge,MA: Harvard University Press.——2000.Human Language and Our Reptilian Brain:the Subcortical Bases of Speech, Syntax and Thought.Cambridge,MA:Harvard University Press.L IGHTFOOT,D.1979.Principles of Diachronic Syntax.Cambridge:Cambridge Uni-versity Press.——1999.The Development of Language:Acquisition,Change,and Evolution.Oxford: Blackwell.L IVINGSTONE,D.,&C.F YFE.1999.Modelling the evolution of linguistic diversity.In Floreano et al.(1999),704–708.——,&——.2000.Modelling language–physiology coevolution.In Knight et al.(2000),199–215.L YN,H.,&S.S AVAGE-R UMBAUGH.2000.Observational word learning in two bonobos (Pan paniscus):ostensive and non-ostensive nguage and Communica-tion20.255–273.M AC L ENNAN,B.,&G.B URGHARDT.1993.Synthetic ethology and the evolution of cooperative communication.Adaptive Behaviour2.161–187.M ACNAMARA,J.1972.The cognitive basis of language learning in infants.Psycholog-ical Review79.1–13.——s for things:a study of human learning.Cambridge,MA:MIT Press. M A´NCZAK,ws of analogy.In Historical Morphology,ed.by J.Fisiak, 283–288.The Hague:Mouton.M ARKMAN,E.M.1989.Categorization and naming in children:problems of induction.Cambridge,MA:MIT Press.——1992.Constraints on word learning:speculations about their nature,origins,and domain specificity.In Modularity and Constraints in Language and Cognition:the Minnesota Symposium on Child Psychology,ed.by M.Gunnar&M.Maratsos, volume25,59–101.Hillsdale,NJ:Erlbaum.——,&G.F.W ACHTEL.1988.Children’s use of mutual exclusivity to constrain the meaning of words.Cognitive Psychology20.121–157.M ARLER,P.1957.Specific distinctiveness in the communication signals of birds.Be-haviour11.13–39.M ARTIN,R.1992.Primate reproduction.In Jones et al.(1992),86–90.M ARTINET,A.1972.Function,structure and sound change.In A reader in historical and comparative linguistics,ed.by A.R.Keiler,139–174.New York,NY:Holt, Reinhart and Winston.M AYNARD S MITH,J.1978.Optimization theory in evolution.Annual Review of Ecology and Systematics9.31–56.M C M AHON,A.1994.Understanding Language Change.Cambridge:Cambridge University Press.M C W HORTER,J.H.1997.Towards a New Model of Creole Genesis.New York,NY: Peter Lang.M ILLIKAN,nguage,thought,and other biological categories:new foundations for realism.Cambridge,MA:MIT Press.M ITCHELL,M.1996.An introduction to genetic algorithms.Cambridge,MA:MIT Press.M ONTANA,D.D.,&L.D.D AVIS.1989.Training feedforward networks using ge-netic algorithms.In Proceedings of the international joint conference on artificial intelligence.Morgan Kaufmann.N EWMEYER,nguage Form and Language Function.Cambridge,MA: MIT Press.N IYOGI,P.,&R.C.B ERWICK.1997.Evolutionary consequences of language learning.Linguistics and Philosophy20.697–719.N OBLE,J.1998.Evolved signals:Expensive hype vs.conspiratorial whispers.In Artificial Life6:Proceedings of the Sixth International Conference on Artificial Life,ed.by C.Adami,R.Belew,H.Kitano,&C.Taylor,358–367.Cambridge, MA:MIT Press.——1999.Cooperation,conflict and the evolution of communication.Adaptive Behavior7.349–370.N OLFI,S.,J.L.E LMAN,&D.P ARISI.1994.Learning and evolution in neural networks.Adaptive Behavior3.5–28.N OWAK,M.A.,&N.L.K OMAROVA.2001.Towards an evolutionary theory of lan-guage.Trends in Cognitive Sciences5.288–295.——,——,&P.N IYOGI.2001.Evolution of universal grammar.Science291.114–117.——,J.P LOTKIN,&D.K RAKAUER.1999.The evolutionary language game.Journal of Theoretical Biology200.147–162.——,J.B.P LOTKIN,&V.A.A.J ANSEN.2000.The evolution of syntactic communi-cation.Nature404.495–498.O DLING-S MEE,F.J.1988.Niche-constructing phenotypes.In The Role of Behavior in Evolution,ed.by H.C.Plotkin,73–132.Cambridge,MA:MIT Press.O’G RADY,W.,M.D OBROVOLSKY,&F.K pemporary Linguis-tics:An Introduction.London:Longman,3rd edition.O LIPHANT,M.1996.The dilemma of saussurean communication.BioSystems37.31–38.——,1997.Formal approaches to innate and learned communication:Laying the foun-dation for language.Doctoral Dissertation,University of California,San Diego.——1999.The learning barrier:Moving from innate to learned systems of communica-tion.Adaptive Behavior7.371–384.——2002.Rethinking the language bottleneck:Why don’t animals learn to communi-cate?In Imitation in Animals and Artifacts,ed.by K.Deutenhahn&C.L.Nehaniv, 311–325.Cambridge,MA:MIT Press.——,&J.B ATALI.1997.Learning and the emergence of coordinated communication.Center for Research on Language Newsletter11.O UDEYER,P-Y.2002.Phonemic coding might be a result of sensory-motor coupling dynamics.In Proceedings of the7th International Conference on the Simulation of Adaptive Behavior,ed.by B.Hallam,D.Floreano,J.Hallam,G.Hayes,&J-A.Meyer,406–416.Cambridge,MA:MIT Press.P EREIRA,M.E.,&J.M.M ACEDONIA.1991.Ringtailed lemur anti-predator calls denote predator class,not response urgency.Animal Behaviour41.543–544.P IATTELLI-P ALMARINI,M.1989.Evolution,selection and cognition:From“learning”to parameter setting in biology and in the study of language.Cognition31.1–44.P INKER,nguage Learnability and Language Development.Cambridge,MA: Harvard University Press.——,&P.B LOOM.1990.Natural language and natural selection.Behavioral and Brain Sciences13.707–784.P OPPER,K.R.1977.The self and its brain:an argument for interactionism.New York, NY:Springer International.P REMACK,D.1983.Representational capacity and accessibility of knowledge:The case of chimpanzees.In Language and Learning:The Debate between Jean Piaget and Noam Chomsky,ed.by M.Piattelli-Palmarini,205–221.London:Routledge and Kegan Paul.P ULLUM,G.K.,&B.C.S CHOLZ.2002.Empirical assessment of stimulus poverty arguments.The Linguistic Review19.9–50.Q UINN,M.2001.Evolving communication without dedicated communication channels.In Kelemen&Sos´ık(2001),357–366.R AEMAEKERS,J.J.,P.M.R AEMAEKERS,&E.H.H AIMOFF.1984.Loud calls of the gibbons(Hylobates lar):repertoire,organization and context.Behavior91.146–189.R AGIR,S.2002.Constraints on communities with indigenous sign languages:clues to the dynamics of language origins.In Wray(2002),272–294.R OLLS,E.T.,&S.M.S TRINGER.2000.On the design of neural networks in the brain by genetic evolution.Progress in Neurobiology61.557–579.R OSENBLATT,F.1958.The perceptron:A probabistic model for information storage and organization in the brain.Psychological Review65.368–408.R UMELHART,D.E.,G.E.H INTON,&R.J.W ILLIAMS.1986.Learning representations by back-propagating errors.Nature323.533–536.S AMPSON,cating Eve:The‘Language Instinct’debate.London:Cassell. S AVAGE-R UMBAUGH,S.,K.M C D ONALD,R. A.S EVCIK,W. D.H OPKINS,&E.R UBERT.1986.Spontaneous symbol acquisition and communicative use bypygmy chimpanzees(Pan paniscus).Journal of Experimental Psychology:General 115.211–235.——,S.G.S HANKER,&T.J.T AYLOR.1998.Apes,Language,and the Human Mind.Oxford:Oxford University Press.S CHOENEMANN,P.T.1999.Syntax as an emergent characteristic of the evolution of semantic complexity.Minds and Machines9.309–346.S EYFARTH,R.M.,&D.L.C HENEY.1986.V ocal development in vervet monkeys.Animal Behaviour34.1640–1658.S HERMAN,P.W.1977.Nepotism and the evolution of alarm calls.Science197.1246–1253.S INGLER,J.V.(ed.)1990.Pidgin and creole tense-mood-aspect systems.Amsterdam: John Benjamins.S LOBIN,D.I.1973.Cognitive prerequisites for the development of grammar.In Studies of child language development,ed.by C.A.Freguson&D.I.Slobin.New York, NY:Holt,Rinehart and Winston.——nguage change in childhood and history.In Language Learning and Thought,ed.by J.Macnamara,185–221.London:Academic Press.——1985.Crosslinguistic evidence for the language-making capacity.In The Crosslin-guistic Study of Language Acquisition,ed.by D.I.Slobin,volume2,1157–1249.Hillsdale,NJ:Lawrence Earlbaum Associates.S MITH,A.D.M.2001a.Establishing communication systems without explicit meaning transmission.In Kelemen&Sos´ık(2001),381–390.——,forthcoming.Intelligent meaning creation in a clumpy world helps communication.To appear in Artificial Life.S MITH,K.,1998.Learners are losers:natural selection and learning in the evolution of communication.MA Dissertation,Department of Linguistics,University of Edin-burgh.——2001b.The importance of rapid cultural convergence in the evolution of learned symbolic communication.In Kelemen&Sos´ık(2001),637–640.——2002.The cultural evolution of communication in a population of neural networks.Connection Science14.65–84.——,in press.Natural selection and cultural selection in the evolution of communication.To appear in Adaptive Behavior.——,H.B RIGHTON,&S.K IRBY,nguage evolution in a multi-agent model:the cultural emergence of compositional structure.Submitted to Discrete Dynamics in Nature and Society.——,S.K IRBY,&H.B RIGHTON.forthcoming.Iterated learning:a framework for the emergence of language.In Self-organization and Evolution of Social Behaviour,ed.by C.Hemelrijk.Cambridge:Cambridge University Press.S TEELS,L.1997.Constructing and sharing perceptual distinctions.In Proceedings of the European Conference on Machine Learning,ECML’97,ed.by M.van Someren &G.Widmer,4–13.Berlin:Springer-Verlag.——1998.The origins of syntax in visually grounded robotic agents.Artificial Intelli-gence103.133–156.S TRINGER,C.B.1992.Evolution of early humans.In Jones et al.(1992),241–251.T ALLAL,P.,&J.S CHWARTZ.1980.Temporal processing,speech perception and hemi-spheric asymmetry.Trends in neuroscience3.309–311.T HOMPSON,D’A.1961.On Growth and Form.Cambridge:Cambridge University Press.Abridged edition,edited by J.T.Bonner.T OMASELLO,M.1990.Cultural transmission in the tool use and communicatory sig-nalling of chimpanzees?In“Language”and Intelligence in Monkeys and Apes: Comparative Developmental Perspectives,ed.by S.Parker&K.Gibson,274–311.Cambridge:Cambridge University Press.——1993.The interpersonal origins of self-concept.In The perceived self:Eco-logical and interpersonal sources of self knowledge,ed.by U.Neisser,174–184.Cambridge:Cambridge University Press.——1996.Do apes ape?In Social Learning in Animals:The Roots of Culture,ed.byC.Heyes&B.Galef,319–436.San Diego:Academic Press.——1997.Primate Cognition.Oxford:Oxford University Press.——1999.The cultural origins of human cognition.Harvard:Harvard University Press.——,&M.B ARTON.1994.Learning words in non-ostensive contexts.Developmental Psychology30.639–650.——,J.C ALL,J.W ARREN,G.T.F ROST,M.C ARPENTER,&K.N AGELL.1997.The ontogeny of chimpanzee gestural signals:A comparison across groups and genera-tions.Evolution of Communication1.223–259.。
Research StatementReaz Ahmed(********************)What is the Problem?Internet has become the fundamental medium of our professional and social interactions.We use numerous Web-based services,such as Google,Facebook,Twitter,Dropbox,Skype,and YouTube, on a daily basis.Our online activities are greatly shaped and defined by these Web service providers. We have to abide by their End-User License Agreements(EULA)–it does not matter whether the terms and conditions are in our favor or not.Clearly,this orientation has serious impact on our online privacy and content ownership.We trust the Web service providers with our uploaded content.But in the background,our content and online activities are being analyzed and moni-tored by government agencies,advertisement industry and many covert organizations.The recent PRISM/NSA scandal can give some clue to the skeptical minds.More recently,some of the popular Web service providers have updated their EULA in such a way that will allow them to use our blog posts,photos and videos for commercial purposes.Moreover,a service provider can evict online contents at whim without users’consent.ChallengesOnline privacy and freedom can be greatly improved by providing end users with the control knob for content placement.A user can better control a shared content and in general a Web service,if (s)he can select the hosting location,e.g.,from his own devices or friends’devices.However,the contemporary Web technology does not have any effective solution for hosting Web services form end user devices,while ensuring a high level of visibility.There are a few reasons behind this.First,the end user devices connect to the Internet as second class citizens.They do not have globally unique and persistent names,which is essential for seamless device access.Second,providing persistent services over non-persistent end user devices is an inherently challenging problem.Third,traditional Web search engines are not designed to crawl non-persistent end user devices for indexing the public contents/services in those devices.Andfinally,traditional network configuration hinders device-to-device communication.It takes quite a bit of effort and tweaks to directly communicate between two adjacent devices,even in the same LAN.The situation aggravates in the Internet.Current ResearchA single software system or a central entity cannot ensure our freedom in the Internet.In addition, we cannot expect to significantly improve our online experience by changing the application layer alone–changes to the network core is also essential.I believe that the emerging technologies,like Web2,IPv6and Software Defined Networking(SDN),can be combined into a coherent network architecture that can significantly improve user privacy and control.Currently,I am leading two research projects at the University of Waterloo:WATSDN[1]and pWeb[2].These projects share the same vision yet they work in different technology domains.The W ATSDN project aims at wide-area SDN deployment.SDN has gained significant atten-tion from the industry and academia.In this paradigm,control logic is separated from the packet switching hardware and placed in a logically centralized software component called controller.Ex-isting deployments use SDN in datacenters or for traffic shaping in inter-datacenter networks.Yetwe don’t have a complete solution for deploying SDN in wide-area networks(WAN).Switch to controller communication latency can be high in a WAN.A single controller solution will not be efficient.I am currently working on a few issues in wide-area SDN including multi-controller ar-chitecture[3],controller placement algorithm[4],monitoring[5],distributed OpenFlow-based SDN testbed[6]and policy-based SDN management[7].The pWeb(for Personalized Web)project focuses on a global infrastructure for seamless inte-gration of our hand held and home networking devices with the cutting edge Web technology.pWeb infrastructure[8]consists of three major components:a)name resolution system,b)search engine and c)client software.The name resolution system[9]assigns globally unique,persistent and DNS compatible names to end user devices.It can efficiently resolve name queries even if the user devices change IP addresses frequently.It uses the Plexus[10]routing protocol that I developed during my PhD.The search engine crawls the end user devices and the Web services hosted in them.The client software provides the interfaces and tools for building innovative applications using pWeb. pWeb components have already been deployed in stable Planetlab nodes.Alpha release of the client software along with a sample video streaming application for Android OS is also available.I am now working on opening the pWeb platform for public use and implementing the solutions[11,12] for improving availability through time-based replication.Future GoalsIn the next few years,my research goal is to design and deploy an end-to-end solution for seamless integration of smart devices(like,wearable devices,cell phone,tablet,IP-camera,network-attached-storage,gaming consoles and set-top boxes)with the Web technology.I want to develop aflexible networking architecture,where the edge(e.g.,end user devices)will be able to configure the network core according to its ers will be able to remotely configure,control and access the services(e.g.,content sharing,audio-video streaming,synchronization,backup,networked games, sensor services etc.)running in their smart devices.The network core will ensure seamless and low-latency access to end devices.This vision will be possible by converging my current work in the pWeb and WATSDN projects.pWeb will provide the necessary support for securely integrating end user devices to the Web.While the solutions from WATSDN project can be extended to ensure end-to-end connectivity with QoS guarantee.I believe that the SDN paradigm can benefit end-users with advanced network services,like in-network caching,dynamic request forwarding, multi-path routing and on-demand resource reservation.In parallel,I am expanding my research to name-based routing for ICN[13,14,15],VM-migration planning[16]and real-time analysis of high-volume data streams.Impact,Collaboration and FundingWidespread acceptance of my work will provide anybody the opportunity to publish to the masses, rather than being controlled by any biased entity.I believe that this platform will create the opportunity for many new applications that will better connect the service providers with the users. The pWeb project has ongoing funding/collaboration with the Orange France,the Bell Canada and the NSERC Strategic grant.My work in WATSDN project has attracted Cisco Systems Inc.and Huawei.I am currently in the process of establishing research projects with these two industrial partners.I am confident that my work will attract funding from the big players in the networking industry and the government agencies,and will significantly improve our online experience.References[1]WATSDN project homepage:/[2]pWeb project homepage:/[3]R.Ahmed and R.Boutaba.Managing Software Defined Wide Area Networks,Submitted to IEEE Communi-cations Magazine(ComMag),2014.(second round review)[4]Md.F.Bari,A.R.Roy,S.R.Chowdhury,Q.Zhang,M.F.Zhani,R.Ahmed and R.Boutaba.DynamicController Provisioning in Software Defined Networks.In IEEE/ACM/IFIP International Conference on Network and Service Management(CNSM),Zurich,Switzerland,October14-18,2013.(Nominated for best paper award)[5]S.R.Chowdhury,M.F.Bari,R.Ahmed,and R.Boutaba.PayLess:A Low Cost Network Monitoring Frameworkfor Software Defined Networks,IEEE/IFIP Network Operations and Management Symposium(NOMS),Karakow (Poland),May5-9,2014.[6] A.R.Roy,M.F.Bari,M.F.Zhani,R.Ahmed,and R.Boutaba.Design and Management of DOT:A DistributedOpenFlow Testbed,IEEE/IFIP Network Operations and Management Symposium(NOMS),Karakow(Poland), May5-9,2014.[7]Md.F.Bari,S.R.Chowdhury,R.Ahmed,and R.Boutaba.PolicyCop:An Autonomic QoS Policy EnforcementFramework for Software Defined Networks,Submitted to Software Defined Networks for Future Networks and Services(SDN4FNS),Trento(Italy),November11-13,2013.[8]R.Ahmed,S.R.Chowdhury,A.Pokluda,M.F.Bari,R.Boutaba and B.Mathieu.pWeb:A Personal Interfaceto the World Wide Web,Submitted to IFIP Networking,2014.[9]M.F.Bari,M.R.Haque,R.Ahmed,R.Boutaba and B.Mathieu.Secured and Persistent Naming for P2P WebHosting,IEEE Journal on Selected Areas in Communications(JSAC),4th quarter,2012.[10]R.Ahmed and R.Boutaba.Plexus:A scalable peer-to-peer protocol enabling efficient subset search.IEEE/ACM Transactions on Networking(TON),IEEE press,Vol.17(1),pp.130-143,February2009.(impact factor:2.033,cited13times)[11]N.Shahriar,S.R.Chowdhury,M.Sharmin,R.Ahmed,R.Boutaba and B.Mathieu,Ensuringβ-Availabilityin P2P Social Networks,In Proc.of The Fifth International Workshop on Hot Topics in Peer-to-Peer Computing and Online Social Networking(HotPOST),held in conjunction with IEEE ICDCS2013.Philadelphia(USA),July, 2013.Best Paper Runner-Up[12]N.Shahriar,M.Sharmin,R.Ahmed,M.M.Rahman,R.Boutaba and B.Mathieu.Diurnal Availability forPeer-to-Peer Systems,in Proc.of the9th Consumer Communications and Networking Conference(CCNC),Las Vegas,NV(USA),January14-17,2012.[13],M.F.Bari,S.R.Chowdhury,R.Ahmed,R.Boutaba and B.Mathieu.A Survey of Naming and Routing forInformation Centric Networks,IEEE(ComMag),IEEE Press Vol.50(12),pp.44-53,December,2012.(impact factor:3.785,cited10times)[14]R.Ahmed,M.F.Bari,S.R.Chowdhury,M.G.Rabbani,R.Boutaba and B.Mathieu.αRoute:A NameBased Routing Scheme for Information Centric Networks.in Proc.of the32nd IEEE International Conference on Computer Communications(INFOCOM),Turin(Italy),April,2013.[15]R.Ahmed,M.F.Bari,S.R.Chowdhury,M.G.Rabbani,R.Boutaba and B.Mathieu.αRoute:Routing onNames,Submitted to IEEE/ACM Transactions on Networking(TON),2014.[16]M.R.Bari,M.F.Zhani,Q.Zhang,R.Ahmed and R.Boutaba.CQNCR:Optimal VM Migration Planning inCloud Data Centers,Submitted to IFIP Networking,2014.。
埃菲尔铁搭英文简介埃菲尔铁塔简介The Eiffel Tower stands on the south bank of the Seine River in Paris, France. It is one of the world famous buildings, one of the French cultural symbols, one of the landmarks of Paris, the tallest building in Paris. By the French love called iron lady.The Eiffel Tower was built in 1889, named after its famous architect, structural engineer Gustav Eiffel, all built by Schneider Iron (now Schneider Electric).The Eiffel Tower is 300 meters high and the antenna is 24 meters high and 324 meters high. The tower is made up of a lot of scattered steel components - it looks like a pile of models. There are 18038 steel components, weighing 10,000 tons, the construction of a total of 7 million drilling, the use of rivets 2.59 million. In addition to the four feet are reinforced concrete, the body is made of steel, the total weight of 7,000 tons tower. The tower is divided into three floors, respectively, from the ground 57.6 meters, 115.7 meters and 276.1 meters, one on the second floor with a restaurant, the third floor has a viewing platform, from the tower to the top of a total of 1711 ladder.The Eiffel Tower has about 698 million visitors in 2022, bringing the total number of visitors to more than 250 million people in 2022, bringing 1.5 billion in tourism revenue each year.埃菲尔铁塔建设背景1884 France has just emerged from the shame of the Franco-Prussian War, in order to show the national strength, in 1884, the French Parliament to make a decision: May 5, 1889 to November 6, Paris, France will once again host the E某po, the theme is tocelebrate the 100th anniversary of the victory of the French Revolution The May 1886, the French government for the world for the World E某po architectural tender; in the Paris God of War Plaza design a tower. Conditions are two: towers can attract visitors to buy tickets to visit; after the E某po can be easily removed.埃菲尔铁塔建筑历程Build an opportunity1889 coincided with the 100th anniversary of the outbreak of the French Revolution, the French people want to host the World E某po will leave the world a deep impression, especially in London in 1851 held the World E某po has achieved unprecedented success, Paris is not far behind. The Frenchman had always wanted to build a fair building that e某ceeded the British Crystal Palace and began to design a contest in 1886, aiming to create a work that symbolizes the technological achievements of the 19th century.Conceptual formationIn 1885, the French official began planning a great e某position in 1889 to celebrate the 100th anniversary of the French Revolution. They want to build a monument that can represent the French honor. At that time, the stone Washington monument had just been completed. This up to 557 feet of the monument, became the worlds tallest building. While the French hope to go beyond this record, in the center of Paris to build a 1000-foot tower. What you need to do is find the tower design and architect.Open selectionOn May 2, 1886, the French government announced the holding of a design contest, where French engineers and architects were invited to study the possibility of putting a base 125 square meters at a heightof 300 meters on the Champ de Mars (Ares Square) The No matter what kind of conception of the contestants, they must meet the following two conditions:The building can be used to raise funds. That is to say must be able to attract enough tourists to buy tickets to visit, the proceeds can maintain the building itself.This is a temporary building, after the e某position can beeasily removed.stand outPrior to the deadline of May 18, 1887, more than 100 drafts were contested. Most of which are very traditional, while others are very weird. It was proposed to build a huge guillotine; it was proposed to put up a 1000-foot sprinkler, in the dry season irrigation of the whole of Paris; also suggested that the top of the tower, the installation of a huge light, you can illuminate the whole of Paris 8 times, you can easily read the newspaper.The truth is that no proposal has been passed. Just as the announcement of the contest, a 53-year-old architect Ale某andre-Gustave Eiffel (Eiffel), has begun to consider the use of metal for France to build a great building.53-year-old Ale某ander Gustave Eiffel (Ale某anderGustaveEiffel) was a famous European architect, the second half of the 19th century, most of the famous architects can find him in the list of designers. Eiffel suggested that the French authorities to build a height twice as much as the worlds tallest buildings - Khufu pyramids, Cologne Cathedral and Ulm Cathedral tower, and in June 1886 to the 1889 General Committee submitted drawings and The results were calculated on January 8, 1887.Joint venture constructionIn January 1887, the Eiffel and the French government, the Paris municipal government signed a contract. Eiffels engineering company will pay $ 1.3 million of the $ 1.6 million total in the construction of the total budget. In e某change, Eiffel will receive revenue from the tower during the fair and for the ne某t 20 years. (At this time the government has agreed to keep the tower after the fair.) Then,all ownership will be transferred to the Paris municipal government, if you wish, the government can also remove the tower.Unlike other public monuments, the Eiffel Tower was designed to make money from the start. If you want to take a lift or stairs to reach a platform, you need to pay 2 francs; if you want to reach the top level, you need to pay 5 francs (Sunday will be cheaper). This is just a start, a platform also plans to open restaurants, cafes, shops; two-story platform plans to open post offices, telephone offices, bakeries and galleries. The tower is designed to accommodate 10416 paying visitors at the same time.Cause controversyJanuary 18, 1887, the Eiffel Tower project officially broke ground, February 14, Paris, literature and art architectural elite involved in the protest, protest against the content of the construction of the Paris Tower, including the famous French writer Maupassant, 300 celebrities signed a protest against the construction of the Paris Tower protest, celebrity protests led to the petition of the masses: the Paris Tower as a huge black factory chimney, stands over the Paris. This monster will cover the famous buildings of Notre Dame, the Louvre, the Arc de Triomphe. This ugly pillar, which is riveted by steel, will cast a disgusting shadow on the ancient citywith hundreds of years old. At the same time there are other critics.A professor of mathematics in France predicts that the building will collapse after 748 feet (229 meters), and the e某perts say the towers light will kill all the fish in the Seine. Paris version of the New York Herald claimed that the tower is changing the climate, the daily Le Matin is the first report of the tower is sinking. But the construction of the tower for a moment did not because of these opposition and stop, awe-inspiring began to replace the fear.Architect Eiffel in the Times a series of answering questions, the successful lifting of the masses of doubts, the voice of opposition was significantly lower, the Eiffel Tower to continue construction, without being affected by the controversy and intimidation.Construction selectionAt the beginning of the project, there are actually four construction sites, each of which is the foot of the tower or a tower pier. These piers will not converge until after 180 feet, and when these piers meet must be able to reach the perfect level, thisperfect level will serve as the remaining 800 feet of construction base. If the tower pierces a little difference, it will tilt the entire tower.Eiffel knew that he had no way of ensuring that the piers were able to hold the perfect level after the construction was completed, so he had a temporary water pump at the bottom of each tower. So that with the advance of the project, he can be slightly raised or lowered by the tower to fine-tune. When the overall adjustment is completed, the workers will be embedded in the tower inside the iron wedge, so that the tower pier fi某ed forever.Later, it was proved that Eiffel had nothing to worry about. Even with a height of 180 feet, the ma某imum error of the four piers is not 2.5 inches. The four towers are simply adjusted and fi某ed.Until today, the tower has maintained a perfect level.Technological innovationDuring the construction of the Eiffel Tower, the architect Eiffel designed a number of creative techniques:In addition to the other large-scale construction projects,Eiffel pre-made all the parts in their own workshop. In other words, when these parts are sent to the site when the installation can be completed very quickly.The rivet hole is prefi某ed with a tolerance of one-tenth of a millimeter, allowing the 20 riveted groups to be fitted with 1650 rivets per day.The construction of the tower of each component are not more than 3 tons, which makes small cranes can be widely used.Perfect finishBase construction took a year and a half, the tower installed spent 8 months more time, in March 31, 1889 all ended. A total of 50 architects and designers painted 5300 blueprints. Eiffelscalculations are e某tremely accurate, and the factory in Levallois-Perret produces 12,000 different components, and none of the installation needs to be modified and there is almost no accident in the two years of construction.。
Diss.ETH No.16653User-Centric Dependability Concepts for Ubiquitous ComputingA dissertation submitted to theSWISS FEDERAL INSTITUTE OF TECHNOLOGYZURICH(ETH ZURICH)for the degree ofDoctor of Technical Sciencespresented byJürgen BohnDiplom-Informatiker,University of Karlsruhe(TH),Germanyborn October16,1973citizen of Germanyaccepted on the recommendation ofProf.Dr.Friedemann Mattern,examinerDr.Albrecht Schmidt,co-examiner2006Bibliography[AAA97]Ward Andy,Jones Alan,and Hopper Andy.A New Location Technique for the Active Office.IEEE Personal Communications,4(5):42–47,1997. [AAC+00]Harold Abelson,Don Allen,Daniel Coore,Chris Hanson,George Homsy,Thomas F.Knight,Jr.,Radhika Nagpal,Erik Rauch,Gerald JaySussman,and Ron Weiss.Amorphous munications ofthe ACM,43(5):74–82,March2000.[ABL04]Giuseppe Anastasi,Alberto Bartoli,and Flaminia L.Luccio.Fault-tolerant support for reliable multicast in mobile wireless systems:designand evaluation.Wireless Networks,10(3):259–269,2004.[ABO02]Gregory D.Abowd,Agathe Battestini,and Thomas O’Connell.The Lo-cation Service:A framework for handling multiple location sensing tech-nologies,2002.Available online at /fce/ahri/publications/location_service.pdf.[ACDP05]Matthieu Anne,James L.Crowley,Vincent Devin,and Gilles Privat.Localisation intra-batiment multi-technologies:RFID,wifiet vision.InUbiMob’05:Proceedings of the2nd French-speaking conference on Mo-bility and ubiquity computing,pages29–35,New York,NY,USA,2005.ACM Press.[ACH+01]Mike Addlesee,Rupert Curwen,Steve Hodges,Joe Newman,Pete Steggles,Andy Ward,and Andy Hopper.Implementing a Sentient Com-puting puter,34(8):50–56,2001.[ACT00]Marcos Kawazoe Aguilera,Wei Chen,and Sam Toueg.Failure Detection and Consensus in the Crash Recovery Model.Distributed Computing,13(2):99–125,April2000.[Ada00]Natascha Adamowsky.Kulturelle denburger Diskurs“Ubiq-uitous Computing”,February2000.Available online at http://www.inf.ethz.ch/vs/events/slides/adamowldbg.pdf.[ADS02]James Aspnes,ZoëDiamadi,and Gauri Shah.Fault-tolerant routing in peer-to-peer systems.In Twenty-First ACM Symposium on Principles ofDistributed Computing,pages223–232,July2002.[AJLS97]M.D.Addlesee,A.Jones,F.Livesey,and F.Samaria.The ORL Active Floor.IEEE Personal Communications,4(5):35–41,October1997. [AKS04]Ankur Agiwal,Parakram Khandpur,and Huzur Saran.LOCATOR:loca-tion estimation system For wireless LANs.In WMASH’04:Proceedingsof the2nd ACM international workshop on Wireless mobile applications311Bibliographyand services on WLAN hotspots,pages102–109,New York,NY,USA,2004.ACM Press.[AL86] A.Avizienis and prie.Dependable computing:From concepts to design diversity.Proceedings of the IEEE,74(5):629–638,May1986. [AM00]Gregory D.Abowd and Elizabeth D.Mynatt.Charting Past,Present and Future Research in Ubiquitous Computing.ACM Transactions onComputer-Human Interaction,Special issue on HCI in the new Mille-nium,7(1):29–58,March2000.[Ana05]Analysys Research.The Western European Mobile Market:trends and forecasts2005-2010.6th Edition,April2005.Available on-line at /default.asp?Mode=article\&iLeftArticle=1876.[Ano01]Anonymous.Workshop on Embedded Computing.Report,Sponsored by NSF and ACM SIGDA,November2001.[Ara95]Agustin A.Araya.Questioning Ubiquitous Computing.In Proceedings of the1995ACM23rd Annual Conference on Computer Science.ACMPress,1995.Available online at /10.1145/259526.259560.[ART05]O.Amft,J.Randall,and G.Tröster.Towards LuxTrace:Using solar cells to support human position tracking.In Proceedings of2nd Inter-national Forum on Applied Wearable Computing,Zürich,Switzerland,March2005.[AS85]Bowen Alpern and Fred B.Schneider.Defining rmation Processing Letters,21:181–185,1985.[ASRPZ03]Stefan Arbanowski,Stephan Steglich,Ilja Radusch,and Radu Popescu-Zeletin.Super Distributed Objects:An Execution Environmentfor I-Centric Services.In Proceedings9th IEEE International Workshopon Object-Oriented Real-Time Dependable Systems(WORDS’03),pages201–208.IEEE Computer Society,October2003.[ASSC02a]I.F.Akyildiz,W.Su,Y.Sankarasubramaniam,and E.Cayirci.A survey on sensor networks.IEEE Communications Magazine,40(8):102–114,August2002.[ASSC02b]I.F.Akyildiz,W.Su,Y.Sankarasubramaniam,and E.Cayirci.Wire-less Sensor Networks:A Survey.IEEE Computer Networks,38(4):393–422,March2002.[ATS04]Stephanos Androutsellis-Theotokis and Diomidis Spinellis.A survey of peer-to-peer content distribution technologies.ACM Computing Surveys,36(4):335–371,2004.[Bak04]Bonnie C.Baker.Wireless Communication Using the IrDA Standard Pro-tocol.Analog Design Note ADN006,Microchip Technology Inc,January2004.312Bibliography [Bal96]T.R.Balch.Grid-based navigation for mobile robots.The Robotics Practitioner,2(1),1996.[Bar02]David Barkai.Peer-to-Peer Computing.Technologies for Sharing and Collaborating on the Net.Rich Bowles,2002.[Bär04]Marco Bär.Collaborative Map-Making in an Area of Randomly Dis-tributed RFID-Tags using a LEGO Mindstorms Robot Vehicle.Semesterthesis,Institute for Pervasive Computing,Department of Computer Sci-ence,ETH Zurich,Switzerland,July2004.[BBH+04]Gaetano Borriello,Waylon Brunette,Matthew Hall,Carl Hartung, and Cameron Tangney.Reminding About Tagged Objects Using Pas-sive RFIDs.In Proceedings of6th International Conference on Ubiq-uitous Computing(UbiComp2004),Nottingham,UK,September7-10,2004,number3205in Lecture Notes in Computer Science,pages36–53.Springer,2004.[BC06]Bluetooth –The Official Bluetooth Wireless Info ,February2006.[BCL+03a]Jürgen Bohn,Vlad Coroama,Marc Langheinrich,Friedemann Mat-tern,and Michael Rohs.Allgegenwart und Verschwinden des Computers–Leben in einer Welt smarter Alltagsdinge.In Ralf Grötker,editor,Privat!Kontrollierte Freiheit in einer vernetzten Welt,pages195–245.Heise-Verlag,March2003.[BCL+03b]Jürgen Bohn,Vlad Coroama,Marc Langheinrich,Friedemann Mat-tern,and Michael Rohs.Disappearing Computers Everywhere–Livingin a World of Smart Everyday Objects.In New Media,Technology andEveryday Life in Europe Conference(EMTEL2003),London,UK,April2003.Available online at /.[BCL+04a]Jürgen Bohn,Vlad Coroama,Marc Langheinrich,Friedemann Mat-tern,and Michael Rohs.Living in a World of Smart Everyday Objects–Social,Economic,and Ethical Implications.Journal of Human andEcological Risk Assessment,10(5),October2004.[BCL+04b]Jürgen Bohn,Vlad Coroama,Marc Langheinrich,Friedemann Mat-tern,and Michael Rohs.Social,Economic,and Ethical Implicationsof Ambient Intelligence and Ubiquitous Computing.In W.Weber,J.Rabaey,and E.Aarts,editors,Ambient Intelligence.Springer,2004. [BDM93]Michael Barborak,Anton Dahbura,and Miroslaw Malek.The con-sensus problem in fault-tolerant computing.ACM Computing Surveys,25(2):171–220,June1993.[BEGH01]Nirupama Bulusu,Deborah Estrin,Lewis Girod,and John Heidemann.Scalable coordination for wireless sensor networks:Self-configuring local-ization systems.In Proceedings6th International Symposium on Commu-nication Theory and Applications(ISCTA’01).University of California,Los Angeles,July15-20th2001.313Bibliography[BFA05]Azzedine Boukerche,Xin Fei,and Regina B.Araujo.An energy aware coverage-preserving scheme for wireless sensor networks.In PE-WASUN’05:Proceedings of the2nd ACM international workshop on Performanceevaluation of wireless ad hoc,sensor,and ubiquitous networks,pages205–213,New York,NY,USA,2005.ACM Press.[BFH97]W.Burgard,D.Fox,and D.Hennig.Fast Grid-based Position Tracking for Mobile Robots.In Proceedings of the21th German Conference onArtificial Intelligence,volume1303of Lecture Notes in Computer Science.Springer,1997.[BG95]Kenneth P.Birman and Bradford B.Glade.Reliability through consis-tency.IEEE Software,pages29–41,May1995.[BGS01]M.Beigl,H.-W.Gellersen,and A.Schmidt.Mediacups:Experience with Design and Use of Computer-Augmented Everyday puterNetworks,Special Issue on Pervasive Computing,Elsevier,35(4):401–409,March2001.[BGV02]Jürgen Bohn,Felix Gärtner,and Harald Vogt.Dependability Issues of Pervasive Computing in a Healthcare Environment.In Dieter Hutter,Günter Müller,Werner Stephan,and Markus Ullmann,editors,Proceed-ings of the1st International Conference on Security in Pervasive Com-puting,number2082in Lecture Notes in Computer Science,Boppard,Germany,March2002.Springer.[BH00]Levente Buttyan and Jean-Pierre Hubaux.Enforcing Service Availability in Mobile Ad-Hoc WANs.In IEEE/ACM Workshop on Mobile Ad HocNetworking and Computing(MobiHOC),2000.[BH01]Levente Buttyan and Jean-Pierre Hubaux.Nuglets:a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks.Technical report,EPFL Lausanne,Switzerland,2001.[BH03]Levente Buttyán and Jean-Pierre Hubaux.Stimulating cooperation in self-organizing mobile ad hoc networks.Mobile Networks and Applica-tions,8(5):579–592,2003.[Bha97]Vaduvur Bharghavan.Challenges and solutions to adaptive computing and seamless mobility over heterogeneous wireless networks.WirelessPersonal Communications,4(2):217–256,1997.[BHE00]Nirupama Bulusu,John Heidemann,and Deborah Estrin.GPS-less low cost outdoor localization for very small devices.IEEE Personal Commu-nications Magazine,7(5):28–34,October2000.[Bir93]Kenneth P.Birman.The process group approach to reliable distributed munications of the ACM,36(12):37–53,1993.[Bit05].Domain names disputes,2005.Available online at http: ///internet/domain.html#disputes.314Bibliography [BJ87]K.P.Birman and T.A.Joseph.Reliable Communication in the Pres-ence of Failures.ACM Transactions on Computer Systems,5(1):47–76,February1987.[BJM+91]M.Banâtre,Ph.Joubert,Ch.Morin,G.Muller, B.Rochat,and P.Sanchez.Stable transactional memories and fault tolerant architec-tures.SIGOPS Operating Systems Review,25(1):68–72,1991.[BK02]H.-B.Bludau and A.Koop,editors.Proceedings2nd Conf.on Mo-bile Computing in Medicine,Workshop of the Project Group MoCoMed,rmatik&GI-Fachausschuss4.7,Heidelberg,vol-ume15of LNI.GI,2002.[BKM+04]Jan Beutel,Oliver Kasten,Friedemann Mattern,Kay Römer,Frank Siegemund,and Lothar Thiele.Prototyping Wireless Sensor NetworkApplications with BTnodes.In1st European Workshop on Wireless Sen-sor Networks(EWSN),pages323–338,Berlin,Germany,January2004.Springer.[BKW02]J.Baus,A.Krüger,and W.Wahlster.A Resource-Adaptive Mobile Nav-igation System.In Proceedings of International Conference on IntelligentUser Interfaces IUI2002.ACM Press,2002.[BM04]Jürgen Bohn and Friedemann Mattern.Super-Distributed RFID Tag Infrastructures.In Panos Markopoulos,Berry Eggen,Emile Aarts,andJames Crowley,editors,Proceedings of the2nd European Symposium onAmbient Intelligence(EUSAI2004),Eindhoven,The Netherlands,num-ber3295in Lecture Notes in Computer Science,pages1–12.Springer,November2004.[BMF+00]Wolfram Burgard,Mark Moors,Dieter Fox,Reid Simmons,and Sebas-tian Thrun.Collaborative Multi-Robot Exploration.In Proceedings ofthe IEEE International Conference on Robotics and Automation(ICRA),2000.[Boh03]Jürgen Bohn.Exploiting Heterogeneity in Ubiquitous Computing En-vironments for Robust Positioning and Localization.Workshop onLocation-Aware Computing at Ubicomp2003,October2003.[Boh04a]Jürgen Bohn.Instant Personalization and Temporary Ownership of Handheld Devices.In Proceedings of the6th IEEE Workshop on Mo-bile Computing Systems&Applications(WMCSA2004),pages134–143,Windermere,Cumbria,UK,December2004.IEEE Computer SocietyPress,Los Alamitos,California.[Boh04b]Jürgen Bohn.The Smart Jigsaw Puzzle Assistant:Using RFID Tech-nology for Building Augmented Real-World Games.Workshop on Gam-ing Applications in Pervasive Computing Environments at PERVASIVE2004,Vienna,Austria,April2004.Available online at http://www.ipsi.fraunhofer.de/ambiente/pervasivegaming/.315Bibliography[Boh06]Jürgen Bohn.Prototypical Implementation of Location-Aware Services based on Super-Distributed RFID Tags.In Proceedings19th InternationalConference on Architecture of Computing Systems(ARCS’06),number3894in Lecture Notes in Computer Science,pages69–83,Frankfurt amMain,Germany,March2006.Springer.[Boh07a]Jürgen Bohn.iPOS:A Fault-Tolerant and Adaptive Multi-Sensor Posi-tioning Architecture with QoS Guarantees.Sensor Review Journal,2007.Accepted for Publication.[Boh07b]Jürgen Bohn.Prototypical Implementation of Location-Aware Services based on a Middleware Architecture for Super-Distributed RFID Tag In-frastructures.Personal and Ubiquitous Computing,2007.In Press.Onlineversion available at /10.1007/s00779-006-0107-2. [BP00]P.Bahl and V.N.Padmanabhan.RADAR:An in-building RF-based user location and tracking system.In INFOCOM2000,pages775–784,2000.[BR01]Jürgen Bohn and Michael Rohs.Klicken in der realen Welt.In Konferenz Mensch und Computer2001.Workshop Mensch-Computer-Interaktionin allgegenwärtigen Informationssystemen.Michael Beigl,Hans-WernerGellersen,and Norbert Streitz,Bad Honnef,Bonn,March2001.Avail-able online at /mc2001/.[Bre03]Elizabeth A.Bretz.Precision navigation in European skies.IEEE Spec-trum,40(9):16,September2003.[BS06]Bluetooth –The Official Bluetooth Membership Site.,February2006.[Bur05]Martin Burri.LuxTraceRT:A Self-Calibrating Real-Time Positioning System using Solar Cells as Main Sensory Input.Semester thesis,Dis-tributed Systems Group,ETH Zürich,Switzerland,October2005. [BV03]Jürgen Bohn and Harald Vogt.Robust Probabilistic Positioning based on High-Level Sensor-Fusion and Map Knowledge.Technical Report421,Institute for Pervasive Computing,Department of Computer Science,ETH Zurich,Switzerland,April2003.[BWLW04]Bharat Bhargava,Xiaoxin Wu,Yi Lu,and Weichao Wang.Integrat-ing heterogeneous wireless technologies:a cellular aided mobile ad hocnetwork(cama).Mobile Networks and Applications,9(4):393–408,2004. [Cas02]Henri Casanova.Distributed computing research issues in grid comput-ing.SIGACT News,33(3):50–70,2002.[CBM04]Vlad Coroama,Jürgen Bohn,and Friedemann Mattern.Living in a Smart Environment–Scenarios and Implications of the Coming Ubiqui-tous Information Societyi.In Proceedings of the International Conferenceon Systems,Man and Cybernetics2004(IEEE SMC2004),volume6,pages5633–5638,The Hague,The Netherlands,October2004.316Bibliography [CCR+04]Y.Chen,X.Y.Chen,F.Y.Rao,X.L.Yu,Y.Li,and D.Liu.LORE: An infrastructure to support location-aware services.IBM Journal ofResearch and Development,48(5/6):601–616,2004.[CCS99]Dryer D.C.,Eisbach C.,and Ark W.S.At what cost pervasive?a social computing view of mobile computing systems.IBM Systems Journal,38(4):652–676,1999.[CDG+02]Miguel Castro,Peter Druschel,Ayalvadi Ganesh,Antony Rowstron, and Dan S.Wallach.Secure routing for structured peer-to-peer overlaynetworks.SIGOPS Operating Systems Review,36(SI):299–314,2002. [CDK00]G.Coulouris,J.Dollimore,and T.Kindberg.Distributed Systems-Con-cepts and Design.Addison-Wesley,3rd edition,2000.[CGN+05]Jason Campbell,Phillip B.Gibbons,Suman Nath,Padmanabhan Pillai, Srinivasan Seshan,and Rahul Sukthankar.IrisNet:an internet-scalearchitecture for multimedia sensors.In MULTIMEDIA’05:Proceedingsof the13th annual ACM international conference on Multimedia,pages81–88,New York,NY,USA,2005.ACM Press.[CH04]Vlad Coroama and Norbert Höckl.Pervasive Insurance Markets and their Consequences.In1st International Workshop on Sustainable PervasiveComputing at PERVASIVE2004,Vienna,Austria,April2004.[CJ02]P.Chandrasekaran and A.Joshi.MobileIQ:a framework for mobile in-formation access.In Proceedings3rd International Conference on MobileData Management,pages43–50,January2002.[CK00]G.Chen and D.Kotz.A Survey of Context-Aware Mobile Computing Re-search.Technical Report TR2000-381,Department of Computer Science,Dartmouth College,November2000.[CK03] C.-Y.Chong and S.P.Kumar.Sensor networks:evolution,opportunities, and challenges.Proceedings of the IEEE,91(8):1247–1256,August2003. [CKR04]Vlad Coroama,Tarik Kapic,and Felix Röthenbacher.Improving the reality perception of visually impaired through pervasive computing.InAlois Ferscha,Horst Hoertner,and Gabriele Kotsis,editors,Advancesin Pervasive Computing,pages369–376,Vienna,Austria,April2004.Austrian Computer Society(OCG).[CLMZ03]G.Cabri,L.Leonardi,M.Mamei,and F.Zambonelli.Location-dependent services for mobile users.IEEE Transactions on Systems,Man and Cybernetics,33(6):667–681,November2003.[CN02]M.D.Corner and B.D.Noble.Zero-interaction authentication.In Pro-ceedings8th Annual International Conference on Mobile computing andnetworking,pages1–11.ACM Press,2002.[Cor06]Vlad Coroama.The Smart Tachograph–Individual Accounting of Traffic Costs and its Implications.In Proceedings of PERVASIVE2006,pages135–152,Dublin,Ireland,May2006.317Bibliography[CR03]Vlad Coroama and Felix Röthenbacher.The Chatty Environment–Providing Everyday Independence to the Visually Impaired.Workshopon Ubiquitous Computing for Pervasive Healthcare Applications at Ubi-Comp2003,October2003.[CR04]Vlad Coroama and Felix Röthenbacher.The Chatty Environment.In Demo at the Second Conference on Pervasive Computing and Communi-cations(PerCom2004),Orlando,Florida,March2004.[CRC05]Shiva Chetan,Anand Ranganathan,and Roy Campbell.Towards Fault Tolerant Pervasive Computing.IEEE Technology and Society,24(1):38–44,2005.[CSG99] D.Chen,A.Schmidt,and H.-W.Gellesen.An Architecture for Multi-Sensor Fusion in Mobile Environments.In Proceedings of the Interna-tional Conference on Information Fusion,Sunnyvale,CA,USA,vol-ume II,pages861–868,July1999.[DA00]Anind K.Dey and Gregory D.Abowd.Towards a Better Understanding of Context and Context-Awareness.In Workshop on The What,Who,Where,When,and How of Context-Awareness,Part of the Conferenceon Human Factors in Computing Systems(CHI2000),The Hague,TheNetherlands,April2000.[DAS01] A.Dey,G.D.Abowd,and D.Salber.A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applica-tions.Human-Computer Interaction,16(2–4):97–166,2001.[DCME01]N.Davies,K.Cheverst,K.Mitchell,and ing and Deter-mining Location in a Context-Sensitive Tour Guide.IEEE Computer,34(8):35–41,August2001.[Der02]Michael L.Dertouzos.Human-centered systems.In The invisible future: the seamless integration of technology into everyday life,pages181–191.McGraw-Hill,Inc.,New York,NY,USA,2002.[Dev04]Device Independence Working Group(DIWG).Composite Capabil-ity/Preference Profiles(CC/PP):Structure and Vocabularies1.0.W3CRecommendation,January2004.[Dey01]Anind K.Dey.Understanding and Using Context.Personal and Ubiqui-tous Computing,5(1):4–7,2001.[DH98] F.Dawson and T.Howes.vCard MIME Directory Profile.Internet RFC2426,September1998.[dI01]Diego López de Ipiña.Video-Based Sensing for Wide Deployment of Sentient Spaces.In Proceedings of the2nd PACT2001Workshop onUbiquitous Computing and Communications,September2001.[Dic56]Philip K.Dick.Minority Report.Fantastic Universe,January1956. 318Bibliography [dLKWZ03]E.de Lara,R.Kumar,D.S.Wallach,and W.Zwaenepoel.Collab-oration and multimedia authoring on mobile devices.In Proceedings ofMobiSys2003,San Francisco,USA,May2003.[DM04] F.DePaoli and L.Mariani.Dependability in peer-to-peer systems.IEEE Internet Computing,8(4):54–61,2004.[DNH04]Domain Name Handbook.Domain Dispute Index,2004.Available online at /dd.html.[Dom04]Svetlana Domnitcheva.Smart Vacuum Cleaner–An Autonomous Location-Aware Cleaning Device.In Adjunct Proceedings of UbiComp2004,September2004.[DS98] F.Dawson and D.Stenerson.Internet Calendaring and Scheduling Core Object Specification(iCalendar).Internet RFC2445,November1998. [EC03]European Commission.The Galilei Project:GALILEO Design Consolidation.http://europa.eu.int/comm/dgs/energy_transport/galileo/doc/,August2003.[EC05]European Commission.Galileo project webpage.http://www.europa.eu.int/comm/dgs/energy_transport/galileo/index_en.htm,July2005.[ECPS02]Deborah Estrin,David Culler,Kris Pister,and Gaurav Sukhatme.Con-necting the Physical World with Pervasive Networks.IEEE PervasiveComputing–Mobile and Ubiquitous Systems,1(1):59–69,January2002. [EGHK99]Deborah Estrin,Ramesh Govindan,John Heidemann,and Satish Ku-mar.Next century challenges:scalable coordination in sensor networks.In MobiCom’99:Proceedings of the5th annual ACM/IEEE interna-tional conference on Mobile computing and networking,pages263–270.ACM Press,1999.[EKM04]Virantha Ekanayake,Kelly Clinton IV,and Rajit Manohar.An ultra low-power processor for sensor networks.In ASPLOS-XI:Proceedings of the11th international conference on Architectural support for programminglanguages and operating systems,pages27–36,New York,NY,USA,2004.ACM Press.[Ele06]Electronic Frontier Foundation.Blue Ribbon Campaign.Defending Free-dom in the Digital /br/,February2006.[Elf89]Alberto ing occupancy grids for mobile robot perception and navigation.IEEE Computer,22(6):46–57,June1989.[Eur06]Eurocontrol.World Geodetic System1984.Homepage at , 2006.[Fal02]M.A.C.Fallon.Handheld Devices:Toward a More Mobile Campus.Syllabus Magazine,November2002.319[FBDT99]D.Fox,W.Burgard,F.Dellaert,and S.Thrun.Monte Carlo Local-ization:Efficient Position Estimation for Mobile Robots.In Proceedingsof the National Conferenceon Artificial Intelligence.AAAI Press/TheMIT Press,1999.[FBKT00]D.Fox,W.Burgard,H.Kruppa,and S.Thrun.A Probabilistic Ap-proach to Collaborative Multi-Robot Localization.Autonomous Robots,8(3):325–344,2000.[FBT99] D.Fox,W.Burgard,and S.Thrun.Markov Localization for Mobile Robots in Dynamic Environments.Journal of Artificial Intelligence Re-search,11:391–427,November1999.[FHL+03]D.Fox,J.Hightower,L.Liao,D.Schulz,and G.Borriello.Bayesian filtering for location estimation.IEEE Pervasive Computing,2(3):24–33,July-September2003.[FIB95]George W.Fitzmaurice,Hiroshi Ishii,and William A.S.Buxton.Bricks: laying the foundations for graspable user interfaces.In CHI’95:Proceed-ings of the SIGCHI conference on Human factors in computing systems,pages442–449.ACM Press/Addison-Wesley Publishing Co.,1995. [Fin03]K.Finkenzeller.RFID Handbook:Fundamentals and Applications in Contactless Smart Cards and Identification.John Wiley&Sons,2ndedition edition,April2003.[Fit93]George W.Fitzmaurice.Situated Information Spaces and Spatially Aware Palmtop munications of the ACM,36(7):38–49,July1993.[FJB+04]Richard Fairhurst,Ben Jameson,Andrew Bolt,Robert Brown,and Matthew Slattery.Geowiki-a map which you can annotate.Home-page at ,2004.[FKSK02]M.Funabashi,K.Kawano,S.Sameshima,and H.Kato.Middle-ware technology for ubiquitous computing:Aya(context-aware and yetanother service)that permits autonomous collaboration on super dis-tributed objects.In Proceedings IEEE International Conference on Sys-tems,Man and Cybernetics,volume2,pages623–628,October2002. [FKT01]Ian Foster,C.Kesselman,and S.Tuecke.The Anatomy of the Grid: Enabling Scalable Virtual Organizations.Intl.Journal SupercomputerApplications(IJSA),15(3),2001.[FL04]Christian Flörkemeier and Matthias Lampe.Issues with RFID usage in ubiquitous computing applications.In Proceedings PERVASIVE2004,number3001in Lecture Notes in Computer Science,pages188–193,Linz/Vienna,Austria,April2004.Springer.[FL05a]Marco Feriencik and Matthias Leumann.iPOS:Ein adaptives System zur Selbst-Positionierung von mobilen ressourcenbeschränkten Geräten.Semester thesis,Institute for Pervasive Computing,Department of Com-puter Science,ETH Zurich,Switzerland,June2005.320[FL05b]Christian Flörkemeier and Matthias Lampe.RFID middleware design -addressing application requirements and RFID.In Proceedings sOc-EUSAI2005(Smart Objects Conference),Grenoble,France,October2005.[FLP85]Michael J.Fischer,Nancy A.Lynch,and Michael S.Paterson.Impos-sibility of distributed consensus with one faulty process.Journal of theACM,32(2):374–382,April1985.[FLSC04]Michal Feldman,Kevin Lai,Ion Stoica,and John Chuang.Robust in-centive techniques for peer-to-peer networks.In EC’04:Proceedings ofthe5th ACM conference on Electronic commerce,pages102–111,NewYork,NY,USA,2004.ACM Press.[Fos02]Ian Foster.The Grid:A New Infrastructure for21st Century Science.Physics Today,55(2):42,February2002.[FS99]Jason Flinn and Mahadev Satyanarayanan.Energy-aware adaptation for mobile applications.In SOSP’99:Proceedings of the seventeenth ACMsymposium on Operating systems principles,pages48–63,New York,NY,USA,1999.ACM Press.[FS04]Jason Flinn and Mahadev Satyanarayanan.Managing battery lifetime with energy-aware adaptation.ACM Transactions on Computer Systems,22(2):137–179,2004.[FZ94]G.H.Forman and J.Zahorjan.The challenges of mobile computing.IEEE Computer,27(4):38–47,April1994.[Gal04]RenéGallati.Anpassung eines probabilistischen Positionierungsdien-stes für die Verwendung mit mobilen ressourcenbeschränkten Geräten.Semester thesis,Institute for Pervasive Computing,Department of Com-puter Science,ETH Zurich,Switzerland,November2004.[Gär99] F.C.Gärtner.Fundamentals of fault-tolerant distributed computing in asynchronous environments.ACM Computing Surveys(CSUR),31(1):1–26,1999.[Gar05a]Gartner,Inc.Gartner Says Strong Fourth Quarter Sales Led Worldwide Mobile Phone Sales to30Percent Growth in2004.Gartner Press Release,2.March2005.Available online at /press_releases/asset_121402_11.html.[Gar05b]Gartner,Inc.Gartner Says Wireless E-Mail Applications Drive World-wide PDA Shipments Increase25Percent in First Quarter of2005.Gartner Press Release,4.May2005.Available online at http://www./press_releases/asset_126216_11.html.[GBPK02]J.Glas,M.Banu,V.Prodanov,and P.Kiss.Wireless LANs.In Pro-ceedings of the Workshop on Advances in Analog Circuit Design,March2002.321[GDL+04]Robert Grimm,Janet Davis,Eric Lemar,Adam Macbeth,Steven Swan-son,Thomas Anderson,Brian Bershad,Gaetano Borriello,Steven Grib-ble,and David Wetherall.System support for pervasive applications.ACM Transactions on Computer Systems,22(4):421–486,2004.[Geg04]Christian Gegenschatz.Zuverlässige Patientenüberwachung in einer Ubiquitous-Computing-Umgebung.Diplomarbeit,Institute for PervasiveComputing,Department of Computer Science,ETH Zurich,Switzerland,June2004.[Gel98]Hans-Werner Gellersen.Environment-Mediated Communication.In-ternational Workshop on Interactive Applications of Mobile Computing(IMC’98),1998.[Ger98]Lou Gerstner.Keynote Speech at CeBIT’98in Hanover,Germany,18.March1998.[Get93]I.Getting.The Global Positioning System.IEEE Spectrum30,12:36–47, December1993.[GGE+05]Deepak Ganesan,Ben Greenstein,Deborah Estrin,John Heidemann, and Ramesh Govindan.Multiresolution storage and search in sensornetworks.ACM Transactions on Storage,1(3):277–315,2005.[GHM99]K.Goto,Matsubara H.,and S.Myojo.A mobile guide system for vi-sually disabled persons.In Proceedings4th International Symposium onAutonomous Decentralized Systems,pages12–17,March1999.[GK00]P.Gupta and P.R.Kumar.The capacity of wireless networks.IEEE Transactions on Information Theory,46(2):388–404,March2000. [GKK+03]Phillip B.Gibbons,Brad Karp,Yan Ke,Suman Nath,and Srinivasan Seshan.IrisNet:An Architecture for a World-Wide Sensor Web.IEEEPervasive Computing,October–November:22–33,2003.[GLHB03]David Graumann,Walter Lara,Jeffrey Hightower,and Gaetano Bor-riello.Real-world implementation of the Location Stack:The UniversalLocation Framework.In Proceedings5th IEEE Workshop on Mobile Com-puting Systems&Applications(WMCSA2003),pages122–128.IEEEComputer Society Press,October2003.[GM02]Jean-Claude Geffroy and Gilles Motet.Design of Dependable Computing Systems.Kluwer Academic Publishers,2002.[Gon01]Daniel Jorge Viegas Gonçalves.Ubiquitous computing and AI towards an inclusive society.In WUAUC’01:Proceedings of the2001EC/NSFWorkshop on Universal Accessibility of Ubiquitous Computing,pages37–40.ACM Press,2001.[GS97]Rachid Guerraoui and AndréSchiper.Genuine atomic multicast.In Proceedings of the11th International Workshop on Distributed Algorithms(WDAG97),number1320in Lecture Notes in Computer Science,pages141–154.Springer-Verlag,September1997.322。
立体匹配综述阅读心得之Classification and evaluation of cost aggregation methods for stereo correspondence学习笔记之基于代价聚合算法的分类,主要针对cost aggregration 分类,20081.?Introduction经典的全局算法有:本文主要内容有:从精度的角度对比各个算法,主要基于文献【23】给出的评估方法,同时也在计算复杂度上进行了比较,最后综合这两方面提出一个trade-off的比较。
2?Classification?of?cost?aggregation?strategies?主要分为两种:1)The?former?generalizes?the?concept?of?variable?support?by? allowing?the?support?to?have?any?shape?instead?of?being?built?u pon?rectangular?windows?only.2)The?latter?assigns?adaptive?-?rather?than?fixed?-?weights?to?th e?points?belonging?to?the?support.大部分的代价聚合都是采用symmetric方案,也就是综合两幅图的信息。
(实际上在后面的博客中也可以发现,不一定要采用symmetric的形式,而可以采用asymmetric+TAC的形式,效果反而更好)。
采用的匹配函数为(matching?(or?error)?function?):Lp distance between two vectors包括SAD、Truncated SAD [30,25]、SSD、M-estimator [12]、similarity?function?based?on?point?distinctiveness[32] 最后要指出的是,本文基于平行平面(fronto-parallel)support。
Prediction of Chaotic Time Series Using Recurrent Neural NetworksJyh-Ming Kuo, Jose C. Principe, Bert deVries*Electrical Engineering Department, University of Florida, Gainesville, FL 32611Ph 904-392-2662, principe @synapse.ee.ufl.edu*David Sarnoff Research Center, Princeton, NJ 08540ABSTRACTIn this paper, we propose to train and use a recurrent artificial neural network(ANN) to predict a chaotic time series. Instead of predicting the next sample in the time series as is normally done, the neural network is trained to produce the sequence that follows a given initial condition. Dynamical parameters from the time series provide the clue in deciding the length of these training sequences. The proposed method has been applied to predicting both periodic and chaotic time series, and is superior to the conventional ANN approach.INTRODUCTIONChaotic time series are the output of a deterministic system with positive Lyapunov exponents . Therefore, unless we can specify the initial condition with infinite precision, the future behavior of these time series becomes unpredict-able. This characteristic makes the prediction of chaotic time series very challenging.To build a predictive model for a chaotic time series, the most common approach is to compute or adjust the parameters of some pre-selected model to minimize the mean squared error in one-step prediction[1][2][3][4], in a feedfowrad configuration (Figure 1a). Since we are normally interested in long term prediction (prediction of several samples ahead), the predictor is usually used recursively to produce multi-step predictions (Figure 1b).approach.It is obvious that for multi-step prediction, the predictor is utilized in a configuration (Figure 1b) different from the one used for the training (Figure 1a). As far as we know, there is no guarantee that a feedforward mapper trained as a one step predictor (Figure 1a) is able to generate the appropriate dynamics as an autonomous system (Figure 1b). Therefore we attempted to train the predictor in the way it is used in multi-step prediction.Since the time series is deterministic, a smooth map exists in its trajectory reconstructed using Takens embedding (delay) method [5]. A perfect predictive model, given the initial condition, should be able to reproduce the time series by iteration. Intuitively, the smooth map of the reconstructed dynamics can be approximated better if this iterative property can be emphasized in the training. This leads us to propose a recurrent artificial neural network, which is shown in Figure 2, as the architecture of the predictive model. A recurrent, real-time learning algorithm suggested by Williams and Zipser[6] was implemented to train the proposed ANN. During the training, the network recursively generates a sequence of data samples for a given initial condition by feeding back the output to the input. For each sequence of iterations, the distance between the true value and the output of the ANN is computed, and the adjust-ment of weights is calculated using gradient-descent approach. Thus, the desired signal becomes the sequence that follows a given initial condition.A chaotic time series possesses positive Lyapunov exponents therefore the prediction error will be magnified in every iteration. In order to avoid the accumulation of error, the samples contained in the input layer of the ANN have to be reset after a given number of iterations. A design parameter is to establish the number of points in each training pattern. Using Casdagli’s conjectured scaling law [4], we compute the upper bound for the length of these trainingsequences ( ) according towhere is the minimal distance between two points on the reconstructed trajectory, is the mean-square error for one-step prediction, is the maximal positive Lyapunov exponent, is the sampling period. There are several algorithms available to compute the maximal Lyapunov exponent for experimental data (e.g. Wolf’s algorithm[7]). In our experiments, we also found that the overlap of training segments can sometimes avoid oscillations in the training. RESULTSThe proposed method has been used to predict a periodic, but highly nonlinear time series (generated by sam-pling )and a chaotic time series (generated by Mackey-Glass equation with delay equal to 30). In the experi-l max dist min σe λmax l max τ>dist min σλmax τsin 30ωt dark line: sequence predictor, gray line: one-step predictorREFERENCES[1] Lapedes, A. and R. Farber, 1987, Nonlinear signal processing using neural networks: prediction and system mod-elling, technical report LA-UR-87-2662, Los Alamos National Laboratory, Los Alamos, NM.[2] Mead, W.C. et al. 1991, Prediction of chaotic time series using CNLS-NET-- Example: the Mackey-Glass equa-tion, technical report LA-UR-91-720, Los Alamos National Laboratory, Los Alamos, NM.[3] Weigend, A.S., B. A. Huberman, and D. E. Rumelhart, 1990, Predicting the future: a connectionist approach. In-ternational Journal of Neural Systems, 1:193.[4] Casdagli, M. 1989, Nonlinear prediction of chaotic time series, Physica D, 35, 335-356.[5] Takens, F. 1981, Detecting strange attractors, In: Dynamical systems and turbulence (edited by D.A. Rand, and L.S. Yang), Lecture Notes in Mathematics, vol. 898, Berlin: Springer.[6] Williams, R.J., and D. Zipser, 1989, A learning algorithm for continually running fully recurrent neural networks.Neural Computation, 1, 270-280.[7] Wolf A. et al. 1985, Determining Lyapunov exponents from a time series, Physica 16D, 285-317.[8] Principe, J.C., A. Rathie, and J.M. Kuo, 1992, Prediction of chaotic time series with neural networks and the issue of dynamic modeling. submitted to Int’l Journal of Bifurcation and Chaos.Figure 5. Performance comparisondark line: sequence predictorFigure 6. error curves for different gray line: one-step predictordashed line : conjectured curve initial weights。