220 results on '"Atomic Actions"'
Search Results
2. A Comparative Study of Feature Selection Approaches for Human Activity Recognition Using Multimodal Sensory Data
- Author
-
Fatima Amjad, Muhammad Hassan Khan, Muhammad Adeel Nisar, Muhammad Shahid Farid, and Marcin Grzegorzek
- Subjects
human activity recognition ,subspace pooling ,atomic actions ,composite activities ,Chemical technology ,TP1-1185 - Abstract
Human activity recognition (HAR) aims to recognize the actions of the human body through a series of observations and environmental conditions. The analysis of human activities has drawn the attention of the research community in the last two decades due to its widespread applications, diverse nature of activities, and recording infrastructure. Lately, one of the most challenging applications in this framework is to recognize the human body actions using unobtrusive wearable motion sensors. Since the human activities of daily life (e.g., cooking, eating) comprises several repetitive and circumstantial short sequences of actions (e.g., moving arm), it is quite difficult to directly use the sensory data for recognition because the multiple sequences of the same activity data may have large diversity. However, a similarity can be observed in the temporal occurrence of the atomic actions. Therefore, this paper presents a two-level hierarchical method to recognize human activities using a set of wearable sensors. In the first step, the atomic activities are detected from the original sensory data, and their recognition scores are obtained. Secondly, the composite activities are recognized using the scores of atomic actions. We propose two different methods of feature extraction from atomic scores to recognize the composite activities, and they include handcrafted features and the features obtained using the subspace pooling technique. The proposed method is evaluated on the large publicly available CogAge dataset, which contains the instances of both atomic and composite activities. The data is recorded using three unobtrusive wearable devices: smartphone, smartwatch, and smart glasses. We also investigated the performance evaluation of different classification algorithms to recognize the composite activities. The proposed method achieved 79% and 62.8% average recognition accuracies using the handcrafted features and the features obtained using subspace pooling technique, respectively. The recognition results of the proposed technique and their comparison with the existing state-of-the-art techniques confirm its effectiveness.
- Published
- 2021
- Full Text
- View/download PDF
3. Human Behaviour Modelling Approach for Intention Recognition in Ambient Assisted Living
- Author
-
Yordanova, Kristina, Kacprzyk, Janusz, editor, Novais, Paulo, editor, Preuveneers, Davy, editor, and Corchado, Juan M., editor
- Published
- 2011
- Full Text
- View/download PDF
4. The Application of Compile-Time Reflection to Software Fault Tolerance Using Ada 95
- Author
-
Rogers, P., Wellings, A. J., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Vardanega, Tullio, editor, and Wellings, Andy, editor
- Published
- 2005
- Full Text
- View/download PDF
5. A recovery model for cooperative computations
- Author
-
Nett, Edgar, Mock, Michael, Ezhilchelvan, Paul, editor, and Romanovsky, Alexander, editor
- Published
- 2002
- Full Text
- View/download PDF
6. Stabilis: A Case Study in Writing Fault-Tolerant Distributed Applications Using Persistent Objects
- Author
-
Buzato, L. E., Calsavara, A., van Rijsbergen, C. J., editor, Albano, Antonio, editor, and Morrison, Ron, editor
- Published
- 1993
- Full Text
- View/download PDF
7. Action recognition using dynamic hierarchical trees
- Author
-
Peng Duan, Tingwei Wang, Bingxian Ma, Peng Wu, and Weizhi Lu
- Subjects
business.industry ,Computer science ,020207 software engineering ,Pattern recognition ,02 engineering and technology ,Limiting ,k-nearest neighbors algorithm ,Kernel (image processing) ,Signal Processing ,Atomic actions ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Action recognition ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,Artificial intelligence ,Electrical and Electronic Engineering ,business - Abstract
Hierarchical models have shown their effectiveness for action recognition. However, most of the existing hierarchy construction methods fail to model the complex motion patterns in videos, and thus are vulnerable to the interference of the inevitable noise in action videos. Therefore, we propose a Dynamic Hierarchical Tree (DHT) model to characterize such complex motion for better recognition performance. First, a minimum maximum DTW (mmDTW) is developed to produce more stable atomic actions by limiting the minimum and maximum lengths of atomic actions. Then an aggregation method is utilized to construct a DHT for each video by merging atomic actions from bottom to top. Not only the similarity between frames but also the compatibility of dynamic evolution between frames and segments is exploited for the mmDTW and the aggregation process, making the DHTs more suitable for modeling actions in videos. Finally, a k-Nearest Neighbors Edge Pairs (kNNEP) kernel is proposed to compare two DHTs by using the mean similarity of k nearest neighbors edge pairs.
- Published
- 2019
- Full Text
- View/download PDF
8. C4: the C compiler concurrency checker
- Author
-
John Wickerson, Matt Windsor, and Alastair F. Donaldson
- Subjects
Multi-core processor ,Programming language ,Computer science ,Concurrency ,Fuzz testing ,computer.software_genre ,Workflow ,Atomic actions ,Code (cryptography) ,Compiler ,Hardware_CONTROLSTRUCTURESANDMICROPROGRAMMING ,Software_PROGRAMMINGLANGUAGES ,IBM ,computer - Abstract
The correct compilation of atomic-action concurrency is vital now that multicore processors are ubiquitous. Despite much recent work on automated compiler testing, little existing tooling can test how real-world compilers handle compilation of atomic-action code. We demonstrate C4, a tool for exploring the concurrency behaviour of real-world C compilers such as GCC and LLVM. C4 automates a workflow based on generating, fuzzing, and executing litmus tests. So far, C4 has found two new control-flow bugs in GCC and IBM XL, and reproduced two historic concurrency bugs in GCC 4.
- Published
- 2021
- Full Text
- View/download PDF
9. Analyzing Games with the AGE and 6-11 Frameworks
- Author
-
Roberto Dillon
- Subjects
Dynamics (music) ,Computer science ,Human–computer interaction ,Process (engineering) ,Perspective (graphical) ,Atomic actions ,ComputingMilieux_PERSONALCOMPUTING ,Basic level ,Virtual reality ,Onboarding ,Newspaper - Abstract
Inspired by the original Mechanics, Dynamics, Aesthetics (MDA) model proposed in R. Hunicke et al, the Actions, Gameplay, Experience framework was gradually formalized following the original work in R. Dillon and ultimately finalized in Dillon. Analyzing Actions and Gameplay should be relatively straightforward, but the Experience involves emotions and can be, henceforth, subjective. Like the original MDA, it breaks down a game into three different conceptual layers. At the most basic level we have the Actions, which represent the atomic actions a player can perform in a game. Virtual reality should make the fundamental aspect of games played in a first-person perspective very straightforward and easy to accomplish. The onboarding process and tutorial works well and players have a chance to know more about the world the game takes place in by checking out newspaper articles and TV news, which are easily available and scattered all around.
- Published
- 2020
- Full Text
- View/download PDF
10. Inferring Temporal Compositions of Actions Using Probabilistic Automata
- Author
-
Dylan Campbell, Stephen Gould, Rodrigo Santa Cruz, Basura Fernando, and Anoop Cherian
- Subjects
FOS: Computer and information sciences ,Artificial neural network ,Computer science ,business.industry ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Computer Vision and Pattern Recognition ,Inference ,Action (philosophy) ,Atomic actions ,Probabilistic automaton ,Action recognition ,Regular expression ,Artificial intelligence ,business ,Natural language - Abstract
This paper presents a framework to recognize temporal compositions of atomic actions in videos. Specifically, we propose to express temporal compositions of actions as semantic regular expressions and derive an inference framework using probabilistic automata to recognize complex actions as satisfying these expressions on the input video features. Our approach is different from existing works that either predict long-range complex activities as unordered sets of atomic actions, or retrieve videos using natural language sentences. Instead, the proposed approach allows recognizing complex fine-grained activities using only pretrained action classifiers, without requiring any additional data, annotations or neural network training. To evaluate the potential of our approach, we provide experiments on synthetic datasets and challenging real action recognition datasets, such as MultiTHUMOS and Charades. We conclude that the proposed approach can extend state-of-the-art primitive action classifiers to vastly more complex activities without large performance degradation., Accepted in Workshop on Compositionality in Computer Vision at CVPR, 2020
- Published
- 2020
11. Atomicity failure and the retrenchment atomicity pattern.
- Author
-
Banach, Richard, Jeske, Czesław, Hall, Anthony, and Stepney, Susan
- Subjects
- *
AIR traffic control , *DOWNSIZING of organizations , *DISCREPANCY theorem , *DATABASE industry - Abstract
The issues surrounding the question of atomicity, both in the past and nowadays, are briefly reviewed, and a picture of an ACID (atomic, consistent, isolated, durable) transaction as a refinement problem is presented. An example of a simple air traffic control system is introduced, and the discrepancies that can arise when read-only operations examine the state at atomic and finegrained levels are handled by retrenchment. Non-ACID timing aspects of the ATC example are also handled by retrenchment, and the treatment is generalised to yield the Retrenchment Atomicity Pattern. The utility of the pattern is confirmed against a number of different case studies. One is the Mondex Electronic Purse, its protocol treated as a conventional atomic transaction. Another is the recovery protocol of Mondex, viewed as a compensated transaction (leading to the view that compensated transactions in general fit the pattern). A final one comprises various unruly phenomena occurring in the implementations of software transactional memory systems, which can frequently display non-ACID behaviour. In all cases the Atomicity Pattern is seen to perform well. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
12. Atomic actions, and their refinements to isolated protocols.
- Author
-
Banach, Richard and Schellhorn, Gerhard
- Subjects
- *
COMPUTER network protocols , *STORED-value cards , *SIMULATION methods & models , *SMART cards , *SYNCHRONIZATION - Abstract
Inspired by the properties of the refinement development of the Mondex Electronic Purse, we view an isolated atomic action as a family of transitions with a common before-state, and different after-states corresponding to different possible outcomes when the action is attempted. We view a protocol for an atomic action as a computation DAG, each path of which achieves in several steps one of the outcomes of the atomic action. We show that in this picture, the protocol can be viewed as a relational refinement of the atomic action in a number of ways. Firstly, it yields a ‘big diagram’ simulation à la ASM. Secondly, it yields a ‘small diagram’ simulation, in which the atomic action is synchronised with an individual step along each path through the protocol, and all the other steps of the path simulate skip. We show that provided each path through the protocol contains one step synchronised with the atomic action, the choice of synchronisation point can be made freely. We describe the relationship between such synchronisations and forward and backward simulations. We relate this theory to serialisations of system runs containing multiple interleaved transactions, showing how the clean picture of the refinement of an isolated atomic action to an isolated protocol becomes obscured by the details of the interleaving. In effect, the fact that protocols are typically executed by a number of co-operating agents, not all of which embark on executing the protocol at the same moment, results in ‘ragged starts’ and ‘ragged ends’ to protocol instantiations, leading to potential overlaps between unrelated protocol instances that the theory must handle. We show how existing Mondex refinements embody the ideas developed, and describe a mechanical verification of the results presented. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
13. Next-active-object prediction from egocentric videos
- Author
-
Sebastiano Battiato, Kristen Grauman, Antonino Furnari, and Giovanni Maria Farinella
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,Exploit ,Computer Science - Artificial Intelligence ,Computer science ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Computer Vision and Pattern Recognition ,02 engineering and technology ,Machine Learning (cs.LG) ,Sliding window protocol ,Atomic actions ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Computer vision ,Object interaction ,Egocentric vision ,Next-active-object ,Electrical and Electronic Engineering ,Forecasting ,Signal Processing ,1707 ,business.industry ,020207 software engineering ,Wearable systems ,Artificial Intelligence (cs.AI) ,First person ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,Artificial intelligence ,business ,Classifier (UML) - Abstract
Although First Person Vision systems can sense the environment from the user’s perspective, they are generally unable to predict his intentions and goals. Since human activities can be decomposed in terms of atomic actions and interactions with objects, intelligent wearable systems would benefit from the ability to anticipate user-object interactions. Even if this task is not trivial, the First Person Vision paradigm can provide important cues to address this challenge. We propose to exploit the dynamics of the scene to recognize next-active-objects before an object interaction begins. We train a classifier to discriminate trajectories leading to an object activation from all others and forecast next-active-objects by analyzing fixed-length trajectory segments within a temporal sliding window. The proposed method compares favorably with respect to several baselines on the Activity of Daily Living (ADL) egocentric dataset comprising 10 h of videos acquired by 20 subjects while performing unconstrained interactions with several objects.
- Published
- 2017
- Full Text
- View/download PDF
14. Sparse composition of body poses and atomic actions for human activity recognition in RGB-D videos
- Author
-
Ivan Lillo, Alvaro Soto, and Juan Carlos Niebles
- Subjects
Exploit ,Computer science ,business.industry ,02 engineering and technology ,Intermediate level ,Machine learning ,computer.software_genre ,Hierarchical database model ,Activity recognition ,Robustness (computer science) ,020204 information systems ,Signal Processing ,Atomic actions ,0202 electrical engineering, electronic engineering, information engineering ,RGB color model ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,Artificial intelligence ,business ,computer - Abstract
This paper presents an approach to recognize human activities using body poses estimated from RGB-D data.We focus on recognizing complex activities composed of sequential or simultaneous atomic actions characterized by body motions of a single actor. We tackle this problem by introducing a hierarchical compositional model that operates at three levels of abstraction. At the lowest level, geometric and motion descriptors are used to learn a dictionary of body poses. At the intermediate level, sparse compositions of these body poses are used to obtain meaningful representations for atomic human actions. Finally, at the highest level, spatial and temporal compositions of these atomic actions are used to represent complex human activities.Our results show the benefits of using a hierarchical model that exploits the sharing and composition of body poses into atomic actions, and atomic actions into activities.A quantitative evaluation using two benchmark datasets illustrates the advantages of our model to perform action and activity recognition. A novel hierarchical model to recognize human activities using RGB-D data is proposed.The method jointly learns suitable representations at different abstraction levels.The model achieves multi-class discrimination providing useful mid-level annotations.The compositional capabilities of our model also bring robustness to body occlusions.
- Published
- 2017
- Full Text
- View/download PDF
15. Embodiment and Its Influence on Informational Costs of Decision Density-Atomic Actions vs. Scripted Sequences
- Author
-
Bente Riegler, Volker Steuber, and Daniel Polani
- Subjects
0301 basic medicine ,Computer science ,Reproduction (economics) ,Distribution (economics) ,Information theory ,03 medical and health sciences ,0302 clinical medicine ,Artificial Intelligence ,Atomic actions ,Reinforcement learning ,TJ1-1570 ,Mechanical engineering and machinery ,agent control ,License ,Law and economics ,Original Research ,information theory ,embodiment ,Robotics and AI ,business.industry ,QA75.5-76.95 ,Creative commons ,Computer Science Applications ,030104 developmental biology ,Electronic computers. Computer science ,morphological computing ,Attribution ,business ,030217 neurology & neurosurgery - Abstract
The importance of embodiment for effective robot performance has been postulated for a long time. Despite this, only relatively recently concrete quantitative models were put forward to characterize the advantages provided by a well-chosen embodiment. We here use one of these models, based on the concept of relevant information, to identify in a minimalistic scenario how and when embodiment affects the decision density. Concretely, we study how embodiment affects information costs when, instead of atomic actions, scripts are introduced, that is, predefined action sequences. Their inclusion can be treated as a straightforward extension of the basic action space. We will demonstrate the effect on informational decision cost of utilizing scripts vs. basic actions using a simple navigation task. Importantly, we will also employ a world with “mislabeled” actions, which we will call a “twisted” world. This is a model which had been used in an earlier study of the influence of embodiment on decision costs. It will turn out that twisted scenarios, as opposed to well-labeled (“embodied”) ones, are significantly more costly in terms of relevant information. This cost is further worsened when the agent is forced to lower the decision density by employing scripts (once a script is triggered, no decisions are taken until the script has run to its end). This adds to our understanding why well-embodied (interpreted in our model as well-labeled) agents should be preferable, in a quantifiable, objective sense.
- Published
- 2020
16. Beyond Individual Rules: Usage Scenarios and Control Structures
- Author
-
Gabriele Taentzer and Reiko Heckel
- Subjects
Business transactions ,Graph rewriting ,Theoretical computer science ,Modeling language ,Computer science ,Atomic actions ,Graph (abstract data type) - Abstract
We have defined a graph transformation step as the application of a rule, defined over a type graph and a rule signature, to a given instance graph and producing a derived graph in a single, atomic action. In software modelling, individual actions are often combined into processes describing, for example, a business transaction or the implementation of a complex operation. The problem of controlling the application of rules, for example to ensure that certain actions happen in the right order, is the subject of this section.
- Published
- 2020
- Full Text
- View/download PDF
17. Achieving cooperation through deep multiagent reinforcement learning in sequential prisoner's dilemmas
- Author
-
Weixun Wang, Matthew D. Taylor, Yixi Wang, and Jianye Hao
- Subjects
Dilemma ,Computer science ,business.industry ,Atomic actions ,Reinforcement learning ,Artificial intelligence ,Social dilemma ,Adversary ,business ,ComputingMethodologies_ARTIFICIALINTELLIGENCE ,Phase (combat) - Abstract
The Iterated Prisoner's Dilemma has guided research on social dilemmas for decades. However, it distinguishes between only two atomic actions: cooperate and defect. In real-world prisoner's dilemmas, these choices are temporally extended and different strategies may correspond to sequences of actions, reflecting grades of cooperation. We introduce a Sequential Prisoner's Dilemma (SPD) game to better capture the aforementioned characteristics. In this work, we propose a deep multiagent reinforcement-learning approach that investigates the evolution of mutual cooperation in SPD games. Our approach consists of two phases. The first phase is offline: it synthesizes policies with different cooperation degrees and then trains a cooperation degree detection network. The second phase is online: an agent adaptively selects its policy based on the detected degree of opponent cooperation. The effectiveness of our approach is demonstrated in two representative SPD 2D games: the Apple-Pear game and the Fruit Gathering game. Experimental results show that our strategy can avoid being exploited by exploitative opponents and achieve cooperation with cooperative opponents.
- Published
- 2019
- Full Text
- View/download PDF
18. A Hierarchical Video Description for Complex Activity Understanding
- Author
-
Xinxiao Wu, Yunde Jia, and Cuiwei Liu
- Subjects
Structure (mathematical logic) ,Computer science ,business.industry ,02 engineering and technology ,010501 environmental sciences ,Machine learning ,computer.software_genre ,01 natural sciences ,Motion (physics) ,Activity recognition ,Discriminative model ,Artificial Intelligence ,Pattern recognition (psychology) ,Atomic actions ,0202 electrical engineering, electronic engineering, information engineering ,Learning methods ,020201 artificial intelligence & image processing ,Computer vision ,Computer Vision and Pattern Recognition ,Artificial intelligence ,business ,computer ,Software ,0105 earth and related environmental sciences ,Simple (philosophy) - Abstract
This paper addresses the challenging problem of complex human activity understanding from long videos. Towards this goal, we propose a hierarchical description of an activity video, referring to the "which" of activities, "what" of atomic actions, and "when" of atomic actions happening in the video. In our work, each complex activity is characterized as a composition of simple motion units (called atomic actions), and different atomic actions are explained by different video segments. We develop a latent discriminative structural model to detect the complex activity and atomic actions, while learning the temporal structure of atomic actions simultaneously. A segment-annotation mapping matrix is introduced for relating video segments to their associational atomic actions, allowing different video segments to explain different atomic actions. The segment-annotation mapping matrix is treated as latent information in the model, since its ground-truth is not available during both training and testing. Moreover, we present a semi-supervised learning method to automatically predict the atomic action labels of unlabeled training videos when the labeled training data is limited, which could greatly alleviate the laborious and time-consuming annotations of atomic actions for training data. Experiments on three activity datasets demonstrate that our method is able to achieve promising activity recognition results and obtain rich and hierarchical descriptions of activity videos.
- Published
- 2016
- Full Text
- View/download PDF
19. Implementing Atomic Actions in Ada 95.
- Author
-
Wellings, Andy and Burns, Alan
- Subjects
- *
COMPUTER software , *FAULT tolerance (Engineering) , *ADA 95 (Computer program language) , *PROGRAMMING languages , *RELIABILITY in engineering , *SOFTWARE engineering - Abstract
Atomic actions are an important dynamic structuring technique that aid the construction of fault-tolerant concurrent systems. Although they were developed some years ago, none of the well-known commercially-available programming languages directly support their use. This paper summarizes software fault tolerance techniques for concurrent systems, evaluates the Ada 95 programming language from the perspective of its support for software fault tolerance, and shows how Ada 95 can be used to implement software fault tolerance techniques. In particular, it shows how packages, protected objects, requeue, exceptions, asynchronous transfer of control, tagged types, and controlled types can be used as building blocks from which to construct atomic actions with forward and backward error recovery, which are resilient to deserter tasks and task abortion. [ABSTRACT FROM AUTHOR]
- Published
- 1997
- Full Text
- View/download PDF
20. CSP Methods for Identifying Atomic Actions in the Design of Fault Tolerant Concurrent Systems.
- Author
-
Tyrrell, Andrew M. and Carpenter, Geof F.
- Subjects
- *
FAULT-tolerant computing , *ELECTRONIC data processing , *COMPUTER software , *COMPUTER systems , *SOFTWARE engineering - Abstract
Limiting the extent of error propagation when faults occur and localizing the subsequent error recovery are common concerns in the design of fault tolerant parallel processing systems. Both activities are made easier if the designer associates fault tolerance mechanisms with the underlying atomic actions of the system. With this in mind, this paper has investigated two methods for the identification of atomic actions in parallel processing systems described using CSP. Explicit trace evaluation forms the basis of the first algorithm, which enables a designer to analyze interprocess communications and thereby locate atomic action boundaries in a hierarchical fashion. The second method takes CS? descriptions of the parallel processes and uses structural arguments to infer the atomic action boundaries. This method avoids the difficulties involved with producing full trace sets, but does incur the penalty of a more complex algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 1995
- Full Text
- View/download PDF
21. Implementing Atomicity in Two Systems: Techniques, Tradeoffs, and Experience.
- Author
-
Cabrera, Luis-Felipe, McPherson, John A., and Wyllie, James C.
- Subjects
- *
DATABASES , *DATABASE management , *COOPERATIVE processing , *DISTRIBUTED computing , *DATA structures , *ELECTRONIC file management - Abstract
This paper presents our experience with implementing atomicity in two systems: the QuickSilver distributed file system and the Starburst relational database manager. Each of these systems guarantees that certain collections of operations done on behalf of their clients execute atomically, despite process, machine, or network failures. In this paper we describe the atomic properties implemented by each system, present the algorithms and mechanisms used, examine the similarities and differences between the two systems, and give the rationale for different design decisions. We demonstrate that the support of atomicity with high performance requires a variety of techniques carefully chosen to balance the amount of data logged, the level of concurrency allowed, and the mutual consistency requirements of sets of objects. The main goal of this paper is to help others implement efficient systems that support atomicity. Although we will discuss many techniques and mechanisms for implementing atomicity, we do not attempt to provide an exhaustive description of all possibilities or a complete set of references, nor do we claim to be the first to use the techniques that we describe. [ABSTRACT FROM AUTHOR]
- Published
- 1993
- Full Text
- View/download PDF
22. Distributed Version Management for Read-Only Actions.
- Author
-
Weihl, William E.
- Subjects
- *
DISTRIBUTED computing , *ELECTRONIC data processing , *COMPUTER networks , *SOFTWARE engineering , *DATA transmission systems , *ELECTRONIC systems - Abstract
Typical concurrency control protocols for atomic actions, such as two-phase locking, perform poorly for long read-only actions. We present four new concurrency control protocols that eliminate all interference between read-only actions and update actions, and thus offer significantly improved performance for read-only actions. The protocols work by maintaining multiple versions of the system state; read-only actions read old versions, while update actions manipulate the most recent version. We focus on the problem of managing the storage required for old versions in a distributed system. One of the protocols uses relatively little space, but has a potentially significant communication cost. The other protocols use more space, but may be cheaper in terms of communication. [ABSTRACT FROM AUTHOR]
- Published
- 1987
23. Error Recovery in Asynchronous Systems.
- Author
-
Campbell, Roy H. and Randell, Brian
- Subjects
- *
FAULT-tolerant computing , *COMPUTER software , *COMPUTER systems , *ELECTRONIC systems , *SOFTWARE engineering - Abstract
The demand for highly reliable computer systems has led to techniques for the construction of' fault-tolerant, software systems. A fault-tolerant system detects errors created as the effects of a fault and applies error recovery provisions in the form of abnormal or exceptional mechanisms and algorithms to continue operation and restore normal computation. Backward error recovery is intended to re- store a system state which occurred prior to the manifestation of the fault. Forward error recovery is intended to correct or isolate specific errors and is accomplished in the system state containing the errors. The organization and control of error recovery in asynchronous systems is very complex. Nevertheless, it is possible to limit this complexity by appropriate system structuring aids. Techniques for structuring backward error recovery are comparatively well understood. This pa- per proposes techniques for structuring forward error recovery measures in asynchronous systems and generalizes recent ideas of atomic actions (transactions) so as to support fault-tolerant interactions between processes. [ABSTRACT FROM AUTHOR]
- Published
- 1986
24. Concurrency and Forward Recovery in Atomic Actions.
- Author
-
Taylor, David J.
- Subjects
- *
SOFTWARE engineering , *RELIABILITY in engineering , *COMPUTER software , *ERRORS , *SYSTEMS design , *ELECTRONIC systems - Abstract
Some difficulties and complexities in atomic actions occur only when the concept of atomic actions is extended to allow concurrency within atomic actions and to allow a single atomic action to execute at a number of different sites. Also, providing facilities for both forward and backward recovery presents problems not found in the more usual case of allowing only backward recovery. This paper presents an analysis of these problems and proposes a general structure for a solution. A syntax which might be used to specify this structure is also given and illustrated with examples. The practicality of the scheme is justified by sketching one possible implementation. [ABSTRACT FROM AUTHOR]
- Published
- 1986
25. Performance Modeling of Database Recovery Protocols.
- Author
-
Griffeth, Nancy and Miller, John A.
- Subjects
- *
DATABASES , *ELECTRONIC information resources , *MARKOV processes , *COMPUTER network protocols , *STANDARDS , *TECHNOLOGY - Abstract
The performance modeling described in this paper compares several protocols which ensure that a database can be recovered to a consistent state after a transaction failure or system crash. The contributions of the paper include a collection of simple analytic models, based on Markov processes, for these protocols and some surprising results on the relative performance of the protocols. We consider only two-stage transactions (all reads before writes) and ignore effects of serializing transactions. The most interesting performance result presented is that, for systems obeying the assumptions of this paper, the "pessimistic" policy of holding write locks to commit point is considerably less efficient than the "optimistic" policy which allows reading of uncommitted data, but risks cascading aborts. A multiversion policy introduced in [2] was also studied and found always to be nearly as good as the optimistic policy and sometimes much better. [ABSTRACT FROM AUTHOR]
- Published
- 1985
26. Atomic Actions and Resource Coordination Problems Having Nonunique Solutions.
- Author
-
Sinha, Mukul K.
- Subjects
- *
SOFTWARE engineering , *DATABASES , *APPLICATION software , *RESOURCE allocation , *MATHEMATICAL models , *PROBLEM solving , *COMPUTER programming - Abstract
The concept of atomic actions is decomposed into database-dependent atomic actions and application-dependent atomic actions. There is a broad class of application-dependent atomic actions that can have nonunique solutions. These are resource coordination problems and are classified as problems of NU class. It is argued that a transaction modeling a problem of NU class provides lower concurrency. A concept of coordination is proposed which can model a broad range of NU class problems. An object model and a protocol are suggested which utilize the nonunique character of the solution to provide higher concurrency. [ABSTRACT FROM AUTHOR]
- Published
- 1985
27. Resilient Distributed Computing.
- Author
-
Svobodova, Liba
- Subjects
- *
DISTRIBUTED computing , *INFORMATION retrieval , *ERRORS , *COMPUTER reliability , *COMPUTER systems , *COMPUTER software - Abstract
A control abstraction called atomic action is a powerful general mechanism for ensuring consistent behavior of a system in spite of failures of individual computations running in the system, add in spite of system crashes. However, because of the "all-or-nothing" property of atomic actions, an important amount of work might be abandoned needlessly when an internal error is encountered. This paper discusses how implementation of resilient distributed systems can be supported using a combination of nested atomic actions and stable checkpoints. Nested atomic, actions form a free structure. When an internal atomic action terminates, its results are not made permanent until the outermost atomic action commits, but they survive local node failures. Each subtree of atomic actions is recoverable individually. A checkpoint is established in stable storage as part of a remote request so that results of such a request can be reclaimed if the requesting node fails in. the meantime. The paper shows how remote procedure call primitives with "at-most-once" semantics and recovery blocks can be built with these mechanisms. [ABSTRACT FROM AUTHOR]
- Published
- 1984
28. Structuring Distributed Systems for Recoverability and Crash Resistance.
- Author
-
Shrivastava, Santosfi Kumar
- Subjects
- *
DISTRIBUTED computing , *ELECTRONIC data processing , *COMPUTER software , *SOFTWARE engineering - Abstract
An object-oriented multilevel model of computation is used to discuss recoverability and crash resistance issues in distributed systems. Of particular importance are the issues that are raised when recoverability and crash resistance properties are desired from objects whose concrete representations are distributed over several nodes. The execution of a program at a node of the system can give rise to a hierarchy of processes executing various parts of the program at different nodes. Recoverability and crash resistance properties are needed to ensure that such a group of processes leave the system state consistent despite faults in the system. [ABSTRACT FROM AUTHOR]
- Published
- 1981
- Full Text
- View/download PDF
29. Smashing OpenFlow's 'atomic' actions: Programmable data plane packet manipulation in hardware
- Author
-
Giuseppe Bianchi, Salvatore Pontarelli, and Marco Bonola
- Subjects
Settore ING-INF/03 ,OpenFlow ,Computer Networks and Communications ,business.industry ,Computer science ,Network packet ,020206 networking & telecommunications ,02 engineering and technology ,020202 computer hardware & architecture ,Computer Science Applications ,Atomic actions ,0202 electrical engineering, electronic engineering, information engineering ,Forwarding plane ,business ,Computer hardware - Published
- 2018
- Full Text
- View/download PDF
30. On the Refinement of Atomic Actions.
- Author
-
Banach, Richard and Schellhorn, Gerhard
- Subjects
ELECTRONICS ,COMPUTER science ,SYNCHRONIZATION ,SIMULATION methods & models ,OPERATIONS research - Abstract
Abstract: Inspired by the properties of the refinement development of the Mondex Electronic Purse, we view an atomic action as a family of transitions with a common before-state, and different after-states corresponding to different possible outcomes when the action is attempted. We view a protocol for an atomic action as a computation tree, each branch of which achieves in several steps, one of the outcomes of the atomic action. We show that in this picture, the protocol can be viewed as a relational refinement of the atomic action in a number of ways. Firstly, it yields a ‘big diagram’ simulation à la ASM. Secondly, it yields a ‘small diagram’ simulation, in which the atomic action is synchronised with an individual step along each path through the protocol, and all the other steps of the path simulate skip. We show that provided each path through the protocol contains one step synchronised with the atomic action, the choice of synchronisation point can be made freely. We describe the relationship between such synchronisations and forward and backward simulations. We relate this theory to serialisations of system runs containing multiple transactions, and show how existing Mondex refinements embody the ideas developed. Keywords: [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
31. A Comparative Study of Feature Selection Approaches for Human Activity Recognition Using Multimodal Sensory Data.
- Author
-
Amjad, Fatima, Khan, Muhammad Hassan, Nisar, Muhammad Adeel, Farid, Muhammad Shahid, Grzegorzek, Marcin, and Derrode, Stéphane
- Subjects
HUMAN activity recognition ,FEATURE selection ,HUMAN behavior ,FEATURE extraction ,MOTION detectors ,CLASSIFICATION algorithms ,PALMPRINT recognition - Abstract
Human activity recognition (HAR) aims to recognize the actions of the human body through a series of observations and environmental conditions. The analysis of human activities has drawn the attention of the research community in the last two decades due to its widespread applications, diverse nature of activities, and recording infrastructure. Lately, one of the most challenging applications in this framework is to recognize the human body actions using unobtrusive wearable motion sensors. Since the human activities of daily life (e.g., cooking, eating) comprises several repetitive and circumstantial short sequences of actions (e.g., moving arm), it is quite difficult to directly use the sensory data for recognition because the multiple sequences of the same activity data may have large diversity. However, a similarity can be observed in the temporal occurrence of the atomic actions. Therefore, this paper presents a two-level hierarchical method to recognize human activities using a set of wearable sensors. In the first step, the atomic activities are detected from the original sensory data, and their recognition scores are obtained. Secondly, the composite activities are recognized using the scores of atomic actions. We propose two different methods of feature extraction from atomic scores to recognize the composite activities, and they include handcrafted features and the features obtained using the subspace pooling technique. The proposed method is evaluated on the large publicly available CogAge dataset, which contains the instances of both atomic and composite activities. The data is recorded using three unobtrusive wearable devices: smartphone, smartwatch, and smart glasses. We also investigated the performance evaluation of different classification algorithms to recognize the composite activities. The proposed method achieved 79% and 62.8% average recognition accuracies using the handcrafted features and the features obtained using subspace pooling technique, respectively. The recognition results of the proposed technique and their comparison with the existing state-of-the-art techniques confirm its effectiveness. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
32. Layered Concurrent Programs
- Author
-
Bernhard Kragl and Shaz Qadeer
- Subjects
Sequence ,Procedure calls ,Syntax (programming languages) ,Programming language ,Computer science ,020207 software engineering ,02 engineering and technology ,Mathematical proof ,Notation ,computer.software_genre ,Atomic actions ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer - Abstract
We present layered concurrent programs, a compact and expressive notation for specifying refinement proofs of concurrent programs. A layered concurrent program specifies a sequence of connected concurrent programs, from most concrete to most abstract, such that common parts of different programs are written exactly once. These programs are expressed in the ordinary syntax of imperative concurrent programs using gated atomic actions, sequencing, choice, and (recursive) procedure calls. Each concurrent program is automatically extracted from the layered program. We reduce refinement to the safety of a sequence of concurrent checker programs, one each to justify the connection between every two consecutive concurrent programs. These checker programs are also automatically extracted from the layered program. Layered concurrent programs have been implemented in the Civl verifier which has been successfully used for the verification of several complex concurrent programs.
- Published
- 2018
- Full Text
- View/download PDF
33. Auto learning temporal atomic actions for activity classification
- Author
-
Yongtian Wang, Benjamin Yao, and Jiangen Zhang
- Subjects
Hierarchical Dirichlet process ,Computer science ,business.industry ,Pattern recognition ,Machine learning ,computer.software_genre ,Mixture model ,Generative model ,Naive Bayes classifier ,ComputingMethodologies_PATTERNRECOGNITION ,Artificial Intelligence ,Activity classification ,Signal Processing ,Atomic actions ,Computer Vision and Pattern Recognition ,Visual Word ,Artificial intelligence ,business ,computer ,Classifier (UML) ,Software - Abstract
In this paper, we present a model for learning atomic actions for complex activities classification. A video sequence is first represented by a collection of visual interest points. Then the model automatically clusters visual words into atomic actions (topics) based on their co-occurrence and temporal proximity in the same activity category using an extension of hierarchical Dirichlet process (HDP) mixture model. Our approach is robust to noisy interest points caused by various conditions because HDP is a generative model. Finally, we use both a Naive Bayesian and a linear SVM classifier for the problem of activity classification. We first use the intermediate result of a synthetic example to demonstrate the superiority of our model, then we apply our model on the complex Olympic Sport 16-class dataset and show that it outperforms other state-of-art methods.
- Published
- 2013
- Full Text
- View/download PDF
34. Implementing Concurrency Control in Reliable Distributed Object-Oriented Systems
- Author
-
Parrington, Graham D., Shrivastava, Santosh K., Goos, G., editor, Hartmanis, J., editor, Barstow, D., editor, Brauer, W., editor, Hansen, P. Brinch, editor, Gries, D., editor, Luckham, D., editor, Moler, C., editor, Pnueli, A., editor, Seegmüller, G., editor, Stoer, J., editor, Wirth, N., editor, Gjessing, Stein, editor, and Nygaard, Kristen, editor
- Published
- 1988
- Full Text
- View/download PDF
35. The Design of a Reliable Remote Procedure Call Mechanism
- Author
-
Shrivastava, S. K., Panzieri, F., Gries, David, editor, and Shrivastava, Santosh Kumar, editor
- Published
- 1985
- Full Text
- View/download PDF
36. Structuring Distributed Systems for Recoverability and Crash Resistance
- Author
-
Shrivastava, S. K., Gries, David, editor, and Shrivastava, Santosh Kumar, editor
- Published
- 1985
- Full Text
- View/download PDF
37. A Formally Verified Peak-Power Reduction Technique for Hardware Synthesis from Concurrent Action-Oriented Specifications
- Author
-
Sandeep K. Shukla, Jacob B. Schwartz, and Gaurav Singh
- Subjects
Correctness ,Hardware implementations ,business.industry ,Computer science ,computer.software_genre ,Hardware synthesis ,Embedded system ,Atomic actions ,Electronic engineering ,Compiler ,Electrical and Electronic Engineering ,Latency (engineering) ,business ,computer - Abstract
High-level Concurrent Action-Oriented Specifications (CAOS) of hardware designs based on concurrent atomic actions can be synthesized into efficient hardware implementations as exemplified by the Bluespec Compiler. However, peak-power aware synthesis has not been available for such compilers. In this paper, we propose a technique for peak-power reduction (without unduly compromising latency) during high-level synthesis from CAOS. We demonstrate the efficacy of our technique through experimental results on some benchmark designs from Bluespec Inc. The proposed technique involves rescheduling of the actions of a design, necessitating the verification of resulting hardware against the results of standard synthesis. Thus, we also formally verify various power-minimized designs to ensure that the proposed technique preserves their correctness while reducing the peak-power.
- Published
- 2009
- Full Text
- View/download PDF
38. A calculus of atomic actions
- Author
-
Tayfun Elmas, Serdar Tasiran, and Shaz Qadeer
- Subjects
Atomicity ,Theoretical computer science ,Reduction (recursion theory) ,Programming language ,Computer science ,Separation of concerns ,Aspect-oriented programming ,Concurrency ,computer.software_genre ,medicine.disease ,Computer Graphics and Computer-Aided Design ,Concurrency control ,Proof calculus ,Atomic actions ,Key (cryptography) ,Calculus ,medicine ,Computer Science::Programming Languages ,Rewriting ,computer ,Software ,Calculus (medicine) ,Abstraction (linguistics) - Abstract
We present a proof calculus and method for the static verification of assertions and procedure specifications in shared-memory concurrent programs. The key idea in our approach is to use atomicity as a proof tool and to simplify the verification of assertions by rewriting programs to consist of larger atomic actions. We propose a novel, iterative proof style in which alternating use of abstraction and reduction is exploited to compute larger atomic code blocks in a sound manner. This makes possible the verification of assertions in the transformed program by simple sequential reasoning within atomic blocks, or significantly simplified application of existing concurrent program verification techniques such as the Owicki-Gries or rely-guarantee methods. Our method facilitates a clean separation of concerns where at each phase of the proof, the user worries only about only either the sequential properties or the concurrency control mechanisms in the program. We implemented our method in a tool called QED. We demonstrate the simplicity and effectiveness of our approach on a number of benchmarks including ones with intricate concurrency protocols.
- Published
- 2009
- Full Text
- View/download PDF
39. On the Refinement of Atomic Actions
- Author
-
Gerhard Schellhorn and Richard Banach
- Subjects
General Computer Science ,Computer science ,Diagram ,Theoretical Computer Science ,Development (topology) ,Action (philosophy) ,Atomic actions ,Path (graph theory) ,Computation tree ,Point (geometry) ,ddc:004 ,Algorithm ,Protocol (object-oriented programming) ,Computer Science(all) - Abstract
Inspired by the properties of the refinement development of the Mondex Electronic Purse, we view an atomic action as a family of transitions with a common before-state, and different after-states corresponding to different possible outcomes when the action is attempted. We view a protocol for an atomic action as a computation tree, each branch of which achieves in several steps, one of the outcomes of the atomic action. We show that in this picture, the protocol can be viewed as a relational refinement of the atomic action in a number of ways. Firstly, it yields a 'big diagram' simulation a la ASM. Secondly, it yields a 'small diagram' simulation, in which the atomic action is synchronised with an individual step along each path through the protocol, and all the other steps of the path simulate skip. We show that provided each path through the protocol contains one step synchronised with the atomic action, the choice of synchronisation point can be made freely. We describe the relationship between such synchronisations and forward and backward simulations. We relate this theory to serialisations of system runs containing multiple transactions, and show how existing Mondex refinements embody the ideas developed. Keywords
- Published
- 2008
- Full Text
- View/download PDF
40. Bridging the Gap between Instructional Design and Double Loop Learning
- Author
-
Howard Spoelstra, Rob Koper, Ellen Rusman, Maristella Matera, Jan Van Bruggen, RS-Research Line Learning Networks and Learning Design (part of CO program), and RS-Research Program CELSTEC/OTEC (CO)
- Subjects
Double loop ,Double Loop Learning ,Bridging (networking) ,double loop learning ,Multimedia ,Computer science ,Instructional design ,workflow ,E-learning (theory) ,Distance education ,Educational technology ,instructional design ,computer.software_genre ,atomic actions ,Virtual Company ,Work flow systems ,Computer Science Applications ,Education ,Information and Communications Technology ,Mathematics education ,computer ,e-learning ,Instructional simulation ,Instructional Design - Abstract
The implementation of double-loop-learning-based educational scenarios in instructional design in workflow-like e-learning systems appears to be showing a gap; whereas the former assumes that processes can be reflected upon and can be modified or amended by the learners, the latter only predefines a limited set of rigid instructional processes. However, an important advantage of instructional designs implemented in workflow-like e-learning systems using modeling standards is the ease with which they can be exchanged with other (educational) institutions. The workflow environment described here aims to make learner reflection and change to instructional processes feasible while maintaining portability. We present a description of the implementation of the educational scenario of the virtual company in our workflow environment that makes use of dynamic workflow processes. Learners are provided with process building blocks, called “atomic actions,” which they can use to create and revise processes on the fly, thus supporting double-loop learning.
- Published
- 2008
- Full Text
- View/download PDF
41. Synthesis of Strategies Using the Hoare Logic of Angelic and Demonic Nondeterminism
- Author
-
Konstantinos Mamouras
- Subjects
FOS: Computer and information sciences ,Computer Science - Logic in Computer Science ,General Computer Science ,Computational complexity theory ,Computer science ,Programming language ,Hoare logic ,computer.software_genre ,Theoretical Computer Science ,Logic in Computer Science (cs.LO) ,Formalism (philosophy of mathematics) ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Atomic actions ,F.3.3 ,F.3.1 ,computer - Abstract
We study a propositional variant of Hoare logic that can be used for reasoning about programs that exhibit both angelic and demonic nondeterminism. We work in an uninterpreted setting, where the meaning of the atomic actions is specified axiomatically using hypotheses of a certain form. Our logical formalism is entirely compositional and it subsumes the non-compositional formalism of safety games on finite graphs. We present sound and complete Hoare-style calculi that are useful for establishing partial-correctness assertions, as well as for synthesizing implementations. The computational complexity of the Hoare theory of dual nondeterminism is investigated using operational models, and it is shown that the theory is complete for exponential time.
- Published
- 2016
- Full Text
- View/download PDF
42. ATSyRa: An Integrated Environment for Synthesizing Attack Trees
- Author
-
Mathieu Acher, Didier Vojtisek, and Sophie Pinchinat
- Subjects
Structure (mathematical logic) ,Engineering ,business.industry ,Physical system ,Attack tree ,0102 computer and information sciences ,02 engineering and technology ,16. Peace & justice ,Computer security ,computer.software_genre ,01 natural sciences ,Differentiation rules ,Tree (data structure) ,Computer control ,010201 computation theory & mathematics ,Atomic actions ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,computer - Abstract
Attack trees are widely considered in the fields of security for the analysis of risks (or threats) against electronics, computer control, or physical systems. A major barrier is that attack trees can become largely complex and thus hard to specify. This paper presents ATSyRA, a tooling environment to automatically synthesize attack trees of a system under study. ATSyRA provides advanced editors to specify high-level descriptions of a system, high-level actions to structure the tree, and ways to interactively refine the synthesis. We illustrate how users can specify a military building, abstract and organize attacks, and eventually obtain a readable attack tree.
- Published
- 2016
- Full Text
- View/download PDF
43. An Approach to Splitting Atoms Safely
- Author
-
Cliff B. Jones
- Subjects
Atomicity ,Development (topology) ,General Computer Science ,Distributed computing ,Atomic actions ,Granularity ,Observability ,Interference (wave propagation) ,Mathematics ,Theoretical Computer Science ,Computer Science(all) - Abstract
The intention of this paper is to make a contribution to (compositional) development methods for concurrent programs. The topics touched on include interference, atomicity, observability and granularity. The paper sets out some requirements for an approach to developing systems by ''splitting atoms safely''.
- Published
- 2006
- Full Text
- View/download PDF
44. The atomic manifesto
- Author
-
Henry F. Korth, J. Eliot B. Moss, David B. Lomet, Alan Fekete, Rogério de Lemos, Krithi Ramamritham, Gerhard Weikum, Alexander Romanovsky, Ravi Rajwar, Marie-Claude Gaudel, Cliff B. Jones, Brian Randell, and Luís Rodrigues
- Subjects
Manifesto ,Hardware architecture ,Atomicity ,Correctness ,Transaction processing ,Programming language ,Computer science ,Fault Tolerance ,Fault tolerance ,Dependability ,computer.software_genre ,Formal methods ,Atomic Actions ,Formal Methods ,Transaction Processing ,General Earth and Planetary Sciences ,Transaction processing system ,Systems design ,Database Systems ,Correctness Reasoning ,computer ,Software ,Information Systems ,General Environmental Science - Abstract
This report summarizes the viewpoints and insights gathered in the Dagstuhl Seminar on Atomicity in System Design and Execution, which was attended by 32 people from four different scientific communities: database and transaction processing systems, fault tolerance and dependable systems, formal methods for system design and correctness reasoning, and hardware architecture and programming languages. Each community presents its position in interpreting the notion of atomicity and the existing state of the art, and each community identifies scientific challenges that should be addressed in future work. In addition, the report discusses common themes across communities and strategic research problems that require multiple communities to team up for a viable solution. The general theme of how to specify, implement, compose, and reason about extended and relaxed notions of atomicity is viewed as a key piece in coping with the pressing issue of building and maintaining highly dependable systems that comprise many components with complex interaction patterns.
- Published
- 2005
- Full Text
- View/download PDF
45. Taxonomy of Atomic Actions for Home-Service Robots
- Author
-
Yong K. Hwang, Yuchul Jung, and Hyunseok Kim
- Subjects
Human-Computer Interaction ,Service (business) ,Artificial Intelligence ,business.industry ,Computer science ,Human–computer interaction ,Taxonomy (general) ,Atomic actions ,Robot ,Computer Vision and Pattern Recognition ,Artificial intelligence ,business - Abstract
In household environments, robots are expected to conduct many tasks. It is difficult, however, to write programs for all tasks beforehand ddue to task diversity and changing environmental conditions. One basic task of developing autonomous multifunctional robots is to define a set of basic robot actions that are executed unambiguously and checked for completion. A task planner then uses these actions to accomplish complex tasks that home-service robots are expected to do. This paper first proposes a set of tasks for first-generation home-service robots, then systematically decomposes them into sequences of smaller but meaningful actions called molecular actions. Molecular actions are then broken down into yet more primitive actions called atomic actions. Because vision, sound, range sensors, and force sensors are the main means of monitoring task progress and ompletion, atomic actions are classified based on the complexities and frequencies of the sensing algorithms used. The resulting taxonomy of atomic actions serves as a set of basic building blocks for a knowledge-based task planner. Its advantages are verified and demonstrated through experiments.
- Published
- 2005
- Full Text
- View/download PDF
46. Synthesis of resilient circuits from guarded atomic actions
- Author
-
Hai Zhou and Yuankai Chen
- Subjects
Engineering ,Action (philosophy) ,business.industry ,Concurrency ,Distributed computing ,Embedded system ,Atomic actions ,Transient (computer programming) ,business ,Scaling ,Electronic circuit - Abstract
With aggressive scaling of minimum feature sizes, supply voltages, and design guard-bands, transient faults have become critical issues in modern electronic circuits. Synthesis from guarded atomic actions has been investigated by Arvind et al. to explore non-determinism for hardware concurrency. We show in this work that non-determinism in the guarded atomic actions can be further explored for synthesis of resilient circuits. When an error happens in an atomic action, the action may not need to be recomputed if there exist other feasible actions. Such flexibilities will be increased in the specification and explored in the synthesis for efficient error resiliency. Our synthesis approach expands the solution space and offers the possibility of performance optimization. Experimental results demonstrate the effectiveness and efficiency of our synthesis approach.
- Published
- 2015
- Full Text
- View/download PDF
47. Using STIT theory to talk about strategies
- Author
-
Andreas Herzig, Jan Broersen, Utrecht University [Utrecht], Logique, Interaction, Langue et Calcul (IRIT-LILaC), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, Centre National de la Recherche Scientifique (CNRS), van Benthem, Johan, Ghosh, Sujata, and Verbrugge, Rineke
- Subjects
Cognitive science ,Semantics (computer science) ,Computer science ,Context (language use) ,0102 computer and information sciences ,06 humanities and the arts ,seeing-to-it-that ,logics of agency ,0603 philosophy, ethics and religion ,STIT ,01 natural sciences ,logic of action ,Extensive-form game ,theory of action ,processes and strategies ,010201 computation theory & mathematics ,extensive form games ,060302 philosophy ,Atomic actions ,[INFO]Computer Science [cs] ,strategy - Abstract
International audience; This chapter gives an overview of logical theories of ‘seeing-to-it-that’, commonly abbreviated stit, and focusses on the notion of ‘strategy’ as used in their semantics. The chapter covers both ‘one-step’ strategies (i.e., atomic actions) and long-term strategies and explains how they give semantics to different stit languages. Furthermore, the chapter discusses how extensions with epistemic operators can be used to clarify the problem of uniform strategies. Finally, it is shown how strategic stit theories disambiguate some seemingly paradoxical observations recently made in the context of logics of strategic ability (ATL).
- Published
- 2015
- Full Text
- View/download PDF
48. Synthesis of Strategies and the Hoare Logic of Angelic Nondeterminism
- Author
-
Konstantinos Mamouras
- Subjects
Formalism (philosophy of mathematics) ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Computational complexity theory ,Programming language ,Computer science ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Atomic actions ,Hoare logic ,computer.software_genre ,computer ,Axiomatic semantics - Abstract
We study a propositional variant of Hoare logic that can be used for reasoning about programs that exhibit both angelic and demonic nondeterminism. We work in an uninterpreted setting, where the meaning of the atomic actions is specified axiomatically using hypotheses of a certain form. Our logical formalism is entirely compositional and it subsumes the non-compositional formalism of safety games on finite graphs. We present sound and complete Hoare-style (partial-correctness) calculi that are useful for establishing Hoare assertions, as well as for synthesizing implementations. The computational complexity of the Hoare theory of dual nondeterminism is investigated using operational models, and it is shown that the theory is complete for exponential time.
- Published
- 2015
- Full Text
- View/download PDF
49. Corrigendum to 'Sparse Composition of Body Poses and Atomic Actions for Human Activity Recognition in RGB-D Videos' [Image Vis. Comput. 59 (2017) 63-75]
- Author
-
Ivan Lillo, Alvaro Soto, and Juan Carlos Niebles
- Subjects
business.industry ,Computer science ,020207 software engineering ,02 engineering and technology ,01 natural sciences ,Image (mathematics) ,010309 optics ,Activity recognition ,Computer graphics (images) ,0103 physical sciences ,Signal Processing ,Atomic actions ,0202 electrical engineering, electronic engineering, information engineering ,Computer vision ,Computer Vision and Pattern Recognition ,Artificial intelligence ,business ,Composition (language) - Published
- 2017
- Full Text
- View/download PDF
50. [Untitled]
- Author
-
Bernd van Linder, John-Jules Ch. Meyer, and Wiebe van der Hoek
- Subjects
Nondeterministic algorithm ,History and Philosophy of Science ,Action (philosophy) ,Logic ,Computer science ,business.industry ,Semantics (computer science) ,Computation ,Atomic actions ,Artificial intelligence ,Computational linguistics ,business ,Temporal logic of actions - Abstract
We demonstrate ways to incorporate nondeterminism in a system designed to formalize the reasoning of agents concerning their abilities and the results of the actions that they may perform. We distinguish between two kinds of nondeterministic choice operators: one that expresses an internal choice, in which the agent decides what action to take, and one that expresses an external choice, which cannot be influenced by the agent. The presence of abilities in our system is the reason why the usual approaches towards nondeterminism cannot be used here. The semantics that we define for nondeterministic actions is based on the idea that composite actions are unravelled in the strings of atomic actions and tests that constitute them. The main notions used in defining this semantics are finite computation sequences and finite computation runs of actions. The results that we obtain meet our intuitions regarding events and abilities in the presence of nondeterminism.
- Published
- 2000
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.