Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Experimental and simulation study of a four-degree of freedom robot arm moving through space planner path
International Journal of Computational Vision and Robotics (IJCVR), Volume 14, Issue 6Pages 631–653https://doi.org/10.1504/ijcvr.2024.141813In this work, a 4-DOF robot arm manipulator was built and tested using the software programs LABVIEW and SOLIDWORKS. The model tracks a horizontal path at four times periods and is tested in experimental and theoretical environments. The aim study of ...
- research-articleSeptember 2023
PAWS: Personalized Arm and Wrist Movements With Sensitivity Mappings for Controller-Free Locomotion in Virtual Reality
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 7, Issue MHCIArticle No.: 217, Pages 1–21https://doi.org/10.1145/3604264Virtual Reality (VR) headsets equipped with multiple cameras enable hands-only teleportation techniques without requiring any physical controller. Hands-only teleportation is an effective alternative to controllers for navigation tasks in virtual ...
- research-articleJune 2022
Understanding Memory Failures on a Petascale Arm System
HPDC '22: Proceedings of the 31st International Symposium on High-Performance Parallel and Distributed ComputingPages 84–96https://doi.org/10.1145/3502181.3531465New and novel HPC platforms provide interesting challenges and opportunities. Analysis of these systems can provide a better understanding of both the specific platform being studied as well as large-scale systems in general. Arm is one such ...
- research-articleJune 2022
HiEngine: How to Architect a Cloud-Native Memory-Optimized Database Engine
SIGMOD '22: Proceedings of the 2022 International Conference on Management of DataPages 2177–2190https://doi.org/10.1145/3514221.3526043Fast database engines have become an essential building block in many systems and applications. Yet most of them are designed based on on-premise solutions and do not directly work in the cloud. Existing cloud-native database systems are mostly disk ...
- research-articleApril 2022
More Ada in non-Ada systems
ACM SIGAda Ada Letters (SIGADA), Volume 41, Issue 2Pages 71–76https://doi.org/10.1145/3530801.3530806This article is based on the industrial presentation "More Ada in non-Ada systems" which was given at the 2021 Ada-Europe virtual conference.
The presentation was an update to the presentation given at the Ada-Europe 2018 conference in Lisbon entitled "...
-
- research-articleNovember 2020
Chronicles of astra: challenges and lessons from the first petascale arm supercomputer
- Kevin Pedretti,
- Andrew J. Younge,
- Simon D. Hammond,
- James H. Laros,
- Matthew L. Curry,
- Michael J. Aguilar,
- Robert J. Hoekstra,
- Ron Brightwell
SC '20: Proceedings of the International Conference for High Performance Computing, Networking, Storage and AnalysisArticle No.: 48, Pages 1–14Arm processors have been explored in HPC for several years, however there has not yet been a demonstration of viability for supporting large-scale production workloads. In this paper, we offer a retrospective on the process of bringing up Astra, the ...
- research-articleDecember 2019
Applicability of Serverless Computing in Fog Computing Environments for IoT Scenarios
UCC '19 Companion: Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing CompanionPages 29–34https://doi.org/10.1145/3368235.3368834With new paradigms to deliver software, a programmer's utopia is close to becoming reality, where she only focuses on the realization of an application without messing around with infrastructural limitations and deployment considerations. Currently, ...
- research-articleJuly 2019
Undermining User Privacy on Mobile Devices Using AI
Asia CCS '19: Proceedings of the 2019 ACM Asia Conference on Computer and Communications SecurityPages 214–227https://doi.org/10.1145/3321705.3329804Over the past years, literature has shown that attacks exploiting the microarchitecture of modern processors pose a serious threat to user privacy. This is because applications leave distinct footprints in the processor, which malware can use to infer ...
- posterFebruary 2019
Design and Implementation of a Deterministic FPGA Router on a CPU+FPGA Acceleration Platform
FPGA '19: Proceedings of the 2019 ACM/SIGDA International Symposium on Field-Programmable Gate ArraysPage 186https://doi.org/10.1145/3289602.3293966FPGA routing is one the longest steps in FPGA compilation, often preventing fast edit-compile-test cycles in prototyping and development. There have been attempts to accelerate FPGA routing using algorithmic improvements, multi-core or multi-CPU ...
- abstractMarch 2017
Ontology-Based Situation Awareness Support for Shared Control: Extended Abstract
HRI '17: Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human-Robot InteractionPages 289–290https://doi.org/10.1145/3029798.3038431Situation Awareness (SA) during tele-operation in robot-assisted disaster management has a major impact on the effectiveness and efficiency. Data perceived by the human and robot agents should be processed and shared in such a way that these agents can ...
- research-articleApril 2015
OmniVib: Towards Cross-body Spatiotemporal Vibrotactile Notifications for Mobile Phones
CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing SystemsPages 2487–2496https://doi.org/10.1145/2702123.2702341Previous works illustrate that one's palm can reliably recognize 10 or more spatiotemporal vibrotactile patterns. However, recognition of the same patterns on other body parts is unknown. In this paper, we investigate how users perceive spatiotemporal ...
- research-articleMarch 2015
Protecting Data on Smartphones and Tablets from Memory Attacks
- Patrick Colp,
- Jiawen Zhang,
- James Gleeson,
- Sahil Suneja,
- Eyal de Lara,
- Himanshu Raj,
- Stefan Saroiu,
- Alec Wolman
ASPLOS '15: Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating SystemsPages 177–189https://doi.org/10.1145/2694344.2694380Smartphones and tablets are easily lost or stolen. This makes them susceptible to an inexpensive class of memory attacks, such as cold-boot attacks, using a bus monitor to observe the memory bus, and DMA attacks. This paper describes Sentry, a system ...
Also Published in:
ACM SIGPLAN Notices: Volume 50 Issue 4ACM SIGARCH Computer Architecture News: Volume 43 Issue 1 - ArticleAugust 2014
Platform Device Assignment to KVM-on-ARM Virtual Machines via VFIO
EUC '14: Proceedings of the 2014 12th IEEE International Conference on Embedded and Ubiquitous ComputingPages 170–177https://doi.org/10.1109/EUC.2014.32VFIO (Virtual Function I/O) is a Linux kernel infrastructure that allows to leverage the capabilities of modern IOMMUs to drive a device directly from user space without any additional specialized kernel driver being involved. When used by QEMU/KVM, a ...
- research-articleFebruary 2014
KVM/ARM: the design and implementation of the linux ARM hypervisor
ASPLOS '14: Proceedings of the 19th international conference on Architectural support for programming languages and operating systemsPages 333–348https://doi.org/10.1145/2541940.2541946As ARM CPUs become increasingly common in mobile devices and servers, there is a growing demand for providing the benefits of virtualization for ARM-based devices. We present our experiences building the Linux ARM hypervisor, KVM/ARM, the first full ...
Also Published in:
ACM SIGPLAN Notices: Volume 49 Issue 4ACM SIGARCH Computer Architecture News: Volume 42 Issue 1 - ArticleJune 2013
Evaluation of a Server-Grade Software-Only ARM Hypervisor
CLOUD '13: Proceedings of the 2013 IEEE Sixth International Conference on Cloud ComputingPages 855–862https://doi.org/10.1109/CLOUD.2013.71Because of its enormous popularity in embedded systems and mobile devices, ARM CPU is arguably the most used CPU in the world. The resulting economies of scale benefit entices system architects to ponder the feasibility of building lower-cost and lower-...
- ArticleApril 2012
Modeling and simulation applied for robotics manipulator's driving
The present paper will impose a driving strategy for a particular nonlinear system, for example for a robot consists of a single segment, which has a flexible hinge. Transmission is more accurate, with a line size of the input provided by engine torque. ...
- posterOctober 2011
Poster: control-flow integrity for smartphones
- Lucas Davi,
- Alexandra Dmitrienko,
- Manuel Egele,
- Thomas Fischer,
- Thorsten Holz,
- Ralf Hund,
- Stefan Nürnberger,
- Ahmad-Reza Sadeghi
CCS '11: Proceedings of the 18th ACM conference on Computer and communications securityPages 749–752https://doi.org/10.1145/2046707.2093484Despite extensive research over the last two decades, runtime attacks on software are still prevalent. Recently, smartphones, of which millions are in use today, have become an attractive target for adversaries. However, existing solutions are either ad-...
- research-articleOctober 2010
Return-oriented programming without returns
CCS '10: Proceedings of the 17th ACM conference on Computer and communications securityPages 559–572https://doi.org/10.1145/1866307.1866370We show that on both the x86 and ARM architectures it is possible to mount return-oriented programming attacks without using return instructions. Our attacks instead make use of certain instruction sequences that behave like a return, which occur with ...
- ArticleMarch 2010
Pint-sized military UAV engine's tele-adjusting arm based on force feedback
Based on the demand for security of pint-sized UAV engine's adjustment, this paper studied a UAV engine's remote control adjusting arm. The position differential signal of the master adjusting device and slave executive component was used to control the ...
- ArticleDecember 2009
An Embedded Measurement and Control System for Hydrological Cable-Way
ICIII '09: Proceedings of the 2009 International Conference on Information Management, Innovation Management and Industrial Engineering - Volume 01Pages 183–186https://doi.org/10.1109/ICIII.2009.51The collection and measurement of hydrologic data is significant to water conservancy project construction, flood control and drought relief. An embedded measurement and control system for hydrological cable-way was proposed to solve the current ...