Advances in distributed sensor technology
https://doi.org/10.1109/MPDT.1996.7102340…
2 pages
1 file
Sign up for access to the world's latest research
Abstract
AI
AI
Advances in Distributed Sensor Technology reviews the utility of distributed sensor systems, emphasizing sensor fusion, routing, and modeling algorithms. While it does not serve well as a conventional textbook due to its specialized content, it provides valuable insights and problems suitable for graduate engineering courses and practitioners in the field.
Related papers
IEEE Concurrency, 1997
In 2013-14, nine technical leaders wrote a report, entitled IEEE CS 2022, surveying 23 innovative technologies that could change the industry by the year 2022. The report covers security cross-cutting issues, open intellectual property movement, sustainability, massively online open courses, quantum computing, device and nanotechnology, device and nanotechnology, 3D integrated circuits, multicore, photonics, universal memory, networking and interconnectivity, software-defined networks, high-performance computing, cloud computing, the Internet of Things, natural user interfaces, 3D printing, big data and analytics, machine learning and intelligent systems, computer vision and pattern recognition, life sciences, computational biology and bioinformatics, and robotics for medical care.
The objective of CACIC is to provide a forum within which to promote the development of Computer Science as an academic discipline with industrial applications, trying to extend the frontier of both the state of the art and the state of the practice. The main audience for, and participants in, CACIC are seen as researchers in academic departments, laboratories and industrial software organizations. CACIC started in 1995 as a Congress organized by the Network of National Universities with courses of study in Computer Science (RedUNCI), and each year it is hosted by one of these Universities. RedUNCI has a permanent Web site where its history and organization are described: http:// redunci.info.unlp.edu.ar. CACIC 2011 in La Plata CACIC'11 was the seventeenth Congress in the CACIC series. It was organized by the School of Computer Science of the University of La Plata. The Congress included 11 Workshops with 148 accepted papers, 3 main Conference, 4 invited tutorials, different meetings related with Computer Science Education (Professors, PhD students, Curricula) and an International School with 5 courses. (http://www.cacic2011.edu.ar/). CACIC 2011 was organized following the traditional Congress format, with 11 Workshops covering a diversity of dimensions of Computer Science Research. Each topic was supervised by a committee of three chairs of different Universities. The call for papers attracted a total of 281 submissions. An average of 2.5 review reports were collected for each paper, for a grand total of 702 review reports that involved about 400 different reviewers. A total of 148 full papers, involving 393 authors and 77 Universities, were accepted and 25 of them were selected for this book.
Communications of the ACM, 2011
1996
These lecture notes under development and constant revision, like the eld itself have been used at MIT in a graduate course rst o ered by Alan Edelman and Shang-Hua Teng during the spring of 1994 MIT 18.337, Parallel Scienti c Computing. This rst class had about forty students from a variety of disciplines which include Applied Mathematics, Computer Science, Mechanical Engineering, Chemical Engineering, Aeronautics and Aerospace, and Applied Physics. Because of the diverse backgrounds of the students, the course, by necessity, w as designed to be of interest to engineers, computer scientists, and applied mathematicians. Our course covers a mixture of material that we feel students should be exposed to. Our primary focus is on modern numerical algorithms for scienti c computing, and also on the historical trends in architectures. At the same time, we h a ve always felt that students and the professors must su er through hands-on experience with modern parallel machines. Some students enjoy ghting new machines; others scream and complain. This is the reality of the subject. In 1995, the course was taught again by Alan Edelman with an additional emphasis on the use of portable parallel software tools. The sad truth was that there were not yet enough fully developed tools to be used. The situation is currently improving. During 1994 and 1995 our students programmed the 128 node Connection Machine CM5. This machine was the 35th most powerful computer in the world in 1994, then the very same machine was the 74th most powerful machine in the spring of 1995. At the time of writing, December 1995, this machine has sunk to position 136. The fastest machine in the world is currently in Japan. In the 1996 course we used the IBM SP-2 and Boston University's SGI machines. In addition to coauthors Shang-Hua Teng and Robert Schreiber, I would like to thank our numerous students who have written and commented on these notes and have also prepared many o f the diagrams. We also thank the students from Minnesota SCIC 8001 and the summer course held at MIT, Summer 6.50s also taught b y Rob Schreiber for all of their valuable suggestions. These notes will probably evolve i n to a book which will eventually be coauthored by Rob Schreiber and Shang-Hua Teng. Meanwhile, we are fully aware that the 1996 notes are incomplete, contain mathematical and grammatical errors, and do not cover everything we wish. They are an improvement o ver the 1995 notes, but not as good as the 1997 notes will be. I view these notes as a basis on which t o improve, not as a completed book. It has been our experience that some students of pure mathematics and theoretical computer science are a bit fearful of programming real parallel machines. Students of engineering and computer science are sometimes intimidated by mathematics. The most successful students understand that computing is not dirty" and mathematical knowledge is not scary" or useless," but both require hard work and maturity to master. The good news is that there are many jobs both in the industrial and academic sectors for experts in the eld! A good course should have a good theme. We try to emphasize the fundamental algorithmic ideas and machine design principles. We h a ve seen computer vendors come and go, but we believe that the mathematical, algorithmic, and numerical ideas discussed in these notes provide a solid foundation that will last for many y ears.
2018
With increasing volumes in data and more sophisticated machine learning algorithms, the demand for fast and energy efficient computation systems is also growing. To meet this demand, two approaches are possible: First, machine learning algorithms can be tailored specifically for the hardware at hand. Second, instead of changing the algorithm we can change the hardware to suit the machine learning algorithms better. This report briefly discusses my last years' work which focused largely on the first approach and quickly outlines some ideas for future research.
IEEE Micro, 2000
A lO-year program will lay the technological foundations for the next century's information society. MI11 expects future information systems to be based on a flexible integration of mas sively parallel computing, optical computing, neural computing, and logic programmin g. The Real World Computing program aims to establish theoretical foundations for these technolo gies, explore applications, and study how they can be integrated. [David Kahaner is on assignment with the us Office of Naval Research. He generally comments on activities in the Far East for inclusion in the Software Report column. Since we felt readers would be interested in a detailed deSCription of Japan's lO-year computing plans, we also offer this special nport. His comments are his own; they do not e:xpress any of ficial policy.-bd.l Lihe Real World Computing program (also called the New [nfornlation Pro cessing Technology program) is a 10year program sponsored by Japan's Ministry of International Trade and Industry (MIT!) to lay the technological foundations for the infor mation society that Japan anticipates in the next century. The RWC program replaces the well known and much-discussed Fifth Generation project. This report sununarizes the draft prepared by the RWC program's Feasibility Study Commit tee as presented in Tokyo March 2-3, 1992, at what was called RWC 92, the Second NJPT Work shop. My earlier reports in the June 1991 Cp. 1 n and June 1992 Cp. 71) issues of IEEE Micro also dealt with this program. MIT! expects information system� of the next century to be based on several technologies (as opposed to a single, key technology): massively parallel computing, optical computing, neural com puting, and logic programmin g. The RWC pro gram aims to estahlish theoretical foundations for these technologies. explore applications, and study how they can be integrated. Flexible integration is an important goal for infonnation systems that can deal with real-world problems. Program organiz ers see computing systems as evolving from con ventional computing with numbers, documents, and data through fifth-generation (logic-based) computing, in which knowledge is processed, to flexible information processing, in which intuitive infonnation can be processed. Flexible processing is the heart of the RWC program. Example applications include incom pletely specified (ill-defined) problems such as understanding situations in a noisy environment, large-scale problems such as simulating social and economic phenomena, and real-time problems such as constructing man-machine interfaces with virtual reality. The RWC program professes two main tech nological aims: • To develop the computational bases. This ef fort includes separate research on general purpose maSSively parallel systems and special-purpose neural systems, optical com puting and optical devices, and system integration. • To formulate theoretical foundations and then develop "novel" functions. Theoretical foundations include all aspect� of represen tation, storage, and recall of information; 0272-1732192/0800-0070$03.00 © 1992 IEEE The RWC program will be organized around the fol lowing fundamental policies:
Lecture Notes in Computer Science, 2004
We summarize the Computational Engineering and Science program at the University of Utah. Program requirements as well as related research areas are outlined. To obtain the MS degree in CES, a student must complete courses and present original research in scientific computing, scientific visualization, mathematical modeling, and the case studies in CES. The outlined research areas include scientific visualization, computational combustion, computational physics, computational chemistry, mathematical and computational biology, and computational medicine. 1 Computational Engineering and Science Program The grand computational challenges in engineering and science require for their resolution a new scientific approach. As one report points out, "The use of modern computers in scientific and engineering research and development over the last three decades has led to the inescapable conclusion that a third branch of scientific methodology has been created. It is now widely acknowledged that, along with traditional experimental and theoretical methodologies, advanced work in all areas of science and technology has come to rely critically on the computational approach." This methodology represents a new intellectual paradigm for scientific exploration and visualization of scientific phenomena. It permits a new approach to the solution of problems that were previously inaccessible. At present, too few researchers have the training and expertise necessary to utilize fully the opportunities presented by this new methodology; more importantly, traditional educational programs do not adequately prepare students to take advantage of these opportunities.
The work described in this report has in part been supported by the Commission of the European Communities through the IST program under contract IST-2002-507932. The information in this document is provided as is, and no warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability.