首页 > 最新文献

Proceedings of the 2014 ACM Southeast Regional Conference最新文献

英文 中文
DIP
Pub Date : 2022-04-18 DOI: 10.1145/3476883.3520226
Daniel Plaisted, Mengjun Xie
Certain classes of log analytical models, such as those for log anomaly detection, require as inputs sequences of parsed log messages in which the message tokens that belong to the template of the message are indicated. For this reason, it is common for such a model to employ a log parser, a program that detects the template of each message in a log file. It has been shown that even the most accurate log parsers in the literature fail to achieve high accuracy at detecting the templates of messages from certain systems' log files. This paper presents DIP, a tree-based log parser. The primary methodological innovation of DIP lies in the mechanism it uses to determine whether pairs of very similar messages have the same template. While many existing parsers only consider the percentage of matching tokens between two similar messages in determining whether they have the same template, DIP considers in addition the actual tokens at which the two messages disagree, deeming a pair of similar messages to have the same template if and only if each of those tokens satisfies one in a certain set of three conditions. Our experimental results show that DIP can achieve an average accuracy that is superior to that obtained by each of the 13 parsers tested in a 2019 survey study on log parsers. Furthermore, we give evidence that it achieves this high accuracy without compromising in terms of runtime.
{"title":"DIP","authors":"Daniel Plaisted, Mengjun Xie","doi":"10.1145/3476883.3520226","DOIUrl":"https://doi.org/10.1145/3476883.3520226","url":null,"abstract":"Certain classes of log analytical models, such as those for log anomaly detection, require as inputs sequences of parsed log messages in which the message tokens that belong to the template of the message are indicated. For this reason, it is common for such a model to employ a log parser, a program that detects the template of each message in a log file. It has been shown that even the most accurate log parsers in the literature fail to achieve high accuracy at detecting the templates of messages from certain systems' log files. This paper presents DIP, a tree-based log parser. The primary methodological innovation of DIP lies in the mechanism it uses to determine whether pairs of very similar messages have the same template. While many existing parsers only consider the percentage of matching tokens between two similar messages in determining whether they have the same template, DIP considers in addition the actual tokens at which the two messages disagree, deeming a pair of similar messages to have the same template if and only if each of those tokens satisfies one in a certain set of three conditions. Our experimental results show that DIP can achieve an average accuracy that is superior to that obtained by each of the 13 parsers tested in a 2019 survey study on log parsers. Furthermore, we give evidence that it achieves this high accuracy without compromising in terms of runtime.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76616972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ReDPro
Pub Date : 2022-04-18 DOI: 10.1145/3476883.3520207
T. S. Zaman, Tariqul Islam
Process-level concurrency failures occur when multiple processes read and write a shared data item without proper synchronization. Process-level failures are difficult to detect because they are sensitive to the execution order of system calls. These failures can not be detected unless a specific system-call interleaving is exercised during testing. A common practice when testing or debugging concurrency failures is to execute many runs of a program with the hope of exercising interleaving that causes races known as stress testing. However, existing research prove that stress testing is neither efficient nor reproducible. In this paper, we presented an automated technique, RedPro that can detect process-level races and also regenerate the failures. We used a binary instrumentation tool named PIN for run-time monitoring and controlling the order of execution for potential race pairs. We evaluated the performance of RedPro by detecting and regenerating nine real-world bugs. The result demonstrates that our proposed technique is both effective and efficient.
{"title":"ReDPro","authors":"T. S. Zaman, Tariqul Islam","doi":"10.1145/3476883.3520207","DOIUrl":"https://doi.org/10.1145/3476883.3520207","url":null,"abstract":"Process-level concurrency failures occur when multiple processes read and write a shared data item without proper synchronization. Process-level failures are difficult to detect because they are sensitive to the execution order of system calls. These failures can not be detected unless a specific system-call interleaving is exercised during testing. A common practice when testing or debugging concurrency failures is to execute many runs of a program with the hope of exercising interleaving that causes races known as stress testing. However, existing research prove that stress testing is neither efficient nor reproducible. In this paper, we presented an automated technique, RedPro that can detect process-level races and also regenerate the failures. We used a binary instrumentation tool named PIN for run-time monitoring and controlling the order of execution for potential race pairs. We evaluated the performance of RedPro by detecting and regenerating nine real-world bugs. The result demonstrates that our proposed technique is both effective and efficient.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81653089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bluu
Pub Date : 2022-04-18 DOI: 10.1145/3476883.3520215
Nicanor Vergara, H. ElAarag
The use of e-cigarettes and vape devices by teenagers and young adults is a concern to many people. Juul is the most notable manufacturer of these kinds of devices. They market their product as a solution to the smoking pandemic. Juul has implemented a proprietary Bluetooth-capable device, the Juul C1, outside of the United States but it utilizes that technology to merely lock the device or locate it. At one point, the Juul C1 had a functionality to monitor the nicotine consumption of users to go along with their initial advertisements of their e-cigarettes being a means to quit smoking. However, they removed this functionality without providing any reasons. In this project, we plan to revitalize this function to help consumers reach their objective of using these devices. Consumers will be able to use a Juul device for the purpose of rehabilitating from their smoking habits. In this paper we present a modified Juul device, called Bluu, that connects with an app on one's phone to track nicotine consumption. This could lead to more responsible vaping by the youth, or improves utility towards research regarding e-cigarette usage.
{"title":"Bluu","authors":"Nicanor Vergara, H. ElAarag","doi":"10.1145/3476883.3520215","DOIUrl":"https://doi.org/10.1145/3476883.3520215","url":null,"abstract":"The use of e-cigarettes and vape devices by teenagers and young adults is a concern to many people. Juul is the most notable manufacturer of these kinds of devices. They market their product as a solution to the smoking pandemic. Juul has implemented a proprietary Bluetooth-capable device, the Juul C1, outside of the United States but it utilizes that technology to merely lock the device or locate it. At one point, the Juul C1 had a functionality to monitor the nicotine consumption of users to go along with their initial advertisements of their e-cigarettes being a means to quit smoking. However, they removed this functionality without providing any reasons. In this project, we plan to revitalize this function to help consumers reach their objective of using these devices. Consumers will be able to use a Juul device for the purpose of rehabilitating from their smoking habits. In this paper we present a modified Juul device, called Bluu, that connects with an app on one's phone to track nicotine consumption. This could lead to more responsible vaping by the youth, or improves utility towards research regarding e-cigarette usage.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77205455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ClearCommPrivacy ClearCommPrivacy
Pub Date : 2022-04-18 DOI: 10.1145/3476883.3520231
Elijah B. Neundorfer, Alfredo J. Perez
Informing users of Android apps' privacy behavior is crucial to maintain transparency. In the past, approaches have been developed to communicate app privacy behavior based on frameworks that require extensive APIs, new permission models, entirely new Operating Systems (OS), and/or third-party plugins/tools to assist developers. In this work, we present ClearCommPrivacy, a User Interface (UI) template for Android apps to convey privacy/permission information in an app by a developer familiar with an app's privacy behavior using a standardized code template and two XML files. We present the design of ClearCommPrivacy and some basic evaluation results.
{"title":"ClearCommPrivacy","authors":"Elijah B. Neundorfer, Alfredo J. Perez","doi":"10.1145/3476883.3520231","DOIUrl":"https://doi.org/10.1145/3476883.3520231","url":null,"abstract":"Informing users of Android apps' privacy behavior is crucial to maintain transparency. In the past, approaches have been developed to communicate app privacy behavior based on frameworks that require extensive APIs, new permission models, entirely new Operating Systems (OS), and/or third-party plugins/tools to assist developers. In this work, we present ClearCommPrivacy, a User Interface (UI) template for Android apps to convey privacy/permission information in an app by a developer familiar with an app's privacy behavior using a standardized code template and two XML files. We present the design of ClearCommPrivacy and some basic evaluation results.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74365763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18 - 20, 2022 ACM SE '22: 2022 ACM东南会议,虚拟事件,2022年4月18日至20日
Pub Date : 2022-01-01 DOI: 10.1145/3476883
{"title":"ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18 - 20, 2022","authors":"","doi":"10.1145/3476883","DOIUrl":"https://doi.org/10.1145/3476883","url":null,"abstract":"","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84033040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACM SE '21: 2021 ACM Southeast Conference, Virtual Event, USA, April 15-17, 2021 ACM SE '21: 2021 ACM东南会议,虚拟活动,美国,2021年4月15日至17日
Pub Date : 2021-01-01 DOI: 10.1145/3409334
{"title":"ACM SE '21: 2021 ACM Southeast Conference, Virtual Event, USA, April 15-17, 2021","authors":"","doi":"10.1145/3409334","DOIUrl":"https://doi.org/10.1145/3409334","url":null,"abstract":"","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84610041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Cluster Computing by Creating a Raspberry Pi Cluster 通过创建树莓派集群学习集群计算
Pub Date : 2017-04-13 DOI: 10.1145/3077286.3077324
K. Doucet, Jian Zhang
The study of cluster computing and its applications are vital to the future of computer science. By linking a group of computers to provide more processing power than one computer can alone, this is the principle upon which modern supercomputers are built. This short paper describes a student's learning experience in cluster computing. As part of the Texas Woman's University's Quality Enhancement project, the student received funding to purchase computing components to create a low-cost cluster computer using 5 Raspberry Pis. The data collected from experiments running on the cluster computer is compared to those from a single Raspberry Pi. The results from those experiments are presented in the paper.
集群计算及其应用的研究对计算机科学的未来至关重要。通过将一组计算机连接起来,以提供比一台计算机单独处理能力更强的处理能力,这就是现代超级计算机构建的原理。这篇短文描述了一个学生学习集群计算的经历。作为德克萨斯女子大学质量提升项目的一部分,该学生获得了资金,用于购买计算组件,使用5颗树莓派创建一个低成本的集群计算机。从集群计算机上运行的实验收集的数据与从单个树莓派上收集的数据进行比较。本文给出了这些实验的结果。
{"title":"Learning Cluster Computing by Creating a Raspberry Pi Cluster","authors":"K. Doucet, Jian Zhang","doi":"10.1145/3077286.3077324","DOIUrl":"https://doi.org/10.1145/3077286.3077324","url":null,"abstract":"The study of cluster computing and its applications are vital to the future of computer science. By linking a group of computers to provide more processing power than one computer can alone, this is the principle upon which modern supercomputers are built. This short paper describes a student's learning experience in cluster computing. As part of the Texas Woman's University's Quality Enhancement project, the student received funding to purchase computing components to create a low-cost cluster computer using 5 Raspberry Pis. The data collected from experiments running on the cluster computer is compared to those from a single Raspberry Pi. The results from those experiments are presented in the paper.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75759644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Introducing IJam Wireless De-authentication Attack Tool 介绍IJam无线反认证攻击工具
Pub Date : 2017-04-13 DOI: 10.1145/3077286.3077316
Haitham Al-Ani, Ahmed Al-Zubidy
Wi-Fi is a ubiquitous medium; more devices are increasingly using this ubiquitous medium nowadays. For that reason, the importance of Wi-Fi security is increasing as well. Attackers find it an interesting target to execute many types of attacks on it. One of those attacks is the de-authentication attack. There are multiple tools that conduct such an attack and each tool has its pros and cons. In this paper, we present a tool that we have designed to execute the de-authentication attack and compare it with other similar tools. The results show our tool is more usable, but with slightly more time than the other tools.
Wi-Fi是一种无处不在的媒介;如今越来越多的设备使用这种无处不在的媒介。出于这个原因,Wi-Fi安全的重要性也在增加。攻击者发现它是一个有趣的目标,可以对其执行多种类型的攻击。其中一种攻击是去认证攻击。有多种工具可以进行这种攻击,每种工具都有其优点和缺点。在本文中,我们提出了一个我们设计的执行去认证攻击的工具,并将其与其他类似工具进行比较。结果表明,我们的工具更有用,但比其他工具花费的时间稍微多一些。
{"title":"Introducing IJam Wireless De-authentication Attack Tool","authors":"Haitham Al-Ani, Ahmed Al-Zubidy","doi":"10.1145/3077286.3077316","DOIUrl":"https://doi.org/10.1145/3077286.3077316","url":null,"abstract":"Wi-Fi is a ubiquitous medium; more devices are increasingly using this ubiquitous medium nowadays. For that reason, the importance of Wi-Fi security is increasing as well. Attackers find it an interesting target to execute many types of attacks on it. One of those attacks is the de-authentication attack. There are multiple tools that conduct such an attack and each tool has its pros and cons. In this paper, we present a tool that we have designed to execute the de-authentication attack and compare it with other similar tools. The results show our tool is more usable, but with slightly more time than the other tools.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72673566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Determining the Penetration Threshold for an ASA 5500 Firewall 确定ASA 5500防火墙的渗透阈值
Pub Date : 2017-04-13 DOI: 10.1145/3077286.3077305
J. Gill, Kazi Zunnurhain
The technology of today is dramatically more advanced than it was 30 years ago. With fiber optic cables becoming ever more present and the rapid expansion of storage, the volume of data passing through these devices is also becoming more abundant. Over time, it has become easier to launch many kinds of attacks. These attacks are often launched from one computer sending huge amounts of spoofed data for several minutes. It is no surprise then that multiple computers launching an attack will create a dire situation regardless of which PC or server is being attacked. A Denial of Service (DoS) attack occurs when an attacker floods a computer or server with illegitimate data so that the system will deny service to a legitimate user [3]. This occurs because that system is now lacking the resources to handle any more data. A Distributed DoS (DDoS) attack is the same idea, but amplified. A DDoS attack involves multiple systems striking a single target and flooding that target with data, overloading the target's computers, servers, and firewalls [3]. This often causes the physical devices to exhaust and deny legitimate requests. As if that wasn't enough, the attacker can plant a virus or Trojan in the system once they gain access to further sabotage the target. These types of attacks are very damaging to companies all around the world. That is where the Cisco ASA 5500 series firewall comes in. In this paper, we will be examining how efficiently a firewall of this type can defend against a DoS attack and a DDoS attack, and what adverse effects are displayed after the attacks have occurred.
今天的技术比30年前先进得多。随着光纤电缆的日益普及和存储容量的迅速扩大,通过这些设备的数据量也变得越来越大。随着时间的推移,发起各种攻击变得越来越容易。这些攻击通常是从一台计算机发起的,在几分钟内发送大量的欺骗数据。因此,无论哪台PC或服务器受到攻击,多台计算机发起攻击都会造成可怕的局面,这一点也不奇怪。当攻击者向计算机或服务器发送大量非法数据,从而使系统拒绝向合法用户提供服务时,就会发生拒绝服务(DoS)攻击[3]。这是因为该系统现在缺乏处理更多数据的资源。分布式DoS (DDoS)攻击是相同的思想,但被放大了。DDoS攻击涉及多个系统攻击单个目标,并向目标发送大量数据,使目标的计算机、服务器和防火墙过载[3]。这通常会导致物理设备耗尽并拒绝合法请求。如果这还不够,攻击者可以在系统中植入病毒或木马,一旦他们获得访问权限,进一步破坏目标。这些类型的攻击对世界各地的公司都是非常具有破坏性的。这就是思科ASA 5500系列防火墙的用武之地。在本文中,我们将研究这种类型的防火墙如何有效地防御DoS攻击和DDoS攻击,以及攻击发生后显示的不利影响。
{"title":"Determining the Penetration Threshold for an ASA 5500 Firewall","authors":"J. Gill, Kazi Zunnurhain","doi":"10.1145/3077286.3077305","DOIUrl":"https://doi.org/10.1145/3077286.3077305","url":null,"abstract":"The technology of today is dramatically more advanced than it was 30 years ago. With fiber optic cables becoming ever more present and the rapid expansion of storage, the volume of data passing through these devices is also becoming more abundant. Over time, it has become easier to launch many kinds of attacks. These attacks are often launched from one computer sending huge amounts of spoofed data for several minutes. It is no surprise then that multiple computers launching an attack will create a dire situation regardless of which PC or server is being attacked. A Denial of Service (DoS) attack occurs when an attacker floods a computer or server with illegitimate data so that the system will deny service to a legitimate user [3]. This occurs because that system is now lacking the resources to handle any more data. A Distributed DoS (DDoS) attack is the same idea, but amplified. A DDoS attack involves multiple systems striking a single target and flooding that target with data, overloading the target's computers, servers, and firewalls [3]. This often causes the physical devices to exhaust and deny legitimate requests. As if that wasn't enough, the attacker can plant a virus or Trojan in the system once they gain access to further sabotage the target. These types of attacks are very damaging to companies all around the world. That is where the Cisco ASA 5500 series firewall comes in. In this paper, we will be examining how efficiently a firewall of this type can defend against a DoS attack and a DDoS attack, and what adverse effects are displayed after the attacks have occurred.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77863028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Workshop: A Multi Robot Testbed for Computer Science Education and Research 研讨会:面向计算机科学教育与研究的多机器人试验台
Pub Date : 2017-04-13 DOI: 10.1145/3077286.3077292
A. Saad
The objective of this workshop is to share source code and tutorials that we developed for a multi robot testbed in order to enable participants to advance computer science education and research at their respective institutions. The testbed is built using commercially-available off the shelf components and using open source software packages. The workshop will provide participants an overview of multi robot systems and technical details underpinning the development of the testbed, including: technical specifications of the m3pi mobile robot and its capabilities, programming the LPC 1768 microcontroller, the grid navigation libraries, and the XBee-based communication libraries. We demonstrate how the testbed is being used to develop and test multi robot path planning in a grid world. We also present our initial development of a robot tracking algorithm using OpenCV.
本次研讨会的目的是分享我们为多机器人测试平台开发的源代码和教程,以使参与者能够在各自的机构中推进计算机科学教育和研究。测试平台是使用商业上可用的现成组件和开源软件包构建的。研讨会将向与会者提供多机器人系统的概述和支撑试验台开发的技术细节,包括:m3pi移动机器人及其功能的技术规范、LPC 1768微控制器的编程、网格导航库和基于xbee的通信库。我们演示了如何使用试验台来开发和测试网格世界中的多机器人路径规划。我们还介绍了使用OpenCV的机器人跟踪算法的初步开发。
{"title":"Workshop: A Multi Robot Testbed for Computer Science Education and Research","authors":"A. Saad","doi":"10.1145/3077286.3077292","DOIUrl":"https://doi.org/10.1145/3077286.3077292","url":null,"abstract":"The objective of this workshop is to share source code and tutorials that we developed for a multi robot testbed in order to enable participants to advance computer science education and research at their respective institutions. The testbed is built using commercially-available off the shelf components and using open source software packages. The workshop will provide participants an overview of multi robot systems and technical details underpinning the development of the testbed, including: technical specifications of the m3pi mobile robot and its capabilities, programming the LPC 1768 microcontroller, the grid navigation libraries, and the XBee-based communication libraries. We demonstrate how the testbed is being used to develop and test multi robot path planning in a grid world. We also present our initial development of a robot tracking algorithm using OpenCV.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84297043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2014 ACM Southeast Regional Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1