News
It is important for autonomous systems to be cognizant of their own capabilities and limitations. The goal of this project is to develop techniques and metrics that enable robots to assess their own ...
If you did this problem correctly, your hw2 directory should contain a $USER.message.decrypted file. If not, check to see if there is a $USER.ERROR file. If not, a ...
Bundle adjustment jointly optimizes camera intrinsics and extrinsics and 3D point triangulation to reconstruct a static scene. The triangulation constraint, however, is invalid for moving points ...
This is a database of setlists for Grateful Dead concerts from 1972 to the present. Useful for identifying concert tapes! Most of these setlists were extracted from a database that was created by ...
[10.1] You are given a string s. How would you: Get the first letter of the string Get the last letter of the string Get the 5th letter of the string (assuming the string has at least 6 letters) ...
Time: Monday and Wednesday, 10:30-11:50am Location: GHC 4211 ...
The Course project is an opportunity for you to delve deep into any Machine Learning problem or topic of your choice. Your project could be of a theoretical and/or applied nature. Ideally we expect ...
The exact topics of the lectures are subject to change. We do not anticipate changing any of the other dates (exams, assignments, etc.) ...
Carnegie Mellon Researchers Will Prove Autonomous Driving Technologies During a 3,000 Mile, Hands-off-the-Wheel Trip from Pittsburgh to San Diego PITTSBURGH-- Researchers from Carnegie Mellon ...
A technical introduction to the fundamentals of programming with an emphasis on producing clear, robust, and reasonably efficient code using top-down design, informal analysis, and effective testing ...
File systems provide an abstraction, both to the user of a computer system and to the programmer. They present a uniform hierarchical view of data, even though this data may actually be spread across ...
Reasoning About the Consequences of Authorization Policies in a Linear Epistemic Logic - Henry DeYoung and Frank Pfenning. Workshop on Foundations of Computer Security, FCS 2009. Session-Typed Ordered ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results