|
| 1 | +@misc{nvblox, |
| 2 | + title = {{nvblox: GPU-Accelerated Incremental Signed Distance Field Mapping}}, |
| 3 | + author = {Alexander Millane and Helen Oleynikova and Emilie Wirbel and Remo Steiner and Vikram Ramasamy and David Tingdahl and Roland Siegwart}, |
| 4 | + year = 2024, |
| 5 | + url = {https://arxiv.org/abs/2311.00626}, |
| 6 | + eprint = {2311.00626}, |
| 7 | + archiveprefix = {arXiv}, |
| 8 | + primaryclass = {cs.RO} |
| 9 | +} |
| 10 | + |
| 11 | +@misc{robotcore, |
| 12 | + title = {{RobotCore: An Open Architecture for Hardware Acceleration in ROS 2}}, |
| 13 | + author = {Víctor Mayoral-Vilches and Sabrina M. Neuman and Brian Plancher and Vijay Janapa Reddi}, |
| 14 | + year = 2023, |
| 15 | + url = {https://arxiv.org/abs/2205.03929}, |
| 16 | + eprint = {2205.03929}, |
| 17 | + archiveprefix = {arXiv}, |
| 18 | + primaryclass = {cs.RO} |
| 19 | +} |
| 20 | + |
| 21 | +@inproceedings{tani2020reproducible, |
| 22 | + title = {{Integrated Benchmarking and Design for Reproducible and Accessible Evaluation of Robotic Agents}}, |
| 23 | + author = {Tani, Jacopo and Daniele, Andrea F. and Bernasconi, Gianmarco and Camus, Amaury and Petrov, Aleksandar and Courchesne, Anthony and Mehta, Bhairav and Suri, Rohit and Zaluska, Tomasz and Walter, Matthew R. and Frazzoli, Emilio and Paull, Liam and Censi, Andrea}, |
| 24 | + year = 2020, |
| 25 | + booktitle = {2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)}, |
| 26 | + volume = {}, |
| 27 | + number = {}, |
| 28 | + pages = {6229--6236}, |
| 29 | + doi = {10.1109/IROS45743.2020.9341677}, |
| 30 | + keywords = {Benchmark testing;Tools;Hardware;Software;Complexity theory;Robots;System analysis and design} |
| 31 | +} |
| 32 | + |
| 33 | +@article{macenski2022ros2, |
| 34 | + title = {{Robot Operating System 2: Design, architecture, and uses in the wild}}, |
| 35 | + author = {Steven Macenski and Tully Foote and Brian Gerkey and Chris Lalancette and William Woodall}, |
| 36 | + year = 2022, |
| 37 | + journal = {Science Robotics}, |
| 38 | + volume = 7, |
| 39 | + number = 66, |
| 40 | + pages = {eabm6074}, |
| 41 | + doi = {10.1126/scirobotics.abm6074}, |
| 42 | + url = {https://www.science.org/doi/abs/10.1126/scirobotics.abm6074}, |
| 43 | + eprint = {https://www.science.org/doi/pdf/10.1126/scirobotics.abm6074} |
| 44 | +} |
| 45 | + |
| 46 | +@manual{nvidiaCudaPg13, |
| 47 | + title = {{CUDA C++ Programming Guide}}, |
| 48 | + year = 2025, |
| 49 | + note = {Version 13.0}, |
| 50 | + organization = {NVIDIA Corporation}, |
| 51 | + howpublished = {\url{https://docs.nvidia.com/cuda/cuda-c-programming-guide/}, accessed 2025-09-15} |
| 52 | +} |
| 53 | + |
| 54 | +@misc{qemu, |
| 55 | + title = {{QEMU: A generic and open source machine emulator and virtualizer}}, |
| 56 | + author = {{QEMU Project}}, |
| 57 | + year = 2003, |
| 58 | + howpublished = {\url{https://www.qemu.org/} accessed 2025-09-15} |
| 59 | +} |
| 60 | + |
| 61 | +@misc{docker, |
| 62 | + title = {{Docker: Accelerated Container Application Development}}, |
| 63 | + author = {{Docker, Inc.}}, |
| 64 | + year = 2013, |
| 65 | + howpublished = {\url{https://www.docker.com/} accessed 2025-09-15} |
| 66 | +} |
| 67 | + |
| 68 | +@inproceedings{llvm, |
| 69 | + title = {{LLVM: a compilation framework for lifelong program analysis & transformation}}, |
| 70 | + author = {Lattner, C. and Adve, V.}, |
| 71 | + year = 2004, |
| 72 | + booktitle = {International Symposium on Code Generation and Optimization, 2004. CGO 2004.}, |
| 73 | + volume = {}, |
| 74 | + number = {}, |
| 75 | + pages = {75--86}, |
| 76 | + doi = {10.1109/CGO.2004.1281665}, |
| 77 | + keywords = {Information analysis;Program processors;Performance analysis;High level languages;Virtual machining;Runtime;Arithmetic;Application software;Software safety;Algorithm design and analysis} |
| 78 | +} |
| 79 | + |
| 80 | +@inproceedings{mlir, |
| 81 | + title = {{MLIR: Scaling Compiler Infrastructure for Domain Specific Computation}}, |
| 82 | + author = {Lattner, Chris and Amini, Mehdi and Bondhugula, Uday and Cohen, Albert and Davis, Andy and Pienaar, Jacques and Riddle, River and Shpeisman, Tatiana and Vasilache, Nicolas and Zinenko, Oleksandr}, |
| 83 | + year = 2021, |
| 84 | + booktitle = {2021 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)}, |
| 85 | + volume = {}, |
| 86 | + number = {}, |
| 87 | + pages = {2--14}, |
| 88 | + doi = {10.1109/CGO51591.2021.9370308}, |
| 89 | + keywords = {Program processors;Buildings;Semantics;Hardware;Software;Generators;Optimization} |
| 90 | +} |
| 91 | + |
| 92 | +@inproceedings{shen2025sentryrt1, |
| 93 | + title = {{SentryRT‑1: A Case Study in Evaluating Real‑Time Linux for Safety‑Critical Robotic Perception}}, |
| 94 | + author = {Yuwen Shen and Jorrit Vander Mynsbrugge and Nima Roshandel and Robin Bouchez and Hamed FirouziPouyaei and Constantin Scholz and Hoang‑Long Cao and Bram Vanderborght and Wouter Joosen and Antonio Paolillo}, |
| 95 | + year = 2025, |
| 96 | + month = {July 8}, |
| 97 | + booktitle = {Proceedings of the 19th Workshop on Operating Systems Platforms for Embedded Real‑Time Applications (OSPERT 2025)}, |
| 98 | + address = {Brussels, Belgium}, |
| 99 | + series = {ECRTS Workshops}, |
| 100 | + pages = {35--41} |
| 101 | +} |
| 102 | + |
| 103 | +@misc{itf24safebot, |
| 104 | + title = {{imec ITF World 2024 SAFEBOT demo}}, |
| 105 | + year = 2024, |
| 106 | + note = {Demonstration booth at imec Technology Forum (ITF) 2024}, |
| 107 | + howpublished = {\url{https://www.youtube.com/watch?v=F7m5_kQ_mRQ} accessed 2025-09-15} |
| 108 | +} |
| 109 | + |
| 110 | +@inproceedings{degreef2025macros, |
| 111 | + title = {{Towards Macro-Aware C-to-Rust Transpilation (WIP)}}, |
| 112 | + author = {De Greef, Robbe and Discepoli, Attilio and Aguililla Klein, Esteban and Engels, Th\'{e}o and Hasselmann, Ken and Paolillo, Antonio}, |
| 113 | + year = 2025, |
| 114 | + booktitle = {Proceedings of the 26th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems}, |
| 115 | + location = {Seoul, Republic of Korea}, |
| 116 | + publisher = {Association for Computing Machinery}, |
| 117 | + address = {New York, NY, USA}, |
| 118 | + series = {LCTES '25}, |
| 119 | + pages = {57–61}, |
| 120 | + doi = {10.1145/3735452.3735535}, |
| 121 | + isbn = 9798400719219, |
| 122 | + url = {https://doi.org/10.1145/3735452.3735535}, |
| 123 | + abstract = {The automatic translation of legacy C code to Rust presents significant challenges, particularly in handling preprocessor macros. C macros introduce metaprogramming constructs that operate at the text level, outside of C's syntax tree, making their direct translation to Rust non-trivial. Existing transpilers --- source-to-source compilers --- expand macros before translation, sacrificing their abstraction and reducing code maintainability. In this work, we introduce Oxidize, a macro-aware C-to-Rust transpilation framework that preserves macro semantics by translating C macros into Rust-compatible constructs while selectively expanding only those that interfere with Rust's stricter semantics. We evaluate our techniques on a small-scale study of real-world macros and find that the majority can be safely and idiomatically transpiled without full expansion.}, |
| 124 | + numpages = 5, |
| 125 | + keywords = {Abstract Syntax Tree, C, Embedded, Macros, Metaprogramming, Preprocessor, Rust, Transpilation} |
| 126 | +} |
| 127 | + |
| 128 | +@inproceedings{discepoli2025computeKernels, |
| 129 | + title = {{Compute Kernels as Moldable Tasks: Towards Real‑Time Gang Scheduling in GPUs}}, |
| 130 | + author = {Attilio Discepoli and Mathias Louis Huygen and Antonio Paolillo}, |
| 131 | + year = 2025, |
| 132 | + month = {July 8}, |
| 133 | + booktitle = {Proceedings of the 19th Workshop on Operating Systems Platforms for Embedded Real‑Time Applications (OSPERT 2025)}, |
| 134 | + address = {Brussels, Belgium}, |
| 135 | + series = {ECRTS Workshops}, |
| 136 | + pages = {29--33} |
| 137 | +} |
| 138 | + |
| 139 | +@misc{docker_compose, |
| 140 | + title = {{Docker Compose}}, |
| 141 | + author = {{Docker, Inc.}}, |
| 142 | + year = 2014, |
| 143 | + howpublished = {\url{https://docs.docker.com/compose/} accessed 2025-09-15} |
| 144 | +} |
| 145 | + |
| 146 | +@misc{docker_sdk_python, |
| 147 | + title = {{Docker SDK for Python}}, |
| 148 | + author = {{Docker, Inc.}}, |
| 149 | + year = 2014, |
| 150 | + howpublished = {\url{https://docker-py.readthedocs.io/} accessed 2025-09-15} |
| 151 | +} |
| 152 | + |
| 153 | +@misc{devcontainers, |
| 154 | + title = {{Development Containers Specification}}, |
| 155 | + author = {{Dev Containers Spec}}, |
| 156 | + year = 2022, |
| 157 | + howpublished = {\url{https://containers.dev} accessed 2025-09-15} |
| 158 | +} |
| 159 | + |
| 160 | +@misc{repo2docker, |
| 161 | + title = {{repo2docker: Turn repositories into Jupyter-enabled Docker images}}, |
| 162 | + author = {{Project Jupyter}}, |
| 163 | + year = 2017, |
| 164 | + howpublished = {\url{https://repo2docker.readthedocs.io/} accessed 2025-09-15} |
| 165 | +} |
| 166 | + |
| 167 | +@inproceedings{nix04lisa, |
| 168 | + title = {{Nix: A Safe and Policy-Free System for Software Deployment}}, |
| 169 | + author = {Dolstra, Eelco and de Jonge, Merijn and Visser, Eelco}, |
| 170 | + year = 2004, |
| 171 | + booktitle = {Proceedings of the 18th USENIX Conference on System Administration}, |
| 172 | + location = {Atlanta, GA}, |
| 173 | + publisher = {USENIX Association}, |
| 174 | + address = {USA}, |
| 175 | + series = {LISA '04}, |
| 176 | + pages = {79–92}, |
| 177 | + abstract = {Existing systems for software deployment are neither safe nor sufficiently flexible. Primary safety issues are the inability to enforce reliable specification of component dependencies, and the lack of support for multiple versions or variants of a component. This renders deployment operations such as upgrading or deleting components dangerous and unpredictable. A deployment system must also be flexible (i.e., policy-free) enough to support both centralised and local package management, and to allow a variety of mechanisms for transferring components. In this paper we present Nix, a deployment system that addresses these issues through a simple technique of using cryptographic hashes to compute unique paths for component instances.}, |
| 178 | + numpages = 14 |
| 179 | +} |
| 180 | + |
| 181 | +@misc{courtes2013guix, |
| 182 | + title = {{Functional Package Management with Guix}}, |
| 183 | + author = {Ludovic Courtès}, |
| 184 | + year = 2013, |
| 185 | + url = {https://arxiv.org/abs/1305.4584}, |
| 186 | + eprint = {1305.4584}, |
| 187 | + archiveprefix = {arXiv}, |
| 188 | + primaryclass = {cs.PL} |
| 189 | +} |
0 commit comments