Feeds

Carnegie Mellon wins the robotic Urban Challenge

Stanford relegated to second

High performance access to file storage

DARPA used various criteria to determine the winner, looking at how quickly the robots completed the course and how many traffic violations they endured. The organization collected this data from the vehicles and by watching the robots from the sky with an airplane. That plane sent back video with up to .5m resolution of the event, allowing officials to replay incidents in slow motion as needed to determine who was at fault.

Still, some of the criteria seemed iffy. For example, vehicles were punished if they were caught in traffic caused by another vehicle, since that would replicate real life circumstances. We saw Stanford's car Junior suffer as Cornell delayed for 10 to 20 minutes.

Shot of bartender holding Chelada drink

Weird Victorville drink called Chelada. Beer and Clamato - Ew.

DARPA officials revealed the winners during a ceremony today here in Victorville, California - a small town outside of Los Angeles.

Will there be another Grand Challenge? Maybe not. The government has taken away DARPA's ability to offer cash prizes for these types of events without federal approval.

"I don't know why they did it, but they did it," DARPA Director Anthony Tether said. "I don't have the authority to say, 'Yes'.

"We never really finish anything (at DARPA). We just show that it can be done. We take the excuse off the table. I think we are close to that point. "

Red Whittaker has called for something like a 24-hour race that force the vehicles to deal with different terrains, weather and day/night conditions.

According to Thrun, these events prove crucial to US technology development. They help encourage youngsters' interest in robotics.

"We are going to build a whole new student force for the next thirty years to come." ®

Register editor Ashlee Vance has just pumped out a new book that's a guide to Silicon Valley. The book starts with the electronics pioneers present in the Bay Area in the early 20th century and marches up to today's heavies. Want to know where Gordon Moore eats Chinese food, how unions affected the rise of microprocessors or how Fairchild Semiconductor got its start? This is the book for you - available at Amazon US here or in the UK here.

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.