66 results
Search Results
2. Knowledge transfer from agri-food scientific papers to a knowledge base
- Author
-
Trójczak, Rafał, primary, Trypuz, Robert, additional, Mazurek, Anna, additional, and Kulicki, Piotr, additional
- Published
- 2015
- Full Text
- View/download PDF
3. Environmental Spatio-temporal Ontology for the Linked Open Data Cloud
- Author
-
Morshed, Ahsan, Aryal, Jagannath, and Dutta, Ritaban
- Subjects
IE. Data and metadata structures. - Abstract
The rapid access of sensor technology provides both challenges and opportunities to authenticated spatiotemporal data. Authentication can be assured by developing related ontologies. Ontology explicitly specifies shared conceptualization and formal vocabularies. In this paper, we proposed an environmental spatio-temporal ontology (ESTO) using unified resource description framework (RDF) and Intelligent Environmental Knowledgebase (i-EKbase) recommendation system. Five different environmental data sources namely SILO, AWAP, ASRIS, CosmOz, and MODIS were considered to develop i-EKbase where knowledge was integrated. The recommendation system was founded on web based large scale dynamic data mining, contextual knowledge extraction, and integrated knowledge representation. The proposed ESTO was tested for optimization of the accessibility and usability issues related to big data sets and minimize the overall application costs. RDF representation made this ontology very flexible to publish on Linked Open Data Cloud environment.
- Published
- 2013
4. Blended Library and Multimedia Model in Geography Teaching
- Author
-
Asadi, Saeid and Jamali, Hamid R.
- Subjects
HH. Audio-visual, Multimedia. - Abstract
Libraries have been established and always utilized in old fashion and modern school and academic environments in order to support educational programs. However, new instructional technologies have changed traditional library-based teaching models. Multimedia approach has shown successful in teaching different courses to different learners. However, there is little known how a combination of library and multimedia approach can be implemented and measured in teaching. This paper focuses on an innovative approach in which a blended library and multimedia model has been developed to teach geography concepts. It was implemented in teaching geography in a first grade class in an Iranian secondary school. The empirical results revealed the effectiveness of the blended model in learning and retention of geography.
- Published
- 2011
5. A Fast Counterexample Minimization Approach with Refutation Analysis and Incremental SAT
- Author
-
Shen, ShengYu, Qin, Ying, and Li, SiKun
- Subjects
LJ. Software. ,LK. Software methodologies and engineering. - Abstract
It is a hotly research topic to eliminate irrelevant variables from counterexample, to make it easier to be understood. BFL algorithm is the most effective Counterexample minimization algorithm compared to all other approaches, but its run time overhead is very large due to one call to SAT solver per candidate variable to be eliminated. So we propose a faster counterexample minimization algorithm based on refutation analysis and incremental SAT. First, for every UNSAT instance of BFL, we perform refutation analysis to extract the set of variables that lead to UNSAT, all variables not belong to this set can be eliminated simultaneously. In this way, we can eliminate many variables with only one call to SAT solver. At the same time, we employ incremental SAT approach to share learned clauses between similar instances of BFL, to prevent overlapped state space from being searched repeatedly. Theoretic analysis and experiment result shows that, our approach can be 1 to 2 orders of magnitude faster than BFL, and still retain the minimization ability of BFL.
- Published
- 2005
6. Closing and Closure in Human-Companion Interactions: Analyzing Video Data from a Field Study
- Author
-
Payr, Sabine, Avizzano, C.A., Ruffaldi, E., Carozzino, M., Fontana, M., and Bergamasco, M.
- Subjects
Psychology: Applied Cognitive Psychology ,Psychology: Cognitive Psychology ,Computer Science: Human Computer Interaction ,Computer Science: Robotics ,Psychology: Social Psychology ,Applied Cognitive Psychology ,Cognitive Psychology ,Human Computer Interaction ,Robotics ,Social Psychology - Abstract
A field study with a simple robotic companion is being undertaken in three iterations in the framework of a EU FP7 research project. The interest of this study lies in its design: the robotic interface setup is installed in the subjects' homes and video data are collected during ten days. This gives the rare opportunity to study the development of human-robot relationships over time, and the integration of companion technologies into everyday life. This paper outlines the qualitative inductive approach to data analysis, and discusses selected results. The focus here is on the interactional mechanisms of bringing conversations to an end. The paper distinguishes between "closing" as the conversational mechanism for doing this, and "closure" as the social norm that motivates it. We argue that this distinction is relevant for interaction designers insofar as they have to be aware of the compelling social norms that are invoked by a companion's conversational behaviour.
- Published
- 2010
7. Towards automatic personalised content creation for racing games
- Author
-
Togelius, Julian, De Nardi, Renzo, and Lucas, Simon M.
- Subjects
Computer Science: Artificial Intelligence ,Artificial Intelligence - Abstract
Evolutionary algorithms are commonly used to create high-performing strategies or agents for computer games. In this paper, we instead choose to evolve the racing tracks in a car racing game. An evolvable track representation is devised, and a multiobjective evolutionary algorithm maximises the entertainment value of the track relative to a particular human player. This requires a way to create accurate models of players' driving styles, as well as a tentative definition of when a racing track is fun, both of which are provided. We believe this approach opens up interesting new research questions and is potentially applicable to commercial racing games.
- Published
- 2007
8. Beyond swarm intelligence: The Ultraswarm
- Author
-
Holland, Owen, Woods, John, De Nardi, Renzo, Clarck, Adrian, Arabshahi, P., and Martinoli, A.
- Subjects
Computer Science: Robotics ,Robotics - Abstract
This paper explores the idea that it may be possible to combine two ideas – UAV flocking, and wireless cluster computing – in a single system, the UltraSwarm. The possible advantages of such a system are considered, and solutions to some of the technical problems are identified. Initial work on constructing such a system based around miniature electric helicopters is described.
- Published
- 2005
9. Learning in the Cerebellum with Sparse Conjunctions and Linear Separator Algorithms
- Author
-
Harris, Harlan, Reichler, Jesse, Marko, Kenneth, and Werbos, Paul
- Subjects
Neuroscience: Computational Neuroscience ,Neuroscience: Neural Modelling ,Computational Neuroscience ,Neural Modelling - Abstract
This paper investigates potential learning rules in the cerebellum. We review evidence that input to the cerebellum is sparsely expanded by granule cells into a very wide basis vector, and that Purkinje cells learn to compute a linear separation using that basis. We review learning rules employed by existing cerebellar models, and show that recent results from Computational Learning Theory suggest that the standard delta rule would not be efficient. We suggest that alternative, attribute-efficient learning rules, such as Winnow or Incremental Delta-Bar-Delta, are more appropriate for cerebellar modeling, and support this position with results from a computational model.
- Published
- 2001
10. Multiple Uncertainties in Time-Variant Cosmological Particle Data
- Author
-
Haroz, Steve, Ma, Dr. Kwan-Liu, and Heitmann, Dr. Katrin
- Subjects
Computer Science: Human Computer Interaction ,Human Computer Interaction - Abstract
Though the mediums for visualization are limited, the potential dimensions of a dataset are not. In many areas of scientific study, understanding the correlations between those dimensions and their uncertainties is pivotal to mining useful information from a dataset. Obtaining this insight can necessitate visualizing the many relationships among temporal, spatial, and other dimensionalities of data and its uncertainties. We utilize multiple views for interactive dataset exploration and selection of important features, and we apply those techniques to the unique challenges of cosmological particle datasets. We show how interactivity and incorporation of multiple visualization techniques help overcome the problem of limited visualization dimensions and allow many types of uncertainty to be seen in correlation with other variables.
- Published
- 2008
11. Modelling Emotions with Multidimensional Logic
- Author
-
Gershenson, Carlos
- Subjects
Computer Science: Artificial Intelligence ,Philosophy: Logic ,Artificial Intelligence ,Logic - Abstract
One of the objectives of Artificial Intelligence has been the modelling of "human" characteristics, such as emotions, behaviour, conscience, etc. But in such characteristics we might find certain degree of contradiction. Previous work on modelling emotions and its problems are reviewed. A model for emotions is proposed using multidimensional logic, which handles the degree of contradiction that emotions might have. The model is oriented to simulate emotions in artificial societies. The proposed solution is also generalized for actions which might overcome contradiction (conflictive goals in agents, for example.).
- Published
- 1999
12. The locally linear nested network for robot manipulation
- Author
-
Smagt, P. van der, Groen, F., and Groenewoud, F. van het
- Subjects
Computer Science: Neural Nets ,Computer Science: Robotics ,Neural Nets ,Robotics - Abstract
We present a method for accurate representation of high-dimensional unknown functions from random samples drawn from its input space. The method builds representations of the function by recursively splitting the input space in smaller subspaces, while in each of these subspaces a linear approximation is computed. The representations of the function at all levels (i.e., depths in the tree) are retained during the learning process, such that a good generalisation is available as well as more accurate representations in some subareas. Therefore, fast and accurate learning are combined in this method. The method, which is applied to hand-eye coordination of a robot arm, is shown to be superior to other neural networks.
- Published
- 1994
13. Towards a Theory Grounded Theory of Language
- Author
-
Prince, Christopher G., Mislivec, Eric J., Kosolapov, Oleksandr V., and Lykken, Troy R.
- Subjects
Computer Science: Artificial Intelligence ,Computer Science: Language ,Computer Science: Robotics ,Psychology: Developmental Psychology ,Artificial Intelligence ,Language ,Robotics ,Developmental Psychology - Abstract
In this paper, we build upon the idea of theory grounding and propose one specific form of theory grounding, a theory of language. Theory grounding is the idea that we can imbue our embodied artificially intelligent systems with theories by modeling the way humans, and specifically young children, develop skills with theories. Modeling theory development promises to increase the conceptual and behavioral flexibility of these systems. An example of theory development in children is the social understanding referred to as theory of mind. Language is a natural task for theory grounding because it is vital in symbolic skills and apparently necessary in developing theories. Word learning, and specifically developing a concept of words, is proposed as the first step in a theory grounded theory of language.
- Published
- 2002
14. Compensation for unconstrained catheter shaft motion in cardiac catheters
- Author
-
Degirmenci, Alperen, Loschak, Paul, Tschabrunn, Cory, Anter, Elad, and Howe, Robert D.
- Abstract
— Cardiac catheterization with ultrasound (US) imaging catheters provides real time US imaging from within the heart, but manually navigating a four degree of freedom (DOF) imaging catheter is difficult and requires extensive training. Existing work has demonstrated robotic catheter steering in constrained bench top environments. Closed-loop control in an unconstrained setting, such as patient vasculature, remains a significant challenge due to friction, backlash, and physiological disturbances. In this paper we present a new method for closed-loop control of the catheter tip that can accurately and robustly steer 4-DOF cardiac catheters and other flexible manipulators despite these effects. The performance of the system is demonstrated in a vasculature phantom and an in vivo porcine animal model. During bench top studies the robotic system converged to the desired US imager pose with submillimeter and sub-degree-level accuracy. During animal trials the system achieved 2.0 mm and 0.65° accuracy. Accurate and robust robotic navigation of flexible manipulators will enable enhanced visualization and treatment during procedures., Engineering and Applied Sciences
- Published
- 2016
- Full Text
- View/download PDF
15. Efficient Image Reconstruction for Gigapixel Quantum Image Sensors
- Author
-
Chan, Stanley H. and Lu, Yue
- Subjects
Image reconstruction ,quantum image sensors ,gigapixel imaging ,ADMM - Abstract
Recent advances in materials, devices and fabrication technologies have motivated a strong momentum in developing solid-state sensors that can detect individual photons in space and time. It has been envisioned that such sensors can eventually achieve very high spatial resolutions (e.g., \(10^9\) pixels/chip) as well as high frame rates (e.g., \(10^6\) frames/sec). In this paper, we present an efficient algorithm to reconstruct images from the massive binary bit-streams generated by these sensors. Based on the concept of alternating direction method of multipliers (ADMM), we transform the computationally intensive optimization problem into a sequence of subproblems, each of which has efficient implementations in the form of polyphase-domain filtering or pixel-wise nonlinear mappings. Moreover, we reformulate the original maximum likelihood estimation as maximum a posterior estimation by introducing a total variation prior. Numerical results demonstrate the strong performance of the proposed method, which achieves several dB’s of improvement in PSNR and requires a shorter runtime as compared to standard gradient-based approaches., Engineering and Applied Sciences
- Published
- 2014
16. Bayesian-based localization of wireless capsule endoscope using received signal strength
- Author
-
Nadimi, Esmaeil S., Blanes-Vidal, Victoria, Tarokh, Vahid, and Johansen, Per Michael
- Abstract
In wireless body area sensor networking (WBASN) applications such as gastrointestinal (GI) tract monitoring using wireless video capsule endoscopy (WCE), the performance of out-of-body wireless link propagating through different body media (i.e. blood, fat, muscle and bone) is still under investigation. Most of the localization algorithms are vulnerable to the variations of path-loss coefficient resulting in unreliable location estimation. In this paper, we propose a novel robust probabilistic Bayesian-based approach using received-signal-strength (RSS) measurements that accounts for Rayleigh fading, variable path-loss exponent and uncertainty in location information received from the neighboring nodes and anchors. The results of this study showed that the localization root mean square error of our Bayesian-based method was 1.6 mm which was very close to the optimum Cramer-Rao lower bound (CRLB) and significantly smaller than that of other existing localization approaches (i.e. classical MDS (64.2mm), dwMDS (32.2mm), MLE (36.3mm) and POCS (2.3mm))., Engineering and Applied Sciences
- Published
- 2014
- Full Text
- View/download PDF
17. Optimizing Media Access Strategy for Competing Cognitive Radio Networks
- Author
-
Gwon, Youngjune Lee, Kung, H. T., and Dastangoo, Siamak
- Abstract
This paper describes an adaptation of cognitive radio technology for tactical wireless networking. We introduce Competing Cognitive Radio Network (CCRN) featuring both communicator and jamming cognitive radio nodes that strategize in taking actions on an open spectrum under the presence of adversarial threats. We present the problem in the Multi-armed Bandit (MAB) framework and develop the optimal media access strategy consisting of mixed communicator and jammer actions in a Bayesian setting for Thompson sampling based on extreme value theory. Empirical results are promising that the proposed strategy seems to outperform Lai & Robbins and UCB, some of the most important MAB algorithms known to date., Engineering and Applied Sciences
- Published
- 2013
18. MRI-powered actuators for robotic interventions
- Author
-
Vartholomeos, Panagiotis, Qin, Lei, and Dupont, Pierre E
- Abstract
This paper presents a novel actuation technology for robotically assisted MRI-guided interventional procedures. Compact and wireless, the actuators are both powered and controlled by the MRI scanner. The design concept and performance limits are described and derived analytically. Simulation and experiments in a clinical MR scanner are used to validate the analysis and to demonstrate the capability of the approach for needle biopsies. The concepts of actuator locking mechanisms and multi-axis control are also introduced.
- Published
- 2011
- Full Text
- View/download PDF
19. Detection of curved robots using 3D ultrasound
- Author
-
Ren, Hongliang, Vasilyev, Nikolay, and Dupont, Pierre E
- Abstract
Three-dimensional ultrasound can be an effective imaging modality for image-guided interventions since it enables visualization of both the instruments and the tissue. For robotic applications, its realtime frame rates create the potential for image-based instrument tracking and servoing. These capabilities can enable improved instrument visualization, compensation for tissue motion as well as surgical task automation. Continuum robots, whose shape comprises a smooth curve along their length, are well suited for minimally invasive procedures. Existing techniques for ultrasound tracking, however, are limited to straight, laparoscopic-type instruments and thus are not applicable to continuum robot tracking. Toward the goal of developing tracking algorithms for continuum robots, this paper presents a method for detecting a robot comprised of a single constant curvature in a 3D ultrasound volume. Computational efficiency is achieved by decomposing the six-dimensional circle estimation problem into two sequential three-dimensional estimation problems. Simulation and experiment are used to evaluate the proposed method.
- Published
- 2011
- Full Text
- View/download PDF
20. Maximizing all margins: Pushing face recognition with Kernel Plurality
- Author
-
Kumar, Ritwik, Banerjee, Arunava, Vemuri, Baba C., and Pfister, Hanspeter
- Abstract
We present two theses in this paper: First, performance of most existing face recognition algorithms improves if instead of the whole image, smaller patches are individually classified followed by label aggregation using voting. Second, weighted plurality voting outperforms other popular voting methods if the weights are set such that they maximize the victory margin for the winner with respect to each of the losers. Moreover, this can be done while taking higher order relationships among patches into account using kernels. We call this scheme Kernel Plurality. We verify our proposals with detailed experimental results and show that our framework with Kernel Plurality improves the performance of various face recognition algorithms beyond what has been previously reported in the literature. Furthermore, on five different benchmark datasets - Yale A, CMU PIE, MERL Dome, Extended Yale B and Multi-PIE, we show that Kernel Plurality in conjunction with recent face recognition algorithms can provide state-of-the-art results in terms of face recognition rates., Engineering and Applied Sciences
- Published
- 2011
- Full Text
- View/download PDF
21. A location-dependent runs-and-gaps model for predicting TCP performance over a UAV wireless channel
- Author
-
Kung, H. T., Lin, Chit-Kwan, Lin, Tsung-Han, Tarsa, Stephen John, Vlah, Dario, Hague, Daniel, Muccio, Michael, Poland, Brendon, and Suter, Bruce
- Abstract
In this paper, we use a finite-state model to predict the performance of the Transmission Control Protocol (TCP) over a varying wireless channel between an unmanned aerial vehicle (UAV) and ground nodes. As a UAV traverses its flight path, the wireless channel may experience periods of significant packet loss, successful packet delivery, and intermittent reception. By capturing packet run-length and gap-length statistics at various locations on the flight path, this location-dependent model can predict TCP throughput in spite of dynamically changing channel characteristics. We train the model by using packet traces from flight tests in the field and validate it by comparing TCP throughput distributions for model-generated traces against those for actual traces randomly sampled from field data. Our modeling methodology is general and can be applied to any UAV flight path., Engineering and Applied Sciences
- Published
- 2010
- Full Text
- View/download PDF
22. Real-time position control of concentric tube robots
- Author
-
Dupont, Pierre E, Lock, Jesse, and Itkowitz, Brandon
- Abstract
A novel approach to constructing robots is based on concentrically combining pre-curved elastic tubes. By rotating and extending the tubes with respect to each other, their curvatures interact elastically to position and orient the robot's tip, as well as to control the robot's shape along its length. Since these robots form slender curves, they are well suited for minimally invasive medical procedures. A substantial challenge to their practical use is the real-time solution of their kinematics that are described by differential equations with split boundary equations. This paper proposes a numerically efficient approach to real-time position control. It is shown that the forward kinematics are smooth functions that can be pre-computed and accurately approximated using Fourier series. The inverse kinematics can be solved in real time using root finding applied to the functional approximation. Experimental demonstration of real-time position control using this approach is also described.
- Published
- 2010
- Full Text
- View/download PDF
23. Two Foraging Algorithms for Robot Swarms Using Only Local Communication
- Author
-
Hoff, Nicholas R. III, Sagoff, Amelia, Wood, Robert J., and Nagpal, Radhika
- Subjects
hardware ,heuristic algorithms ,legged locomotion ,measurement ,robot kinematics ,robot sensing systems - Abstract
Large collections of robots have the potential to perform tasks collectively using distributed control algorithms. These algorithms require communication between robots to allow the robots to coordinate their behavior and act as a collective. In this paper we describe two algorithms which allow coordination between robots, but do not require physical environment marks such as pheromones. Instead, these algorithms rely on simple, local, low bandwidth, direct communication between robots. We describe the algorithms and measure their performance in worlds with and without obstacles., Engineering and Applied Sciences
- Published
- 2010
- Full Text
- View/download PDF
24. Modeling User Perception of Interaction Opportunities for Effective Teamwork
- Author
-
Kamar, Ece, Gal, Ya'akov, and Grosz, Barbara J.
- Abstract
This paper presents a model of collaborative decision-making for groups that involve people and computer agents. The model distinguishes between actions relating to participantspsila commitment to the group and actions relating to their individual tasks, uses this distinction to decompose group decision making into smaller problems that can be solved efficiently. It allows computer agents to reason about the benefits of their actions on a collaboration and the ways in which human participants perceive these benefits. The model was tested in a setting in which computer agents need to decide whether to interrupt people to obtain potentially valuable information. Results show that the magnitude of the benefit of interruption to the collaboration is a major factor influencing the likelihood that people will accept interruption requests. They further establish that peoplepsilas perceived type of their partners (whether humans or computers) significantly affected their perceptions of the usefulness of interruptions when the benefit of the interruption is not clear-cut. These results imply that system designers need to consider not only the possible benefits of interruptions to collaborative human-computer teams but also the way that such benefits are perceived by people., Engineering and Applied Sciences
- Published
- 2009
- Full Text
- View/download PDF
25. An elliptic PDE approach for shape characterization
- Author
-
Haidar, H., Bouix, Sylvain, Levitt, James Jonathan, McCarley, Robert William, Shenton, Martha Elizabeth, and Soul, Janet
- Subjects
shape analysis ,partial differential equation - Abstract
This paper presents a novel approach to analyze the shape of anatomical structures. Our methodology is rooted in classical physics and in particular Poisson's equation, a fundamental partial differential equation [1]. The solution to this equation and more specifically its equipotential surfaces display properties that are useful for shape analysis. We present a numerical algorithm to calculate the length of streamlines formed by the gradient field of the solution to this equation for 2D and 3D objects. The length of the streamlines along the equipotential surfaces was used to build a new function which can characterize the shape of objects. We illustrate our method on 2D synthetic and natural shapes as well as 3D medical data.
- Published
- 2004
- Full Text
- View/download PDF
26. Vapor Deposition of Copper-Manganese Interconnects
- Author
-
Gordon, Roy Gerald, Feng, Jun, Li, Kecheng, and Gong, Xian
- Subjects
interconnects ,through silicon vias ,chemical vapor deposition ,copper ,manganese ,diffusion barrier ,void-free filling - Abstract
Chemical vapor deposition (CVD) of copper and manganese can produce interconnects scaled down to below 10 nm, while enhancing their conductivity and lifetime. CVD using similar super-conformal processes can enable very narrow through-silicon-vias, as well as tiny and robust flexible wires between chips. Silica insulating layers can be made by a super-conformal and rapid atomic layer deposition (ALD) process., Chemistry and Chemical Biology, Engineering and Applied Sciences
- Published
- 2016
- Full Text
- View/download PDF
27. Potential Arbitrage Revenue of Energy Storage Systems in PJM during 2014
- Author
-
Salles, Markus, Aziz, Michael J., and Hogan, William W.
- Abstract
— The price of electricity in the Mid-Atlantic (PJM) region of the United States increased during the “Polar Vortex” at the beginning of 2014. Transmission lines were congested because of high demand during the extreme cold weather. The natural gas price for electricity generation increased more than 35% at the end of 2013. Energy Storage Systems (ESS) would period. Other opportunities in energy arbitrage define the greatest scale for storage applications. Real-time and Day-ahead markets in PJM provide alternative arbitrage opportunities. Considering the prices in 2014 for 7,395 locations in PJM, results show the potential revenue for ESS for normal arbitrage and for extreme cold weather events., Engineering and Applied Sciences
- Published
- 2016
28. LLAMA: Efficient graph analytics using Large Multiversioned Arrays
- Author
-
Macko, Peter, Marathe, Virendra J., Margo, Daniel Wyatt, and Seltzer, Margo I.
- Subjects
Arrays ,Engines ,Indexes ,Memory management ,Merging ,Periodic structures ,Writing - Abstract
We present LLAMA, a graph storage and analysis system that supports mutability and out-of-memory execution. LLAMA performs comparably to immutable main-memory analysis systems for graphs that fit in memory and significantly outperforms existing out-of-memory analysis systems for graphs that exceed main memory. LLAMA bases its implementation on the compressed sparse row (CSR) representation, which is a read-only representation commonly used for graph analytics. We augment this representation to support mutability and persistence using a novel implementation of multi-versioned array snapshots, making it ideal for applications that receive a steady stream of new data, but need to perform whole-graph analysis on consistent views of the data. We compare LLAMA to state-of-the-art systems on representative graph analysis workloads, showing that LLAMA scales well both out-of-memory and across parallel cores. Our evaluation shows that LLAMA's mutability introduces modest overheads of 3-18% relative to immutable CSR for in-memory execution and that it outperforms state-of-the-art out-of-memory systems in most cases, with a best case improvement of 5x on breadth-first-search., Engineering and Applied Sciences
- Published
- 2015
- Full Text
- View/download PDF
29. Clouds of Things Need Information Flow Control with Hardware Roots of Trust
- Author
-
Pasquier, Thomas, Singh, Jatinder, and Bacon, Jean
- Subjects
Internet of Things ,Information Flow Control ,Provenance ,Hardware Roots of Trust ,Remote Attestatio - Abstract
There is a clear, outstanding need for new security mechanisms that allow data to be managed and controlled within the cloud-enabled Internet of Things. Towards this, we propose an approach based on Information Flow Control (IFC) that allows: (1) the continuous, end-to-end enforcement of data flow policy, and (2) the generation of provenance-like audit logs to demon- strate policy adherence and contractual/regulatory compliance. Further, we discuss the role of Trusted Platform Modules (TPMs) in supporting such a system, by providing hardware roots of trust. TPMs can be leveraged to validate software configurations, including the IFC enforcement mechanism, both in the cloud and externally via remote attestation., Engineering and Applied Sciences
- Published
- 2015
- Full Text
- View/download PDF
30. OSNAP: Faster Numerical Linear Algebra Algorithms via Sparser Subspace Embeddings
- Author
-
Nelson, Jelani and Huy, Nguyễn Lê
- Abstract
An oblivious subspace embedding (OSE) given some parameters \(\epsilon\), d is a distribution \(\mathcal{D}\) over matrices \(\Pi \in \mathbb{R}^{m×n}\) such that for any linear subspace \(W \subseteq \mathbb{R}^n\) with dim(W) = d, \(\mathbb{P}_{\Pi \sim \mathcal{D}}(\forall x \in W ||\Pi x||_2 \in (1 \pm \epsilon)||x||_2) > 2/3\). We show that a certain class of distributions, Oblivious Sparse Norm-Approximating Projections (OSNAPs), provides OSE's with \(m = O(d^{1+\gamma}/\epsilon^2)\), and where every matrix \(\Pi\) in the support of the OSE has only \(s = O_{\gamma}(1/\epsilon)\) non-zero entries per column, for \(\gamma > 0\) any desired constant. Plugging OSNAPs into known algorithms for approximate least squares regression, \(\ell_p\) regression, low rank approximation, and approximating leverage scores implies faster algorithms for all these problems. Our main result is essentially a Bai-Yin type theorem in random matrix theory and is likely to be of independent interest: we show that for any fixed \(U \in \mathbb{R}^{n×d}\) with orthonormal columns and random sparse \(\Pi\), all singular values of \(\Pi U\) lie in \([1 - \epsilon, 1 + \epsilon]\) with good probability. This can be seen as a generalization of the sparse Johnson-Lindenstrauss lemma, which was concerned with d = 1. Our methods also recover a slightly sharper version of a main result of [Clarkson-Woodruff, STOC 2013], with a much simpler proof. That is, we show that OSNAPs give an OSE with \(m = O(d^2/\epsilon^2)\), \(s = 1\)., Engineering and Applied Sciences
- Published
- 2014
- Full Text
- View/download PDF
31. Geoengineering: The world's largest control problem
- Author
-
MacMartin, Douglas G., Kravitz, Ben, and Keith, David
- Abstract
Solar geoengineering (or Solar Radiation Management, SRM) refers to any intentional, large-scale manipulation of the Earth's incoming solar radiation to offset some of the effects of anthropogenic greenhouse gases, reducing the associated risks from climate changes. Examples of such methods are injecting aerosols into the stratosphere or increasing marine cloud reflectivity, both of which would reflect some sunlight back to space. There are many serious concerns associated with any such approach, and also many challenges. One often overlooked aspect in geoengineering research is that this is a control problem, requiring (a) feedback of the observed climate state to manage significant uncertainty in both the radiative forcing and the climate's dynamic response to this forcing, and (b) optimization of the distribution of radiative effect to minimize regional disparities as well as side-effects from the geoengineering implementation. We present recent progress on control for this challenging problem, building on [1, 2], and discuss open research gaps. This is the first time an explicit external feedback loop has been implemented in a fully coupled general circulation model of the Earth's climate.
- Published
- 2014
- Full Text
- View/download PDF
32. Local Layering for Joint Motion Estimation and Occlusion Detection
- Author
-
Sun, Deqing, Liu, Ce, and Pfister, Hanspeter
- Abstract
Engineering and Applied Sciences
- Published
- 2014
33. Workload Prediction for Adaptive Power Scaling Using Deep Learning
- Author
-
Tarsa, Stephen John, Kumar, Amit, and Kung, H. T.
- Subjects
Accuracy ,Dictionaries ,Encoding ,Radiation detectors ,Throughput ,Training ,Vectors - Abstract
We apply hierarchical sparse coding, a form of deep learning, to model user-driven workloads based on on-chip hardware performance counters. We then predict periods of low instruction throughput, during which frequency and voltage can be scaled to reclaim power. Using a multi-layer coding structure, our method progressively codes counter values in terms of a few prominent features learned from data, and passes them to a Support Vector Machine (SVM) classifier where they act as signatures for predicting future workload states. We show that prediction accuracy and look-ahead range improve significantly over linear regression modeling, giving more time to adjust power management settings. Our method relies on learning and feature extraction algorithms that can discover and exploit hidden statistical invariances specific to workloads. We argue that, in addition to achieving superior prediction performance, our method is fast enough for practical use. To our knowledge, we are the first to use deep learning at the instruction level for workload prediction and on-chip power adaptation., Engineering and Applied Sciences
- Published
- 2014
- Full Text
- View/download PDF
34. Giza 3D: Digital archaeology and scholarly access to the Giza Pyramids: The Giza Project at Harvard University
- Author
-
Manuelian, Peter Der
- Abstract
For the famous Giza Pyramids, the Sphinx, and surrounding tombs and temples, just west of modern Cairo (3rd millennium BCE), the Giza Project at Harvard University is blending older traditional archives (dig photos, archaeological drawings, object metadata) with realistic 3D visualization of the site. This marriage of old and new provides revolutionary access to Giza, its statues, hieroglyphic inscriptions, architecture, and wall decoration. Real-time immersive models allow us to pose new research questions, provide interactive classroom instruction, and investigate diachronic approaches to Giza's evolution over several millennia., Anthropology
- Published
- 2013
- Full Text
- View/download PDF
35. Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning
- Author
-
Gwon, Youngjune Lee, Dastangoo, Siamak, Fossa, Carl, and Kung, H. T.
- Abstract
We introduce Competing Mobile Network Game (CMNG), a stochastic game played by cognitive radio networks that compete for dominating an open spectrum access. Differentiated from existing approaches, we incorporate both communicator and jamming nodes to form a network for friendly coalition, integrate antijamming and jamming subgames into a stochastic framework, and apply Q-learning techniques to solve for an optimal channel access strategy. We empirically evaluate our Q-learning based strategies and find that Minimax-Q learning is more suitable for an aggressive environment than Nash-Q while Friend-or-foe Q-learning can provide the best solution under distributed mobile ad hoc networking scenarios in which the centralized control can hardly be available., Engineering and Applied Sciences
- Published
- 2013
- Full Text
- View/download PDF
36. Hierarchical Sparse Coding for Wireless Link Prediction in an Airborne Scenario
- Author
-
Tarsa, Stephen John and Kung, H.T. T.
- Abstract
We build a data-driven hierarchical inference model to predict wireless link quality between a mobile unmanned aerial vehicle (UAV) and ground nodes. Clustering, sparse feature extraction, and non-linear pooling are combined to improve Support Vector Machine (SVM) classification when a limited training set does not comprehensively characterize data variations. Our approach first learns two layers of dictionaries by clustering packet reception data. These dictionaries are used to perform sparse feature extraction, which expresses link state vectors first in terms of a few prominent local patterns, or features, and then in terms of co-occurring features along the flight path. In order to tolerate artifacts like small positional shifts in field-collected data, we pool large magnitude features among overlapping shifted patches within windows. Together, these techniques transform raw link measurements into stable feature vectors that capture environmental effects driven by radio range limitations, antenna pattern variations, line-of-sight occlusions, etc. Link outage prediction is implemented by an SVM that assigns a common label to feature vectors immediately preceding gaps of successive packet losses, predictions are then fed to an adaptive link layer protocol that adjusts forward error correction rates, or queues packets during outages to prevent TCP timeout. In our harsh target environment, links are unstable and temporary outages common, so baseline TCP connections achieve only minimal throughput. However, connections under our predictive protocol temporarily hold packets that would otherwise be lost on unavailable links, and react quickly when the UAV link is restored, increasing overall channel utilization., Engineering and Applied Sciences
- Published
- 2013
- Full Text
- View/download PDF
37. Massively Parallel Model of Extended Memory Use in Evolutionary Game Dynamics
- Author
-
Randles, Amanda Elizabeth, Rand, David Gertler, Lee, Christopher, Sircar, Jayanta K., Nowak, Martin A., and Pfister, Hanspeter
- Subjects
game theory ,evolutionary dynamics ,multicore optimization - Abstract
To study the emergence of cooperative behavior, we have developed a scalable parallel framework for evolutionary game dynamics. This is a critical computational tool enabling large-scale agent simulation research. An important aspect is the amount of history, or memory steps, that each agent can keep. When six memory steps are taken into account, the strategy space spans \(2^{4096}\) potential strategies, requiring large populations of agents. We introduce a multi-level decomposition method that allows us to exploit both multi-node and thread-level parallel scaling while minimizing communication overhead. We present the results of a production run modeling up to six memory steps for populations consisting of up to 1018 agents, making this study one of the largest yet undertaken. The high rate of mutation within the population results in a non-trivial parallel implementation. The strong and weak scaling studies provide insight into parallel scalability and programmability trade-offs for large-scale simulations, while exhibiting near perfect weak and strong scaling on 16,384 tasks on Blue Gene/Q. We further show 99% weak scaling up to 294,912 processors 82% strong scaling efficiency up to 262,144 processors of Blue Gene/P. Our framework marks an important step in the study of game dynamics with potential applications in fields ranging from biology to economics and sociology., Engineering and Applied Sciences
- Published
- 2013
- Full Text
- View/download PDF
38. Tiled Array of Pixelated CZT Imaging Detectors for ProtoEXIST2 and MIRAX-HXI
- Author
-
Hong, Jaesub, Allen, Branden T, Grindlay, Jonathan E., Rodrigues, Barbara, Ellis, Jon Robert, Baker, Robert, Barthelmy, Scott, Mao, Peter, Miyasaka, Hiromasa, and Apple, Jeff
- Abstract
We have assembled a tiled array \((220 cm^2)\) of fine pixel (0.6 mm) imaging CZT detectors for a balloon borne widefield hard X-ray telescope, ProtoEXIST2. ProtoEXIST2 is a prototype experiment for a next generation hard X-ray imager MlRAX-HXI on board Lattes, a spacecraft from the Agencia Espacial Brasilieira. MlRAX will survey the 5 to 200 keV sky of Galactic bulge, adjoining southern Galactic plane and the extragalactic sky with 6' angular resolution. This survey will open a vast discovery space in timing studies of accretion neutron stars and black holes. The ProtoEXIST2 CZT detector plane consists of 64 of 5 mm thick 2cm × 2cm CZT crystals tiled with a minimal gap. MIRAX will consist of 4 such detector planes, each of which will be imaged with its own coded-aperture mask. We present the packaging architecture and assembly procedure of the ProtoEXIST2 detector. On 2012, Oct 10, we conducted a successful high altitude balloon experiment of the ProtoEXISTl and 2 telescopes, which demonstrates their technology readiness for space application. Both telescopes performed flawlessly during the flight as well as on the ground. We report the results of pre-flight ground calibration and the preliminary results for the detector performance in the balloon flight., Astronomy, Other Research Unit
- Published
- 2012
- Full Text
- View/download PDF
39. Machine Learning for Predictive Auto-Tuning with Boosted Regression Trees
- Author
-
Bergstra, James, Pinto, Nicolas, and Cox, David Daniel
- Subjects
correlation ,graphics processing unit ,instruction sets ,kernel ,libraries ,optimization ,regression tree analysis - Abstract
The rapidly evolving landscape of multicore architectures makes the construction of efficient libraries a daunting task. A family of methods known collectively as “auto-tuning” has emerged to address this challenge. Two major approaches to auto-tuning are empirical and model-based: empirical autotuning is a generic but slow approach that works by measuring runtimes of candidate implementations, model-based auto-tuning predicts those runtimes using simplified abstractions designed by hand. We show that machine learning methods for non-linear regression can be used to estimate timing models from data, capturing the best of both approaches. A statistically-derived model offers the speed of a model-based approach, with the generality and simplicity of empirical auto-tuning. We validate our approach using the filterbank correlation kernel described in Pinto and Cox [2012], where we find that 0.1 seconds of hill climbing on the regression model (“predictive auto-tuning”) can achieve almost the same speed-up as is brought by minutes of empirical auto-tuning. Our approach is not specific to filterbank correlation, nor even to GPU kernel auto-tuning, and can be applied to almost any templated-code optimization problem, spanning a wide variety of problem types, kernel types, and platforms., Engineering and Applied Sciences, Molecular and Cellular Biology
- Published
- 2012
- Full Text
- View/download PDF
40. Discriminative virtual views for cross-view action recognition
- Author
-
Ruonan, Li and Zickler, Todd
- Abstract
We propose an approach for cross-view action recognition by way of ‘virtual views’ that connect the action descriptors extracted from one (source) view to those extracted from another (target) view. Each virtual view is associated with a linear transformation of the action descriptor, and the sequence of transformations arising from the sequence of virtual views aims at bridging the source and target views while preserving discrimination among action categories. Our approach is capable of operating without access to labeled action samples in the target view and without access to corresponding action instances in the two views, and it also naturally incorporate and exploit corresponding instances or partial labeling in the target view when they are available. The proposed approach achieves improved or competitive performance relative to existing methods when instance correspondences or target labels are available, and it goes beyond the capabilities of these methods by providing some level of discrimination even when neither correspondences nor target labels exist., Engineering and Applied Sciences
- Published
- 2012
- Full Text
- View/download PDF
41. From Pixels to Physics: Probabilistic Color De-Rendering
- Author
-
Xiong, Ying, Saenko, K., Darrell, T., and Zickler, Todd
- Abstract
Consumer digital cameras use tone-mapping to produce compact, narrow-gamut images that are nonetheless visually pleasing. In doing so, they discard or distort substantial radiometric signal that could otherwise be used for computer vision. Existing methods attempt to undo these effects through deterministic maps that de-render the reported narrow-gamut colors back to their original wide-gamut sensor measurements. Deterministic approaches are unreliable, however, because the reverse narrow-to-wide mapping is one-to-many and has inherent uncertainty. Our solution is to use probabilistic maps, providing uncertainty estimates useful to many applications. We use a non-parametric Bayesian regression technique - local Gaussian process regression - to learn for each pixel's narrow-gamut color a probability distribution over the scene colors that could have created it. Using a variety of consumer cameras we show that these distributions, once learned from training data, are effective in simple probabilistic adaptations of two popular applications: multi-exposure imaging and photometric stereo. Our results on these applications are better than those of corresponding deterministic approaches, especially for saturated and out-of-gamut colors., Engineering and Applied Sciences
- Published
- 2012
- Full Text
- View/download PDF
42. Truthful Prioritization Schemes for Spectrum Sharing
- Author
-
Shnayder, Victor, Hoon, Jeremy, Parkes, David C., and Kawadia, Vikas
- Abstract
As the rapid expansion of smart phones and associated data-intensive applications continues, we expect to see renewed interest in dynamic prioritization schemes as a way to increase the total utility of a heterogeneous user base, with each user experiencing variable demand and value for access. We adapt a recent sampled-based mechanism for resource allocation to this setting, which is more effective in aligning incentives in a setting with variable demand than an earlier method for pricing network resources due to Varian and Mackie-Mason (1994). Complementing our theoretical analysis, which also considers incentives on the sell-side of the market, we present the results of a simulation study, confirming the effectiveness of our protocol in aligning incentives and boosting welfare., Engineering and Applied Sciences
- Published
- 2012
- Full Text
- View/download PDF
43. Achieving High Throughput Ground-to-UAV Transport via Parallel Links
- Author
-
Lin, Chit-Kwan, Kung, H. T., Lin, Tsung-Han, Tarsa, Stephen John, and Vlah, Dario
- Abstract
Wireless data transfer under high mobility, as found in unmanned aerial vehicle (UAV) applications, is a challenge due to varying channel quality and extended link outages. We present FlowCode, an easily deployable link-layer solution utilizing multiple transmitters and receivers for the purpose of supporting existing transport protocols such as TCP in these scenarios. By using multiple transmitters and receivers and by exploiting the resulting antenna beam diversity and parallel transmission effects, FlowCode increases throughput and reception range. In emulation, we show that TCP over FlowCode gives greater goodput over a larger portion of the flight path, compared to an enhanced TCP protocol using the standard 802.11 MAC. In the process, we make a strong case for using trace-modulated emulation when developing distributed protocols for complex wireless environments., Engineering and Applied Sciences
- Published
- 2011
- Full Text
- View/download PDF
44. Determining object geometry with compliance and simple sensors
- Author
-
Jentoft, Leif Patrick and Howe, Robert D.
- Abstract
To determine object geometry in unstructured environments, sensors must be mechanically robust, must exert only low forces on objects during exploration, and must be able to scan large regions efficiently without risk of damaging objects or sensors. Joint-angle sensors on compliant joints provide an appealing option for this task. An algorithmic framework is presented that allows them to be used for contact detection and to determine object geometry without requiring tactile arrays or other complicated contact location sensors. This volumetric approach to using proprioceptive sensors provides improvements in accuracy over other existing approaches based on the intersection of planes and lines., Engineering and Applied Sciences
- Published
- 2011
- Full Text
- View/download PDF
45. On the design of an interactive, patient-specific surgical simulator for mitral valve repair
- Author
-
Tenenholtz, Neil Arturo, Hammer, Peter, Schneider, Robert J., Vasilyev, Nikolay, and Howe, Robert D.
- Abstract
Surgical repair of the mitral valve is a difficult procedure that is often avoided in favor of less effective valve replacement because of the associated technical challenges facing non-expert surgeons. In the interest of increasing the rate of valve repair, an accurate, interactive surgical simulator for mitral valve repair was developed. With a haptic interface, users can interact with a mechanical model during simulation to aid in the development of a surgical plan and then virtually implement the procedure to assess its efficacy. Sub-millimeter accuracy was achieved in a validation study, and the system was successfully used by a cardiac surgeon to repair three virtual pathological valves., Engineering and Applied Sciences
- Published
- 2011
- Full Text
- View/download PDF
46. Algorithms for design of continuum robots using the concentric tubes approach: A neurosurgical example
- Author
-
Anor, Tomer, Madsen, Joseph Russell, and Dupont, Pierre E
- Abstract
We propose a novel systematic approach to optimizing the design of concentric tube robots for neurosurgical procedures. These procedures require that the robot approach specified target sites while navigating and operating within an anatomically constrained work space. The availability of preoperative imaging makes our approach particularly suited for neurosurgery, and we illustrate the method with the example of endoscopic choroid plexus ablation. A novel parameterization of the robot characteristics is used in conjunction with a global pattern search optimization method. The formulation returns the design of the least-complex robot capable of reaching single or multiple target points in a confined space with constrained optimization metrics. A particular advantage of this approach is that it identifies the need for either fixed-curvature versus variable-curvature sections. We demonstrate the performance of the method in four clinically relevant examples.
- Published
- 2011
- Full Text
- View/download PDF
47. Display-aware image editing
- Author
-
Jeong, Won-Ki, Johnson, Micah K., Kautz, Jan, Pfister, Hanspeter, Paris, Sylvain, and Yu, Insu
- Abstract
We describe a set of image editing and viewing tools that explicitly take into account the resolution of the display on which the image is viewed. Our approach is twofold. First, we design editing tools that process only the visible data, which is useful for images larger than the display. This encompasses cases such as multi-image panoramas and high-resolution medical data. Second, we propose an adaptive way to set viewing parameters such brightness and contrast. Because we deal with very large images, different locations and scales often require different viewing parameters. We let users set these parameters at a few places and interpolate satisfying values everywhere else. We demonstrate the efficiency of our approach on different display and image sizes. Since the computational complexity to render a view depends on the display resolution and not the actual input image resolution, we achieve interactive image editing even on a 16 gigapixel image., Engineering and Applied Sciences
- Published
- 2011
- Full Text
- View/download PDF
48. Segmentation fusion for connectomics
- Author
-
Vazquez-Reina, Amelio, Gelbart, Michael Adam, Huang, Daniel Eachern, Lichtman, Jeff, Miller, Eric, and Pfister, Hanspeter
- Abstract
We address the problem of automatic 3D segmentation of a stack of electron microscopy sections of brain tissue. Unlike previous efforts, where the reconstruction is usually done on a section-to-section basis, or by the agglomerative clustering of 2D segments, we leverage information from the entire volume to obtain a globally optimal 3D segmentation. To do this, we formulate the segmentation as the solution to a fusion problem. We first enumerate multiple possible 2D segmentations for each section in the stack, and a set of 3D links that may connect segments across consecutive sections. We then identify the fusion of segments and links that provide the most globally consistent segmentation of the stack. We show that this two-step approach of pre-enumeration and posterior fusion yields significant advantages and provides state-of-the-art reconstruction results. Finally, as part of this method, we also introduce a robust rotationally-invariant set of features that we use to learn and enumerate the above 2D segmentations. Our features outperform previous connectomic-specific descriptors without relying on a large set of heuristics or manually designed filter banks., Engineering and Applied Sciences
- Published
- 2011
- Full Text
- View/download PDF
49. Bounded Independence Fools Degree-2 Threshold Functions
- Author
-
Diakonikolas, Ilias, Kane, Daniel M., and Nelson, Jelani
- Abstract
For an n-variate degree-2 real polynomial p, we prove that \(E_{x\sim D}[sig(p(x))]\) Is determined up to an additive \(\epsilon\) as long as D is a k-wise Independent distribution over \(\{-1, 1\}^n\) for \(k = poly(1/\epsilon)\). This gives a broad class of explicit pseudorandom generators against degree-2 boolean threshold functions, and answers an open question of Diakonikolas et al. (FOCS 2009)., Engineering and Applied Sciences
- Published
- 2010
- Full Text
- View/download PDF
50. Measuring diversity on a low-altitude UAV in a ground-to-air wireless 802.11 mesh network
- Author
-
Kung, H. T., Lin, Chit-Kwan, Lin, Tsung-Han, Tarsa, Stephen John, and Vlah, Dario
- Abstract
We consider the problem of mitigating a highly varying wireless channel between a transmitting ground node and receivers on a small, low-altitude unmanned aerial vehicle (UAV) in a 802.11 wireless mesh network. One approach is to use multiple transmitter and receiver nodes that exploit the channel's spatial/temporal diversity and that cooperate to improve overall packet reception. We present a series of measurement results from a real-world testbed that characterize the resulting wireless channel. We show that the correlation between receiver nodes on the airplane is poor at small time scales so receiver diversity can be exploited. Our measurements suggest that using several receiver nodes simultaneously can boost packet delivery rates substantially. Lastly, we show that similar results apply to transmitter selection diversity as well., Engineering and Applied Sciences
- Published
- 2010
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.