-
The Resh Programming Language for Multirobot Orchestration
Authors:
Martin Carroll,
Kedar S. Namjoshi,
Itai Segall
Abstract:
This paper describes Resh, a new, statically typed, interpreted programming language and associated runtime for orchestrating multirobot systems. The main features of Resh are: (1) It offloads much of the tedious work of programming such systems away from the programmer and into the language runtime; (2) It is based on a small set of temporal and locational operators; and (3) It is not restricted…
▽ More
This paper describes Resh, a new, statically typed, interpreted programming language and associated runtime for orchestrating multirobot systems. The main features of Resh are: (1) It offloads much of the tedious work of programming such systems away from the programmer and into the language runtime; (2) It is based on a small set of temporal and locational operators; and (3) It is not restricted to specific robot types or tasks. The Resh runtime consists of three engines that collaborate to run a Resh program using the available robots in their current environment. This paper describes both Resh and its runtime and gives examples of its use.
△ Less
Submitted 25 March, 2021;
originally announced March 2021.
-
Broadcast Guidance of Agents in Deviated Linear Cyclic Pursuit
Authors:
Ilana Segall,
Alfred M. Bruckstein
Abstract:
In this report we show the emergent behavior of a group of agents, ordered from 1 to n, performing deviated, linear, cyclic pursuit, in the presence of a broadcast guidance control. Each agent senses the relative position of its target, i.e. agent i senses the relative position of agent i+1. The broadcast control, a velocity signal, is detected by a random set of agents in the group. We assume the…
▽ More
In this report we show the emergent behavior of a group of agents, ordered from 1 to n, performing deviated, linear, cyclic pursuit, in the presence of a broadcast guidance control. Each agent senses the relative position of its target, i.e. agent i senses the relative position of agent i+1. The broadcast control, a velocity signal, is detected by a random set of agents in the group. We assume the agents to be modeled as single integrators. We show that the emergent behavior of the group is determined by the deviation angle and by the set of agents detecting the guidance control.
△ Less
Submitted 1 November, 2020;
originally announced November 2020.
-
Guidance of Agents in Cyclic Pursuit
Authors:
Ilana Segall,
Alfred Bruckstein
Abstract:
This report studies the emergent behavior of systems of agents performing cyclic pursuit controlled by an external broadcast signal detected by a random set of the agents. Two types of cyclic pursuit are analyzed: 1)linear cyclic pursuit, where each agent senses the relative position of its target or leading agent 2)non-linear cyclic pursuit, where the agents can sense only bearing to their leadin…
▽ More
This report studies the emergent behavior of systems of agents performing cyclic pursuit controlled by an external broadcast signal detected by a random set of the agents. Two types of cyclic pursuit are analyzed: 1)linear cyclic pursuit, where each agent senses the relative position of its target or leading agent 2)non-linear cyclic pursuit, where the agents can sense only bearing to their leading agent and colliding agents merge and continue on the path of the pursued agent (a so-called "bugs" model). Cyclic pursuit is, in both cases, a gathering algorithm, which has been previously analyzed. The novelty of our work is the derivation of emergent behaviours, in both linear and non-linear cyclic pursuit, in the presence of an exogenous broadcast control detected by a random subset of agents. We show that the emergent behavior of the swarm depends on the type of cyclic pursuit. In the linear case, the agents asymptotically align in the desired direction and move with a common speed which is a proportional to the ratio of the number of agents detecting the broadcast control to the total number of agents in the swarm, for any magnitude of input (velocity) signal. In the non-linear case, the agents gather and move with a shared velocity, which equals the input velocity signal, independently of the number of agents detecting the broadcast signal.
△ Less
Submitted 2 July, 2020;
originally announced July 2020.
-
Federated Learning for Ranking Browser History Suggestions
Authors:
Florian Hartmann,
Sunah Suh,
Arkadiusz Komarzewski,
Tim D. Smith,
Ilana Segall
Abstract:
Federated Learning is a new subfield of machine learning that allows fitting models without collecting the training data itself. Instead of sharing data, users collaboratively train a model by only sending weight updates to a server. To improve the ranking of suggestions in the Firefox URL bar, we make use of Federated Learning to train a model on user interactions in a privacy-preserving way. Thi…
▽ More
Federated Learning is a new subfield of machine learning that allows fitting models without collecting the training data itself. Instead of sharing data, users collaboratively train a model by only sending weight updates to a server. To improve the ranking of suggestions in the Firefox URL bar, we make use of Federated Learning to train a model on user interactions in a privacy-preserving way. This trained model replaces a handcrafted heuristic, and our results show that users now type over half a character less to find what they are looking for. To be able to deploy our system to real users without degrading their experience during training, we design the optimization process to be robust. To this end, we use a variant of Rprop for optimization, and implement additional safeguards. By using a numerical gradient approximation technique, our system is able to optimize anything in Firefox that is currently based on handcrafted heuristics. Our paper shows that Federated Learning can be used successfully to train models in privacy-respecting ways.
△ Less
Submitted 26 November, 2019;
originally announced November 2019.
-
Verifying Robustness of Gradient Boosted Models
Authors:
Gil Einziger,
Maayan Goldstein,
Yaniv Sa'ar,
Itai Segall
Abstract:
Gradient boosted models are a fundamental machine learning technique. Robustness to small perturbations of the input is an important quality measure for machine learning models, but the literature lacks a method to prove the robustness of gradient boosted models. This work introduces VeriGB, a tool for quantifying the robustness of gradient boosted models. VeriGB encodes the model and the robustne…
▽ More
Gradient boosted models are a fundamental machine learning technique. Robustness to small perturbations of the input is an important quality measure for machine learning models, but the literature lacks a method to prove the robustness of gradient boosted models. This work introduces VeriGB, a tool for quantifying the robustness of gradient boosted models. VeriGB encodes the model and the robustness property as an SMT formula, which enables state of the art verification tools to prove the model's robustness. We extensively evaluate VeriGB on publicly available datasets and demonstrate a capability for verifying large models. Finally, we show that some model configurations tend to be inherently more robust than others.
△ Less
Submitted 26 June, 2019;
originally announced June 2019.
-
Learning Software Constraints via Installation Attempts
Authors:
Ran Ben Basat,
Maayan Goldstein,
Itai Segall
Abstract:
Modern software systems are expected to be secure and contain all the latest features, even when new versions of software are released multiple times an hour. Each system may include many interacting packages. The problem of installing multiple dependent packages has been extensively studied in the past, yielding some promising solutions that work well in practice. However, these assume that the d…
▽ More
Modern software systems are expected to be secure and contain all the latest features, even when new versions of software are released multiple times an hour. Each system may include many interacting packages. The problem of installing multiple dependent packages has been extensively studied in the past, yielding some promising solutions that work well in practice. However, these assume that the developers declare all the dependencies and conflicts between the packages. Oftentimes, the entire repository structure may not be known upfront, for example when packages are developed by different vendors. In this paper, we present algorithms for learning dependencies, conflicts and defective packages from installation attempts. Our algorithms use combinatorial data structures to generate queries that test installations and discover the entire dependency structure. A query that the algorithms make corresponds to trying to install a subset of packages and getting a Boolean feedback on whether all constraints were satisfied in this subset. Our goal is to minimize the query complexity of the algorithms. We prove lower and upper bounds on the number of queries that these algorithms require to make for different settings of the problem.
△ Less
Submitted 14 November, 2018; v1 submitted 24 April, 2018;
originally announced April 2018.
-
Using Machine Learning to Detect Noisy Neighbors in 5G Networks
Authors:
Udi Margolin,
Alberto Mozo,
Bruno Ordozgoiti,
Danny Raz,
Elisha Rosensweig,
Itai Segall
Abstract:
5G networks are expected to be more dynamic and chaotic in their structure than current networks. With the advent of Network Function Virtualization (NFV), Network Functions (NF) will no longer be tightly coupled with the hardware they are running on, which poses new challenges in network management. Noisy neighbor is a term commonly used to describe situations in NFV infrastructure where an appli…
▽ More
5G networks are expected to be more dynamic and chaotic in their structure than current networks. With the advent of Network Function Virtualization (NFV), Network Functions (NF) will no longer be tightly coupled with the hardware they are running on, which poses new challenges in network management. Noisy neighbor is a term commonly used to describe situations in NFV infrastructure where an application experiences degradation in performance due to the fact that some of the resources it needs are occupied by other applications in the same cloud node. These situations cannot be easily identified using straightforward approaches, which calls for the use of sophisticated methods for NFV infrastructure management. In this paper we demonstrate how Machine Learning (ML) techniques can be used to identify such events. Through experiments using data collected at real NFV infrastructure, we show that standard models for automated classification can detect the noisy neighbor phenomenon with an accuracy of more than 90% in a simple scenario.
△ Less
Submitted 24 October, 2016;
originally announced October 2016.
-
Stochastic Broadcast Control of Multi-Agent Swarms
Authors:
Ilana Segall,
Alfred Bruckstein
Abstract:
We present a model for controlling swarms of mobile agents via broadcast control, assumed to be detected by a random set of agents in the swarm. The agents that detect the control signal become ad-hoc leaders of the swarm. The agents are assumed to be velocity controlled, identical, anonymous, memory-less units with limited capabilities of sensing their neighborhood. Each agent is programmed to be…
▽ More
We present a model for controlling swarms of mobile agents via broadcast control, assumed to be detected by a random set of agents in the swarm. The agents that detect the control signal become ad-hoc leaders of the swarm. The agents are assumed to be velocity controlled, identical, anonymous, memory-less units with limited capabilities of sensing their neighborhood. Each agent is programmed to behave according to a linear local gathering process, based on the relative position of all its neighbors. The detected exogenous control, which is a desired velocity vector, is added by the leaders to the local gathering control. The graph induced by the agents adjacency is referred to as the visibility graph. We show that for piece-wise constant system parameters and a connected visibility graph, the swarm asymptotically aligns in each time-interval on a line in the direction of the exogenous control signal, and all the agents move with identical speed. These results hold for two models of pairwise influence in the gathering process, uniform and scaled. The impact of the influence model is mostly evident when the visibility graph is incomplete. These results are conditioned by the preservation of the connectedness of the visibility graph. In the second part of the report we analyze sufficient conditions for preserving the connectedness of the visibility graph. We show that if the visibility graph is complete then certain bounds on the control signal suffice to preserve the completeness of the graph. However, when the graph is incomplete, general conditions, independent of the leaders topology, could not be found.
△ Less
Submitted 17 July, 2016;
originally announced July 2016.