-
Uncovering implementable dormant pruning decisions from three different stakeholder perspectives
Authors:
Deanna Flynn,
Abhinav Jain,
Heather Knight,
Cristina G. Wilson,
Cindy Grimm
Abstract:
Dormant pruning, or the removal of unproductive portions of a tree while a tree is not actively growing, is an important orchard task to help maintain yield, requiring years to build expertise. Because of long training periods and an increasing labor shortage in agricultural jobs, pruning could benefit from robotic automation. However, to program robots to prune branches, we first need to understa…
▽ More
Dormant pruning, or the removal of unproductive portions of a tree while a tree is not actively growing, is an important orchard task to help maintain yield, requiring years to build expertise. Because of long training periods and an increasing labor shortage in agricultural jobs, pruning could benefit from robotic automation. However, to program robots to prune branches, we first need to understand how pruning decisions are made, and what variables in the environment (e.g., branch size and thickness) we need to capture. Working directly with three pruning stakeholders -- horticulturists, growers, and pruners -- we find that each group of human experts approaches pruning decision-making differently. To capture this knowledge, we present three studies and two extracted pruning protocols from field work conducted in Prosser, Washington in January 2022 and 2023. We interviewed six stakeholders (two in each group) and observed pruning across three cultivars -- Bing Cherries, Envy Apples, and Jazz Apples -- and two tree architectures -- Upright Fruiting Offshoot and V-Trellis. Leveraging participant interviews and video data, this analysis uses grounded coding to extract pruning terminology, discover horticultural contexts that influence pruning decisions, and find implementable pruning heuristics for autonomous systems. The results include a validated terminology set, which we offer for use by both pruning stakeholders and roboticists, to communicate general pruning concepts and heuristics. The results also highlight seven pruning heuristics utilizing this terminology set that would be relevant for use by future autonomous robot pruning systems, and characterize three discovered horticultural contexts (i.e., environmental management, crop-load management, and replacement wood) across all three cultivars.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Machine Vision Based Assessment of Fall Color Changes in Apple Trees: Exploring Relationship with Leaf Nitrogen Concentration
Authors:
Achyut Paudel,
Jostan Brown,
Priyanka Upadhyaya,
Atif Bilal Asad,
Safal Kshetri,
Manoj Karkee,
Joseph R. Davidson,
Cindy Grimm,
Ashley Thompson
Abstract:
Apple trees being deciduous trees, shed leaves each year which is preceded by the change in color of leaves from green to yellow (also known as senescence) during the fall season. The rate and timing of color change are affected by the number of factors including nitrogen (N) deficiencies. The green color of leaves is highly dependent on the chlorophyll content, which in turn depends on the nitrog…
▽ More
Apple trees being deciduous trees, shed leaves each year which is preceded by the change in color of leaves from green to yellow (also known as senescence) during the fall season. The rate and timing of color change are affected by the number of factors including nitrogen (N) deficiencies. The green color of leaves is highly dependent on the chlorophyll content, which in turn depends on the nitrogen concentration in the leaves. The assessment of the leaf color can give vital information on the nutrient status of the tree. The use of a machine vision based system to capture and quantify these timings and changes in leaf color can be a great tool for that purpose.
\par This study is based on data collected during the fall of 2021 and 2023 at a commercial orchard using a ground-based stereo-vision sensor for five weeks. The point cloud obtained from the sensor was segmented to get just the tree in the foreground. The study involved the segmentation of the trees in a natural background using point cloud data and quantification of the color using a custom-defined metric, \textit{yellowness index}, varying from $-1$ to $+1$ ($-1$ being completely green and $+1$ being completely yellow), which gives the proportion of yellow leaves on a tree. The performance of K-means based algorithm and gradient boosting algorithm were compared for \textit{yellowness index} calculation. The segmentation method proposed in the study was able to estimate the \textit{yellowness index} on the trees with $R^2 = 0.72$. The results showed that the metric was able to capture the gradual color transition from green to yellow over the study duration. It was also observed that the trees with lower nitrogen showed the color transition to yellow earlier than the trees with higher nitrogen. The onset of color transition during both years aligned with the $29^{th}$ week post-full bloom.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
The Grasp Reset Mechanism: An Automated Apparatus for Conducting Gras** Trials
Authors:
Kyle DuFrene,
Keegan Nave,
Joshua Campbell,
Ravi Balasubramanian,
Cindy Grimm
Abstract:
Advancing robotic gras** and manipulation requires the ability to test algorithms and/or train learning models on large numbers of grasps. Towards the goal of more advanced gras**, we present the Grasp Reset Mechanism (GRM), a fully automated apparatus for conducting large-scale gras** trials. The GRM automates the process of resetting a gras** environment, repeatably placing an object in…
▽ More
Advancing robotic gras** and manipulation requires the ability to test algorithms and/or train learning models on large numbers of grasps. Towards the goal of more advanced gras**, we present the Grasp Reset Mechanism (GRM), a fully automated apparatus for conducting large-scale gras** trials. The GRM automates the process of resetting a gras** environment, repeatably placing an object in a fixed location and controllable 1-D orientation. It also collects data and swaps between multiple objects enabling robust dataset collection with no human intervention. We also present a standardized state machine interface for control, which allows for integration of most manipulators with minimal effort. In addition to the physical design and corresponding software, we include a dataset of 1,020 grasps. The grasps were created with a Kinova Gen3 robot arm and Robotiq 2F-85 Adaptive Gripper to enable training of learning models and to demonstrate the capabilities of the GRM. The dataset includes ranges of grasps conducted across four objects and a variety of orientations. Manipulator states, object pose, video, and grasp success data are provided for every trial.
△ Less
Submitted 28 February, 2024;
originally announced February 2024.
-
The Door and Drawer Reset Mechanisms: Automated Mechanisms for Testing and Data Collection
Authors:
Kyle DuFrene,
Luke Strohbehn,
Keegan Nave,
Ravi Balasubramanian,
Cindy Grimm
Abstract:
Robotic manipulation in human environments is a challenging problem for researchers and industry alike. In particular, opening doors/drawers can be challenging for robots, as the size, shape, actuation and required force is variable. Because of this, it can be difficult to collect large real-world datasets and to benchmark different control algorithms on the same hardware. In this paper we present…
▽ More
Robotic manipulation in human environments is a challenging problem for researchers and industry alike. In particular, opening doors/drawers can be challenging for robots, as the size, shape, actuation and required force is variable. Because of this, it can be difficult to collect large real-world datasets and to benchmark different control algorithms on the same hardware. In this paper we present two automated testbeds, the Door Reset Mechanism (DORM) and Drawer Reset Mechanism (DWRM), for the purpose of real world testing and data collection. These devices are low-cost, are sensorized, operate with customized variable resistance, and come with open source software. Additionally, we provide a dataset of over 600 grasps using the DORM and DWRM. We use this dataset to highlight how much variability can exist even with the same trial on the same hardware. This data can also serve as a source for real-world noise in simulation environments.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
A real-time, hardware agnostic framework for close-up branch reconstruction using RGB data
Authors:
Alexander You,
Aarushi Mehta,
Luke Strohbehn,
Jochen Hemming,
Cindy Grimm,
Joseph R. Davidson
Abstract:
Creating accurate 3D models of tree topology is an important task for tree pruning. The 3D model is used to decide which branches to prune and then to execute the pruning cuts. Previous methods for creating 3D tree models have typically relied on point clouds, which are often computationally expensive to process and can suffer from data defects, especially with thin branches. In this paper, we pro…
▽ More
Creating accurate 3D models of tree topology is an important task for tree pruning. The 3D model is used to decide which branches to prune and then to execute the pruning cuts. Previous methods for creating 3D tree models have typically relied on point clouds, which are often computationally expensive to process and can suffer from data defects, especially with thin branches. In this paper, we propose a method for actively scanning along a primary tree branch, detecting secondary branches to be pruned, and reconstructing their 3D geometry using just an RGB camera mounted on a robot arm. We experimentally validate that our setup is able to produce primary branch models with 4-5 mm accuracy and secondary branch models with 15 degrees orientation accuracy with respect to the ground truth model. Our framework is real-time and can run up to 10 cm/s with no loss in model accuracy or ability to detect secondary branches.
△ Less
Submitted 18 June, 2024; v1 submitted 20 September, 2023;
originally announced September 2023.
-
Optimization-Based Mechanical Perception for Peduncle Localization During Robotic Fruit Harvest
Authors:
Miranda Cravetz,
Cindy Grimm,
Joseph R. Davidson
Abstract:
Rising global food demand and harsh working conditions make fruit harvest an important domain to automate. Peduncle localization is an important step for any automated fruit harvesting system, since fruit separation techniques are highly sensitive to peduncle location. Most work on peduncle localization has focused on computer vision, but peduncles can be difficult to visually access due to the cl…
▽ More
Rising global food demand and harsh working conditions make fruit harvest an important domain to automate. Peduncle localization is an important step for any automated fruit harvesting system, since fruit separation techniques are highly sensitive to peduncle location. Most work on peduncle localization has focused on computer vision, but peduncles can be difficult to visually access due to the cluttered nature of agricultural environments. Our work proposes an alternative method which relies on mechanical -- rather than visual -- perception to localize the peduncle. To estimate the location of this important plant feature, we fit wrench measurements from a wrist force/torque sensor to a physical model of the fruit-plant system, treating the fruit's attachment point as a parameter to be tuned. This method is performed inline as part of the fruit picking procedure. Using our orchard proxy for evaluation, we demonstrate that the technique is able to localize the peduncle within a median distance of 3.8 cm and median orientation error of 16.8 degrees.
△ Less
Submitted 27 September, 2022;
originally announced September 2022.
-
An autonomous robot for pruning modern, planar fruit trees
Authors:
Alexander You,
Nidhi Parayil,
Josyula Gopala Krishna,
Uddhav Bhattarai,
Ranjan Sapkota,
Dawood Ahmed,
Matthew Whiting,
Manoj Karkee,
Cindy M. Grimm,
Joseph R. Davidson
Abstract:
Dormant pruning of fruit trees is an important task for maintaining tree health and ensuring high-quality fruit. Due to decreasing labor availability, pruning is a prime candidate for robotic automation. However, pruning also represents a uniquely difficult problem for robots, requiring robust systems for perception, pruning point determination, and manipulation that must operate under variable li…
▽ More
Dormant pruning of fruit trees is an important task for maintaining tree health and ensuring high-quality fruit. Due to decreasing labor availability, pruning is a prime candidate for robotic automation. However, pruning also represents a uniquely difficult problem for robots, requiring robust systems for perception, pruning point determination, and manipulation that must operate under variable lighting conditions and in complex, highly unstructured environments. In this paper, we introduce a system for pruning sweet cherry trees (in a planar tree architecture called an upright fruiting offshoot configuration) that integrates various subsystems from our previous work on perception and manipulation. The resulting system is capable of operating completely autonomously and requires minimal control of the environment. We validate the performance of our system through field trials in a sweet cherry orchard, ultimately achieving a cutting success rate of 58%. Though not fully robust and requiring improvements in throughput, our system is the first to operate on fruit trees and represents a useful base platform to be improved in the future.
△ Less
Submitted 14 June, 2022;
originally announced June 2022.
-
Measuring a Robot Hand's Graspable Region using Power and Precision Grasps
Authors:
John Morrow,
Joshua Campbell,
Nuha Nishat,
Ravi Balasubramanian,
Cindy Grimm
Abstract:
The variety of robotic hand designs and actuation schemes makes it difficult to measure a hand's graspable volume. For end-users, this lack of standardized measurements makes it challenging to determine a priori if a robot hand is the right size for gras** an object. We propose a practical hand measurement standard, based on precision and power grasps, that is applicable to a wide variety of rob…
▽ More
The variety of robotic hand designs and actuation schemes makes it difficult to measure a hand's graspable volume. For end-users, this lack of standardized measurements makes it challenging to determine a priori if a robot hand is the right size for gras** an object. We propose a practical hand measurement standard, based on precision and power grasps, that is applicable to a wide variety of robot hand designs. The resulting measurements can be used to both determine if an object will fit in the hand and characterize the size of an object with respect to the hand. Our measurement procedure uses a functional approach, based on gras** a hypothetical cylinder, that allows the measurer choose the exact hand orientation and finger configurations that are used for the measurements. This ensures that the measurements are functionally comparable while relying on the human to determine the finger configurations that best match the intended grasp. We demonstrate using our measurement standard with three commercial robot hand designs and objects from the YCB data set.
△ Less
Submitted 26 April, 2022;
originally announced April 2022.
-
Optical flow-based branch segmentation for complex orchard environments
Authors:
Alexander You,
Cindy Grimm,
Joseph R. Davidson
Abstract:
Machine vision is a critical subsystem for enabling robots to be able to perform a variety of tasks in orchard environments. However, orchards are highly visually complex environments, and computer vision algorithms operating in them must be able to contend with variable lighting conditions and background noise. Past work on enabling deep learning algorithms to operate in these environments has ty…
▽ More
Machine vision is a critical subsystem for enabling robots to be able to perform a variety of tasks in orchard environments. However, orchards are highly visually complex environments, and computer vision algorithms operating in them must be able to contend with variable lighting conditions and background noise. Past work on enabling deep learning algorithms to operate in these environments has typically required large amounts of hand-labeled data to train a deep neural network or physically controlling the conditions under which the environment is perceived. In this paper, we train a neural network system in simulation only using simulated RGB data and optical flow. This resulting neural network is able to perform foreground segmentation of branches in a busy orchard environment without additional real-world training or using any special setup or equipment beyond a standard camera. Our results show that our system is highly accurate and, when compared to a network using manually labeled RGBD data, achieves significantly more consistent and robust performance across environments that differ from the training set.
△ Less
Submitted 25 February, 2022;
originally announced February 2022.
-
Effects of Interfaces on Human-Robot Trust: Specifying and Visualizing Physical Zones
Authors:
Marisa Hudspeth,
Sogol Balali,
Cindy Grimm,
Ross Sowell
Abstract:
In this paper we investigate the influence interfaces and feedback have on human-robot trust levels when operating in a shared physical space. The task we use is specifying a "no-go" region for a robot in an indoor environment. We evaluate three styles of interface (physical, AR, and map-based) and four feedback mechanisms (no feedback, robot drives around the space, an AR "fence", and the region…
▽ More
In this paper we investigate the influence interfaces and feedback have on human-robot trust levels when operating in a shared physical space. The task we use is specifying a "no-go" region for a robot in an indoor environment. We evaluate three styles of interface (physical, AR, and map-based) and four feedback mechanisms (no feedback, robot drives around the space, an AR "fence", and the region marked on the map). Our evaluation looks at both usability and trust. Specifically, if the participant trusts that the robot "knows" where the no-go region is and their confidence in the robot's ability to avoid that region. We use both self-reported and indirect measures of trust and usability. Our key findings are: 1) interfaces and feedback do influence levels of trust; 2) the participants largely preferred a mixed interface-feedback pair, where the modality for the interface differed from the feedback.
△ Less
Submitted 1 December, 2021;
originally announced December 2021.
-
Precision fruit tree pruning using a learned hybrid vision/interaction controller
Authors:
Alexander You,
Hannah Kolano,
Nidhi Parayil,
Cindy Grimm,
Joseph R. Davidson
Abstract:
Robotic tree pruning requires highly precise manipulator control in order to accurately align a cutting implement with the desired pruning point at the correct angle. Simultaneously, the robot must avoid applying excessive force to rigid parts of the environment such as trees, support posts, and wires. In this paper, we propose a hybrid control system that uses a learned vision-based controller to…
▽ More
Robotic tree pruning requires highly precise manipulator control in order to accurately align a cutting implement with the desired pruning point at the correct angle. Simultaneously, the robot must avoid applying excessive force to rigid parts of the environment such as trees, support posts, and wires. In this paper, we propose a hybrid control system that uses a learned vision-based controller to initially align the cutter with the desired pruning point, taking in images of the environment and outputting control actions. This controller is trained entirely in simulation, but transfers easily to real trees via a neural network which transforms raw images into a simplified, segmented representation. Once contact is established, the system hands over control to an interaction controller that guides the cutter pivot point to the branch while minimizing interaction forces. With this simple, yet novel, approach we demonstrate an improvement of over 30 percentage points in accuracy over a baseline controller that uses camera depth data.
△ Less
Submitted 27 September, 2021;
originally announced September 2021.
-
Gras** Benchmarks: Normalizing for Object Size \& Approximating Hand Workspaces
Authors:
John Morrow,
Nuha Nishat,
Joshua Campbell,
Ravi Balasubramanian,
Cindy Grimm
Abstract:
The varied landscape of robotic hand designs makes it difficult to set a standard for how to measure hand size and to communicate the size of objects it can grasp. Defining consistent workspace measurements would greatly assist scientific communication in robotic gras** research because it would allow researchers to 1) quantitatively communicate an object's relative size to a hand's and 2) appro…
▽ More
The varied landscape of robotic hand designs makes it difficult to set a standard for how to measure hand size and to communicate the size of objects it can grasp. Defining consistent workspace measurements would greatly assist scientific communication in robotic gras** research because it would allow researchers to 1) quantitatively communicate an object's relative size to a hand's and 2) approximate a functional subspace of a hand's kinematic workspace in a human-readable way. The goal of this paper is to specify a measurement procedure that quantitatively captures a hand's workspace size for both a precision and power grasp. This measurement procedure uses a {\em functional} approach -- based on a generic gras** scenario of a hypothetical object -- in order to make the procedure as generalizable and repeatable as possible, regardless of the actual hand design. This functional approach lets the measurer choose the exact finger configurations and contact points that satisfy the generic gras** scenario, while ensuring that the measurements are {\em functionally} comparable. We demonstrate these functional measurements on seven hand configurations. Additional hand measurements and instructions are provided in a GitHub Repository.
△ Less
Submitted 18 June, 2021;
originally announced June 2021.
-
Proper Value Equivalence
Authors:
Christopher Grimm,
André Barreto,
Gregory Farquhar,
David Silver,
Satinder Singh
Abstract:
One of the main challenges in model-based reinforcement learning (RL) is to decide which aspects of the environment should be modeled. The value-equivalence (VE) principle proposes a simple answer to this question: a model should capture the aspects of the environment that are relevant for value-based planning. Technically, VE distinguishes models based on a set of policies and a set of functions:…
▽ More
One of the main challenges in model-based reinforcement learning (RL) is to decide which aspects of the environment should be modeled. The value-equivalence (VE) principle proposes a simple answer to this question: a model should capture the aspects of the environment that are relevant for value-based planning. Technically, VE distinguishes models based on a set of policies and a set of functions: a model is said to be VE to the environment if the Bellman operators it induces for the policies yield the correct result when applied to the functions. As the number of policies and functions increase, the set of VE models shrinks, eventually collapsing to a single point corresponding to a perfect model. A fundamental question underlying the VE principle is thus how to select the smallest sets of policies and functions that are sufficient for planning. In this paper we take an important step towards answering this question. We start by generalizing the concept of VE to order-$k$ counterparts defined with respect to $k$ applications of the Bellman operator. This leads to a family of VE classes that increase in size as $k \rightarrow \infty$. In the limit, all functions become value functions, and we have a special instantiation of VE which we call proper VE or simply PVE. Unlike VE, the PVE class may contain multiple models even in the limit when all value functions are used. Crucially, all these models are sufficient for planning, meaning that they will yield an optimal policy despite the fact that they may ignore many aspects of the environment. We construct a loss function for learning PVE models and argue that popular algorithms such as MuZero can be understood as minimizing an upper bound for this loss. We leverage this connection to propose a modification to MuZero and show that it can lead to improved performance in practice.
△ Less
Submitted 12 December, 2021; v1 submitted 18 June, 2021;
originally announced June 2021.
-
Semantics-guided Skeletonization of Sweet Cherry Trees for Robotic Pruning
Authors:
Alexander You,
Cindy Grimm,
Abhisesh Silwal,
Joseph R. Davidson
Abstract:
Dormant pruning for fresh market fruit trees is a relatively unexplored application of agricultural robotics for which few end-to-end systems exist. One of the biggest challenges in creating an autonomous pruning system is the need to reconstruct a model of a tree which is accurate and informative enough to be useful for deciding where to cut. One useful structure for modeling a tree is a skeleton…
▽ More
Dormant pruning for fresh market fruit trees is a relatively unexplored application of agricultural robotics for which few end-to-end systems exist. One of the biggest challenges in creating an autonomous pruning system is the need to reconstruct a model of a tree which is accurate and informative enough to be useful for deciding where to cut. One useful structure for modeling a tree is a skeleton: a 1D, lightweight representation of the geometry and the topology of a tree. This skeletonization problem is an important one within the field of computer graphics, and a number of algorithms have been specifically developed for the task of modeling trees. These skeletonization algorithms have largely addressed the problem as a geometric one. In agricultural contexts, however, the parts of the tree have distinct labels, such as the trunk, supporting branches, etc. This labeled structure is important for understanding where to prune. We introduce an algorithm which produces such a labeled skeleton, using the topological and geometric priors associated with these labels to improve our skeletons. We test our skeletonization algorithm on point clouds from 29 upright fruiting offshoot (UFO) trees and demonstrate a median accuracy of 70% with respect to a human-evaluated gold standard. We also make point cloud scans of 82 UFO trees open-source to other researchers. Our work represents a significant first step towards a robust tree modeling framework which can be used in an autonomous pruning system.
△ Less
Submitted 3 March, 2021;
originally announced March 2021.
-
War** of Radar Data into Camera Image for Cross-Modal Supervision in Automotive Applications
Authors:
Christopher Grimm,
Tai Fei,
Ernst Warsitz,
Ridha Farhoud,
Tobias Breddermann,
Reinhold Haeb-Umbach
Abstract:
We present an approach to automatically generate semantic labels for real recordings of automotive range-Doppler (RD) radar spectra. Such labels are required when training a neural network for object recognition from radar data. The automatic labeling approach rests on the simultaneous recording of camera and lidar data in addition to the radar spectrum. By war** radar spectra into the camera im…
▽ More
We present an approach to automatically generate semantic labels for real recordings of automotive range-Doppler (RD) radar spectra. Such labels are required when training a neural network for object recognition from radar data. The automatic labeling approach rests on the simultaneous recording of camera and lidar data in addition to the radar spectrum. By war** radar spectra into the camera image, state-of-the-art object recognition algorithms can be applied to label relevant objects, such as cars, in the camera image. The war** operation is designed to be fully differentiable, which allows backpropagating the gradient computed on the camera image through the war** operation to the neural network operating on the radar data. As the war** operation relies on accurate scene flow estimation, we further propose a novel scene flow estimation algorithm which exploits information from camera, lidar and radar sensors. The proposed scene flow estimation approach is compared against a state-of-the-art scene flow algorithm, and it outperforms it by approximately 30% w.r.t. mean average error. The feasibility of the overall framework for automatic label generation for RD spectra is verified by evaluating the performance of neural networks trained with the proposed framework for Direction-of-Arrival estimation.
△ Less
Submitted 20 June, 2022; v1 submitted 23 December, 2020;
originally announced December 2020.
-
The Value Equivalence Principle for Model-Based Reinforcement Learning
Authors:
Christopher Grimm,
André Barreto,
Satinder Singh,
David Silver
Abstract:
Learning models of the environment from data is often viewed as an essential component to building intelligent reinforcement learning (RL) agents. The common practice is to separate the learning of the model from its use, by constructing a model of the environment's dynamics that correctly predicts the observed state transitions. In this paper we argue that the limited representational resources o…
▽ More
Learning models of the environment from data is often viewed as an essential component to building intelligent reinforcement learning (RL) agents. The common practice is to separate the learning of the model from its use, by constructing a model of the environment's dynamics that correctly predicts the observed state transitions. In this paper we argue that the limited representational resources of model-based RL agents are better used to build models that are directly useful for value-based planning. As our main contribution, we introduce the principle of value equivalence: two models are value equivalent with respect to a set of functions and policies if they yield the same Bellman updates. We propose a formulation of the model learning problem based on the value equivalence principle and analyze how the set of feasible solutions is impacted by the choice of policies and functions. Specifically, we show that, as we augment the set of policies and functions considered, the class of value equivalent models shrinks, until eventually collapsing to a single point corresponding to a model that perfectly describes the environment. In many problems, directly modelling state-to-state transitions may be both difficult and unnecessary. By leveraging the value-equivalence principle one may find simpler models without compromising performance, saving computation and memory. We illustrate the benefits of value-equivalent model learning with experiments comparing it against more traditional counterparts like maximum likelihood estimation. More generally, we argue that the principle of value equivalence underlies a number of recent empirical successes in RL, such as Value Iteration Networks, the Predictron, Value Prediction Networks, TreeQN, and MuZero, and provides a first theoretical underpinning of those results.
△ Less
Submitted 6 November, 2020;
originally announced November 2020.
-
Analyzing 3D Volume Segmentation by Low-level Perceptual Cues, High-level Cognitive Tasks, and Decision-making Processes
Authors:
Anahita Sanandaji,
Cindy Grimm,
Ruth West,
Max Parola,
Meghan Kajihara,
Kathryn Hays,
Luke Hillard,
Brandon Lane,
Molly Beyer
Abstract:
3D volume segmentation is a fundamental task in many scientific and medical applications. Producing accurate segmentations efficiently is challenging, in part due to low imaging data quality (e.g., noise and low image resolution) and ambiguity in the data that can only be resolved with higher-level knowledge of the structure. Automatic algorithms do exist, but there are many use cases where they f…
▽ More
3D volume segmentation is a fundamental task in many scientific and medical applications. Producing accurate segmentations efficiently is challenging, in part due to low imaging data quality (e.g., noise and low image resolution) and ambiguity in the data that can only be resolved with higher-level knowledge of the structure. Automatic algorithms do exist, but there are many use cases where they fail. The gold standard is still manual segmentation or review. Unfortunately, even for an expert, manual segmentation is laborious, time consuming, and prone to errors. Existing 3D segmentation tools are often designed based on the underlying algorithm, and do not take into account human mental models, their lower-level perception abilities, and higher-level cognitive tasks. Our goal is to analyze manual segmentation using the critical decision method (CDM) in order to gain a better understanding of the low-level (perceptual and marking) actions and higher-level decision-making processes that segmenters use. A key challenge we faced is that decision-making consists of an accumulated set of low-level visual-spatial decisions that are inter-related and difficult to articulate verbally. To address this, we developed a novel hybrid protocol which integrates CDM with eye-tracking, observation, and targeted questions. In this paper, we develop and validate data coding schemes for this hybrid data set that discern segmenters' low-level actions, higher-level cognitive tasks, overall task structures, and decision-making processes. We successfully detect the visual processing changes based on tasks sequences and micro decisions reflected in the eye-gaze data and identified different segmentation decision strategies utilized by the segmenters.
△ Less
Submitted 6 April, 2020;
originally announced April 2020.
-
Develo** and Validating an Interactive Training Tool for Inferring 2D Cross-Sections of Complex 3D Structures
Authors:
Anahita Sanandaji,
Cindy Grimm,
Ruth West,
Christopher Sanchez
Abstract:
Understanding 2D cross-sections of 3D structures is a crucial skill in many disciplines, from geology to medical imaging. Cross-section inference in the context of 3D structures requires a complex set of spatial/visualization skills including mental rotation, spatial structure understanding, and viewpoint projection. Prior studies show that experts differ from novices in these, and other, skill di…
▽ More
Understanding 2D cross-sections of 3D structures is a crucial skill in many disciplines, from geology to medical imaging. Cross-section inference in the context of 3D structures requires a complex set of spatial/visualization skills including mental rotation, spatial structure understanding, and viewpoint projection. Prior studies show that experts differ from novices in these, and other, skill dimensions. Building on a previously developed model that hierarchically characterizes the specific spatial sub-skills needed for this task, we have developed the first domain-agnostic, computer-based training tool for cross-section understanding of complex 3D structures. We demonstrate, in an evaluation with 60 participants, that this interactive tool is effective for increasing cross-section inference skills for a variety of structures, from simple primitive ones to more complex biological structures.
△ Less
Submitted 18 January, 2020;
originally announced January 2020.
-
Disentangled Cumulants Help Successor Representations Transfer to New Tasks
Authors:
Christopher Grimm,
Irina Higgins,
Andre Barreto,
Denis Teplyashin,
Markus Wulfmeier,
Tim Hertweck,
Raia Hadsell,
Satinder Singh
Abstract:
Biological intelligence can learn to solve many diverse tasks in a data efficient manner by re-using basic knowledge and skills from one task to another. Furthermore, many of such skills are acquired without explicit supervision in an intrinsically driven fashion. This is in contrast to the state-of-the-art reinforcement learning agents, which typically start learning each new task from scratch an…
▽ More
Biological intelligence can learn to solve many diverse tasks in a data efficient manner by re-using basic knowledge and skills from one task to another. Furthermore, many of such skills are acquired without explicit supervision in an intrinsically driven fashion. This is in contrast to the state-of-the-art reinforcement learning agents, which typically start learning each new task from scratch and struggle with knowledge transfer. In this paper we propose a principled way to learn a basis set of policies, which, when recombined through generalised policy improvement, come with guarantees on the coverage of the final task space. In particular, we concentrate on solving goal-based downstream tasks where the execution order of actions is not important. We demonstrate both theoretically and empirically that learning a small number of policies that reach intrinsically specified goal regions in a disentangled latent space can be re-used to quickly achieve a high level of performance on an exponentially larger number of externally specified, often significantly more complex downstream tasks. Our learning pipeline consists of two stages. First, the agent learns to perform intrinsically generated, goal-based tasks in the total absence of environmental rewards. Second, the agent leverages this experience to quickly achieve a high level of performance on numerous diverse externally specified tasks.
△ Less
Submitted 25 November, 2019;
originally announced November 2019.
-
Framing Effects on Privacy Concerns about a Home Telepresence Robot
Authors:
Matthew Rueben,
Frank J. Bernieri,
Cindy M. Grimm,
William D. Smart
Abstract:
Privacy-sensitive robotics is an emerging area of HRI research. Judgments about privacy would seem to be context-dependent, but none of the promising work on contextual "frames" has focused on privacy concerns. This work studies the impact of contextual "frames" on local users' privacy judgments in a home telepresence setting. Our methodology consists of using an online questionnaire to collect re…
▽ More
Privacy-sensitive robotics is an emerging area of HRI research. Judgments about privacy would seem to be context-dependent, but none of the promising work on contextual "frames" has focused on privacy concerns. This work studies the impact of contextual "frames" on local users' privacy judgments in a home telepresence setting. Our methodology consists of using an online questionnaire to collect responses to animated videos of a telepresence robot after framing people with an introductory paragraph.
The results of four studies indicate a large effect of manipulating the robot operator's identity between a stranger and a close confidante. It also appears that this framing effect persists throughout several videos. These findings serve to caution HRI researchers that a change in frame could cause their results to fail to replicate or generalize. We also recommend that robots be designed to encourage or discourage certain frames.
△ Less
Submitted 11 November, 2019;
originally announced November 2019.
-
Learning Independently-Obtainable Reward Functions
Authors:
Christopher Grimm,
Satinder Singh
Abstract:
We present a novel method for learning a set of disentangled reward functions that sum to the original environment reward and are constrained to be independently obtainable. We define independent obtainability in terms of value functions with respect to obtaining one learned reward while pursuing another learned reward. Empirically, we illustrate that our method can learn meaningful reward decompo…
▽ More
We present a novel method for learning a set of disentangled reward functions that sum to the original environment reward and are constrained to be independently obtainable. We define independent obtainability in terms of value functions with respect to obtaining one learned reward while pursuing another learned reward. Empirically, we illustrate that our method can learn meaningful reward decompositions in a variety of domains and that these decompositions exhibit some form of generalization performance when the environment's reward is modified. Theoretically, we derive results about the effect of maximizing our method's objective on the resulting reward functions and their corresponding optimal policies.
△ Less
Submitted 5 March, 2019; v1 submitted 24 January, 2019;
originally announced January 2019.
-
Mitigating Planner Overfitting in Model-Based Reinforcement Learning
Authors:
Dilip Arumugam,
David Abel,
Kavosh Asadi,
Nakul Gopalan,
Christopher Grimm,
Jun Ki Lee,
Lucas Lehnert,
Michael L. Littman
Abstract:
An agent with an inaccurate model of its environment faces a difficult choice: it can ignore the errors in its model and act in the real world in whatever way it determines is optimal with respect to its model. Alternatively, it can take a more conservative stance and eschew its model in favor of optimizing its behavior solely via real-world interaction. This latter approach can be exceedingly slo…
▽ More
An agent with an inaccurate model of its environment faces a difficult choice: it can ignore the errors in its model and act in the real world in whatever way it determines is optimal with respect to its model. Alternatively, it can take a more conservative stance and eschew its model in favor of optimizing its behavior solely via real-world interaction. This latter approach can be exceedingly slow to learn from experience, while the former can lead to "planner overfitting" - aspects of the agent's behavior are optimized to exploit errors in its model. This paper explores an intermediate position in which the planner seeks to avoid overfitting through a kind of regularization of the plans it considers. We present three different approaches that demonstrably mitigate planner overfitting in reinforcement-learning environments.
△ Less
Submitted 19 March, 2020; v1 submitted 3 December, 2018;
originally announced December 2018.
-
Learning Approximate Stochastic Transition Models
Authors:
Yuhang Song,
Christopher Grimm,
Xianming Wang,
Michael L. Littman
Abstract:
We examine the problem of learning map**s from state to state, suitable for use in a model-based reinforcement-learning setting, that simultaneously generalize to novel states and can capture stochastic transitions. We show that currently popular generative adversarial networks struggle to learn these stochastic transition models but a modification to their loss functions results in a powerful l…
▽ More
We examine the problem of learning map**s from state to state, suitable for use in a model-based reinforcement-learning setting, that simultaneously generalize to novel states and can capture stochastic transitions. We show that currently popular generative adversarial networks struggle to learn these stochastic transition models but a modification to their loss functions results in a powerful learning algorithm for this class of problems.
△ Less
Submitted 26 October, 2017;
originally announced October 2017.
-
Deep Abstract Q-Networks
Authors:
Melrose Roderick,
Christopher Grimm,
Stefanie Tellex
Abstract:
We examine the problem of learning and planning on high-dimensional domains with long horizons and sparse rewards. Recent approaches have shown great successes in many Atari 2600 domains. However, domains with long horizons and sparse rewards, such as Montezuma's Revenge and Venture, remain challenging for existing methods. Methods using abstraction (Dietterich 2000; Sutton, Precup, and Singh 1999…
▽ More
We examine the problem of learning and planning on high-dimensional domains with long horizons and sparse rewards. Recent approaches have shown great successes in many Atari 2600 domains. However, domains with long horizons and sparse rewards, such as Montezuma's Revenge and Venture, remain challenging for existing methods. Methods using abstraction (Dietterich 2000; Sutton, Precup, and Singh 1999) have shown to be useful in tackling long-horizon problems. We combine recent techniques of deep reinforcement learning with existing model-based approaches using an expert-provided state abstraction. We construct toy domains that elucidate the problem of long horizons, sparse rewards and high-dimensional inputs, and show that our algorithm significantly outperforms previous methods on these domains. Our abstraction-based approach outperforms Deep Q-Networks (Mnih et al. 2015) on Montezuma's Revenge and Venture, and exhibits backtracking behavior that is absent from previous methods.
△ Less
Submitted 25 August, 2018; v1 submitted 1 October, 2017;
originally announced October 2017.
-
Summable Reparameterizations of Wasserstein Critics in the One-Dimensional Setting
Authors:
Christopher Grimm,
Yuhang Song,
Michael L. Littman
Abstract:
Generative adversarial networks (GANs) are an exciting alternative to algorithms for solving density estimation problems---using data to assess how likely samples are to be drawn from the same distribution. Instead of explicitly computing these probabilities, GANs learn a generator that can match the given probabilistic source. This paper looks particularly at this matching capability in the conte…
▽ More
Generative adversarial networks (GANs) are an exciting alternative to algorithms for solving density estimation problems---using data to assess how likely samples are to be drawn from the same distribution. Instead of explicitly computing these probabilities, GANs learn a generator that can match the given probabilistic source. This paper looks particularly at this matching capability in the context of problems with one-dimensional outputs. We identify a class of function decompositions with properties that make them well suited to the critic role in a leading approach to GANs known as Wasserstein GANs. We show that Taylor and Fourier series decompositions belong to our class, provide examples of these critics outperforming standard GAN approaches, and suggest how they can be scaled to higher dimensional problems in the future.
△ Less
Submitted 19 September, 2017;
originally announced September 2017.
-
Modeling Latent Attention Within Neural Networks
Authors:
Christopher Grimm,
Dilip Arumugam,
Siddharth Karamcheti,
David Abel,
Lawson L. S. Wong,
Michael L. Littman
Abstract:
Deep neural networks are able to solve tasks across a variety of domains and modalities of data. Despite many empirical successes, we lack the ability to clearly understand and interpret the learned internal mechanisms that contribute to such effective behaviors or, more critically, failure modes. In this work, we present a general method for visualizing an arbitrary neural network's inner mechani…
▽ More
Deep neural networks are able to solve tasks across a variety of domains and modalities of data. Despite many empirical successes, we lack the ability to clearly understand and interpret the learned internal mechanisms that contribute to such effective behaviors or, more critically, failure modes. In this work, we present a general method for visualizing an arbitrary neural network's inner mechanisms and their power and limitations. Our dataset-centric method produces visualizations of how a trained network attends to components of its inputs. The computed "attention masks" support improved interpretability by highlighting which input attributes are critical in determining output. We demonstrate the effectiveness of our framework on a variety of deep neural network architectures in domains from computer vision, natural language processing, and reinforcement learning. The primary contribution of our approach is an interpretable visualization of attention that provides unique insights into the network's underlying decision-making process irrespective of the data modality.
△ Less
Submitted 30 December, 2017; v1 submitted 1 June, 2017;
originally announced June 2017.
-
Towards Verification of Uncertain Cyber-Physical Systems
Authors:
Carna Radojicic,
Christoph Grimm,
Axel Jantsch,
Michael Rathmair
Abstract:
Cyber-Physical Systems (CPS) pose new challenges to verification and validation that go beyond the proof of functional correctness based on high-level models. Particular challenges are, in particular for formal methods, its heterogeneity and scalability. For numerical simulation, uncertain behavior can hardly be covered in a comprehensive way which motivates the use of symbolic methods.
The pape…
▽ More
Cyber-Physical Systems (CPS) pose new challenges to verification and validation that go beyond the proof of functional correctness based on high-level models. Particular challenges are, in particular for formal methods, its heterogeneity and scalability. For numerical simulation, uncertain behavior can hardly be covered in a comprehensive way which motivates the use of symbolic methods.
The paper describes an approach for symbolic simulation-based verification of CPS with uncertainties. We define a symbolic model and representation of uncertain computations: Affine Arithmetic Decision Diagrams. Then we integrate this approach in the SystemC AMS simulator that supports simulation in different models of computation. We demonstrate the approach by analyzing a water-level monitor with uncertainties, self-diagnosis, and error-reactions.
△ Less
Submitted 10 April, 2017;
originally announced May 2017.
-
A Taxonomy of Privacy Constructs for Privacy-Sensitive Robotics
Authors:
Matthew Rueben,
Cindy M. Grimm,
Frank J. Bernieri,
William D. Smart
Abstract:
The introduction of robots into our society will also introduce new concerns about personal privacy. In order to study these concerns, we must do human-subject experiments that involve measuring privacy-relevant constructs. This paper presents a taxonomy of privacy constructs based on a review of the privacy literature. Future work in operationalizing privacy constructs for HRI studies is also dis…
▽ More
The introduction of robots into our society will also introduce new concerns about personal privacy. In order to study these concerns, we must do human-subject experiments that involve measuring privacy-relevant constructs. This paper presents a taxonomy of privacy constructs based on a review of the privacy literature. Future work in operationalizing privacy constructs for HRI studies is also discussed.
△ Less
Submitted 3 January, 2017;
originally announced January 2017.
-
Minimizing the Continuous Diameter when Augmenting a Geometric Tree with a Shortcut
Authors:
Jean-Lou De Carufel,
Carsten Grimm,
Anil Maheshwari,
Stefan Schirra,
Michiel Smid
Abstract:
We augment a tree $T$ with a shortcut $pq$ to minimize the largest distance between any two points along the resulting augmented tree $T+pq$. We study this problem in a continuous and geometric setting where $T$ is a geometric tree in the Euclidean plane, where a shortcut is a line segment connecting any two points along the edges of $T$, and we consider all points on $T+pq$ (i.e., vertices and po…
▽ More
We augment a tree $T$ with a shortcut $pq$ to minimize the largest distance between any two points along the resulting augmented tree $T+pq$. We study this problem in a continuous and geometric setting where $T$ is a geometric tree in the Euclidean plane, where a shortcut is a line segment connecting any two points along the edges of $T$, and we consider all points on $T+pq$ (i.e., vertices and points along edges) when determining the largest distance along $T+pq$. We refer to the largest distance between any two points along edges as the continuous diameter to distinguish it from the discrete diameter, i.e., the largest distance between any two vertices.
We establish that a single shortcut is sufficient to reduce the continuous diameter of a geometric tree $T$ if and only if the intersection of all diametral paths of $T$ is neither a line segment nor a single point. We determine an optimal shortcut for a geometric tree with $n$ straight-line edges in $O(n \log n)$ time. Apart from the running time, our results extend to geometric trees whose edges are rectifiable curves. The algorithm for trees generalizes our algorithm for paths.
△ Less
Submitted 20 October, 2017; v1 submitted 5 December, 2016;
originally announced December 2016.
-
Human-Planned Robotic Grasp Ranges: Capture and Validation
Authors:
Brendon John,
Jackson Carter,
Javier Ruiz,
Sai Krishna Allani,
Saurabh Dixit,
Cindy M. Grimm,
Ravi Balasubramanian
Abstract:
Leveraging human gras** skills to teach a robot to perform a manipulation task is appealing, but there are several limitations to this approach: time-inefficient data capture procedures, limited generalization of the data to other grasps and objects, and inability to use that data to learn more about how humans perform and evaluate grasps. This paper presents a data capture protocol that partial…
▽ More
Leveraging human gras** skills to teach a robot to perform a manipulation task is appealing, but there are several limitations to this approach: time-inefficient data capture procedures, limited generalization of the data to other grasps and objects, and inability to use that data to learn more about how humans perform and evaluate grasps. This paper presents a data capture protocol that partially addresses these deficiencies by asking participants to specify ranges over which a grasp is valid. The protocol is verified both qualitatively through online survey questions (where 95.38% of within-range grasps are identified correctly with the nearest extreme grasp) and quantitatively by showing that there is small variation in grasps ranges from different participants as measured by joint angles, contact points, and position. We demonstrate that these grasp ranges are valid through testing on a physical robot (93.75% of grasps interpolated from grasp ranges are successful).
△ Less
Submitted 12 July, 2016;
originally announced July 2016.
-
Sketched Floor plans versus SLAM maps: A Comparison
Authors:
Leo Bowen-Biggs,
Suzanne Dazo,
Yili Zhang,
Alex Hubers,
Matthew Rueben,
Ross Sowell,
William D. Smart,
Cindy Grimm
Abstract:
Maps --- specifically floor plans --- are useful for a variety of tasks from arranging furniture to designating conceptual or functional spaces (e.g., kitchen, walkway). We present a simple algorithm for quickly laying a floor plan (or other conceptual map) onto a SLAM map, creating a one-to-one map** between them. Our goal was to enable using a floor plan (or other hand-drawn or annotated map)…
▽ More
Maps --- specifically floor plans --- are useful for a variety of tasks from arranging furniture to designating conceptual or functional spaces (e.g., kitchen, walkway). We present a simple algorithm for quickly laying a floor plan (or other conceptual map) onto a SLAM map, creating a one-to-one map** between them. Our goal was to enable using a floor plan (or other hand-drawn or annotated map) in robotic applications instead of the typical SLAM map created by the robot. We look at two use cases, specifying "no-go" regions within a room and locating objects within a scanned room. Although a user study showed no statistical difference between the two types of maps in terms of performance on this spatial memory task, we argue that floor plans are closer to the mental maps people would naturally draw to characterize spaces.
△ Less
Submitted 15 June, 2016;
originally announced June 2016.
-
Minimizing the Continuous Diameter when Augmenting Paths and Cycles with Shortcuts
Authors:
Jean-Lou De Carufel,
Carsten Grimm,
Anil Maheshwari,
Michiel Smid
Abstract:
We seek to augment a geometric network in the Euclidean plane with shortcuts to minimize its continuous diameter, i.e., the largest network distance between any two points on the augmented network. Unlike in the discrete setting where a shortcut connects two vertices and the diameter is measured between vertices, we take all points along the edges of the network into account when placing a shortcu…
▽ More
We seek to augment a geometric network in the Euclidean plane with shortcuts to minimize its continuous diameter, i.e., the largest network distance between any two points on the augmented network. Unlike in the discrete setting where a shortcut connects two vertices and the diameter is measured between vertices, we take all points along the edges of the network into account when placing a shortcut and when measuring distances in the augmented network.
We study this network augmentation problem for paths and cycles. For paths, we determine an optimal shortcut in linear time. For cycles, we show that a single shortcut never decreases the continuous diameter and that two shortcuts always suffice to reduce the continuous diameter. Furthermore, we characterize optimal pairs of shortcuts for convex and non-convex cycles. Finally, we develop a linear time algorithm that produces an optimal pair of shortcuts for convex cycles. Apart from the algorithms, our results extend to rectifiable curves.
Our work reveals some of the underlying challenges that must be overcome when addressing the discrete version of this network augmentation problem, where we minimize the discrete diameter of a network with shortcuts that connect only vertices.
△ Less
Submitted 7 December, 2015;
originally announced December 2015.
-
Visualization techniques for the develo** chicken heart
Authors:
Ly Phan,
Sandra Rugonyi,
Cindy Grimm
Abstract:
We present a geometric surface parameterization algorithm and several visualization techniques adapted to the problem of understanding the 4D peristaltic-like motion of the outflow tract (OFT) in an embryonic chick heart. We illustrated the techniques using data from hearts under normal conditions (four embryos), and hearts in which blood flow conditions are altered through OFT banding (four embry…
▽ More
We present a geometric surface parameterization algorithm and several visualization techniques adapted to the problem of understanding the 4D peristaltic-like motion of the outflow tract (OFT) in an embryonic chick heart. We illustrated the techniques using data from hearts under normal conditions (four embryos), and hearts in which blood flow conditions are altered through OFT banding (four embryos). The overall goal is to create quantitative measures of the temporal heart-shape change both within a single subject and between multiple subjects. These measures will help elucidate how altering hemodynamic conditions changes the shape and motion of the OFT walls, which in turn influence the stresses and strains on the develo** heart, causing it to develop differently. We take advantage of the tubular shape and periodic motion of the OFT to produce successively lower dimensional visualizations of the cardiac motion (e.g. curvature, volume, and cross-section) over time, and quantifications of such visualizations.
△ Less
Submitted 29 September, 2015;
originally announced September 2015.
-
A Lower Bound on Supporting Predecessor Search in $k$ sorted Arrays
Authors:
Carsten Grimm
Abstract:
We seek to perform efficient queries for the predecessor among $n$ values stored in $k$ sorted arrays. Evading the $Ω(n \log k)$ lower bound from merging $k$ arrays, we support predecessor queries in $O(\log n)$ time after $O(n \log(\frac{k}{\log n}))$ construction time. By applying Ben-Or's technique, we establish that this is optimal for strict predecessor queries, i.e., every data structure sup…
▽ More
We seek to perform efficient queries for the predecessor among $n$ values stored in $k$ sorted arrays. Evading the $Ω(n \log k)$ lower bound from merging $k$ arrays, we support predecessor queries in $O(\log n)$ time after $O(n \log(\frac{k}{\log n}))$ construction time. By applying Ben-Or's technique, we establish that this is optimal for strict predecessor queries, i.e., every data structure supporting $O(\log n)$-time strict predecessor queries requires $Ω(n \log(\frac{k}{\log n}))$ construction time. Our approach generalizes as a template for deriving similar lower bounds on the construction time of data structures with some desired query time.
△ Less
Submitted 14 July, 2015;
originally announced July 2015.
-
Efficient Farthest-Point Queries in Two-Terminal Series-Parallel Networks
Authors:
Carsten Grimm
Abstract:
Consider the continuum of points along the edges of a network, i.e., a connected, undirected graph with positive edge weights. We measure the distance between these points in terms of the weighted shortest path distance, called the network distance. Within this metric space, we study farthest points and farthest distances. We introduce a data structure supporting queries for the farthest distance…
▽ More
Consider the continuum of points along the edges of a network, i.e., a connected, undirected graph with positive edge weights. We measure the distance between these points in terms of the weighted shortest path distance, called the network distance. Within this metric space, we study farthest points and farthest distances. We introduce a data structure supporting queries for the farthest distance and the farthest points on two-terminal series-parallel networks. This data structure supports farthest-point queries in $O(k + \log n)$ time after $O(n \log p)$ construction time, where $k$ is the number of farthest points, $n$ is the size of the network, and $p$ parallel operations are required to generate the network.
△ Less
Submitted 29 July, 2015; v1 submitted 5 March, 2015;
originally announced March 2015.
-
Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems
Authors:
Alexander Hubers,
Emily Andrulis,
Levi Scott,
Tanner Stirrat,
Duc Tran,
Ruonan Zhang,
Ross Sowell,
Cindy Grimm,
William D. Smart
Abstract:
Systems that give control of a mobile robot to a remote user raise privacy concerns about what the remote user can see and do through the robot. We aim to preserve some of that privacy by manipulating the video data that the remote user sees. Through two user studies, we explore the effectiveness of different video manipulation techniques at providing different types of privacy. We simultaneously…
▽ More
Systems that give control of a mobile robot to a remote user raise privacy concerns about what the remote user can see and do through the robot. We aim to preserve some of that privacy by manipulating the video data that the remote user sees. Through two user studies, we explore the effectiveness of different video manipulation techniques at providing different types of privacy. We simultaneously examine task performance in the presence of privacy protection. In the first study, participants were asked to watch a video captured by a robot exploring an office environment and to complete a series of observational tasks under differing video manipulation conditions. Our results show that using manipulations of the video stream can lead to fewer privacy violations for different privacy types. Through a second user study, it was demonstrated that these privacy-protecting techniques were effective without diminishing the task performance of the remote user.
△ Less
Submitted 13 January, 2015;
originally announced January 2015.
-
Optimal Data Structures for Farthest-Point Queries in Cactus Networks
Authors:
Prosenjit Bose,
Jean-Lou De Carufel,
Carsten Grimm,
Anil Maheshwari,
Michiel Smid
Abstract:
Consider the continuum of points on the edges of a network, i.e., a connected, undirected graph with positive edge weights. We measure the distance between these points in terms of the weighted shortest path distance, called the network distance. Within this metric space, we study farthest points and farthest distances. We introduce optimal data structures supporting queries for the farthest dista…
▽ More
Consider the continuum of points on the edges of a network, i.e., a connected, undirected graph with positive edge weights. We measure the distance between these points in terms of the weighted shortest path distance, called the network distance. Within this metric space, we study farthest points and farthest distances. We introduce optimal data structures supporting queries for the farthest distance and the farthest points on trees, cycles, uni-cyclic networks, and cactus networks.
△ Less
Submitted 7 November, 2014;
originally announced November 2014.
-
A Note on the Unsolvability of the Weighted Region Shortest Path Problem
Authors:
Jean-Lou De Carufel,
Carsten Grimm,
Anil Maheshwari,
Megan Owen,
Michiel Smid
Abstract:
Let S be a subdivision of the plane into polygonal regions, where each region has an associated positive weight. The weighted region shortest path problem is to determine a shortest path in S between two points s, t in R^2, where the distances are measured according to the weighted Euclidean metric-the length of a path is defined to be the weighted sum of (Euclidean) lengths of the sub-paths withi…
▽ More
Let S be a subdivision of the plane into polygonal regions, where each region has an associated positive weight. The weighted region shortest path problem is to determine a shortest path in S between two points s, t in R^2, where the distances are measured according to the weighted Euclidean metric-the length of a path is defined to be the weighted sum of (Euclidean) lengths of the sub-paths within each region. We show that this problem cannot be solved in the Algebraic Computation Model over the Rational Numbers (ACMQ). In the ACMQ, one can compute exactly any number that can be obtained from the rationals Q by applying a finite number of operations from +, -, \times, ÷, \sqrt[k]{}, for any integer k >= 2. Our proof uses Galois theory and is based on Bajaj's technique.
△ Less
Submitted 22 May, 2013;
originally announced May 2013.
-
Network Farthest-Point Diagrams
Authors:
Prosenjit Bose,
Kai Dannies,
Jean-Lou De Carufel,
Christoph Doell,
Carsten Grimm,
Anil Maheshwari,
Stefan Schirra,
Michiel Smid
Abstract:
Consider the continuum of points along the edges of a network, i.e., an undirected graph with positive edge weights. We measure distance between these points in terms of the shortest path distance along the network, known as the network distance. Within this metric space, we study farthest points.
We introduce network farthest-point diagrams, which capture how the farthest points---and the dista…
▽ More
Consider the continuum of points along the edges of a network, i.e., an undirected graph with positive edge weights. We measure distance between these points in terms of the shortest path distance along the network, known as the network distance. Within this metric space, we study farthest points.
We introduce network farthest-point diagrams, which capture how the farthest points---and the distance to them---change as we traverse the network. We preprocess a network G such that, when given a query point q on G, we can quickly determine the farthest point(s) from q in G as well as the farthest distance from q in G. Furthermore, we introduce a data structure supporting queries for the parts of the network that are farther away from q than some threshold R > 0, where R is part of the query.
We also introduce the minimum eccentricity feed-link problem defined as follows. Given a network G with geometric edge weights and a point p that is not on G, connect p to a point q on G with a straight line segment pq, called a feed-link, such that the largest network distance from p to any point in the resulting network is minimized. We solve the minimum eccentricity feed-link problem using eccentricity diagrams. In addition, we provide a data structure for the query version, where the network G is fixed and a query consists of the point p.
△ Less
Submitted 6 April, 2013;
originally announced April 2013.
-
Emerging Challenges in Computational Topology
Authors:
Marshall Bern,
David Eppstein,
Pankaj K. Agarwal,
Nina Amenta,
Paul Chew,
Tamal Dey,
David P. Dobkin,
Herbert Edelsbrunner,
Cindy Grimm,
Leonidas J. Guibas,
John Harer,
Joel Hass,
Andrew Hicks,
Carroll K. Johnson,
Gilad Lerman,
David Letscher,
Paul Plassmann,
Eric Sedgwick,
Jack Snoeyink,
Jeff Weeks,
Chee Yap,
Denis Zorin
Abstract:
Here we present the results of the NSF-funded Workshop on Computational Topology, which met on June 11 and 12 in Miami Beach, Florida. This report identifies important problems involving both computation and topology.
Here we present the results of the NSF-funded Workshop on Computational Topology, which met on June 11 and 12 in Miami Beach, Florida. This report identifies important problems involving both computation and topology.
△ Less
Submitted 1 September, 1999;
originally announced September 1999.