-
Gras** the Inconspicuous
Authors:
Hrishikesh Gupta,
Stefan Thalhammer,
Markus Leitner,
Markus Vincze
Abstract:
Transparent objects are common in day-to-day life and hence find many applications that require robot gras**. Many solutions toward object gras** exist for non-transparent objects. However, due to the unique visual properties of transparent objects, standard 3D sensors produce noisy or distorted measurements. Modern approaches tackle this problem by either refining the noisy depth measurements…
▽ More
Transparent objects are common in day-to-day life and hence find many applications that require robot gras**. Many solutions toward object gras** exist for non-transparent objects. However, due to the unique visual properties of transparent objects, standard 3D sensors produce noisy or distorted measurements. Modern approaches tackle this problem by either refining the noisy depth measurements or using some intermediate representation of the depth. Towards this, we study deep learning 6D pose estimation from RGB images only for transparent object gras**. To train and test the suitability of RGB-based object pose estimation, we construct a dataset of RGB-only images with 6D pose annotations. The experiments demonstrate the effectiveness of RGB image space for gras** transparent objects.
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
An Exact Method for Fortification Games
Authors:
Markus Leitner,
Ivana Ljubić,
Michele Monaci,
Markus Sinnl,
Kübra Tanınmış
Abstract:
A fortification game (FG) is a three-level, two-player Stackelberg game, also known as defender-attacker-defender game, in which at the uppermost level, the defender selects some assets to be protected from potential malicious attacks. At the middle level, the attacker solves an interdiction game by depreciating unprotected assets, i.e., reducing the values of such assets for the defender, while a…
▽ More
A fortification game (FG) is a three-level, two-player Stackelberg game, also known as defender-attacker-defender game, in which at the uppermost level, the defender selects some assets to be protected from potential malicious attacks. At the middle level, the attacker solves an interdiction game by depreciating unprotected assets, i.e., reducing the values of such assets for the defender, while at the innermost level the defender solves a recourse problem over the surviving or partially damaged assets. Fortification games have applications in various important areas, such as military operations, design of survivable networks, protection of facilities, or power grid protection. In this work, we present an exact solution algorithm for FGs, in which the recourse problems correspond to (possibly NP-hard) combinatorial optimization problems. The algorithm is based on a new generic mixed-integer linear programming reformulation in the natural space of fortification variables. Our new model makes use of fortification cuts that measure the contribution of a given fortification strategy to the objective function value. These cuts are generated on-the-fly by solving separation problems, which correspond to (modified) middle-level interdiction games. We design a branch-and-cut-based solution algorithm based on fortification cuts, their lifted versions, and other speed-up techniques. We present a computational study using the knapsack fortification game and the shortest path fortification game. For the latter one, we include a comparison with a state-of-the-art solution method from the literature. Our algorithm outperforms this method and allows us to solve previously unsolved instances to optimality.
△ Less
Submitted 9 February, 2022; v1 submitted 26 November, 2021;
originally announced November 2021.
-
PyraPose: Feature Pyramids for Fast and Accurate Object Pose Estimation under Domain Shift
Authors:
Stefan Thalhammer,
Markus Leitner,
Timothy Patten,
Markus Vincze
Abstract:
Object pose estimation enables robots to understand and interact with their environments. Training with synthetic data is necessary in order to adapt to novel situations. Unfortunately, pose estimation under domain shift, i.e., training on synthetic data and testing in the real world, is challenging. Deep learning-based approaches currently perform best when using encoder-decoder networks but typi…
▽ More
Object pose estimation enables robots to understand and interact with their environments. Training with synthetic data is necessary in order to adapt to novel situations. Unfortunately, pose estimation under domain shift, i.e., training on synthetic data and testing in the real world, is challenging. Deep learning-based approaches currently perform best when using encoder-decoder networks but typically do not generalize to new scenarios with different scene characteristics. We argue that patch-based approaches, instead of encoder-decoder networks, are more suited for synthetic-to-real transfer because local to global object information is better represented. To that end, we present a novel approach based on a specialized feature pyramid network to compute multi-scale features for creating pose hypotheses on different feature map resolutions in parallel. Our single-shot pose estimation approach is evaluated on multiple standard datasets and outperforms the state of the art by up to 35%. We also perform gras** experiments in the real world to demonstrate the advantage of using synthetic data to generalize to novel environments.
△ Less
Submitted 30 October, 2020;
originally announced October 2020.
-
Environmental Impact of Bundling Transport Deliveries Using SUMO: Analysis of a cooperative approach in Austria
Authors:
Aso Validi,
Nicole Polasek,
Leonie Alabi,
Michael Leitner,
Cristina Olaverri-Monreal
Abstract:
Urban Traffic is recognized as one of the major CO2 contributors that puts a high burden on the environment. Different attempts have been made for reducing the impacts ranging from traffic management actions to shared-vehicle concepts to simply reducing the number of vehicles on the streets. By relying on cooperative approaches between different logistics companies, such as sharing and pooling res…
▽ More
Urban Traffic is recognized as one of the major CO2 contributors that puts a high burden on the environment. Different attempts have been made for reducing the impacts ranging from traffic management actions to shared-vehicle concepts to simply reducing the number of vehicles on the streets. By relying on cooperative approaches between different logistics companies, such as sharing and pooling resources for bundling deliveries in the same zone, an increased environmental benefit can be attained. To quantify this benefit we compare the CO2 emissions, fuel consumption and total delivery time resulting from deliveries performed by one cargo truck with two trailers versus by two single-trailer cargo trucks under real conditions in a simulation scenario in the city of Linz in Austria. Results showed a fuel consumption and CO2 emissions reduction of 28% and 34% respectively in the scenario in which resources were bundled in one single truck.
△ Less
Submitted 16 August, 2020; v1 submitted 16 June, 2020;
originally announced June 2020.
-
A Cross-Layer Security Analysis for Process-Aware Information Systems
Authors:
Maria Leitner,
Zhendong Ma,
Stefanie Rinderle-Ma
Abstract:
Information security in Process-aware Information System (PAIS) relies on many factors, including security of business process and the underlying system and technologies. Moreover, humans can be the weakest link that creates pathway to vulnerabilities, or the worst enemy that compromises a well-defended system. Since a system is as secure as its weakest link, information security can only be achie…
▽ More
Information security in Process-aware Information System (PAIS) relies on many factors, including security of business process and the underlying system and technologies. Moreover, humans can be the weakest link that creates pathway to vulnerabilities, or the worst enemy that compromises a well-defended system. Since a system is as secure as its weakest link, information security can only be achieved in PAIS if all factors are secure. In this paper, we address two research questions: how to conduct a cross-layer security analysis that couple security concerns at business process layer as well as at the technical layer; and how to include human factor into the security analysis for the identification of human-oriented vulnerabilities and threats. We propose a methodology that supports the tracking of security interdependencies between functional, technical, and human aspects which contribute to establish a holistic approach to information security in PAIS. We demonstrate the applicability with a scenario from the payment card industry.
△ Less
Submitted 13 July, 2015;
originally announced July 2015.