Skip to main content

Showing 1–8 of 8 results for author: Natarajan, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.16178  [pdf, other

    cs.RO cs.AI

    Mixed-Initiative Human-Robot Teaming under Suboptimality with Online Bayesian Adaptation

    Authors: Manisha Natarajan, Chunyue Xue, Sanne van Waveren, Karen Feigh, Matthew Gombolay

    Abstract: For effective human-agent teaming, robots and other artificial intelligence (AI) agents must infer their human partner's abilities and behavioral response patterns and adapt accordingly. Most prior works make the unrealistic assumption that one or more teammates can act near-optimally. In real-world collaboration, humans and autonomous agents can be suboptimal, especially when each only has partia… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

    Comments: 8 pages, 4 pages for supplementary

  2. arXiv:2403.10794  [pdf, other

    cs.RO cs.LG cs.MA

    Diffusion-Reinforcement Learning Hierarchical Motion Planning in Adversarial Multi-agent Games

    Authors: Zixuan Wu, Sean Ye, Manisha Natarajan, Matthew C. Gombolay

    Abstract: Reinforcement Learning- (RL-)based motion planning has recently shown the potential to outperform traditional approaches from autonomous navigation to robot manipulation. In this work, we focus on a motion planning task for an evasive target in a partially observable multi-agent adversarial pursuit-evasion games (PEG). These pursuit-evasion problems are relevant to various applications, such as se… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

    Comments: This work has been submitted to the IEEE Robotics and Automation Letters (RA-L) for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  3. arXiv:2307.06244  [pdf, other

    cs.RO cs.LG cs.MA

    Diffusion Models for Multi-target Adversarial Tracking

    Authors: Sean Ye, Manisha Natarajan, Zixuan Wu, Matthew Gombolay

    Abstract: Target tracking plays a crucial role in real-world scenarios, particularly in drug-trafficking interdiction, where the knowledge of an adversarial target's location is often limited. Improving autonomous tracking systems will enable unmanned aerial, surface, and underwater vehicles to better assist in interdicting smugglers that use manned surface, semi-submersible, and aerial vessels. As unmanned… ▽ More

    Submitted 12 January, 2024; v1 submitted 12 July, 2023; originally announced July 2023.

  4. arXiv:2306.11301  [pdf, other

    cs.LG cs.AI cs.RO

    Adversarial Search and Tracking with Multiagent Reinforcement Learning in Sparsely Observable Environment

    Authors: Zixuan Wu, Sean Ye, Manisha Natarajan, Letian Chen, Rohan Paleja, Matthew C. Gombolay

    Abstract: We study a search and tracking (S&T) problem where a team of dynamic search agents must collaborate to track an adversarial, evasive agent. The heterogeneous search team may only have access to a limited number of past adversary trajectories within a large search space. This problem is challenging for both model-based searching and reinforcement learning (RL) methods since the adversary exhibits r… ▽ More

    Submitted 20 October, 2023; v1 submitted 20 June, 2023; originally announced June 2023.

    Comments: Accepted by IEEE International Symposium on Multi-Robot & Multi-Agent Systems (MRS) 2023

  5. arXiv:2306.11168  [pdf, other

    cs.LG cs.AI cs.MA

    Learning Models of Adversarial Agent Behavior under Partial Observability

    Authors: Sean Ye, Manisha Natarajan, Zixuan Wu, Rohan Paleja, Letian Chen, Matthew C. Gombolay

    Abstract: The need for opponent modeling and tracking arises in several real-world scenarios, such as professional sports, video game design, and drug-trafficking interdiction. In this work, we present Graph based Adversarial Modeling with Mutal Information (GrAMMI) for modeling the behavior of an adversarial opponent agent. GrAMMI is a novel graph neural network (GNN) based approach that uses mutual inform… ▽ More

    Submitted 5 July, 2023; v1 submitted 19 June, 2023; originally announced June 2023.

    Comments: 8 pages, 3 figures, 2 tables

  6. arXiv:2302.14163  [pdf, other

    cs.CV

    A Language-Guided Benchmark for Weakly Supervised Open Vocabulary Semantic Segmentation

    Authors: Prashant Pandey, Mustafa Chasmai, Monish Natarajan, Brejesh Lall

    Abstract: Increasing attention is being diverted to data-efficient problem settings like Open Vocabulary Semantic Segmentation (OVSS) which deals with segmenting an arbitrary object that may or may not be seen during training. The closest standard problems related to OVSS are Zero-Shot and Few-Shot Segmentation (ZSS, FSS) and their Cross-dataset variants where zero to few annotations are needed to segment n… ▽ More

    Submitted 27 February, 2023; originally announced February 2023.

  7. arXiv:2007.01921  [pdf, other

    cs.RO cs.AI cs.HC eess.SY

    Human-Robot Team Coordination with Dynamic and Latent Human Task Proficiencies: Scheduling with Learning Curves

    Authors: Ruisen Liu, Manisha Natarajan, Matthew Gombolay

    Abstract: As robots become ubiquitous in the workforce, it is essential that human-robot collaboration be both intuitive and adaptive. A robot's quality improves based on its ability to explicitly reason about the time-varying (i.e. learning curves) and stochastic capabilities of its human counterparts, and adjust the joint workload to improve efficiency while factoring human preferences. We introduce a nov… ▽ More

    Submitted 8 July, 2020; v1 submitted 3 July, 2020; originally announced July 2020.

  8. arXiv:1002.1152  [pdf

    cs.NI

    Performance Investigation of Virtual Private Networks with Different Bandwidth Allocations

    Authors: Mahalakshmi Chidambara Natarajan, Ramaswamy Muthiah, Alamelu Nachiappan

    Abstract: A Virtual Private Network (VPN) provides private network connections over a publicly accessible shared network. The effective allocation of bandwidth for VPNs assumes significance in the present scenario due to varied traffic. Each VPN endpoint specifies bounds on the total amount of traffic that it is likely to send or receive at any time. The network provider tailors the VPN so that there is s… ▽ More

    Submitted 5 February, 2010; originally announced February 2010.

    Comments: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 1, January 2010, http://ijcsi.org/articles/Performance-Investigation-of-Virtual-Private-Networks-with-Different-Bandwidth-Allocations.php

    Journal ref: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 1, January 2010, http://ijcsi.org/articles/Performance-Investigation-of-Virtual-Private-Networks-with-Different-Bandwidth-Allocations.php