Skip to main content

Showing 1–8 of 8 results for author: Smereka, J M

Searching in archive cs. Search in all archives.
.
  1. Task Allocation with Load Management in Multi-Agent Teams

    Authors: Haochen Wu, Amin Ghadami, Alparslan Emrah Bayrak, Jonathon M. Smereka, Bogdan I. Epureanu

    Abstract: In operations of multi-agent teams ranging from homogeneous robot swarms to heterogeneous human-autonomy teams, unexpected events might occur. While efficiency of operation for multi-agent task allocation problems is the primary objective, it is essential that the decision-making framework is intelligent enough to manage unexpected task load with limited resources. Otherwise, operation effectivene… ▽ More

    Submitted 17 July, 2022; originally announced July 2022.

    Comments: 8 pages, 5 figures, 2022 IEEE International Conference on Robotics and Automation

    Journal ref: ICRA (2022) 8823-8830

  2. arXiv:2201.01882  [pdf

    cs.RO

    Trust-based Symbolic Motion Planning for Multi-robot Bounding Overwatch

    Authors: Huanfei Zheng, Jonathon M. Smereka, Dariusz Mikulski, Stephanie Roth, Yue Wang

    Abstract: Multi-robot bounding overwatch requires timely coordination of robot team members. Symbolic motion planning (SMP) can provide provably correct solutions for robot motion planning with high-level temporal logic task requirements. This paper aims to develop a framework for safe and reliable SMP of multi-robot systems (MRS) to satisfy complex bounding overwatch tasks constrained by temporal logics. A… ▽ More

    Submitted 5 January, 2022; originally announced January 2022.

  3. arXiv:2201.01878  [pdf, ps, other

    cs.RO

    Bayesian Optimization Based Trustworthiness Model for Multi-robot Bounding Overwatch

    Authors: Huanfei Zheng, Jonathon M. Smereka, Dariusz Mikluski, Yue Wang

    Abstract: In multi-robot system (MRS) bounding overwatch, it is crucial to determine which point to choose for overwatch at each step and whether the robots' positions are trustworthy so that the overwatch can be performed effectively. In this paper, we develop a Bayesian optimization based computational trustworthiness model (CTM) for the MRS to select overwatch points. The CTM can provide real-time trustw… ▽ More

    Submitted 5 January, 2022; originally announced January 2022.

  4. arXiv:2008.03333  [pdf, other

    cs.AI math.OC

    Efficient algorithms for electric vehicles' min-max routing problem

    Authors: Seyed Sajjad Fazeli, Saravanan Venkatachalam, Jonathon M. Smereka

    Abstract: An increase in greenhouse gases emission from the transportation sector has led companies and the government to elevate and support the production of electric vehicles (EV). With recent developments in urbanization and e-commerce, transportation companies are replacing their conventional fleet with EVs to strengthen the efforts for sustainable and environment-friendly operations. However, deployin… ▽ More

    Submitted 30 April, 2021; v1 submitted 7 August, 2020; originally announced August 2020.

  5. arXiv:1910.04251  [pdf, other

    math.OC cs.RO

    Two-stage stochastic programming approach for path planning problems under travel time and availability uncertainties

    Authors: Saravanan Venkatachalam, Manish Bansal, Jonathon M. Smereka, Joseph Lee

    Abstract: Significant advances in sensing, robotics, and wireless networks have enabled the collaborative utilization of autonomous aerial, ground and underwater vehicles for various applications. However, to successfully harness the benefits of these unmanned ground vehicles (UGVs) in homeland security operations, it is critical to efficiently solve UGV path planning problem which lies at the heart of thes… ▽ More

    Submitted 7 October, 2019; originally announced October 2019.

    Comments: 10 Pages, 5 Figures

  6. arXiv:1809.09566  [pdf, other

    cs.CR cs.NI cs.RO

    Security and Performance Considerations in ROS 2: A Balancing Act

    Authors: Jongkil Kim, Jonathon M. Smereka, Calvin Cheung, Surya Nepal, Marthie Grobler

    Abstract: Robot Operating System (ROS) 2 is a ground-up re-design of ROS 1 to support performance critical cyber-physical systems (CPSs) using the Data Distribution Service (DDS) middleware. Accordingly, the security of ROS 2 is highly reliant on the security of its DDS communication protocol. However, finding a balance between the performance and security is non-trivial task. Inappropriate security impleme… ▽ More

    Submitted 24 September, 2018; originally announced September 2018.

    Comments: 6 pages, 6 figures

  7. arXiv:1809.03565  [pdf, other

    cs.RO

    Open Problems in Robotic Anomaly Detection

    Authors: Ritwik Gupta, Zachary T. Kurtz, Sebastian Scherer, Jonathon M. Smereka

    Abstract: Failures in robotics can have disastrous consequences that worsen rapidly over time. This, the ability to rely on robotic systems, depends on our ability to monitor them and intercede when necessary, manually or autonomously. Prior work in this area surveys intrusion detection and security challenges in robotics, but a discussion of the more general anomaly detection problems is lacking. As such,… ▽ More

    Submitted 10 September, 2018; originally announced September 2018.

  8. arXiv:1807.09437  [pdf, other

    cs.RO

    Tree Search Techniques for Minimizing Detectability and Maximizing Visibility

    Authors: Zhongshun Zhang, Yoonchang Sung, Lifeng Zhou, Jonathon M. Smereka, Joseph Lee, Pratap Tokekar

    Abstract: We introduce and study the problem of planning a trajectory for an agent to carry out a scouting mission while avoiding being detected by an adversarial guard. This introduces an adversarial version of classical visibility-based planning problems such as the Watchman Route Problem. The agent receives a positive reward for increasing its visibility and a negative penalty when it is detected by the… ▽ More

    Submitted 22 February, 2019; v1 submitted 25 July, 2018; originally announced July 2018.