8,042 research outputs found
Detection of an anomalous cluster in a network
We consider the problem of detecting whether or not, in a given sensor
network, there is a cluster of sensors which exhibit an "unusual behavior."
Formally, suppose we are given a set of nodes and attach a random variable to
each node. We observe a realization of this process and want to decide between
the following two hypotheses: under the null, the variables are i.i.d. standard
normal; under the alternative, there is a cluster of variables that are i.i.d.
normal with positive mean and unit variance, while the rest are i.i.d. standard
normal. We also address surveillance settings where each sensor in the network
collects information over time. The resulting model is similar, now with a time
series attached to each node. We again observe the process over time and want
to decide between the null, where all the variables are i.i.d. standard normal,
and the alternative, where there is an emerging cluster of i.i.d. normal
variables with positive mean and unit variance. The growth models used to
represent the emerging cluster are quite general and, in particular, include
cellular automata used in modeling epidemics. In both settings, we consider
classes of clusters that are quite general, for which we obtain a lower bound
on their respective minimax detection rate and show that some form of scan
statistic, by far the most popular method in practice, achieves that same rate
to within a logarithmic factor. Our results are not limited to the normal
location model, but generalize to any one-parameter exponential family when the
anomalous clusters are large enough.Comment: Published in at http://dx.doi.org/10.1214/10-AOS839 the Annals of
Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical
Statistics (http://www.imstat.org
Grasping unknown objects in clutter by superquadric representation
© 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.In this paper, a quick and efficient method is presented for grasping unknown objects in clutter. The grasping method relies on real-time superquadric (SQ) representation of partial view objects and incomplete object modelling, well suited for unknown symmetric objects in cluttered scenarios which is followed by optimized antipodal grasping. The incomplete object models are processed through a mirroring algorithm that assumes symmetry to first create an approximate complete model and then fit for SQ representation. The grasping algorithm is designed for maximum force balance and stability, taking advantage of the quick retrieval of dimension and surface curvature information from the SQ parameters. The pose of the SQs with respect to the direction of gravity is calculated and used together with the parameters of the SQs and specification of the gripper, to select the best direction of approach and contact points. The SQ fitting method has been tested on custom datasets containing objects in isolation as well as in clutter. The grasping algorithm is evaluated on a PR2 robot and real time results are presented. Initial results indicate that though the method is based on simplistic shape information, it outperforms other learning based grasping algorithms that also work in clutter in terms of time-efficiency and accuracy.Peer ReviewedPostprint (author's final draft
Persistent Homology Over Directed Acyclic Graphs
We define persistent homology groups over any set of spaces which have
inclusions defined so that the corresponding directed graph between the spaces
is acyclic, as well as along any subgraph of this directed graph. This method
simultaneously generalizes standard persistent homology, zigzag persistence and
multidimensional persistence to arbitrary directed acyclic graphs, and it also
allows the study of more general families of topological spaces or point-cloud
data. We give an algorithm to compute the persistent homology groups
simultaneously for all subgraphs which contain a single source and a single
sink in arithmetic operations, where is the number of vertices in
the graph. We then demonstrate as an application of these tools a method to
overlay two distinct filtrations of the same underlying space, which allows us
to detect the most significant barcodes using considerably fewer points than
standard persistence.Comment: Revised versio
The Selberg zeta function for convex co-compact Schottky groups
We give a new upper bound on the Selberg zeta function for a convex
co-compact Schottky group acting on : in strips parallel to
the imaginary axis the zeta function is bounded by
where is the dimension of the limit set of the group. This bound is
more precise than the optimal global bound , and it gives
new bounds on the number of resonances (scattering poles) of . The proof of this result is based on the
application of holomorphic -techniques to the study of the determinants
of the Ruelle transfer operators and on the quasi-self-similarity of limit
sets. We also study this problem numerically and provide evidence that the
bound may be optimal. Our motivation comes from molecular dynamics and we
consider as the simplest model of
quantum chaotic scattering. The proof of this result is based on the
application of holomorphic -techniques to the study of the determinants of
the Ruelle transfer operators and on the quasi-self-similarity of limit sets
Toward an Agenda for Teacher Education in Christian Colleges and Universities
The first (United States of America) national symposium by major teacher educator organizations took place in December 1995. The Association of Teacher Educators, the American Association of Colleges for Teacher Education, and the US Department of Education Office of Educational Research and Improvement sponsored and conducted a National Congress on Teacher Education. Leading national figures in teacher education presented their views to the almost 500 delegates. Focus groups examined the views and reported to a conference coordinator. The coordinator, in turn, synthesized the concerns, ideas and recommendations into a daily log of issues. I list some of the salient points below. They do not reflect a consensus but, rather, a starting point for forging a national consensus on key issues
A look ahead approach to secure multi-party protocols
Secure multi-party protocols have been proposed to enable non-colluding parties to cooperate without a trusted server. Even though such protocols prevent information disclosure other than the objective function, they are quite costly
in computation and communication. Therefore, the high overhead makes it necessary for parties to estimate the utility that can be achieved as a result of the protocol beforehand. In this paper, we propose a look ahead approach, specifically for secure multi-party protocols to achieve distributed
k-anonymity, which helps parties to decide if the utility benefit from the protocol is within an acceptable range before initiating the protocol. Look ahead operation is highly localized and its accuracy depends on the amount of information the parties are willing to share. Experimental results show
the effectiveness of the proposed methods
- âŠ