7,952 research outputs found

    Detection of an anomalous cluster in a network

    Full text link
    We consider the problem of detecting whether or not, in a given sensor network, there is a cluster of sensors which exhibit an "unusual behavior." Formally, suppose we are given a set of nodes and attach a random variable to each node. We observe a realization of this process and want to decide between the following two hypotheses: under the null, the variables are i.i.d. standard normal; under the alternative, there is a cluster of variables that are i.i.d. normal with positive mean and unit variance, while the rest are i.i.d. standard normal. We also address surveillance settings where each sensor in the network collects information over time. The resulting model is similar, now with a time series attached to each node. We again observe the process over time and want to decide between the null, where all the variables are i.i.d. standard normal, and the alternative, where there is an emerging cluster of i.i.d. normal variables with positive mean and unit variance. The growth models used to represent the emerging cluster are quite general and, in particular, include cellular automata used in modeling epidemics. In both settings, we consider classes of clusters that are quite general, for which we obtain a lower bound on their respective minimax detection rate and show that some form of scan statistic, by far the most popular method in practice, achieves that same rate to within a logarithmic factor. Our results are not limited to the normal location model, but generalize to any one-parameter exponential family when the anomalous clusters are large enough.Comment: Published in at http://dx.doi.org/10.1214/10-AOS839 the Annals of Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical Statistics (http://www.imstat.org

    Grasping unknown objects in clutter by superquadric representation

    Get PDF
    © 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.In this paper, a quick and efficient method is presented for grasping unknown objects in clutter. The grasping method relies on real-time superquadric (SQ) representation of partial view objects and incomplete object modelling, well suited for unknown symmetric objects in cluttered scenarios which is followed by optimized antipodal grasping. The incomplete object models are processed through a mirroring algorithm that assumes symmetry to first create an approximate complete model and then fit for SQ representation. The grasping algorithm is designed for maximum force balance and stability, taking advantage of the quick retrieval of dimension and surface curvature information from the SQ parameters. The pose of the SQs with respect to the direction of gravity is calculated and used together with the parameters of the SQs and specification of the gripper, to select the best direction of approach and contact points. The SQ fitting method has been tested on custom datasets containing objects in isolation as well as in clutter. The grasping algorithm is evaluated on a PR2 robot and real time results are presented. Initial results indicate that though the method is based on simplistic shape information, it outperforms other learning based grasping algorithms that also work in clutter in terms of time-efficiency and accuracy.Peer ReviewedPostprint (author's final draft

    Persistent Homology Over Directed Acyclic Graphs

    Full text link
    We define persistent homology groups over any set of spaces which have inclusions defined so that the corresponding directed graph between the spaces is acyclic, as well as along any subgraph of this directed graph. This method simultaneously generalizes standard persistent homology, zigzag persistence and multidimensional persistence to arbitrary directed acyclic graphs, and it also allows the study of more general families of topological spaces or point-cloud data. We give an algorithm to compute the persistent homology groups simultaneously for all subgraphs which contain a single source and a single sink in O(n4)O(n^4) arithmetic operations, where nn is the number of vertices in the graph. We then demonstrate as an application of these tools a method to overlay two distinct filtrations of the same underlying space, which allows us to detect the most significant barcodes using considerably fewer points than standard persistence.Comment: Revised versio

    The Selberg zeta function for convex co-compact Schottky groups

    Get PDF
    We give a new upper bound on the Selberg zeta function for a convex co-compact Schottky group acting on Hn+1 {\mathbb H}^{n+1}: in strips parallel to the imaginary axis the zeta function is bounded by exp(Csδ) \exp (C |s|^\delta) where δ \delta is the dimension of the limit set of the group. This bound is more precise than the optimal global bound exp(Csn+1) \exp (C |s|^{n+1}) , and it gives new bounds on the number of resonances (scattering poles) of Γ\Hn+1 \Gamma \backslash {\mathbb H}^{n+1} . The proof of this result is based on the application of holomorphic L2 L^2-techniques to the study of the determinants of the Ruelle transfer operators and on the quasi-self-similarity of limit sets. We also study this problem numerically and provide evidence that the bound may be optimal. Our motivation comes from molecular dynamics and we consider Γ\Hn+1 \Gamma \backslash {\mathbb H}^{n+1} as the simplest model of quantum chaotic scattering. The proof of this result is based on the application of holomorphic L2L^2-techniques to the study of the determinants of the Ruelle transfer operators and on the quasi-self-similarity of limit sets

    Toward an Agenda for Teacher Education in Christian Colleges and Universities

    Full text link
    The first (United States of America) national symposium by major teacher educator organizations took place in December 1995. The Association of Teacher Educators, the American Association of Colleges for Teacher Education, and the US Department of Education Office of Educational Research and Improvement sponsored and conducted a National Congress on Teacher Education. Leading national figures in teacher education presented their views to the almost 500 delegates. Focus groups examined the views and reported to a conference coordinator. The coordinator, in turn, synthesized the concerns, ideas and recommendations into a daily log of issues. I list some of the salient points below. They do not reflect a consensus but, rather, a starting point for forging a national consensus on key issues

    A look ahead approach to secure multi-party protocols

    Get PDF
    Secure multi-party protocols have been proposed to enable non-colluding parties to cooperate without a trusted server. Even though such protocols prevent information disclosure other than the objective function, they are quite costly in computation and communication. Therefore, the high overhead makes it necessary for parties to estimate the utility that can be achieved as a result of the protocol beforehand. In this paper, we propose a look ahead approach, specifically for secure multi-party protocols to achieve distributed k-anonymity, which helps parties to decide if the utility benefit from the protocol is within an acceptable range before initiating the protocol. Look ahead operation is highly localized and its accuracy depends on the amount of information the parties are willing to share. Experimental results show the effectiveness of the proposed methods
    corecore