17,321 research outputs found
Meeting in a Polygon by Anonymous Oblivious Robots
The Meeting problem for searchers in a polygon (possibly with
holes) consists in making the searchers move within , according to a
distributed algorithm, in such a way that at least two of them eventually come
to see each other, regardless of their initial positions. The polygon is
initially unknown to the searchers, and its edges obstruct both movement and
vision. Depending on the shape of , we minimize the number of searchers
for which the Meeting problem is solvable. Specifically, if has a
rotational symmetry of order (where corresponds to no
rotational symmetry), we prove that searchers are sufficient, and
the bound is tight. Furthermore, we give an improved algorithm that optimally
solves the Meeting problem with searchers in all polygons whose
barycenter is not in a hole (which includes the polygons with no holes). Our
algorithms can be implemented in a variety of standard models of mobile robots
operating in Look-Compute-Move cycles. For instance, if the searchers have
memory but are anonymous, asynchronous, and have no agreement on a coordinate
system or a notion of clockwise direction, then our algorithms work even if the
initial memory contents of the searchers are arbitrary and possibly misleading.
Moreover, oblivious searchers can execute our algorithms as well, encoding
information by carefully positioning themselves within the polygon. This code
is computable with basic arithmetic operations, and each searcher can
geometrically construct its own destination point at each cycle using only a
compass. We stress that such memoryless searchers may be located anywhere in
the polygon when the execution begins, and hence the information they initially
encode is arbitrary. Our algorithms use a self-stabilizing map construction
subroutine which is of independent interest.Comment: 37 pages, 9 figure
Positional Encoding by Robots with Non-Rigid Movements
Consider a set of autonomous computational entities, called \emph{robots},
operating inside a polygonal enclosure (possibly with holes), that have to
perform some collaborative tasks. The boundary of the polygon obstructs both
visibility and mobility of a robot. Since the polygon is initially unknown to
the robots, the natural approach is to first explore and construct a map of the
polygon. For this, the robots need an unlimited amount of persistent memory to
store the snapshots taken from different points inside the polygon. However, it
has been shown by Di Luna et al. [DISC 2017] that map construction can be done
even by oblivious robots by employing a positional encoding strategy where a
robot carefully positions itself inside the polygon to encode information in
the binary representation of its distance from the closest polygon vertex. Of
course, to execute this strategy, it is crucial for the robots to make accurate
movements. In this paper, we address the question whether this technique can be
implemented even when the movements of the robots are unpredictable in the
sense that the robot can be stopped by the adversary during its movement before
reaching its destination. However, there exists a constant ,
unknown to the robot, such that the robot can always reach its destination if
it has to move by no more than amount. This model is known in
literature as \emph{non-rigid} movement. We give a partial answer to the
question in the affirmative by presenting a map construction algorithm for
robots with non-rigid movement, but having bits of persistent memory and
ability to make circular moves
ConXsense - Automated Context Classification for Context-Aware Access Control
We present ConXsense, the first framework for context-aware access control on
mobile devices based on context classification. Previous context-aware access
control systems often require users to laboriously specify detailed policies or
they rely on pre-defined policies not adequately reflecting the true
preferences of users. We present the design and implementation of a
context-aware framework that uses a probabilistic approach to overcome these
deficiencies. The framework utilizes context sensing and machine learning to
automatically classify contexts according to their security and privacy-related
properties. We apply the framework to two important smartphone-related use
cases: protection against device misuse using a dynamic device lock and
protection against sensory malware. We ground our analysis on a sociological
survey examining the perceptions and concerns of users related to contextual
smartphone security and analyze the effectiveness of our approach with
real-world context data. We also demonstrate the integration of our framework
with the FlaskDroid architecture for fine-grained access control enforcement on
the Android platform.Comment: Recipient of the Best Paper Awar
Cloud Enabled Emergency Navigation Using Faster-than-real-time Simulation
State-of-the-art emergency navigation approaches are designed to evacuate
civilians during a disaster based on real-time decisions using a pre-defined
algorithm and live sensory data. Hence, casualties caused by the poor decisions
and guidance are only apparent at the end of the evacuation process and cannot
then be remedied. Previous research shows that the performance of routing
algorithms for evacuation purposes are sensitive to the initial distribution of
evacuees, the occupancy levels, the type of disaster and its as well its
locations. Thus an algorithm that performs well in one scenario may achieve bad
results in another scenario. This problem is especially serious in
heuristic-based routing algorithms for evacuees where results are affected by
the choice of certain parameters. Therefore, this paper proposes a
simulation-based evacuee routing algorithm that optimises evacuation by making
use of the high computational power of cloud servers. Rather than guiding
evacuees with a predetermined routing algorithm, a robust Cognitive Packet
Network based algorithm is first evaluated via a cloud-based simulator in a
faster-than-real-time manner, and any "simulated casualties" are then re-routed
using a variant of Dijkstra's algorithm to obtain new safe paths for them to
exits. This approach can be iterated as long as corrective action is still
possible.Comment: Submitted to PerNEM'15 for revie
- …