297 research outputs found
The MICRO-BOSS scheduling system: Current status and future efforts
In this paper, a micro-opportunistic approach to factory scheduling was described that closely monitors the evolution of bottlenecks during the construction of the schedule, and continuously redirects search towards the bottleneck that appears to be most critical. This approach differs from earlier opportunistic approaches, as it does not require scheduling large resource subproblems or large job subproblems before revising the current scheduling strategy. This micro-opportunistic approach was implemented in the context of the MICRO-BOSS factory scheduling system. A study comparing MICRO-BOSS against a macro-opportunistic scheduler suggests that the additional flexibility of the micro-opportunistic approach to scheduling generally yields important reductions in both tardiness and inventory
What do they know about me? Contents and Concerns of Online Behavioral Profiles
Data aggregators collect large amount of information about individual users
and create detailed online behavioral profiles of individuals. Behavioral
profiles benefit users by improving products and services. However, they have
also raised concerns regarding user privacy, transparency of collection
practices and accuracy of data in the profiles. To improve transparency, some
companies are allowing users to access their behavioral profiles. In this work,
we investigated behavioral profiles of users by utilizing these access
mechanisms. Using in-person interviews (n=8), we analyzed the data shown in the
profiles, elicited user concerns, and estimated accuracy of profiles. We
confirmed our interview findings via an online survey (n=100). To assess the
claim of improving transparency, we compared data shown in profiles with the
data that companies have about users. More than 70% of the participants
expressed concerns about collection of sensitive data such as credit and health
information, level of detail and how their data may be used. We found a large
gap between the data shown in profiles and the data possessed by companies. A
large number of profiles were inaccurate with as much as 80% inaccuracy. We
discuss implications for public policy management.Comment: in Ashwini Rao, Florian Schaub, and Norman Sadeh What do they know
about me? Contents and Concerns of Online Behavioral Profiles (2014) ASE
BigData/SocialInformatics/PASSAT/BioMedCom Conferenc
Focus of attention in an activity-based scheduler
Earlier research in job shop scheduling has demonstrated the advantages of opportunistically combining order-based and resource-based scheduling techniques. An even more flexible approach is investigated where each activity is considered a decision point by itself. Heuristics to opportunistically select the next decision point on which to focus attention (i.e., variable ordering heuristics) and the next decision to be tried at this point (i.e., value ordering heuristics) are described that probabilistically account for both activity precedence and resource requirement interactions. Preliminary experimental results indicate that the variable ordering heuristic greatly increases search efficiency. While least constraining value ordering heuristics have been advocated in the literature, the experimental results suggest that other value ordering heuristics combined with our variable-ordering heuristic can produce much better schedules without significantly increasing search
The Real Deal: A Review of Challenges and Opportunities in Moving Reinforcement Learning-Based Traffic Signal Control Systems Towards Reality
Traffic signal control (TSC) is a high-stakes domain that is growing in
importance as traffic volume grows globally. An increasing number of works are
applying reinforcement learning (RL) to TSC; RL can draw on an abundance of
traffic data to improve signalling efficiency. However, RL-based signal
controllers have never been deployed. In this work, we provide the first review
of challenges that must be addressed before RL can be deployed for TSC. We
focus on four challenges involving (1) uncertainty in detection, (2)
reliability of communications, (3) compliance and interpretability, and (4)
heterogeneous road users. We show that the literature on RL-based TSC has made
some progress towards addressing each challenge. However, more work should take
a systems thinking approach that considers the impacts of other pipeline
components on RL.Comment: 26 pages; accepted version, with shortened version published at the
12th International Workshop on Agents in Traffic and Transportation (ATT '22)
at IJCAI 202
Purpose in the Machine: Do Traffic Simulators Produce Distributionally Equivalent Outcomes for Reinforcement Learning Applications?
Traffic simulators are used to generate data for learning in intelligent
transportation systems (ITSs). A key question is to what extent their modelling
assumptions affect the capabilities of ITSs to adapt to various scenarios when
deployed in the real world. This work focuses on two simulators commonly used
to train reinforcement learning (RL) agents for traffic applications, CityFlow
and SUMO. A controlled virtual experiment varying driver behavior and
simulation scale finds evidence against distributional equivalence in
RL-relevant measures from these simulators, with the root mean squared error
and KL divergence being significantly greater than 0 for all assessed measures.
While granular real-world validation generally remains infeasible, these
findings suggest that traffic simulators are not a deus ex machina for RL
training: understanding the impacts of inter-simulator differences is necessary
to train and deploy RL-based ITSs.Comment: 12 pages; accepted version, published at the 2023 Winter Simulation
Conference (WSC '23
Reconciling mobile app privacy and usability on smartphones
As they compete for developers, mobile app ecosystems have been exposing a growing number of APIs through their software development kits. Many of these APIs involve accessing sensitive functionality and/or user data and require approval by users. Android for instance allows developers to select from over 130 possible permissions. Expecting users to review and possibly adjust settings related to these permissions has proven unrealistic. In this paper, we report on the results of a study analyzing people’s privacy preferences when it comes to granting permissions to different mobile apps. Our results suggest that, while people’s mobile app privacy preferences are diverse, a relatively small number of profiles can be identified that offer the promise of significantly simplifying the decisions mobile users have to make. Specifically, our results are based on the analysis of settings of 4.8 million smartphone users of a mobile security and privacy platform. The platform relies on a rooted version of Android where users are allowed to choose between “granting”, “denying ” or “requesting to be dynamically prompted ” when it comes to granting 12 different Android permissions to mobile apps they have downloaded. 1
Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants
Understanding and managing data privacy in the digital world can be
challenging for sighted users, let alone blind and low-vision (BLV) users.
There is limited research on how BLV users, who have special accessibility
needs, navigate data privacy, and how potential privacy tools could assist
them. We conducted an in-depth qualitative study with 21 US BLV participants to
understand their data privacy risk perception and mitigation, as well as their
information behaviors related to data privacy. We also explored BLV users'
attitudes towards potential privacy question answering (Q&A) assistants that
enable them to better navigate data privacy information. We found that BLV
users face heightened security and privacy risks, but their risk mitigation is
often insufficient. They do not necessarily seek data privacy information but
clearly recognize the benefits of a potential privacy Q&A assistant. They also
expect privacy Q&A assistants to possess cross-platform compatibility, support
multi-modality, and demonstrate robust functionality. Our study sheds light on
BLV users' expectations when it comes to usability, accessibility, trust and
equity issues regarding digital data privacy.Comment: This research paper is accepted by USENIX Security '2
Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States
Data collection through the Internet of Things (IoT) devices, or smart
devices, in commercial buildings enables possibilities for increased
convenience and energy efficiency. However, such benefits face a large
perceptual challenge when being implemented in practice, due to the different
ways occupants working in the buildings understand and trust in the data
collection. The semi-public, pervasive, and multi-modal nature of data
collection in smart buildings points to the need to study occupants'
understanding of data collection and notification preferences. We conduct an
online study with 492 participants in the US who report working in smart
commercial buildings regarding: 1) awareness and perception of data collection
in smart commercial buildings, 2) privacy notification preferences, and 3)
potential factors for privacy notification preferences. We find that around
half of the participants are not fully aware of the data collection and use
practices of IoT even though they notice the presence of IoT devices and
sensors. We also discover many misunderstandings around different data
practices. The majority of participants want to be notified of data practices
in smart buildings, and they prefer push notifications to passive ones such as
websites or physical signs. Surprisingly, mobile app notification, despite
being a popular channel for smart homes, is the least preferred method for
smart commercial buildings.Comment: EuroS&P 2023 camera read
- …