Zobrazeno 1 - 10
of 1 003
pro vyhledávání: '"Robinette P"'
Autor:
Nguyen, Quang, Vu, Truong, Nguyen, Trong-Tung, Wen, Yuxin, Robinette, Preston K, Johnson, Taylor T, Goldstein, Tom, Tran, Anh, Nguyen, Khoi
Image editing technologies are tools used to transform, adjust, remove, or otherwise alter images. Recent research has significantly improved the capabilities of image editing tools, enabling the creation of photorealistic and semantically informed f
Externí odkaz:
http://arxiv.org/abs/2412.03809
Publikováno v:
EPTCS 411, 2024, pp. 201-218
Behavior Trees (BTs) are high-level controllers that are useful in a variety of planning tasks and are gaining traction in robotic mission planning. As they gain popularity in safety-critical domains, it is important to formalize their syntax and sem
Externí odkaz:
http://arxiv.org/abs/2411.14165
Autor:
Kotturu, Monish Reddy, Movahed, Saniya Vahedian, Robinette, Paul, Jerath, Kshitij, Redlich, Amanda, Azadeh, Reza
We introduce an approach to improve team performance in a Multi-Agent Multi-Armed Bandit (MAMAB) framework using Fastest Mixing Markov Chain (FMMC) and Fastest Distributed Linear Averaging (FDLA) optimization algorithms. The multi-agent team is repre
Externí odkaz:
http://arxiv.org/abs/2410.23379
In fragile watermarking, a sensitive watermark is embedded in an object in a manner such that the watermark breaks upon tampering. This fragile process can be used to ensure the integrity and source of watermarked objects. While fragile watermarking
Externí odkaz:
http://arxiv.org/abs/2409.19442
Cooperative multi-agent learning methods are essential in developing effective cooperation strategies in multi-agent domains. In robotics, these methods extend beyond multi-robot scenarios to single-robot systems, where they enable coordination among
Externí odkaz:
http://arxiv.org/abs/2407.19128
Autor:
Robinette, Preston K., Lopez, Diego Manzanas, Serbinowska, Serena, Leach, Kevin, Johnson, Taylor T.
Malware, or software designed with harmful intent, is an ever-evolving threat that can have drastic effects on both individuals and institutions. Neural network malware classification systems are key tools for combating these threats but are vulnerab
Externí odkaz:
http://arxiv.org/abs/2404.05703
Effective coordination and cooperation among agents are crucial for accomplishing individual or shared objectives in multi-agent systems. In many real-world multi-agent systems, agents possess varying abilities and constraints, making it necessary to
Externí odkaz:
http://arxiv.org/abs/2310.12912
Relational networks within a team play a critical role in the performance of many real-world multi-robot systems. To successfully accomplish tasks that require cooperation and coordination, different agents (e.g., robots) necessitate different priori
Externí odkaz:
http://arxiv.org/abs/2310.12910
Cooperative multi-agent reinforcement learning (MARL) approaches tackle the challenge of finding effective multi-agent cooperation strategies for accomplishing individual or shared objectives in multi-agent teams. In real-world scenarios, however, ag
Externí odkaz:
http://arxiv.org/abs/2310.12909
Steganography is the art of hiding information in plain sight. This form of covert communication can be used by bad actors to propagate malware, exfiltrate victim data, and communicate with other bad actors. Current image steganography defenses rely
Externí odkaz:
http://arxiv.org/abs/2310.06951