Skip to main content

Showing 1–18 of 18 results for author: Bowman, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.03098  [pdf, other

    cs.RO cs.HC

    The Use of Gaze-Derived Confidence of Inferred Operator Intent in Adjusting Safety-Conscious Haptic Assistance

    Authors: Jeremy D. Webb, Michael Bowman, Songpo Li, Xiaoli Zhang

    Abstract: Humans directly completing tasks in dangerous or hazardous conditions is not always possible where these tasks are increasingly be performed remotely by teleoperated robots. However, teleoperation is difficult since the operator feels a disconnect with the robot caused by missing feedback from several senses, including touch, and the lack of depth in the video feedback presented to the operator. T… ▽ More

    Submitted 3 April, 2025; originally announced April 2025.

    Comments: 12 pages, 15 figures

  2. arXiv:2408.00853  [pdf

    cs.RO

    Real-time Dexterous Telemanipulation with an End-Effect-Oriented Learning-based Approach

    Authors: Haoyang Wang, He Bai, Xiaoli Zhang, Yunsik Jung, Michel Bowman, Lingfeng Tao

    Abstract: Dexterous telemanipulation is crucial in advancing human-robot systems, especially in tasks requiring precise and safe manipulation. However, it faces significant challenges due to the physical differences between human and robotic hands, the dynamic interaction with objects, and the indirect control and perception of the remote environment. Current approaches predominantly focus on mapping the hu… ▽ More

    Submitted 1 August, 2024; originally announced August 2024.

    Comments: Accepted by IROS 2024

  3. QContext: Context-Aware Decomposition for Quantum Gates

    Authors: Ji Liu, Max Bowman, Pranav Gokhale, Siddharth Dangwal, Jeffrey Larson, Frederic T. Chong, Paul D. Hovland

    Abstract: In this paper we propose QContext, a new compiler structure that incorporates context-aware and topology-aware decompositions. Because of circuit equivalence rules and resynthesis, variants of a gate-decomposition template may exist. QContext exploits the circuit information and the hardware topology to select the gate variant that increases circuit optimization opportunities. We study the basis-g… ▽ More

    Submitted 3 February, 2023; originally announced February 2023.

    Comments: 10 pages

  4. arXiv:2210.16423  [pdf

    cs.RO cs.HC

    Transferability-based Chain Motion Mapping from Humans to Humanoids for Teleoperation

    Authors: Matthew Stanley, Yunsik Jung, Michael Bowman, Lingfeng Tao, Xiaoli Zhang

    Abstract: Although data-driven motion mapping methods are promising to allow intuitive robot control and teleoperation that generate human-like robot movement, they normally require tedious pair-wise training for each specific human and robot pair. This paper proposes a transferability-based mapping scheme to allow new robot and human input systems to leverage the mapping of existing trained pairs to form a… ▽ More

    Submitted 28 October, 2022; originally announced October 2022.

  5. A Multi-Agent Approach for Adaptive Finger Cooperation in Learning-based In-Hand Manipulation

    Authors: Lingfeng Tao, Jiucai Zhang, Michael Bowman, Xiaoli Zhang

    Abstract: In-hand manipulation is challenging for a multi-finger robotic hand due to its high degrees of freedom and the complex interaction with the object. To enable in-hand manipulation, existing deep reinforcement learning based approaches mainly focus on training a single robot-structure-specific policy through the centralized learning mechanism, lacking adaptability to changes like robot malfunction.… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

    Comments: Submitted to ICRA 2023

  6. arXiv:2209.04006  [pdf, ps, other

    cs.CR cs.SE

    What is Software Supply Chain Security?

    Authors: Marcela S. Melara, Mic Bowman

    Abstract: The software supply chain involves a multitude of tools and processes that enable software developers to write, build, and ship applications. Recently, security compromises of tools or processes has led to a surge in proposals to address these issues. However, these proposals commonly overemphasize specific solutions or conflate goals, resulting in unexpected consequences, or unclear positioning a… ▽ More

    Submitted 8 September, 2022; originally announced September 2022.

  7. arXiv:2205.13561  [pdf

    cs.RO cs.AI

    Physics-Guided Hierarchical Reward Mechanism for Learning-Based Robotic Grasping

    Authors: Yunsik Jung, Lingfeng Tao, Michael Bowman, Jiucai Zhang, Xiaoli Zhang

    Abstract: Learning-based grasping can afford real-time grasp motion planning of multi-fingered robotics hands thanks to its high computational efficiency. However, learning-based methods are required to explore large search spaces during the learning process. The search space causes low learning efficiency, which has been the main barrier to its practical adoption. In addition, the trained policy lacks a ge… ▽ More

    Submitted 23 July, 2023; v1 submitted 26 May, 2022; originally announced May 2022.

  8. arXiv:2106.09843  [pdf, ps, other

    cs.CR

    Hardware-Enforced Integrity and Provenance for Distributed Code Deployments

    Authors: Marcela S. Melara, Mic Bowman

    Abstract: Deployed microservices must adhere to a multitude of application-level security requirements and regulatory constraints imposed by mutually distrusting application principals--software developers, cloud providers, and even data owners. Although these principals wish to enforce their individual security requirements, they do not currently have a common way of easily identifying, expressing and auto… ▽ More

    Submitted 17 June, 2021; originally announced June 2021.

    Comments: 2 pages, NIST Workshop on Enhancing Software Supply Chain Security (2021), see https://www.nist.gov/itl/executive-order-improving-nations-cybersecurity/enhancing-software-supply-chain-security

  9. arXiv:2106.09841  [pdf, other

    cs.CR

    Enabling Security-Oriented Orchestration of Microservices

    Authors: Marcela S. Melara, Mic Bowman

    Abstract: As cloud providers push multi-tenancy to new levels to meet growing scalability demands, ensuring that externally developed untrusted microservices will preserve tenant isolation has become a high priority. Developers, in turn, lack a means for expressing and automatically enforcing high-level application security requirements at deployment time. In this paper, we observe that orchestration system… ▽ More

    Submitted 17 June, 2021; originally announced June 2021.

  10. Forming Real-World Human-Robot Cooperation for Tasks With General Goal

    Authors: Lingfeng Tao, Michael Bowman, Jiucai Zhang, Xiaoli Zhang

    Abstract: In human-robot cooperation, the robot cooperates with humans to accomplish the task together. Existing approaches assume the human has a specific goal during the cooperation, and the robot infers and acts toward it. However, in real-world environments, a human usually only has a general goal (e.g., general direction or area in motion planning) at the beginning of the cooperation, which needs to be… ▽ More

    Submitted 1 July, 2022; v1 submitted 19 December, 2020; originally announced December 2020.

    Comments: Published on RAL

    Journal ref: in IEEE Robotics and Automation Letters, vol. 7, no. 2, pp. 762-769, April 2022

  11. arXiv:2005.09240  [pdf, other

    cs.RO

    Robust Robot-assisted Tele-grasping Through Intent-Uncertainty-Aware Planning

    Authors: Michael Bowman, Songpo Li, Xiaoli Zhang

    Abstract: In teleoperation, research has mainly focused on target approaching, where we deal with the more challenging object manipulation task by advancing the shared control technique. Appropriately manipulating an object is challenging due to the fine motion constraint requirements for a specific manipulation task. Although these motion constraints are critical for task success, they often are subtle whe… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

    Comments: 12 pages, 6 figures, journal paper

  12. arXiv:2003.05097  [pdf, other

    cs.RO

    A General Arbitration Model for Robust Human-Robot Shared Control with Multi-Source Uncertainty Modeling

    Authors: Songpo Li, Michael Bowman, Xiaoli Zhang

    Abstract: Shared control in teleoperation leverages both human and robot's strengths and has demonstrated great advantages of reducing the difficulties in teleoperating a robot and increasing the task performance. One fundamental question in shared control is how to effectively allocate the control power to the human and robot. Researchers have been subjectively defining the arbitrate policies following con… ▽ More

    Submitted 10 March, 2020; originally announced March 2020.

  13. An Intent-based Task-aware Shared Control Framework for Intuitive Hands Free Telemanipulation

    Authors: Michael Bowman, Jiucai Zhang, Xiaoli Zhang

    Abstract: Shared control in teleoperation for providing robot assistance to accomplish object manipulation, called telemanipulation, is a new promising yet challenging problem. This has unique challenges--on top of teleoperation challenges in general--due to difficulties of physical discrepancy between human hands and robot hands as well as the fine motion constraints to constitute task success. We present… ▽ More

    Submitted 31 May, 2021; v1 submitted 7 March, 2020; originally announced March 2020.

    Journal ref: J Intell Robot Syst 110, 167 (2024)

  14. arXiv:2003.03516  [pdf

    cs.RO cs.AI cs.HC

    Learn and Transfer Knowledge of Preferred Assistance Strategies in Semi-autonomous Telemanipulation

    Authors: Lingfeng Tao, Michael Bowman, Xu Zhou, Jiucai Zhang, Xiaoli Zhang

    Abstract: Enabling robots to provide effective assistance yet still accommodating the operator's commands for telemanipulation of an object is very challenging because robot's assistive action is not always intuitive for human operators and human behaviors and preferences are sometimes ambiguous for the robot to interpret. Although various assistance approaches are being developed to improve the control qua… ▽ More

    Submitted 19 December, 2020; v1 submitted 6 March, 2020; originally announced March 2020.

  15. Learn Task First or Learn Human Partner First: A Hierarchical Task Decomposition Method for Human-Robot Cooperation

    Authors: Lingfeng Tao, Michael Bowman, Jiucai Zhang, Xiaoli Zhang

    Abstract: Applying Deep Reinforcement Learning (DRL) to Human-Robot Cooperation (HRC) in dynamic control problems is promising yet challenging as the robot needs to learn the dynamics of the controlled system and dynamics of the human partner. In existing research, the robot powered by DRL adopts coupled observation of the environment and the human partner to learn both dynamics simultaneously. However, suc… ▽ More

    Submitted 7 December, 2021; v1 submitted 29 February, 2020; originally announced March 2020.

    Comments: Accepted by SMC2021

  16. arXiv:1907.13245  [pdf, other

    cs.CR cs.OS

    EnclaveDom: Privilege Separation for Large-TCB Applications in Trusted Execution Environments

    Authors: Marcela S. Melara, Michael J. Freedman, Mic Bowman

    Abstract: Trusted executions environments (TEEs) such as Intel(R) SGX provide hardware-isolated execution areas in memory, called enclaves. By running only the most trusted application components in the enclave, TEEs enable developers to minimize the TCB of their applications thereby helping to protect sensitive application data. However, porting existing applications to TEEs often requires considerable ref… ▽ More

    Submitted 17 June, 2020; v1 submitted 30 July, 2019; originally announced July 2019.

  17. arXiv:1807.05686  [pdf, other

    cs.CR

    Private Data Objects: an Overview

    Authors: Mic Bowman, Andrea Miele, Michael Steiner, Bruno Vavala

    Abstract: We present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Secure Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies… ▽ More

    Submitted 5 November, 2018; v1 submitted 16 July, 2018; originally announced July 2018.

  18. arXiv:1109.1841  [pdf, ps, other

    cs.DL cs.AI

    Digital Libraries, Conceptual Knowledge Systems, and the Nebula Interface

    Authors: Robert E. Kent, C. Mic Bowman

    Abstract: Concept Analysis provides a principled approach to effective management of wide area information systems, such as the Nebula File System and Interface. This not only offers evidence to support the assertion that a digital library is a bounded collection of incommensurate information sources in a logical space, but also sheds light on techniques for collaboration through coordinated access to the s… ▽ More

    Submitted 8 September, 2011; originally announced September 2011.

    Comments: Technical report, Transarc Corporation, Pittsburgh, Pennsylvania, April 1995