-
Space Trusted Autonomy Readiness Levels
Authors:
Kerianne L. Hobbs,
Joseph B. Lyons,
Martin S. Feather,
Benjamen P Bycroft,
Sean Phillips,
Michelle Simon,
Mark Harter,
Kenneth Costello,
Yuri Gawdiak,
Stephen Paine
Abstract:
Technology Readiness Levels are a mainstay for organizations that fund, develop, test, acquire, or use technologies. Technology Readiness Levels provide a standardized assessment of a technology's maturity and enable consistent comparison among technologies. They inform decisions throughout a technology's development life cycle, from concept, through development, to use. A variety of alternative R…
▽ More
Technology Readiness Levels are a mainstay for organizations that fund, develop, test, acquire, or use technologies. Technology Readiness Levels provide a standardized assessment of a technology's maturity and enable consistent comparison among technologies. They inform decisions throughout a technology's development life cycle, from concept, through development, to use. A variety of alternative Readiness Levels have been developed, including Algorithm Readiness Levels, Manufacturing Readiness Levels, Human Readiness Levels, Commercialization Readiness Levels, Machine Learning Readiness Levels, and Technology Commitment Levels. However, while Technology Readiness Levels have been increasingly applied to emerging disciplines, there are unique challenges to assessing the rapidly developing capabilities of autonomy. This paper adopts the moniker of Space Trusted Autonomy Readiness Levels to identify a two-dimensional scale of readiness and trust appropriate for the special challenges of assessing autonomy technologies that seek space use. It draws inspiration from other readiness levels' definitions, and from the rich field of trust and trustworthiness. The Space Trusted Autonomy Readiness Levels were developed by a collaborative Space Trusted Autonomy subgroup, which was created from The Space Science and Technology Partnership Forum between the United States Space Force, the National Aeronautics and Space Administration, and the National Reconnaissance Office.
△ Less
Submitted 24 October, 2022; v1 submitted 13 October, 2022;
originally announced October 2022.
-
Information Gathering in Ad-Hoc Radio Networks
Authors:
Marek Chrobak,
Kevin Costello,
Leszek Gasieniec
Abstract:
In the ad-hoc radio network model, nodes communicate with their neighbors via radio signals, without knowing the topology of the graph. We study the information gathering problem, where each node has a piece of information called a rumor, and the objective is to transmit all rumors to a designated target node. We provide an O(n^1.5*polylog(n)) deteministic protocol for information gathering in ad-…
▽ More
In the ad-hoc radio network model, nodes communicate with their neighbors via radio signals, without knowing the topology of the graph. We study the information gathering problem, where each node has a piece of information called a rumor, and the objective is to transmit all rumors to a designated target node. We provide an O(n^1.5*polylog(n)) deteministic protocol for information gathering in ad-hoc radio networks, significantly improving the trivial bound of O(n^2).
△ Less
Submitted 16 November, 2019; v1 submitted 9 September, 2019;
originally announced September 2019.
-
An Omega(n^2) Lower Bound for Random Universal Sets for Planar Graphs
Authors:
Alexander Choi,
Marek Chrobak,
Kevin Costello
Abstract:
A set $U\subseteq \reals^2$ is $n$-universal if all $n$-vertex planar graphs have a planar straight-line embedding into $U$. We prove that if $Q \subseteq \reals^2$ consists of points chosen randomly and uniformly from the unit square then $Q$ must have cardinality $Ω(n^2)$ in order to be $n$-universal with high probability. This shows that the probabilistic method, at least in its basic form, can…
▽ More
A set $U\subseteq \reals^2$ is $n$-universal if all $n$-vertex planar graphs have a planar straight-line embedding into $U$. We prove that if $Q \subseteq \reals^2$ consists of points chosen randomly and uniformly from the unit square then $Q$ must have cardinality $Ω(n^2)$ in order to be $n$-universal with high probability. This shows that the probabilistic method, at least in its basic form, cannot be used to establish an $o(n^2)$ upper bound on universal sets.
△ Less
Submitted 11 September, 2019; v1 submitted 19 August, 2019;
originally announced August 2019.
-
Faster Information Gathering in Ad-Hoc Radio Tree Networks
Authors:
Marek Chrobak,
Kevin P. Costello
Abstract:
We study information gathering in ad-hoc radio networks. Initially, each node of the network has a piece of information called a rumor, and the overall objective is to gather all these rumors in the designated target node. The ad-hoc property refers to the fact that the topology of the network is unknown when the computation starts. Aggregation of rumors is not allowed, which means that each node…
▽ More
We study information gathering in ad-hoc radio networks. Initially, each node of the network has a piece of information called a rumor, and the overall objective is to gather all these rumors in the designated target node. The ad-hoc property refers to the fact that the topology of the network is unknown when the computation starts. Aggregation of rumors is not allowed, which means that each node may transmit at most one rumor in one step.
We focus on networks with tree topologies, that is we assume that the network is a tree with all edges directed towards the root, but, being ad-hoc, its actual topology is not known. We provide two deterministic algorithms for this problem. For the model that does not assume any collision detection nor acknowledgement mechanisms, we give an $O(n\log\log n)$-time algorithm, improving the previous upper bound of $O(n\log n)$. We also show that this running time can be further reduced to $O(n)$ if the model allows for acknowledgements of successful transmissions.
△ Less
Submitted 7 December, 2015;
originally announced December 2015.
-
Information Gathering in Ad-Hoc Radio Networks with Tree Topology
Authors:
Marek Chrobak,
Kevin Costello,
Leszek Gasieniec,
Dariusz R. Kowalski
Abstract:
We study the problem of information gathering in ad-hoc radio networks without collision detection, focussing on the case when the network forms a tree, with edges directed towards the root. Initially, each node has a piece of information that we refer to as a rumor. Our goal is to design protocols that deliver all rumors to the root of the tree as quickly as possible. The protocol must complete t…
▽ More
We study the problem of information gathering in ad-hoc radio networks without collision detection, focussing on the case when the network forms a tree, with edges directed towards the root. Initially, each node has a piece of information that we refer to as a rumor. Our goal is to design protocols that deliver all rumors to the root of the tree as quickly as possible. The protocol must complete this task within its allotted time even though the actual tree topology is unknown when the computation starts. In the deterministic case, assuming that the nodes are labeled with small integers, we give an O(n)-time protocol that uses unbounded messages, and an O(n log n)-time protocol using bounded messages, where any message can include only one rumor. We also consider fire-and-forward protocols, in which a node can only transmit its own rumor or the rumor received in the previous step. We give a deterministic fire-and- forward protocol with running time O(n^1.5), and we show that it is asymptotically optimal. We then study randomized algorithms where the nodes are not labelled. In this model, we give an O(n log n)-time protocol and we prove that this bound is asymptotically optimal.
△ Less
Submitted 6 July, 2014;
originally announced July 2014.
-
Matching with Commitments
Authors:
Kevin Costello,
Prasad Tetali,
Pushkar Tripathi
Abstract:
We consider the following stochastic optimization problem first introduced by Chen et al. in \cite{chen}. We are given a vertex set of a random graph where each possible edge is present with probability p_e. We do not know which edges are actually present unless we scan/probe an edge. However whenever we probe an edge and find it to be present, we are constrained to picking the edge and both its e…
▽ More
We consider the following stochastic optimization problem first introduced by Chen et al. in \cite{chen}. We are given a vertex set of a random graph where each possible edge is present with probability p_e. We do not know which edges are actually present unless we scan/probe an edge. However whenever we probe an edge and find it to be present, we are constrained to picking the edge and both its end points are deleted from the graph. We wish to find the maximum matching in this model. We compare our results against the optimal omniscient algorithm that knows the edges of the graph and present a 0.573 factor algorithm using a novel sampling technique. We also prove that no algorithm can attain a factor better than 0.898 in this model.
△ Less
Submitted 8 May, 2012;
originally announced May 2012.