Skip to main content

Showing 1–8 of 8 results for author: O'Neill, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.12945  [pdf, other

    cs.RO

    DROID: A Large-Scale In-The-Wild Robot Manipulation Dataset

    Authors: Alexander Khazatsky, Karl Pertsch, Suraj Nair, Ashwin Balakrishna, Sudeep Dasari, Siddharth Karamcheti, Soroush Nasiriany, Mohan Kumar Srirama, Lawrence Yunliang Chen, Kirsty Ellis, Peter David Fagan, Joey Hejna, Masha Itkina, Marion Lepert, Yecheng Jason Ma, Patrick Tree Miller, Jimmy Wu, Suneel Belkhale, Shivin Dass, Huy Ha, Arhan Jain, Abraham Lee, Youngwoon Lee, Marius Memmel, Sungjae Park , et al. (76 additional authors not shown)

    Abstract: The creation of large, diverse, high-quality robot manipulation datasets is an important stepping stone on the path toward more capable and robust robotic manipulation policies. However, creating such datasets is challenging: collecting robot manipulation data in diverse environments poses logistical and safety challenges and requires substantial investments in hardware and human labour. As a resu… ▽ More

    Submitted 22 April, 2025; v1 submitted 19 March, 2024; originally announced March 2024.

    Comments: Project website: https://droid-dataset.github.io/

  2. arXiv:2310.08864  [pdf, other

    cs.RO

    Open X-Embodiment: Robotic Learning Datasets and RT-X Models

    Authors: Open X-Embodiment Collaboration, Abby O'Neill, Abdul Rehman, Abhinav Gupta, Abhiram Maddukuri, Abhishek Gupta, Abhishek Padalkar, Abraham Lee, Acorn Pooley, Agrim Gupta, Ajay Mandlekar, Ajinkya Jain, Albert Tung, Alex Bewley, Alex Herzog, Alex Irpan, Alexander Khazatsky, Anant Rai, Anchit Gupta, Andrew Wang, Andrey Kolobov, Anikait Singh, Animesh Garg, Aniruddha Kembhavi, Annie Xie , et al. (269 additional authors not shown)

    Abstract: Large, high-capacity models trained on diverse datasets have shown remarkable successes on efficiently tackling downstream applications. In domains from NLP to Computer Vision, this has led to a consolidation of pretrained models, with general pretrained backbones serving as a starting point for many applications. Can such a consolidation happen in robotics? Conventionally, robotic learning method… ▽ More

    Submitted 14 May, 2025; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: Project website: https://robotics-transformer-x.github.io

  3. arXiv:2210.12161  [pdf, other

    eess.IV cs.LG

    Task-Based Assessment for Neural Networks: Evaluating Undersampled MRI Reconstructions based on Human Observer Signal Detection

    Authors: Joshua D. Herman, Rachel E. Roca, Alexandra G. O'Neill, Marcus L. Wong, Sajan G. Lingala, Angel R. Pineda

    Abstract: Recent research has explored using neural networks to reconstruct undersampled magnetic resonance imaging (MRI) data. Because of the complexity of the artifacts in the reconstructed images, there is a need to develop task-based approaches of image quality. Common metrics for evaluating image quality like the normalized root mean squared error (NRMSE) and structural similarity (SSIM) are global met… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

  4. arXiv:2109.09819  [pdf, other

    cs.DC cs.NI

    Seriema: RDMA-based Remote Invocationwith a Case-Study on Monte-Carlo Tree Search

    Authors: Hammurabi Mendes, Bryce Wiedenbeck, Aidan O'Neill

    Abstract: We introduce Seriema, a middleware that integrates RDMA-based remote invocation, asynchronous data transfer, NUMA-aware automatic management of registered memory, and message aggregation in idiomatic C++1x. Seriema supports the notion that remote invocation and asynchronous data transfer are complementary services that, when tightly-integrated, allow distributed data structures, overlay networks,… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

  5. arXiv:2108.04996  [pdf

    cs.CR

    Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training

    Authors: Ashley O'Neill, Atif Ahmad, Sean Maynard

    Abstract: Cybersecurity incident response teams mitigate the impact of adverse cyber-related events in organisations. Field studies of IR teams suggest that at present the process of IR is under-developed with a focus on the technological dimension with little consideration of practice capability. To address this gap, we develop a scenario-based training approach to assist organisations to overcome socio-te… ▽ More

    Submitted 10 August, 2021; originally announced August 2021.

    Comments: 11 pages

  6. arXiv:2101.07342  [pdf, other

    eess.IV cs.LG q-bio.QM

    Feature Fusion of Raman Chemical Imaging and Digital Histopathology using Machine Learning for Prostate Cancer Detection

    Authors: Trevor Doherty, Susan McKeever, Nebras Al-Attar, Tiarnan Murphy, Claudia Aura, Arman Rahman, Amanda O'Neill, Stephen P Finn, Elaine Kay, William M. Gallagher, R. William G. Watson, Aoife Gowen, Patrick Jackman

    Abstract: The diagnosis of prostate cancer is challenging due to the heterogeneity of its presentations, leading to the over diagnosis and treatment of non-clinically important disease. Accurate diagnosis can directly benefit a patient's quality of life and prognosis. Towards addressing this issue, we present a learning model for the automatic identification of prostate cancer. While many prostate cancer st… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

    Comments: 19 pages, 8 tables, 18 figures

  7. $\mathcal{E}\text{psolute}$: Efficiently Querying Databases While Providing Differential Privacy

    Authors: Dmytro Bogatov, Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill

    Abstract: As organizations struggle with processing vast amounts of information, outsourcing sensitive data to third parties becomes a necessity. To protect the data, various cryptographic techniques are used in outsourced database systems to ensure data privacy, while allowing efficient querying. A rich collection of attacks on such systems has emerged. Even with strong cryptography, just communication vol… ▽ More

    Submitted 27 September, 2021; v1 submitted 5 June, 2017; originally announced June 2017.

    Comments: Camera-ready version for ACM CCS 2021

    Journal ref: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS '21)

  8. arXiv:1201.2056  [pdf, ps, other

    cs.IT cs.LG

    Adaptive Context Tree Weighting

    Authors: Alexander O'Neill, Marcus Hutter, Wen Shao, Peter Sunehag

    Abstract: We describe an adaptive context tree weighting (ACTW) algorithm, as an extension to the standard context tree weighting (CTW) algorithm. Unlike the standard CTW algorithm, which weights all observations equally regardless of the depth, ACTW gives increasing weight to more recent observations, aiming to improve performance in cases where the input sequence is from a non-stationary distribution. Dat… ▽ More

    Submitted 10 January, 2012; originally announced January 2012.

    Comments: 11 LaTeX pages, 7 tables