Skip to main content

Showing 1–6 of 6 results for author: Quinlan, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.08171  [pdf, other

    cs.CY

    The aesthetics of cyber security: How do users perceive them?

    Authors: Mark Quinlan, Aaron Cross, Andrew Simpson

    Abstract: While specific aesthetic philosophies may differ across cultures, all human societies have used aesthetics to support communication and learning. Within the fields of usability and usable security, aesthetics have been deployed for such diverse purposes as enhancing students' e-learning experiences and optimising user interface design. In this paper, we seek to understand how individual users perc… ▽ More

    Submitted 13 June, 2023; originally announced June 2023.

    Comments: Submitted to Philosophy ant Technology Journal in late 2022

  2. arXiv:2305.03270  [pdf, other

    cs.RO

    Deep RL at Scale: Sorting Waste in Office Buildings with a Fleet of Mobile Manipulators

    Authors: Alexander Herzog, Kanishka Rao, Karol Hausman, Yao Lu, Paul Wohlhart, Mengyuan Yan, Jessica Lin, Montserrat Gonzalez Arenas, Ted Xiao, Daniel Kappler, Daniel Ho, Jarek Rettinghouse, Yevgen Chebotar, Kuang-Huei Lee, Keerthana Gopalakrishnan, Ryan Julian, Adrian Li, Chuyuan Kelly Fu, Bob Wei, Sangeetha Ramesh, Khem Holden, Kim Kleiven, David Rendleman, Sean Kirmani, Jeff Bingham , et al. (15 additional authors not shown)

    Abstract: We describe a system for deep reinforcement learning of robotic manipulation skills applied to a large-scale real-world task: sorting recyclables and trash in office buildings. Real-world deployment of deep RL policies requires not only effective training algorithms, but the ability to bootstrap real-world training and enable broad generalization. To this end, our system combines scalable deep RL… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

    Comments: Published at Robotics: Science and Systems 2023

  3. The efficacy potential of cyber security advice as presented in news articles

    Authors: Mark Quinlan, Aaron Ceross, Andrew Simpson

    Abstract: Cyber security advice is a broad church: it is thematically expansive, comprising expert texts, user-generated data consumed by individual users via informal learning, and much in-between. While there is evidence that cyber security news articles play a role in disseminating cyber security advice, the nature and extent of that role are not clear. We present a corpus of cyber security advice genera… ▽ More

    Submitted 16 October, 2024; v1 submitted 11 April, 2023; originally announced April 2023.

    Comments: Originally submitted in 2021, published in 2024

    Journal ref: Interacting with Computers, 2024

  4. arXiv:2303.08222  [pdf, other

    cs.HC

    Disconnected from Reality: Do the core concepts of the metaverse exclude disabled individuals?

    Authors: Mark Quinlan

    Abstract: Commercially-driven metaverse development has been driven by philosophical and science fiction concepts. Through translating these concepts into products, the developers may have inadvertently excluded individuals with disabilities from this new expanded reality. This ideologically-driven development is presented in this paper through a brief background of what we see as the most influential of th… ▽ More

    Submitted 11 January, 2025; v1 submitted 14 March, 2023; originally announced March 2023.

    Comments: TIAM23 Workshop at ACM CHI 23, Hamburg, Germany

  5. arXiv:2207.06182  [pdf, other

    cs.CR cs.CY cs.HC

    Connected Vehicles: A Privacy Analysis

    Authors: Mark Quinlan, Jun Zhao, Andrew Simpson

    Abstract: Just as the world of consumer devices was forever changed by the introduction of computer controlled solutions, the introduction of the engine control unit (ECU) gave rise to the automobile's transformation from a transportation product to a technology platform. A modern car is capable of processing, analysing and transmitting data in ways that could not have been foreseen only a few years ago. Th… ▽ More

    Submitted 13 July, 2022; originally announced July 2022.

    Journal ref: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. Springer, Cham, 2019

  6. arXiv:1105.1749  [pdf, ps, other

    cs.AI cs.RO cs.SE

    A Real-Time Model-Based Reinforcement Learning Architecture for Robot Control

    Authors: Todd Hester, Michael Quinlan, Peter Stone

    Abstract: Reinforcement Learning (RL) is a method for learning decision-making tasks that could enable robots to learn and adapt to their situation on-line. For an RL algorithm to be practical for robotic control tasks, it must learn in very few actions, while continually taking those actions in real-time. Existing model-based RL methods learn in relatively few actions, but typically take too much time betw… ▽ More

    Submitted 21 May, 2011; v1 submitted 9 May, 2011; originally announced May 2011.

    Comments: Added a reference Presents a real-time parallel architecture for model-based reinforcement learning methods

    ACM Class: D.2.11; I.2.6