Goto

Collaborating Authors

 Country


Privacy and Transparency

AAAI Conferences

In this essay I argue that it is logically and practically possible to secure the right to privacy under conditions of increasing social transparency. The argument is predicated on a particular analysis of the right to privacy as the right to the personal space required for the exercise of practical rationality. It also rests on the distinction between the unidirectional transparency required by repressive governments and the increasing omnidirectional transparency that liberal information societies are experiencing today. I claim that a properly administered omnidirectional transparency will not only enhance privacy and autonomy, but can also be a key development in the creation of a society that is more tolerant of harmless diversity and temperate in its punishment of anti-social behaviors.


Conceptual Ternary Diagrams for Shape Perception: A Preliminary Step

AAAI Conferences

This work-in-progress provides a preliminary cognitive investigation of how the external visualization of the Ternary diagram (TD) might be used as an underlying model for exploring the representation of simple 3D cuboids according to the theory of Conceptual Spaces. Gรคrdenfors introduced geometrical entities, known as conceptual spaces, for modeling concepts. He considered multidimensional spaces equipped with a range of similarity measures (such as metrics) and guided by criteria and mechanisms as a geometrical model for concept formation and management. Our work is inspired by the conceptual spaces approach and takes ternary diagrams as its underlying conceptual model. The main motivation for our work is twofold. First, Ternary Diagrams are powerful conceptual representations that have a solid historical and mathematical foundation. Second, the notion of overlaying an Information- Entropy function on a ternary diagram can lead to new insights into applications of reasoning about shape and other cognitive processes.


Development of a Laboratory Kit for Robotics Engineering Education

AAAI Conferences

This paper discusses the development of a sequence of undergraduate courses forming the core curriculum in the Robotics Engineering (RBE) B.S. program at Worcester Polytechnic Institute (WPI). The laboratory robotics kit developed for the junior-level courses is presented in detail. The platform is designed to be modular and cost-effective and it is suitable for laboratory based robotics education. The system is ideal not only for undergraduate coursework but also may be adapted for graduate and undergraduate research as well as for exposing K-12 students to STEM.


Conflict and Hesitancy in Virtual Actors

AAAI Conferences

Internal conflict, in which a character is torn by opposing motivations, is central to drama. Actors portray such conflict in part by mimicking involuntary behaviors that occur as a result of such conflicts. In this paper, we examine the role of timing โ€“ pauses and hesitation, in particular โ€“ in internal conflict. We argue that virtual actors can be made more expressive if we can emulate the underlying structures of inhibition and conflict detection believed to operate in the human system. We discuss work in progress on this problem that uses the Twig procedural animation system.


Reasoning about the Appropriate Use of Private Data through Computational Workflows

AAAI Conferences

While there is a plethora of mechanisms to ensure lawful access to privacy-protected data, additional research is required in order to reassure individuals that their personal data is being used for the purpose that they consented to. This is particularly important in the context of new data mining approaches, as used, for instance, in biomedical research and commercial data mining. We argue for the use of computational workflows to ensure and enforce appropriate use of sensitive personal data. Computational workflows describe in a declarative manner the data processing steps and the expected results of complex data analysis processes such as data mining (Gil et al. 2007b; Taylor et al. 2006). We see workflows as an artifact that captures, among other things, how data is being used and for what purpose. Existing frameworks for computational workflows need to be extended to incorporate privacy policies that can govern the use of data.


Combining Privacy and Security Risk Assessment in Security Quality Requirements Engineering

AAAI Conferences

Functional or end user requirements are the tasks that the system - Protection and control of consolidated data under development is expected to perform. However, nonfunctional - Data retrieval requirements are the qualities that the system is - Equitable treatment of users to adhere to. Functional requirements are not as difficult - Data retention and disposal to tackle, as it is easier to test their implementation in the - User monitoring and protection against unauthorized system under development. Security and privacy requirements monitoring are considered nonfunctional requirements, although in many instances they do have functionality. To identify Several laws and regulations provide a set of guidelines privacy risks early in the design process, privacy requirements that can be used to assess privacy risks. For example, engineering is used (Chiasera et al. 2008). However, the Health Insurance Portability and Accountability Act unlike security requirements engineering, little attention is (HIPAA) addresses privacy concerns of health information paid to privacy requirements engineering, thus it is less mature systems by enforcing data exchange standards.


Finding the Odd-One-Out in Fleets of Mechatronic Systems using Embedded Intelligent Agents

AAAI Conferences

With the introduction of low-cost wireless communication many new applications have been made possible; applications where systems can collaboratively learn and get wiser without human supervision. One potential application is automated monitoring for fault isolation in mobile mechatronic systems such as commercial vehicles. The paper proposes an agent design that is based on uploading software agents to a fleet of mechatronic systems. Each agent searches for interesting state representations of a system and reports them to a central server application. The states from the fleet of systems can then be used to form a consensus from which it can be possible to detect deviations and even locating a fault.


Dynamic Execution of Temporal Plans for Temporally Fluid Human-Robot Teaming

AAAI Conferences

Introducing robots as teammates in medical, space, and military domains raises interesting and challenging human factors issues that do not necessarily arise in multi-robot coordination. For example, we must consider how to design robots that integrate seamlessly with human group dynamics. An essential quality of a good human partner is her ability to robustly anticipate and adapt to other team members and the environment. Robots should preserve this ability and avoid constraining their human partnersโ€™ flexibility to act. This requires that the robot partner be capable of reasoning quickly online, and adapting to the humansโ€™ actions in a temporally fluid way. This paper describes recent advances in dynamic plan execution, and argues that these advances provide a potentially powerful framework for explicitly modeling and efficiently reasoning on temporal information for human-robot interaction. We describe an executive named Chaski that enables a robot to coordinate with a human to execute a shared plan under different models of teamwork. We have applied Chaski to demonstrate teamwork using two Barrett Whole Arm Manipulators, and describe our ongoing work to demonstrate temporally fluid human-robot teaming using the Mobile-Dexterous-Social (MDS) robot.


Complex AI on Small Embedded Systems: Humanoid Robotics using Mobile Phones

AAAI Conferences

Until recent years, the development of real-world humanoid robotics applications has been hampered by a lack of available mobile computational power. Unlike wheeled platforms, which can reasonably easily be expected to carry a payload of computers and batteries, humanoid robots couple a need for complex control over many degrees of freedom with a form where any significant payload complicates the balancing and control problem itself. In the last few years, however, an significant number of options for embedded processing suitable for humanoid robots have appeared (e.g. miniaturized motherboards such as beagle boards), along with ever-smaller and more powerful battery technology. Part of the drive for these embedded hardware breakthroughs has been the increasing demand by consumers for more sophisticated mobile phone applications, and these modern devices now supply much in the way of sensor technology that is also potentially of use to roboticists (e.g. accelerometers, cameras, GPS). In this paper, we explore the use of modern mobile phones as a vehicle for the sophisticated AI necessary for autonomous humanoid robots.


Privacy Classification Systems: Recall and Precision Optimization as Enabler of Trusted Information Sharing

AAAI Conferences

Information is shared more extensively when a user can confidently classify all his information according to its desired degree of disclosure prior to transmission. While high quality classification is relatively straightforward for structured data (e.g., credit card numbers, cookies, "confidential" reports), most consumer and business information is unstructured (e.g., Facebook posts, corporate email). All current technological approaches to classifying unstructured information seek to identify only that information having the desired characteristics (i.e., to maximize the percentage of filtered content that requires privacy protection). Such focus on boosting classifier Precision (P) causes technology solutions to miss sensitive information [i.e., Recall (R) is compromised for the sake of P improvement]. Such privacy protection will fall short of user expectations no matter how "intelligent" the technology may be in extending beyond keywords to user meaning. Systems must simultaneously optimize both P and R in order to protect privacy sufficiently to encourage the free flow of personal and corporate information. This requires a socio-technical methodology wherein the user is intimately involved in iterative privacy improvement. The approach is a general one in which the classifier can be modified as necessary at any time when sampling measures of P and R deem it appropriate. Matching the ever-evolving user privacy model to the technology solution (e.g., active machine learning) affords a technique for building and maintaining user trust.