Zum Hauptinhalt springen

Showing 1–8 of 8 results for author: Deshpande, H

Searching in archive cs. Search in all archives.
.
  1. ROBUST: 221 Bugs in the Robot Operating System

    Authors: Christopher S. Timperley, Gijs van der Hoorn, André Santos, Harshavardhan Deshpande, Andrzej Wąsowski

    Abstract: As robotic systems such as autonomous cars and delivery drones assume greater roles and responsibilities within society, the likelihood and impact of catastrophic software failure within those systems is increased.To aid researchers in the development of new methods to measure and assure the safety and quality of robotics software, we systematically curated a dataset of 221 bugs across 7 popular a… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Journal ref: ROBUST: 221 bugs in the Robot Operating System CS Timperley, G van der Hoorn, A Santos, H Deshpande, A Wąsowski Empirical Software Engineering 29 (3), 57, 2024

  2. arXiv:2303.09227  [pdf, other

    cs.RO

    MROS: A framework for robot self-adaptation

    Authors: Gustavo Rezende Silva, Darko Bozhinoski, Mario Garzon Oviedo, Mariano Ramírez Montero, Nadia Hammoudeh Garcia, Harshavardhan Deshpande, Andrzej Wasowski, Carlos Hernandez Corbato

    Abstract: Self-adaptation can be used in robotics to increase system robustness and reliability. This work describes the Metacontrol method for self-adaptation in robotics. Particularly, it details how the MROS (Metacontrol for ROS Systems) framework implements and packages Metacontrol, and it demonstrate how MROS can be applied in a navigation scenario where a mobile robot navigates in a factory floor. Vid… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

    Comments: 5 pages, 4 figures, accepted at ICSE 2023 demo track

  3. arXiv:2010.09145  [pdf, other

    cs.RO cs.SE

    MROS: Runtime Adaptation For Robot Control Architectures

    Authors: Darko Bozhinoski, Carlos Hernandez Corbato, Mario Garzon Oviedo, Gijs van der Hoorn, Nadia Hammoudeh Garcia, Harshavardhan Deshpande, Jon Tjerngren, Andrzej Wasowski

    Abstract: Known attempts to build autonomous robots rely on complex control architectures, often implemented with the Robot Operating System platform (ROS). Runtime adaptation is needed in these systems, to cope with component failures and with contingencies arising from dynamic environments-otherwise, these affect the reliability and quality of the mission execution. Existing proposals on how to build self… ▽ More

    Submitted 23 November, 2021; v1 submitted 18 October, 2020; originally announced October 2020.

  4. arXiv:2001.08817  [pdf, other

    cs.LG cs.CV eess.IV stat.ML

    Localization of Critical Findings in Chest X-Ray without Local Annotations Using Multi-Instance Learning

    Authors: Evan Schwab, André Gooßen, Hrishikesh Deshpande, Axel Saalbach

    Abstract: The automatic detection of critical findings in chest X-rays (CXR), such as pneumothorax, is important for assisting radiologists in their clinical workflow like triaging time-sensitive cases and screening for incidental findings. While deep learning (DL) models has become a promising predictive technology with near-human accuracy, they commonly suffer from a lack of explainability, which is an im… ▽ More

    Submitted 23 January, 2020; originally announced January 2020.

    Comments: Accepted to International Symposium of Biomedical Imaging (ISBI) 2020

  5. arXiv:1911.05956  [pdf, other

    cs.LG stat.ML

    Contextual Bandits Evolving Over Finite Time

    Authors: Harsh Deshpande, Vishal Jain, Sharayu Moharir

    Abstract: Contextual bandits have the same exploration-exploitation trade-off as standard multi-armed bandits. On adding positive externalities that decay with time, this problem becomes much more difficult as wrong decisions at the start are hard to recover from. We explore existing policies in this setting and highlight their biases towards the inherent reward matrix. We propose a rejection based policy t… ▽ More

    Submitted 14 November, 2019; originally announced November 2019.

  6. arXiv:1910.11536  [pdf, other

    cs.CL

    Stem-driven Language Models for Morphologically Rich Languages

    Authors: Yash Shah, Ishan Tarunesh, Harsh Deshpande, Preethi Jyothi

    Abstract: Neural language models (LMs) have shown to benefit significantly from enhancing word vectors with subword-level information, especially for morphologically rich languages. This has been mainly tackled by providing subword-level information as an input; using subword units in the output layer has been far less explored. In this work, we propose LMs that are cognizant of the underlying stems in each… ▽ More

    Submitted 25 October, 2019; originally announced October 2019.

    Comments: 5 pages, 3 figures, under review at ICASSP 2020

  7. arXiv:1907.07324  [pdf, other

    eess.IV cs.CV cs.LG

    Deep Learning for Pneumothorax Detection and Localization in Chest Radiographs

    Authors: André Gooßen, Hrishikesh Deshpande, Tim Harder, Evan Schwab, Ivo Baltruschat, Thusitha Mabotuwana, Nathan Cross, Axel Saalbach

    Abstract: Pneumothorax is a critical condition that requires timely communication and immediate action. In order to prevent significant morbidity or patient death, early detection is crucial. For the task of pneumothorax detection, we study the characteristics of three different deep learning techniques: (i) convolutional neural networks, (ii) multiple-instance learning, and (iii) fully convolutional networ… ▽ More

    Submitted 16 July, 2019; originally announced July 2019.

    Comments: MIDL 2019 [arXiv:1907.08612]

    Report number: MIDL/2019/ExtendedAbstract/SkxvPEqIwV

  8. HoneyMesh: Preventing Distributed Denial of Service Attacks using Virtualized Honeypots

    Authors: Hrishikesh Arun Deshpande

    Abstract: Today, internet and web services have become an inseparable part of our lives. Hence, ensuring continuous availability of service has become imperative to the success of any organization. But these services are often hampered by constant threats from myriad types of attacks. One such attack is called distributed denial of service attack that results in issues ranging from temporary slowdown of ser… ▽ More

    Submitted 20 August, 2015; originally announced August 2015.

    Comments: 5 Pages with 4 figures and 1 table

    Journal ref: IJERT ISSN: 2278-0181 Vol. 4 Issue 08, August-2015 pp. 263-267