Automatic fall recovery is a crucial prerequisite before humanoid robots can be reliably deployed. Hand-designing controllers for getting up is difficult because of the varied configurations a humanoid can end up in after a fall and the challenging terrains humanoid robots are expected to operate on. This paper develops a learning framework to produce controllers that enable humanoid robots to get up from varying configurations on varying terrains. Unlike previous successful applications of learning to humanoid locomotion, the getting-up task involves complex contact patterns (which necessitates accurately modeling of the collision geometry) and sparser rewards. We address these challenges through a two-phase approach that induces a curriculum. The first stage focuses on discovering a good getting-up trajectory under minimal constraints on smoothness or speed / torque limits. The second stage then refines the discovered motions into deployable (i.e. smooth and slow) motions that are robust to variations in initial configuration and terrains. We find these innovations enable a real-world G1 humanoid robot to get up from two main situations that we considered: a) lying face up and b)
The Internet has evolved by progressively expanding what humanity connects: first computers, then people, and later billions of devices through the Internet of Things (IoT). While IoT succeeded in digitizing perception at scale, it also exposed fundamental limitations, including fragmentation, weak security, limited autonomy, and poor long-term sustainability. Today, advances in edge hardware, sensing, connectivity, and artificial intelligence enable a new phase: the Internet of Physical AI Agents. Unlike IoT devices that primarily sense and report, Physical AI Agents perceive, reason, and act in real time, operating autonomously and cooperatively across safety-critical domains such as disaster response, healthcare, industrial automation, and mobility. However, embedding fast-evolving AI capabilities into long-lived physical infrastructure introduces new architectural risks, particularly around interoperability, lifecycle management, and premature ossification. This article revisits lessons from IoT and Internet evolution, and articulates design principles for building resilient, evolvable, and trustworthy agentic systems. We present an architectural blueprint encompassing agentic
Recently, numerical examples of stable soap bubble clusters with multiple torus bubbles have been presented. The geometry of these clusters is based on the Platonic solids whose vertices have valence $3$ (in order to fulfill Plateau's laws): the tetrahedron, the cube, the dodecahedron. The clusters respectively contain a bubble of genus $3, 5, 11$. The construction is quite generic and can be used with any convex polyhedron. If stable, the cluster obtained using a polyhedron with $n$ faces has $3n+2$ bubbles and one of these bubbles has genus $n-1$. We propose here to show that is it possible to get stable soap bubble clusters with multiple torus bubbles using a geometry based on prisms and Archimedean solids as well.
A quantum random access code (QRAC) is a map $x\mapstoρ_x$ that encodes $n$-bit strings $x$ into $m$-qubit quantum states $ρ_x$, in a way that allows us to recover any one bit of $x$ with success probability $\geq p$. The measurement on $ρ_x$ that is used to recover, say, $x_1$ may destroy all the information about the other bits; this is in fact what happens in the well-known QRAC that encodes $n=2$ bits into $m=1$ qubits. Does this generalize to large $n$, i.e., could there exist QRACs that are so "obfuscated" that one cannot get much more than one bit out of them? Here we show that this is not the case: for every QRAC there exists a measurement that (with high probability) recovers the full $n$-bit string $x$ up to small Hamming distance, even for the worst-case $x$.
Commercial Large Language Model (LLM) APIs create a fundamental trust problem: users pay for specific models but have no guarantee that providers deliver them faithfully. Providers may covertly substitute cheaper alternatives (e.g., quantized versions, smaller models) to reduce costs while maintaining advertised pricing. We formalize this model substitution problem and systematically evaluate detection methods under realistic adversarial conditions. Our empirical analysis reveals that software-only methods are fundamentally unreliable: statistical tests on text outputs are query-intensive and fail against subtle substitutions, while methods using log probabilities are defeated by inherent inference nondeterminism in production environments. We argue that this verification gap can be more effectively closed with hardware-level security. We propose and evaluate the use of Trusted Execution Environments (TEEs) as one practical and robust solution. Our findings demonstrate that TEEs can provide provable cryptographic guarantees of model integrity with only a modest performance overhead, offering a clear and actionable path to ensure users get what they pay for. Code is available at htt
Ensemble methods combine the predictions of several base models. We study whether or not including more models always improves their average performance. This question depends on the kind of ensemble considered, as well as the predictive metric chosen. We focus on situations where all members of the ensemble are a priori expected to perform equally well, which is the case of several popular methods such as random forests or deep ensembles. In this setting, we show that ensembles are getting better all the time if, and only if, the considered loss function is convex. More precisely, in that case, the loss of the ensemble is a decreasing function of the number of models. When the loss function is nonconvex, we show a series of results that can be summarised as: ensembles of good models keep getting better, and ensembles of bad models keep getting worse. To this end, we prove a new result on the monotonicity of tail probabilities that may be of independent interest. We illustrate our results on a medical problem (diagnosing melanomas using neural nets) and a "wisdom of crowds" experiment (guessing the ratings of upcoming movies).
Generative AI (GenAI) models excel in their ability to recognize patterns in existing data and generate new and unexpected content. Recent advances have motivated applications of GenAI tools (e.g., Stable Diffusion, ChatGPT) to professional practice across industries, including product design. While these generative capabilities may seem enticing on the surface, certain barriers limit their practical application for real-world use in industry settings. In this position paper, we articulate and situate these barriers within two phases of the product design process, namely "getting the right design" and "getting the design right," and propose a research agenda to stimulate discussions around opportunities for realizing the full potential of GenAI tools in product design.
It is shown that standard quantum teleportation (SQT) with multi-qubit resource result in fidelity $(2+C)/3$ where $C$ is concurrence of the resource in bipartite entanglement between qubit going to receiver and rest of the qubits. For perfect SQT, obviously, $C=1$. For a general 3-qubit resource, we find conditions for getting perfect SQT for state expressed in any basis states. Zha et al. [Mod. Phys. Lett. B 22, 2523-2528 (2008)], who studied perfect SQT using 3-qubit resource, reported conditions for perfect SQT for only those resource states which are given in the 3-qubit canonical form of Acin representation. We show that there is an alternative easily derivable representation which gives more generalized results. To illustrate the difference between the two schemes, we build an example of 3-qubit entangled state, giving perfect SQT and not included in Zha et al. results.
This study explores and analyzes the learning tendencies of second-year students enrolled in different lines of study related to the Databases course. There were 79 answers collected from 191 enrolled students that were analyzed and interpreted using thematic analysis. The participants in the study provided two sets of answers, anonymously collected (at the beginning and at the end of the course), thus allowing us to have clear data regarding their interests and to find out their tendencies. We looked into their expectations and if they were met; we concluded that the students want to learn only database basics. Their main challenges were related to the course homework. We combined the information and the answers related to 1) other database-related topics that they would like to learn, 2) how they plan to use the acquired information, and 3) overall interest in learning other database-related topics. The conclusion was that students prefer learning only the basic information that could help them achieve their goals: creating an application or using it at work. For these students, Getting the work done is preferred to Learning in-depth.
Large language models have the potential to simplify formal theorem proving and make it more accessible. But how to get the most out of these models is still an open question. To answer this question, we take a step back and explore the failure cases of these models using common prompting-based techniques. Our talk will discuss these failure cases and what they can teach us about how to get more out of these models.
The structure of collaboration is known to be of great importance for the success of scientific endeavors. In particular, various types of social capital employed in co-authored work and projects bridging disciplinary boundaries have attracted researchers' interest. Almost all previous studies, however, use samples with an inherent survivor bias, i.e., they focus on papers that have already been published. In contrast, our article examines the chances for getting a working paper published by using a unique dataset of 245,000 papers uploaded to arXiv. ArXiv is a popular preprint platform in Physics which allows us to construct a co-authorship network from which we can derive different types of social capital and interdisciplinary teamwork. To emphasize the 'normal case' of community-specific standards of excellence, we assess publications in Physics' high impact journals as success. Utilizing multilevel event history models, our results reveal that already a moderate number of persistent collaborations spanning at least two years is the most important social antecedent of getting a manuscript published successfully. In contrast, inter- and subdisciplinary collaborations decrease the
We present an extended version of the Iterated Prisoner's Dilemma game in which agents with limited memory receive recommendations about the unknown opponent to decide whether to play with. Since agents can receive more than one recommendations about the same opponent, they have to evaluate the recommendations according to their disposition such as optimist, pessimist, or realist. They keep their firsthand experience in their memory. Since agents have limited memory, they have to use different forgetting strategies. Our results show that getting recommendations not always perform better. We observe that realist performs the best and optimist the worse.
"There and Back Again" (TABA) is a programming pattern where the recursive calls traverse one data structure and the subsequent returns traverse another. This article presents new TABA examples, refines existing ones, and formalizes both their control flow and their data flow using the Coq Proof Assistant. Each formalization mechanizes a pen-and-paper proof, thus making it easier to "get" TABA. In addition, this article identifies and illustrates a tail-recursive variant of TABA, There and Forth Again (TAFA) that does not come back but goes forth instead with more tail calls.
The constants of motion of the following systems are deduced: a relativistic particle with linear dissipation, a no-relativistic particle with a time explicitly depending force, a no-relativistic particle with a constant force and time depending mass, and a relativistic particle under a conservative force with position depending mass. The problem of getting the Hamiltonian for these systems is determined by getting the velocity as an explicit function of position and generalized linear momentum, and this problem can be solved a first approximation for the first above system.
Touch is a key part of interaction and communication between humans, but has still been little explored in human-robot interaction. In this work, participants were asked to approach and touch a humanoid robot on the hand (Nao - 26 participants; Pepper - 28 participants) to get its attention. We designed reaction behaviors for the robot that consisted in four different combinations of arm movements with the touched hand moving forward or back and the other hand moving forward or staying in place, with simultaneous leaning back, followed by looking at the participant. We studied which reaction of the robot people found the most appropriate and what was the reason for their choice. For both robots, the preferred reaction of the robot hand being touched was moving back. For the other hand, no movement at all was rated most natural for the Pepper, while it was movement forward for the Nao. A correlation between the anxiety subscale of the participants' personality traits and the passive to active/aggressive nature of the robot reactions was found. Most participants noticed the leaning back and rated it positively. Looking at the participant was commented on positively by some participan
Pierre van Hiele (1909-2010) suggested, both in 1957 and later repeatedly, wide application for the Van Hiele levels in insight, both for more disciplines and for different subjects in mathematics. David Tall (2013) suggests that Van Hiele only saw application to geometry. Tall claims that only he himself now extends to wider application. Getting the facts right, it can be observed that Tall misread Van Hiele (2002). It remains important that Tall supports the wide application of Van Hiele's theory. Tall apparently didn't know that Freudenthal claimed it too. There appears to exist a general lack of understanding of the Van Hiele - Freudenthal combination since 1957. Hans Freudenthal (1905-1990) also suggested that Van Hiele only saw application to geometry, and that only he, Freudenthal, saw the general application. Freudenthal adopted various notions from Van Hiele, misrepresented those, gave those new names of himself, and started referring to this instead of to Van Hiele. The misrepresentation may clarify why Tall didn't recognise Van Hiele's theory. Freudenthal mistook Van Hiele's distinction of concrete versus abstract for the distinction of reality versus model (applied math
Dynamical observational probes of the growth of density perturbations indicate that gravity may be getting weaker at low redshifts $z$. This evidence is at about $2-3σ$ level and comes mainly from weak lensing data that measure the parameter $S_8=σ_8 \sqrt{Ω_{0m}/0.3}$ and redshift space distortion data that measure the growth rate times the amplitude of the linear power spectrum parameter $fσ_8 (z)$. The measured $fσ_8$ appears to be lower than the prediction of General Relativity (GR) in the context of the standard $Λ$CDM model as defined by the Planck best fit parameter values. This is the well known $fσ_8$ tension of $Λ$CDM, which constitutes one of the two main large scale challenges of the model along with the $H_0$ tension. We review the observational evidence that leads to the $fσ_8$ tension and discuss some theoretical implications. If this tension is not a systematic effect it may be an early hint of modified gravity with an evolving effective Newton's constant $G_{eff}$ and gravitational slip parameter $η$. We discuss such best fit parametrizations of $G_{eff}(z)$ and point out that they can not be reproduced by simple scalar-tensor and $f(R)$ modified gravity theories b
We describe the architecture of Sammen Om Demens (SOD), an application for portable devices aiming at helping persons with dementia when wandering and getting lost through the involvement of caregivers, family members, and ordinary citizens who volunteer. To enable the real-time detection of a person with dementia that has lost orientation, we transfer location data at high frequency from a frontend on the smartphone of a person with dementia to a backend system. The backend system must be able to cope with the high throughput data and carry out possibly heavy computations for the detection of anomalous behavior via artificial intelligence techniques. This sets certain performance and architectural requirements on the design of the backend. In the paper, we discuss our design and implementation choices for the backend of SOD that involve microservices and serverless services to achieve efficiency and scalability. We give evidence of the achieved goals by deploying the SOD backend on a public cloud and measuring the performance on simulated load tests.
The language used in online forums differs in many ways from that of traditional language resources such as news. One difference is the use and frequency of nonliteral, subjective dialogue acts such as sarcasm. Whether the aim is to develop a theory of sarcasm in dialogue, or engineer automatic methods for reliably detecting sarcasm, a major challenge is simply the difficulty of getting enough reliably labelled examples. In this paper we describe our work on methods for achieving highly reliable sarcasm annotations from untrained annotators on Mechanical Turk. We explore the use of a number of common statistical reliability measures, such as Kappa, Karger's, Majority Class, and EM. We show that more sophisticated measures do not appear to yield better results for our data than simple measures such as assuming that the correct label is the one that a majority of Turkers apply.
In this paper, we introduce GET-2D-1.0, a fast grasp planner for the GET asymmetrical gripper that operates from a single-view RGB-D image, using the Ferrari-Canny metric and a novel sampling strategy, and GET-3D-1.0, a mesh-based method using a 3D gripper model and ray-tracing. We evaluate both grasp planners against baselines with physical experiments, which suggest that GET-2D-1.0 can improve over a bounding box baseline by over 40% in lift success, shake survival, and force resistance. Experiments with GET-3D-1.0 suggest slight improvement compared to GET-2D-1.0 on lift success and shake survival, but are more computationally expensive, averaging 17 seconds of planning compared to 683 ms for GET-2D-1.0.