MIT Technology Review Subscribe

From the Labs: Information Technology

New publications, experiments and breakthroughs in information technology–and what they mean.

Automated Towel Folder
A robot learns to reliably manipulate flexible objects

Fold, repeat: This PR2 robot from Willow Garage in Menlo Park, CA, has been programmed to use twin high-resolution cameras to examine a towel before folding it. It started by pulling this towel from a disordered pile.

Source: “Cloth Grasp Point Detection Based on Multiple-View Geometric Cues with Application to Robotic Towel Folding”
Jeremy Maitin-Shepard et al.
2010 IEEE International Conference on Robotics and Automation (ICRA2010), May 3-8, 2010, Anchorage, AK

Advertisement

Results: For the first time, a robot can reliably sort, fold, and stack different-sized towels that it encounters in a disordered pile. Previous robots have had only limited success at folding towels, even when the towels were laid out in a particular orientation and the robots were programmed with their dimensions.

This story is only available to subscribers.

Don’t settle for half the story.
Get paywall-free access to technology news for the here and now.

Subscribe now Already a subscriber? Sign in
You’ve read all your free stories.

MIT Technology Review provides an intelligent and independent filter for the flood of information about technology.

Subscribe now Already a subscriber? Sign in

Why it matters: Even robots that are adept at manipulating rigid objects, such as cups or tools, have not been able to dependably handle unfamiliar objects made of cloth, which changes shape. The ability to do so could eventually allow robots to help with laundry or other tasks that involve malleable objects.

Methods: After the robot picks up a towel from a pile, it rotates the towel with a two-fingered gripper and uses high-resolution cameras to view it from multiple angles. An algorithm developed by researchers at the University of California, Berkeley, enables the robot to distinguish the towel’s edges from folds in the cloth by estimating the curvature of the cloth (an edge is slightly sharper than a fold). By noting where two edges meet, it can identify a corner. After grasping the corner, it identifies and grasps an adjacent corner; then it untwists the towel and checks its configuration before folding it. To keep it from getting stuck, the researchers designed a self-correcting process. If it detects an error, it attempts to correct it or, if necessary, drops the towel and starts over. The robot successfully folded towels on its own 50 out of 50 times.

Next steps: The robot currently takes about 20 minutes to fold a single towel; the researchers are adapting the algorithm to speed up the process. They also plan to program robots to fold other objects, such as shirts, and to learn how to fold new items after observing a human demonstration.

Uncovering Search Histories
Personalized ­services on the Internet need high levels of security

Source: “Private Information Disclosure from Web Searches (The Case of Google Web History)”
Claude Castelluccia et al.
Proceedings of the 10th Privacy Enhancing Technologies Symposium, July 21-23, 2010, Berlin, Germany

Results: Researchers successfully reconstructed the Web search histories of specific Google users by stealing the users’ credentials and impersonating them. They were able to identify about 65 percent of what the users had been searching for, and they could tell whether a user had searched for a particular term.

Why it matters: Personalized Web services can help make searches and other tasks faster, but the new research suggests that they could also be used to collect information about search histories that people might prefer to keep private. A single search on a public Wi-Fi network would be enough to expose a person’s search history to a potential attacker. Although Google has made changes to prevent search histories from being discovered, the researchers say that other search engines are likely to have similar vulnerabilities. They recommend that Web applications encrypt all searches and credentials.

Advertisement

Methods: Google encrypts sensitive information such as passwords, but it doesn’t encrypt the authentication credentials that it uses to identify particular users of its search service. By intercepting these credentials, the researchers were able to impersonate a given user. Then they performed automated test searches in the user’s name and pieced together the Web search history from the personalized recommendations that Google provided.

Next steps: The researchers plan to analyze other search engines for similar leaks. They also continue to track the progress at fixing the problems they found.

This is your last free story.
Sign in Subscribe now

Your daily newsletter about what’s up in emerging technology from MIT Technology Review.

Please, enter a valid email.
Privacy Policy
Submitting...
There was an error submitting the request.
Thanks for signing up!

Our most popular stories

Advertisement