Active Proxy Interface: Design & Applications
- Active Proxy Interface is an interactive system architecture that maps proxies to real-world or abstract referents with explicit, bidirectional control.
- It leverages event-driven dynamics, such as gesture, speech, and runtime interception, to translate proxy manipulations into system state changes and data queries.
- Empirical evaluations across tangible interfaces, virtual systems, and network protocols demonstrate improved task performance, reduced latency, and enhanced usability.
An Active Proxy Interface is a class of systems in which a proxy—tangible, virtual, or software—functions simultaneously as a representation of a distinct real-world, data, or computational referent and as an interactive control whose explicit manipulation or activation governs behaviors, data queries, or interaction flows associated with that referent. Active proxy architectures are characterized by explicit mappings (often bijective) between referents and proxies, event-driven coupling of proxy manipulations to system state, and bidirectional feedback supporting embodied, accessible, or anonymized interaction. While several domains employ proxies passively (mere representation), the active proxy paradigm is defined by proxies that drive or intercept processes via direct manipulation, randomized querying, gesture control, or message interception. This article surveys core formal and architectural principles, interaction modalities, representative systems, empirical results, and practical design considerations of active proxy interfaces.
1. Formal Definitions and Mapping Models
An Active Proxy Interface, as introduced by Dai et al. (Dai et al., 26 Jan 2026), consists of a set of physical or virtual proxies and a set of real-world or abstract referents , linked via a bijective mapping . Manipulation events (e.g., pick-up, rotate, speech command) on proxy trigger an update function , where is the data visualization or interaction state. Actions can include pick-up, placement, rotation, pitch, dwell and are mapped to system commands, filter states, chart views, or dashboard updates.
In Reality Proxy (Liu et al., 23 Jul 2025), the mapping links a set of detected physical objects to abstract proxies , with each proxy parameterized by both spatial (real and proxy-space positions) and semantic attributes. Constraint optimization is employed to preserve spatial relationships, and hierarchy levels structure groupings and navigation.
Computational active proxy frameworks, such as active multiple testing (Xu et al., 8 Feb 2025), formalize a randomized querying interface: each hypothesis has a cheap proxy statistic ( for e-value, for p-value) and an expensive true statistic (, ). Proxies are selected or rejected for querying based on randomized Bernoulli sampling via intensity parameters or density ratios, ensuring statistical validity.
2. Core Architectural Patterns and System Components
Active proxy systems manifest across diverse architectures:
- Tangible User Interfaces (TUIs): MarioChart (Dai et al., 26 Jan 2026) employs autonomous robot carts, each representing and actively controlling the data state of its referent building via direct tabletop manipulation, pose tracking, and collision-free path planning.
- Virtual/Embodied Interfaces: Reality Proxy (Liu et al., 23 Jul 2025) generates proxy objects dynamically near the user’s hand in mixed-reality, decoupling selection/manipulation constraints from physical objects via AI-enriched attributes and hierarchical tree structures.
- Speech-Driven Proxies: HandProxy (Liang et al., 13 Mar 2025) parses natural language into structured JSON commands, driving a virtual hand proxy that performs fine-grained manipulatory actions within immersive environments, covering gesture, spatial, temporal, and target controls.
- Software/Runtime Interception: Ghost (Peck et al., 2013) in Pharo Smalltalk introduces an active proxy layer by mixing in proxy classes (AbstractProxy, AbstractClassProxy) with nilled-out method dictionaries, trapping all VM message dispatches and delegating them to separate handler classes, thus uniformly intercepting object, class, and method calls.
- Network and Data Protocol Proxies: ROS layer-7 proxy (Wendt et al., 2022) intercepts, rewrites, and remaps XMLRPC and TCPROS endpoints, acting at the protocol level to facilitate multi-host, containerized, or cross-segment deployments.
- Kubernetes Network Proxies: TSN metadata proxy (Orosi et al., 17 Mar 2025) preserves TSN-specific skb metadata via eBPF hooks and map handoff from pod egress to NIC egress, transparently enabling time-sensitive scheduling in containerized environments.
- Anonymity-Enabling Proxies: ProxyGPT (Pham et al., 2024) orchestrates encrypted, Tor-routed browser-to-browser proxying for chatbot interface access, with integrity verification via TLSNotary mechanisms and incentivization via Chaum e-cash.
Architectural layering is evident: proxies sit between input/control sources and core application logic, intercepting manipulation, message, or query events and mediating the transition to system state changes, data queries, visualizations, or external communications.
3. Interaction Modalities and Event-Driven Dynamics
Active proxies support a range of granular manipulation and event types:
- Direct Physical Control: MarioChart interprets gestural events (pick-up, place, rotate, pitch) on robot proxies, mapped to dashboard filters, temporal drill-downs, locks, or bookmarks (Dai et al., 26 Jan 2026).
- Virtual Gestures and Selection: Reality Proxy supports skimming, attribute-based filtering, hierarchical zoom, and multi-object brushing via combinations of gaze, finger, and pinch gestures, all mapped to proxy event flows (Liu et al., 23 Jul 2025).
- Speech → Proxy Mapping: HandProxy translates user utterances into primitive sequence commands—gesture, spatial, temporal—executed by the proxy hand, with ambiguity resolution overlays and real-time feedback (Liang et al., 13 Mar 2025).
- Runtime and Kernel Event Trapping: Ghost proxies catch any message in the method lookup chain (via cannotInterpret:) and forward to handler logic, supporting pre-/post-execution profiling, secure access control, lazy object fetching, and dynamic serialization (Peck et al., 2013).
- Randomized Query Selection: Active multiple testing algorithms use proxy-derived statistics to actively propose whether to perform costly queries. This probabilistic event-driven choice leverages proxy validity to maintain statistical guarantees (Xu et al., 8 Feb 2025).
- Protocol and Metadata Interception: ROS proxy rewrites endpoint descriptors and tracks node lifetimes, while TSN proxy maps SO_PRIORITY/SO_TXTIME metadata across namespace boundaries, restoring scheduling and timing at the NIC (Wendt et al., 2022, Orosi et al., 17 Mar 2025).
- Encrypted, Audited Transaction Flows: ProxyGPT forwards encrypted user queries to browser proxies and verifies DOM automation results via TLSNotary ZKPs, enforcing transaction integrity while maintaining user anonymity (Pham et al., 2024).
The interface thus defines not only data and control flows but also the semantics of events: pick-up triggers a filter, pinch selects a set, speech initiates gesture, message arrival reifies method dispatch, metadata flow preserves timing, randomized coin flip determines query selection.
4. Empirical Findings and Evaluations
Experimental studies provide measured outcomes on the efficacy and usability of active proxy interfaces:
- MarioChart: Immediate spatial + data recall was significantly improved for active proxy (mean = 1.17 [0.74, 1.64]) versus tablet (mean = 0.49 [0.25, 0.80]), d=0.71, p<0.05. Position recall was also markedly higher for proxies. RD analytic task completion time was reduced (active proxy = 72.4 s [60.5, 86.6], tablet = 95.6 s [81.6, 111.9], d=–0.54, p<0.05). No significant differences were found in long-term recall, fatigue, mental workload, or engagement (Dai et al., 26 Jan 2026).
- Reality Proxy: Expert evaluation (n=10) yielded median Likert scores ≈6/7 on usability and usefulness, with significant improvements in scene understanding and reduced physical strain. Wilcoxon signed-rank tests confirmed above-neutral ratings (p<.005) (Liu et al., 23 Jul 2025).
- HandProxy: Achieved 100% task completion on 781 commands, with 91.8% accuracy and average 1.09 attempts per command; mean total latency per command ≈1.66 s. System handled high linguistic diversity (phrasing entropy Hₙ ≈ 0.6–0.9) (Liang et al., 13 Mar 2025).
- Active Multiple Testing: Simulations with tests showed active e-BH approaches full e-BH power with reduced query count. scCRISPR application reduced computation by 60–70% while retaining nearly all discoveries and FDR control. Density-based p-values delivered higher power for given resource budgets (Xu et al., 8 Feb 2025).
- ROS Proxy: TCPROS forwarding added only 1-2% throughput overhead up to 100 Mbps. XMLRPC message rewrite latency was sub-millisecond. Automated health checks and stale node sweep validated reliability (Wendt et al., 2022).
- TSN Proxy: eBPF TC hooks added O(200–500 ns) per packet; proxy accurately restored priorities and transmission timestamps such that TSN slots filled as intended (practically, 0–10 μs for prio 1, 10–20 μs for prio 2) (Orosi et al., 17 Mar 2025).
- ProxyGPT: Total query latency averaged 15.41 s, with ≈10 s overhead compared to native bot use. Auditing durations for TLSNotary were 101–130 s depending on VPN distance. Users prioritized privacy over latency and found volunteer proxying "fun" (Pham et al., 2024).
These results support that active proxy interfaces generally improve task-specific short-term recall, reduce cognitive load in selection, and maintain low computational or network overheads. User engagement remains comparable to traditional interfaces, and anonymity/protocol transparency are achievable at the cost of moderate latency increases.
5. Practical Design Guidelines and Implementation Insights
Design recommendations for active proxy interfaces focus on binding, affordance, and ergonomic factors:
- Maintain explicit proxy–referent associations through spatial layout and color encoding (e.g., MarioChart).
- Provide continuous visual cues, such as shadows, dynamic magnifiers, and selection highlights to reinforce proxy status and guidance.
- Map natural, domain-specific gestures or manipulation events to proxy behaviors (e.g., pinch, dwell, rotate, speech).
- Minimize physical and cognitive fatigue by ensuring manipulation durations and positions are ergonomic, and by supporting brief, meaningful interactions.
- Leverage autonomous proxy motion and planning to preserve spatial context (e.g., robot carts returning to source position), with robust collision avoidance.
- Seamlessly bridge aggregate overviews and granular drill-downs via proximity thresholds and hierarchical proxy structures.
- In network/data contexts, inject interception logic as a modular late-order plugin (e.g., TSN metadata proxy CNI), minimizing impact on underlying protocols/services.
- For software and method proxying, maintain separation between interception and handler logic, avoid cross-contamination of VM internals with application state, and optimize for minimal call-path overhead and memory usage (Ghost).
- For privacy-preserving proxies, employ cryptographic authentication, randomized integrity audits, and blinded exchange to decouple proxy identity from transaction tracking.
For statistical frameworks, tune proxy selection parameters (, density lower bound) based on empirical proxy–truth correlation, resource budgets, and required FDR guarantees.
6. Representative Applications and Extensions
Active proxy interfaces have been deployed across multiple domains:
- Embodied Data Exploration: MarioChart’s robot proxies enable spatial, referent-driven exploration in sustainability dashboard scenarios (Dai et al., 26 Jan 2026).
- MR Interaction Augmentation: Reality Proxy supports selection, filtering, and grouping of remote/crowded/occluded objects, with AI-enriched proxy attributes and hierarchical navigation (Liu et al., 23 Jul 2025).
- Accessible XR Control: HandProxy converts speech into articulated virtual hand actions, broadening accessibility for users with motor impairments or situational constraints (Liang et al., 13 Mar 2025).
- Scalable Hypothesis Testing: Active proxy frameworks allow scientists to triage resource-intensive statistical queries, guaranteeing FDR while leveraging auxiliary data (Xu et al., 8 Feb 2025).
- Distributed Robotics/Control: ROS proxying enables seamless interoperability of containerized and non-containerized nodes across clusters and network segments (Wendt et al., 2022).
- Kubernetes TSN Enablement: The TSN metadata proxy mechanism allows unmodified microservices to transmit time-sensitive streams without kernel bypass or CNI changes (Orosi et al., 17 Mar 2025).
- Anonymous Conversational AI: ProxyGPT realizes end-to-end encrypted, verifiably honest chatbot transactions, routed through volunteer browser proxies and incentivized via e-cash (Pham et al., 2024).
- Language Runtime Mediation: Ghost proxies in Pharo manage object swapping, method wrapping, and security auditing; Marea demonstrates reduction in VM memory usage (Peck et al., 2013).
Extensions include more generalized hand APIs for external apps, bimanual proxy modalities, modular proxy plugin architectures across protocols, and interactive learning of proxy/statistics mappings.
7. Concluding Insights and Research Directions
Active Proxy Interfaces operationalize the decoupling of interaction, control, or query from the constraints or costs attendant to real-world referents, physical devices, runtime entities, or networked endpoints. Core advantages include improved short-term recall, efficient selection and manipulation of remote or occluded entities, resource-aware query scheduling, cross-segment protocol interoperability, and privacy-preserving transaction mediation. Empirical studies suggest that such interfaces do not incur increased workloads or fatigue and can achieve near-baseline accuracy and engagement. Ongoing research explores richer multimodal proxy selection (vision + physics), lower-latency parsing and auditing, bidirectional/aggregated proxy hierarchies, and broader protocol/universal proxy generalization. The paradigm offers a unified abstraction for linking control, representation, and interaction—spanning embodied exploration, computational testing, distributed robotics, and privacy-centric conversational AI.