! Towards a Human Factors Ontology for Cyber Security!
|
|
- Annice Carson
- 6 years ago
- Views:
Transcription
1 ! Towards a Human Factors Ontology for Cyber Security! Alessandro Oltramari CyLab, Carnegie Mellon University Joint work with D. Henshel and M. Cains (IU), B. Hoffman (ARL)
2 Outline! A Holistic Perspective on Cyber Security Context Challenges Approach Framework Human Factors Ontology Infrastructure Features Examples 2
3 Context! 3
4 Challenges in Cyber Security! Complexity of the cyber environment Adversarial Attribution is difficult Indirect observations Data-intensive Human factors Cognitive biases & workload, personality, skills à decision making HCI Different information layers Simplistic risk and trust models Information fusion Incomplete/unavailable information Reliability Semantic transparency 4
5 Cyber Risk! Effective and successful efforts must consider impacts beyond the computer assets and network, taking a more holistic approach that considers the users, defenders, attackers, systems and infrastructures involved Assessing cyber security risk is a multicomponent, multi-tiered problem that involves hardware, software, environmental, and human factors. 5
6 Decisions and Risk! 6
7 Decisions and Trust! Environmental Workload T R U ST Social - Cogni1ve Behavioral Knowledge S it u a ti o n A w are n e ss D I M E N SI O N S 7
8 The Human Factors Framework! 8
9 My job? " "! Transform the conceptual framework into a machine readable ontology of trust-centric human factors Reusable semantic model Scalable Portable across platforms and tasks Actionable By automatic inference engines (DL-compliant) By artificial agents and probabilistic reasoning 9
10 Cyber Ontology Architecture (MITRE)! Obrst, Leo, Penny Chase, and Richard Markeloff. "Developing an Ontology of the Cyber Security Domain." STIDS Risk Trust 10
11 A Three-level Ontology for the Cyber CRA (CRATELO)! Foundational à object, event, quality, (DOLCE) Middle à risk, trust, vulnerability (SECCO) Specialized/Domain ontology of packet transmissions (PACO) ontology of SCADA vulnerabilities (TOSCA) 11
12 Aerial view of the result! 12
13 DOLCE s Quality Pattern! Quality is a specific attribute, e.g., reliability is a subattribute of trust w.r.t. a trustee (data). Quality-space is a abstract representation of an attribute s semantics, e.g., a binary space denoting the dichotomy reliable/unreliable - No topological commitment: the reliability space can be bi-dimensional or reflecting a probability distribution - Spatio-temporal dimensions can be added, e.g., when reliability is considered within a certain time frame (duration of transmission) in a specific network. Quality-region (part of a quality space) is a specific value associated to an attribute s semantics, e.g., binary value 1 standing for reliable, the discrete value 0.76, etc. 13
14 Example: Reliability of Network Delay! 14
15 7 Example: Risks of a Database Server! Problem: When applying the HUFO framework and model to a specific operation/scenario, what are the risks at each transition state and how is the overall risk affected? Which conceptual primitives are necessary and sufficient to include the model in order to describe risk? 15
16 State confidence variables tracked! S 0 Wai1ng State S 1 Connec1on Accepted Connec1on Determina1on: Secure / Insecure IDS determina-on = Secure IDS determina-on = InSecure S 1a Connec1on Broken S 2 Query Risk Variables: - Provenance - Where does connec1on come from? - Ports - User permission - Co- occurrence of network events - Database access System State Risk Modeled Tasks/ac1ons Transi1on between states
17 How to test this risk assessment approach dynamically?! Multi-Entity Bayesian Network! Mul1- En1ty Bayesian Networks (Laskey, 2008) integrate first order logic with Bayesian probability. 17
18 " OBElisk (Ontological-Bayesian Elicitation of Risk) 18
19 Variables as classes in the ontology Values are assigned to classes either as instances or as data types UnBBayes 19
20 Conclusions and Future work! Trust ontology framework embracing multiple human factors Comprehensive approach that considers foundational, middle, domain levels Simulation-friendly model Agent technologies (IBLOd à next talk!) Bayesian Networks Validation In diverse cyber scenarios At increasing level of complexity 20
21 Acknowledgements This research was sponsored by the Army Research Laboratory and was accomplished u n d e r C o o p e r a t i v e A g re e m e n t N u m b e r W911NF (ARL Cyber Security CRA). The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on. 21
22
COMMITMENT. &SOLUTIONS Act like someone s life depends on what we do. UNPARALLELED
Presented to: 4th Annual SERC Doctoral Students Forum 16 December 2016 UNPARALLELED COMMITMENT &SOLUTIONS Act like someone s life depends on what we do. U.S. ARMY ARMAMENT RESEARCH, DEVELOPMENT & ENGINEERING
More informationORC: an Ontology Reasoning Component for Diabetes
ORC: an Ontology Reasoning Component for Diabetes Özgür Kafalı 1, Michal Sindlar 2, Tom van der Weide 2 and Kostas Stathis 1 1 Department of Computer Science Royal Holloway, University of London, UK {ozgur.kafali,kostas.stathis}@rhul.ac.uk
More informationUnderstanding Consumer Experience with ACT-R
Understanding Consumer Experience with ACT-R Alessandro Oltramari 1,2 (work done in collaboration with Francesco Patt 2 and Paolo Panizza 2 ) 1 Carnegie Mellon University, CyLab (CS Department) 2 B-Sm@rk
More informationGetting the Payoff With MDD. Proven Steps to Get Your Return on Investment
Getting the Payoff With MDD Proven Steps to Get Your Return on Investment version 1.4 6/18/11 Generate Results: Real Models, Real Code, Real Fast. www.pathfindersolns.com Welcome Systems development organizations
More informationPythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL SAL. Lee W. Wagenhals Alexander H. Levis
Pythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL Lee W. Wagenhals Alexander H. Levis ,@gmu.edu Adversary Behavioral Modeling Maxwell AFB, Montgomery AL March 8-9, 2007 1 Outline Pythia
More informationInternational Journal of Software and Web Sciences (IJSWS)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
More informationFoundations of AI. 10. Knowledge Representation: Modeling with Logic. Concepts, Actions, Time, & All the Rest
Foundations of AI 10. Knowledge Representation: Modeling with Logic Concepts, Actions, Time, & All the Rest Wolfram Burgard, Andreas Karwath, Bernhard Nebel, and Martin Riedmiller 10/1 Contents Knowledge
More informationA Comparison of Collaborative Filtering Methods for Medication Reconciliation
A Comparison of Collaborative Filtering Methods for Medication Reconciliation Huanian Zheng, Rema Padman, Daniel B. Neill The H. John Heinz III College, Carnegie Mellon University, Pittsburgh, PA, 15213,
More informationBayesian Perception & Decision for Intelligent Mobility
Bayesian Perception & Decision for Intelligent Mobility E-Motion & Chroma teams Inria Research Center Grenoble Rhône-Alpes Christian LAUGIER First Class Research Director at Inria San Francisco, 05/11/2015
More informationAgent-Based Models. Maksudul Alam, Wei Wang
Agent-Based Models Maksudul Alam, Wei Wang Outline Literature Review about Agent-Based model Modeling disease outbreaks in realistic urban social Networks EpiSimdemics: an Efficient Algorithm for Simulating
More informationin Engineering Prof. Dr. Michael Havbro Faber ETH Zurich, Switzerland Swiss Federal Institute of Technology
Risk and Safety in Engineering Prof. Dr. Michael Havbro Faber ETH Zurich, Switzerland Contents of Today's Lecture Introduction to Bayesian Probabilistic Nets (BPN) Causality as a support in reasoning Basic
More informationSOFIT: Sociotechnical and Organizational Factors for Insider Threat
SOFIT: Sociotechnical and Organizational Factors for Insider Threat Frank L. Greitzer, Justin Purl, Yung Mei Leong, D.E. (Sunny) Becker, PsyberAnalytix Human Resources Research Organization Independent
More informationWhat Is A Knowledge Representation? Lecture 13
What Is A Knowledge Representation? 6.871 - Lecture 13 Outline What Is A Representation? Five Roles What Should A Representation Be? What Consequences Does This View Have For Research And Practice? One
More informationBoehringer Ingelheim Company Introduction
Boehringer Ingelheim Company Introduction Boehringer Ingelheim Value through Innovation 2009. All rights reserved. 1 Boehringer Ingelheim Company Introduction Background Family-owned global company Founded
More informationHigh-level Vision. Bernd Neumann Slides for the course in WS 2004/05. Faculty of Informatics Hamburg University Germany
High-level Vision Bernd Neumann Slides for the course in WS 2004/05 Faculty of Informatics Hamburg University Germany neumann@informatik.uni-hamburg.de http://kogs-www.informatik.uni-hamburg.de 1 Contents
More informationStandardize and Optimize. Trials and Drug Development
Informatics Infrastructure to Standardize and Optimize Quantitative Imaging in Clinical Trials and Drug Development Daniel L. Rubin, MD, MS Assistant Professor of Radiology Member, Stanford Cancer Center
More informationSAGE. Nick Beard Vice President, IDX Systems Corp.
SAGE Nick Beard Vice President, IDX Systems Corp. Sharable Active Guideline Environment An R&D consortium to develop the technology infrastructure to enable computable clinical guidelines, that will be
More informationThe Knowledge Level in Cognitive Architectures: Current Limitations and Possible Developments
The Knowledge Level in Cognitive Architectures: Current Limitations and Possible Developments Antonio Lieto a,b, Christian Lebiere c, Alessandro Oltramari d a University of Turin, Department of Computer
More informationModeling the Role of Theory of Mind in Social Interaction and Influence
Modeling the Role of Theory of Mind in Social Interaction and Influence David V. Pynadath Stacy Marsella The projects or efforts depicted were or are sponsored by the National Science Foundation, the Air
More informationCHAPTER 6 DESIGN AND ARCHITECTURE OF REAL TIME WEB-CENTRIC TELEHEALTH DIABETES DIAGNOSIS EXPERT SYSTEM
87 CHAPTER 6 DESIGN AND ARCHITECTURE OF REAL TIME WEB-CENTRIC TELEHEALTH DIABETES DIAGNOSIS EXPERT SYSTEM 6.1 INTRODUCTION This chapter presents the design and architecture of real time Web centric telehealth
More informationArtificial Cognitive Systems
Artificial Cognitive Systems David Vernon Carnegie Mellon University Africa vernon@cmu.edu www.vernon.eu Artificial Cognitive Systems 1 Carnegie Mellon University Africa Lecture 2 Paradigms of Cognitive
More informationMachine Learning and Event Detection for the Public Good
Machine Learning and Event Detection for the Public Good Daniel B. Neill, Ph.D. H.J. Heinz III College Carnegie Mellon University E-mail: neill@cs.cmu.edu We gratefully acknowledge funding support from
More informationDevelopment of a Model and a Mobile Computing Framework for Effective Self-
Development of a Model and a Mobile Computing Framework for Effective Self- Management of Type II Diabetes Jay Urbain, PhD urbain@msoe.edu Electrical Engineering and Computer Science Department Milwaukee
More informationOn Trust. Massimo Felici. Massimo Felici On Trust c
On Trust Massimo Felici Outline 1 What is Trust? Trust matters Trust problems Seeking an Experimental Trust Framework Trust and Dependability Directions for future work What is Trust? 2 Constructive Trust
More informationAn Extended Maritime Domain Awareness Probabilistic Ontology Derived from Human-aided Multi-Entity Bayesian Networks Learning
An Extended Maritime Domain Awareness Probabilistic Ontology Derived from Human-aided Multi-Entity Bayesian Networks Learning Cheol Young Park, Kathryn Blackmond Laskey, Paulo C. G. Costa The Sensor Fusion
More informationKey gender equality issues to be reflected in the post-2015 development framework
13 March 2013 Original: English Commission on the Status of Women Fifty-seventh session 4-15 March 2013 Agenda item 3 (b) Follow-up to the Fourth World Conference on Women and to the twenty-third special
More informationWhat can Ontology Contribute to an Interdisciplinary Project?
What can Ontology Contribute to an Interdisciplinary Project? Andrew U. Frank Geoinformation TU Vienna frank@geoinfo.tuwien.ac.at www.geoinfo.tuwien.ac.at Andrew Frank 1 My naïve view of archeology: How
More informationCHAPTER 6 HUMAN BEHAVIOR UNDERSTANDING MODEL
127 CHAPTER 6 HUMAN BEHAVIOR UNDERSTANDING MODEL 6.1 INTRODUCTION Analyzing the human behavior in video sequences is an active field of research for the past few years. The vital applications of this field
More informationProbabilistic Graphical Models: Applications in Biomedicine
Probabilistic Graphical Models: Applications in Biomedicine L. Enrique Sucar, INAOE Puebla, México May 2012 What do you see? What we see depends on our previous knowledge (model) of the world and the information
More informationTivoli Application Dependency Discovery Manager
Discovery of IT infrastructure with Tivoli Application Dependency Discovery Manager Bartłomiej Skowronek Bart.Skowronek@materna.dk www.materna.com 1 GOALS Using discovery to: obtain high-quality information
More informationFinding Information Sources by Model Sharing in Open Multi-Agent Systems 1
Finding Information Sources by Model Sharing in Open Multi-Agent Systems Jisun Park, K. Suzanne Barber The Laboratory for Intelligent Processes and Systems The University of Texas at Austin 20 E. 24 th
More informationRepresentational Limits in Cognitive Architectures
Representational Limits in Cognitive Architectures Antonio Lieto University of Turin, Department of Computer Science, Italy ICAR-CNR, Palermo, Italy lieto.antonio@gmail.com http://www.antoniolieto.net
More informationExtending BDI Multi-Agent Systems with Situation Management
Extending BDI Multi-Agent Systems with Situation Management J. Buford Altusys Corp. Princeton, NJ, USA buford@altusystems.com G. Jakobson Altusys Corp. Princeton, NJ, USA jakobson@altusystems.com L. Lewis
More informationRecognizing Scenes by Simulating Implied Social Interaction Networks
Recognizing Scenes by Simulating Implied Social Interaction Networks MaryAnne Fields and Craig Lennon Army Research Laboratory, Aberdeen, MD, USA Christian Lebiere and Michael Martin Carnegie Mellon University,
More informationResearch Review: Multiple Resource Theory. out in multi-task environments. Specifically, multiple display layout and control design
Research Review: Multiple Resource Theory Relevance to HCI Multiple resource theory is a framework for predicting effects on performance when multiple tasks are concurrently executed. These predictions
More informationRethinking Cognitive Architecture!
Rethinking Cognitive Architecture! Reconciling Uniformity and Diversity via Graphical Models! Paul Rosenbloom!!! 1/25/2010! Department of Computer Science &! Institute for Creative Technologies! The projects
More informationTemporal Primitives, an Alternative to Allen Operators
Temporal Primitives, an Alternative to Allen Operators Manos Papadakis and Martin Doerr Foundation for Research and Technology - Hellas (FORTH) Institute of Computer Science N. Plastira 100, Vassilika
More informationAn Application of Bayesian Networks to Antiterrorism Risk Management for Military Planners
An Application of Bayesian Networks to Antiterrorism Risk Management for Military Planners Linwood D. Hudson Digital Sandbox, Inc. 11710 Plaza America Dr., Suite 2000 Reston, VA 20190 lhudson@dsbox.com
More informationCognitive Maps-Based Student Model
Cognitive Maps-Based Student Model Alejandro Peña 1,2,3, Humberto Sossa 3, Agustín Gutiérrez 3 WOLNM 1, UPIICSA 2 & CIC 3 - National Polytechnic Institute 2,3, Mexico 31 Julio 1859, # 1099-B, Leyes Reforma,
More informationA Vision-based Affective Computing System. Jieyu Zhao Ningbo University, China
A Vision-based Affective Computing System Jieyu Zhao Ningbo University, China Outline Affective Computing A Dynamic 3D Morphable Model Facial Expression Recognition Probabilistic Graphical Models Some
More informationenvironment because of dynamically changing topology and lack of accurate and timely information,
ADAPTIVE FAULT LOCALIZATION IN MOBILE AD HOC BATTLEFIELD NETWORKS * Maitreya Natu, Adarshpal S. Sethi University of Delaware, Newark, DE, 19711 {natu, sethi}@cis.udel.edu ABSTRACT Future battlefield networks
More informationSystems Engineering Guide for Systems of Systems. Summary. December 2010
DEPARTMENT OF DEFENSE Systems Engineering Guide for Systems of Systems Summary December 2010 Director of Systems Engineering Office of the Director, Defense Research and Engineering Washington, D.C. This
More informationBeliefOWL: An Evidential Representation in OWL ontology
BeliefOWL: An Evidential Representation in OWL ontology Amira Essaid essaid_amira@yahoo.fr Boutheina Ben Yaghlane boutheina.yaghlane@ihec.rnu.tn Higher Institute of Management of Tunis LARODEC Laboratory
More informationM.Sc. in Cognitive Systems. Model Curriculum
M.Sc. in Cognitive Systems Model Curriculum April 2014 Version 1.0 School of Informatics University of Skövde Sweden Contents 1 CORE COURSES...1 2 ELECTIVE COURSES...1 3 OUTLINE COURSE SYLLABI...2 Page
More informationThe Human Behaviour-Change Project
The Human Behaviour-Change Project Participating organisations A Collaborative Award funded by the www.humanbehaviourchange.org @HBCProject This evening Opening remarks from the chair Mary de Silva, The
More informationA Telematic System for Diabetes Management, Reporting and Patient Advice
The Journal on Information Technology in Healthcare 2005; 3(5): 307 313 A Telematic System for Diabetes Management, Reporting and Patient Advice Dimitra Iliopoulou*, Kostas Giokas*, Stavroula Mougiakakou,
More informationKaiser Permanente Convergent Medical Terminology (CMT)
Kaiser Permanente Convergent Medical Terminology (CMT) Using Oxford RDFox and SNOMED for Quality Measures Peter Hendler, MD Alan Abilla, RN, MS About Kaiser Permanente Largest health maintenance organization
More informationWhat Makes a Good Cyber Operator?
https://www.csiac.org/ What Makes a Good Cyber Operator? Today s Presenter: Robert Dora, Research Engineer Assured Information Security, Inc. (AIS) September 28, 2016 Moderator: Steve Warzala swarzala@quanterion.com
More informationCollaborative Project of the 7th Framework Programme. WP6: Tools for bio-researchers and clinicians
G.A. nº 270086 Collaborative Project of the 7th Framework Programme WP6: Tools for bio-researchers and clinicians Deliverable 6.1: Design of Inference Engine v.1.0 31/10/2011 www.synergy-copd.eu Document
More informationMachine Learning and Computational Social Science Intersections and Collisions
Machine Learning and Computational Social Science Intersections and Collisions David Jensen Department of Computer Science University of Massachusetts mherst 17 December 2011 1202 Introduced new representations
More informationState-of-the-art Strategies for Addressing Selection Bias When Comparing Two or More Treatment Groups. Beth Ann Griffin Daniel McCaffrey
State-of-the-art Strategies for Addressing Selection Bias When Comparing Two or More Treatment Groups Beth Ann Griffin Daniel McCaffrey 1 Acknowledgements This work has been generously supported by NIDA
More informationObservations on the Use of Ontologies for Autonomous Vehicle Navigation Planning
Observations on the Use of Ontologies for Autonomous Vehicle Navigation Planning Ron Provine, Mike Uschold, Scott Smith Boeing Phantom Works Stephen Balakirsky, Craig Schlenoff Nat. Inst. of Standards
More informationExpert System Profile
Expert System Profile GENERAL Domain: Medical Main General Function: Diagnosis System Name: INTERNIST-I/ CADUCEUS (or INTERNIST-II) Dates: 1970 s 1980 s Researchers: Ph.D. Harry Pople, M.D. Jack D. Myers
More informationReference Model of Multi-Entity Bayesian Networks for Predictive Situation Awareness
Reference Model of Multi-Entity Bayesian Networks for Predictive Situation Awareness Cheol Young Park a * and Kathryn Blackmond Laskey a a The Sensor Fusion Lab & Center of Excellence in C4I, George Mason
More informationA Description Logics Approach to Clinical Guidelines and Protocols
A Description Logics Approach to Clinical Guidelines and Protocols Stefan Schulz Department of Med. Informatics Freiburg University Hospital Germany Udo Hahn Text Knowledge Engineering Lab Freiburg University,
More informationEmbracing Complexity in System of Systems Analysis and Architecting
Embracing Complexity in System of Systems Analysis and Architecting Complex Adaptive System 2013 November 13-15, 2013, Baltimore, MA Cihan H. Dagli INCOSE and IIE Fellow Founder Director Systems Engineering
More informationToward Plug and Play Medical Cyber-Physical Systems (Part 2)
Toward Plug and Play Medical Cyber-Physical Systems (Part 2) Insup Lee PRECISE Center School of Engineering and Applied Science University of Pennsylvania EMSIG Autumn School Copenhagen, Denmark November
More informationBayesian Networks for the Human Element Leroy A. "Jack" Jackson and MAJ Jonathan K. Alt, US Army Training and Doctrine Command
Bayesian Networks for the Human Element Leroy A. "Jack" Jackson and MAJ Jonathan K. Alt, US Army Training and Doctrine Command Introduction Bayesian networks are powerful tools for knowledge representation
More informationKnowledge networks of biological and medical data An exhaustive and flexible solution to model life sciences domains
Knowledge networks of biological and medical data An exhaustive and flexible solution to model life sciences domains Dr. Sascha Losko, Dr. Karsten Wenger, Dr. Wenzel Kalus, Dr. Andrea Ramge, Dr. Jens Wiehler,
More informationGoal. Security Risk-Oriented Misuse Cases
Fundamentals of Secure System Modelling Springer, 2017 Chapter 7: Security Risk-Oriented Misuse Cases Raimundas Matulevičius University of Tartu, Estonia, rma@ut.ee Goal Understand how security risks can
More informationUser-Friendly Approach to Capacity Planning studies with Java Modelling Tools
Politecnico di Milano EECS Dept. Milan, Italy User-Friendly Approach to Capacity Planning studies with Java Modelling Tools Marco Bertoli, Giuliano Casale, Giuseppe Serazzi SIMUTOOLS09 March 5th, 2009
More informationMemory-Augmented Active Deep Learning for Identifying Relations Between Distant Medical Concepts in Electroencephalography Reports
Memory-Augmented Active Deep Learning for Identifying Relations Between Distant Medical Concepts in Electroencephalography Reports Ramon Maldonado, BS, Travis Goodwin, PhD Sanda M. Harabagiu, PhD The University
More informationA Predictive Chronological Model of Multiple Clinical Observations T R A V I S G O O D W I N A N D S A N D A M. H A R A B A G I U
A Predictive Chronological Model of Multiple Clinical Observations T R A V I S G O O D W I N A N D S A N D A M. H A R A B A G I U T H E U N I V E R S I T Y O F T E X A S A T D A L L A S H U M A N L A N
More informationCentral Maine Healthcare Preparedness Coalition
Central Maine Healthcare Preparedness Multi-year and Exercise Plan July 14, 2015 Rev. December 2012 HSEEP-PM01 A Maine CDC Partner Multi-year and Exercise Plan (TEP) Central Maine Healthcare Preparedness
More informationAn introduction to case finding and outcomes
An introduction to case finding and outcomes Dr Harshana Liyanage Department of Clinical & Experimental Medicine University of Surrey Wednesday, 25 January 2017 1 Objectives Problems with routine data
More informationA FRAMEWORK FOR CLINICAL DECISION SUPPORT IN INTERNAL MEDICINE A PRELIMINARY VIEW Kopecky D 1, Adlassnig K-P 1
A FRAMEWORK FOR CLINICAL DECISION SUPPORT IN INTERNAL MEDICINE A PRELIMINARY VIEW Kopecky D 1, Adlassnig K-P 1 Abstract MedFrame provides a medical institution with a set of software tools for developing
More informationA context-driven integrated framework for research on interactive IR Ingwersen, Peter
university of copenhagen A context-driven integrated framework for research on interactive IR Ingwersen, Peter Published in: Tushu Qingbao Zhishi Publication date: 2008 Document Version Også kaldet Forlagets
More informationConceptual Spaces. A Bridge Between Neural and Symbolic Representations? Lucas Bechberger
Conceptual Spaces A Bridge Between Neural and Symbolic Representations? Lucas Bechberger Peter Gärdenfors, Conceptual Spaces: The Geometry of Thought, MIT press, 2000 The Different Layers of Representation
More informationLocal Image Structures and Optic Flow Estimation
Local Image Structures and Optic Flow Estimation Sinan KALKAN 1, Dirk Calow 2, Florentin Wörgötter 1, Markus Lappe 2 and Norbert Krüger 3 1 Computational Neuroscience, Uni. of Stirling, Scotland; {sinan,worgott}@cn.stir.ac.uk
More informationChapter 2. Knowledge Representation: Reasoning, Issues, and Acquisition. Teaching Notes
Chapter 2 Knowledge Representation: Reasoning, Issues, and Acquisition Teaching Notes This chapter explains how knowledge is represented in artificial intelligence. The topic may be launched by introducing
More information19th International Command and Control Research and Technology Symposium
19th International Command and Control Research and Technology Symposium C2 Agility: Lessons Learned from Research and Operations Probabilistic Ontology Architecture for a Terrorist Identification Decision
More informationPhone Number:
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1589 Multi-Agent based Diagnostic Model for Diabetes 1 A. A. Obiniyi and 2 M. K. Ahmed 1 Department of Mathematic,
More informationAn Ontology for Healthcare Quality Indicators: Challenges for Semantic Interoperability
414 Digital Healthcare Empowering Europeans R. Cornet et al. (Eds.) 2015 European Federation for Medical Informatics (EFMI). This article is published online with Open Access by IOS Press and distributed
More informationTC65B, WG6. IEC Industrial Process Control Systems Guideline for evaluating process control systems. Micaela Caserza Magro Paolo Pinceti
COMITATO ELETTROTECNICO ITALIANO TC65B, WG6 IEC 62603 Industrial Process Control s Guideline for evaluating process control systems Micaela Caserza Magro Paolo Pinceti The origin of the idea F UK Group
More informationThe openehr approach. Background. Approach. Heather Leslie, July 17, 2014
Heather Leslie, July 17, 2014 The openehr approach Background The open source openehr 1 architecture specifications 2 have evolved as the result of over 20 years of research and international implementations,
More informationa ~ P~e ýt7c4-o8bw Aas" zt:t C 22' REPORT TYPE AND DATES COVERED FINAL 15 Apr Apr 92 REPORT NUMBER Dept of Computer Science ' ;.
* I Fo-,.' Apf.1 ved RFPORT DOCUMENTATION PAGE o ooo..o_ AD- A258 699 1)RT DATE t L MB No 0704-0788 a ~ P~e ýt7c4-o8bw Aas" zt:t C 22'503 13. REPORT TYPE AND DATES COVERED FINAL 15 Apr 89-14 Apr 92 4.
More informationAbstract. VIStology, Inc.
Abstract Behavior modeling for military applications needs to consider systems in which all kind of entities participate machines, humans, human organizations (like platoons or companies) as well as such
More informationHBML: A Representation Language for Quantitative Behavioral Models in the Human Terrain
HBML: A Representation Language for Quantitative Behavioral Models in the Human Terrain Nils F. Sandell, Robert Savell David Twardowski, George Cybenko Conference on Social Computing, Behavioral Modeling,
More informationLearning to Use Episodic Memory
Learning to Use Episodic Memory Nicholas A. Gorski (ngorski@umich.edu) John E. Laird (laird@umich.edu) Computer Science & Engineering, University of Michigan 2260 Hayward St., Ann Arbor, MI 48109 USA Abstract
More informationFoundations for a Science of Social Inclusion Systems
Foundations for a Science of Social Inclusion Systems Fabio N. Akhras Renato Archer Center of Information Technology Rodovia Dom Pedro I, km 143,6 13089-500 Campinas, São Paulo, Brazil Phone: 0055-19-37466268
More informationSeamless Audio Splicing for ISO/IEC Transport Streams
Seamless Audio Splicing for ISO/IEC 13818 Transport Streams A New Framework for Audio Elementary Stream Tailoring and Modeling Seyfullah Halit Oguz, Ph.D. and Sorin Faibish EMC Corporation Media Solutions
More informationExploiting deduction and abduction services for information retrieval. Ralf Moeller Hamburg University of Technology
Exploiting deduction and abduction services for information retrieval Ralf Moeller Hamburg University of Technology Seman&c Technologies: Data Descrip&ons Ontologies (specified in, e.g., OWL, UML) (aka
More informationUser Interface. Colors, Icons, Text, and Presentation SWEN-444
User Interface Colors, Icons, Text, and Presentation SWEN-444 Color Psychology Color can evoke: Emotion aesthetic appeal warm versus cold colors Colors can be used for Clarification, Relation, and Differentiation.
More informationAbstract of the PhD Thesis Intelligent monitoring and early warning system of pandemic viruses
FACULTY OF AUTOMATION AND COMPUTER SCIENCE Abstract of the PhD Thesis Intelligent monitoring and early warning system of pandemic viruses PhD Student: eng. Adina-Violeta Pop Thesis advisor: Prof.Dr.Eng.
More informationRemarks on Bayesian Control Charts
Remarks on Bayesian Control Charts Amir Ahmadi-Javid * and Mohsen Ebadi Department of Industrial Engineering, Amirkabir University of Technology, Tehran, Iran * Corresponding author; email address: ahmadi_javid@aut.ac.ir
More informationQuantifying location privacy
Sébastien Gambs Quantifying location privacy 1 Quantifying location privacy Sébastien Gambs Université de Rennes 1 - INRIA sgambs@irisa.fr 10 September 2013 Sébastien Gambs Quantifying location privacy
More informationStepwise Knowledge Acquisition in a Fuzzy Knowledge Representation Framework
Stepwise Knowledge Acquisition in a Fuzzy Knowledge Representation Framework Thomas E. Rothenfluh 1, Karl Bögl 2, and Klaus-Peter Adlassnig 2 1 Department of Psychology University of Zurich, Zürichbergstraße
More informationglite Information System
glite Information System Dr. Marco Fargetta Marco.Fargetta@ct.infn.it INFN, Italy EUAsiaGrid BioWorkshop NUS, Singapore 2010 Outline 1 Introduction 2 Background GLUE Schema LDAP 3 BDII 4 Monitoring 5 Conclusions
More informationA Virtual Glucose Homeostasis Model for Verification, Simulation and Clinical Trials
A Virtual Glucose Homeostasis Model for Verification, Simulation and Clinical Trials Neeraj Kumar Singh INPT-ENSEEIHT/IRIT University of Toulouse, France September 14, 2016 Neeraj Kumar Singh A Perspective
More informationA Survey on Serious Games for Rehabilitation
A Survey on Serious Games for Rehabilitation Paula Rego 1,2, Pedro Moreira 1, Luís Paulo Reis 2 1 Instituto Politécnico de Viana do Castelo 2 Faculdade de Engenharia da Universidade do Porto 28th - 29th
More informationSpatial Cognition for Mobile Robots: A Hierarchical Probabilistic Concept- Oriented Representation of Space
Spatial Cognition for Mobile Robots: A Hierarchical Probabilistic Concept- Oriented Representation of Space Shrihari Vasudevan Advisor: Prof. Dr. Roland Siegwart Autonomous Systems Lab, ETH Zurich, Switzerland.
More informationDISTRIBUTED BIOSURVEILLANCE SYSTEMS USING SENSIBLE AGENT TECHNOLOGY TO IMPROVE COORDINATION AND COMMUNICATION AMONG DECISION-MAKERS
DISTRIBUTED BIOSURVEILLANCE SYSTEMS USING SENSIBLE AGENT TECHNOLOGY TO IMPROVE COORDINATION AND COMMUNICATION AMONG DECISION-MAKERS K. Suzanne Barber, Karen Fullam, Thomas J. Graser, David C. Han, Joonoo
More informationImplementing a Modern NDT Inspection Program Utilizing Connected Instruments and Cloud Software Solutions
Implementing a Modern NDT Inspection Program Utilizing Connected Instruments and Cloud Software Solutions Dianne Hillhouse Business Development Manager Oil/Gas/Chemical Market Olympus Scientific Solutions
More information#HealthForAll ichc2017.org
#HealthForAll ichc2017.org Session 25: Monitoring and Evaluation for programming, including Community Empowerment and Equity Institutionalizing Community Health Conference Johannesburg, March 27-30, 2017
More informationCDR Kimberly Elenberg, Office of Food Defense and Emergency Response, Food Safety Inspection Service, United States Department of Agriculture
The Consumer Complaint Monitoring System Enhancing Discovery and Mitigation of Foodborne Threats to Health through Pattern Surveillance, and Multiple-Attribute Algorithms CDR Kimberly Elenberg, Office
More informationImmunization Reporting and Clinical Decision Support via SOA. Mike Suralik Project Manager HLN Consulting, LLC. June 4, 2009
Immunization Reporting and Clinical Decision Support via SOA Mike Suralik Project Manager June 4, 2009 1 Introduction Public health agencies have unique assets (e.g. data and algorithms) that can and should
More informationGrounding Ontologies in the External World
Grounding Ontologies in the External World Antonio CHELLA University of Palermo and ICAR-CNR, Palermo antonio.chella@unipa.it Abstract. The paper discusses a case study of grounding an ontology in the
More informationPersistent Visual Tracking and Accurate Geo-Location of Moving Ground Targets by Small Air Vehicles
Persistent Visual Tracking and Accurate Geo-Location of Moving Ground Targets by Small Air Vehicles Michael Dille, Ben Grocholsky, Stephen Thomas Nuske EXTENDED ABSTRACT 1 Motivation, Problem Statement,
More informationFUTURE SMART ENERGY SOFTWARE HOUSES
FUTURE SMART ENERGY SOFTWARE HOUSES Futures Conference 2018 Petri Kettunen & Niko Mäkitalo Matemaattis-luonnontieteellinen Department of Computer Science tiedekunta Petri Kettunen & Niko Mäkitalo 14/06/2018
More informationRole Representation Model Using OWL and SWRL
Role Representation Model Using OWL and SWRL Kouji Kozaki, Eiichi Sunagawa, Yoshinobu Kitamura, Riichiro Mizoguchi The Institute of Scientific and Industrial Research (ISIR), Osaka University 8-1 Mihogaoka,
More information