Finding Information Sources by Model Sharing in Open Multi-Agent Systems 1

Size: px
Start display at page:

Download "Finding Information Sources by Model Sharing in Open Multi-Agent Systems 1"

Transcription

1 Finding Information Sources by Model Sharing in Open Multi-Agent Systems Jisun Park, K. Suzanne Barber The Laboratory for Intelligent Processes and Systems The University of Texas at Austin 20 E. 24 th Street ACES 5.402, Austin, TX, Abstract. The beliefs of an agent can influence the goal achievement of the agent. In order for an agent to be autonomous an agent should control its beliefs as well as goals. The degree of an agent s belief autonomy is its degree of dependence on others to build its beliefs, which can be controlled by selecting the most appropriate information sources on which to rely. Large, open environments make it difficult for an agent to find the most appropriate information sources since agents only know about a limited number of sources and sources come and go. More challenges arise when the agents are deployed in ad-hoc networks where each agent has a limited number of neighbors with whom it can communicate. This research proposes a method for finding information sources using the evaluation metrics source s trustworthiness, ability to satisfy the agent s information needs, and timeliness of information delivery. Experiments indicate how the extent to which those evaluations are shared among the agents (the degree of model sharing) affects an agent s selection of information sources and thus, its belief autonomy. Introduction Agents in Multi-Agent Systems (MAS) proactively pursue their goals in an environment which includes other agents []. Consequently, autonomy is relational and limited, meaning that an agent s autonomy is both meaningful in relation to the influence of other agents and the autonomy is necessarily limited by the relationship [2]. An agent s beliefs (estimates of the true value of a statement or variable) are essential for an agent to reason when deciding how to accomplish its goals. Thus, an agent s goal achievement is certainly a function of its beliefs. We define the degree of an agent s belief autonomy for a respective goal as the degree of dependence on others to build its belief models; or the degree of control over its beliefs. Since an agent s beliefs may be constructed from information This research was supported in part under a subcontract with ScenPro, Inc. funded by U.S. Department of Defense, Small Business Technology Transfer (STTR) Program, Contract Number F C-093.

2 2 Jisun Park, K. Suzanne Barber acquired from others (e.g. agents), an agent s belief autonomy is key for accurate belief formulation and goal achievement. We argue that an agent s degree of belief autonomy is dependent upon its radius of awareness. An agent s radius of awareness is the extent to which it knows about other information sources in the system. The radius for an individual agent is limited and can change. Therefore, an agent must often rely on other agents to share their knowledge about potential sources. An agent s internal beliefs consist of its derived models of perceived and communicated information about itself, others and the environment. We propose three factors to be considered for achieving an agent s appropriate degree of belief autonomy: trustworthiness, coverage, and cost. In addition, when agents in the environment share their models about other agents (information sources), it is necessary to incorporate these shared models into the agents evaluations about the other agents (information sources). An agent can use s-curve transformations to incorporate the shared models about other agents which may not be known to it. 2 Overview An agent should select the information and information sources to maximize the achievability of the goal which is depending on the respective information and sources. Thus, the degree of belief autonomy as well as the actual dependencies (i.e. dependencies on which beliefs from which information source) is paramount. Agents are the distributed information sources with limited information acquisition and communication. The network of agents is not always complete because an agent can be either physically or logically limited in its communication radius, or not aware of all agents in the system. The degree of model sharing (dms) can also be defined in this context as the distance of neighbors sharing their evaluations of their respective neighbors. The system can be formally described as follows. Na ( i) = { ak ak is a neighbor of ai} KB( ai, gn) = { rk rk is required by a goal gn of ai} PROV ( a ) = { r r is provided by a } i k k i, where Na ( i ) is a set of agents which are the neighbors of a i, KB( ai, gn) is a set of information which is required by agent a i s goal g n, and PROV ( a i ) is a set of information which is provided by a i. When an agent requires information it does not have, the agent needs to find other suppliers of that information. Instead of assuming an oracle which resolves the location of information, we assume multicast of requests and information to and from neighbors. When an agent learns which neighbors can provide the respective information, the agent can exercise control over the selection of the information sources, and thus, control over the acquisition of beliefs (i.e. belief autonomy), deciding from whom to get information the next time.

3 Finding Information Sources by Model Sharing in Open Multi-Agent Systems 3 There are two main issues for an agent constructing the most reliable paths to the information sources. The first is the evaluation metrics for information and information sources (Section 3), and the second is the resultant effect when agents do or do not share the evaluations of other with different degrees of the model sharing (Section 4). 3 Evaluation Metrics In order for an agent to determine its most appropriate degree of belief autonomy for a goal, it must determine () the potential sources that might deliver those beliefs and (2) the quality and efficiency of those sources. The following metrics, trustworthiness, coverage and cost, serve to describe an agent s potential information source(s). 3. Trustworthiness There exist many different representations and management schemes for trustworthiness [3-6]. In this paper, trustworthiness of an information provider from an agent s point of view is defined simply as the reliability of the information provider. Reliability can be defined as the ability of a system or component to perform its required functions under stated conditions for a specified period of time [7] or the probability that a functional unit will perform its required function for a specified interval under stated conditions [7]. It can also be defined as repeatability or consistency [8]. Based on the above definitions, we define reliability as the probability that an agent provides its perceived information consistently and robustly. This definition assumes that a reliable information provider will consistently provide the same beliefs in a given environment if it perceives the same information. Trustworthiness is denoted by Ta ( i, a j), which is the reliability of a j from a i s point of view. This research assumes that an agent keeps track of the reliability of only its own neighbors. This assumption makes a difference in both selecting the potential sources and suggesting the request paths. Reliability of the sources as a trustworthiness evaluation metric is one of the factors for guaranteeing autonomy on beliefs [2] because it is often desirable for an agent to be completely independent from the untrustworthy sources. Consequently, if an agent knows the reliability of potential sources, for respective information the agent can identify on whom to depend for that information. Thus, reliability evaluations are a significant factor for an agent determining an appropriate degree of belief autonomy (degree of dependence). In addition, the degree of model sharing affects an agent s radius of awareness about sources and their reliability. 3.2 Coverage Coverage of an information source is a measure for representing the contribution of the source to an agent s information needs. Depending upon the relative importance of its goals, an agent a might assign a priority weight, PRIO(a,r), to each information requirement r in its knowledge base. Agent a can assign priority to each required

4 4 Jisun Park, K. Suzanne Barber information by examining the number of goals the information helps to satisfy. When prioritization is impossible, we can assume all priorities to be. Given priority weights for information requirements, coverage of goal g n provided by source a j from a i s perspective is defined by the following equation: SourceCoverage( a, a, g ) = i j n rb PROV ( a j) ra KB( ai) PRIO( a, r ) PRIO( a, r ) Given the source coverage for all information sources, we can measure the combined coverage of a i s goal g n : GoalCoverage( a, g ) = Coverage( a, a, g ) i n i j n aj N( ai) In addition, we define TotalCoverage(a i ) accommodating all goals of agent a i as: TotalCoverage( a ) = GoalCoverage( a, g ) i i n n Coverage is a metric for representing the contribution of information sources to a requestor s goal achievement. The degree of information source distribution changes depending on an agent s decision preference 3.3 Cost The cost of getting information affects the performance and efficiency of an agent s decision-making. Even if a source provides the most reliable information, the high cost of information acquisition degrades the system. Timeliness of the information is closely related to the cost because the acquisition of the information is accomplished by a multi-hop request and delivery protocol. Untimely delivery of information can be caused by either delay due to agents or delay due to communication links. As an information consumer, the requesting agent cannot resolve the causes of the untimely reception of the information but can measure the delay. The cost can also be summed up to estimate the total cost of receiving all the information in the KB from a combination of sources. a i s cost of acquiring information from a j and total cost of acquiring a set of information from a combination of information sources are defined as the following equations: k Cost( ai, a j) =, where k is a scaling factor. Timeliness( ai, a j) TotalCost( ai) = Cost( ai, a j) a j N ( ai) PROV ( a j) The total cost is useful measure when an agent wants to select a set of information sources, which is a typical case when an agent has multiple information requirements. i i a b 4 Model Sharing Since a respective agent only knows about a limited number of information sources (known in this paper as the agent s neighbors), it must also rely on other agents to

5 Finding Information Sources by Model Sharing in Open Multi-Agent Systems 5 share their models describing sources they know about. The degree to which a respective agent shares its knowledge about its neighbors is referred to as the degree of model sharing (dms). An agent s degree of model sharing (dms) is related to its radius of awareness regarding information sources in the system. As the degree of model sharing increases, an agent can evaluate each potential path of an Information Supply Chain more accurately. a 4 REQ REQ REQ REQ a 2 a a 3 INFO INFO INFO INFO a 5 Fig.. Information request multicasting to neighbors with and without the awareness of the indirect neighbors. An agent in an Information Supply Chain receives a request from an agent, and if it cannot provide the information it will request the information from its neighbors. The request is directed to the neighbor which looks like the most appropriate provider based on the agent s models about the providers. The degree of model sharing refers to the degree to which a respective agent shares its knowledge about it neighbors. The knowledge about neighbors which can be shared by the adjacent neighbors includes perceived information, evaluation of neighbors, and suggestion of request paths. They are exchanged between the agents as a form of messages as REQ = [ Info _ id, SUGGESTED _ PATH ], INFO = [ Info, EVAL _ NEIGHBOR]. Fig. depicts an example Information Supply Chain. Focusing on the agent in the middle ( a ), a takes care of two messages request and information. A request message (REQ) includes the information identifications which are required either by a itself or other agents, and suggested paths for the information request. a determines the suggested paths based on the best route given agents known to a and evaluation of other agents given to a. An information message (INFO) contains the information accompanied by the evaluation of neighbors from the provider s point of view. The radius of the evaluations included in the INFO message is decided by dms. Info _ id is a vector of requested information identifications, and Info is the information sent to the requester from the provider. EVAL _ NEIGHBOR is a combined evaluation using the evaluation metrics to describe the potential information sources among the neighbors. Depending on dms, EVAL _ NEIGHBOR contains the models of up to dms hops away from the requesting agent. In Fig., assuming dms is, if a requests information by sending a REQ message, REQ = [ < r >, null], without a suggested path since a does not

6 6 Jisun Park, K. Suzanne Barber have any evaluations about the neighbors of a 3. a3 responds with an INFO message, INFO =< [ r = ><, a4 = 0.5, a5 = 0.9 >, ] including a 3 s evaluations about its neighbors which provide r to a 3 ; in this case, a single number for simplicity. SUGGESTED _ PATH is determined by considering EVAL _ NEIGHBOR. The requesting agent can suggest the expected request route. The suggestion can be injected into the decision-making process of the receivers. An agent must select a set of information sources using its own evaluations of the neighbors and the results of EVAL _ NEIGHBOR for sources beyond it. SUGGESTED _ PATH is a set of suggestions from the receiver of the EVAL _ NEIGHBOR, and it can also affect the decisions about the best sources depending on how much the suggestions are reflected in the decision-making. 5 Shared Models Incorporation Among the evaluation metrics (trustworthiness, cost, coverage) which are the shared models, an agent can use the coverage metric to develop a preference on the sources depending on the preferred degree of distribution among information sources. Cost is related to the timeliness of the information delivery. In a multi-hop delivery system, the delay the requesting agent suffers is accumulated from the origin of the source. Trustworthiness is certainly an important affecting the decision-making, given different degrees of model sharing and it is necessary to integrate the trustworthiness evaluations of () sources originally unknown to the requesting agent but shared by its neighbors (indirect trustworthiness), and (2) its neighbors providing evaluations. When an agent has an access to indirect trustworthiness evaluations, it needs to incorporate those values into the evaluations about its neighbors. In order for an agent to incorporate the indirect trustworthiness values, s-curve transformations can be applied to those values. S-curve transformations clearly promote or diminish values, resulting in semi-binary mapping of indirect trustworthiness values. If an indirect trustworthiness value is more than 0.5, the value is promoted toward. If an indirect trustworthiness value is less than 0.5, the value is demoted toward 0. The incorporation of trustworthiness for the different degrees of the model sharing can be performed by the following equations.,where Tdms ( ai, aj ) T( ai, aj ) σ ( T( am, an )) a is a neighbor of n a, m Tdms ( ai, a ) :incorporated j dist ( ai, an) dms trustworthiness evaluation of a about i a, and, where B is the growth rate. j σ ( x) = + B ( x 0.5) = + e 6 Experiments In the experiments, there are 2 potential information supply chain paths (A,B,C,D,E,F,G,H,I,J,K,L) where each of the paths can be considered as a single

7 Finding Information Sources by Model Sharing in Open Multi-Agent Systems 7 instance of decomposed paths from a tree of neighbors. In these experiments, the maximum length of the information supply chain paths is 3 which denotes the number of hops in the path. The trustworthiness evaluations were pre-assigned, and each path in information supply chain is labeled by the supply chain path ID (see Table ). The overall goal of the experiments is to show the effects of different dms values, as well as the effects of s-curve transformations, for the selection of the most appropriate information sources. 6. Evaluating neighbors with trustworthiness In this experiment, only the trustworthiness is used for evaluating the neighbors for different degrees of the model sharing. Fig.2 (a) represents the results with s-curve transformations and Fig.2 (b) represents the results without s-curve transformations. In Table, the information supply chain path IDs and the corresponding MSE values and ranks, when the target location is transferred along each supply chain path, are presented. A path with a smaller MSE value is assigned a higher rank. In Fig.2 (a) and (b), it is shown that increasing dms yields a better evaluation about each path so each neighbor. For example, comparing Fig.2 (a) and (b), we can see that it is hard to distinguish which path is better between A and B when dms is zero although the MSE of A is less than MSE of B. However, if dms is or 2, the evaluation value for A is higher than that for B, meaning A is better than B which is exactly what the MSEs for A and B imply in Table. Trustworthiness Evaluation for each supply chain (w s-curve transform) 3.5 dms 0 dms 2.5 dms 2 Trustworthiness Evaluation for each supply chain (w/o s-curve transform) dms dms dms2 dms.5 dms potential suply chain paths potential supply chain paths (a) (b) Fig. 2. Trustworthiness Evaluation for each supply chain path (a) with s-curve transformation (b) without s-curve transformation In Fig.2 (a) and (b), we can also see that the s-curve transformation yields a better evaluation about each path thus each neighbor. In Fig.2, with dms 2, s-curve transformation yields a higher value for C than for B, and for J than for I which are correct with respect to MSE (MSE for C is less than B, and MSE for J is less than I). However, it is not possible to distinguish which path is better without s-curve transformations between B and C, and between I and J even with dms 2 as in Fig.2 (b). Experimental results certainly advocate maximum dms, s-curve transformation, and the utility of trustworthiness evaluations in selecting information sources. The experimental results which considers both trustworthiness and cost for evaluation show similar results, but are they not shown in this paper because of the lack of room for them.

8 8 Jisun Park, K. Suzanne Barber Table. Potential supply chain paths and corresponding MSE and ranks Supply MSE Chain Path ID value rank MSE Supply Chain Path ID value rank A 0.45 G.26 9 B.04 6 H.0 5 C I.50 D.36 0 J.22 8 E K F.3 7 L Conclusion This research proposes a method for selecting the information sources on which to rely in a large, open environment. Selection is based on the proposed evaluation metrics: source trustworthiness, coverage and cost. We assume that the agent requesting information only knows about its neighbors, the agents it can directly communicate with. The degree of model sharing is the extent to which agents share their evaluations of information sources with their neighbors along a given Information Supply Chain. The requesting agent needs to incorporate the evaluations about other sources it learns about through its neighbors into the evaluations of its neighbors. The s-curve transformation can be applied to incorporate the shared model into the evaluation of neighbors. Experiments indicate that the evaluations and the degree of model sharing will significantly affect the selection of information sources. Additionally, the s-curve transformation for the incorporation of the shared evaluations from neighbors enhances the agent s ability to evaluate its neighbors and other sources. References [] M. J. Wooldridge and N. R. Jennings, "Intelligent Agents: Theory and Practice," Knowledge Engineering Review, vol. 0, pp. 5-52, 995. [2] C. Castelfranchi, "Guarantees for Autonomy in Cognitive Agent Architecture," in Intelligent Agents: ECAI-94 Workshop on Agents Theories, Architectures, and Languages, N. R. Jennings, Ed. Berlin: Springer-Verlag, 995, pp [3] A. F. Dragoni and P. Giorgini, "Learning Agents' Reliability through Bayesian Conditioning: a simulation study," In Proceedings of Learning in DAI Systems, 997. [4] R. Falcone, G. Pezzulo, and C. Castelfranchi, "A fuzzy approach to a belief-based trust computation," in Lecture Notes on Artificial Intelligence, vol. 263, 2003, pp [5] M. Schillo, P. Funk, and M. Rovatsos, "Using Trust for Detecting Deceitful Agents in Artificial Societies," Applied Artificial Intelligence Journal, Special Issue on Deception, Fraud and Trust in Agent Societies, pp , [6] K. S. Barber and J. Kim, "Soft Security: Isolating Unreliable Agents from Society," in Trust, Reputation, and Security: Theories and Practice, Lecture Notes in Artificial Intelligence, M. Singh, Ed.: Springer, 2003, pp [7] IEEE, "IEEE Standard Computer Dictionary: A Compilation of IEEE Standard Computer Glossaries." New York, NY, 990. [8] W. Trochim, The Research Methods Knowledge Base, 2nd ed. Cincinnati, OH: Atomic Dog Publishing, 2000.

DISTRIBUTED BIOSURVEILLANCE SYSTEMS USING SENSIBLE AGENT TECHNOLOGY TO IMPROVE COORDINATION AND COMMUNICATION AMONG DECISION-MAKERS

DISTRIBUTED BIOSURVEILLANCE SYSTEMS USING SENSIBLE AGENT TECHNOLOGY TO IMPROVE COORDINATION AND COMMUNICATION AMONG DECISION-MAKERS DISTRIBUTED BIOSURVEILLANCE SYSTEMS USING SENSIBLE AGENT TECHNOLOGY TO IMPROVE COORDINATION AND COMMUNICATION AMONG DECISION-MAKERS K. Suzanne Barber, Karen Fullam, Thomas J. Graser, David C. Han, Joonoo

More information

RELYING ON TRUST TO FIND RELIABLE INFORMATION. Keywords Reputation; recommendation; trust; information retrieval; open distributed systems.

RELYING ON TRUST TO FIND RELIABLE INFORMATION. Keywords Reputation; recommendation; trust; information retrieval; open distributed systems. Abstract RELYING ON TRUST TO FIND RELIABLE INFORMATION Alfarez Abdul-Rahman and Stephen Hailes Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom E-mail:

More information

Artificial Intelligence Lecture 7

Artificial Intelligence Lecture 7 Artificial Intelligence Lecture 7 Lecture plan AI in general (ch. 1) Search based AI (ch. 4) search, games, planning, optimization Agents (ch. 8) applied AI techniques in robots, software agents,... Knowledge

More information

Position Paper: How Certain is Recommended Trust-Information?

Position Paper: How Certain is Recommended Trust-Information? Position Paper: How Certain is Recommended Trust-Information? Uwe Roth University of Luxembourg FSTC Campus Kirchberg 6, rue Richard Coudenhove-Kalergi L-1359 Luxembourg uwe.roth@uni.lu ABSTRACT Nowadays

More information

Discovering Identity Problems: A Case Study

Discovering Identity Problems: A Case Study Discovering Identity Problems: A Case Study G. Alan Wang 1, Homa Atabakhsh 1, Tim Petersen 2, Hsinchun Chen 1 1 Department of Management Information Systems, University of Arizona, Tucson, AZ 85721 {gang,

More information

Cognitive Maps-Based Student Model

Cognitive Maps-Based Student Model Cognitive Maps-Based Student Model Alejandro Peña 1,2,3, Humberto Sossa 3, Agustín Gutiérrez 3 WOLNM 1, UPIICSA 2 & CIC 3 - National Polytechnic Institute 2,3, Mexico 31 Julio 1859, # 1099-B, Leyes Reforma,

More information

Visual book review 1 Safe and Sound, AI in hazardous applications by John Fox and Subrata Das

Visual book review 1 Safe and Sound, AI in hazardous applications by John Fox and Subrata Das Visual book review 1 Safe and Sound, AI in hazardous applications by John Fox and Subrata Das Boris Kovalerchuk Dept. of Computer Science Central Washington University, Ellensburg, WA 98926-7520 borisk@cwu.edu

More information

A Cooperative Multiagent Architecture for Turkish Sign Tutors

A Cooperative Multiagent Architecture for Turkish Sign Tutors A Cooperative Multiagent Architecture for Turkish Sign Tutors İlker Yıldırım Department of Computer Engineering Boğaziçi University Bebek, 34342, Istanbul, Turkey ilker.yildirim@boun.edu.tr 1 Introduction

More information

Henry Hexmoor. 2. Types of Autonomy. 1. Introduction. Abstract

Henry Hexmoor. 2. Types of Autonomy. 1. Introduction. Abstract From: AAAI Technical Report WS-02-03. Compilation copyright 2002, AAAI (www.aaai.org). All rights reserved. Absolute Model of Autonomy and Power: Toward Group Effects Henry Hexmoor Computer Science & Computer

More information

Agents and Environments

Agents and Environments Agents and Environments Berlin Chen 2004 Reference: 1. S. Russell and P. Norvig. Artificial Intelligence: A Modern Approach. Chapter 2 AI 2004 Berlin Chen 1 What is an Agent An agent interacts with its

More information

Unifying Data-Directed and Goal-Directed Control: An Example and Experiments

Unifying Data-Directed and Goal-Directed Control: An Example and Experiments Unifying Data-Directed and Goal-Directed Control: An Example and Experiments Daniel D. Corkill, Victor R. Lesser, and Eva Hudlická Department of Computer and Information Science University of Massachusetts

More information

Strength calculation of rewards

Strength calculation of rewards Strength calculation of rewards Mariela Morveli-Espinoza, Ayslan T. Possebom and Cesar A. Tacla CPGEI - Federal University of Technology - Paraná, Brazil {morveli.espinoza, possebom, cesar.tacla}@gmail.com

More information

Programming with Goals (3)

Programming with Goals (3) Programming with Goals (3) M. Birna van Riemsdijk, TU Delft, The Netherlands GOAL slides adapted from MAS course slides by Hindriks 4/24/11 Delft University of Technology Challenge the future Outline GOAL:

More information

A Unified View of Consequence Relation, Belief Revision and Conditional Logic

A Unified View of Consequence Relation, Belief Revision and Conditional Logic A Unified View of Consequence Relation, Belief Revision and Conditional Logic Hirofumi Katsuno NTT Basic Research Laboratories Musashinoshi, Tokyo 180 Japan katsuno(dntt-20.ntt. jp Ken Satoh ICOT Research

More information

Improving the Accuracy of Neuro-Symbolic Rules with Case-Based Reasoning

Improving the Accuracy of Neuro-Symbolic Rules with Case-Based Reasoning Improving the Accuracy of Neuro-Symbolic Rules with Case-Based Reasoning Jim Prentzas 1, Ioannis Hatzilygeroudis 2 and Othon Michail 2 Abstract. In this paper, we present an improved approach integrating

More information

Autonomous Mobile Robotics

Autonomous Mobile Robotics 1 2 3 A reflex arc is a neural pathway that controls a reflex. In vertebrates, most sensory neurons do not pass directly into the brain, but synapse in the spinal cord. This allows for faster reflex actions

More information

On Trust. Massimo Felici. Massimo Felici On Trust c

On Trust. Massimo Felici. Massimo Felici On Trust c On Trust Massimo Felici Outline 1 What is Trust? Trust matters Trust problems Seeking an Experimental Trust Framework Trust and Dependability Directions for future work What is Trust? 2 Constructive Trust

More information

Agents. Environments Multi-agent systems. January 18th, Agents

Agents. Environments Multi-agent systems. January 18th, Agents Plan for the 2nd hour What is an agent? EDA132: Applied Artificial Intelligence (Chapter 2 of AIMA) PEAS (Performance measure, Environment, Actuators, Sensors) Agent architectures. Jacek Malec Dept. of

More information

Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks

Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks Okan Turkes, Hans Scholten, and Paul Havinga Dept. of Computer Engineering, Pervasive Systems University of

More information

Knowledge Based Systems

Knowledge Based Systems Knowledge Based Systems Human Expert A human expert is a specialist for a specific differentiated application field who creates solutions to customer problems in this respective field and supports them

More information

Experience based reasoning for recognising fraud and deception

Experience based reasoning for recognising fraud and deception University of Wollongong Research Online Faculty of Commerce - Papers (Archive) Faculty of Business 2004 Experience based reasoning for recognising fraud and deception Zhaohao Sun University of Wollongong,

More information

Towards Motivation-based Plan Evaluation

Towards Motivation-based Plan Evaluation Towards Motivation-based Plan Evaluation Alexandra M. Coddington Department of Computer Science, University of Durham, Durham, DH1 3LE, U.K. A.M.Coddington@durham.ac.uk Michael Luck Department of Electronics

More information

Dynamic Rule-based Agent

Dynamic Rule-based Agent International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 11, Number 4 (2018), pp. 605-613 International Research Publication House http://www.irphouse.com Dynamic Rule-based

More information

LECTURE 5: REACTIVE AND HYBRID ARCHITECTURES

LECTURE 5: REACTIVE AND HYBRID ARCHITECTURES Reactive Architectures LECTURE 5: REACTIVE AND HYBRID ARCHITECTURES An Introduction to MultiAgent Systems http://www.csc.liv.ac.uk/~mjw/pubs/imas There are many unsolved (some would say insoluble) problems

More information

COMP329 Robotics and Autonomous Systems Lecture 15: Agents and Intentions. Dr Terry R. Payne Department of Computer Science

COMP329 Robotics and Autonomous Systems Lecture 15: Agents and Intentions. Dr Terry R. Payne Department of Computer Science COMP329 Robotics and Autonomous Systems Lecture 15: Agents and Intentions Dr Terry R. Payne Department of Computer Science General control architecture Localisation Environment Model Local Map Position

More information

Evaluation of Linguistic Labels Used in Applications

Evaluation of Linguistic Labels Used in Applications Evaluation of Linguistic Labels Used in Applications Hanan Hibshi March 2016 CMU-ISR-16-104 Travis Breaux Institute for Software Research School of Computer Science Carnegie Mellon University Pittsburgh,

More information

ERA: Architectures for Inference

ERA: Architectures for Inference ERA: Architectures for Inference Dan Hammerstrom Electrical And Computer Engineering 7/28/09 1 Intelligent Computing In spite of the transistor bounty of Moore s law, there is a large class of problems

More information

CS148 - Building Intelligent Robots Lecture 5: Autonomus Control Architectures. Instructor: Chad Jenkins (cjenkins)

CS148 - Building Intelligent Robots Lecture 5: Autonomus Control Architectures. Instructor: Chad Jenkins (cjenkins) Lecture 5 Control Architectures Slide 1 CS148 - Building Intelligent Robots Lecture 5: Autonomus Control Architectures Instructor: Chad Jenkins (cjenkins) Lecture 5 Control Architectures Slide 2 Administrivia

More information

Decisions and Dependence in Influence Diagrams

Decisions and Dependence in Influence Diagrams JMLR: Workshop and Conference Proceedings vol 52, 462-473, 2016 PGM 2016 Decisions and Dependence in Influence Diagrams Ross D. hachter Department of Management cience and Engineering tanford University

More information

Learning Deterministic Causal Networks from Observational Data

Learning Deterministic Causal Networks from Observational Data Carnegie Mellon University Research Showcase @ CMU Department of Psychology Dietrich College of Humanities and Social Sciences 8-22 Learning Deterministic Causal Networks from Observational Data Ben Deverett

More information

1 What is an Agent? CHAPTER 2: INTELLIGENT AGENTS

1 What is an Agent? CHAPTER 2: INTELLIGENT AGENTS 1 What is an Agent? CHAPTER 2: INTELLIGENT AGENTS http://www.csc.liv.ac.uk/ mjw/pubs/imas/ The main point about agents is they are autonomous: capable of acting independently, exhibiting control over their

More information

Introduction to Artificial Intelligence 2 nd semester 2016/2017. Chapter 2: Intelligent Agents

Introduction to Artificial Intelligence 2 nd semester 2016/2017. Chapter 2: Intelligent Agents Introduction to Artificial Intelligence 2 nd semester 2016/2017 Chapter 2: Intelligent Agents Mohamed B. Abubaker Palestine Technical College Deir El-Balah 1 Agents and Environments An agent is anything

More information

Lecture 9: The Agent Form of Bayesian Games

Lecture 9: The Agent Form of Bayesian Games Microeconomics I: Game Theory Lecture 9: The Agent Form of Bayesian Games (see Osborne, 2009, Sect 9.2.2) Dr. Michael Trost Department of Applied Microeconomics December 20, 2013 Dr. Michael Trost Microeconomics

More information

Fuzzy Decision Analysis in Negotiation between the System of Systems Agent and the System Agent in an Agent-Based Model

Fuzzy Decision Analysis in Negotiation between the System of Systems Agent and the System Agent in an Agent-Based Model Fuzzy Decision Analysis in Negotiation between the System of Systems Agent and the System Agent in an Agent-Based Model Paulette Acheson, Cihan Dagli Engineering Management & Systems Engineering Department

More information

What Case Study means? Case Studies. Case Study in SE. Key Characteristics. Flexibility of Case Studies. Sources of Evidence

What Case Study means? Case Studies. Case Study in SE. Key Characteristics. Flexibility of Case Studies. Sources of Evidence DCC / ICEx / UFMG What Case Study means? Case Studies Eduardo Figueiredo http://www.dcc.ufmg.br/~figueiredo The term case study frequently appears in title and abstracts of papers Its meaning varies a

More information

A Scoring Policy for Simulated Soccer Agents Using Reinforcement Learning

A Scoring Policy for Simulated Soccer Agents Using Reinforcement Learning A Scoring Policy for Simulated Soccer Agents Using Reinforcement Learning Azam Rabiee Computer Science and Engineering Isfahan University, Isfahan, Iran azamrabiei@yahoo.com Nasser Ghasem-Aghaee Computer

More information

Design of the Autonomous Intelligent Simulation Model(AISM) using Computer Generated Force

Design of the Autonomous Intelligent Simulation Model(AISM) using Computer Generated Force Design of the Autonomous Intelligent Simulation Model(AISM) using Computer Generated Force SeongKee Lee, ChanGon Yoo, JungChan Park, JaeHyun Park, MyongGu Kang Directorate of Software Weapon Agency for

More information

PO Box 19015, Arlington, TX {ramirez, 5323 Harry Hines Boulevard, Dallas, TX

PO Box 19015, Arlington, TX {ramirez, 5323 Harry Hines Boulevard, Dallas, TX From: Proceedings of the Eleventh International FLAIRS Conference. Copyright 1998, AAAI (www.aaai.org). All rights reserved. A Sequence Building Approach to Pattern Discovery in Medical Data Jorge C. G.

More information

A Comparison of Collaborative Filtering Methods for Medication Reconciliation

A Comparison of Collaborative Filtering Methods for Medication Reconciliation A Comparison of Collaborative Filtering Methods for Medication Reconciliation Huanian Zheng, Rema Padman, Daniel B. Neill The H. John Heinz III College, Carnegie Mellon University, Pittsburgh, PA, 15213,

More information

Motivations and Goal-Directed Autonomy

Motivations and Goal-Directed Autonomy Motivations and Goal-Directed Autonomy Felipe Meneguzzi Robotics Institute Carnegie Mellon University 5000 Forbes Ave. Pittsburgh, Pennsylvania 15213 meneguzzi@cmu.edu Abstract As we move towards a richer

More information

MAC Sleep Mode Control Considering Downlink Traffic Pattern and Mobility

MAC Sleep Mode Control Considering Downlink Traffic Pattern and Mobility 1 MAC Sleep Mode Control Considering Downlink Traffic Pattern and Mobility Neung-Hyung Lee and Saewoong Bahk School of Electrical Engineering & Computer Science, Seoul National University, Seoul Korea

More information

Evolutionary Programming

Evolutionary Programming Evolutionary Programming Searching Problem Spaces William Power April 24, 2016 1 Evolutionary Programming Can we solve problems by mi:micing the evolutionary process? Evolutionary programming is a methodology

More information

Agent-Based Systems. Agent-Based Systems. Michael Rovatsos. Lecture 5 Reactive and Hybrid Agent Architectures 1 / 19

Agent-Based Systems. Agent-Based Systems. Michael Rovatsos. Lecture 5 Reactive and Hybrid Agent Architectures 1 / 19 Agent-Based Systems Michael Rovatsos mrovatso@inf.ed.ac.uk Lecture 5 Reactive and Hybrid Agent Architectures 1 / 19 Where are we? Last time... Practical reasoning agents The BDI architecture Intentions

More information

The 29th Fuzzy System Symposium (Osaka, September 9-, 3) Color Feature Maps (BY, RG) Color Saliency Map Input Image (I) Linear Filtering and Gaussian

The 29th Fuzzy System Symposium (Osaka, September 9-, 3) Color Feature Maps (BY, RG) Color Saliency Map Input Image (I) Linear Filtering and Gaussian The 29th Fuzzy System Symposium (Osaka, September 9-, 3) A Fuzzy Inference Method Based on Saliency Map for Prediction Mao Wang, Yoichiro Maeda 2, Yasutake Takahashi Graduate School of Engineering, University

More information

Bimodal Multicast. Harald Gjermundrød CptS/EE 562 February 10, 2004

Bimodal Multicast. Harald Gjermundrød CptS/EE 562 February 10, 2004 1 Bimodal Multicast Harald Gjermundrød CptS/EE 562 February 10, 2004 Bimodal Multicast 2 Bimodal Attack General commands soldiers Consensus is impossible! If almost all attack victory is certain If very

More information

ICS 606. Intelligent Autonomous Agents 1. Intelligent Autonomous Agents ICS 606 / EE 606 Fall Reactive Architectures

ICS 606. Intelligent Autonomous Agents 1. Intelligent Autonomous Agents ICS 606 / EE 606 Fall Reactive Architectures Intelligent Autonomous Agents ICS 606 / EE 606 Fall 2011 Nancy E. Reed nreed@hawaii.edu 1 Lecture #5 Reactive and Hybrid Agents Reactive Architectures Brooks and behaviors The subsumption architecture

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction 1.1 Motivation and Goals The increasing availability and decreasing cost of high-throughput (HT) technologies coupled with the availability of computational tools and data form a

More information

Module 1. Introduction. Version 1 CSE IIT, Kharagpur

Module 1. Introduction. Version 1 CSE IIT, Kharagpur Module 1 Introduction Lesson 2 Introduction to Agent 1.3.1 Introduction to Agents An agent acts in an environment. Percepts Agent Environment Actions An agent perceives its environment through sensors.

More information

Can Bayesian models have normative pull on human reasoners?

Can Bayesian models have normative pull on human reasoners? Can Bayesian models have normative pull on human reasoners? Frank Zenker 1,2,3 1 Lund University, Department of Philosophy & Cognitive Science, LUX, Box 192, 22100 Lund, Sweden 2 Universität Konstanz,

More information

Competition Between Objective and Novelty Search on a Deceptive Task

Competition Between Objective and Novelty Search on a Deceptive Task Competition Between Objective and Novelty Search on a Deceptive Task Billy Evers and Michael Rubayo Abstract It has been proposed, and is now widely accepted within use of genetic algorithms that a directly

More information

Design the Flexibility, Maintain the Stability of Conceptual Schemas

Design the Flexibility, Maintain the Stability of Conceptual Schemas Design the Flexibility, Maintain the Stability of Conceptual Schemas Lex Wedemeijer 1 ABP Netherlands, Department of Information Management, P.O.Box 4476, NL-6401 CZ, Heerlen, The Netherlands L.Wedemeijer@ABP.NL

More information

Review Statistics review 2: Samples and populations Elise Whitley* and Jonathan Ball

Review Statistics review 2: Samples and populations Elise Whitley* and Jonathan Ball Available online http://ccforum.com/content/6/2/143 Review Statistics review 2: Samples and populations Elise Whitley* and Jonathan Ball *Lecturer in Medical Statistics, University of Bristol, UK Lecturer

More information

System of Systems Operational Availability Modeling

System of Systems Operational Availability Modeling System of Systems Operational Availability Modeling NDIA SE Conference San Diego, CA October 22 25, 2012 Dennis J. Anderson* Tamara J. Brown Charles M. Carter Sandia National Laboratories Albuquerque,

More information

Princess Nora University Faculty of Computer & Information Systems ARTIFICIAL INTELLIGENCE (CS 370D) Computer Science Department

Princess Nora University Faculty of Computer & Information Systems ARTIFICIAL INTELLIGENCE (CS 370D) Computer Science Department Princess Nora University Faculty of Computer & Information Systems 1 ARTIFICIAL INTELLIGENCE (CS 370D) Computer Science Department (CHAPTER-3) INTELLIGENT AGENTS (Course coordinator) CHAPTER OUTLINE What

More information

AN ADVANCED COMPUTATIONAL APPROACH TO ACKNOWLEDGED SYSTEM OF SYSTEMS ANALYSIS & ARCHITECTING USING AGENT BASED BEHAVIORAL MODELING

AN ADVANCED COMPUTATIONAL APPROACH TO ACKNOWLEDGED SYSTEM OF SYSTEMS ANALYSIS & ARCHITECTING USING AGENT BASED BEHAVIORAL MODELING AN ADVANCED COMPUTATIONAL APPROACH TO ACKNOWLEDGED SYSTEM OF SYSTEMS ANALYSIS & ARCHITECTING USING AGENT BASED BEHAVIORAL MODELING Paulette Acheson pbatk5@mail.mst.edu Cihan H. Dagli Steven Corns Nil Kilicay-Ergin

More information

Probability-Based Protein Identification for Post-Translational Modifications and Amino Acid Variants Using Peptide Mass Fingerprint Data

Probability-Based Protein Identification for Post-Translational Modifications and Amino Acid Variants Using Peptide Mass Fingerprint Data Probability-Based Protein Identification for Post-Translational Modifications and Amino Acid Variants Using Peptide Mass Fingerprint Data Tong WW, McComb ME, Perlman DH, Huang H, O Connor PB, Costello

More information

Spatial Cognition for Mobile Robots: A Hierarchical Probabilistic Concept- Oriented Representation of Space

Spatial Cognition for Mobile Robots: A Hierarchical Probabilistic Concept- Oriented Representation of Space Spatial Cognition for Mobile Robots: A Hierarchical Probabilistic Concept- Oriented Representation of Space Shrihari Vasudevan Advisor: Prof. Dr. Roland Siegwart Autonomous Systems Lab, ETH Zurich, Switzerland.

More information

Agents with Attitude: Exploring Coombs Unfolding Technique with Agent-Based Models

Agents with Attitude: Exploring Coombs Unfolding Technique with Agent-Based Models Int J Comput Math Learning (2009) 14:51 60 DOI 10.1007/s10758-008-9142-6 COMPUTER MATH SNAPHSHOTS - COLUMN EDITOR: URI WILENSKY* Agents with Attitude: Exploring Coombs Unfolding Technique with Agent-Based

More information

AGENT-BASED SYSTEMS. What is an agent? ROBOTICS AND AUTONOMOUS SYSTEMS. Today. that environment in order to meet its delegated objectives.

AGENT-BASED SYSTEMS. What is an agent? ROBOTICS AND AUTONOMOUS SYSTEMS. Today. that environment in order to meet its delegated objectives. ROBOTICS AND AUTONOMOUS SYSTEMS Simon Parsons Department of Computer Science University of Liverpool LECTURE 16 comp329-2013-parsons-lect16 2/44 Today We will start on the second part of the course Autonomous

More information

Fuzzy Expert System Design for Medical Diagnosis

Fuzzy Expert System Design for Medical Diagnosis Second International Conference Modelling and Development of Intelligent Systems Sibiu - Romania, September 29 - October 02, 2011 Man Diana Ofelia Abstract In recent years, the methods of artificial intelligence

More information

A Cognitive Model of Situated Autonomy

A Cognitive Model of Situated Autonomy A Cognitive Model of Situated Autonomy Henry Hexmoor Computer Science & Computer Engineering Department Engineering Hall, Room 313 Fayetteville, AR 72701 hexmoor@uark.edu Abstract. We introduce situated

More information

Artificial Intelligence. Intelligent Agents

Artificial Intelligence. Intelligent Agents Artificial Intelligence Intelligent Agents Agent Agent is anything that perceives its environment through sensors and acts upon that environment through effectors. Another definition later (Minsky) Humans

More information

Using Probabilistic Methods to Optimize Data Entry in Accrual of Patients to Clinical Trials

Using Probabilistic Methods to Optimize Data Entry in Accrual of Patients to Clinical Trials Using Probabilistic Methods to Optimize Data Entry in Accrual of Patients to Clinical Trials Bhavesh D. Goswami, Lawrence O. Hall, Dmitry B. Goldgof, Eugene Fink, and Jeffrey P. Krischer bgoswami@csee.usf.edu,

More information

Towards Learning to Ignore Irrelevant State Variables

Towards Learning to Ignore Irrelevant State Variables Towards Learning to Ignore Irrelevant State Variables Nicholas K. Jong and Peter Stone Department of Computer Sciences University of Texas at Austin Austin, Texas 78712 {nkj,pstone}@cs.utexas.edu Abstract

More information

An Interactive Modeling Environment for Systems Biology of Aging

An Interactive Modeling Environment for Systems Biology of Aging An Interactive Modeling Environment for Systems Biology of Aging Pat Langley Computer Science and Engineering Arizona State University Tempe, Arizona Thanks to D. Bidaye, J. Difzac, J. Furber, S. Kim,

More information

Self-Corrective Autonomous Systems using Optimization Processes for Detection and Correction of Unexpected Error Conditions

Self-Corrective Autonomous Systems using Optimization Processes for Detection and Correction of Unexpected Error Conditions International Journal of Robotics and Automation (IJRA) Vol. 5, No. 4, December 2016, pp. 262~276 ISSN: 2089-4856 262 Self-Corrective Autonomous Systems using Optimization Processes for Detection and Correction

More information

Inferencing in Artificial Intelligence and Computational Linguistics

Inferencing in Artificial Intelligence and Computational Linguistics Inferencing in Artificial Intelligence and Computational Linguistics (http://www.dfki.de/~horacek/infer-ai-cl.html) no classes on 28.5., 18.6., 25.6. 2-3 extra lectures will be scheduled Helmut Horacek

More information

Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS)

Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS) Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS) Niriaska Perozo 1, Jose Aguilar 2, and Oswaldo Terán 3 1 Unidad de Investigación en Inteligencia Artificial, UCLA, Barquisimeto

More information

Learning Utility for Behavior Acquisition and Intention Inference of Other Agent

Learning Utility for Behavior Acquisition and Intention Inference of Other Agent Learning Utility for Behavior Acquisition and Intention Inference of Other Agent Yasutake Takahashi, Teruyasu Kawamata, and Minoru Asada* Dept. of Adaptive Machine Systems, Graduate School of Engineering,

More information

An Edge-Device for Accurate Seizure Detection in the IoT

An Edge-Device for Accurate Seizure Detection in the IoT An Edge-Device for Accurate Seizure Detection in the IoT M. A. Sayeed 1, S. P. Mohanty 2, E. Kougianos 3, and H. Zaveri 4 University of North Texas, Denton, TX, USA. 1,2,3 Yale University, New Haven, CT,

More information

Stepwise Knowledge Acquisition in a Fuzzy Knowledge Representation Framework

Stepwise Knowledge Acquisition in a Fuzzy Knowledge Representation Framework Stepwise Knowledge Acquisition in a Fuzzy Knowledge Representation Framework Thomas E. Rothenfluh 1, Karl Bögl 2, and Klaus-Peter Adlassnig 2 1 Department of Psychology University of Zurich, Zürichbergstraße

More information

Fuzzy Decision Tree FID

Fuzzy Decision Tree FID Fuzzy Decision Tree FID Cezary Z. Janikow Krzysztof Kawa Math & Computer Science Department Math & Computer Science Department University of Missouri St. Louis University of Missouri St. Louis St. Louis,

More information

reward based power have ability to give you what you want. coercive have power to punish

reward based power have ability to give you what you want. coercive have power to punish Chapter 7 Finding and Using Negotiation Power Why Power Important to Negotiators? Seeking power in negotiations from 1 of 2 perceptions: 1. Negotiator believes he has less power than other party 2. Negotiator

More information

On the Representation of Nonmonotonic Relations in the Theory of Evidence

On the Representation of Nonmonotonic Relations in the Theory of Evidence On the Representation of Nonmonotonic Relations in the Theory of Evidence Ronald R. Yager Machine Intelligence Institute Iona College New Rochelle, NY 10801 Abstract A Dempster-Shafer belief structure

More information

NEGOTIATION SEVENTH EDITION

NEGOTIATION SEVENTH EDITION NEGOTIATION SEVENTH EDITION ROY J. LEWICKI DAVID M. SAUNDERS BRUCE BARRY 2015 by McGraw Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution

More information

PART - A 1. Define Artificial Intelligence formulated by Haugeland. The exciting new effort to make computers think machines with minds in the full and literal sense. 2. Define Artificial Intelligence

More information

Modeling Terrorist Beliefs and Motivations

Modeling Terrorist Beliefs and Motivations CREATE Research Archive Research Project Summaries 2010 Modeling Terrorist Beliefs and Motivations Richard John University of Southern California, richardj@usc.edu Heather Rosoff University of Southern

More information

Some Connectivity Concepts in Bipolar Fuzzy Graphs

Some Connectivity Concepts in Bipolar Fuzzy Graphs Annals of Pure and Applied Mathematics Vol. 7, No. 2, 2014, 98-108 ISSN: 2279-087X (P), 2279-0888(online) Published on 30 September 2014 www.researchmathsci.org Annals of Some Connectivity Concepts in

More information

Suppliers' Information Note. Next Generation Text Service also called Text Relay. Service Description

Suppliers' Information Note. Next Generation Text Service also called Text Relay. Service Description SIN 359 Issue 1.5 June 2016 Suppliers' Information Note For The BT Network Next Generation Text Service also called Text Relay Service Description Each SIN is the copyright of British Telecommunications

More information

Handling Partial Preferences in the Belief AHP Method: Application to Life Cycle Assessment

Handling Partial Preferences in the Belief AHP Method: Application to Life Cycle Assessment Handling Partial Preferences in the Belief AHP Method: Application to Life Cycle Assessment Amel Ennaceur 1, Zied Elouedi 1, and Eric Lefevre 2 1 University of Tunis, Institut Supérieur de Gestion de Tunis,

More information

PLANNING THE RESEARCH PROJECT

PLANNING THE RESEARCH PROJECT Van Der Velde / Guide to Business Research Methods First Proof 6.11.2003 4:53pm page 1 Part I PLANNING THE RESEARCH PROJECT Van Der Velde / Guide to Business Research Methods First Proof 6.11.2003 4:53pm

More information

Mike Davies Director, Neuromorphic Computing Lab Intel Labs

Mike Davies Director, Neuromorphic Computing Lab Intel Labs Mike Davies Director, Neuromorphic Computing Lab Intel Labs Loihi at a Glance Key Properties Integrated Memory + Compute Neuromorphic Architecture 128 neuromorphic cores supporting up to 128k neurons and

More information

Observations on the Use of Ontologies for Autonomous Vehicle Navigation Planning

Observations on the Use of Ontologies for Autonomous Vehicle Navigation Planning Observations on the Use of Ontologies for Autonomous Vehicle Navigation Planning Ron Provine, Mike Uschold, Scott Smith Boeing Phantom Works Stephen Balakirsky, Craig Schlenoff Nat. Inst. of Standards

More information

An architecture description method for Acknowledged System of Systems based on Federated Architecture

An architecture description method for Acknowledged System of Systems based on Federated Architecture An architecture description method for Acknowledged System of Systems based on Federated Architecture Jae-Hong Ahn 1, Yeunseung Ryu 2 and Doo-Kwon Baik 3 1 Agency for Defense Development, Korea koreaseman@daum.net

More information

L930 IEMC: Yolo Operational Area Exercise

L930 IEMC: Yolo Operational Area Exercise L930 IEMC: Yolo Operational Area Exercise 05/18/2017 The gives elected and appointed officials, observers, media personnel, and players from participating organizations information they need to observe

More information

Profile-cast: Behavior-Aware Mobile Networking

Profile-cast: Behavior-Aware Mobile Networking Profile-cast: Behavior-Aware Mobile etworking Wei-jen Hsu, Dept. of CISE, U of Florida Debojyoti Dutta, Cisco Sytems, Inc. Ahmed Helmy, Dept. of CISE, U of Florida 6/10/2008 Presentation for WCC, 2008

More information

A Decision-Theoretic Approach to Evaluating Posterior Probabilities of Mental Models

A Decision-Theoretic Approach to Evaluating Posterior Probabilities of Mental Models A Decision-Theoretic Approach to Evaluating Posterior Probabilities of Mental Models Jonathan Y. Ito and David V. Pynadath and Stacy C. Marsella Information Sciences Institute, University of Southern California

More information

Designing a Web Page Considering the Interaction Characteristics of the Hard-of-Hearing

Designing a Web Page Considering the Interaction Characteristics of the Hard-of-Hearing Designing a Web Page Considering the Interaction Characteristics of the Hard-of-Hearing Miki Namatame 1,TomoyukiNishioka 1, and Muneo Kitajima 2 1 Tsukuba University of Technology, 4-3-15 Amakubo Tsukuba

More information

Intelligent Autonomous Agents. Ralf Möller, Rainer Marrone Hamburg University of Technology

Intelligent Autonomous Agents. Ralf Möller, Rainer Marrone Hamburg University of Technology Intelligent Autonomous Agents Ralf Möller, Rainer Marrone Hamburg University of Technology Lab class Tutor: Rainer Marrone Time: Monday 12:15-13:00 Locaton: SBS93 A0.13.1/2 w Starting in Week 3 Literature

More information

Web-Mining Agents Cooperating Agents for Information Retrieval

Web-Mining Agents Cooperating Agents for Information Retrieval Web-Mining Agents Cooperating Agents for Information Retrieval Prof. Dr. Ralf Möller Universität zu Lübeck Institut für Informationssysteme Karsten Martiny (Übungen) Literature Chapters 2, 6, 13, 15-17

More information

LEAF Marque Assurance Programme

LEAF Marque Assurance Programme Invisible ISEAL Code It is important that the integrity of the LEAF Marque Standard is upheld therefore the LEAF Marque Standards System has an Assurance Programme to ensure this. This document outlines

More information

Applying Appraisal Theories to Goal Directed Autonomy

Applying Appraisal Theories to Goal Directed Autonomy Applying Appraisal Theories to Goal Directed Autonomy Robert P. Marinier III, Michael van Lent, Randolph M. Jones Soar Technology, Inc. 3600 Green Court, Suite 600, Ann Arbor, MI 48105 {bob.marinier,vanlent,rjones}@soartech.com

More information

Evolutionary Approach to Investigations of Cognitive Systems

Evolutionary Approach to Investigations of Cognitive Systems Evolutionary Approach to Investigations of Cognitive Systems Vladimir RED KO a,1 b and Anton KOVAL a Scientific Research Institute for System Analysis, Russian Academy of Science, Russia b National Nuclear

More information

Representation Theorems for Multiple Belief Changes

Representation Theorems for Multiple Belief Changes Representation Theorems for Multiple Belief Changes Dongmo Zhang 1,2 Shifu Chen 1 Wujia Zhu 1,2 Zhaoqian Chen 1 1 State Key Lab. for Novel Software Technology Department of Computer Science and Technology

More information

Psychology 205, Revelle, Fall 2014 Research Methods in Psychology Mid-Term. Name:

Psychology 205, Revelle, Fall 2014 Research Methods in Psychology Mid-Term. Name: Name: 1. (2 points) What is the primary advantage of using the median instead of the mean as a measure of central tendency? It is less affected by outliers. 2. (2 points) Why is counterbalancing important

More information

Research Article An Improved Approach for Reduction of Defect Density Using Optimal Module Sizes

Research Article An Improved Approach for Reduction of Defect Density Using Optimal Module Sizes So ware Engineering, Article ID 803530, 7 pages http://dx.doi.org/10.1155/2014/803530 Research Article An Improved Approach for Reduction of Defect Density Using Optimal Module Sizes Dinesh Verma and Shishir

More information

Chapter 2: Intelligent Agents

Chapter 2: Intelligent Agents Chapter 2: Intelligent Agents Outline Last class, introduced AI and rational agent Today s class, focus on intelligent agents Agent and environments Nature of environments influences agent design Basic

More information

Systems Engineering Guide for Systems of Systems. Essentials. December 2010

Systems Engineering Guide for Systems of Systems. Essentials. December 2010 DEPARTMENT OF DEFENSE Systems Engineering Guide for Systems of Systems Essentials December 2010 Director of Systems Engineering Office of the Director, Defense Research and Engineering Washington, D.C.

More information

Trust in E-Commerce Vendors: A Two-Stage Model

Trust in E-Commerce Vendors: A Two-Stage Model Association for Information Systems AIS Electronic Library (AISeL) ICIS 2000 Proceedings International Conference on Information Systems (ICIS) December 2000 Trust in E-Commerce Vendors: A Two-Stage Model

More information

PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH

PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH PERCEIVED TRUSTWORTHINESS OF KNOWLEDGE SOURCES: THE MODERATING IMPACT OF RELATIONSHIP LENGTH DANIEL Z. LEVIN Management and Global Business Dept. Rutgers Business School Newark and New Brunswick Rutgers

More information