WP7: Empirical Studies Presenters: Paolo Besana, Nardine Osman, Dave Robertson.

Slides:



Advertisements
Similar presentations
Group-awareness for Mobile Cooperative Learning
Advertisements

1 Verification by Model Checking. 2 Part 1 : Motivation.
Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie.
Complex Organizational System A Complex System Model for Organizations, Companies and Social Actions.
Operating System Security
MARCH 2012 Common Core State Standards for Mathematics: Implications for Grades K-12.
Week 11 Review: Statistical Model A statistical model for some data is a set of distributions, one of which corresponds to the true unknown distribution.
Kapsalakis Giorgos - AM: 1959 HY459 - Internet Measurements Fall 2010.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
OASIS Reference Model for Service Oriented Architecture 1.0
Effective Coordination of Multiple Intelligent Agents for Command and Control The Robotics Institute Carnegie Mellon University PI: Katia Sycara
1. Introduction Consistency of learning processes To explain when a learning machine that minimizes empirical risk can achieve a small value of actual.
1 CODE TESTING Principles and Alternatives. 2 Testing - Basics goal - find errors –focus is the source code (executable system) –test team wants to achieve.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
ECE Synthesis & Verification1 ECE 667 Spring 2011 Synthesis and Verification of Digital Systems Verification Introduction.
1 A Framework for Measurement Valérie Paulus, Miguel Lopez, Gregory Seront, Simon Alexandre.
Evaluating Hypotheses
Security in Databases. 2 Srini & Nandita (CSE2500)DB Security Outline review of databases reliability & integrity protection of sensitive data protection.
Stochastic greedy local search Chapter 7 ICS-275 Spring 2007.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
7-2 Estimating a Population Proportion
© 2013 Pearson Education, Inc. Active Learning Lecture Slides For use with Classroom Response Systems Introductory Statistics: Exploring the World through.
Handouts Software Testing and Quality Assurance Theory and Practice Chapter 9 Functional Testing
Business Communication Research Class 1 : What is Research? Leena Louhiala-Salminen, Spring 2013.
The chapter will address the following questions:
Fundamentals of Python: First Programs
Reasoning with context in the Semantic Web … or contextualizing ontologies Fausto Giunchiglia July 23, 2004.
Database Design - Lecture 1
Ontology Development Kenneth Baclawski Northeastern University Harvard Medical School.
Particle Filtering in Network Tomography
Boolean Algebra – the ‘Lingua Franca’ of the Digital World The goal of developing an automata is based on the following (loosely described) ‘ideal’: if.
 1  Outline  stages and topics in simulation  generation of random variates.
RMTD 404 Lecture 8. 2 Power Recall what you learned about statistical errors in Chapter 4: Type I Error: Finding a difference when there is no true difference.
Copyright © 2010, 2007, 2004 Pearson Education, Inc. Section 9-2 Inferences About Two Proportions.
Evaluation of software engineering. Software engineering research : Research in SE aims to achieve two main goals: 1) To increase the knowledge about.
Section Copyright © 2014, 2012, 2010 Pearson Education, Inc. Lecture Slides Elementary Statistics Twelfth Edition and the Triola Statistics Series.
Chapter 7 Estimates and Sample Sizes
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
1 ECE-517 Reinforcement Learning in Artificial Intelligence Lecture 7: Finite Horizon MDPs, Dynamic Programming Dr. Itamar Arel College of Engineering.
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
Strategyproof Auctions For Balancing Social Welfare and Fairness in Secondary Spectrum Markets Ajay Gopinathan, Zongpeng Li University of Calgary Chuan.
Locating Mobile Agents in Distributed Computing Environment.
Interaction Laws Verification Using Knowledge-based Reasoning Gustavo Carvalho, Anarosa Brandão, Rodrigo Paes & Carlos Lucena By Regiane Lima.
An Ontological Framework for Web Service Processes By Claus Pahl and Ronan Barrett.
Chapter 5 Parameter estimation. What is sample inference? Distinguish between managerial & financial accounting. Understand how managers can use accounting.
Sections 7-1 and 7-2 Review and Preview and Estimating a Population Proportion.
Copyright © 2010, 2007, 2004 Pearson Education, Inc. All Rights Reserved. Section 7-1 Review and Preview.
Christoph F. Eick University of Houston Organization 1. What are Ontologies? 2. What are they good for? 3. Ontologies and.
Chapter 4 Decision Support System & Artificial Intelligence.
Essential Statistics Chapter 91 Introducing Probability.
Chapter 10 Introducing Probability BPS - 5th Ed. Chapter 101.
5.1 Randomness  The Language of Probability  Thinking about Randomness  The Uses of Probability 1.
Distributed systems Consensus Prof R. Guerraoui Distributed Programming Laboratory.
Towards a Reference Quality Model for Digital Libraries Maristella Agosti Nicola Ferro Edward A. Fox Marcos André Gonçalves Bárbara Lagoeiro Moreira.
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
OPERATING SYSTEMS CS 3530 Summer 2014 Systems and Models Chapter 03.
272: Software Engineering Fall 2012 Instructor: Tevfik Bultan Lecture 9: Test Generation from Models.
Chapter 7 Estimates and Sample Sizes 7-1 Overview 7-2 Estimating a Population Proportion 7-3 Estimating a Population Mean: σ Known 7-4 Estimating a Population.
A Brief Maximum Entropy Tutorial Presenter: Davidson Date: 2009/02/04 Original Author: Adam Berger, 1996/07/05
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
Generalized Point Based Value Iteration for Interactive POMDPs Prashant Doshi Dept. of Computer Science and AI Institute University of Georgia
© 2013 Pearson Education, Inc. Reading Quiz For use with Classroom Response Systems Introductory Statistics: Exploring the World through Data, 1e by Gould.
Reverse Prediction. Earlier Work Johnson, J.A., P. Campeau. (2005) Reverse Prediction. The Tenth International Conference on Rough Sets, Fuzzy Sets, Data.
Round-Efficient Multi-Party Computation in Point-to-Point Networks Jonathan Katz Chiu-Yuen Koo University of Maryland.
WMO GRIB Edition 3 Enrico Fucile Inter-Program Expert Team on Data Representation Maintenance and Monitoring IPET-DRMM Geneva, 30 May – 3 June 2016.
Datamining : Refers to extracting or mining knowledge from large amounts of data Applications : Market Analysis Fraud Detection Customer Retention Production.
COT 5611 Operating Systems Design Principles Spring 2012
Lecture Slides Elementary Statistics Twelfth Edition
 .
COT 5611 Operating Systems Design Principles Spring 2014
Presentation transcript:

WP7: Empirical Studies Presenters: Paolo Besana, Nardine Osman, Dave Robertson

Outline of This Talk Introduce overall framework Identify four key areas: –Interaction availability –Consistency interaction-peer –Consistency peer-peer –Consistency with environment In each of these areas it is impossible to guarantee the general property we ideally would require, so the goal of analysis is to identify viable engineering compromises and explore how they scale.

Basic Conceptual Framework P M (P,R) P1P1 PnPn EPEP E P1 E Pn P = process name R = role of P M (P,R) = Interaction model for P in role R E P = environment of P

Simulation as Clause Rewriting

Ensuring Interactions are Available P M (P,R) P1P1 PnPn EPEP E P1 E Pn MPMP  R  R (P) → ◊(M (P,R)  M (P)  ( i (M (P,R) ) → ◊ a (M (P,R) ))) R (P) = Roles P wants to undertake M P = Interactions known to P {M (P,R), …} i (M (P,R) ) = M (P,R) is initiated a (M (P,R) ))) = M (P,R) is completed successfully

Specific Question Suppose that the same interaction patterns are being used repeatedly in overlapping peer groups. To what extent can basic statistical information about success/failure of interaction models solve matchmaking problems? See Deliverable 7.1 for discussion of this

Consistency Peer - Interaction Model P M (P,R) P1P1 PnPn EPEP E P1 E Pn K (P) K (M (P,R) )  A  K (P)  (B  K (M (P,R) )  ◊B  K (M (P,R) )) →  (A  B) K (X) = Knowledge derivable from X  (F) = F is consistent

Specific Question Each interaction model imposes temporal constraints Peers have deontic constraints What sorts of properties required by peers (e.g. trust properties) or by interaction modellers (e.g. fairness properties) can we test using this information alone.

Example In an auction, the auctioneer agent wants an interaction protocol that enforces truth telling on the bidders’ side. A =[bid(bidder,V)⇒win(bidder,P V )] ⋀ [bid(bidder,B)⇒win(bidder,P B ) ⋀ B≠V] ⋀ P B ≮P V where A∈K(P) We would like to verify: A∈K(P) ∧(B∈K(M(P,R))∨◊B∈K(M(P,R))) →σ(A∧B) M(P,R)

Verifying σ(A∧B) Verify M(P,R) satisfies A:  Is A satisfied at state 1?  If result is achieved, then terminate  else, go to next state(s) and repeat M(P,R) … …

Property Checking Framework interaction state-space temporal properties deontic constraints Model Checker XSB system Table Prolog engine Temporal Proof Rules LCC Transition Rules

satisfies(E,tt)  true satisfies(E,Φ 1 ⋀ Φ 2 )  satisfies(E,Φ 1 ) ⋀ satisfies(E,Φ 2 ) satisfies(E,Φ 1 ⋁ Φ 2 )  satisfies(E,Φ 1 ) ⋁ satisfies(E,Φ 2 ) satisfies(E, Φ)  ∃ F. trans(E,A,F) ⋀ satisfies(F,Φ) satisfies(E,[A]Φ)  ∀ F. trans(E,A,F) ⋀ satisfies(F,Φ) satisfies(E,μZ.Φ)  satisfies(E,Φ) satisfies(E,νZ.Φ)  dual(Φ,Φ’) ⋀ ¬satisfies(E,Φ’) Temporal Proof Rules

trans(E :: D,A,F)  trans(D,A,F) trans(E 1 or E 2,A,F)  trans(E 1,A,F) ⋁ trans(E 2,A,F) trans(E 1 then E 2,A,E 2 )  trans(E 1,A,nil) trans(E 1 then E 2,A,F then E 2 )  trans(E 1,A,F) ⋀ F ≠ nil trans(E 1 par E 2,A,F par E 2 )  trans(E 1,A,F) trans(E 1 par E 2,A,E 1 par F)  trans(E 2,A,F) trans(M ⇐ P,in(M),null)  true trans(M ⇒ P,out(M),null)  true trans(E ← C,#(X),E)  X in C ⋀ sat(X) ⋀ sat(C) trans(E ← C,A,F)  (A ≠ #) ⋀ sat(C) ⋀ trans(E,A,F) LCC Transition Rules

Consistency Peer - Peer P M (P,R) P1P1 PnPn EPEP E P1 E Pn K (P) K (P 1 )  A  K (P)  P i  P (M (P,R) )  B  K (P i ) →  (A  B) P (M (P,R) ) = Peers involved in M (P,R)

Specific Question Agents in open environments may have different ontologies Guaranteeing complete mappings between them is infeasible (ontologies can be inconsistent, can cover different domains, etc) Agents are interested in performing tasks: mapping is required only for the terms contextual to the interactions Repetition of tasks provides the basis for modelling statistically the contexts of the interactions To what extent can interaction models can be used to focus the ontology mapping to the relevant sections of the ontology?

Approach Predicting the possible content of a message before processing can help to focus the mapping: –With no knowledge of the context and of the state of an interaction, a received message can be anything –the context can be used to guess the possible content of messages, filtering out unrelated elements –the guessed content is suggested to the ontology mapping engine The entities in a received message m i (e 1,...,e n ) are bound by the context of the interaction: –some entities are specific to the interaction type (purchase, request of information,...), –the set of possible entities is bound by concepts previously introduced in the interaction, –different entities may appear in a specific message with different frequencies

Implementation Creating the model: –Entities appearing in messages are counted, obtaining their prior and conditional frequencies –Ontological relations between entities in different messages are checked and the verified relations are counted Predicting the content of a message: –When a message is received, the probability distribution for all the terms is computed using the collected information and the current state of the interaction –The most probable terms form the set of suggestions for the ontology mapping engine Two phases: The aim is to obtain the smallest possible set that is most likely to contain the entities actually used in the message.

Mapping Evaluation Framework

Testing Interactions are abstract protocols, and agents have generated ontologies –allows us to simulate different types of relations between the messages Community preferences over elements (best sellers, etc) are simulated by probability distributions Interactions are run automatically hundreds of times Results are compared with a uniform distribution of the entities (simulates no knowledge about context) –Equivalent size for same success rate –Equivalent success rate for same size of suggestion set

Provisional Results After 100 interactions, the predictor is able to provide a set smaller than 7% of the ontology size containing, 70% of the time, the term actually used in message m 2 If all terms are equiprobable, the probability is directly proportional to the size of the (randomly picked) set, as shown above.

Consistency Peer - Environment P M (P,R) P1P1 PnPn EPEP E P1 E Pn K (E P ) K (P)  A  K (P)  B  K (E P ) →  (A  B)

Specific Question Suppose we have a complex environment with adversorial agents For specific goals, how complex do interaction models need to be in order to raise group performance significantly?

Environment Simulation Framework Group convergence randomcoordinated Comparative performance Environment simulator Simulated agents Interaction model Coordinating peer a(hunter,Id):: sawHimAt(Location) => a(hunter,RID)  visiblePlayer(Location) and strafeAttempt(Location,Location) or strafeAttempt(Location,Location)  sawHimAt(Location) <= a(hunter,RID) or movementAttempt(random_play) You can be a hunter if you send a message revealing the location of a visible opponent player upon whom you are making a strafing attack or make a strafing attack on a location if you have been told a player is there or otherwise just do what seems right