1 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Interactive Composition of Computational Pathways Jihie Kim Varun Ratnakar Students: Marc Spraragen (USC)

Slides:



Advertisements
Similar presentations
Construction process lasts until coding and testing is completed consists of design and implementation reasons for this phase –analysis model is not sufficiently.
Advertisements

KAIS T The Vision of Autonomic Computing Jeffrey O. Kephart, David M Chess IBM Watson research Center IEEE Computer, Jan 발표자 : 이승학.
Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
Mixed-Initiative Planning Yolanda Gil USC CS 541 Fall 2003.
1 USC INFORMATION SCIENCES INSTITUTE Modeling and Using Simulation Code for SCEC/IT Yolanda Gil Varun Ratnakar Norm Tubman USC/Information Sciences Institute.
The ADAMANT Project: Linking Scientific Workflows and Networks “Adaptive Data-Aware Multi-Domain Application Network Topologies” Ilia Baldine, Charles.
Alternate Software Development Methodologies
Background information Formal verification methods based on theorem proving techniques and model­checking –to prove the absence of errors (in the formal.
Learning Objectives Explain similarities and differences among algorithms, programs, and heuristic solutions List the five essential properties of an algorithm.
Train Control Language Teaching Computers Interlocking By: J. Endresen, E. Carlson, T. Moen1, K. J. Alme, Haugen, G. K. Olsen & A. Svendsen Synthesizing.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
1 Software Architecture: a Roadmap David Garlen Roshanak Roshandel Yulong Liu.
School of Computing and Mathematics, University of Huddersfield Knowledge Engineering: Issues for the Planning Community Lee McCluskey Department of Computing.
CS 290C: Formal Models for Web Software Lecture 6: Model Driven Development for Web Software with WebML Instructor: Tevfik Bultan.
Software Issues Derived from Dr. Fawcett’s Slides Phil Pratt-Szeliga Fall 2009.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Acquiring Information Systems and Applications
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
Systems Analysis – Analyzing Requirements.  Analyzing requirement stage identifies user information needs and new systems requirements  IS dev team.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
1 Yolanda Gil Information Sciences InstituteJanuary 10, 2010 Requirements for caBIG Infrastructure to Support Semantic Workflows Yolanda.
1 USC INFORMATION SCIENCES INSTITUTE Modeling and Using Simulation Code for SCEC/IT Yolanda Gil Jihie Kim Varun Ratnakar Marc Spraragen USC/Information.
Avalanche Internet Data Management System. Presentation plan 1. The problem to be solved 2. Description of the software needed 3. The solution 4. Avalanche.
The Grid is a complex, distributed and heterogeneous execution environment. Running applications requires the knowledge of many grid services: users need.
European Network of Excellence in AI Planning Intelligent Planning & Scheduling An Innovative Software Technology Susanne Biundo.
1 USC Information Sciences Institute Yolanda Gil AAAI-08 Tutorial July 13, 2008 Part VII: Future Challenges in Computational Workflows and.
1 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Artificial Intelligence and Large-Scope Science: Workflow Planning and Beyond Yolanda Gil USC/Information.
* * 0 OWL-S: Ontology Web Language For Services Reyhan AYDOĞAN Emre YILMAZ 21/12/2005OWL-S: Ontology Web Language for Services.
Large-Scale Science Through Workflow Management Ewa Deelman Center for Grid Technologies USC Information Sciences Institute.
Integrated Development Environment for Policies Anjali B Shah Department of Computer Science and Electrical Engineering University of Maryland Baltimore.
© 2001 Business & Information Systems 2/e1 Chapter 8 Personal Productivity and Problem Solving.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 8 Personal Productivity and Problem Solving.
Model-Driven Analysis Frameworks for Embedded Systems George Edwards USC Center for Systems and Software Engineering
© DATAMAT S.p.A. – Giuseppe Avellino, Stefano Beco, Barbara Cantalupo, Andrea Cavallini A Semantic Workflow Authoring Tool for Programming Grids.
1 USC INFORMATION SCIENCES INSTITUTE CALO, 8/8/03 Acquiring advice (that may use complex expressions) and action specifications Acquiring planning advice,
Issues in (Financial) High Performance Computing John Darlington Director Imperial College Internet Centre Fast Financial Algorithms and Computing 4th.
OPENQUAKE Mission and Vision It is GEM’s mission to engage a global community in the design, development and deployment of state-of-the-art models and.
Chapter 8 Object Design Reuse and Patterns. Object Design Object design is the process of adding details to the requirements analysis and making implementation.
Using and modifying plan constraints in Constable Jim Blythe and Yolanda Gil Temple project USC Information Sciences Institute
1 USC INFORMATION SCIENCES INSTITUTE CAT: Composition Analysis Tool Interactive Composition of Computational Pathways Yolanda Gil Jihie Kim Varun Ratnakar.
1 USC, INFORMATION SCIENCES INSTITUTE An integrated environment for KA An Integrated Environment for Knowledge Acquisition Jim Blythe
Supporting Scenario-Based Requirements Engineering IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 24, NO. 12, DECEMBER, 1998 A. G. Sutcliffe, N. A. M.
The Software Development Process
Applications and Requirements for Scientific Workflow Introduction May NSF Geoffrey Fox Indiana University.
1 USC INFORMATION SCIENCES INSTITUTE Yolanda GilIKRAFT IKRAFT: Interactive Knowledge Representation and Acquisition from Text Yolanda Gil Varun Ratnakar.
Using and modifying plan constraints in Constable Jim Blythe and Yolanda Gil Temple project USC Information Sciences Institute
Data Structures and Algorithms Dr. Tehseen Zia Assistant Professor Dept. Computer Science and IT University of Sargodha Lecture 1.
Volgograd State Technical University Applied Computational Linguistic Society Undergraduate and post-graduate scientific researches under the direction.
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
Planning Ewa Deelman USC Information Sciences Institute GriPhyN NSF Project Review January 2003 Chicago.
1 USC INFORMATION SCIENCES INSTITUTE EXPECT TEMPLE: TEMPLate Extension Through Knowledge Acquisition Yolanda Gil Jim Blythe Information Sciences Institute.
Data Mining and Decision Support
Formal Verification. Background Information Formal verification methods based on theorem proving techniques and model­checking –To prove the absence of.
Ewa Deelman, Virtual Metadata Catalogs: Augmenting Existing Metadata Catalogs with Semantic Representations Yolanda Gil, Varun Ratnakar,
1 Pegasus and wings WINGS/Pegasus Provenance Challenge Ewa Deelman Yolanda Gil Jihie Kim Gaurang Mehta Varun Ratnakar USC Information Sciences Institute.
1 Artemis: Integrating Scientific Data on the Grid Rattapoom Tuchinda Snehal Thakkar Yolanda Gil Ewa Deelman.
The PLA Model: On the Combination of Product-Line Analyses 강태준.
Mechanisms for Requirements Driven Component Selection and Design Automation 최경석.
Definition CASE tools are software systems that are intended to provide automated support for routine activities in the software process such as editing.
KANAL: Knowledge ANALysis
Action Editor Storyboard
Web Ontology Language for Service (OWL-S)
Model-Driven Analysis Frameworks for Embedded Systems
USC Information Sciences Institute {jihie, gil,
Multiple Aspect Modeling of the Synchronous Language Signal
The Vision of Autonomic Computing
Introduction To software engineering
Presented By: Darlene Banta
Overview Activities from additional UP disciplines are needed to bring a system into being Implementation Testing Deployment Configuration and change management.
Scientific Workflows Lecture 15
Presentation transcript:

1 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Interactive Composition of Computational Pathways Jihie Kim Varun Ratnakar Students: Marc Spraragen (USC) Sid Shaw (USC) Dan Wu (U Maryland) Ronggang Yu (UT) Edward Kim (USC) Yolanda Gil

2 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil SCEC/IT Architecture for a Community Modeling Environment

3 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Publishing and Using Simulation Models Problem : bringing sophisticated models to a wide range of users (civil engineers, city planners, disaster resp. teams) Choosing appropriate models for given site and eqk. forecast Setting parameters through approximations (e.g., shear-wave velocity) Complying with parameter value constraints (e.g., magnitude) Detecting and resolving interacting constraints Composing end-to-end pathways from individual models Execution on grid resources Approach : expressive declarative constraint representation and reasoning Ties model descriptions to definitions (ontologies) Uses constraint-based reasoning to guide users to make appropriate use of models Ensure correctness of pathways by analyzing semantic constraints of individual models

4 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Year l : Modeling and Using Simulation Code for Seismic Hazard Analysis with DOCKER [Gil & Ratnakar 02] Declarative descriptions of models are linked to ontologies and KR tools User is allowed to override model constraints to accommodate analysis System reasons about model representation and suggests alternative models Model developers can easily add simple constraints to model description and document their sources and criticality System generates formal representations of model constraints in PowerLoom as well as XSD and WSDL

5 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Hazard Curve Calculator: SA vs. prob. exc. SA exc. probs. SA exc. prob. Rupture Ruptures Site VS30 Site Basin-Depth-2.5 SA Period Gaussian Truncation Std. Dev. Type Task Result: Hazard curve: SA vs. prob. exc. Hazard curve: SA vs. prob. exc. Field (2000) IMR: SA exc. prob. Basin-Depth Calculator Basin-DepthLat Long. UTM Converter (get-Lat-Long- given-UTM) Lat. long UTM (,,, ) Lat Long. CVM-get- Velocity- at-point Velocity Lat Long. Ruptures PEER-Fault Gaussian Dist No Truncation Total Moment Rate Duration-Year Fault-Grid-Spacing Rupture Offset Mag-Length-sigma Dip Rake Magnitude (min) Magnitude (max) Magnitude (mean) rfml End Result: An Executable Computational Pathway

6 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Interactive Composition of Computational Pathways Goal: support users in creating a specification of a pathway Automatic tracking of pathway constraints –System ensures consistency and completeness of pathway so user does not have to keep track of many computational details Provide flexible interaction –User can start from initial data, from data products, or steps –User can specify abstract descriptions of steps and later specialize them Intelligent assistance –System should not just point out problems but help user by suggesting fixes

7 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Our Approach Cast pathway composition as plan synthesis Initial state + desired goals + available steps + constraints (e.g., robot planning, mission planning, etc Advantages: Many algorithms and techniques available for searching the space of combinations of steps and detect solutions [Nilsson 71, McDermott 86, Hendler 9l, Weld 95, etc] Clearly defined semantics and desirable properties Used in the past to model software composition and service composition [Lansky 94, Stickel 96, McDermott 01, etc] Consistent with our approach to generate executable pathways on grids (more in a moment) Interactive composition is a novel research area

8 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Pathway Composition as Plan Synthesis Initial state: user-provided input or available data Desired goals: data products requested by user Available steps: simulation models, conversion routines, data transformations, web services, etc Constraints: defined in ontologies and formal descriptions of steps

9 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Formalizing Pathway Composition Pathway: {Steps}, {Links} Link: [OP(S1), IP(S2)] Step: [{IP}, {OP}, Exec] Links can be consistent, partially consistent, inconsistent, well-formed, dangling, redundant, … Steps can be satisfied, partially satisfied, unsatisfied, justified, … What are desirable properties of pathways?

10 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Desirable Properties of Pathways Satisfied: all steps have linked inputs Tasked: has end result specified Complete: satisfied and tasked Consistent: all links are well-formed and consistent Grounded: all steps are executable Justified: all steps contribute to results Correct: complete, consistent, grounded, and justified

11 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Assisting Users in Pathway Composition User interaction results in modifications to pathways Add/remove step, add/remove link Specialize step Desired result, external/user provided input As users create a pathway, intermediate stages result in possibly incorrect, unjustified, or incomplete pathways ErrorScan algorithm [Spraragen 03] detects errors and generates appropriate fixes Given any intermediate pathway it is guaranteed to suggest fixes that lead to solution If no errors detected, pathway is guaranteed to be correct

12 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil F2-operation-SA-Median-Distance-JBF2-operation-SA-Median-VS30 Compute-F2-SA-Median-wrt-Distance-JB- given-Fault-Type-&-Basin-Depth-&-… Compute-F2-SA-MEDIAN-wrt-VS30- given-Fault-Type-&-Basin-Depth-&-… Hazard-Level Hazard-Level-with-SA Hazard-Level-with-PGA Hazard-Level-with-PGV Compute-Hazard-Level- given-IMR-input-parameters... Compute-Hazard-Level- with-SA- given-IMR-input-parameters Compute-Hazard-Level-with-PGA- given-IMR-input-parameters Compute-Hazard-Level- with-PGV- given-IMR-input-parameters Hazard-Level-with- SA-Median Hazard-Level-with- SA-Std-Dev Hazard-Level-with- SA-Prob-Exc Hazard-Level-with-Median Hazard-Level-with-Std-Dev Hazard-Level-with-Median... Compute-Hazard-Level-with-SA-Median- given-IMR-input-parameters Compute-Hazard-Level-with-SA-Std-Dev- given-IMR-input-parameters Compute-Hazard-Level-with-SA-Prob-Exc- given-IMR-input-parameters IMR-Input-Parameter Field-2000-Input- Parameter Parameter Fault-Type Basin-Depth Distance... Compute-F2-SA-Median- given-Field-2000-input-parameters Compute-F2-Hazard-Level- given-Field-2000-input-parameters F2-Hazard-Level... Domain Ontology Task Ontology IMT probability-function IMR probability-function F2-SA-Median-wrt-VS30...

13 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil CAT: Composition Analysis Tool User building a pathway specification from library of models Errors and fixes generated by ErrorScan algorithm

14 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil SCEC/IT Architecture for a Community Modeling Environment

15 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Pegasus: Workflow Generation for Computational Grids [Deelman et al 03; Blythe et al 03] Given: desired result and constraints A desired result (high-level, metadata description) A set of application components described in the Grid A set of resources in the Grid (dynamic, distributed) A set of constraints and preferences on solution quality Find: an executable job workflow A configuration of components that generates the desired result A specification of resources where components can be executed and data can be stored Approach: Use AI planning techniques to search the solution space and evaluate tradeoffs Exploit heuristics to direct the search for solutions and represent optimality and policy criteria

16 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Generating an Executable Workflow Need to consider: Information about location of data files and components Reuse of existing data files State of the Grid resources Selecting specific: Resources Files Adding jobs required to form a concrete workflow that can be executed in the Grid environment –Data movement –Data registration Each component in the abstract workflow is turned into an executable job

17 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Pegasus Applied to LIGO’s pulsar search [Deelman et al 03] Used LIGO’s data collected during the first scientific run of the instrument Targeted a set of 1000 locations of known pulsar as well as random locations in the sky Performed using compute and storage resources at Caltech, University of Southern California, University of Wisconsin Milwaukee. Used AI planning techniques to generate workflows with hundreds of steps sent to grid for execution

18 USC INFORMATION SCIENCES INSTITUTE Yolanda Gil Interactive Knowledge Acquisition: Summary of Activities Accessibility of complex models to end users (DOCKER) Showing appropriate descriptions of models and constraints Handling errors due to complex constraint violations Assisting model developers to publish code (DOCKER) Describing code behavior is not sufficient Documenting appropriate use of model formally and informally Interactive composition of computational pathways (CAT) User selects and connects models to create a sketch of pathway Automatic error checking and completion support Execution on the Grid environment (Pegasus) Isolate unsophisticated user from complexity of distributed computing environments Extend and integrate DOCKER, CAT, and Pegasus