41,398 research outputs found

    Flaw Selection Strategies for Partial-Order Planning

    Full text link
    Several recent studies have compared the relative efficiency of alternative flaw selection strategies for partial-order causal link (POCL) planning. We review this literature, and present new experimental results that generalize the earlier work and explain some of the discrepancies in it. In particular, we describe the Least-Cost Flaw Repair (LCFR) strategy developed and analyzed by Joslin and Pollack (1994), and compare it with other strategies, including Gerevini and Schubert's (1996) ZLIFO strategy. LCFR and ZLIFO make very different, and apparently conflicting claims about the most effective way to reduce search-space size in POCL planning. We resolve this conflict, arguing that much of the benefit that Gerevini and Schubert ascribe to the LIFO component of their ZLIFO strategy is better attributed to other causes. We show that for many problems, a strategy that combines least-cost flaw selection with the delay of separable threats will be effective in reducing search-space size, and will do so without excessive computational overhead. Although such a strategy thus provides a good default, we also show that certain domain characteristics may reduce its effectiveness.Comment: See http://www.jair.org/ for an online appendix and other files accompanying this articl

    Ignore These At Your Peril: Ten principles for trust design

    Get PDF
    Online trust has been discussed for more than 10 years, yet little practical guidance has emerged that has proven to be applicable across contexts or useful in the long run. 'Trustworthy UI design guidelines' created in the late 90ies to address the then big question of online trust: how to get shoppers online, are now happily employed by people preparing phishing scams. In this paper we summarize, in practical terms, a conceptual framework for online trust we've established in 2005. Because of its abstract nature it is still useful as a lens through which to view the current big questions of the online trust debate - large focused on usable security and phishing attacks. We then deduct practical 10 rules for providing effective trust support to help practitioners and researchers of usable security

    Justify or die? - using contingent valuation of service provision in a UK public library

    Get PDF
    The public library service in the UK is currently under pressure to justify its existence. An Audit Commission report suggested that if current borrowing rates for libraries continue into the future, libraries would be effectively issuing no books by 2020. Recently the Coates Report asserted about book loans that, "in simple terms, if a service is without separate charge and the public decides not to use it, then the service is de facto without any value to these individuals". Yet Coates' simplistic notions of the services public libraries provide lies at the heart of the problem. Performance indicators based on book loans are unable to assess 'the totality of library effectiveness'. Conversely, qualitative analysis, interviewing users about service impact, shows that libraries 'promote social cohesion and community confidence'. However qualitative findings are by nature not quantitative and not comparable. To try to produce a measure for service quality, contingent valuation was chosen. It elicits economic value judgements from users on both services they use and services they do not use. A major independent study using contingent valuation was conducted by the Department of Computer and Information Sciences at the University of Strathclyde on East Renfrewshire Library Services, near Glasgow, which is recognised as an exemplary public library service. The study revealed the inability of contingent valuation to adequately assess the complex mix of services provided. The study concludes that an urgent rethink is required regarding measures for public library service evaluation

    Integration of Biological Sources: Exploring the Case of Protein Homology

    Get PDF
    Data integration is a key issue in the domain of bioin- formatics, which deals with huge amounts of heteroge- neous biological data that grows and changes rapidly. This paper serves as an introduction in the field of bioinformatics and the biological concepts it deals with, and an exploration of the integration problems a bioinformatics scientist faces. We examine ProGMap, an integrated protein homology system used by bioin- formatics scientists at Wageningen University, and several use cases related to protein homology. A key issue we identify is the huge manual effort required to unify source databases into a single resource. Un- certain databases are able to contain several possi- ble worlds, and it has been proposed that they can be used to significantly reduce initial integration efforts. We propose several directions for future work where uncertain databases can be applied to bioinformatics, with the goal of furthering the cause of bioinformatics integration

    Adaptive Resonance Theory

    Full text link
    SyNAPSE program of the Defense Advanced Projects Research Agency (Hewlett-Packard Company, subcontract under DARPA prime contract HR0011-09-3-0001, and HRL Laboratories LLC, subcontract #801881-BS under DARPA prime contract HR0011-09-C-0001); CELEST, an NSF Science of Learning Center (SBE-0354378

    Psychic embedding ā€” vision and delusion

    Get PDF
    The paper introduces the idea that the human brain may apply complex mathematical modules in order to process and understand the world. We speculate that the substrate of what appears outwardly as intuition, or prophetic power, may be a mathematical apparatus such as time-delay embedding. In this context, predictive accuracy may be the reflection of an appropriate choice of the embedding parameters. We further put this in the perspective of mental illness, and search for the possible differences between good intuition and delusive ideation. We speculate that the task at which delusional schizophrenic patients falter is not necessarily of perception, but rather of model selection. Failure of the psychotic patient to correctly choose the embedding parameters may readily lead to misinterpretation of an accurate perception through an altered reconstructed of the object perceived
    • ā€¦
    corecore