752 research outputs found
Efficient computational strategies to learn the structure of probabilistic graphical models of cumulative phenomena
Structural learning of Bayesian Networks (BNs) is a NP-hard problem, which is
further complicated by many theoretical issues, such as the I-equivalence among
different structures. In this work, we focus on a specific subclass of BNs,
named Suppes-Bayes Causal Networks (SBCNs), which include specific structural
constraints based on Suppes' probabilistic causation to efficiently model
cumulative phenomena. Here we compare the performance, via extensive
simulations, of various state-of-the-art search strategies, such as local
search techniques and Genetic Algorithms, as well as of distinct regularization
methods. The assessment is performed on a large number of simulated datasets
from topologies with distinct levels of complexity, various sample size and
different rates of errors in the data. Among the main results, we show that the
introduction of Suppes' constraints dramatically improve the inference
accuracy, by reducing the solution space and providing a temporal ordering on
the variables. We also report on trade-offs among different search techniques
that can be efficiently employed in distinct experimental settings. This
manuscript is an extended version of the paper "Structural Learning of
Probabilistic Graphical Models of Cumulative Phenomena" presented at the 2018
International Conference on Computational Science
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures (Full version)
A widespread design approach in distributed applications based on the
service-oriented paradigm, such as web-services, consists of clearly separating
the enforcement of authorization policies and the workflow of the applications,
so that the interplay between the policy level and the workflow level is
abstracted away. While such an approach is attractive because it is quite
simple and permits one to reason about crucial properties of the policies under
consideration, it does not provide the right level of abstraction to specify
and reason about the way the workflow may interfere with the policies, and vice
versa. For example, the creation of a certificate as a side effect of a
workflow operation may enable a policy rule to fire and grant access to a
certain resource; without executing the operation, the policy rule should
remain inactive. Similarly, policy queries may be used as guards for workflow
transitions.
In this paper, we present a two-level formal verification framework to
overcome these problems and formally reason about the interplay of
authorization policies and workflow in service-oriented architectures. This
allows us to define and investigate some verification problems for SO
applications and give sufficient conditions for their decidability.Comment: 16 pages, 4 figures, full version of paper at Symposium on Secure
Computing (SecureCom09
Fine-grained complexity of temporal problems
Expressive temporal reasoning formalisms are essential for AI. One family of such formalisms consists of disjunctive extensions of the simple temporal problem (STP). Such extensions are well studied in the literature and they have many important applications.
It is known that deciding satisfiability of disjunctive STPs is NP-hard, while the fine-grained complexity of such problems is virtually unexplored. We present novel algorithms that exploit structural properties of the solution space and prove, assuming the Exponential-Time Hypothesis, that their worst-case time complexity is close to optimal. Among other things, we make progress towards resolving a long-open question concerning whether Allen's interval algebra can be solved in single-exponential time, by giving a 2^{O(nloglog(n))} algorithm for the special case of unit-length intervals
Recommended from our members
Working notes of the 1991 spring symposium on constraint-based reasoning
Strategy Logic with Imperfect Information
We introduce an extension of Strategy Logic for the imperfect-information
setting, called SLii, and study its model-checking problem. As this logic
naturally captures multi-player games with imperfect information, the problem
turns out to be undecidable. We introduce a syntactical class of "hierarchical
instances" for which, intuitively, as one goes down the syntactic tree of the
formula, strategy quantifications are concerned with finer observations of the
model. We prove that model-checking SLii restricted to hierarchical instances
is decidable. This result, because it allows for complex patterns of
existential and universal quantification on strategies, greatly generalises
previous ones, such as decidability of multi-player games with imperfect
information and hierarchical observations, and decidability of distributed
synthesis for hierarchical systems. To establish the decidability result, we
introduce and study QCTL*ii, an extension of QCTL* (itself an extension of CTL*
with second-order quantification over atomic propositions) by parameterising
its quantifiers with observations. The simple syntax of QCTL* ii allows us to
provide a conceptually neat reduction of SLii to QCTL*ii that separates
concerns, allowing one to forget about strategies and players and focus solely
on second-order quantification. While the model-checking problem of QCTL*ii is,
in general, undecidable, we identify a syntactic fragment of hierarchical
formulas and prove, using an automata-theoretic approach, that it is decidable.
The decidability result for SLii follows since the reduction maps hierarchical
instances of SLii to hierarchical formulas of QCTL*ii
- …