135 research outputs found
Clues About Bluffing in Clue: Is Conventional Wisdom Wise?
We have used the board game Clue as a pedagogical tool in our course on Artificial Intelligence to teach formal logic through the development of logic-based computational game-playing agents. The development of game-playing agents allows us to experimentally test many game-play strategies and we have encountered some surprising results that refine “conventional wisdom” for playing Clue. In this paper we consider the effect of the oft-used strategy wherein a player uses their own cards when making suggestions (i.e., “bluffing”) early in the game to mislead other players or to focus on acquiring a particular kind of knowledge. We begin with an intuitive argument against this strategy together with a quantitative probabilistic analysis of this strategy’s cost to a player that both suggest “bluffing” should be detrimental to winning the game. We then present our counter-intuitive simulation results from playing computational agents that “bluff” against those that do not that show “bluffing” to be beneficial. We conclude with a nuanced assessment of the cost and benefit of “bluffing” in Clue that shows the strategy, when used correctly, to be beneficial and, when used incorrectly, to be detrimental
Towards concolic testing for hybrid systems
Hybrid systems exhibit both continuous and discrete behavior. Analyzing hybrid systems is known to be hard. Inspired by the idea of concolic testing (of programs), we investigate whether we can combine random sampling and symbolic execution in order to effectively verify hybrid systems. We identify a sufficient condition under which such a combination is more effective than random sampling. Furthermore, we analyze different strategies of combining random sampling and symbolic execution and propose an algorithm which allows us to dynamically switch between them so as to reduce the overall cost. Our method has been implemented as a web-based checker named HYCHECKER. HYCHECKER has been evaluated with benchmark hybrid systems and a water treatment system in order to test its effectiveness.CPCI-S(ISTP)[email protected]; [email protected]
Anomaly Detection in Network Streams Through a Distributional Lens
Anomaly detection in computer networks yields valuable information on events relating to the components of a network, their states, the users in a network and their activities. This thesis provides a unified distribution-based methodology for online detection of anomalies in network traffic streams. The methodology is distribution-based in that it regards the traffic stream as a time series of distributions (histograms), and monitors metrics of distributions in the time series. The effectiveness of the methodology is demonstrated in three application scenarios. First, in 802.11 wireless traffic, we show the ability to detect certain classes of attacks using the methodology. Second, in information network update streams (specifically in Wikipedia) we show the ability to detect the activity of bots, flash events, and outages, as they occur. Third, in Voice over IP traffic streams, we show the ability to detect covert channels that exfiltrate confidential information out of the network. Our experiments show the high detection rate of the methodology when compared to other existing methods, while maintaining a low rate of false positives. Furthermore, we provide algorithmic results that enable efficient and scalable implementation of the above methodology, to accomodate the massive data rates observed in modern infomation streams on the Internet. Through these applications, we present an extensive study of several aspects of the methodology. We analyze the behavior of metrics we consider, providing justification of our choice of those metrics, and how they can be used to diagnose anomalies. We provide insight into the choice of parameters, like window length and threshold, used in anomaly detection
Multi Agent Systems in Logistics: A Literature and State-of-the-art Review
Based on a literature survey, we aim to answer our main question: “How should we plan and execute logistics in supply chains that aim to meet today’s requirements, and how can we support such planning and execution using IT?†Today’s requirements in supply chains include inter-organizational collaboration and more responsive and tailored supply to meet specific demand. Enterprise systems fall short in meeting these requirements The focus of planning and execution systems should move towards an inter-enterprise and event-driven mode. Inter-organizational systems may support planning going from supporting information exchange and henceforth enable synchronized planning within the organizations towards the capability to do network planning based on available information throughout the network. We provide a framework for planning systems, constituting a rich landscape of possible configurations, where the centralized and fully decentralized approaches are two extremes. We define and discuss agent based systems and in particular multi agent systems (MAS). We emphasize the issue of the role of MAS coordination architectures, and then explain that transportation is, next to production, an important domain in which MAS can and actually are applied. However, implementation is not widespread and some implementation issues are explored. In this manner, we conclude that planning problems in transportation have characteristics that comply with the specific capabilities of agent systems. In particular, these systems are capable to deal with inter-organizational and event-driven planning settings, hence meeting today’s requirements in supply chain planning and execution.supply chain;MAS;multi agent systems
A simplified framework for first-order languages and its formalization in Mizar
A strictly formal, set-theoretical treatment of classical first-order logic
is given. Since this is done with the goal of a concrete Mizar formalization of
basic results (Lindenbaum lemma; Henkin, satisfiability, completeness and
Lowenheim-Skolem theorems) in mind, it turns into a systematic pursue of
simplification: we give up the notions of free occurrence, of derivation tree,
and study what inference rules are strictly needed to prove the mentioned
results. Afterwards, we discuss details of the actual Mizar implementation, and
give general techniques developed therein.Comment: Ph.D. thesis, defended on January, 20th, 201
IaaS-cloud security enhancement: an intelligent attribute-based access control model and implementation
The cloud computing paradigm introduces an efficient utilisation of huge computing
resources by multiple users with minimal expense and deployment effort
compared to traditional computing facilities. Although cloud computing has incredible
benefits, some governments and enterprises remain hesitant to transfer
their computing technology to the cloud as a consequence of the associated security
challenges. Security is, therefore, a significant factor in cloud computing
adoption. Cloud services consist of three layers: Software as a Service (SaaS), Platform
as a Service (PaaS), and Infrastructure as a Service (IaaS). Cloud computing
services are accessed through network connections and utilised by multi-users who
can share the resources through virtualisation technology. Accordingly, an efficient
access control system is crucial to prevent unauthorised access.
This thesis mainly investigates the IaaS security enhancement from an access
control point of view. [Continues.
Enumerating Query Plans via Conditional Tableau Interpolation
Database query optimization studies the problem of finding equivalent and efficient query execution plans for user queries under schema constraints. Logic-based approaches to query optimization leverage automated theorem proving and Craig interpolation to enumerate query plans that are correct and performance-optimal. In this thesis, we investigate and improve one of the state-of-the-art logic-based query optimizers – the Interpolation Test Bed (ITB).
We begin by formally capturing the physical data independence framework and query optimization problem with first-order logic. Then, we give a gentle introduction to the classical results from logic that form the basis of logic-based query optimizers.
We re-establish the correctness of ITB’s conditional tableau interpolation mechanism by reduction to free-variable tableau interpolation. To facilitate the reduction proof, we introduce interpolation rules for the free-variable tableau and prove the correctness of interpolation. Then we show the correctness of conditional tableau interpolation by reduction.
We investigate a limitation of ITB’s forward chaining design, which causes missing optimal plans. To address this limitation, we propose a rewriting procedure inspired by Magic Set Transformation (MST), to extend the plan space for the current ITB system. We show that the propose rewriting procedure effectively generates the missing query plans, which are otherwise not found, while accommodating the existing forward chaining design
The agent architecture InteRRaP : concept and application
One of the basic questions of research in Distributed Artificial Intelligence (DAI) is how agents have to be structured and organized, and what functionalities they need in order to be able to act and to interact in a dynamic environment. To cope with this question is the purpose of models and architectures for autonomous and intelligent agents. In the first part of this report, InteRRaP, an agent architecture for multi-agent systems is presented. The basic idea is to combine the use of patterns of behaviour with planning facilities in order to be able to exploit the advantages both of the reactive, behaviour-based and of the deliberate, plan-based paradigm. Patterns of behaviour allow an agent to react flexibly to changes in its environment. What is considered necessary for the performance of more sophisticated tasks is the ability of devising plans deliberately. A further important feature of the model is that it explicitly represents knowledge and strategies for cooperation. This makes it suitable for describing high-level interaction among autonomous agents. In the second part of the report, the loading-dock domain is presented, which has been the first application the InteRRaP agent model has been tested with. An automated loading-dock is described where the agent society consists of forklifts which have to load and unload trucks in a shared, dynamic environment
The Sixth Annual Workshop on Space Operations Applications and Research (SOAR 1992)
This document contains papers presented at the Space Operations, Applications, and Research Symposium (SOAR) hosted by the U.S. Air Force (USAF) on 4-6 Aug. 1992 and held at the JSC Gilruth Recreation Center. The symposium was cosponsored by the Air Force Material Command and by NASA/JSC. Key technical areas covered during the symposium were robotic and telepresence, automation and intelligent systems, human factors, life sciences, and space maintenance and servicing. The SOAR differed from most other conferences in that it was concerned with Government-sponsored research and development relevant to aerospace operations. The symposium's proceedings include papers covering various disciplines presented by experts from NASA, the USAF, universities, and industry
- …