Probabilistic Evidential Reasoning with Symbolic Argumentation for Space Situation Awareness

Size: px
Start display at page:

Download "Probabilistic Evidential Reasoning with Symbolic Argumentation for Space Situation Awareness"

Transcription

1 AIAA April 2010, Atlanta, Georgia AIAA Probabilistic Evidential Reasoning with Symbolic Argumentation for Space Situation Awareness Glenn Takata 1 and Joe Gorman 2 Charles River Analytics, Inc., Cambridge, MA A number of research efforts have investigated approaches and technologies to improve space situation awareness. Prior research included investigation of probabilistic methods using structured models such as Bayesian belief networks. Such approaches have a firm foundation in evidential reasoning and are believed to have considerable potential for reasoning about situations of interest in space. However, building the necessary models and specifying the quantitative probabilities linking nodes is a non-trivial effort. Probabilistic models necessitate the estimation of probabilities that relate events. However, situations of interest are rare events and a lack of relevant observations makes it challenging to validate probabilistic models. Research in the elicitation of probabilities has shown that even domain experts cannot effectively generate valid mathematical relationships between abstract entities that form probabilistic models. The size and complexity of probabilistic models that realistically describe situations of interest exacerbates the challenge of defining the required probabilities. Data driven machine learning approaches have been used to address this problem in other domains. However, the lack of exemplars of events of interest limits the applicability of data driven machine learning to the modeling space situations of interest. The result is an increased reliance on elicited knowledge. Technologies are needed that simplify the process of model construction and that can take advantage of multiple information sources to provide space situation awareness. This paper describes an approach, based on Toulmin s theory of argumentation, which provides an intuitive representation that can be used to create and exercise models of space situations. These models are then supplied to a fusion component that uses the Dempster-Shafer theory of belief propagation to estimate confidences for the characterization of these situations of interest. I. Introduction In 2001, the U.S. Space Commission 1 enumerated the potential threats to the U.S. s space infrastructure and called for changes across the U.S. Department of Defense (DOD) in order to mitigate existing vulnerabilities. The Rumsfeld Commission report has since been adopted as the basis for numerous space management and situation awareness programs. A first step in managing any situation is situational awareness. Therefore, the Air Force has focused on improving space situational awareness (SSA) by putting into place systems that monitor the health and condition of satellites and their output, watching for indications that the spacecraft are being affected by natural or artificial means and whether this constitutes an attack. 2 A number of research efforts have been instituted to investigate approaches and technologies to improve SSA. Prior research included investigation of probabilistic methods using structured models like Bayesian belief networks. 3,4 Such probabilistic methods have a firm foundation in evidential reasoning. 5 For SSA probabilistic methods are believed to have considerable potential for reasoning, but building the models and specifying the quantitative probabilities linking nodes 6 is a non-trivial effort. Probabilistic model development is complicated by the lack of relevant instances of exceptional space situations that can be used as bases for reasoning or to estimate the structural parameters. The lack of exemplars limits the applicability of data driven machine learning approaches and increases the reliance on elicited knowledge. The scarcity of available training data puts an enormous burden put on the analyst to generate all the parameters required to specify the model and estimate the probabilistic 1 Senior Software Engineer, Decision Management, Charles River Analytics, Inc., Cambridge, MA. 2 Principal Engineer, Decision Management, Charles River Analytics, Inc., Cambridge, MA. 1 Copyright 2010 by the, Inc. The U.S. Government has a royalty-free license to exercise all rights under the copyright claimed herein for Governmental purposes. All other rights are reserved by the copyright owner.

2 parameters. A Bayesian network using 10 binary (true, false) variables, for instance, requires the estimation of 1024 probabilities. This burden can be alleviated in special cases when the model has a special structure or when simplifying assumptions can be made. 7,8 However, these models still necessitate the estimation of probabilities to relate events, which would be difficult without hard evidence to validate them. Research in the elicitation of probabilities has shown that even domain experts cannot generate valid mathematical relationships between abstract entities, a problem that gets exacerbated when a large amount of relationships need to be specified. 9 In this paper we present a knowledge-based system that is used for the fusion of multisensor events that has application in the creation and maintenance of space situation awareness. The approach uses symbolic argumentation to implement data fusion at Level 2 (Situation Assessment) of the JDL model. 10,11 The aim of this system was to improve the users ability to make sound decisions through enhanced situation awareness. The system uses uncertain or incomplete information to form situation models that enable decision makers to quickly identify and characterize situations of interest while filtering out irrelevant information. This system uses a high-level graphical knowledge representation based on an intuitive model of human discourse. The system is based on symbolic argumentation, a framework which supports human experts by augmenting and complementing their own cognitive abilities. 12 When combined with methods for reasoning with uncertain and incomplete information the system provides a declarative and robust framework for automated decision-making. The system includes a visual model development tool that facilitates the elicitation of knowledge about situations of interest, enabling users to record and evaluate their decision-making processes using the system s automated capabilities. The following section reviews the principles underlying the argumentation approach. This is followed, in section 3, by a description of the graphical representation of argumentation models. In section 4 discuss our implementation of the model development environment and the argumentation based fusion engine. Section 5 describes how the system is applied in a multi-level fusion environment. We conclude, in section 6, with some observations from our experience with this project and some discussion of further research. II. Argumentation for Fusion The argumentation approach uses Toulmin s 13 theory of argumentation as a basis for the development of a reasoning model and the Dempster-Shafer theory 14 to calculate belief estimates based on this model. A. Argumentation Theory Toulmin 13 described a procedural model of human reasoning, which provided a rich analysis of argument and can serve as a guideline for organizing the information the information user to make decisions under conditions of uncertainty. Toulmin s model decomposes an argument into claim, data, warrant, backing, qualifier, and rebuttal (Fig. 1). The claim is the conclusion for which an estimate of support is required and data represents the evidence that will support the claim. The warrant explains why the data are relevant to the claim. Backing is supplied to support the validity of the warrant in the argument. The qualifier indicates how strong the claim is while the rebuttal represents an exception or counter argument to the claim. In this example, the claim is that a collision will occur. Supporting evidence is supplied through an observation (data) that a debris has been detected within 2.8 miles and the knowledge (warrant), based on prior research, that a near flyby is likely to result in a collision. A counterargument (rebuttal) is supplied by the observation that the debris is moving away from the satellite. This formulation gives a natural structure to argumentation that can be exploited for knowledge elicitation and for confidence estimation. 2

3 . Figure 1. Example of Toulmin's Theory of Argumentation B. Dempster-Shafer Belief Propagation The influence of evidence on arguments and, ultimately, on the claims is determined through an application of Dempster-Shafer theory. 14 This theory of beliefs supports reasoning under uncertain and incomplete information. Unlike other inferencing paradigms, such as Bayesian networks, Dempster-Shafer theory does not require a complete specification of all the nodes and parameters in a model that incorporates uncertainty in the calculation. This ability to make use of uncertain or incomplete information simplifies the task of building a chain of argumentation and of specifying parameters. Dempster-Shafer theory provides an automated inference technique that generalizes the Bayesian theory of subjective probability. Like Bayesian approaches, Dempster-Shafer reasoning accumulates evidence and updates prior claims in the light of new evidence. Unlike Bayesian methods, Dempster-Shafer theory requires only that the data support or refute the claim. It does not require that the total belief be apportioned over all the possible claims. The simple example of Fig. 1 may be expanded with other claims that are related to, but mutually exclusive with, the Collision event. For instance, there may be a claim of No Collision. If data provided a.50 belief in a Collision, the remaining.50 belief would not be applied to No Collision, but would represent uncertainty in the model. Calculations based on this approach result in upper and lower bounds on the belief in a claim (Fig. 2). The lower bound, support, is the degree to which the evidence supports a proposition and is based on the direct evidence for the claim. The upper bound, Figure 2. Dempster-Shafer Outputs plausibility, is the extent to which the evidence fails to refute a proposition and is based on the total evidence for related but mutually exclusive claims. The actual belief in this claim lies between these bounds. III. Network Representation of Argumentation The Dempster-Shafer model was the basis of our graphical representation for argumentation (Fig. 3). In this representation, a situation of interest is characterized by a set of mutually exclusive claims about an event. These are represented as Characterization nodes in the network. Data that contribute to each characterization can take to form of intermediate nodes that result from the combination of other data or can be leaf nodes that represent simple data and serve as entry points for evidence from external inputs. They are represented as intermediate or leaf Argument nodes, respectively. The influences of these data on each claim and on each other are specified as weighted Edges connecting Arguments to Characterizations and to other Arguments. Warrants are represented as 3

4 connections between Arguments and Edges, i.e. an Argument, representing backing, can influence the weight on an Edge. Figure 3. Network Representation of Toulmin Argumentation Characterizations can be simple or complex. Complex Characterizations are defined as sets of mutually exclusive simple Characterizations. The network representation does not change. However, increased support for one of the Characterizations will affect the plausibility of the related Characterizations. Complex Arguments are treated in the same fashion. Rebuttals are treated as normal Arguments. However, during evaluation their evidence is used to support the complementary Characterization or Argument. In the case of a simple Characterization or Argument this is simply the opposite Characterization or Argument, e.g. Threat vs. No Threat. In the case of complex Characterizations or Arguments, the evidence is applied to the complementary set of Characterizations or Arguments. This representation that encapsulates the reasoning, is readily understood and is more easily manipulated by subject experts than other probabilistic models. IV. Implementation The prototype system consisted of two parts, (1) a fusion engine that implemented the Dempster-Shafer reasoning, and (2) a modeling environment that assisted in the development and assessment of argumentation networks that characterize situations of interest. The fusion engine was a component in a larger research prototype multi-level fusion system for SSA. The modeling environment was available for stand alone use during model development. Expert knowledge was encoded in graphs that represent argumentation networks. The argumentation network was represented internally as a hierarchical structure of nodes and edges and was stored externally in XML. The fusion implementation consisted of three processes. The first was a data conditioning process which extracted information from the event message for use in association and evaluation. The second was an association process that used the conditioned data to identify the situation and the Argument within that situation which could ingest evidence about that event. The third process applied the evidence from the event to the situation model. Event data was supplied by external applications through a publish and subscribe (PUB/SUB) messaging mechanism. The results of evaluation were published back as situation messages. 4

5 Figure 4. Modeling Environment The conditioning process was tailored to each data source. For each source, data were extracted and parameters computed that could supply the information needed for the association and evaluation steps. Specifically, these included (1) a time window for the event, (2) a description of the event, (3) an estimate of the evidence provided by the event, and (4) the identification of an asset or target. The event description included specific parameters that were supplied to the rule processor during the association process. The association process relied on a forward-chaining rules implementation to identify a leaf Argument for the incoming event data. An ontology based reasoning system was used, which allowed the rules to take advantage of taxonomic relationships in the data to make its inferences. The rules specified the conditions on event parameters that were necessary for a particular argument. Sensor and other facts from incoming L1 data fusion events were supplied to the reasoner. If an association was deduced, the corresponding situation was used in the evaluation. Confidences supplied with the event were used to calculate evidence for further processing. The evaluation process applied the weight on the Edge to the evidence associated with the source Argument node. The destination node of the Edge used Dempster-Shafer to combine the evidence from all incoming nodes into a support value. It then relayed this support value to subsequent nodes in the graph. This process was performed recursively until the Characterization nodes were updated. The support and plausibility values for each node were then combined into a situation message which was published for use by other applications. The fusion engine was implemented as a plugin, which could be inserted into an OSGI-based application that could supply sensor event tracks and could, in turn, receive situation reports. The fusion engine ingested event track messages and published situation reports for use by other components. Its operation was driven by external situation model and rule definition files. The introduction of new situation models required the modification of these files and little or, in most cases, no modification of the fusion software. This gave the user the ability to quickly apply new models and rules without complex reprogramming. The modeling environment provided the user with a tool to visually build and modify the situation models and to create and edit the association rules (Fig. 4). It consisted of a tool palette and a model editor. In the model editor the argument network was visualized as a set of blue rectangles and green ovals connected by arrows. The rectangles 5

6 represented characterizations of the situation while the ovals represented arguments. The arrows indicated the influences between nodes and could be weighted to moderate the influences. With this drag-and-drop editor a situation model could be quickly built giving the expert an immediate visualization of her thinking process. The model could be tested using sliders that simulated the evidence applied to the Argument node. The fusion engine plugged into the development environment used these inputs to evaluate the state of the situation and display the results back to the user. A playback tool allowed the user to select a test dataset and apply it to the situation model that was being created. This tool is shown in the lower left of Fig. 4. The behavior of the model was displayed in the editor as the data were processed. This allowed the user to validate the model against external datasets that might have been prepared specifically for validation or might have been obtained from other simulations. This combination of model editor and playback tool gave the user the ability to iteratively refine the situation model. Once completed the model and rules could be saved to external files and used with the fusion engine in other applications. V. Application This system has proved an efficient and intuitive means for eliciting knowledge about situations of interest while simultaneously building the argumentation networks that form the basis for situation awareness. New networks were created and existing networks updated by users with minimal technical support. The Dempster- Shafer based fusion component implemented fusion at Level 2 of the JDL model. 10,11 This model comprises five fusion levels representing increasing refinement of data characterization. Briefly, level 0 involves preprocessing at the sensor or other source; level 1 performs identification and tracking of data relating to a single entity or event; and level 2 iteratively fuses multiple entities into a picture of a situation. Level 3 combines information from multiple levels to perform a threat or impact assessment and level 4 performs process assessment and monitoring in order to optimize the process itself. The modeling environment was used to build situation models based on specific and generalized scenarios describing situations of interest. The models were evaluated with an appropriate set of input data sources that were available in the runtime or simulation environment. Data conditioners were implemented as necessary for the sources. Rules were developed to associate measurands to the arguments. The process of building the model and defining the rules would suggest refinements requiring new arguments and new data sources that would enhance the fidelity of the model and consequently, the operator s understanding of the situation. This could lead to the addition of new data sources and their associated level 0 or level 1 fusion processes or to the refinement of the existing fusion processes to provided better detail for use by the situation model. New data sources would require the development of new conditioners to prepare the data for ingestion by the association process. A player component was used to apply test data to the situation model. Controlled playback permitted the verification and assessment of rule classification incoming events and the correct association of events to model arguments. Once the associations were made, evidence was calculated for each leaf argument and the results propagated to the conclusions. The conclusions were then published back to the editor view. The expert was able to review these results to assess if the evidence produced belief values that conformed to her view of the situation. Based on these results, the expert was able to adjust the model and the rules to fit with her knowledge of the situation. This sequence of playback and adjustment led to incremental refinements of the situation model. Ultimately, the final model was used in a runtime application that was developed to demonstrate not only the Level 2 fusion, but the integration of this and other components implementing a variety of fusion levels of the JDL model. 10,11 The fusion engine was installed in the application as a plugin along with configuration files that contained the model, the rules, and other supporting data. VI. Conclusion Argumentation networks were used in the runtime applications to detect and characterize space situations of interest by fusing data from a variety of ground and satellite based sensors to estimate confidences for the characterization of these situations. The visual development tool gave the expert an intuitive editor to build situation models using her knowledge and to refine these models using playback tools to test the model. The tool and the fusion engine are based only on the data representation and not on any domain specific requirements. Hence, this symbolic argumentation based approach is applicable to other environments and venues that require the fusion of multisource inputs to characterize a situation that is incompletely or imperfectly understood or for which prior data are unavailable. 6

7 Other military venues for situation awareness, e.g. air or ground operations, are candidates for the application of this technology. However, the technique is readily extendable outside of SA to applications, like vehicle health maintenance or medical diagnostics, which require a similar fusion of multiple streams of data. These venues pose similar types of problems, where the expert is called upon to characterize and act upon an event whose causes are only partially understood. The expert is able to build up a structure of plausible arguments that lead to believable characterizations and consequent decisions. Acknowledgment This work was performed under Government contract number FA C-0005 with the Air Force Advanced Research Laboratory. The authors thank our sponsors at AFRL/RV for their support and direction on this project. References 1 Rumsfeld, D., Rumsfeld Commission Tirpak, John A., Space Superiority Cannot be Taken for Granted, so the Air Force is Making Plans to Defend It, Air Force Magazine, June, 2006, pp Hanson, A.M., Gonsalves, P., Tse, J., and Grey, R., Automated Data Fusion and Situation Assessment in Space Systems, International Journal on Artificial Intelligence Tools, vol. 13, no. 1, March, 2004, pp Wu, J.K. and Wong, Y.F., Bayesian Approach for Data Fusion in Sensor Networks, 9th International Conference on Information Fusion, 2006, July, 2006, pp Schum, D.A. The Evidential Foundations of Probabilistic Reasoning. Evanston, IL, Northwestern University Press, Pew, R.W. and Mavor, A.S. (eds), Modeling Human and Organizational Behavior, Washington, DC, National Academy Press, Lemmer, J. F. and Gossink, D. E., Recursive Noisy or- a Rule for Estimating Complex Probabilistic Interactions, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 34, no. 6, 2004, pp Wisse, B.W., van Gosliga, S.P., van Elst, N.P. and Barros, A.I., Relieving the Elicitation Burden of Bayesian Belief Networks, Sixth Bayesian Modeling Applications Workshop on UAI Zagorecki, A. and Druzdzel, M., An Empirical Study of Probability Elicitation Under Noisy-OR Assumption, Proceedings of the Seventeenth International Florida Artificial Intelligence Research Society Conference (FLAIRS 2004), edited by V. Barr & Z. Markov, AAAI Press, Menlo Park, CA, 2004, pp Steinberg, A. and Bowman, C., Rethinking the JDL Data Fusion Levels, Proceedings of National Symposium on Sensor and Data Fusion, JHAPL, Hall, D.L. and Llinas, J. (eds), Handbook of Multisensor Data Fusion, Boca Raton, FL, CRC Press, Das, S., Symbolic Argumentation for Decision Making Under Uncertainty, Proceedings of the 8th International Conference on Information Fusion, Philadelphia, PA, Toulmin, S. E., The Uses of Argument, New York, Cambridge University Press, Shafer, G. and Logan, R., Implementing Dempster s Rule for Hierarchical Evidence, Artificial Intelligence, vol. 33, no. 3, 1987, pp

Chapter 28. Bayesian Networks

Chapter 28. Bayesian Networks Chapter 28. Bayesian Networks The Quest for Artificial Intelligence, Nilsson, N. J., 2009. Lecture Notes on Artificial Intelligence, Spring 2012 Summarized by Kim, Byoung-Hee and Lim, Byoung-Kwon Biointelligence

More information

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: natu@cis.udel.edu

More information

Personal Cognitive Assistants for Military Intelligence Analysis: Mixed-Initiative Learning, Tutoring, and Problem Solving

Personal Cognitive Assistants for Military Intelligence Analysis: Mixed-Initiative Learning, Tutoring, and Problem Solving Personal Cognitive Assistants for Military Intelligence Analysis: Mixed-Initiative Learning, Tutoring, and Problem Solving Gheorghe Tecuci, Mihai Boicu Learning Agents Center George Mason University Fairfax,

More information

Sanjeev Kumar. contribute

Sanjeev Kumar. contribute RESEARCH ISSUES IN DATAA MINING Sanjeev Kumar I.A.S.R.I., Library Avenue, Pusa, New Delhi-110012 sanjeevk@iasri.res.in 1. Introduction The field of data mining and knowledgee discovery is emerging as a

More information

Representing Normative Arguments in Genetic Counseling

Representing Normative Arguments in Genetic Counseling Representing Normative Arguments in Genetic Counseling Nancy Green Department of Mathematical Sciences University of North Carolina at Greensboro Greensboro, NC 27402 USA nlgreen@uncg.edu Abstract Our

More information

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University

More information

Learning diagnostic diagrams in transport-based data-collection systems

Learning diagnostic diagrams in transport-based data-collection systems University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2014 Learning diagnostic diagrams in transport-based data-collection

More information

ICT Perspectives on Big Data: Well Sorted Materials

ICT Perspectives on Big Data: Well Sorted Materials ICT Perspectives on Big Data: Well Sorted Materials 3 March 2015 Contents Introduction 1 Dendrogram 2 Tree Map 3 Heat Map 4 Raw Group Data 5 For an online, interactive version of the visualisations in

More information

Robot Task-Level Programming Language and Simulation

Robot Task-Level Programming Language and Simulation Robot Task-Level Programming Language and Simulation M. Samaka Abstract This paper presents the development of a software application for Off-line robot task programming and simulation. Such application

More information

Mining. Practical. Data. Monte F. Hancock, Jr. Chief Scientist, Celestech, Inc. CRC Press. Taylor & Francis Group

Mining. Practical. Data. Monte F. Hancock, Jr. Chief Scientist, Celestech, Inc. CRC Press. Taylor & Francis Group Practical Data Mining Monte F. Hancock, Jr. Chief Scientist, Celestech, Inc. CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor Ei Francis Group, an Informs

More information

Network Mission Assurance

Network Mission Assurance Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com

More information

Multi-ultrasonic sensor fusion for autonomous mobile robots

Multi-ultrasonic sensor fusion for autonomous mobile robots Multi-ultrasonic sensor fusion for autonomous mobile robots Zou Yi *, Ho Yeong Khing, Chua Chin Seng, and Zhou Xiao Wei School of Electrical and Electronic Engineering Nanyang Technological University

More information

Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques

Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,

More information

Investment Analysis using the Portfolio Analysis Machine (PALMA 1 ) Tool by Richard A. Moynihan 21 July 2005

Investment Analysis using the Portfolio Analysis Machine (PALMA 1 ) Tool by Richard A. Moynihan 21 July 2005 Investment Analysis using the Portfolio Analysis Machine (PALMA 1 ) Tool by Richard A. Moynihan 21 July 2005 Government Investment Analysis Guidance Current Government acquisition guidelines mandate the

More information

Implementation of hybrid software architecture for Artificial Intelligence System

Implementation of hybrid software architecture for Artificial Intelligence System IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.1, January 2007 35 Implementation of hybrid software architecture for Artificial Intelligence System B.Vinayagasundaram and

More information

Improving Knowledge-Based System Performance by Reordering Rule Sequences

Improving Knowledge-Based System Performance by Reordering Rule Sequences Improving Knowledge-Based System Performance by Reordering Rule Sequences Neli P. Zlatareva Department of Computer Science Central Connecticut State University 1615 Stanley Street New Britain, CT 06050

More information

H13-187 INVESTIGATING THE BENEFITS OF INFORMATION MANAGEMENT SYSTEMS FOR HAZARD MANAGEMENT

H13-187 INVESTIGATING THE BENEFITS OF INFORMATION MANAGEMENT SYSTEMS FOR HAZARD MANAGEMENT H13-187 INVESTIGATING THE BENEFITS OF INFORMATION MANAGEMENT SYSTEMS FOR HAZARD MANAGEMENT Ian Griffiths, Martyn Bull, Ian Bush, Luke Carrivick, Richard Jones and Matthew Burns RiskAware Ltd, Bristol,

More information

SB-Plan: Simulation-based support for resource allocation and mission planning

SB-Plan: Simulation-based support for resource allocation and mission planning SB-Plan: Simulation-based support for resource allocation and mission planning Pontus Svenson, FOI Ledningssystem ponsve@foi.se Christian Mårtenson, FOI Ledningssystem cmart@foi.se 0. Abstract In future

More information

Agenda. Interface Agents. Interface Agents

Agenda. Interface Agents. Interface Agents Agenda Marcelo G. Armentano Problem Overview Interface Agents Probabilistic approach Monitoring user actions Model of the application Model of user intentions Example Summary ISISTAN Research Institute

More information

Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications

Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Sayantan Das Prasenjit Basu Ansuman Banerjee Pallab Dasgupta P.P. Chakrabarti Department of Computer Science & Engineering

More information

INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS

INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS R. Sarala 1, M.Kayalvizhi 2, G.Zayaraz 3 1 Associate Professor, Computer Science and Engineering, Pondicherry Engineering

More information

Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology

Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology Jackie Zheqing Zhang Bill Hopkinson, Ph.D. 12479 Research Parkway Orlando, FL 32826-3248 407-207-0976 jackie.z.zhang@saic.com,

More information

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures

More information

Cognitive and Organizational Challenges of Big Data in Cyber Defense

Cognitive and Organizational Challenges of Big Data in Cyber Defense Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory nathan.bos@jhuapl.edu, john.gersh@jhuapl.edu The cognitive and organizational

More information

A University Research Group Experience with Deploying an Artificial Intelligence Application in the Center of Gravity Analysis Domain

A University Research Group Experience with Deploying an Artificial Intelligence Application in the Center of Gravity Analysis Domain A University Research Group Experience with Deploying an Artificial Intelligence Application in the Center of Gravity Analysis Domain Gheorghe Tecuci, Mihai Boicu, Dorin Marcu, Bogdan Stanescu, Cristina

More information

Elsa C. Augustenborg Gary R. Danielson Andrew E. Beck

Elsa C. Augustenborg Gary R. Danielson Andrew E. Beck Elsa C. Augustenborg Gary R. Danielson Andrew E. Beck Pacific Northwest National Laboratory PNNL-SA-75867 Overview Technical challenges Institutional challenges Architectural approach Examples: Promising

More information

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful

More information

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013 2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Compression algorithm for Bayesian network modeling of binary systems

Compression algorithm for Bayesian network modeling of binary systems Compression algorithm for Bayesian network modeling of binary systems I. Tien & A. Der Kiureghian University of California, Berkeley ABSTRACT: A Bayesian network (BN) is a useful tool for analyzing the

More information

BPM and Simulation. A White Paper. Signavio, Inc. Nov 2013. Katharina Clauberg, William Thomas

BPM and Simulation. A White Paper. Signavio, Inc. Nov 2013. Katharina Clauberg, William Thomas BPM and Simulation A White Paper Signavio, Inc. Nov 2013 Katharina Clauberg, William Thomas Table of Contents 1. Executive Summary... 3 2. Setting the Scene for Process Change... 4 3. Identifying the Goals

More information

EL Program: Smart Manufacturing Systems Design and Analysis

EL Program: Smart Manufacturing Systems Design and Analysis EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical

More information

Secure Semantic Web Service Using SAML

Secure Semantic Web Service Using SAML Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA

More information

In Proceedings of the Eleventh Conference on Biocybernetics and Biomedical Engineering, pages 842-846, Warsaw, Poland, December 2-4, 1999

In Proceedings of the Eleventh Conference on Biocybernetics and Biomedical Engineering, pages 842-846, Warsaw, Poland, December 2-4, 1999 In Proceedings of the Eleventh Conference on Biocybernetics and Biomedical Engineering, pages 842-846, Warsaw, Poland, December 2-4, 1999 A Bayesian Network Model for Diagnosis of Liver Disorders Agnieszka

More information

Real Time Traffic Monitoring With Bayesian Belief Networks

Real Time Traffic Monitoring With Bayesian Belief Networks Real Time Traffic Monitoring With Bayesian Belief Networks Sicco Pier van Gosliga TNO Defence, Security and Safety, P.O.Box 96864, 2509 JG The Hague, The Netherlands +31 70 374 02 30, sicco_pier.vangosliga@tno.nl

More information

Information Visualization WS 2013/14 11 Visual Analytics

Information Visualization WS 2013/14 11 Visual Analytics 1 11.1 Definitions and Motivation Lot of research and papers in this emerging field: Visual Analytics: Scope and Challenges of Keim et al. Illuminating the path of Thomas and Cook 2 11.1 Definitions and

More information

Risk Knowledge Capture in the Riskit Method

Risk Knowledge Capture in the Riskit Method Risk Knowledge Capture in the Riskit Method Jyrki Kontio and Victor R. Basili jyrki.kontio@ntc.nokia.com / basili@cs.umd.edu University of Maryland Department of Computer Science A.V.Williams Building

More information

NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing

NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing Purpose of the Workshop In October 2014, the President s Council of Advisors on Science

More information

A Contribution to Expert Decision-based Virtual Product Development

A Contribution to Expert Decision-based Virtual Product Development A Contribution to Expert Decision-based Virtual Product Development László Horváth, Imre J. Rudas Institute of Intelligent Engineering Systems, John von Neumann Faculty of Informatics, Óbuda University,

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering

More information

ABSTRACT 1. INTRODUCTION 2. THE JDL DATA FUSION PROCESS MODEL IN CYBER SECURITY TERMS

ABSTRACT 1. INTRODUCTION 2. THE JDL DATA FUSION PROCESS MODEL IN CYBER SECURITY TERMS Application of the JDL Data Fusion Process Model for Cyber Security Nicklaus A. Giacobe * College of Information Sciences and Technology, The Pennsylvania State University 101 IST Building, University

More information

Troops Time Planner and Simulation Models For Military

Troops Time Planner and Simulation Models For Military SUPPORTING COURSES OF ACTION PLANNING WITH INTELLIGENT MANAGEMENT OF Contact Information: CELESTINE A. NTUEN & EUI H. PARK The Institute for Human-Machine Studies North Carolina A&T State University Greensboro,

More information

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired

More information

A Framework of User-Driven Data Analytics in the Cloud for Course Management

A Framework of User-Driven Data Analytics in the Cloud for Course Management A Framework of User-Driven Data Analytics in the Cloud for Course Management Jie ZHANG 1, William Chandra TJHI 2, Bu Sung LEE 1, Kee Khoon LEE 2, Julita VASSILEVA 3 & Chee Kit LOOI 4 1 School of Computer

More information

Revel8or: Model Driven Capacity Planning Tool Suite

Revel8or: Model Driven Capacity Planning Tool Suite Revel8or: Model Driven Capacity Planning Tool Suite Liming Zhu 1,2, Yan Liu 1,2, Ngoc Bao Bui 1,2,Ian Gorton 3 1 Empirical Software Engineering Program, National ICT Australia Ltd. 2 School of Computer

More information

Theoretical Perspective

Theoretical Perspective Preface Motivation Manufacturer of digital products become a driver of the world s economy. This claim is confirmed by the data of the European and the American stock markets. Digital products are distributed

More information

Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities

Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities Oscar Kipersztok Mathematics and Computing Technology Phantom Works, The Boeing Company P.O.Box 3707, MC: 7L-44 Seattle, WA 98124

More information

Simulating the Structural Evolution of Software

Simulating the Structural Evolution of Software Simulating the Structural Evolution of Software Benjamin Stopford 1, Steve Counsell 2 1 School of Computer Science and Information Systems, Birkbeck, University of London 2 School of Information Systems,

More information

A Web-based Intelligent Tutoring System for Computer Programming

A Web-based Intelligent Tutoring System for Computer Programming A Web-based Intelligent Tutoring System for Computer Programming C.J. Butz, S. Hua, R.B. Maguire Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2 Email: {butz, huash111,

More information

Better planning and forecasting with IBM Predictive Analytics

Better planning and forecasting with IBM Predictive Analytics IBM Software Business Analytics SPSS Predictive Analytics Better planning and forecasting with IBM Predictive Analytics Using IBM Cognos TM1 with IBM SPSS Predictive Analytics to build better plans and

More information

Toward the Design of Web-Based Planning and Scheduling Services

Toward the Design of Web-Based Planning and Scheduling Services Toward the Design of Web-Based Planning and Scheduling Services Stephen F. Smith, David W. Hildum, David Crimm The Intelligent Coordination and Logistics Laboratory The Robotics Institute Carnegie Mellon

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Anomaly Detection Toolkit for Integrated Systems Health Management (ISHM)

Anomaly Detection Toolkit for Integrated Systems Health Management (ISHM) AIAA Infotech@Aerospace 2010 20-22 April 2010, Atlanta, Georgia AIAA 2010-3498 Anomaly Detection Toolkit for Integrated Systems Health Management (ISHM) John Schmalzel 1 and Fernando Figueroa 2 NASA, Stennis

More information

CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS

CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.

More information

Multisensor Data Fusion and Applications

Multisensor Data Fusion and Applications Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: varshney@syr.edu

More information

Task Management under Change and Uncertainty

Task Management under Change and Uncertainty Task Management under Change and Uncertainty Constraint Solving Experience with the CALO Project Pauline M. Berry, Karen Myers, Tomás E. Uribe, and Neil Yorke-Smith Artificial Intelligence Center, SRI

More information

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS Aswin C Sankaranayanan, Qinfen Zheng, Rama Chellappa University of Maryland College Park, MD - 277 {aswch, qinfen, rama}@cfar.umd.edu Volkan Cevher, James

More information

Ontology and automatic code generation on modeling and simulation

Ontology and automatic code generation on modeling and simulation Ontology and automatic code generation on modeling and simulation Youcef Gheraibia Computing Department University Md Messadia Souk Ahras, 41000, Algeria youcef.gheraibia@gmail.com Abdelhabib Bourouis

More information

Stabilization by Conceptual Duplication in Adaptive Resonance Theory

Stabilization by Conceptual Duplication in Adaptive Resonance Theory Stabilization by Conceptual Duplication in Adaptive Resonance Theory Louis Massey Royal Military College of Canada Department of Mathematics and Computer Science PO Box 17000 Station Forces Kingston, Ontario,

More information

Set-Based Design: A Decision-Theoretic Perspective

Set-Based Design: A Decision-Theoretic Perspective Set-Based Design: A Decision-Theoretic Perspective Chris Paredis, Jason Aughenbaugh, Rich Malak, Steve Rekuc Product and Systems Lifecycle Management Center G.W. Woodruff School of Mechanical Engineering

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

Coverability for Parallel Programs

Coverability for Parallel Programs 2015 http://excel.fit.vutbr.cz Coverability for Parallel Programs Lenka Turoňová* Abstract We improve existing method for the automatic verification of systems with parallel running processes. The technique

More information

Comparison of most adaptive meta model With newly created Quality Meta-Model using CART Algorithm

Comparison of most adaptive meta model With newly created Quality Meta-Model using CART Algorithm International Journal of Electronics and Computer Science Engineering 2492 Available Online at www.ijecse.org ISSN- 2277-1956 Comparison of most adaptive meta model With newly created Quality Meta-Model

More information

life science data mining

life science data mining life science data mining - '.)'-. < } ti» (>.:>,u» c ~'editors Stephen Wong Harvard Medical School, USA Chung-Sheng Li /BM Thomas J Watson Research Center World Scientific NEW JERSEY LONDON SINGAPORE.

More information

C. Wohlin, "Managing Software Quality through Incremental Development and Certification", In Building Quality into Software, pp. 187-202, edited by

C. Wohlin, Managing Software Quality through Incremental Development and Certification, In Building Quality into Software, pp. 187-202, edited by C. Wohlin, "Managing Software Quality through Incremental Development and Certification", In Building Quality into Software, pp. 187-202, edited by M. Ross, C. A. Brebbia, G. Staples and J. Stapleton,

More information

A Bayesian Network Model for Diagnosis of Liver Disorders Agnieszka Onisko, M.S., 1,2 Marek J. Druzdzel, Ph.D., 1 and Hanna Wasyluk, M.D.,Ph.D.

A Bayesian Network Model for Diagnosis of Liver Disorders Agnieszka Onisko, M.S., 1,2 Marek J. Druzdzel, Ph.D., 1 and Hanna Wasyluk, M.D.,Ph.D. Research Report CBMI-99-27, Center for Biomedical Informatics, University of Pittsburgh, September 1999 A Bayesian Network Model for Diagnosis of Liver Disorders Agnieszka Onisko, M.S., 1,2 Marek J. Druzdzel,

More information

Genetic algorithms for changing environments

Genetic algorithms for changing environments Genetic algorithms for changing environments John J. Grefenstette Navy Center for Applied Research in Artificial Intelligence, Naval Research Laboratory, Washington, DC 375, USA gref@aic.nrl.navy.mil Abstract

More information

Process Modelling from Insurance Event Log

Process Modelling from Insurance Event Log Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R

More information

Attack graph analysis using parallel algorithm

Attack graph analysis using parallel algorithm Attack graph analysis using parallel algorithm Dr. Jamali Mohammad (m.jamali@yahoo.com) Ashraf Vahid, MA student of computer software, Shabestar Azad University (vahid.ashraf@yahoo.com) Ashraf Vida, MA

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: M.Vidyasagar@utdallas.edu October 17, 2015 Outline

More information

How To Create An Analysis Tool For A Micro Grid

How To Create An Analysis Tool For A Micro Grid International Workshop on Visual Analytics (2012) K. Matkovic and G. Santucci (Editors) AMPLIO VQA A Web Based Visual Query Analysis System for Micro Grid Energy Mix Planning A. Stoffel 1 and L. Zhang

More information

Software Engineering of NLP-based Computer-assisted Coding Applications

Software Engineering of NLP-based Computer-assisted Coding Applications Software Engineering of NLP-based Computer-assisted Coding Applications 1 Software Engineering of NLP-based Computer-assisted Coding Applications by Mark Morsch, MS; Carol Stoyla, BS, CLA; Ronald Sheffer,

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

GeNIeRate: An Interactive Generator of Diagnostic Bayesian Network Models

GeNIeRate: An Interactive Generator of Diagnostic Bayesian Network Models GeNIeRate: An Interactive Generator of Diagnostic Bayesian Network Models Pieter C. Kraaijeveld Man Machine Interaction Group Delft University of Technology Mekelweg 4, 2628 CD Delft, the Netherlands p.c.kraaijeveld@ewi.tudelft.nl

More information

How To Use Neural Networks In Data Mining

How To Use Neural Networks In Data Mining International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Computer and Network Security

Computer and Network Security Computer and Network Security Common Criteria R. E. Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@cise.ufl.edu Common Criteria Consistent

More information

KNOWLEDGE-BASED IN MEDICAL DECISION SUPPORT SYSTEM BASED ON SUBJECTIVE INTELLIGENCE

KNOWLEDGE-BASED IN MEDICAL DECISION SUPPORT SYSTEM BASED ON SUBJECTIVE INTELLIGENCE JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 22/2013, ISSN 1642-6037 medical diagnosis, ontology, subjective intelligence, reasoning, fuzzy rules Hamido FUJITA 1 KNOWLEDGE-BASED IN MEDICAL DECISION

More information

Network Security Validation Using Game Theory

Network Security Validation Using Game Theory Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy

More information

Fault Analysis in Software with the Data Interaction of Classes

Fault Analysis in Software with the Data Interaction of Classes , pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental

More information

Title: Decision Making and Software Tools for Product Development Based on Axiomatic Design Theory

Title: Decision Making and Software Tools for Product Development Based on Axiomatic Design Theory Title: Decision Making and Software Tools for Product Development Based on Axiomatic Design Theory Authors: Vigain Harutunian, Mats Nordlund, Derrick Tate, and Nam P. Suh (1) Mr. Harutunian, Mr. Tate,

More information

ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013

ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013 ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION, Fuel Consulting, LLC May 2013 DATA AND ANALYSIS INTERACTION Understanding the content, accuracy, source, and completeness of data is critical to the

More information

TANDI: Threat Assessment of Network Data and Information

TANDI: Threat Assessment of Network Data and Information TANDI: Threat Assessment of Network Data and Information Jared Holsopple a, Shanchieh Jay Yang a, and Moises Sudit b a Rochester Institute of Technology, 83 Lomb Memorial Dr., Rochester, NY, USA b University

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

POMPDs Make Better Hackers: Accounting for Uncertainty in Penetration Testing. By: Chris Abbott

POMPDs Make Better Hackers: Accounting for Uncertainty in Penetration Testing. By: Chris Abbott POMPDs Make Better Hackers: Accounting for Uncertainty in Penetration Testing By: Chris Abbott Introduction What is penetration testing? Methodology for assessing network security, by generating and executing

More information

An Integrated Collection of Tools for Continuously Improving the Processes by Which Health Care is Delivered: A Tool Report

An Integrated Collection of Tools for Continuously Improving the Processes by Which Health Care is Delivered: A Tool Report An Integrated Collection of Tools for Continuously Improving the Processes by Which Health Care is Delivered: A Tool Report Leon J. Osterweil, Lori A. Clarke, George S. Avrunin Department of Computer Science

More information

Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control

Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Andre BERGMANN Salzgitter Mannesmann Forschung GmbH; Duisburg, Germany Phone: +49 203 9993154, Fax: +49 203 9993234;

More information

A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections

A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections Asha baby PG Scholar,Department of CSE A. Kumaresan Professor, Department of CSE K. Vijayakumar Professor, Department

More information

Figure 1. Basic Petri net Elements

Figure 1. Basic Petri net Elements ABCM Symposium Series in Mechatronics - Vol. 3 - pp.653-658 Copyright c 2008 by ABCM A REAL OBJECT CONTROL SYSTEM FOR USE IN MANUFACTURING TELEPRESENCE ENVIRONMENTS. Claiton de Oliveira Department of Mechanical

More information

A Probabilistic Causal Model for Diagnosis of Liver Disorders

A Probabilistic Causal Model for Diagnosis of Liver Disorders Intelligent Information Systems VII Proceedings of the Workshop held in Malbork, Poland, June 15-19, 1998 A Probabilistic Causal Model for Diagnosis of Liver Disorders Agnieszka Oniśko 1, Marek J. Druzdzel

More information

Tensor Factorization for Multi-Relational Learning

Tensor Factorization for Multi-Relational Learning Tensor Factorization for Multi-Relational Learning Maximilian Nickel 1 and Volker Tresp 2 1 Ludwig Maximilian University, Oettingenstr. 67, Munich, Germany nickel@dbs.ifi.lmu.de 2 Siemens AG, Corporate

More information

Predictive Cyber Defense A Strategic Thought Paper

Predictive Cyber Defense A Strategic Thought Paper Predictive Cyber Defense A Strategic Thought Paper Don Adams Vice President, Chief Technology Officer, Worldwide Government TIBCO Software Federal, Inc 2 Summary The art and science of multi-sensor data

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

Bayesian Networks and Classifiers in Project Management

Bayesian Networks and Classifiers in Project Management Bayesian Networks and Classifiers in Project Management Daniel Rodríguez 1, Javier Dolado 2 and Manoranjan Satpathy 1 1 Dept. of Computer Science The University of Reading Reading, RG6 6AY, UK drg@ieee.org,

More information

STOCHASTIC ANALYTICS: increasing confidence in business decisions

STOCHASTIC ANALYTICS: increasing confidence in business decisions CROSSINGS: The Journal of Business Transformation STOCHASTIC ANALYTICS: increasing confidence in business decisions With the increasing complexity of the energy supply chain and markets, it is becoming

More information

IBM RATIONAL PERFORMANCE TESTER

IBM RATIONAL PERFORMANCE TESTER IBM RATIONAL PERFORMANCE TESTER Today, a major portion of newly developed enterprise applications is based on Internet connectivity of a geographically distributed work force that all need on-line access

More information

The Intelligent Resource Managment For Local Area Networks

The Intelligent Resource Managment For Local Area Networks Intelligent Resource Management for Local Area Networks: Approach and Evolution 1 Roger Meike Martin Marietta Denver Aerospace Space Station Program P.O. Box 179 (MS 01744) Denver, Co. 80201 Abstract The

More information