Introduction Classical planning Neoclassical planning Heuristics Planning in the real world. Automated Planning. PLG Group
|
|
- Phoebe Fowler
- 8 years ago
- Views:
Transcription
1 Automated Planning PLG Group Universidad Carlos III de Madrid AI Automated Planning 1
2 Indice 1 Introduction 2 Classical planning 3 Neoclassical planning 4 Heuristics Hierarchical Task Networks Control knowledge Machine learning 5 Planning in the real world Automated Planning 2
3 Indice 1 Introduction 2 Classical planning 3 Neoclassical planning 4 Heuristics Hierarchical Task Networks Control knowledge Machine learning 5 Planning in the real world Automated Planning 3
4 Indice 1 Introduction 2 Classical planning 3 Neoclassical planning 4 Heuristics Hierarchical Task Networks Control knowledge Machine learning 5 Planning in the real world Automated Planning 4
5 Indice 1 Introduction 2 Classical planning 3 Neoclassical planning 4 Heuristics Hierarchical Task Networks Control knowledge Machine learning 5 Planning in the real world Automated Planning 5
6 Types of heuristics Domain-independent: they can be safely used in any domain, tipically for the selection of descendants Domain-dependent: especially devised for a given domain, they are usually employed for all the other steps Real planners do consist of a mixture of both! Domain-independence ensures soundness Domain-dependence improves the performance General idea: to automatically define domain-independent heuristic functions as opposed to ad-hoc domain-dependent functions as in the N-puzzle or the Sokoban domains. Automated Planning 6
7 Heuristics as relaxed problems Origin of heuristics: optimal solutions to relaxed problems [Pearl, 1983] Relaxations are derived by dropping literals from the delete lists: given P = (O, I, G), its relaxation P is defined as P = (O, I, G) where: O = {(pre(o), add(o), ) (pre(o), add(o), del(o)) O} A sequence of actions is a relaxed plan if and only if it is a solution of the relaxed task P of the original problem P: The closer P to P, the more informed the resulting heuristic function, h( ) The more simplified P, the easiest to compute h( ) Automated Planning 7
8 Relaxation on reachability Let us define the minimum distance from state s to literal p, g s (p), as the minimum number of required actions to step from s to another state that embraces p: { 0 si p s g s (p) = min [1 + g s(pre(o))] o O(p) otherwise g s (C) with C being a set of literals can be computed as: Additive: g s + (C) = g s (r) Max: g max s r C (C) = max r C g s(r) Automated Planning 8
9 Example g(en mesa(b)) = 2 g(encima(c,b)) = 3 g+ = 2+3 = 5 gmax = max {2,3} = 3 Estado inicial encima(b,c) libre(b) C B Estado final QUITAR(B,C) B C sujeto(b) DEJAR(B) en mesa(b) en mesa(b) libre(b) LEVANTAR(B) libre(c) encima(c,x) QUITAR(C,x) sujeto(c) libre(b) DEJAR(C,B) sujeto(c) libre(b) PONER(C,B) encima(c,b) sujeto(c) DEJAR(C) libre(c) en mesa(c) LEVANTAR(C) libre(b) encima(b,c) QUITAR(B,C) B C Estado inicial Automated Planning 9
10 Heuristic Search Planning (HSP) [Bonet and Geffner, 2001] HSP: it employs the heuristic function h add = g s + for guiding a hill-climbing search algorithm from s i.e., progression HSP2: it makes use of the heuristic function h add along with a BFS search algorithm from s Drawbacks: HSP takes up to 80% of the time for computing h( ) h add does not account for the interactions among operators. Thus, it looks for suboptimal sequential plans instead of optimal parallel plans Alternatives: HSPr (plus regression), GRT (bidirectional search) or, more recently HSP To use GRAPHPLAN as a mean for capturing the interaction among operators Automated Planning 10
11 GRAPHPLAN as a heuristic Let P = (O, I, G) be a relaxed problem.graphplan is guaranteed to do not find any mutex, since there are no deletes! GRAPHPLAN is known to find a solution to P in polynomial time in l (the largest add list), I and O : O 0, O 1,..., O m 1 where O i is the set of selected operators in layer i and m is the goal layer FF employs the following heuristic function: Tipically h(s) h add h(s) = i=0,...,m 1 O i Automated Planning 11
12 Example Nivel 0 libre(b) encima(b,c) en mesa(c) B C QUITAR (B,C) Nivel 1 libre(b) encima(b,c) en mesa(c) sujeto(b) libre(c) LEVANTAR (C) DEJAR (B) Nivel 2 encima(b,c) en mesa(c) sujeto(b) libre(c) sujeto(c) en mesa(b) libre(b) PONER (C,B) Nivel 3 encima(b,c) en mesa(c) sujeto(b) libre(c) sujeto(c) en mesa(b) encima(c,b) libre(c) C B Solucion = {QUITAR(B,C), <LEVANTAR(C),DEJAR(B)>, PONER(C,B)} h(s) = = 4 Automated Planning 12
13 Fast-Forward Plan Generation (FF) [Hoffmann and Nebel, 2001] FF: it makes use of the heuristic function h(s) with a variant of breadth-first search known as enforced hill-climbing which is substituted by a BFS when the former does not find any solution The computation of the relaxed GRAPHPLAN is improved trying to compute the shortest paths: NOOPS-First Dificulty measures: dif (o) = p pre(o) Linearized sets of actions min{i p appears in layer i} Automated Planning 13
14 FF [Hoffmann and Nebel, 2001] FF: it makes use of the heuristic function h(s) with a variant of breadth-first search known as enforced hill-climbing which is substituted by a BFS when the former does not find any solution The computation of the relaxed GRAPHPLAN is improved trying to compute the shortest paths: NOOPs-First Difficulty measures: dif (o) = min{i p appears in layer i} p pre(o) Linearized sets of actions METRIC-FF: cost-based FF [Hoffmann, 2003] Automated Planning 14
15 Indice 1 Introduction 2 Classical planning 3 Neoclassical planning 4 Heuristics Hierarchical Task Networks Control knowledge Machine learning 5 Planning in the real world Automated Planning 15
16 References Blai Bonet and Hector Geffner. Planning as heuristic search. Artificial Intelligence, 129(1-2):5 33, Jörg Hoffmann and Bernhard Nebel. The FF planning system: Fast plan generation through heuristic search. Journal of Artificial Intelligence Research, 14: , Jörg Hoffmann. The Metric-FF planning system: Translating ignoring delete lists to numeric state variables. Journal of Artificial Intelligence Research, 20: , Judea Pearl. Heuristics: Intelligent Search Strategies for Computer Problem Solving. Automated Planning 16
17 Addison-Wesley, Automated Planning 17
Optimal Planning with ACO
Optimal Planning with ACO M.Baioletti, A.Milani, V.Poggioni, F.Rossi Dipartimento Matematica e Informatica Universit di Perugia, ITALY email: {baioletti, milani, poggioni, rossi}@dipmat.unipg.it Abstract.
More informationSemantic Web Service Composition Planning with OWLS-Xplan
Semantic Web Service Composition Planning with OWLS-Xplan Matthias Klusch, Andreas Gerber German Research Center for Artificial Intelligence, Stuhlsatzenhausweg 3, 66123 Saarbruecken, Germany, {klusch,
More informationNew Admissible Heuristics for Domain-Independent Planning
New Admissible Heuristics for Domain-Independent Planning Patrik Haslum Dept. of Computer Science Linköpings Universitet Linköping, Sweden pahas@ida.liu.se Blai Bonet Depto. de Computación Universidad
More informationAI: A Modern Approach, Chpts. 3-4 Russell and Norvig
AI: A Modern Approach, Chpts. 3-4 Russell and Norvig Sequential Decision Making in Robotics CS 599 Geoffrey Hollinger and Gaurav Sukhatme (Some slide content from Stuart Russell and HweeTou Ng) Spring,
More informationUsing Hierarchical Task Network Planning Techniques to Create Custom Web Search Services over Multiple Biomedical Databases
Using Hierarchical Task Network Planning Techniques to Create Custom Web Search Services over Multiple Biomedical Databases Miguel García-Remesal Biomedical Informatics Group, Dep. Inteligencia Artificial,
More informationPlanning Multi-Modal Transportation Problems
Proceedings of the Twenty-First International Conference on Automated Planning and Scheduling José E. Flórez jflorez@inf.uc3m.es Planning Multi-Modal Transportation Problems Álvaro Torralba Arias de Reyna
More informationPlanning Configuration Relocation on the BonFIRE Infrastructure
Planning Configuration Relocation on the BonFIRE Infrastructure Herry Herry and Paul Anderson School of Informatics, University of Edinburgh Edinburgh, UK h.herry@sms.ed.ac.uk, dcspaul@ed.ac.uk Abstract
More informationJournal of Articial Intelligence Research 20 (2003) 291-341 Submitted 10/02 published 12/03 The Metric-FF Planning System: Translating \Ignoring Delete Lists" to Numeric State Variables Jorg Homann Institut
More informationSome Research Directions in Automated Pentesting
Carlos Sarraute Research Directions in Automated Pentesting 1/50 Some Research Directions in Automated Pentesting Carlos Sarraute CoreLabs & ITBA PhD program Buenos Aires, Argentina H2HC October 29/30,
More informationA Visual Programming Tool for Designing Planning Problems for. Semantic Web Service Composition
A Visual Programming Tool for Designing Planning Problems for Semantic Web Service Composition Abstract Dimitris Vrakas 1, Ourania Hatzi 2, Nick Bassiliades 1, Dimosthenis Anagnostopoulos 2 and Ioannis
More informationAnalysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
More informationOrdered Landmarks in Planning
Journal of Artificial Intelligence Research 22 (2004) 215-278 Submitted 05/04; published 11/04 Ordered Landmarks in Planning Jörg Hoffmann Max-Planck-Institut für Informatik, Saarbrücken, Germany Julie
More informationProgramming Using Python
Introduction to Computation and Programming Using Python Revised and Expanded Edition John V. Guttag The MIT Press Cambridge, Massachusetts London, England CONTENTS PREFACE xiii ACKNOWLEDGMENTS xv 1 GETTING
More informationUsing AI Techniques to improve Pentesting Automation
Using AI Techniques to improve Pentesting Automation Carlos Sarraute Core Security Technologies and Ph.D. program in Informatics Engineering, ITBA Hackito Ergo Sum April 8-10, 2010 Brief presentation My
More informationImproving Knowledge-Based System Performance by Reordering Rule Sequences
Improving Knowledge-Based System Performance by Reordering Rule Sequences Neli P. Zlatareva Department of Computer Science Central Connecticut State University 1615 Stanley Street New Britain, CT 06050
More informationA Logic Approach for LTL System Modification
A Logic Approach for LTL System Modification Yulin Ding and Yan Zhang School of Computing & Information Technology University of Western Sydney Kingswood, N.S.W. 1797, Australia email: {yding,yan}@cit.uws.edu.au
More informationA Mathematical Programming Solution to the Mars Express Memory Dumping Problem
A Mathematical Programming Solution to the Mars Express Memory Dumping Problem Giovanni Righini and Emanuele Tresoldi Dipartimento di Tecnologie dell Informazione Università degli Studi di Milano Via Bramante
More informationOn-line Planning and Scheduling for High-speed Manufacturing
On-line Planning and Scheduling for High-speed Manufacturing Wheeler Ruml and Minh B. Do and Markus P. J. Fromherz Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, CA 94304 ruml, minhdo, fromherz
More informationPOMPDs Make Better Hackers: Accounting for Uncertainty in Penetration Testing. By: Chris Abbott
POMPDs Make Better Hackers: Accounting for Uncertainty in Penetration Testing By: Chris Abbott Introduction What is penetration testing? Methodology for assessing network security, by generating and executing
More informationOn-line Planning and Scheduling in a High-speed Manufacturing Domain
On-line Planning and Scheduling in a High-speed Manufacturing Domain Wheeler Ruml and Markus P. J. Fromherz Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, CA 94304 ruml,fromherz at parc.com
More informationProposal for New Program: BS in Data Science: Computational Analytics
Proposal for New Program: BS in Data Science: Computational Analytics 1. Rationale... The proposed Data Science: Computational Analytics major is designed for students interested in developing expertise
More informationSYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis
SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: M.Vidyasagar@utdallas.edu October 17, 2015 Outline
More informationARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION
1 ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION B. Mikó PhD, Z-Form Tool Manufacturing and Application Ltd H-1082. Budapest, Asztalos S. u 4. Tel: (1) 477 1016, e-mail: miko@manuf.bme.hu
More informationSIMS 255 Foundations of Software Design. Complexity and NP-completeness
SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 mdw@cs.berkeley.edu 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity
More informationnpsolver A SAT Based Solver for Optimization Problems
npsolver A SAT Based Solver for Optimization Problems Norbert Manthey and Peter Steinke Knowledge Representation and Reasoning Group Technische Universität Dresden, 01062 Dresden, Germany peter@janeway.inf.tu-dresden.de
More informationSearch methods motivation 1
Suppose you are an independent software developer, and your software package Windows Defeater R, widely available on sourceforge under a GNU GPL license, is getting an international attention and acclaim.
More informationINTEGER PROGRAMMING. Integer Programming. Prototype example. BIP model. BIP models
Integer Programming INTEGER PROGRAMMING In many problems the decision variables must have integer values. Example: assign people, machines, and vehicles to activities in integer quantities. If this is
More informationChapter 6. Decoding. Statistical Machine Translation
Chapter 6 Decoding Statistical Machine Translation Decoding We have a mathematical model for translation p(e f) Task of decoding: find the translation e best with highest probability Two types of error
More informationTeaching Scheme. Theory Practical Course Code L T P Credits Max. Min. Max. Min. ISE 10. -- -- 1MA201 Linear Algebra 3 1-4
Teaching and for Second Year B.Tech Program in Information Technology I Semester With Effective from 201213 Theory Practical Scheme Marks Marks L T P Credits Max. Min. Max. Min. 1MA201 Linear Algebra 3
More informationTopics in basic DBMS course
Topics in basic DBMS course Database design Transaction processing Relational query languages (SQL), calculus, and algebra DBMS APIs Database tuning (physical database design) Basic query processing (ch
More informationArithmetic Coding: Introduction
Data Compression Arithmetic coding Arithmetic Coding: Introduction Allows using fractional parts of bits!! Used in PPM, JPEG/MPEG (as option), Bzip More time costly than Huffman, but integer implementation
More informationA STRATEGIC PLANNER FOR ROBOT EXCAVATION' by Humberto Romero-Lois, Research Assistant, Department of Civil Engineering
A STRATEGIC PLANNER FOR ROBOT EXCAVATION' by Humberto Romero-Lois, Research Assistant, Department of Civil Engineering Chris Hendrickson, Professor, Department of Civil Engineering, and Irving Oppenheim,
More informationHow To Manage A Distributed Application
of E-Commerce Brokerage Services Jorge E. López de Vergara, Víctor A. Villagrá, Juan I. Asensio, José I. Moreno, Julio J. Berrocal. Dept. de Ingeniería de Sistemas Telemáticos Universidad Politécnica de
More informationFactored Planning: How, When, and When Not
Factored Planning: How, When, and When Not Ronen I. Brafman Department of Computer Science Stanford University, CA, USA brafman@cs.stanford.edu Carmel Domshlak Faculty of Industrial Engineering and Management
More informationIntelligent Search Heuristics for Cost Based Scheduling. Murphy Choy Michelle Cheong. Abstract
Intelligent Search Heuristics for Cost Based Scheduling Murphy Choy Michelle Cheong Abstract Nurse scheduling is a difficult optimization problem with multiple constraints. There is extensive research
More informationQuantum and Non-deterministic computers facing NP-completeness
Quantum and Non-deterministic computers facing NP-completeness Thibaut University of Vienna Dept. of Business Administration Austria Vienna January 29th, 2013 Some pictures come from Wikipedia Introduction
More informationLean Software Development Domain
Lean Software Development Domain Marcelo Udo 1 and Tiago Stegun Vaquero 2 and José Reinaldo Silva 2 and Flavio Tonidandel 1 1 Centro Universitário da FEI IAAA Artificial Intelligence Applied in Automation
More informationReal Time Traffic Monitoring With Bayesian Belief Networks
Real Time Traffic Monitoring With Bayesian Belief Networks Sicco Pier van Gosliga TNO Defence, Security and Safety, P.O.Box 96864, 2509 JG The Hague, The Netherlands +31 70 374 02 30, sicco_pier.vangosliga@tno.nl
More informationA Review of Machine Learning for Automated Planning
The Knowledge Engineering Review, Vol. 00:0, 1 24. c 2009, Cambridge University Press DOI: 10.1017/S000000000000000 Printed in the United Kingdom A Review of Machine Learning for Automated Planning SERGIO
More informationWhy? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
More informationApproximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
More informationHome Page. Data Structures. Title Page. Page 1 of 24. Go Back. Full Screen. Close. Quit
Data Structures Page 1 of 24 A.1. Arrays (Vectors) n-element vector start address + ielementsize 0 +1 +2 +3 +4... +n-1 start address continuous memory block static, if size is known at compile time dynamic,
More informationDatabase Scheme Configuration for a Product Line of MPC-TOOLS
Database Scheme Configuration for a Product Line of MPC-TOOLS Benjamin Klöpper, Tobias Rust, Bernhard Vedder, and Wilhelm Dangelmaier Heinz Nixdorf Institute, University of Paderborn, Fürstenallee 11,
More informationAccurate and robust image superresolution by neural processing of local image representations
Accurate and robust image superresolution by neural processing of local image representations Carlos Miravet 1,2 and Francisco B. Rodríguez 1 1 Grupo de Neurocomputación Biológica (GNB), Escuela Politécnica
More information5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition
More informationDistance Degree Sequences for Network Analysis
Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation
More informationCPSC 211 Data Structures & Implementations (c) Texas A&M University [ 313]
CPSC 211 Data Structures & Implementations (c) Texas A&M University [ 313] File Structures A file is a collection of data stored on mass storage (e.g., disk or tape) Why on mass storage? too big to fit
More informationA Beam Search Heuristic for Multi-Mode Single Resource Constrained Project Scheduling
A Beam Search Heuristic for Multi-Mode Single Resource Constrained Project Scheduling Chuda Basnet Department of Management Systems The University of Waikato Private Bag 3105 Hamilton chuda@waikato.ac.nz
More informationIntegrated support system for planning and scheduling... 2003/4/24 page 75 #101. Chapter 5 Sequencing and assignment Strategies
Integrated support system for planning and scheduling... 2003/4/24 page 75 #101 Chapter 5 Sequencing and assignment Strategies 5.1 Overview This chapter is dedicated to the methodologies used in this work
More informationArtificial Intelligence Approaches to Spacecraft Scheduling
Artificial Intelligence Approaches to Spacecraft Scheduling Mark D. Johnston Space Telescope Science Institute/Space Telescope-European Coordinating Facility Summary: The problem of optimal spacecraft
More informationIntroduction. Real World Planning. Planning with Time. Time 15/11/2012. COMP219: Artificial Intelligence. COMP219: Artificial Intelligence
COMP219: Artificial Intelligence COMP219: Artificial Intelligence Dr. Annabel Latham Room 2.05 Ashton Building Department of Computer Science University of Liverpool Lecture 26: Real World Planning: Scheduling
More informationVector storage and access; algorithms in GIS. This is lecture 6
Vector storage and access; algorithms in GIS This is lecture 6 Vector data storage and access Vectors are built from points, line and areas. (x,y) Surface: (x,y,z) Vector data access Access to vector
More informationMoving Target Search. 204 Automated Reasoning
Moving Target Search Toru Ishida NTT Communications and Information Processing Laboratories 1-2356, Take, Yokosuka, 238-03, JAPAN ishida%nttkb.ntt.jp@relay.cs.net Richard E. Korf Computer Science Department
More informationA Scala DSL for Rete-based Runtime Verification
A Scala DSL for Rete-based Runtime Verification Klaus Havelund Jet Propulsion Laboratory California Institute of Technology, California, USA Abstract. Runtime verification (RV) consists in part of checking
More informationDynamic Memory Management for Embedded Real-Time Systems
Dynamic Memory Management for Embedded Real-Time Systems Alfons Crespo, Ismael Ripoll and Miguel Masmano Grupo de Informática Industrial Sistemas de Tiempo Real Universidad Politécnica de Valencia Instituto
More informationTechniques to Produce Good Web Service Compositions in The Semantic Grid
Techniques to Produce Good Web Service Compositions in The Semantic Grid Eduardo Blanco Universidad Simón Bolívar, Departamento de Computación y Tecnología de la Información, Apartado 89000, Caracas 1080-A,
More informationMotivated by a problem faced by a large manufacturer of a consumer product, we
A Coordinated Production Planning Model with Capacity Expansion and Inventory Management Sampath Rajagopalan Jayashankar M. Swaminathan Marshall School of Business, University of Southern California, Los
More informationHeuristics for Numeric Planning via Subgoaling
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI-16) Heuristics for Numeric Planning via Subgoaling Enrico Scala, 1 Patrik Haslum, 1,2 Sylvie Thiébaux, 1,2
More informationARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING)
ARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING) Gabriela Ochoa http://www.cs.stir.ac.uk/~goc/ OUTLINE Preliminaries Classification and Clustering Applications
More informationCourse Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015
Course Outline Department of Computing Science Faculty of Science COMP 710 - Applied Artificial Intelligence (,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description : Students
More informationA Performance Study of Load Balancing Strategies for Approximate String Matching on an MPI Heterogeneous System Environment
A Performance Study of Load Balancing Strategies for Approximate String Matching on an MPI Heterogeneous System Environment Panagiotis D. Michailidis and Konstantinos G. Margaritis Parallel and Distributed
More informationCS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
More informationUsing Ant Colony Optimization for Infrastructure Maintenance Scheduling
Using Ant Colony Optimization for Infrastructure Maintenance Scheduling K. Lukas, A. Borrmann & E. Rank Chair for Computation in Engineering, Technische Universität München ABSTRACT: For the optimal planning
More informationSecurity-Aware Beacon Based Network Monitoring
Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan Email: {sasaki, liang, nag}@amp.i.kyoto-u.ac.jp
More informationTypical programme structures for MSc programmes in the School of Computing Science
Typical programme structures for MSc programmes in the School of Computing Science 1 If you have a good degree in a subject other than computing: MSc Information Technology MSc Software Development 2 MSc
More information6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
More informationarxiv:1306.4044v2 [cs.cr] 19 Jun 2013
Attack Planning in the Real World Jorge Lucangeli Obes Core Security Technologies jlucangelio@coresecurity.com Carlos Sarraute and Gerardo Richarte Core Security Technologies and Instituto Tecnologico
More informationAn approach for fusing data from multiple sources to support construction productivity monitoring
icccbe 2010 Nottingham University Press Proceedings of the International Conference on Computing in Civil and Building Engineering W Tizani (Editor) An approach for fusing data from multiple sources to
More informationA new Branch-and-Price Algorithm for the Traveling Tournament Problem (TTP) Column Generation 2008, Aussois, France
A new Branch-and-Price Algorithm for the Traveling Tournament Problem (TTP) Column Generation 2008, Aussois, France Stefan Irnich 1 sirnich@or.rwth-aachen.de RWTH Aachen University Deutsche Post Endowed
More informationThe van Hoeij Algorithm for Factoring Polynomials
The van Hoeij Algorithm for Factoring Polynomials Jürgen Klüners Abstract In this survey we report about a new algorithm for factoring polynomials due to Mark van Hoeij. The main idea is that the combinatorial
More informationClass-specific Sparse Coding for Learning of Object Representations
Class-specific Sparse Coding for Learning of Object Representations Stephan Hasler, Heiko Wersing, and Edgar Körner Honda Research Institute Europe GmbH Carl-Legien-Str. 30, 63073 Offenbach am Main, Germany
More information2x 2x 2 8x. Now, let s work backwards to FACTOR. We begin by placing the terms of the polynomial inside the cells of the box. 2x 2
Activity 23 Math 40 Factoring using the BOX Team Name (optional): Your Name: Partner(s): 1. (2.) Task 1: Factoring out the greatest common factor Mini Lecture: Factoring polynomials is our focus now. Factoring
More informationCharles Fleurent Director - Optimization algorithms
Software Tools for Transit Scheduling and Routing at GIRO Charles Fleurent Director - Optimization algorithms Objectives Provide an overview of software tools and optimization algorithms offered by GIRO
More informationConfiguring Backup Settings. Copyright 2009, Oracle. All rights reserved.
Configuring Backup Settings Objectives After completing this lesson, you should be able to: Use Enterprise Manager to configure backup settings Enable control file autobackup Configure backup destinations
More informationThe Data Mining Process
Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data
More informationPolicy Analysis for Administrative Role Based Access Control without Separate Administration
Policy nalysis for dministrative Role Based ccess Control without Separate dministration Ping Yang Department of Computer Science, State University of New York at Binghamton, US Mikhail I. Gofman Department
More informationIntroduction Simulated Pentesting Language Generation Printer Control Conclusion References. Automatic Planning
Jörg Hoffmann and Álvaro Torralba Automatic Planning Chapter 4: Applications 1/52 Automatic Planning 4. Applications A Few Problems We Can Solve (and Which Some People Care About) Jörg Hoffmann and Álvaro
More informationClassification - Examples
Lecture 2 Scheduling 1 Classification - Examples 1 r j C max given: n jobs with processing times p 1,...,p n and release dates r 1,...,r n jobs have to be scheduled without preemption on one machine taking
More information5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
More informationContext-Aware Route Planning
Context-Aware Route Planning A. W. ter Mors, C. Witteveen, J. Zutt, F. A. Kuipers Delft University of Technology September 28, 2010 Problem description A set of agents, each with their own start and destination
More informationMEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
More informationInfrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch
Network Infrastructure or building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater
More informationALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center
ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center A NEW NETWORK PARADIGM What do the following trends have in common? Virtualization Real-time applications
More informationActivity Mining for Discovering Software Process Models
Activity Mining for Discovering Software Process Models Ekkart Kindler, Vladimir Rubin, Wilhelm Schäfer Software Engineering Group, University of Paderborn, Germany [kindler, vroubine, wilhelm]@uni-paderborn.de
More informationCRLS Mathematics Department Algebra I Curriculum Map/Pacing Guide
Curriculum Map/Pacing Guide page 1 of 14 Quarter I start (CP & HN) 170 96 Unit 1: Number Sense and Operations 24 11 Totals Always Include 2 blocks for Review & Test Operating with Real Numbers: How are
More informationThe mathematics of RAID-6
The mathematics of RAID-6 H. Peter Anvin 1 December 2004 RAID-6 supports losing any two drives. The way this is done is by computing two syndromes, generally referred P and Q. 1 A quick
More informationPlanning with Subdomains and forests
Factored Planning Eyal Amir and Barbara Engelhardt Computer Science Division, University of California at Berkeley Berkeley, CA 94720-1776, USA {eyal,bee}@cs.berkeley.edu Abstract We present a general-purpose
More informationFast Sequential Summation Algorithms Using Augmented Data Structures
Fast Sequential Summation Algorithms Using Augmented Data Structures Vadim Stadnik vadim.stadnik@gmail.com Abstract This paper provides an introduction to the design of augmented data structures that offer
More informationStrategic planning in LTL logistics increasing the capacity utilization of trucks
Strategic planning in LTL logistics increasing the capacity utilization of trucks J. Fabian Meier 1,2 Institute of Transport Logistics TU Dortmund, Germany Uwe Clausen 3 Fraunhofer Institute for Material
More informationImproving the Performance of a Computer-Controlled Player in a Maze Chase Game using Evolutionary Programming on a Finite-State Machine
Improving the Performance of a Computer-Controlled Player in a Maze Chase Game using Evolutionary Programming on a Finite-State Machine Maximiliano Miranda and Federico Peinado Departamento de Ingeniería
More informationAlgebra Cheat Sheets
Sheets Algebra Cheat Sheets provide you with a tool for teaching your students note-taking, problem-solving, and organizational skills in the context of algebra lessons. These sheets teach the concepts
More information8. KNOWLEDGE BASED SYSTEMS IN MANUFACTURING SIMULATION
- 1-8. KNOWLEDGE BASED SYSTEMS IN MANUFACTURING SIMULATION 8.1 Introduction 8.1.1 Summary introduction The first part of this section gives a brief overview of some of the different uses of expert systems
More informationComplexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
More informationBackward Scheduling An effective way of scheduling Warehouse activities
Backward Scheduling An effective way of scheduling Warehouse activities Traditionally, scheduling algorithms were used in capital intensive production processes where there was a need to optimize the production
More informationRevolutionized DB2 Test Data Management
Revolutionized DB2 Test Data Management TestBase's Patented Slice Feature Provides a Fresh Solution to an Old Set of DB2 Application Testing Problems The challenge in creating realistic representative
More informationPairwise Sequence Alignment
Pairwise Sequence Alignment carolin.kosiol@vetmeduni.ac.at SS 2013 Outline Pairwise sequence alignment global - Needleman Wunsch Gotoh algorithm local - Smith Waterman algorithm BLAST - heuristics What
More information6.231 Dynamic Programming and Stochastic Control Fall 2008
MIT OpenCourseWare http://ocw.mit.edu 6.231 Dynamic Programming and Stochastic Control Fall 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 6.231
More informationTeaching Introductory Artificial Intelligence with Pac-Man
Teaching Introductory Artificial Intelligence with Pac-Man John DeNero and Dan Klein Computer Science Division University of California, Berkeley {denero, klein}@cs.berkeley.edu Abstract The projects that
More informationBachelor Degree in Informatics Engineering Master courses
Bachelor Degree in Informatics Engineering Master courses Donostia School of Informatics The University of the Basque Country, UPV/EHU For more information: Universidad del País Vasco / Euskal Herriko
More informationINTELLIGENT TELECOMMUNICATION TECHNOLOGIES
Appears in Knowledge-Based Intelligent Techniques in Industry (chapter 8), L. C. Jain, editor, CRC Press, 249-275, 1998. INTELLIGENT TELECOMMUNICATION TECHNOLOGIES Gary Weiss, John Eddy, Sholom Weiss Network
More information