Lehrstuhl für Informatik 2
|
|
- Drusilla Horton
- 8 years ago
- Views:
Transcription
1 Analytical Learning Introduction Lehrstuhl Explanation is used to distinguish the relevant features of the training examples from the irrelevant ones, so that the examples can be generalised Introduction 3 Prior knowledge and deductive reasoning is used to augment the information provided by the training examples Prior knowledge is used to reduce the complexity of hypothesis space Assumption: learner's prior knowledge is correct and complete Difference between Inductive and Analytical Learning Introduction 2 für Informatik 2 Example: Learn to recognise important classes of games Difference Analytical Learning between Inductive and Goal: Recognise chessboard positions in which black will lose its queen within two moves Induction can be employed <=> Problem: thousands of training examples similar to this one are needed Suggested target hypothesis: board position in which the black king and queen are simultaneously attacked Not suggested: board position in which four white pawns are still in their original location Explanations of human beings provide the information needed to rationally generalise from details Prior knowledge: e.g. knowledge about the rules of chess: legal moves, how is the game won,... Given just this prior knowledge it is possible in principle to calculate the optimal chess move for any board position <=> in practice it will be frustratingly complex Goal: learning algorithm that automatically constructs and learns a move from such explanations Analytical learning methods seek a hypothesis that fits the learner's prior knowledge and covers the training examples Explanation based learning is a form of analytical learning in which the learner processes each new training example by Explaining the observed target value for this example in terms of the domain theory Analysing this explanation to determine the general conditions under which the explanation holds Refining its hypothesis to incorporate these general conditions 1
2 Difference Analytical between Learning Inductive (2) and New Example Difference: They assume two different formulations of the learning problem: Inductive learning: input: hypothesis space H + set of training examples D= { x,f 1 ( x 1),..., x n,f ( xn ) } output: hypothesis h, that is consistent with these training examples Analytical learning: input: hypothesis space H + set of training examples D= x,f 1 x 1,..., x n,f xn + domain theory B consisting of background knowledge (used to explain the training examples) output: hypothesis h, that is consistent with both the training examples D and the domain theory B { ( ) ( ) } Given: Instance space X: Each instance describes a pair of objects represented by the predicates Type, Color, Volume, Owner, Material, Density and On. Hypothesis space H: Each hypothesis is a set of Horn clauses. The head of each clause is a literal of the target predicate SafeToStack. The body of each Horn clause is a conjunction of literals based on the same predicates used to describe the instances + LessThan Equal GreaterThan + function: plus minus times Target concept: SafeToStack ( x,y) Volume ( x,vx ) Volume ( y,vy ) LessThan ( vx,vy ) Training examples: On(Obj1, Obj2) Owner (Obj1, Fred) Type(Obj1, Box) Owner (Obj2, Louise) Type(Obj2, Endtable) Density(Obj1, 0.3) Color(Obj1, red) Material (Obj1, Carboard) Color(Obj2, Blue) Material (Obj1, Wood) Volume(Obj1, 2) Difference Analytical between Learning Inductive (3) and New Example 2 Learning PROLOG-EBG with Perfect Domain Theories: Illustration: f ( x i ) is True if x i is a situation in which black will lose its queen within two moves and False otherwise H: set of Horn-clauses where predicates used by the rules refer to the position or relative position of specific pieces B: formalisation of the rules of chess Domain Theory B: SafeToStack ( x, y ) Fragile ( y ) SafeToStack ( x,y ) Lighter ( x, y) Lighter ( x, y) Weight ( x,wx ) Weight ( y,wy ) LessThan ( wx, wy) Weight ( x, w ) Volume( x, v) Density ( x, d ) Equal( w, ( v,d )) W eight ( x,5) Type ( x, Endtable) Fragile ( x ) M aterial( x, Glass ) Determine: A hypothesis from H consistent with the training examples and the domain theory Learning with Perfect Domain Theories: PROLOG-EBG An Illustrative Trace Explanation-Based Learning of Search Control Knowledge A domain theory is said to be correct if each of its assertions is a truthful statement about the world A domain theory is complete with respect to a given target concept and instance space, if the domain theory covers every positive example in the instance space. It is not required that the domain theory is able to prove that negative examples do not satisfy the target concept. 2
3 Learning PROLOG-EBG with (2) Perfect Domain Theories: Learning PROLOG-EBG with (4) Perfect Domain Theories: An Illustrative Trace (3) Question: The learner had a perfect domain theory, why would it need to learn? Answer: There are cases in which it is feasible to provide a perfect domain theory It is unreasonable to assure that a perfect domain theory is available. A realistic assumption is that plausible explanations based on imperfect domain theories must be used, rather than exact proofs based on perfect knowledge. Repeatedly: Domain theory is correct and complete this explanation constitutes a proof that the training examples satisfy the target concept PROLOG-EBG(TargetConcept, TrainingExamples, Domain Theory) LearnedRules { } Pos the positive examples from TrainingExamples for each PositiveExample in Pos that is not covered by LearnedRules do Explain Explanation an explanation (proof) in terms of the DomainTheory that PositiveExample satisfies the TargetConcept Analyse Sufficient Condition the most general set of features of PositiveExample sufficient to satisfy the TargetConcept according to the Explanation Refine LearnedRules LearnedRules + NewHornClause, where NewHornClause is of the form TargetConcept SufficientConditions In general there may be multiple possible explanations Any or all of the explanations may be used. Explanation is generated using backward chaining search as performed by PROLOG. General rule justified by the domain theory: SafeToStack ( x,y) Volume ( x,2) Density ( x,0.3 ) Type ( y,endtable ) leaf node in the proof tree expects Equal(0.6,times(2,03) and LessThan(0.6,5) Learning PROLOG-EBG with (3) Perfect Domain Theories: An Illustrative Trace (2) An Illustrative Trace (4) PROLOG-EBG (Kedar-Cabelli and McCarthy 1987) Sequential covering algorithm When given a complete and correct domain theory, the method is guaranteed to output a hypothesis (set of rules) that is correct and that covers the observed positive training examples Output: set of logically sufficient conditions for the target concept, according the domain theory The imprtant question in the generalising-process: Of the many features that happen to be true of the current training example, which ones are generally relevant to the target concept? Explanation constructs the answer: Precisely the features mentioned in the explanation Explanation of the training example forms the proof for the correctness of this rule PROLOG-EBG computes the most general rule that can be justified by the explanation, by computing the weakest preimage of the explanation Definition: The weakest preimage of a conclusion C with respect to a proof P is the most general set of initial assertions A, such that A entails C according to P. Example: SafeToStack ( x,y) Volume ( x,vx ) Density ( x,dx ) Equal ( wx,times ( vx,dx )) LessThan ( wx,5) Type( y,endtable) PROLOG_EBG computes the weakest preimage of the target concept with respect to the explanation, using a general procedure called regression Regression: go iteratively backward through the explanation, first computing the weakest preimage of the target concept with respect to the final proof step in the explanation Computing the weakest preimage of the resulting expressions with respect to the proceeding step and so on 3
4 An Illustrative Trace (5) Remarks on Explanation-Based Learning Remarks Explanation-Based Learning 2 Discovering new features An Illustrative Trace 5 Remarks on Explanation-Based Learning Remarks Explanation-Based Learning 3 Key properties: PROLOG-EBG produces justified general hypotheses by using prior knowledge to analyse individual examples The explanation about the way how an example satisfies the target concept determines which example attributes are relevant: the ones mentioned by the explanation Regressing the target concept to determine its weakest preimage with respect to the explanation allows deriving more general constraints on the values of relevant features Each learned Horn clause corresponds to a sufficient condition for satisfying the target concept The generality of the learned Horn clauses will depend on the formulation of the domain theory and on the sequence in which the training examples are considered Implicitly assumes that the domain theory is correct and complete Related perspectives to help to understand its capabilities and limitations: EBL as theory guided generalisation of examples: Rational generalisation from examples allows to avoid the bounds on sample complexity that occured in pure inductive learning EBL as example guided reformulation of theories: Method for reformulating the domain theory into more operational form: Creating rules that: Deductively follow the domain theory Classify the observed training examples in a single inference step Related perspectives to help to understand its capabilities and limitations: EBL is just restating what the learner already knows : In what sense does this quality help to learn then? Knowledge reformulation: In many tasks the difference between what one knows in principle and what one can efficiently compute in practice may be great Situation: Complete perfect domain theory is already known to the (human) learner, and further learning is simple! So it's a matter of reformulating this knowledge into a form in which it can be used more effectively to select appropriate moves. 4
5 Remarks Explanation-Based Learning 4 Knowledge Compilation: EBL involves reformulating the domain theory to produce general rules that classify examples in a single inference step Summary Discovering new features are needed to describe the general rule underlying the training examples Summary Interesting capability: Ability to formulate new features that are not explicitly in the description of the training examples but that This feature is similarly represented by the hidden units of neural networks Like the BACKPROPAGATION algorithm, PROLOG_EBG automatically formulates such features in its attempt to fit the training data BUT: In neural networks it's developed in a statistical process PROLOG-EBG it's derived in an analytical process Example: derives the feature Volume Density >5 PROLOG-EBG Uses first order Horn clauses in its domain theory and in its learned hypotheses The explanation is a PROLOG proof The hypothesis extracted from the explanation is the weakest preimage of this proof Analytical learning methods construct useful intermediate features as a side effect of analysing individual training examples. Other deductive learning procedures can extend the deductive closure of their domain. PRODIGY and SOAR have demonstrated the utility of explanation based learning methods for automatically acquiring effective search control knowledge that speeds up problem solving Disadvantage: purely deductive implementations such as PROLOG- EBG produce a correct output if the domain theory is also correct 5
Machine Learning and Data Mining. Fundamentals, robotics, recognition
Machine Learning and Data Mining Fundamentals, robotics, recognition Machine Learning, Data Mining, Knowledge Discovery in Data Bases Their mutual relations Data Mining, Knowledge Discovery in Databases,
More informationSome Research Challenges for Big Data Analytics of Intelligent Security
Some Research Challenges for Big Data Analytics of Intelligent Security Yuh-Jong Hu hu at cs.nccu.edu.tw Emerging Network Technology (ENT) Lab. Department of Computer Science National Chengchi University,
More informationAbstract. The DNA promoter sequences domain theory and database have become popular for
Journal of Artiæcial Intelligence Research 2 è1995è 361í367 Submitted 8è94; published 3è95 Research Note On the Informativeness of the DNA Promoter Sequences Domain Theory Julio Ortega Computer Science
More informationIndiana State Core Curriculum Standards updated 2009 Algebra I
Indiana State Core Curriculum Standards updated 2009 Algebra I Strand Description Boardworks High School Algebra presentations Operations With Real Numbers Linear Equations and A1.1 Students simplify and
More informationLogic in general. Inference rules and theorem proving
Logical Agents Knowledge-based agents Logic in general Propositional logic Inference rules and theorem proving First order logic Knowledge-based agents Inference engine Knowledge base Domain-independent
More informationLearning is a very general term denoting the way in which agents:
What is learning? Learning is a very general term denoting the way in which agents: Acquire and organize knowledge (by building, modifying and organizing internal representations of some external reality);
More informationCHANCE ENCOUNTERS. Making Sense of Hypothesis Tests. Howard Fincher. Learning Development Tutor. Upgrade Study Advice Service
CHANCE ENCOUNTERS Making Sense of Hypothesis Tests Howard Fincher Learning Development Tutor Upgrade Study Advice Service Oxford Brookes University Howard Fincher 2008 PREFACE This guide has a restricted
More informationCS510 Software Engineering
CS510 Software Engineering Propositional Logic Asst. Prof. Mathias Payer Department of Computer Science Purdue University TA: Scott A. Carr Slides inspired by Xiangyu Zhang http://nebelwelt.net/teaching/15-cs510-se
More informationPhilosophical argument
Michael Lacewing Philosophical argument At the heart of philosophy is philosophical argument. Arguments are different from assertions. Assertions are simply stated; arguments always involve giving reasons.
More informationeach college c i C has a capacity q i - the maximum number of students it will admit
n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i
More informationImproving Knowledge-Based System Performance by Reordering Rule Sequences
Improving Knowledge-Based System Performance by Reordering Rule Sequences Neli P. Zlatareva Department of Computer Science Central Connecticut State University 1615 Stanley Street New Britain, CT 06050
More informationBounded Treewidth in Knowledge Representation and Reasoning 1
Bounded Treewidth in Knowledge Representation and Reasoning 1 Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien Luminy, October 2010 1 Joint work with G.
More informationProbabilistic Relational Learning of Human Behavior Models
Probabilistic Relational Learning of Human Behavior Models Negin Nejati and Tolga Könik Computational Learning Laboratory CSLI, Stanford University Stanford, California 94305 {negin, konik}@stanford.edu
More informationFive High Order Thinking Skills
Five High Order Introduction The high technology like computers and calculators has profoundly changed the world of mathematics education. It is not only what aspects of mathematics are essential for learning,
More informationBCS HIGHER EDUCATION QUALIFICATIONS Level 6 Professional Graduate Diploma in IT. March 2013 EXAMINERS REPORT. Knowledge Based Systems
BCS HIGHER EDUCATION QUALIFICATIONS Level 6 Professional Graduate Diploma in IT March 2013 EXAMINERS REPORT Knowledge Based Systems Overall Comments Compared to last year, the pass rate is significantly
More informationWriting learning objectives
Writing learning objectives This material was excerpted and adapted from the following web site: http://www.utexas.edu/academic/diia/assessment/iar/students/plan/objectives/ What is a learning objective?
More informationCoverability for Parallel Programs
2015 http://excel.fit.vutbr.cz Coverability for Parallel Programs Lenka Turoňová* Abstract We improve existing method for the automatic verification of systems with parallel running processes. The technique
More informationVersion Spaces. riedmiller@informatik.uni-freiburg.de
. Machine Learning Version Spaces Prof. Dr. Martin Riedmiller AG Maschinelles Lernen und Natürlichsprachliche Systeme Institut für Informatik Technische Fakultät Albert-Ludwigs-Universität Freiburg riedmiller@informatik.uni-freiburg.de
More informationCFSD 21 ST CENTURY SKILL RUBRIC CRITICAL & CREATIVE THINKING
Critical and creative thinking (higher order thinking) refer to a set of cognitive skills or strategies that increases the probability of a desired outcome. In an information- rich society, the quality
More informationSoftware Engineering Reference Framework
Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of
More informationRigorous Software Development CSCI-GA 3033-009
Rigorous Software Development CSCI-GA 3033-009 Instructor: Thomas Wies Spring 2013 Lecture 11 Semantics of Programming Languages Denotational Semantics Meaning of a program is defined as the mathematical
More informationNotes from Week 1: Algorithms for sequential prediction
CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking
More informationFor example, estimate the population of the United States as 3 times 10⁸ and the
CCSS: Mathematics The Number System CCSS: Grade 8 8.NS.A. Know that there are numbers that are not rational, and approximate them by rational numbers. 8.NS.A.1. Understand informally that every number
More informationDiscovering process models from empirical data
Discovering process models from empirical data Laura Măruşter (l.maruster@tm.tue.nl), Ton Weijters (a.j.m.m.weijters@tm.tue.nl) and Wil van der Aalst (w.m.p.aalst@tm.tue.nl) Eindhoven University of Technology,
More informationReusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach
Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University
More informationCourse 395: Machine Learning
Course 395: Machine Learning Lecturers: Maja Pantic (maja@doc.ic.ac.uk) Stavros Petridis (sp104@doc.ic.ac.uk) Goal (Lectures): To present basic theoretical concepts and key algorithms that form the core
More informationAlgebra I. In this technological age, mathematics is more important than ever. When students
In this technological age, mathematics is more important than ever. When students leave school, they are more and more likely to use mathematics in their work and everyday lives operating computer equipment,
More informationBASIC RULES OF CHESS
BASIC RULES OF CHESS Introduction Chess is a game of strategy believed to have been invented more then 00 years ago in India. It is a game for two players, one with the light pieces and one with the dark
More informationTopic 2: Structure of Knowledge-Based Systems
Engineering (Ingeniería del Conocimiento) Escuela Politécnica Superior, UAM Course 2007-2008 Topic 2: Structure of -Based Systems Contents 2.1 Components according to the Final User 2.2 Components according
More informationWhat is Learning? CS 391L: Machine Learning Introduction. Raymond J. Mooney. Classification. Problem Solving / Planning / Control
What is Learning? CS 391L: Machine Learning Introduction Herbert Simon: Learning is any process by which a system improves performance from experience. What is the task? Classification Problem solving
More informationOverview of the TACITUS Project
Overview of the TACITUS Project Jerry R. Hobbs Artificial Intelligence Center SRI International 1 Aims of the Project The specific aim of the TACITUS project is to develop interpretation processes for
More informationData Project Extract Big Data Analytics course. Toulouse Business School London 2015
Data Project Extract Big Data Analytics course Toulouse Business School London 2015 How do you analyse data? Project are often a flop: Need a problem, a business problem to solve. Start with a small well-defined
More informationSECTION 10-2 Mathematical Induction
73 0 Sequences and Series 6. Approximate e 0. using the first five terms of the series. Compare this approximation with your calculator evaluation of e 0.. 6. Approximate e 0.5 using the first five terms
More informationINTEGER PROGRAMMING. Integer Programming. Prototype example. BIP model. BIP models
Integer Programming INTEGER PROGRAMMING In many problems the decision variables must have integer values. Example: assign people, machines, and vehicles to activities in integer quantities. If this is
More information2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]
Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)
More informationThe Trip Scheduling Problem
The Trip Scheduling Problem Claudia Archetti Department of Quantitative Methods, University of Brescia Contrada Santa Chiara 50, 25122 Brescia, Italy Martin Savelsbergh School of Industrial and Systems
More informationPredicate logic Proofs Artificial intelligence. Predicate logic. SET07106 Mathematics for Software Engineering
Predicate logic SET07106 Mathematics for Software Engineering School of Computing Edinburgh Napier University Module Leader: Uta Priss 2010 Copyright Edinburgh Napier University Predicate logic Slide 1/24
More informationcs171 HW 1 - Solutions
1. (Exercise 2.3 from RN) For each of the following assertions, say whether it is true or false and support your answer with examples or counterexamples where appropriate. (a) An agent that senses only
More informationAnalysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
More information(Refer Slide Time: 01:52)
Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This
More informationThe Classes P and NP
The Classes P and NP We now shift gears slightly and restrict our attention to the examination of two families of problems which are very important to computer scientists. These families constitute the
More informationA Game Theoretical Framework for Adversarial Learning
A Game Theoretical Framework for Adversarial Learning Murat Kantarcioglu University of Texas at Dallas Richardson, TX 75083, USA muratk@utdallas Chris Clifton Purdue University West Lafayette, IN 47907,
More informationApplication of Backward Chaining Method to Computer Forensic
119 Application of Backward Chaining Method to Computer Forensic Hofstra University, Hempstead New York najib.saylani@hofstra.edu Abstract: This paper proposes the exploration of the use of Backward Chaining
More informationTrust but Verify: Authorization for Web Services. The University of Vermont
Trust but Verify: Authorization for Web Services Christian Skalka X. Sean Wang The University of Vermont Trust but Verify (TbV) Reliable, practical authorization for web service invocation. Securing complex
More informationAbout the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013
About the Author The Role of Artificial Intelligence in Software Engineering By: Mark Harman Presented by: Jacob Lear Mark Harman is a Professor of Software Engineering at University College London Director
More informationCHAPTER 7 GENERAL PROOF SYSTEMS
CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes
More informationDATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
More informationAdversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
More informationRegression Verification: Status Report
Regression Verification: Status Report Presentation by Dennis Felsing within the Projektgruppe Formale Methoden der Softwareentwicklung 2013-12-11 1/22 Introduction How to prevent regressions in software
More informationA Semantical Perspective on Verification of Knowledge
A Semantical Perspective on Verification of Knowledge Paul Leemans, Jan Treur, Mark Willems Vrije Universiteit Amsterdam, Department of Artificial Intelligence De Boelelaan 1081a, 1081 HV Amsterdam The
More informationHealthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
More informationIntegrating Benders decomposition within Constraint Programming
Integrating Benders decomposition within Constraint Programming Hadrien Cambazard, Narendra Jussien email: {hcambaza,jussien}@emn.fr École des Mines de Nantes, LINA CNRS FRE 2729 4 rue Alfred Kastler BP
More informationAPPLYING MACHINE LEARNING ALGORITHMS IN SOFTWARE DEVELOPMENT
APPLYING MACHINE LEARNING ALGORITHMS IN SOFTWARE DEVELOPMENT Du Zhang Department of Computer Science California State University Sacramento, CA 95819-6021 zhangd@ecs.csus.edu Abstract Machine learning
More informationTDA and Machine Learning: Better Together
TDA and Machine Learning: Better Together TDA AND MACHINE LEARNING: BETTER TOGETHER 2 TABLE OF CONTENTS The New Data Analytics Dilemma... 3 Introducing Topology and Topological Data Analysis... 3 The Promise
More informationIAI : Expert Systems
IAI : Expert Systems John A. Bullinaria, 2005 1. What is an Expert System? 2. The Architecture of Expert Systems 3. Knowledge Acquisition 4. Representing the Knowledge 5. The Inference Engine 6. The Rete-Algorithm
More informationConcepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
More informationIntroduction to Logic in Computer Science: Autumn 2006
Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding
More informationFull and Complete Binary Trees
Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full
More informationMeasuring the Performance of an Agent
25 Measuring the Performance of an Agent The rational agent that we are aiming at should be successful in the task it is performing To assess the success we need to have a performance measure What is rational
More informationMathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson
Mathematics for Computer Science/Software Engineering Notes for the course MSM1F3 Dr. R. A. Wilson October 1996 Chapter 1 Logic Lecture no. 1. We introduce the concept of a proposition, which is a statement
More informationCHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs
CHAPTER 3 Methods of Proofs 1. Logical Arguments and Formal Proofs 1.1. Basic Terminology. An axiom is a statement that is given to be true. A rule of inference is a logical rule that is used to deduce
More informationPredicate Logic Review
Predicate Logic Review UC Berkeley, Philosophy 142, Spring 2016 John MacFarlane 1 Grammar A term is an individual constant or a variable. An individual constant is a lowercase letter from the beginning
More informationML for the Working Programmer
ML for the Working Programmer 2nd edition Lawrence C. Paulson University of Cambridge CAMBRIDGE UNIVERSITY PRESS CONTENTS Preface to the Second Edition Preface xiii xv 1 Standard ML 1 Functional Programming
More informationComputational Soundness of Symbolic Security and Implicit Complexity
Computational Soundness of Symbolic Security and Implicit Complexity Bruce Kapron Computer Science Department University of Victoria Victoria, British Columbia NII Shonan Meeting, November 3-7, 2013 Overview
More informationMachine Learning. 01 - Introduction
Machine Learning 01 - Introduction Machine learning course One lecture (Wednesday, 9:30, 346) and one exercise (Monday, 17:15, 203). Oral exam, 20 minutes, 5 credit points. Some basic mathematical knowledge
More informationDATA MINING IN FINANCE
DATA MINING IN FINANCE Advances in Relational and Hybrid Methods by BORIS KOVALERCHUK Central Washington University, USA and EVGENII VITYAEV Institute of Mathematics Russian Academy of Sciences, Russia
More informationSQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova
SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova Where someone is building a Web application, often he need to use databases to store information, or to manage user accounts. And
More informationData Mining - Evaluation of Classifiers
Data Mining - Evaluation of Classifiers Lecturer: JERZY STEFANOWSKI Institute of Computing Sciences Poznan University of Technology Poznan, Poland Lecture 4 SE Master Course 2008/2009 revised for 2010
More informationA Learning Based Method for Super-Resolution of Low Resolution Images
A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 emre.ugur@ceng.metu.edu.tr Abstract The main objective of this project is the study of a learning based method
More informationIntroducing Formal Methods. Software Engineering and Formal Methods
Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended
More informationSequential lmove Games. Using Backward Induction (Rollback) to Find Equilibrium
Sequential lmove Games Using Backward Induction (Rollback) to Find Equilibrium Sequential Move Class Game: Century Mark Played by fixed pairs of players taking turns. At each turn, each player chooses
More informationThe Research Proposal
Describes the: The Research Proposal Researchable question itself Why it's important (i.e., the rationale and significance of your research) Propositions that are known or assumed to be true (i.e., axioms
More information3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
More informationPROPERTECHNIQUEOFSOFTWARE INSPECTIONUSING GUARDED COMMANDLANGUAGE
International Journal of Computer ScienceandCommunication Vol. 2, No. 1, January-June2011, pp. 153-157 PROPERTECHNIQUEOFSOFTWARE INSPECTIONUSING GUARDED COMMANDLANGUAGE Neeraj Kumar Singhania University,
More informationAutomated Theorem Proving - summary of lecture 1
Automated Theorem Proving - summary of lecture 1 1 Introduction Automated Theorem Proving (ATP) deals with the development of computer programs that show that some statement is a logical consequence of
More information1 INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN
1 INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN 1.1 INTRODUCTION Systems are created to solve problems. One can think of the systems approach as an organized way of dealing with a problem. In this dynamic
More informationResolution. Informatics 1 School of Informatics, University of Edinburgh
Resolution In this lecture you will see how to convert the natural proof system of previous lectures into one with fewer operators and only one proof rule. You will see how this proof system can be used
More informationProblem of the Month: Perfect Pair
Problem of the Month: The Problems of the Month (POM) are used in a variety of ways to promote problem solving and to foster the first standard of mathematical practice from the Common Core State Standards:
More informationLAKE ELSINORE UNIFIED SCHOOL DISTRICT
LAKE ELSINORE UNIFIED SCHOOL DISTRICT Title: PLATO Algebra 1-Semester 2 Grade Level: 10-12 Department: Mathematics Credit: 5 Prerequisite: Letter grade of F and/or N/C in Algebra 1, Semester 2 Course Description:
More informationThe program also provides supplemental modules on topics in geometry and probability and statistics.
Algebra 1 Course Overview Students develop algebraic fluency by learning the skills needed to solve equations and perform important manipulations with numbers, variables, equations, and inequalities. Students
More informationHow To Know If A Domain Is Unique In An Octempo (Euclidean) Or Not (Ecl)
Subsets of Euclidean domains possessing a unique division algorithm Andrew D. Lewis 2009/03/16 Abstract Subsets of a Euclidean domain are characterised with the following objectives: (1) ensuring uniqueness
More informationTDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended.
Previews of TDWI course books are provided as an opportunity to see the quality of our material and help you to select the courses that best fit your needs. The previews can not be printed. TDWI strives
More informationChapter 11. Managing Knowledge
Chapter 11 Managing Knowledge VIDEO CASES Video Case 1: How IBM s Watson Became a Jeopardy Champion. Video Case 2: Tour: Alfresco: Open Source Document Management System Video Case 3: L'Oréal: Knowledge
More informationComputational Methods for Database Repair by Signed Formulae
Computational Methods for Database Repair by Signed Formulae Ofer Arieli (oarieli@mta.ac.il) Department of Computer Science, The Academic College of Tel-Aviv, 4 Antokolski street, Tel-Aviv 61161, Israel.
More informationSatisfiability Checking
Satisfiability Checking SAT-Solving Prof. Dr. Erika Ábrahám Theory of Hybrid Systems Informatik 2 WS 10/11 Prof. Dr. Erika Ábrahám - Satisfiability Checking 1 / 40 A basic SAT algorithm Assume the CNF
More informationCourse Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015
Course Outline Department of Computing Science Faculty of Science COMP 710 - Applied Artificial Intelligence (,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description : Students
More informationVideogaming and the development of the scientific mind
Report of the Workshop Gaming and the scientific mind- Designing games to develop the scientific mind BtSM 2009 Cairo Designed and held by Carlo Fabricatore, Ph. D. (carlo.fabricatore@initium-studios.com)
More informationRegular Languages and Finite Automata
Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a
More informationScience Stage 6 Skills Module 8.1 and 9.1 Mapping Grids
Science Stage 6 Skills Module 8.1 and 9.1 Mapping Grids Templates for the mapping of the skills content Modules 8.1 and 9.1 have been provided to assist teachers in evaluating existing, and planning new,
More informationReview. Bayesianism and Reliability. Today s Class
Review Bayesianism and Reliability Models and Simulations in Philosophy April 14th, 2014 Last Class: Difference between individual and social epistemology Why simulations are particularly useful for social
More informationHow To Make A Correct Multiprocess Program Execute Correctly On A Multiprocedor
How to Make a Correct Multiprocess Program Execute Correctly on a Multiprocessor Leslie Lamport 1 Digital Equipment Corporation February 14, 1993 Minor revisions January 18, 1996 and September 14, 1996
More informationMaster of Sciences in Informatics Engineering Programming Paradigms 2005/2006. Final Examination. January 24 th, 2006
Master of Sciences in Informatics Engineering Programming Paradigms 2005/2006 Final Examination January 24 th, 2006 NAME: Please read all instructions carefully before start answering. The exam will be
More informationMachine Learning and Data Analysis overview. Department of Cybernetics, Czech Technical University in Prague. http://ida.felk.cvut.
Machine Learning and Data Analysis overview Jiří Kléma Department of Cybernetics, Czech Technical University in Prague http://ida.felk.cvut.cz psyllabus Lecture Lecturer Content 1. J. Kléma Introduction,
More informationTitle. Introduction to Data Mining. Dr Arulsivanathan Naidoo Statistics South Africa. OECD Conference Cape Town 8-10 December 2010.
Title Introduction to Data Mining Dr Arulsivanathan Naidoo Statistics South Africa OECD Conference Cape Town 8-10 December 2010 1 Outline Introduction Statistics vs Knowledge Discovery Predictive Modeling
More informationA Working Knowledge of Computational Complexity for an Optimizer
A Working Knowledge of Computational Complexity for an Optimizer ORF 363/COS 323 Instructor: Amir Ali Ahmadi TAs: Y. Chen, G. Hall, J. Ye Fall 2014 1 Why computational complexity? What is computational
More informationMaschinelles Lernen mit MATLAB
Maschinelles Lernen mit MATLAB Jérémy Huard Applikationsingenieur The MathWorks GmbH 2015 The MathWorks, Inc. 1 Machine Learning is Everywhere Image Recognition Speech Recognition Stock Prediction Medical
More informationData Mining. 1 Introduction 2 Data Mining methods. Alfred Holl Data Mining 1
Data Mining 1 Introduction 2 Data Mining methods Alfred Holl Data Mining 1 1 Introduction 1.1 Motivation 1.2 Goals and problems 1.3 Definitions 1.4 Roots 1.5 Data Mining process 1.6 Epistemological constraints
More informationQuality Control of National Genetic Evaluation Results Using Data-Mining Techniques; A Progress Report
Quality Control of National Genetic Evaluation Results Using Data-Mining Techniques; A Progress Report G. Banos 1, P.A. Mitkas 2, Z. Abas 3, A.L. Symeonidis 2, G. Milis 2 and U. Emanuelson 4 1 Faculty
More informationSocial Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
More informationChapter 12 Discovering New Knowledge Data Mining
Chapter 12 Discovering New Knowledge Data Mining Becerra-Fernandez, et al. -- Knowledge Management 1/e -- 2004 Prentice Hall Additional material 2007 Dekai Wu Chapter Objectives Introduce the student to
More information