Milind Tambe on game theory in security applications Machine...

Size: px
Start display at page:

Download "Milind Tambe on game theory in security applications Machine..."

Transcription

1 Milind Tambe on game theory in security applications Machine... Milind Tambe on game theory in security applications Tweet 0 Like 0 1 May 30, 2014 Luke Muehlhauser /author/lukeprog/) Conversations /category/conversations/) Milind Tambe ( is Helen N. and Emmett H. Jones Professor in Engineering at the University of Southern California ( (USC). He is a fellow of AAAI ( (Association for Advancement of Artificial Intelligence) and ACM ( (Association for Computing Machinery), as well as recipient of the ACM/SIGART Autonomous Agents Research Award ( /autonomous_agents_award.html), Christopher Columbus Fellowship Foundation Homeland security award ( the INFORMS Wagner prize for excellence in Operations Research Practice ( /Milind-Tambe), the Rist Prize of the Military Operations Research Society ( IBM Faculty Award ( /research_grant/index.html), Okawa Foundation Faculty Research Award, RoboCup scientific challenge award, USC Associates Award for Creativity in Research ( and USC Viterbi School of Engineering use-inspired research award ( /vsoe_research_award.htm). Prof. Tambe has contributed several foundational papers in agents and multiagent systems; this includes areas of multiagent teamwork, distributed constraint optimization (DCOP) and security games. For this research, he has received the influential paper award ( 1 of 8 from the International Foundation for Agents and Multiagent Systems (IFAAMAS), as well as with his research group, best paper awards at a Search! intelligence.org... Browse All (/all-posts/) Analysis /category/analysis/) Conversations /category /conversations/) Donor Stories /category/donorstories/) MIRI Strategy /category/miri/) News /category/news/) Newsletters /category/newsletters/) Video /category/video/) Subscribe Join 11,114 newsletter subscribers " address Follow Like 8.6k 3/26/15, 3:21 PM

2 Milind Tambe number on game of premier theory in security Artificial applications Intelligence Machine... Conferences and workshops; RSS # these have included multiple best paper awards at the International ( Conference on Autonomous Agents and Multiagent Systems and /miriblog) International Conference on Intelligent Virtual Agents. In addition, the security games framework and algorithms pioneered by Prof. Tambe and his research group are now deployed for real-world use by several agencies including the US Coast Guard, the US Federal Air Marshals service, the Transportation Security Administration, LAX Police and the LA Sheriff s Department for security scheduling at a variety of US ports, airports and transportation infrastructure. This research has led to him and his students receiving the US Coast Guard Meritorious Team Commendation from the Commandant, US Coast Guard First District s Operational Excellence Award, Certificate of Appreciation from the US Federal Air Marshals Service and special commendation given by the Los Angeles World Airports police from the city of Los Angeles. For his teaching and service, Prof. Tambe has received the USC Steven B. Sample Teaching and Mentoring award and the ACM recognition of service award. Recently, he co-founded ARMORWAY ( a company focused on risk mitigation and security resource optimization, where he serves on the board of directors. Prof. Tambe received his Ph.D. from the School of Computer Science at Carnegie Mellon University. Luke Muehlhauser: In Tambe et al. (2013) ( /2014/AAAISS14.pdf), you and your co-authors give an overview of game theory in security applications, saying: Game theory is well-suited to adversarial reasoning for security resource allocation and scheduling problems. Casting the problem as a Bayesian Stackelberg game, we have developed new algorithms for efficiently solving such games to provide randomized patrolling or inspection strategies. You then give many examples of game-theoretic algorithms used for security at airports, borders, etc. Is there evidence to suggest that the introduction of these systems has improved the security of the airports, borders, etc. relative to whatever security processes they were using before? Milind Tambe: This is an important and wonderful question. There is a long 2 of 8answer to this question that compiles all of our evidence (this is actually a book 3/26/15, 3:21 PM (

3 Milind /dp/ /ref=nosim?tag= ) Tambe on game theory in security applications Machine... chapter). I will attempt to provide a shorter answer here and will attempt to provide pointers to our publications that compile this evidence. As you note, we are fortunate that many of our game-theoretic algorithms for security resource optimization (via optimal scheduling, allocation) have jumped out of our lab and are now deployed for real use in many applications. As we write papers about these deployed applications, evidence showing the benefits of these algorithms is definitely an important issue that is necessary for us to answer. Unlike our more mainstream papers, where we can run 1000s of careful simulations under controlled conditions, we cannot conduct such experiments in the real world with our deployed applications. Nor can we provide a proof of 100% security there is no such thing. So what can we do? In our evidence gathering, we have focused on the question of: are we better off with our tools based on computational game theory than what was being done previously, which was typically relying on human schedulers or a simple dice roll for security scheduling (simple dice roll is often the other automation that is used or offered as an alternative to our methods). Now within my area of Artificial Intelligence, that AI programs can beat humans at complex scheduling tasks is not controversial; but regardless we have used the following methods to provide evidence that our game-theoretic algorithms indeed perform better. These methods range from simulations to actual field tests. 1. Simulations (including using a machine learning attacker): We provide simulations of security schedules, e.g., randomized patrols, assignments, comparing our approach to earlier approaches based on techniques used by human schedulers. We have a machine learning based attacker who learns any patterns and then chooses to attack the facility being protected. Game-theoretic schedulers are seen to perform significantly better in providing higher levels of protections (Pita et al ( Jain et al ( 2. Human adversaries in the lab: We have worked with a large number of human subjects and security experts (security officials) to have them get through randomized security schedules, where some are schedules generated by our algorithms, and some are baseline approaches for comparison. Human subjects are paid money based on the reward they collect by successfully intruding through our security schedules; again our game-theoretic schedulers perform significantly better (Pita et al ( Effective-solutions-for-real-world-Stackelberg-games-when-agentsmust-deal-with-human-uncertainties.pdf)). 3 of 8 3/26/15, 3:21 PM 3. Actual security schedules before and after: For some security applications,

4 Milind Tambe we have on game data theory on in security how applications scheduling Machine... was done by humans (before our algorithms were deployed) and how schedules are generated after deployment of our algorithms. For measures of interest to security agencies, e.g., predictability in schedules, we can compare the actual humangenerated schedules vs our algorithmic schedules. Again, game-theoretic schedulers are seen to perform significantly better by avoiding predictability and yet ensuring that more important targets are covered with higher frequency of patrols. Some of this data is published (Shieh et al ( 4. Adversary teams simulate attack: In some cases, security agencies have deployed adversary perspective teams or mock attacker teams that will attempt to conduct surveillance to plan attacks; this is done before and after our algorithms have been deployed to check which security deployments worked better. This was done by the US Coast Guard indicating that the game-theoretic scheduler provided higher levels of deterrence (Shieh et al ( /2014/05/Shieh-et-al-PROTECT-a-deployed-game-theoretic-systemto-protect-the-ports-of-the-United-States.pdf)). 5. Real-time comparison: human vs algorithm: This is a test we ran on the metro trains in Los Angeles. For a day of patrol scheduling, we provided head-to-head comparison of human schedulers trying to schedule 90 officers on patrols vs an automated game-theoretic scheduler. External evaluators then provided an evaluation of these patrols; the evaluators did not know who had generated each of the schedules. The results show that while human schedulers required significant effort even for generating one schedule (almost a day), and the game-theoretic scheduler ran quickly, the external evaluators rated the game theoretic schedulers higher (with statistical significance). (Delle Fave et al. 2014a ( /proceedings/aamas/p1363.pdf), Delle Fave et al. under consideration). 6. Actual data from deployment: This is another test run on the metro trains in LA. We had a comparison of game-theoretic scheduler vs an alternative (in this case a uniform random scheduler augmented with real time human intelligence) to check fare evaders. In 21 days of patrols, the game-theoretic scheduler led to significantly higher numbers of fare evaders captured than the alternative. (Delle Fave et al. 2014a ( /proceedings/aamas/p1363.pdf), Delle Fave et al. 2014b ( 7. Domain expert evaluation (internal and external): There have been of course 4 of 8 significant numbers of evaluations done by domain experts comparing their 3/26/15, 3:21 PM own scheduling method with game theoretic schedulers and repeatedly the

5 Milind Tambe game on theoretic game theory schedulers in security applications have come Machine... out ahead. The fact that our software is now in use for several years at several different important airports, ports, air-traffic, and so on, is an indicator to us that the domain experts must consider this software of some value. All of this evidence suggests that the game-theoretic approaches for security resource optimization performs significantly better than its competitors, i.e., human schedulers or simple randomization. Humans were seen to fall into predictable patterns; and indeed this is an extremely complex adversarial scheduling/planning/allocation task, where humans have to reason about trillions of possible schedules (actually even more), and which is time-consuming and very difficult for humans. It would seem then that we should let this complex task to be handed over to software, and let humans concentrate on the more important tasks of actually physically providing security. Luke: Diana Spears mentioned /2014/04/09/dianaspears/) that you teach a course on Artificial Intelligence and Science Fiction, which includes a section on your research on Asimovian multiagents. Is this 2007 syllabus ( still a pretty accurate outline of the course? What work on Asimovian multiagents do you discuss? She mentioned Schurr et al. (2006) ( /publications/2006_schurr_varakantham_bowring_tambe_grosz.pdf); is there any other work on that topic you ve done? Milind: The last iteration of Understanding intelligent agents via science fiction was taught in Here is the syllabus for it ( /Courses/CSCI300/). This course was jointly developed with my former PhD student, Prof. Emma Bowring, now Associate Professor at Univ of Pacific, and really was her idea to develop it while she was still a student at USC. We have written about this course (Bowring & Tambe 2009 ( /2009/BowringTambe2.pdf)). While we did use Asimov s short stories extensively, the goal here is to really introduce core concepts in agents and multiagent systems, as can be seen from the syllabus. So the focus is more on using these stories, Star Trek clips, and other science fiction as a motivation to introduce core concepts in AI/Agents and Multiagent systems, starting from Markov Decision Problems (MDPs), POMDPs, Game theory, agent modeling and so on. 5 of 8 3/26/15, 3:21 PM While you are right that we have done some follow up work based on Diana s

6 Milind original Tambe on game paper theory and in security earlier applications paper Machine... by Weld & Etzioni (1994) ( best_of_sasemas.pdf) and that is a fascinating thread of research, but that isn t the focus of this course. This is more of an undergraduate course introducing students to key concepts. Towards the end of the course we get into abstract ideas on agent design where students may use some of the ideas advocated in these Asimovian agents, which is great. We haven t pursued that research direction beyond that paper and an earlier one (Pynadath and Tambe 2001 ( Asimov.pdf)). It would be a great idea to push that direction more though. Luke: In Tambe et al. (2013) ( /2014/AAAISS14.pdf) you identify open research issues for game theory in security applications, such as scalability and robustness. Which open research problems in this area do you think would have the largest practical impact if they could be solved well? Milind: Both scalability and robustness are important. Scale-up is important because we want to solve large-scale games. For example, even if we leave aside complex scheduling constraints and just think of the abstract assignment problem of security agencies such as Federal Air Marshals Service of assigning say 20 defenders to 1000 flights, that is 1000-choose-20. These problems become so large that we cant fit games in the normal form in memory and must somehow find an optimal defender strategy without explicitly representing the game in memory. On the other hand, we wish to handle robustness because of the many uncertainties in the game. There is uncertainty related to adversary s surveillance (how much surveillance is actually going on), uncertainty about adversary s payoffs, capabilities, and so on. When we combine the two requirements of solving large-scale games and handling uncertainty, then the problem becomes even more complex. These remain critical challenges for us to address. There are however many other major research challenges that are open. Significant effort has been focused on modeling adversary bounded rationality. This exciting research at the intersection of algorithmic and behavioral game theory is a major area of research in security games. Furthermore, our recent work focused on protecting wildlife and fisheries (Yang et al ( Haskell et al of 8 3/26/15, 3:21 PM ( brings up challenges

7 Milind related Tambe on to game Machine theory Learning. security applications Specifically Machine... we now have data related to say poachers movements and actions. This data can be used to create a better model of the poachers. Another area is preference elicitation. If there is significant uncertainty related to many aspects of the domain, and reducing this uncertainty is going to take effort, then which features do we focus on first to reduce uncertainty? Our recent paper at AAAI 2014 (Nguyen et al ( provides our initial thrust into this area. In short, while we have made significant progress, not just in my group, but as the security games community, there is a lot more that still needs to be done. Luke: Thanks, Milind! Did you like this post? You may enjoy our other Conversations /category/conversations/) posts, including: Kristinn Thórisson on constructivist AI /2014/09/14/kris-thorisson/) Gerwin Klein on Formal Methods /2014/02 /11/gerwin-klein-on-formal-methods/) Toby Walsh on computational social choice /2014/03/10/toby-walsh/) Dave Doty on algorithmic self-assembly /2014/04/23/dave-doty/)... and many more /category /conversations/). Tweet 0 Like of 8 3/26/15, 3:21 PM

8 Milind Tambe on game theory in security applications Machine Comments Machine Intelligence Research Institute Login! Recommend Share Sort by Best Start the discussion ALSO ON MACHINE INTELLIGENCE RESEARCH INSTITUTE WHAT'S THIS? AGI outcomes and civilizational competence 3 comments 5 months ago Diego My meta-pessimism has grown more reading this post and the Lesswrong one on the same topic. It seems to me that as Video of Bostrom s talk on Superintelligence at UC Berkeley 1 comment 5 months ago Steve S Fascinating and terrifying! Incredibly intelligent person, the entire discussion had me on the edge of my seat. This Superintelligence reading group 13 comments 7 months ago Guest The idea of humans devising methods for directly controlling superintelligent AIs seems to me to be implausible. The Lean Nonprofit 1 comment 3 months ago David Kristoffersson Applause! Lean has plenty of valuable lessons for virtually any kind of organization. 8 of 8 3/26/15, 3:21 PM

Modeling Security Decisions as Games

Modeling Security Decisions as Games Modeling Security Decisions as Games Chris Kiekintveld University of Texas at El Paso.. and MANY Collaborators Decision Making and Games Research agenda: improve and justify decisions Automated intelligent

More information

Game Theory for Safety and Security. Arunesh Sinha

Game Theory for Safety and Security. Arunesh Sinha Game Theory for Safety and Security Arunesh Sinha Motivation: Real World Security Issues 2 Central Problem Allocating limited security resources against an adaptive, intelligent adversary 3 Prior Work

More information

Computational Game Theory for Security: Progress and Challenges

Computational Game Theory for Security: Progress and Challenges Computational Game Theory for Security: Progress and Challenges Milind Tambe, Albert Xin Jiang Computer Science Department University of Southern California Los Angeles, CA 90089 {tambe, jiangx}@usc.edu

More information

Game Theory for Security:

Game Theory for Security: Game Theory for Security: Key Algorithmic Principles, Deployed Systems, Research Challenges Milind Tambe University of Southern California with: Current/former PhD students/postdocs: Matthew Brown, Francesco

More information

NATHAN SCHURR. Education. Research Interests. Research Funding Granted. Experience. University of Southern California Los Angeles, CA

NATHAN SCHURR. Education. Research Interests. Research Funding Granted. Experience. University of Southern California Los Angeles, CA Expected NATHAN SCHURR PHE 514, University of Southern California, Los Angeles, CA, 90089 (213) 740-9560; schurr@usc.edu Education University of Southern California Los Angeles, CA - in progress Ph.D.

More information

Thanh H. Nguyen. Research Interests: Artificial Intelligence, Multi-Agent Systems, Game Theory, Machine Learning, Operations Research, Optimization.

Thanh H. Nguyen. Research Interests: Artificial Intelligence, Multi-Agent Systems, Game Theory, Machine Learning, Operations Research, Optimization. Thanh H. Nguyen Assistant Professor Deschutes Hall Computer & Information Sciene Eugene, OR 97403-1202 University of Oregon Phone: +1 (217) 904 5864 https://ix.cs.uoregon.edu/ thanhhng/ Email: thanhhng@cs.uoregon.edu

More information

Research Statement Arunesh Sinha aruneshs/

Research Statement Arunesh Sinha  aruneshs/ Research Statement Arunesh Sinha aruneshs@usc.edu http://www-bcf.usc.edu/ aruneshs/ Research Theme My research lies at the intersection of Artificial Intelligence and Security 1 and Privacy. Security and

More information

Exploring Information Asymmetry in Two-Stage Security Games

Exploring Information Asymmetry in Two-Stage Security Games Exploring Information Asymmetry in Two-Stage Security Games Haifeng Xu 1, Zinovi Rabinovich 2, Shaddin Dughmi 1, Milind Tambe 1 1 University of Southern California 2 Independent Researcher Security Games

More information

CPE/CSC 580: Intelligent Agents

CPE/CSC 580: Intelligent Agents CPE/CSC 580: Intelligent Agents Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Course Overview Introduction Intelligent Agent, Multi-Agent

More information

Stochastic Game Models for Homeland Security

Stochastic Game Models for Homeland Security CREATE Research Archive Research Project Summaries 2008 Stochastic Game Models for Homeland Security Erim Kardes University of Southern California, kardes@usc.edu Follow this and additional works at: http://research.create.usc.edu/project_summaries

More information

CPS 570: Artificial Intelligence Game Theory

CPS 570: Artificial Intelligence Game Theory CPS 570: Artificial Intelligence Game Theory Instructor: Vincent Conitzer What is game theory? Game theory studies settings where multiple parties (agents) each have different preferences (utility functions),

More information

Bridging the Gap: Introducing Agents and Multiagent Systems to Undergraduate Students

Bridging the Gap: Introducing Agents and Multiagent Systems to Undergraduate Students Bridging the Gap: Introducing Agents and Multiagent Systems to Undergraduate Students ABSTRACT Emma Bowring University of the Pacific Stockton CA 95211, USA ebowring@pacific.edu The field of intelligent

More information

PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States

PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States Eric Shieh +, Bo An +, Rong Yang +, Milind Tambe +, Craig Baldwin*, Joseph DiRenzo*, Ben Maule*, Garrett Meyer* + University

More information

Hierarchical Controller for Robotic Soccer

Hierarchical Controller for Robotic Soccer Hierarchical Controller for Robotic Soccer Byron Knoll Cognitive Systems 402 April 13, 2008 ABSTRACT RoboCup is an initiative aimed at advancing Artificial Intelligence (AI) and robotics research. This

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information

The Science In Computer Science

The Science In Computer Science Editor s Introduction Ubiquity Symposium The Science In Computer Science The Computing Sciences and STEM Education by Paul S. Rosenbloom In this latest installment of The Science in Computer Science, Prof.

More information

Artificial Intelligence: Implications for Autonomous Weapons. Stuart Russell University of California, Berkeley

Artificial Intelligence: Implications for Autonomous Weapons. Stuart Russell University of California, Berkeley Artificial Intelligence: Implications for Autonomous Weapons Stuart Russell University of California, Berkeley Outline Remit [etc] AI in the context of autonomous weapons State of the Art Likely future

More information

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the U. S. Senate Committee on Commerce, Science, and Transportation Subcommittee

More information

CS343 Introduction to Artificial Intelligence Spring 2010

CS343 Introduction to Artificial Intelligence Spring 2010 CS343 Introduction to Artificial Intelligence Spring 2010 Prof: TA: Daniel Urieli Department of Computer Science The University of Texas at Austin Good Afternoon, Colleagues Welcome to a fun, but challenging

More information

Stanford Center for AI Safety

Stanford Center for AI Safety Stanford Center for AI Safety Clark Barrett, David L. Dill, Mykel J. Kochenderfer, Dorsa Sadigh 1 Introduction Software-based systems play important roles in many areas of modern life, including manufacturing,

More information

Learning and Using Models of Kicking Motions for Legged Robots

Learning and Using Models of Kicking Motions for Legged Robots Learning and Using Models of Kicking Motions for Legged Robots Sonia Chernova and Manuela Veloso Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 {soniac, mmv}@cs.cmu.edu Abstract

More information

CS343 Introduction to Artificial Intelligence Spring 2012

CS343 Introduction to Artificial Intelligence Spring 2012 CS343 Introduction to Artificial Intelligence Spring 2012 Prof: TA: Daniel Urieli Department of Computer Science The University of Texas at Austin Good Afternoon, Colleagues Welcome to a fun, but challenging

More information

Randomizing Regression Tests Using Game Theory

Randomizing Regression Tests Using Game Theory Randomizing Regression Tests Using Game Theory Nupul Kukreja, William G.J. Halfond, Milind Tambe University of Southern California Los Angeles, California, USA Email: {nkukreja, halfond, tambe}@usc.edu

More information

RoboCup. Presented by Shane Murphy April 24, 2003

RoboCup. Presented by Shane Murphy April 24, 2003 RoboCup Presented by Shane Murphy April 24, 2003 RoboCup: : Today and Tomorrow What we have learned Authors Minoru Asada (Osaka University, Japan), Hiroaki Kitano (Sony CS Labs, Japan), Itsuki Noda (Electrotechnical(

More information

A short introduction to Security Games

A short introduction to Security Games Game Theoretic Foundations of Multiagent Systems: Algorithms and Applications A case study: Playing Games for Security A short introduction to Security Games Nicola Basilico Department of Computer Science

More information

Reinforcement Learning for Ethical Decision Making

Reinforcement Learning for Ethical Decision Making Reinforcement Learning for Ethical Decision Making The Workshops of the Thirtieth AAAI Conference on Artificial Intelligence AI, Ethics, and Society: Technical Report WS-16-02 David Abel, James MacGlashan,

More information

Tesca Fitzgerald. Graduate Research Assistant Aug

Tesca Fitzgerald. Graduate Research Assistant Aug Tesca Fitzgerald Webpage www.tescafitzgerald.com Email tesca.fitzgerald@cc.gatech.edu Last updated April 2018 School of Interactive Computing Georgia Institute of Technology 801 Atlantic Drive, Atlanta,

More information

CS594, Section 30682:

CS594, Section 30682: CS594, Section 30682: Distributed Intelligence in Autonomous Robotics Spring 2003 Tuesday/Thursday 11:10 12:25 http://www.cs.utk.edu/~parker/courses/cs594-spring03 Instructor: Dr. Lynne E. Parker ½ TA:

More information

Intro to Interactive Entertainment Spring 2017 Syllabus CS 1010 Instructor: Tim Fowers

Intro to Interactive Entertainment Spring 2017 Syllabus CS 1010 Instructor: Tim Fowers Intro to Interactive Entertainment Spring 2017 Syllabus CS 1010 Instructor: Tim Fowers Email: tim@fowers.net 1) Introduction Basics of Game Design: definition of a game, terminology and basic design categories.

More information

SPQR RoboCup 2016 Standard Platform League Qualification Report

SPQR RoboCup 2016 Standard Platform League Qualification Report SPQR RoboCup 2016 Standard Platform League Qualification Report V. Suriani, F. Riccio, L. Iocchi, D. Nardi Dipartimento di Ingegneria Informatica, Automatica e Gestionale Antonio Ruberti Sapienza Università

More information

Arpita Biswas. Speaker. PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore

Arpita Biswas. Speaker. PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore Speaker Arpita Biswas PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore Email address: arpita.biswas@live.in OUTLINE Game Theory Basic Concepts and Results

More information

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Outline Introduction to Game Theory and solution concepts Game definition

More information

Science Integration Fellowship: California Ocean Science Trust & Humboldt State University

Science Integration Fellowship: California Ocean Science Trust & Humboldt State University Science Integration Fellowship: California Ocean Science Trust & Humboldt State University SYNOPSIS California Ocean Science Trust (www.oceansciencetrust.org) and Humboldt State University (HSU) are pleased

More information

Workshop on Intelligent System and Applications (ISA 17)

Workshop on Intelligent System and Applications (ISA 17) Telemetry Mining for Space System Sara Abdelghafar Ahmed PhD student, Al-Azhar University Member of SRGE Workshop on Intelligent System and Applications (ISA 17) 13 May 2017 Workshop on Intelligent System

More information

Case Study: Joseph Cole Breaks Through Longstanding Income and Client Ceiling Within Weeks of Enrolling in B2B Biz Launcher

Case Study: Joseph Cole Breaks Through Longstanding Income and Client Ceiling Within Weeks of Enrolling in B2B Biz Launcher Case Study: Joseph Cole Breaks Through Longstanding Income and Client Ceiling Within Weeks of Enrolling in B2B Biz Launcher Thanks for talking with me a little bit today about your experiences so far,

More information

Game Theory. Department of Electronics EL-766 Spring Hasan Mahmood

Game Theory. Department of Electronics EL-766 Spring Hasan Mahmood Game Theory Department of Electronics EL-766 Spring 2011 Hasan Mahmood Email: hasannj@yahoo.com Course Information Part I: Introduction to Game Theory Introduction to game theory, games with perfect information,

More information

Randall Davis Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Cambridge, Massachusetts, USA

Randall Davis Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Cambridge, Massachusetts, USA Multimodal Design: An Overview Ashok K. Goel School of Interactive Computing Georgia Institute of Technology Atlanta, Georgia, USA Randall Davis Department of Electrical Engineering and Computer Science

More information

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Introduction Intelligent security for physical infrastructures Our objective:

More information

Abhishek Gupta CONTACT INFORMATION. 360 Coordinated Science Laboratory

Abhishek Gupta CONTACT INFORMATION. 360 Coordinated Science Laboratory Abhishek Gupta CONTACT INFORMATION RESEARCH INTERESTS 360 Coordinated Science Laboratory +1-217-819-6382 University of Illinois at Urbana-Champaign gupta54@illinois.edu 1308 W Main Street publish.illinois.edu/gupta54/

More information

CS295-1 Final Project : AIBO

CS295-1 Final Project : AIBO CS295-1 Final Project : AIBO Mert Akdere, Ethan F. Leland December 20, 2005 Abstract This document is the final report for our CS295-1 Sensor Data Management Course Final Project: Project AIBO. The main

More information

Intel Labs, Hillsboro, OR, June 2013 Aug 2013 Research Intern: Machine learning based detection of activity of mobile-phone users.

Intel Labs, Hillsboro, OR, June 2013 Aug 2013 Research Intern: Machine learning based detection of activity of mobile-phone users. ARUNESH SINHA University of Michigan Cell Phone: 412-420-9628 Department of Computer Science Official Email: arunesh@umich.edu 2709 Beyster, 2260 Hayward St, Alternate Email: aruneshsinha@gmail.com Ann

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S What is C S? Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 16 What is C S? What do you think? A definition CS and programming Areas of CS

More information

Using Science Fiction in Teaching Artificial Intelligence

Using Science Fiction in Teaching Artificial Intelligence Using Science Fiction in Teaching Artificial Intelligence Milind Tambe Computer Science Dept. University of Southern California Los Angeles, CA 90089 {tambe}@usc.edu Anne Balsamo Interactive Media Division

More information

Distributed, Play-Based Coordination for Robot Teams in Dynamic Environments

Distributed, Play-Based Coordination for Robot Teams in Dynamic Environments Distributed, Play-Based Coordination for Robot Teams in Dynamic Environments Colin McMillen and Manuela Veloso School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, U.S.A. fmcmillen,velosog@cs.cmu.edu

More information

A Game Theoretic Approach on Addressing Cooperation among Human Adversaries

A Game Theoretic Approach on Addressing Cooperation among Human Adversaries A Game Theoretic Approach on Addressing Cooperation among Human Adversaries Shahrzad Gholami, Bryan Wilder, Matthew Brown, Arunesh Sinha, Nicole Sintov, Milind Tambe University of Southern California,

More information

Human Factors in Control

Human Factors in Control Human Factors in Control J. Brooks 1, K. Siu 2, and A. Tharanathan 3 1 Real-Time Optimization and Controls Lab, GE Global Research 2 Model Based Controls Lab, GE Global Research 3 Human Factors Center

More information

The Intel Science and Technology Center for Pervasive Computing

The Intel Science and Technology Center for Pervasive Computing The Intel Science and Technology Center for Pervasive Computing Investing in New Levels of Academic Collaboration Rajiv Mathur, Program Director ISTC-PC Anthony LaMarca, Intel Principal Investigator Professor

More information

AIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara

AIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara AIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara Sketching has long been an essential medium of design cognition, recognized for its ability

More information

A Game Theoretic Approach on Addressing Collusion among Human Adversaries

A Game Theoretic Approach on Addressing Collusion among Human Adversaries A Game Theoretic Approach on Addressing Collusion among Human Adversaries Shahrzad Gholami, Bryan Wilder, Matthew Brown, Arunesh Sinha, Nicole Sintov, Milind Tambe University of Southern California, USA,

More information

Deployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport

Deployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport Deployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport James Pita, Manish Jain, Janusz Marecki, Fernando Ordóñez, Christopher Portway,

More information

Artificial Intelligence

Artificial Intelligence Artificial Intelligence Lecture 01 - Introduction Edirlei Soares de Lima What is Artificial Intelligence? Artificial intelligence is about making computers able to perform the

More information

CS 380: ARTIFICIAL INTELLIGENCE INTRODUCTION. Santiago Ontañón

CS 380: ARTIFICIAL INTELLIGENCE INTRODUCTION. Santiago Ontañón CS 380: ARTIFICIAL INTELLIGENCE INTRODUCTION Santiago Ontañón so367@drexel.edu CS 380 Focus: Introduction to AI: basic concepts and algorithms. Topics: What is AI? Problem Solving and Heuristic Search

More information

Artificial Intelligence. Minimax and alpha-beta pruning

Artificial Intelligence. Minimax and alpha-beta pruning Artificial Intelligence Minimax and alpha-beta pruning In which we examine the problems that arise when we try to plan ahead to get the best result in a world that includes a hostile agent (other agent

More information

NSF-Sponsored Workshop: Research Issues at at the Boundary of AI and Robotics

NSF-Sponsored Workshop: Research Issues at at the Boundary of AI and Robotics NSF-Sponsored Workshop: Research Issues at at the Boundary of AI and Robotics robotics.cs.tamu.edu/nsfboundaryws Nancy Amato, Texas A&M (ICRA-15 Program Chair) Sven Koenig, USC (AAAI-15 Program Co-Chair)

More information

Elements of Artificial Intelligence and Expert Systems

Elements of Artificial Intelligence and Expert Systems Elements of Artificial Intelligence and Expert Systems Master in Data Science for Economics, Business & Finance Nicola Basilico Dipartimento di Informatica Via Comelico 39/41-20135 Milano (MI) Ufficio

More information

The essential role of. mental models in HCI: Card, Moran and Newell

The essential role of. mental models in HCI: Card, Moran and Newell 1 The essential role of mental models in HCI: Card, Moran and Newell Kate Ehrlich IBM Research, Cambridge MA, USA Introduction In the formative years of HCI in the early1980s, researchers explored the

More information

Artificial Intelligence: Implications for Autonomous Weapons. Stuart Russell University of California, Berkeley

Artificial Intelligence: Implications for Autonomous Weapons. Stuart Russell University of California, Berkeley Artificial Intelligence: Implications for Autonomous Weapons Stuart Russell University of California, Berkeley Outline AI and autonomy State of the art Likely future developments Conclusions What is AI?

More information

Scalable Randomized Patrolling for Securing Rapid Transit Networks

Scalable Randomized Patrolling for Securing Rapid Transit Networks Scalable Randomized Patrolling for Securing Rapid Transit Networks Pradeep Varakantham, Hoong Chuin Lau, Zhi Yuan School of Information Systems, Singapore Management University, Singapore {pradeepv,hclau,zhiyuan}@smu.edu.sg

More information

Reinforcement Learning Applied to a Game of Deceit

Reinforcement Learning Applied to a Game of Deceit Reinforcement Learning Applied to a Game of Deceit Theory and Reinforcement Learning Hana Lee leehana@stanford.edu December 15, 2017 Figure 1: Skull and flower tiles from the game of Skull. 1 Introduction

More information

Deep Learning for Autonomous Driving

Deep Learning for Autonomous Driving Deep Learning for Autonomous Driving Shai Shalev-Shwartz Mobileye IMVC dimension, March, 2016 S. Shalev-Shwartz is also affiliated with The Hebrew University Shai Shalev-Shwartz (MobilEye) DL for Autonomous

More information

Modeling Enterprise Systems

Modeling Enterprise Systems Modeling Enterprise Systems A summary of current efforts for the SERC November 14 th, 2013 Michael Pennock, Ph.D. School of Systems and Enterprises Stevens Institute of Technology Acknowledgment This material

More information

Ar#ficial)Intelligence!!

Ar#ficial)Intelligence!! Ar#ficial)Intelligence!! Ar#ficial) intelligence) is) the) science) of) making) machines) do) things) that) would) require) intelligence)if)done)by)men.) Marvin)Minsky,)1967) Roman Barták Department of

More information

COMP219: Artificial Intelligence. Lecture 2: AI Problems and Applications

COMP219: Artificial Intelligence. Lecture 2: AI Problems and Applications COMP219: Artificial Intelligence Lecture 2: AI Problems and Applications 1 Introduction Last time General module information Characterisation of AI and what it is about Today Overview of some common AI

More information

UNIVERSITY OF CAMBRIDGE FACULTY OF LAW OPEN DAY 2018

UNIVERSITY OF CAMBRIDGE FACULTY OF LAW OPEN DAY 2018 UNIVERSITY OF CAMBRIDGE FACULTY OF LAW OPEN DAY 2018 Applying to Cambridge Law Speaker: Mrs Ali Lyons Okay, good afternoon, everyone. My name is Ali Lyons and I work here at the Faculty of Law. I am working

More information

Unit 2: Understanding NIMS

Unit 2: Understanding NIMS Unit 2: Understanding NIMS This page intentionally left blank. Objectives At the end of this unit, you should be able to describe: The intent of NIMS. Key concepts and principles underlying NIMS. Scope

More information

CS 343H: Artificial Intelligence. Week 1a: Introduction

CS 343H: Artificial Intelligence. Week 1a: Introduction CS 343H: Artificial Intelligence Week 1a: Introduction Good Morning Colleagues Welcome to a fun, but challenging course Goal: Learn about Artificial Intelligence Increase AI literacy Prepare you for topics

More information

AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS. Nuno Sousa Eugénio Oliveira

AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS. Nuno Sousa Eugénio Oliveira AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS Nuno Sousa Eugénio Oliveira Faculdade de Egenharia da Universidade do Porto, Portugal Abstract: This paper describes a platform that enables

More information

Creating a Poker Playing Program Using Evolutionary Computation

Creating a Poker Playing Program Using Evolutionary Computation Creating a Poker Playing Program Using Evolutionary Computation Simon Olsen and Rob LeGrand, Ph.D. Abstract Artificial intelligence is a rapidly expanding technology. We are surrounded by technology that

More information

COMP219: COMP219: Artificial Intelligence Artificial Intelligence Dr. Annabel Latham Lecture 12: Game Playing Overview Games and Search

COMP219: COMP219: Artificial Intelligence Artificial Intelligence Dr. Annabel Latham Lecture 12: Game Playing Overview Games and Search COMP19: Artificial Intelligence COMP19: Artificial Intelligence Dr. Annabel Latham Room.05 Ashton Building Department of Computer Science University of Liverpool Lecture 1: Game Playing 1 Overview Last

More information

The Institute for Communication Technology Management CTM. A Center of Excellence Marshall School of Business University of Southern California

The Institute for Communication Technology Management CTM. A Center of Excellence Marshall School of Business University of Southern California The Institute for Communication Technology Management CTM A Center of Excellence Marshall School of Business University of Southern California Technology is Changing Business New technologies appear every

More information

Executive Summary. Chapter 1. Overview of Control

Executive Summary. Chapter 1. Overview of Control Chapter 1 Executive Summary Rapid advances in computing, communications, and sensing technology offer unprecedented opportunities for the field of control to expand its contributions to the economic and

More information

Optimal Rhode Island Hold em Poker

Optimal Rhode Island Hold em Poker Optimal Rhode Island Hold em Poker Andrew Gilpin and Tuomas Sandholm Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 {gilpin,sandholm}@cs.cmu.edu Abstract Rhode Island Hold

More information

Five-In-Row with Local Evaluation and Beam Search

Five-In-Row with Local Evaluation and Beam Search Five-In-Row with Local Evaluation and Beam Search Jiun-Hung Chen and Adrienne X. Wang jhchen@cs axwang@cs Abstract This report provides a brief overview of the game of five-in-row, also known as Go-Moku,

More information

A conversation with Russell Stewart, July 29, 2015

A conversation with Russell Stewart, July 29, 2015 Participants A conversation with Russell Stewart, July 29, 2015 Russell Stewart PhD Student, Stanford University Nick Beckstead Research Analyst, Open Philanthropy Project Holden Karnofsky Managing Director,

More information

NOVEMBER 20 21, 2018 SMARTVILLAGE, MUNICH

NOVEMBER 20 21, 2018 SMARTVILLAGE, MUNICH NOVEMBER 20 21, 2018 SMARTVILLAGE, MUNICH shutterstock.com - agsandrew Sponsors: Organisation Partner: Organized by: We make Artificial Intelligence tangible for you. The German edition of the MIT Technology

More information

Bay Area Team - Director of Operations, Bryan Johnston

Bay Area Team - Director of Operations, Bryan Johnston Subscribe Iridescent Send to a Friend This year promises to be a pivotal one for Iridescent! We are expanding to three sites (New York City, San Francisco Bay Area and Los Angeles) and are building a stellar

More information

THE AI REVOLUTION. How Artificial Intelligence is Redefining Marketing Automation

THE AI REVOLUTION. How Artificial Intelligence is Redefining Marketing Automation THE AI REVOLUTION How Artificial Intelligence is Redefining Marketing Automation The implications of Artificial Intelligence for modern day marketers The shift from Marketing Automation to Intelligent

More information

CSE 435: Software Engineering

CSE 435: Software Engineering CSE 435: Software Engineering Dr. James Daly 3501 Engineering Building Office: 3501 EB, by appointment dalyjame at msu dot edu TAs: Vincent Ragusa and Mohammad Roohitavaf Helproom Tuesday: 2-4 pm, Wednesday

More information

Lean Enablers for Managing Engineering Programs

Lean Enablers for Managing Engineering Programs Lean Enablers for Managing Engineering Programs Presentation to the INCOSE Enchantment Chapter June 13 2012 Josef Oehmen http://lean.mit.edu 2012 Massachusetts Institute of Technology, Josef Oehmen, oehmen@mit.edu

More information

15 th Annual Conference on Systems Engineering Research

15 th Annual Conference on Systems Engineering Research The image part with relationship ID rid3 was not found in the file. The image part with relationship ID rid7 was not found in the file. 15 th Annual Conference on Systems Engineering Research March 23-25

More information

CURRICULUM VITAE. Evan Drumwright EDUCATION PROFESSIONAL PUBLICATIONS

CURRICULUM VITAE. Evan Drumwright EDUCATION PROFESSIONAL PUBLICATIONS CURRICULUM VITAE Evan Drumwright 209 Dunn Hall The University of Memphis Memphis, TN 38152 Phone: 901-678-3142 edrmwrgh@memphis.edu http://cs.memphis.edu/ edrmwrgh EDUCATION Ph.D., Computer Science, May

More information

Using Dynamic Capability Evaluation to Organize a Team of Cooperative, Autonomous Robots

Using Dynamic Capability Evaluation to Organize a Team of Cooperative, Autonomous Robots Using Dynamic Capability Evaluation to Organize a Team of Cooperative, Autonomous Robots Eric Matson Scott DeLoach Multi-agent and Cooperative Robotics Laboratory Department of Computing and Information

More information

Artificial Intelligence. Shobhanjana Kalita Dept. of Computer Science & Engineering Tezpur University

Artificial Intelligence. Shobhanjana Kalita Dept. of Computer Science & Engineering Tezpur University Artificial Intelligence Shobhanjana Kalita Dept. of Computer Science & Engineering Tezpur University What is AI? What is Intelligence? The ability to acquire and apply knowledge and skills (definition

More information

How Explainability is Driving the Future of Artificial Intelligence. A Kyndi White Paper

How Explainability is Driving the Future of Artificial Intelligence. A Kyndi White Paper How Explainability is Driving the Future of Artificial Intelligence A Kyndi White Paper 2 The term black box has long been used in science and engineering to denote technology systems and devices that

More information

Milind Tambe. Founding Co-Director, CAIS Center for AI in Society. Director, Teamcore Research Group on Agents and Multiagent Systems

Milind Tambe. Founding Co-Director, CAIS Center for AI in Society. Director, Teamcore Research Group on Agents and Multiagent Systems Vita 1 Milind Tambe Helen N. and Emmett H. Jones Professor in Engineering Professor, Computer Science & Industrial and Systems Engineering Departments Founding Co-Director, CAIS Center for AI in Society

More information

Surveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan

Surveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan Surveillance strategies for autonomous mobile robots Nicola Basilico Department of Computer Science University of Milan Intelligence, surveillance, and reconnaissance (ISR) with autonomous UAVs ISR defines

More information

Software-Intensive Systems Producibility

Software-Intensive Systems Producibility Pittsburgh, PA 15213-3890 Software-Intensive Systems Producibility Grady Campbell Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University SSTC 2006. - page 1 Producibility

More information

Smarter Defense, an IBM Perspective IBM Corporation

Smarter Defense, an IBM Perspective IBM Corporation 1 Smarter Defense, an IBM perspective, Tom Hawk, IBM General Manager, Nordics Integrated Market Team Agenda Smarter Planet : What s New? Transformation: IBM lessons SPADE: One Year On 3 As the digital

More information

Challenging the Situational Awareness on the Sea from Sensors to Analytics. Programme Overview

Challenging the Situational Awareness on the Sea from Sensors to Analytics. Programme Overview Challenging the Situational Awareness on the Sea from Sensors to Analytics New technologies for data gathering, dissemination, sharing and analytics in the Mediterranean theatre Programme Overview The

More information

Artificial Intelligence

Artificial Intelligence Torralba and Wahlster Artificial Intelligence Chapter 1: Introduction 1/22 Artificial Intelligence 1. Introduction What is AI, Anyway? Álvaro Torralba Wolfgang Wahlster Summer Term 2018 Thanks to Prof.

More information

Keywords: Multi-robot adversarial environments, real-time autonomous robots

Keywords: Multi-robot adversarial environments, real-time autonomous robots ROBOT SOCCER: A MULTI-ROBOT CHALLENGE EXTENDED ABSTRACT Manuela M. Veloso School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213, USA veloso@cs.cmu.edu Abstract Robot soccer opened

More information

Candidate Statements for the Alliance Française de Sacramento BOARD 2018 New Candidates

Candidate Statements for the Alliance Française de Sacramento BOARD 2018 New Candidates Candidate Statements for the Alliance Française de Sacramento BOARD 2018 New Candidates Don Rodes With over 40 years of business experience I can contribute a helpful business perspective to the board

More information

Ant Robotics. Terrain Coverage. Motivation. Overview

Ant Robotics. Terrain Coverage. Motivation. Overview Overview Ant Robotics Terrain Coverage Sven Koenig College of Computing Gegia Institute of Technology Overview: One-Time Repeated Coverage of Known Unknown Terrain with Single Ant Robots Teams of Ant Robots

More information

Introduction to Artificial Intelligence: cs580

Introduction to Artificial Intelligence: cs580 Office: Nguyen Engineering Building 4443 email: zduric@cs.gmu.edu Office Hours: Mon. & Tue. 3:00-4:00pm, or by app. URL: http://www.cs.gmu.edu/ zduric/ Course: http://www.cs.gmu.edu/ zduric/cs580.html

More information

100 Year Study on AI: 1st Study Panel Report

100 Year Study on AI: 1st Study Panel Report Artificial Intelligence and Life in 2030 100 Year Study on AI: 1st Study Panel Report Prof. Peter Stone* Study Panel Chair Department of Computer Science The University of Texas at Austin *Also Cogitai,

More information

Interview with Robbie Allen, CEO, Automated Insights. For podcast release Monday, July 28, 2014

Interview with Robbie Allen, CEO, Automated Insights. For podcast release Monday, July 28, 2014 Interview with Robbie Allen, CEO, Automated Insights For podcast release Monday, July 28, 2014 KENNEALLY: In science fiction, robots make lighting-fast calculations and have superhuman strength. From Forbidden

More information

Dependable AI Systems

Dependable AI Systems Dependable AI Systems Homa Alemzadeh University of Virginia In collaboration with: Kush Varshney, IBM Research 2 Artificial Intelligence An intelligent agent or system that perceives its environment and

More information

UNIT-III LIFE-CYCLE PHASES

UNIT-III LIFE-CYCLE PHASES INTRODUCTION: UNIT-III LIFE-CYCLE PHASES - If there is a well defined separation between research and development activities and production activities then the software is said to be in successful development

More information

Autonomy Test & Evaluation Verification & Validation (ATEVV) Challenge Area

Autonomy Test & Evaluation Verification & Validation (ATEVV) Challenge Area Autonomy Test & Evaluation Verification & Validation (ATEVV) Challenge Area Stuart Young, ARL ATEVV Tri-Chair i NDIA National Test & Evaluation Conference 3 March 2016 Outline ATEVV Perspective on Autonomy

More information

Programmable self-assembly in a thousandrobot

Programmable self-assembly in a thousandrobot Programmable self-assembly in a thousandrobot swarm Michael Rubenstein, Alejandro Cornejo, Radhika Nagpal. By- Swapna Joshi 1 st year Ph.D Computing Culture and Society. Authors Michael Rubenstein Assistant

More information