Milind Tambe on game theory in security applications Machine...
|
|
- Wesley McDaniel
- 6 years ago
- Views:
Transcription
1 Milind Tambe on game theory in security applications Machine... Milind Tambe on game theory in security applications Tweet 0 Like 0 1 May 30, 2014 Luke Muehlhauser /author/lukeprog/) Conversations /category/conversations/) Milind Tambe ( is Helen N. and Emmett H. Jones Professor in Engineering at the University of Southern California ( (USC). He is a fellow of AAAI ( (Association for Advancement of Artificial Intelligence) and ACM ( (Association for Computing Machinery), as well as recipient of the ACM/SIGART Autonomous Agents Research Award ( /autonomous_agents_award.html), Christopher Columbus Fellowship Foundation Homeland security award ( the INFORMS Wagner prize for excellence in Operations Research Practice ( /Milind-Tambe), the Rist Prize of the Military Operations Research Society ( IBM Faculty Award ( /research_grant/index.html), Okawa Foundation Faculty Research Award, RoboCup scientific challenge award, USC Associates Award for Creativity in Research ( and USC Viterbi School of Engineering use-inspired research award ( /vsoe_research_award.htm). Prof. Tambe has contributed several foundational papers in agents and multiagent systems; this includes areas of multiagent teamwork, distributed constraint optimization (DCOP) and security games. For this research, he has received the influential paper award ( 1 of 8 from the International Foundation for Agents and Multiagent Systems (IFAAMAS), as well as with his research group, best paper awards at a Search! intelligence.org... Browse All (/all-posts/) Analysis /category/analysis/) Conversations /category /conversations/) Donor Stories /category/donorstories/) MIRI Strategy /category/miri/) News /category/news/) Newsletters /category/newsletters/) Video /category/video/) Subscribe Join 11,114 newsletter subscribers " address Follow Like 8.6k 3/26/15, 3:21 PM
2 Milind Tambe number on game of premier theory in security Artificial applications Intelligence Machine... Conferences and workshops; RSS # these have included multiple best paper awards at the International ( Conference on Autonomous Agents and Multiagent Systems and /miriblog) International Conference on Intelligent Virtual Agents. In addition, the security games framework and algorithms pioneered by Prof. Tambe and his research group are now deployed for real-world use by several agencies including the US Coast Guard, the US Federal Air Marshals service, the Transportation Security Administration, LAX Police and the LA Sheriff s Department for security scheduling at a variety of US ports, airports and transportation infrastructure. This research has led to him and his students receiving the US Coast Guard Meritorious Team Commendation from the Commandant, US Coast Guard First District s Operational Excellence Award, Certificate of Appreciation from the US Federal Air Marshals Service and special commendation given by the Los Angeles World Airports police from the city of Los Angeles. For his teaching and service, Prof. Tambe has received the USC Steven B. Sample Teaching and Mentoring award and the ACM recognition of service award. Recently, he co-founded ARMORWAY ( a company focused on risk mitigation and security resource optimization, where he serves on the board of directors. Prof. Tambe received his Ph.D. from the School of Computer Science at Carnegie Mellon University. Luke Muehlhauser: In Tambe et al. (2013) ( /2014/AAAISS14.pdf), you and your co-authors give an overview of game theory in security applications, saying: Game theory is well-suited to adversarial reasoning for security resource allocation and scheduling problems. Casting the problem as a Bayesian Stackelberg game, we have developed new algorithms for efficiently solving such games to provide randomized patrolling or inspection strategies. You then give many examples of game-theoretic algorithms used for security at airports, borders, etc. Is there evidence to suggest that the introduction of these systems has improved the security of the airports, borders, etc. relative to whatever security processes they were using before? Milind Tambe: This is an important and wonderful question. There is a long 2 of 8answer to this question that compiles all of our evidence (this is actually a book 3/26/15, 3:21 PM (
3 Milind /dp/ /ref=nosim?tag= ) Tambe on game theory in security applications Machine... chapter). I will attempt to provide a shorter answer here and will attempt to provide pointers to our publications that compile this evidence. As you note, we are fortunate that many of our game-theoretic algorithms for security resource optimization (via optimal scheduling, allocation) have jumped out of our lab and are now deployed for real use in many applications. As we write papers about these deployed applications, evidence showing the benefits of these algorithms is definitely an important issue that is necessary for us to answer. Unlike our more mainstream papers, where we can run 1000s of careful simulations under controlled conditions, we cannot conduct such experiments in the real world with our deployed applications. Nor can we provide a proof of 100% security there is no such thing. So what can we do? In our evidence gathering, we have focused on the question of: are we better off with our tools based on computational game theory than what was being done previously, which was typically relying on human schedulers or a simple dice roll for security scheduling (simple dice roll is often the other automation that is used or offered as an alternative to our methods). Now within my area of Artificial Intelligence, that AI programs can beat humans at complex scheduling tasks is not controversial; but regardless we have used the following methods to provide evidence that our game-theoretic algorithms indeed perform better. These methods range from simulations to actual field tests. 1. Simulations (including using a machine learning attacker): We provide simulations of security schedules, e.g., randomized patrols, assignments, comparing our approach to earlier approaches based on techniques used by human schedulers. We have a machine learning based attacker who learns any patterns and then chooses to attack the facility being protected. Game-theoretic schedulers are seen to perform significantly better in providing higher levels of protections (Pita et al ( Jain et al ( 2. Human adversaries in the lab: We have worked with a large number of human subjects and security experts (security officials) to have them get through randomized security schedules, where some are schedules generated by our algorithms, and some are baseline approaches for comparison. Human subjects are paid money based on the reward they collect by successfully intruding through our security schedules; again our game-theoretic schedulers perform significantly better (Pita et al ( Effective-solutions-for-real-world-Stackelberg-games-when-agentsmust-deal-with-human-uncertainties.pdf)). 3 of 8 3/26/15, 3:21 PM 3. Actual security schedules before and after: For some security applications,
4 Milind Tambe we have on game data theory on in security how applications scheduling Machine... was done by humans (before our algorithms were deployed) and how schedules are generated after deployment of our algorithms. For measures of interest to security agencies, e.g., predictability in schedules, we can compare the actual humangenerated schedules vs our algorithmic schedules. Again, game-theoretic schedulers are seen to perform significantly better by avoiding predictability and yet ensuring that more important targets are covered with higher frequency of patrols. Some of this data is published (Shieh et al ( 4. Adversary teams simulate attack: In some cases, security agencies have deployed adversary perspective teams or mock attacker teams that will attempt to conduct surveillance to plan attacks; this is done before and after our algorithms have been deployed to check which security deployments worked better. This was done by the US Coast Guard indicating that the game-theoretic scheduler provided higher levels of deterrence (Shieh et al ( /2014/05/Shieh-et-al-PROTECT-a-deployed-game-theoretic-systemto-protect-the-ports-of-the-United-States.pdf)). 5. Real-time comparison: human vs algorithm: This is a test we ran on the metro trains in Los Angeles. For a day of patrol scheduling, we provided head-to-head comparison of human schedulers trying to schedule 90 officers on patrols vs an automated game-theoretic scheduler. External evaluators then provided an evaluation of these patrols; the evaluators did not know who had generated each of the schedules. The results show that while human schedulers required significant effort even for generating one schedule (almost a day), and the game-theoretic scheduler ran quickly, the external evaluators rated the game theoretic schedulers higher (with statistical significance). (Delle Fave et al. 2014a ( /proceedings/aamas/p1363.pdf), Delle Fave et al. under consideration). 6. Actual data from deployment: This is another test run on the metro trains in LA. We had a comparison of game-theoretic scheduler vs an alternative (in this case a uniform random scheduler augmented with real time human intelligence) to check fare evaders. In 21 days of patrols, the game-theoretic scheduler led to significantly higher numbers of fare evaders captured than the alternative. (Delle Fave et al. 2014a ( /proceedings/aamas/p1363.pdf), Delle Fave et al. 2014b ( 7. Domain expert evaluation (internal and external): There have been of course 4 of 8 significant numbers of evaluations done by domain experts comparing their 3/26/15, 3:21 PM own scheduling method with game theoretic schedulers and repeatedly the
5 Milind Tambe game on theoretic game theory schedulers in security applications have come Machine... out ahead. The fact that our software is now in use for several years at several different important airports, ports, air-traffic, and so on, is an indicator to us that the domain experts must consider this software of some value. All of this evidence suggests that the game-theoretic approaches for security resource optimization performs significantly better than its competitors, i.e., human schedulers or simple randomization. Humans were seen to fall into predictable patterns; and indeed this is an extremely complex adversarial scheduling/planning/allocation task, where humans have to reason about trillions of possible schedules (actually even more), and which is time-consuming and very difficult for humans. It would seem then that we should let this complex task to be handed over to software, and let humans concentrate on the more important tasks of actually physically providing security. Luke: Diana Spears mentioned /2014/04/09/dianaspears/) that you teach a course on Artificial Intelligence and Science Fiction, which includes a section on your research on Asimovian multiagents. Is this 2007 syllabus ( still a pretty accurate outline of the course? What work on Asimovian multiagents do you discuss? She mentioned Schurr et al. (2006) ( /publications/2006_schurr_varakantham_bowring_tambe_grosz.pdf); is there any other work on that topic you ve done? Milind: The last iteration of Understanding intelligent agents via science fiction was taught in Here is the syllabus for it ( /Courses/CSCI300/). This course was jointly developed with my former PhD student, Prof. Emma Bowring, now Associate Professor at Univ of Pacific, and really was her idea to develop it while she was still a student at USC. We have written about this course (Bowring & Tambe 2009 ( /2009/BowringTambe2.pdf)). While we did use Asimov s short stories extensively, the goal here is to really introduce core concepts in agents and multiagent systems, as can be seen from the syllabus. So the focus is more on using these stories, Star Trek clips, and other science fiction as a motivation to introduce core concepts in AI/Agents and Multiagent systems, starting from Markov Decision Problems (MDPs), POMDPs, Game theory, agent modeling and so on. 5 of 8 3/26/15, 3:21 PM While you are right that we have done some follow up work based on Diana s
6 Milind original Tambe on game paper theory and in security earlier applications paper Machine... by Weld & Etzioni (1994) ( best_of_sasemas.pdf) and that is a fascinating thread of research, but that isn t the focus of this course. This is more of an undergraduate course introducing students to key concepts. Towards the end of the course we get into abstract ideas on agent design where students may use some of the ideas advocated in these Asimovian agents, which is great. We haven t pursued that research direction beyond that paper and an earlier one (Pynadath and Tambe 2001 ( Asimov.pdf)). It would be a great idea to push that direction more though. Luke: In Tambe et al. (2013) ( /2014/AAAISS14.pdf) you identify open research issues for game theory in security applications, such as scalability and robustness. Which open research problems in this area do you think would have the largest practical impact if they could be solved well? Milind: Both scalability and robustness are important. Scale-up is important because we want to solve large-scale games. For example, even if we leave aside complex scheduling constraints and just think of the abstract assignment problem of security agencies such as Federal Air Marshals Service of assigning say 20 defenders to 1000 flights, that is 1000-choose-20. These problems become so large that we cant fit games in the normal form in memory and must somehow find an optimal defender strategy without explicitly representing the game in memory. On the other hand, we wish to handle robustness because of the many uncertainties in the game. There is uncertainty related to adversary s surveillance (how much surveillance is actually going on), uncertainty about adversary s payoffs, capabilities, and so on. When we combine the two requirements of solving large-scale games and handling uncertainty, then the problem becomes even more complex. These remain critical challenges for us to address. There are however many other major research challenges that are open. Significant effort has been focused on modeling adversary bounded rationality. This exciting research at the intersection of algorithmic and behavioral game theory is a major area of research in security games. Furthermore, our recent work focused on protecting wildlife and fisheries (Yang et al ( Haskell et al of 8 3/26/15, 3:21 PM ( brings up challenges
7 Milind related Tambe on to game Machine theory Learning. security applications Specifically Machine... we now have data related to say poachers movements and actions. This data can be used to create a better model of the poachers. Another area is preference elicitation. If there is significant uncertainty related to many aspects of the domain, and reducing this uncertainty is going to take effort, then which features do we focus on first to reduce uncertainty? Our recent paper at AAAI 2014 (Nguyen et al ( provides our initial thrust into this area. In short, while we have made significant progress, not just in my group, but as the security games community, there is a lot more that still needs to be done. Luke: Thanks, Milind! Did you like this post? You may enjoy our other Conversations /category/conversations/) posts, including: Kristinn Thórisson on constructivist AI /2014/09/14/kris-thorisson/) Gerwin Klein on Formal Methods /2014/02 /11/gerwin-klein-on-formal-methods/) Toby Walsh on computational social choice /2014/03/10/toby-walsh/) Dave Doty on algorithmic self-assembly /2014/04/23/dave-doty/)... and many more /category /conversations/). Tweet 0 Like of 8 3/26/15, 3:21 PM
8 Milind Tambe on game theory in security applications Machine Comments Machine Intelligence Research Institute Login! Recommend Share Sort by Best Start the discussion ALSO ON MACHINE INTELLIGENCE RESEARCH INSTITUTE WHAT'S THIS? AGI outcomes and civilizational competence 3 comments 5 months ago Diego My meta-pessimism has grown more reading this post and the Lesswrong one on the same topic. It seems to me that as Video of Bostrom s talk on Superintelligence at UC Berkeley 1 comment 5 months ago Steve S Fascinating and terrifying! Incredibly intelligent person, the entire discussion had me on the edge of my seat. This Superintelligence reading group 13 comments 7 months ago Guest The idea of humans devising methods for directly controlling superintelligent AIs seems to me to be implausible. The Lean Nonprofit 1 comment 3 months ago David Kristoffersson Applause! Lean has plenty of valuable lessons for virtually any kind of organization. 8 of 8 3/26/15, 3:21 PM
Modeling Security Decisions as Games
Modeling Security Decisions as Games Chris Kiekintveld University of Texas at El Paso.. and MANY Collaborators Decision Making and Games Research agenda: improve and justify decisions Automated intelligent
More informationGame Theory for Safety and Security. Arunesh Sinha
Game Theory for Safety and Security Arunesh Sinha Motivation: Real World Security Issues 2 Central Problem Allocating limited security resources against an adaptive, intelligent adversary 3 Prior Work
More informationComputational Game Theory for Security: Progress and Challenges
Computational Game Theory for Security: Progress and Challenges Milind Tambe, Albert Xin Jiang Computer Science Department University of Southern California Los Angeles, CA 90089 {tambe, jiangx}@usc.edu
More informationGame Theory for Security:
Game Theory for Security: Key Algorithmic Principles, Deployed Systems, Research Challenges Milind Tambe University of Southern California with: Current/former PhD students/postdocs: Matthew Brown, Francesco
More informationNATHAN SCHURR. Education. Research Interests. Research Funding Granted. Experience. University of Southern California Los Angeles, CA
Expected NATHAN SCHURR PHE 514, University of Southern California, Los Angeles, CA, 90089 (213) 740-9560; schurr@usc.edu Education University of Southern California Los Angeles, CA - in progress Ph.D.
More informationThanh H. Nguyen. Research Interests: Artificial Intelligence, Multi-Agent Systems, Game Theory, Machine Learning, Operations Research, Optimization.
Thanh H. Nguyen Assistant Professor Deschutes Hall Computer & Information Sciene Eugene, OR 97403-1202 University of Oregon Phone: +1 (217) 904 5864 https://ix.cs.uoregon.edu/ thanhhng/ Email: thanhhng@cs.uoregon.edu
More informationResearch Statement Arunesh Sinha aruneshs/
Research Statement Arunesh Sinha aruneshs@usc.edu http://www-bcf.usc.edu/ aruneshs/ Research Theme My research lies at the intersection of Artificial Intelligence and Security 1 and Privacy. Security and
More informationExploring Information Asymmetry in Two-Stage Security Games
Exploring Information Asymmetry in Two-Stage Security Games Haifeng Xu 1, Zinovi Rabinovich 2, Shaddin Dughmi 1, Milind Tambe 1 1 University of Southern California 2 Independent Researcher Security Games
More informationCPE/CSC 580: Intelligent Agents
CPE/CSC 580: Intelligent Agents Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Course Overview Introduction Intelligent Agent, Multi-Agent
More informationStochastic Game Models for Homeland Security
CREATE Research Archive Research Project Summaries 2008 Stochastic Game Models for Homeland Security Erim Kardes University of Southern California, kardes@usc.edu Follow this and additional works at: http://research.create.usc.edu/project_summaries
More informationCPS 570: Artificial Intelligence Game Theory
CPS 570: Artificial Intelligence Game Theory Instructor: Vincent Conitzer What is game theory? Game theory studies settings where multiple parties (agents) each have different preferences (utility functions),
More informationBridging the Gap: Introducing Agents and Multiagent Systems to Undergraduate Students
Bridging the Gap: Introducing Agents and Multiagent Systems to Undergraduate Students ABSTRACT Emma Bowring University of the Pacific Stockton CA 95211, USA ebowring@pacific.edu The field of intelligent
More informationPROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States
PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States Eric Shieh +, Bo An +, Rong Yang +, Milind Tambe +, Craig Baldwin*, Joseph DiRenzo*, Ben Maule*, Garrett Meyer* + University
More informationHierarchical Controller for Robotic Soccer
Hierarchical Controller for Robotic Soccer Byron Knoll Cognitive Systems 402 April 13, 2008 ABSTRACT RoboCup is an initiative aimed at advancing Artificial Intelligence (AI) and robotics research. This
More informationViolent Intent Modeling System
for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716
More informationThe Science In Computer Science
Editor s Introduction Ubiquity Symposium The Science In Computer Science The Computing Sciences and STEM Education by Paul S. Rosenbloom In this latest installment of The Science in Computer Science, Prof.
More informationArtificial Intelligence: Implications for Autonomous Weapons. Stuart Russell University of California, Berkeley
Artificial Intelligence: Implications for Autonomous Weapons Stuart Russell University of California, Berkeley Outline Remit [etc] AI in the context of autonomous weapons State of the Art Likely future
More informationTestimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the
Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the U. S. Senate Committee on Commerce, Science, and Transportation Subcommittee
More informationCS343 Introduction to Artificial Intelligence Spring 2010
CS343 Introduction to Artificial Intelligence Spring 2010 Prof: TA: Daniel Urieli Department of Computer Science The University of Texas at Austin Good Afternoon, Colleagues Welcome to a fun, but challenging
More informationStanford Center for AI Safety
Stanford Center for AI Safety Clark Barrett, David L. Dill, Mykel J. Kochenderfer, Dorsa Sadigh 1 Introduction Software-based systems play important roles in many areas of modern life, including manufacturing,
More informationLearning and Using Models of Kicking Motions for Legged Robots
Learning and Using Models of Kicking Motions for Legged Robots Sonia Chernova and Manuela Veloso Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 {soniac, mmv}@cs.cmu.edu Abstract
More informationCS343 Introduction to Artificial Intelligence Spring 2012
CS343 Introduction to Artificial Intelligence Spring 2012 Prof: TA: Daniel Urieli Department of Computer Science The University of Texas at Austin Good Afternoon, Colleagues Welcome to a fun, but challenging
More informationRandomizing Regression Tests Using Game Theory
Randomizing Regression Tests Using Game Theory Nupul Kukreja, William G.J. Halfond, Milind Tambe University of Southern California Los Angeles, California, USA Email: {nkukreja, halfond, tambe}@usc.edu
More informationRoboCup. Presented by Shane Murphy April 24, 2003
RoboCup Presented by Shane Murphy April 24, 2003 RoboCup: : Today and Tomorrow What we have learned Authors Minoru Asada (Osaka University, Japan), Hiroaki Kitano (Sony CS Labs, Japan), Itsuki Noda (Electrotechnical(
More informationA short introduction to Security Games
Game Theoretic Foundations of Multiagent Systems: Algorithms and Applications A case study: Playing Games for Security A short introduction to Security Games Nicola Basilico Department of Computer Science
More informationReinforcement Learning for Ethical Decision Making
Reinforcement Learning for Ethical Decision Making The Workshops of the Thirtieth AAAI Conference on Artificial Intelligence AI, Ethics, and Society: Technical Report WS-16-02 David Abel, James MacGlashan,
More informationTesca Fitzgerald. Graduate Research Assistant Aug
Tesca Fitzgerald Webpage www.tescafitzgerald.com Email tesca.fitzgerald@cc.gatech.edu Last updated April 2018 School of Interactive Computing Georgia Institute of Technology 801 Atlantic Drive, Atlanta,
More informationCS594, Section 30682:
CS594, Section 30682: Distributed Intelligence in Autonomous Robotics Spring 2003 Tuesday/Thursday 11:10 12:25 http://www.cs.utk.edu/~parker/courses/cs594-spring03 Instructor: Dr. Lynne E. Parker ½ TA:
More informationIntro to Interactive Entertainment Spring 2017 Syllabus CS 1010 Instructor: Tim Fowers
Intro to Interactive Entertainment Spring 2017 Syllabus CS 1010 Instructor: Tim Fowers Email: tim@fowers.net 1) Introduction Basics of Game Design: definition of a game, terminology and basic design categories.
More informationSPQR RoboCup 2016 Standard Platform League Qualification Report
SPQR RoboCup 2016 Standard Platform League Qualification Report V. Suriani, F. Riccio, L. Iocchi, D. Nardi Dipartimento di Ingegneria Informatica, Automatica e Gestionale Antonio Ruberti Sapienza Università
More informationArpita Biswas. Speaker. PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore
Speaker Arpita Biswas PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore Email address: arpita.biswas@live.in OUTLINE Game Theory Basic Concepts and Results
More informationDesign of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan
Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Outline Introduction to Game Theory and solution concepts Game definition
More informationScience Integration Fellowship: California Ocean Science Trust & Humboldt State University
Science Integration Fellowship: California Ocean Science Trust & Humboldt State University SYNOPSIS California Ocean Science Trust (www.oceansciencetrust.org) and Humboldt State University (HSU) are pleased
More informationWorkshop on Intelligent System and Applications (ISA 17)
Telemetry Mining for Space System Sara Abdelghafar Ahmed PhD student, Al-Azhar University Member of SRGE Workshop on Intelligent System and Applications (ISA 17) 13 May 2017 Workshop on Intelligent System
More informationCase Study: Joseph Cole Breaks Through Longstanding Income and Client Ceiling Within Weeks of Enrolling in B2B Biz Launcher
Case Study: Joseph Cole Breaks Through Longstanding Income and Client Ceiling Within Weeks of Enrolling in B2B Biz Launcher Thanks for talking with me a little bit today about your experiences so far,
More informationGame Theory. Department of Electronics EL-766 Spring Hasan Mahmood
Game Theory Department of Electronics EL-766 Spring 2011 Hasan Mahmood Email: hasannj@yahoo.com Course Information Part I: Introduction to Game Theory Introduction to game theory, games with perfect information,
More informationRandall Davis Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Cambridge, Massachusetts, USA
Multimodal Design: An Overview Ashok K. Goel School of Interactive Computing Georgia Institute of Technology Atlanta, Georgia, USA Randall Davis Department of Electrical Engineering and Computer Science
More informationDesign of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan
Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Introduction Intelligent security for physical infrastructures Our objective:
More informationAbhishek Gupta CONTACT INFORMATION. 360 Coordinated Science Laboratory
Abhishek Gupta CONTACT INFORMATION RESEARCH INTERESTS 360 Coordinated Science Laboratory +1-217-819-6382 University of Illinois at Urbana-Champaign gupta54@illinois.edu 1308 W Main Street publish.illinois.edu/gupta54/
More informationCS295-1 Final Project : AIBO
CS295-1 Final Project : AIBO Mert Akdere, Ethan F. Leland December 20, 2005 Abstract This document is the final report for our CS295-1 Sensor Data Management Course Final Project: Project AIBO. The main
More informationIntel Labs, Hillsboro, OR, June 2013 Aug 2013 Research Intern: Machine learning based detection of activity of mobile-phone users.
ARUNESH SINHA University of Michigan Cell Phone: 412-420-9628 Department of Computer Science Official Email: arunesh@umich.edu 2709 Beyster, 2260 Hayward St, Alternate Email: aruneshsinha@gmail.com Ann
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of C S What is C S? Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 16 What is C S? What do you think? A definition CS and programming Areas of CS
More informationUsing Science Fiction in Teaching Artificial Intelligence
Using Science Fiction in Teaching Artificial Intelligence Milind Tambe Computer Science Dept. University of Southern California Los Angeles, CA 90089 {tambe}@usc.edu Anne Balsamo Interactive Media Division
More informationDistributed, Play-Based Coordination for Robot Teams in Dynamic Environments
Distributed, Play-Based Coordination for Robot Teams in Dynamic Environments Colin McMillen and Manuela Veloso School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, U.S.A. fmcmillen,velosog@cs.cmu.edu
More informationA Game Theoretic Approach on Addressing Cooperation among Human Adversaries
A Game Theoretic Approach on Addressing Cooperation among Human Adversaries Shahrzad Gholami, Bryan Wilder, Matthew Brown, Arunesh Sinha, Nicole Sintov, Milind Tambe University of Southern California,
More informationHuman Factors in Control
Human Factors in Control J. Brooks 1, K. Siu 2, and A. Tharanathan 3 1 Real-Time Optimization and Controls Lab, GE Global Research 2 Model Based Controls Lab, GE Global Research 3 Human Factors Center
More informationThe Intel Science and Technology Center for Pervasive Computing
The Intel Science and Technology Center for Pervasive Computing Investing in New Levels of Academic Collaboration Rajiv Mathur, Program Director ISTC-PC Anthony LaMarca, Intel Principal Investigator Professor
More informationAIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara
AIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara Sketching has long been an essential medium of design cognition, recognized for its ability
More informationA Game Theoretic Approach on Addressing Collusion among Human Adversaries
A Game Theoretic Approach on Addressing Collusion among Human Adversaries Shahrzad Gholami, Bryan Wilder, Matthew Brown, Arunesh Sinha, Nicole Sintov, Milind Tambe University of Southern California, USA,
More informationDeployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport
Deployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport James Pita, Manish Jain, Janusz Marecki, Fernando Ordóñez, Christopher Portway,
More informationArtificial Intelligence
Artificial Intelligence Lecture 01 - Introduction Edirlei Soares de Lima What is Artificial Intelligence? Artificial intelligence is about making computers able to perform the
More informationCS 380: ARTIFICIAL INTELLIGENCE INTRODUCTION. Santiago Ontañón
CS 380: ARTIFICIAL INTELLIGENCE INTRODUCTION Santiago Ontañón so367@drexel.edu CS 380 Focus: Introduction to AI: basic concepts and algorithms. Topics: What is AI? Problem Solving and Heuristic Search
More informationArtificial Intelligence. Minimax and alpha-beta pruning
Artificial Intelligence Minimax and alpha-beta pruning In which we examine the problems that arise when we try to plan ahead to get the best result in a world that includes a hostile agent (other agent
More informationNSF-Sponsored Workshop: Research Issues at at the Boundary of AI and Robotics
NSF-Sponsored Workshop: Research Issues at at the Boundary of AI and Robotics robotics.cs.tamu.edu/nsfboundaryws Nancy Amato, Texas A&M (ICRA-15 Program Chair) Sven Koenig, USC (AAAI-15 Program Co-Chair)
More informationElements of Artificial Intelligence and Expert Systems
Elements of Artificial Intelligence and Expert Systems Master in Data Science for Economics, Business & Finance Nicola Basilico Dipartimento di Informatica Via Comelico 39/41-20135 Milano (MI) Ufficio
More informationThe essential role of. mental models in HCI: Card, Moran and Newell
1 The essential role of mental models in HCI: Card, Moran and Newell Kate Ehrlich IBM Research, Cambridge MA, USA Introduction In the formative years of HCI in the early1980s, researchers explored the
More informationArtificial Intelligence: Implications for Autonomous Weapons. Stuart Russell University of California, Berkeley
Artificial Intelligence: Implications for Autonomous Weapons Stuart Russell University of California, Berkeley Outline AI and autonomy State of the art Likely future developments Conclusions What is AI?
More informationScalable Randomized Patrolling for Securing Rapid Transit Networks
Scalable Randomized Patrolling for Securing Rapid Transit Networks Pradeep Varakantham, Hoong Chuin Lau, Zhi Yuan School of Information Systems, Singapore Management University, Singapore {pradeepv,hclau,zhiyuan}@smu.edu.sg
More informationReinforcement Learning Applied to a Game of Deceit
Reinforcement Learning Applied to a Game of Deceit Theory and Reinforcement Learning Hana Lee leehana@stanford.edu December 15, 2017 Figure 1: Skull and flower tiles from the game of Skull. 1 Introduction
More informationDeep Learning for Autonomous Driving
Deep Learning for Autonomous Driving Shai Shalev-Shwartz Mobileye IMVC dimension, March, 2016 S. Shalev-Shwartz is also affiliated with The Hebrew University Shai Shalev-Shwartz (MobilEye) DL for Autonomous
More informationModeling Enterprise Systems
Modeling Enterprise Systems A summary of current efforts for the SERC November 14 th, 2013 Michael Pennock, Ph.D. School of Systems and Enterprises Stevens Institute of Technology Acknowledgment This material
More informationAr#ficial)Intelligence!!
Ar#ficial)Intelligence!! Ar#ficial) intelligence) is) the) science) of) making) machines) do) things) that) would) require) intelligence)if)done)by)men.) Marvin)Minsky,)1967) Roman Barták Department of
More informationCOMP219: Artificial Intelligence. Lecture 2: AI Problems and Applications
COMP219: Artificial Intelligence Lecture 2: AI Problems and Applications 1 Introduction Last time General module information Characterisation of AI and what it is about Today Overview of some common AI
More informationUNIVERSITY OF CAMBRIDGE FACULTY OF LAW OPEN DAY 2018
UNIVERSITY OF CAMBRIDGE FACULTY OF LAW OPEN DAY 2018 Applying to Cambridge Law Speaker: Mrs Ali Lyons Okay, good afternoon, everyone. My name is Ali Lyons and I work here at the Faculty of Law. I am working
More informationUnit 2: Understanding NIMS
Unit 2: Understanding NIMS This page intentionally left blank. Objectives At the end of this unit, you should be able to describe: The intent of NIMS. Key concepts and principles underlying NIMS. Scope
More informationCS 343H: Artificial Intelligence. Week 1a: Introduction
CS 343H: Artificial Intelligence Week 1a: Introduction Good Morning Colleagues Welcome to a fun, but challenging course Goal: Learn about Artificial Intelligence Increase AI literacy Prepare you for topics
More informationAGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS. Nuno Sousa Eugénio Oliveira
AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS Nuno Sousa Eugénio Oliveira Faculdade de Egenharia da Universidade do Porto, Portugal Abstract: This paper describes a platform that enables
More informationCreating a Poker Playing Program Using Evolutionary Computation
Creating a Poker Playing Program Using Evolutionary Computation Simon Olsen and Rob LeGrand, Ph.D. Abstract Artificial intelligence is a rapidly expanding technology. We are surrounded by technology that
More informationCOMP219: COMP219: Artificial Intelligence Artificial Intelligence Dr. Annabel Latham Lecture 12: Game Playing Overview Games and Search
COMP19: Artificial Intelligence COMP19: Artificial Intelligence Dr. Annabel Latham Room.05 Ashton Building Department of Computer Science University of Liverpool Lecture 1: Game Playing 1 Overview Last
More informationThe Institute for Communication Technology Management CTM. A Center of Excellence Marshall School of Business University of Southern California
The Institute for Communication Technology Management CTM A Center of Excellence Marshall School of Business University of Southern California Technology is Changing Business New technologies appear every
More informationExecutive Summary. Chapter 1. Overview of Control
Chapter 1 Executive Summary Rapid advances in computing, communications, and sensing technology offer unprecedented opportunities for the field of control to expand its contributions to the economic and
More informationOptimal Rhode Island Hold em Poker
Optimal Rhode Island Hold em Poker Andrew Gilpin and Tuomas Sandholm Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 {gilpin,sandholm}@cs.cmu.edu Abstract Rhode Island Hold
More informationFive-In-Row with Local Evaluation and Beam Search
Five-In-Row with Local Evaluation and Beam Search Jiun-Hung Chen and Adrienne X. Wang jhchen@cs axwang@cs Abstract This report provides a brief overview of the game of five-in-row, also known as Go-Moku,
More informationA conversation with Russell Stewart, July 29, 2015
Participants A conversation with Russell Stewart, July 29, 2015 Russell Stewart PhD Student, Stanford University Nick Beckstead Research Analyst, Open Philanthropy Project Holden Karnofsky Managing Director,
More informationNOVEMBER 20 21, 2018 SMARTVILLAGE, MUNICH
NOVEMBER 20 21, 2018 SMARTVILLAGE, MUNICH shutterstock.com - agsandrew Sponsors: Organisation Partner: Organized by: We make Artificial Intelligence tangible for you. The German edition of the MIT Technology
More informationBay Area Team - Director of Operations, Bryan Johnston
Subscribe Iridescent Send to a Friend This year promises to be a pivotal one for Iridescent! We are expanding to three sites (New York City, San Francisco Bay Area and Los Angeles) and are building a stellar
More informationTHE AI REVOLUTION. How Artificial Intelligence is Redefining Marketing Automation
THE AI REVOLUTION How Artificial Intelligence is Redefining Marketing Automation The implications of Artificial Intelligence for modern day marketers The shift from Marketing Automation to Intelligent
More informationCSE 435: Software Engineering
CSE 435: Software Engineering Dr. James Daly 3501 Engineering Building Office: 3501 EB, by appointment dalyjame at msu dot edu TAs: Vincent Ragusa and Mohammad Roohitavaf Helproom Tuesday: 2-4 pm, Wednesday
More informationLean Enablers for Managing Engineering Programs
Lean Enablers for Managing Engineering Programs Presentation to the INCOSE Enchantment Chapter June 13 2012 Josef Oehmen http://lean.mit.edu 2012 Massachusetts Institute of Technology, Josef Oehmen, oehmen@mit.edu
More information15 th Annual Conference on Systems Engineering Research
The image part with relationship ID rid3 was not found in the file. The image part with relationship ID rid7 was not found in the file. 15 th Annual Conference on Systems Engineering Research March 23-25
More informationCURRICULUM VITAE. Evan Drumwright EDUCATION PROFESSIONAL PUBLICATIONS
CURRICULUM VITAE Evan Drumwright 209 Dunn Hall The University of Memphis Memphis, TN 38152 Phone: 901-678-3142 edrmwrgh@memphis.edu http://cs.memphis.edu/ edrmwrgh EDUCATION Ph.D., Computer Science, May
More informationUsing Dynamic Capability Evaluation to Organize a Team of Cooperative, Autonomous Robots
Using Dynamic Capability Evaluation to Organize a Team of Cooperative, Autonomous Robots Eric Matson Scott DeLoach Multi-agent and Cooperative Robotics Laboratory Department of Computing and Information
More informationArtificial Intelligence. Shobhanjana Kalita Dept. of Computer Science & Engineering Tezpur University
Artificial Intelligence Shobhanjana Kalita Dept. of Computer Science & Engineering Tezpur University What is AI? What is Intelligence? The ability to acquire and apply knowledge and skills (definition
More informationHow Explainability is Driving the Future of Artificial Intelligence. A Kyndi White Paper
How Explainability is Driving the Future of Artificial Intelligence A Kyndi White Paper 2 The term black box has long been used in science and engineering to denote technology systems and devices that
More informationMilind Tambe. Founding Co-Director, CAIS Center for AI in Society. Director, Teamcore Research Group on Agents and Multiagent Systems
Vita 1 Milind Tambe Helen N. and Emmett H. Jones Professor in Engineering Professor, Computer Science & Industrial and Systems Engineering Departments Founding Co-Director, CAIS Center for AI in Society
More informationSurveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan
Surveillance strategies for autonomous mobile robots Nicola Basilico Department of Computer Science University of Milan Intelligence, surveillance, and reconnaissance (ISR) with autonomous UAVs ISR defines
More informationSoftware-Intensive Systems Producibility
Pittsburgh, PA 15213-3890 Software-Intensive Systems Producibility Grady Campbell Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University SSTC 2006. - page 1 Producibility
More informationSmarter Defense, an IBM Perspective IBM Corporation
1 Smarter Defense, an IBM perspective, Tom Hawk, IBM General Manager, Nordics Integrated Market Team Agenda Smarter Planet : What s New? Transformation: IBM lessons SPADE: One Year On 3 As the digital
More informationChallenging the Situational Awareness on the Sea from Sensors to Analytics. Programme Overview
Challenging the Situational Awareness on the Sea from Sensors to Analytics New technologies for data gathering, dissemination, sharing and analytics in the Mediterranean theatre Programme Overview The
More informationArtificial Intelligence
Torralba and Wahlster Artificial Intelligence Chapter 1: Introduction 1/22 Artificial Intelligence 1. Introduction What is AI, Anyway? Álvaro Torralba Wolfgang Wahlster Summer Term 2018 Thanks to Prof.
More informationKeywords: Multi-robot adversarial environments, real-time autonomous robots
ROBOT SOCCER: A MULTI-ROBOT CHALLENGE EXTENDED ABSTRACT Manuela M. Veloso School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213, USA veloso@cs.cmu.edu Abstract Robot soccer opened
More informationCandidate Statements for the Alliance Française de Sacramento BOARD 2018 New Candidates
Candidate Statements for the Alliance Française de Sacramento BOARD 2018 New Candidates Don Rodes With over 40 years of business experience I can contribute a helpful business perspective to the board
More informationAnt Robotics. Terrain Coverage. Motivation. Overview
Overview Ant Robotics Terrain Coverage Sven Koenig College of Computing Gegia Institute of Technology Overview: One-Time Repeated Coverage of Known Unknown Terrain with Single Ant Robots Teams of Ant Robots
More informationIntroduction to Artificial Intelligence: cs580
Office: Nguyen Engineering Building 4443 email: zduric@cs.gmu.edu Office Hours: Mon. & Tue. 3:00-4:00pm, or by app. URL: http://www.cs.gmu.edu/ zduric/ Course: http://www.cs.gmu.edu/ zduric/cs580.html
More information100 Year Study on AI: 1st Study Panel Report
Artificial Intelligence and Life in 2030 100 Year Study on AI: 1st Study Panel Report Prof. Peter Stone* Study Panel Chair Department of Computer Science The University of Texas at Austin *Also Cogitai,
More informationInterview with Robbie Allen, CEO, Automated Insights. For podcast release Monday, July 28, 2014
Interview with Robbie Allen, CEO, Automated Insights For podcast release Monday, July 28, 2014 KENNEALLY: In science fiction, robots make lighting-fast calculations and have superhuman strength. From Forbidden
More informationDependable AI Systems
Dependable AI Systems Homa Alemzadeh University of Virginia In collaboration with: Kush Varshney, IBM Research 2 Artificial Intelligence An intelligent agent or system that perceives its environment and
More informationUNIT-III LIFE-CYCLE PHASES
INTRODUCTION: UNIT-III LIFE-CYCLE PHASES - If there is a well defined separation between research and development activities and production activities then the software is said to be in successful development
More informationAutonomy Test & Evaluation Verification & Validation (ATEVV) Challenge Area
Autonomy Test & Evaluation Verification & Validation (ATEVV) Challenge Area Stuart Young, ARL ATEVV Tri-Chair i NDIA National Test & Evaluation Conference 3 March 2016 Outline ATEVV Perspective on Autonomy
More informationProgrammable self-assembly in a thousandrobot
Programmable self-assembly in a thousandrobot swarm Michael Rubenstein, Alejandro Cornejo, Radhika Nagpal. By- Swapna Joshi 1 st year Ph.D Computing Culture and Society. Authors Michael Rubenstein Assistant
More information