Incidents Elie Bursztein and Jean Goubault Larrecq
|
|
- Blake Summers
- 5 years ago
- Views:
Transcription
1 A Logical Framework for Anticipation of Network Incidents and Jean Goubault Larrecq PhdStudent LSV ENS CACHAN CNRS INRIA DGA
2 Outline Introduction Network Evolution Attack Model Evolution Anticipation game key features Dependency relations Player interaction Time Model Logic Positional Logic Temporal Logic Conclusion Outline: Introduction > Model > Strategy > Conclusion 2
3 The Good Old Time Outline: Introduction > Model > Strategy > Conclusion 3
4 The Current Internet Opte project Outline: Introduction > Model > Strategy > Conclusion 4
5 Attack Sophistication vs. Intruder Knowledge Cert/ Carnegie Mellon University Outline: Introduction > Model > Strategy > Conclusion 5
6 Attack Step stones Large network may suffers multiples l vulnerabilities Patches and counter measures need to be prioritized A minor vulnerability can turn into a major hole when used as a step stone Attack graph allows to reason about attack sequences Outline: Introduction > Model > Strategy > Conclusion 6
7 Attack Graph Example Sandia Red Team White Board attack graph from DARPA CC20008 Information battle space preparation experiment Outline: Introduction > Model > Strategy > Conclusion 7
8 Model Evolution Attack graphs model checker (Ritchey and Ammann 2000) Anticipation Games Attack trees (Schneier 1999) Outline: Introduction > Model > Strategy > Conclusion 8
9 Attack graph Related Work Model checker based (Ritchey et. al S&P 00, Sheyner et. al S&P 02) Graph based (Ammann et. alccs 02,Ritchey et. al ACSAC 02, Noel et. al ACSAC 03, Wang et. al ESORICS 05,Wang et. al DBSEC 06) Timed Game ATL (Alur et al. 97) The Element of Surprise in Timed Games (De Alfaro et al. CONCUR 2003) TATL (Henzinger et al 2006 Formats) Outline: Introduction > Model > Strategy > Conclusion 9
10 Model Key Features Dependency Collateral effects Trust relations Interaction Administrator Intruder Time Action take time Outline: Introduction > Model > Strategy > Conclusion 10
11 Dependency User Database server Web server Client 1 Client 2 Client 3 Outline: Introduction > Model > Strategy > Conclusion 11
12 Network interaction Exploit vulnerabilities Abuse trust relations Patch Firewall Restore Outline: Introduction > Model > Strategy > Conclusion 12
13 Vulnerability cycle Cert/ Carnegie Mellon University Outline: Introduction > Model > Strategy > Conclusion 13
14 Network Information Fixed over the time Evolve over time Web server User Database Dtb server ρ(public) T T ρ(vuln) T T ρ(compr) ρ(needpub) T T Client 1 Client 2 Client 3 Outline: Introduction > Model > Strategy > Conclusion 14
15 Information Evolution ρ(public) T T Compr 4 ρ(public) T T ρ(vuln) T T ρ(vuln) T T ρ(compr) ρ(compr) T ρ(needpu ρ(needpu T T b) b) T T Outline: Introduction > Model > Strategy > Conclusion 15
16 A Incomplete Game Example Exploit web server Patch server Exploit server Patch web server Patch server Outline: Introduction > Model > Strategy > Conclusion 16
17 Time Each action requires a different amount of time Patching a service: Download, extract, apply, restart Exploit a service Firewalling a service In anticipation games as in TATL the fastest action win Player can be taken by surprise Outline: Introduction > Model > Strategy > Conclusion 17
18 The element of surprise Exploit 4 in 3 unit Network Firewall 4 in 1 unit Outline: Introduction > Model > Strategy > Conclusion 18
19 Type of attacks Anticipation games allows to model Denial of service Buffer overflow execution Permission abuse Cross scripting Information leak. Outline: Introduction > Model > Strategy > Conclusion 19
20 Rule Language Outline: Introduction > Model > Strategy > Conclusion 20
21 Semantic A successor node is compromised At least, one of the node the belongs to the equivalence is public Outline: Introduction > Model > Strategy > Conclusion 21
22 Rules example Outline: Introduction > Model > Strategy > Conclusion 22
23 A Play example User Database 6 Web server server Client 1 Client 2 Client 3 = Player Ati Action Rule Target Succ Admin Choose Execute Firewall Unfirewall Patch 5 4 Intruder Fail Choose Execute Compromise 0day Forward Backward Outline: Introduction > Model > Strategy > Conclusion 23
24 Properties Semantic Outline: Introduction > Model > Strategy > Conclusion 24
25 Semantic The player A have a strategy to satisfy the property In every future the node will be compromised Outline: Introduction > Model > Strategy > Conclusion 25
26 Property Illustration Outline: Introduction > Model > Strategy > Conclusion 26
27 Decidability TATL Formula model checking in Anticipation game is decidable and EXPTIME complete Outline: Introduction > Model > Strategy > Conclusion 27
28 One More Thing!
29 It Work! Model and Strategies are fully implemented in C The talk example cannot be analyzed by hand 4011 plays states tt Outline: Introduction > Model > Strategy > Conclusion 29
30 Analyzer Demo
31 Future Work CIA model Abstraction Non determinism Outline: Introduction > Model > Strategy > Conclusion 31
32 Conclusion Game and Time provide a richer model for intrusion i analysis Many directions to explore Outline: Introduction > Model > Strategy > Conclusion 32
33 Questions During this work no network service was injured or tortured. Outline: Introduction > Model > Strategy > Conclusion 33
34 Rule execution time Outline: Introduction > Model > Strategy > Conclusion 34
How Much Memory is Needed to Win in Partial-Observation Games
How Much Memory is Needed to Win in Partial-Observation Games Laurent Doyen LSV, ENS Cachan & CNRS & Krishnendu Chatterjee IST Austria GAMES 11 How Much Memory is Needed to Win in Partial-Observation Games
More informationSoftware Engineering Design & Construction
Winter Semester 16/17 Software Engineering Design & Construction Dr. Michael Eichberg Fachgebiet Softwaretechnik Technische Universität Darmstadt Introduction - Software Engineering Software Engineering
More informationTimed Games UPPAAL-TIGA. Alexandre David
Timed Games UPPAAL-TIGA Alexandre David 1.2.05 Overview Timed Games. Algorithm (CONCUR 05). Strategies. Code generation. Architecture of UPPAAL-TIGA. Interactive game. Timed Games with Partial Observability.
More informationLecture 19 November 6, 2014
6.890: Algorithmic Lower Bounds: Fun With Hardness Proofs Fall 2014 Prof. Erik Demaine Lecture 19 November 6, 2014 Scribes: Jeffrey Shen, Kevin Wu 1 Overview Today, we ll cover a few more 2 player games
More informationIntroduction to Game Theory
Introduction to Game Theory (From a CS Point of View) Olivier Serre Serre@irif.fr IRIF (CNRS & Université Paris Diderot Paris 7) 14th of September 2017 Master Parisien de Recherche en Informatique Who
More informationGeneral Game Playing (GGP) Winter term 2013/ Summary
General Game Playing (GGP) Winter term 2013/2014 10. Summary Sebastian Wandelt WBI, Humboldt-Universität zu Berlin General Game Playing? General Game Players are systems able to understand formal descriptions
More informationComputer Game Programming Board Games
1-466 Computer Game Programg Board Games Maxim Likhachev Robotics Institute Carnegie Mellon University There Are Still Board Games Maxim Likhachev Carnegie Mellon University 2 Classes of Board Games Two
More informationDiscerning the Intent of Maturity Models from Characterizations of Security Posture
Discerning the Intent of Maturity Models from Characterizations of Security Posture Rich Caralli January 2012 MATURITY MODELS Maturity models in their simplest form are intended to provide a benchmark
More informationGame Theory. 6 Dynamic Games with imperfect information
Game Theory 6 Dynamic Games with imperfect information Review of lecture five Game tree and strategies Dynamic games of perfect information Games and subgames ackward induction Subgame perfect Nash equilibrium
More informationPotential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain
This fiche is part of the wider roadmap for cross-cutting KETs activities Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain Cross-cutting
More informationLearning Cyber Security Through Gamification
ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 8(7), 642 649, April 2015 DOI: 10.17485/ijst/2015/v8i7/67760 Learning Cyber Security Through Gamification
More informationGames of Perfect Information and Backward Induction
Games of Perfect Information and Backward Induction Economics 282 - Introduction to Game Theory Shih En Lu Simon Fraser University ECON 282 (SFU) Perfect Info and Backward Induction 1 / 14 Topics 1 Basic
More informationSurvivability of critical infrastructure
Foundations for Survivable Systems Engineering Survivability of critical infrastructure systems has become an urgent priority. These large-scale networked systems improve the efficiency of organizations
More informationULS Systems Research Roadmap
ULS Systems Research Roadmap Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2008 Carnegie Mellon University Roadmap Intent Help evaluate the ULS systems relevance of existing
More informationEXPLOITING STEAM LOBBIES AND MATCHMAKING
Revision 1 EXPLOITING STEAM LOBBIES AND MATCHMAKING BY LUIGI AURIEMMA Description of the security vulnerabilities that affected the Steam lobbies and all the games using the Steam Matchmaking functionalities.
More informationDecomposition Search A Combinatorial Games Approach to Game Tree Search, with Applications to Solving Go Endgames
Decomposition Search Combinatorial Games pproach to Game Tree Search, with pplications to Solving Go Endgames Martin Müller University of lberta Edmonton, Canada Decomposition Search What is decomposition
More informationCMPUT 657: Heuristic Search
CMPUT 657: Heuristic Search Assignment 1: Two-player Search Summary You are to write a program to play the game of Lose Checkers. There are two goals for this assignment. First, you want to build the smallest
More informationFrameworks for Assessing IT Systems Engineering Acquisition Issues and Proposed Approaches in Support of Public Law 111
Frameworks for Assessing IT Systems Engineering Acquisition Issues and Proposed Approaches in Support of Public Law 111 15 th Annual Systems Engineering Conference Net Centric Operations/Interoperability
More informationComputing Elo Ratings of Move Patterns. Game of Go
in the Game of Go Presented by Markus Enzenberger. Go Seminar, University of Alberta. May 6, 2007 Outline Introduction Minorization-Maximization / Bradley-Terry Models Experiments in the Game of Go Usage
More informationExtensive Form Games. Mihai Manea MIT
Extensive Form Games Mihai Manea MIT Extensive-Form Games N: finite set of players; nature is player 0 N tree: order of moves payoffs for every player at the terminal nodes information partition actions
More informationAutomatic Heuristic Construction in a Complete General Game Player
Automatic Heuristic Construction in a Complete General Game Player Gregory Kuhlmann Kurt Dresner Peter Stone Learning Agents Research Group Department of Computer Sciences The University of Texas at Austin
More informationJim and Nim. Japheth Wood New York Math Circle. August 6, 2011
Jim and Nim Japheth Wood New York Math Circle August 6, 2011 Outline 1. Games Outline 1. Games 2. Nim Outline 1. Games 2. Nim 3. Strategies Outline 1. Games 2. Nim 3. Strategies 4. Jim Outline 1. Games
More informationLecture 6: Metagaming
Lecture 6: Game Optimization Symmetry and Factoring Structure Identification Evaluation Functions Monte Carlo Tree Search 1 Rule Ordering Example: ancestor(x,z)
More informationAutomated Software Engineering Writing Code to Help You Write Code. Gregory Gay CSCE Computing in the Modern World October 27, 2015
Automated Software Engineering Writing Code to Help You Write Code Gregory Gay CSCE 190 - Computing in the Modern World October 27, 2015 Software Engineering The development and evolution of high-quality
More informationPlaying Games. Henry Z. Lo. June 23, We consider writing AI to play games with the following properties:
Playing Games Henry Z. Lo June 23, 2014 1 Games We consider writing AI to play games with the following properties: Two players. Determinism: no chance is involved; game state based purely on decisions
More information1.1 Investigate the capabilities and limitations of a range of digital gaming platforms
Unit Title: Game design concepts Level: 2 OCR unit number: 215 Credit value: 4 Guided learning hours: 30 Unit reference number: T/600/7735 Unit purpose and aim This unit helps learners to understand the
More informationHow Shall We Play a Game?
How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, David Brumley Carnegie Mellon University {tiffanybao,
More informationA game-based model for human-robots interaction
A game-based model for human-robots interaction Aniello Murano and Loredana Sorrentino Dipartimento di Ingegneria Elettrica e Tecnologie dell Informazione Università degli Studi di Napoli Federico II,
More informationInteractive Visualizations for Cyber-
Interactive Visualizations for Cyber- Mission Awareness ARO MURI on Cyber Situation Awareness Year One Review Meeting Tobias Höllerer Four Eyes Laboratory (Imaging, Interaction, and Innovative Interfaces),
More informationLocal and Low-Cost White Space Detection
Local and Low-Cost White Space Detection Ahmed Saeed*, Khaled A. Harras, Ellen Zegura*, and Mostafa Ammar* *Georgia Institute of Technology Carnegie Mellon University Qatar White Space Definition A vacant
More informationGame Design From Concepts To Implementation
Game Design From Concepts To Implementation Games Go Online The Dawn of Online Games Yesterday: we were buying boxes from the shelf Bad news: those times are gone! Today: we download a software for free
More informationGame Playing. Why do AI researchers study game playing? 1. It s a good reasoning problem, formal and nontrivial.
Game Playing Why do AI researchers study game playing? 1. It s a good reasoning problem, formal and nontrivial. 2. Direct comparison with humans and other computer programs is easy. 1 What Kinds of Games?
More informationInfrastructure as Code CS398 - ACC
Infrastructure as Code CS398 - ACC Prof. Robert J. Brunner Ben Congdon Tyler Kim MP7 How s it going? Final Autograder run: - Tonight ~8pm - Tomorrow ~3pm Due tomorrow at 11:59 pm. Latest Commit to the
More informationPackaging Projects, Maps and Layers. Shilpi Jain Melanie Summers
Packaging Projects, Maps and Layers Shilpi Jain Melanie Summers What can be packaged Layer Map Project Layer package (.lypkx) Tile package (.tpk) Scene layer package (.slpk) Map package (.mpkx) Mobile
More information4. Game Theory: Introduction
4. Game Theory: Introduction Laurent Simula ENS de Lyon L. Simula (ENSL) 4. Game Theory: Introduction 1 / 35 Textbook : Prajit K. Dutta, Strategies and Games, Theory and Practice, MIT Press, 1999 L. Simula
More informationCOMP219: COMP219: Artificial Intelligence Artificial Intelligence Dr. Annabel Latham Lecture 12: Game Playing Overview Games and Search
COMP19: Artificial Intelligence COMP19: Artificial Intelligence Dr. Annabel Latham Room.05 Ashton Building Department of Computer Science University of Liverpool Lecture 1: Game Playing 1 Overview Last
More informationPASSENGER. Story of a convergent pipeline. Thomas Felix TG - Passenger Ubisoft Montréal. Pierre Blaizeau TWINE Ubisoft Montréal
PASSENGER Story of a convergent pipeline Thomas Felix TG - Passenger Ubisoft Montréal Pierre Blaizeau TWINE Ubisoft Montréal Technology Group PASSENGER How to expand your game universe? How to bridge game
More informationBackward Induction and Stackelberg Competition
Backward Induction and Stackelberg Competition Economics 302 - Microeconomic Theory II: Strategic Behavior Shih En Lu Simon Fraser University (with thanks to Anke Kessler) ECON 302 (SFU) Backward Induction
More informationAnnouncements. CS 188: Artificial Intelligence Fall Today. Tree-Structured CSPs. Nearly Tree-Structured CSPs. Tree Decompositions*
CS 188: Artificial Intelligence Fall 2010 Lecture 6: Adversarial Search 9/1/2010 Announcements Project 1: Due date pushed to 9/15 because of newsgroup / server outages Written 1: up soon, delayed a bit
More informationExtensive Games with Perfect Information. Start by restricting attention to games without simultaneous moves and without nature (no randomness).
Extensive Games with Perfect Information There is perfect information if each player making a move observes all events that have previously occurred. Start by restricting attention to games without simultaneous
More informationSoar-RL A Year of Learning
Soar-RL A Year of Learning Nate Derbinsky University of Michigan Outline The Big Picture Developing Soar-RL Agents Controlling the Soar-RL Algorithm Debugging Soar-RL Soar-RL Performance Nuggets & Coal
More informationLecture 5: Subgame Perfect Equilibrium. November 1, 2006
Lecture 5: Subgame Perfect Equilibrium November 1, 2006 Osborne: ch 7 How do we analyze extensive form games where there are simultaneous moves? Example: Stage 1. Player 1 chooses between fin,outg If OUT,
More informationESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES
DIRK KRAFZIG MANAS DEB MARTIN FRICK DIGITAL COOKBOOK ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES For more details visit: https://digital-cookbook.com/ GRAPHIC DESIGN BY KNUT JUNKER AND DIETMAR
More informationFeature Learning Using State Differences
Feature Learning Using State Differences Mesut Kirci and Jonathan Schaeffer and Nathan Sturtevant Department of Computing Science University of Alberta Edmonton, Alberta, Canada {kirci,nathanst,jonathan}@cs.ualberta.ca
More informationCMSC 671 Project Report- Google AI Challenge: Planet Wars
1. Introduction Purpose The purpose of the project is to apply relevant AI techniques learned during the course with a view to develop an intelligent game playing bot for the game of Planet Wars. Planet
More informationHack Attack. Rules by Jeffrey Wang
Hack Attack Rules by Jeffrey Wang Two hackers are attacking a super computer in a company. The company frantically gets their IT official to stop the attack. Along the way, the IT official grabs one of
More informationCHAPTER 5 DESIGN AND ANALYSIS OF COMPLEMENTARY PASS- TRANSISTOR WITH ASYNCHRONOUS ADIABATIC LOGIC CIRCUITS
70 CHAPTER 5 DESIGN AND ANALYSIS OF COMPLEMENTARY PASS- TRANSISTOR WITH ASYNCHRONOUS ADIABATIC LOGIC CIRCUITS A novel approach of full adder and multipliers circuits using Complementary Pass Transistor
More informationHearthstone Korea Major Rules
Hearthstone Korea Major Rules 1 The outline of the Korea Major and definitions 1.1 Hearthstone Korea Major is held under the following rules. 1.2 Any other matters uninvolved with the following rules are
More informationAn analysis of Cannon By Keith Carter
An analysis of Cannon By Keith Carter 1.0 Deploying for Battle Town Location The initial placement of the towns, the relative position to their own soldiers, enemy soldiers, and each other effects the
More informationBellairs Games Workshop. Massively Multiplayer Games
Bellairs Games Workshop Massively Multiplayer Games Jörg Kienzle McGill Games Workshop - Bellairs, 2005, Jörg Kienzle Slide 1 Outline Intro on Massively Multiplayer Games Historical Perspective Technical
More informationStrategic Bargaining. This is page 1 Printer: Opaq
16 This is page 1 Printer: Opaq Strategic Bargaining The strength of the framework we have developed so far, be it normal form or extensive form games, is that almost any well structured game can be presented
More informationNORMAL FORM GAMES: invariance and refinements DYNAMIC GAMES: extensive form
1 / 47 NORMAL FORM GAMES: invariance and refinements DYNAMIC GAMES: extensive form Heinrich H. Nax hnax@ethz.ch & Bary S. R. Pradelski bpradelski@ethz.ch March 19, 2018: Lecture 5 2 / 47 Plan Normal form
More informationREQUIRED EQUIPMENT. PLAYING TIME: approximately 20 minutes. NUMBER OF PLAYERS: 1 or 2
Any gardener knows a tiny number of snails can destroy an entire vegetable patch. Snail Invasion! commemorates this epic battle. Will the snails completely infest the garden and kill off the plants? Will
More informationComputational Methods for Non-Cooperative Game Theory
Computational Methods for Non-Cooperative Game Theory What is a game? Introduction A game is a decision problem in which there a multiple decision makers, each with pay-off interdependence Each decisions
More informationApplying Modern Reinforcement Learning to Play Video Games. Computer Science & Engineering Leung Man Ho Supervisor: Prof. LYU Rung Tsong Michael
Applying Modern Reinforcement Learning to Play Video Games Computer Science & Engineering Leung Man Ho Supervisor: Prof. LYU Rung Tsong Michael Outline Term 1 Review Term 2 Objectives Experiments & Results
More informationMaking Simple Decisions CS3523 AI for Computer Games The University of Aberdeen
Making Simple Decisions CS3523 AI for Computer Games The University of Aberdeen Contents Decision making Search and Optimization Decision Trees State Machines Motivating Question How can we program rules
More informationPractical Aspects of Logic in AI
Artificial Intelligence Topic 15 Practical Aspects of Logic in AI Reading: Russell and Norvig, Chapter 10 Description Logics as Ontology Languages for the Semantic Web, F. Baader, I. Horrocks and U.Sattler,
More informationAGENTLESS ARCHITECTURE
ansible.com +1 919.667.9958 WHITEPAPER THE BENEFITS OF AGENTLESS ARCHITECTURE A management tool should not impose additional demands on one s environment in fact, one should have to think about it as little
More informationImplications as rules
DIPLEAP Wien 27.11.2010 p. 1 Implications as rules Thomas Piecha Peter Schroeder-Heister Wilhelm-Schickard-Institut für Informatik Universität Tübingen DIPLEAP Wien 27.11.2010 p. 2 Philosophical / foundational
More informationCYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS
CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS Document Control Version: 1.0 Author: CS Policies and Standards Section - MOTC Classification: Public Date of Issue: November 2016 Contents
More informationTheorem Proving and Model Checking
Theorem Proving and Model Checking (or: how to have your cake and eat it too) Joe Hurd joe.hurd@comlab.ox.ac.uk Cakes Talk Computing Laboratory Oxford University Theorem Proving and Model Checking Joe
More informationTrustworthy Refinement Through Intrusion-Aware Design
Trustworthy Refinement Through Intrusion-Aware Design Robert J. Ellison Andrew P. Moore October 2002 TECHNICAL REPORT CMU/SEI-2002-TR-036 ESC-TR-2002-036 Pittsburgh, PA 15213-3890 Trustworthy Refinement
More informationGame Playing State of the Art
Game Playing State of the Art Checkers: Chinook ended 40 year reign of human world champion Marion Tinsley in 1994. Used an endgame database defining perfect play for all positions involving 8 or fewer
More informationCounter-Strike Season Eighteen OVERVIEW
OVERVIEW We are excited to launch Club Conflict Season Eighteen. We will be beta testing the Club Conflict website and our new Club Conflict Client (featuring Easy AntiCheat). Also, we will be testing
More informationDepartment of Computer Science and Engineering The Chinese University of Hong Kong. Year Final Year Project
Digital Interactive Game Interface Table Apps for ipad Supervised by: Professor Michael R. Lyu Student: Ng Ka Hung (1009615714) Chan Hing Faat (1009618344) Year 2011 2012 Final Year Project Department
More informationConversion Masters in IT (MIT) AI as Representation and Search. (Representation and Search Strategies) Lecture 002. Sandro Spina
Conversion Masters in IT (MIT) AI as Representation and Search (Representation and Search Strategies) Lecture 002 Sandro Spina Physical Symbol System Hypothesis Intelligent Activity is achieved through
More informationContent Page. Odds about Card Distribution P Strategies in defending
Content Page Introduction and Rules of Contract Bridge --------- P. 1-6 Odds about Card Distribution ------------------------- P. 7-10 Strategies in bidding ------------------------------------- P. 11-18
More informationResearch on Progressive Die Design System Based on Rule-engine
2017 2nd International Conference on Manufacturing Science and Information Engineering (ICMSIE 2017) ISBN: 978-1-60595-516-2 Research on Progressive Die Design System Based on Rule-engine Shaoling Li and
More informationField Device Manager Express
Honeywell Process Solutions Field Device Manager Express Software Installation User's Guide EP-FDM-02430X R430 June 2012 Release 430 Honeywell Notices and Trademarks Copyright 2010 by Honeywell International
More informationParameter-Free Tree Style Pipeline in Asynchronous Parallel Game-Tree Search
Parameter-Free Tree Style Pipeline in Asynchronous Parallel Game-Tree Search Shu YOKOYAMA, Tomoyuki KANEKO, Tetsuro TANAKA 2015 07 03T11:15+02:00 ACG2015 Leiden Motivation Game tree search in distributed
More informationCSC 380 Final Presentation. Connect 4 David Alligood, Scott Swiger, Jo Van Voorhis
CSC 380 Final Presentation Connect 4 David Alligood, Scott Swiger, Jo Van Voorhis Intro Connect 4 is a zero-sum game, which means one party wins everything or both parties win nothing; there is no mutual
More informationReasoning About Strategies
Reasoning About Strategies Johan van Benthem 1 University of Amsterdam and Stanford University Abstract. Samson Abramsky has placed landmarks in the world of logic and games that I have long admired. In
More informationFACEBOOK CHANGES & YOUR CHURCH Live Q&A Webinar. Presented by Jerod Clark February 27, 2013
FACEBOOK CHANGES & YOUR CHURCH Live Q&A Webinar Presented by Jerod Clark February 27, 2013 WHY SHOULD I CARE? WHY SHOULD I CARE? People in your congregation are already there WHY SHOULD I CARE? People
More information2015 NAFIC Convention 2
Dan Allison-A Professional Approach to A Professional Approach to Referrals and Prospecting How to Turn Clients and Prospects into Advocates for Your Brand Why did you select this advisor? How does your
More informationImportant USCF Rules - 5 th Edition USCF Rulebook
Important USCF Rules - 5 th Edition USCF Rulebook 5E and 5F: Standard timer for sudden death The standard timer for sudden death time controls are digital clocks with delay or addback capability. Other
More informationTeleoperated Robot Controlling Interface: an Internet of Things Based Approach
Proc. 1 st International Conference on Machine Learning and Data Engineering (icmlde2017) 20-22 Nov 2017, Sydney, Australia ISBN: 978-0-6480147-3-7 Teleoperated Robot Controlling Interface: an Internet
More informationFrom ProbLog to ProLogic
From ProbLog to ProLogic Angelika Kimmig, Bernd Gutmann, Luc De Raedt Fluffy, 21/03/2007 Part I: ProbLog Motivating Application ProbLog Inference Experiments A Probabilistic Graph Problem What is the probability
More informationDouble dummy analysis of bridge hands
Double dummy analysis of bridge hands Provided by Peter Cheung This is the technique in solving how many tricks can be make for No Trump, Spade, Heart, Diamond, or, Club contracts when all 52 cards are
More informationFault analysis framework. Ana Gainaru, Franck Cappello, Bill Kramer
Fault analysis framework Ana Gainaru, Franck Cappello, Bill Kramer Third Workshop of the INRIA Illinois Joint Laboratory on Petascale Computing, Bordeaux June 22 24 2010 Contents Introduction Framework
More informationAdversarial Search. CS 486/686: Introduction to Artificial Intelligence
Adversarial Search CS 486/686: Introduction to Artificial Intelligence 1 Introduction So far we have only been concerned with a single agent Today, we introduce an adversary! 2 Outline Games Minimax search
More informationGame Tree Search 1/6/17
Game Tree Search /6/7 Frameworks for Decision-Making. Goal-directed planning Agents want to accomplish some goal. The agent will use search to devise a plan.. Utility maximization Agents ascribe a utility
More informationAPPLY THE 6 KEYS TO CREATING CONNECTION
MODULE LESSON LEAD PEOPLE INTO YOUR SALES CYCLE BY BUILDING TRUST DESIGN YOUR OWN TRUST- BUILDING SALES CYCLE APPLY THE 6 KEYS TO CREATING CONNECTION CORE SELF-PROMOTIONAL STRATEGIES CONSIDER THE 6 CORE
More informationFitness for purpose in its broadest sense in a digital context
Fitness for purpose in its broadest sense in a digital context Question I have been discussing fitness for purpose in the broadest sense with my students and would like to seek clarity on this. Can you
More informationGame Theory: The Basics. Theory of Games and Economics Behavior John Von Neumann and Oskar Morgenstern (1943)
Game Theory: The Basics The following is based on Games of Strategy, Dixit and Skeath, 1999. Topic 8 Game Theory Page 1 Theory of Games and Economics Behavior John Von Neumann and Oskar Morgenstern (1943)
More informationSection 8 Operational Movement
Section 8: Operational Movement V8.00 Operational Movement V8.10 General Rules of Movement V8.11 Operational Movement, sometimes called Strategic Movement, is the travel of warp capable objects from one
More informationFree Cell Solver. Copyright 2001 Kevin Atkinson Shari Holstege December 11, 2001
Free Cell Solver Copyright 2001 Kevin Atkinson Shari Holstege December 11, 2001 Abstract We created an agent that plays the Free Cell version of Solitaire by searching through the space of possible sequences
More informationmaxon document number:
maxon document number: 791272-04 1 Table of contents... 2 2 Table of figures... 3 3 Introduction... 4 4 How to use this guide... 4 5 Safety Instructions... 5 6 Performance Data... 6 6.1 Motor data... 6
More informationAdversarial Search (Game Playing)
Artificial Intelligence Adversarial Search (Game Playing) Chapter 5 Adapted from materials by Tim Finin, Marie desjardins, and Charles R. Dyer Outline Game playing State of the art and resources Framework
More informationetwinning Thematic Conference: Athens, Greece, September 2017
etwinning Thematic Conference: Athens, Greece, 28-30 September 2017 1 About the FORETELL project The objectives: 1.Awareness of good practices against floods and fires, in a safe and challenging manner;
More informationQuick work: Memory allocation
Quick work: Memory allocation The OS is using a fixed partition algorithm. Processes place requests to the OS in the following sequence: P1=15 KB, P2=5 KB, P3=30 KB Draw the memory map at the end, if each
More informationComparison of Monte Carlo Tree Search Methods in the Imperfect Information Card Game Cribbage
Comparison of Monte Carlo Tree Search Methods in the Imperfect Information Card Game Cribbage Richard Kelly and David Churchill Computer Science Faculty of Science Memorial University {richard.kelly, dchurchill}@mun.ca
More informationIn this technical note, the use of the Build signal tool will be covered in more detail.
Case study: how to properly use the Build signal tool? 1 The Build signal tool NOVA Technical Note 18 Using the Build signal tool Every command parameter or signal, measured or calculated, is identified
More informationRAGE: ROAD RAGE TOURNAMENT RULES
QUAKECON 2017 RAGE: ROAD RAGE TOURNAMENT RULES Compliance with all tournament regulations is a mandatory condition of participation in QuakeCon. It is your responsibility to be aware of and understand
More informationG5212: Game Theory. Mark Dean. Spring 2017
G5212: Game Theory Mark Dean Spring 2017 The Story So Far... Last week we Introduced the concept of a dynamic (or extensive form) game The strategic (or normal) form of that game In terms of solution concepts
More informationMATKA. Foreword. 1. Event Rules
Foreword This document outlines the rules that should at all times be followed when participating in Matka competition. Failure to adhere to these rules may be penalized as outlined. It should be remembered
More informationGOAPin. Chris Conway Lead AI Engineer, Crystal Dynamics
GOAPin Chris Conway Lead AI Engineer, Crystal Dynamics GOAP in Tomb Raider Started in 2006 for unannounced title at the request of our lead designer, based on his impressions from the GOAP presentation
More informationSimple Search Algorithms
Lecture 3 of Artificial Intelligence Simple Search Algorithms AI Lec03/1 Topics of this lecture Random search Search with closed list Search with open list Depth-first and breadth-first search again Uniform-cost
More informationKnowledge Management for Command and Control
Knowledge Management for Command and Control Dr. Marion G. Ceruti, Dwight R. Wilcox and Brenda J. Powers Space and Naval Warfare Systems Center, San Diego, CA 9 th International Command and Control Research
More informationOn form and function in board games
On form and function in board games Chris Sangwin School of Mathematics University of Edinburgh December 2017 Chris Sangwin (University of Edinburgh) On form and function in board games December 2017 1
More informationExamples Debug Intro BT Intro BT Edit Real Debug
More context Archetypes Architecture Evolution Intentional workflow change New workflow almost reverted Examples Debug Intro BT Intro BT Edit Real Debug 36 unique combat AI split into 11 archetypes 5 enemy
More information