Research Statement Arunesh Sinha aruneshs/
|
|
- Albert Glenn
- 5 years ago
- Views:
Transcription
1 Research Statement Arunesh Sinha aruneshs/ Research Theme My research lies at the intersection of Artificial Intelligence and Security 1 and Privacy. Security and Privacy continues to remain a top concern in the physical and cyber world. Indeed, the sheer volume, diversity and persistence of cyber-attacks and crimes in the physical world point to the greater reality that defense mechanisms must be agile and adaptive to be effective against intelligent and adaptive adversaries. A critical component of adaptive defense is the defender-adversary interaction. Game theory provides a rich framework to capture such interactions between the defender and the adversary. However, there are significant challenges that need to be overcome to apply game theory in practice; I have addressed these challenges in my work 2. More specifically, I have explored the following broad areas: Scalability in game theory: A realistic model of the defender-adversary interaction results in large games that requires novel algorithmic techniques to solve such games. Machine learning in games: The availability of data about past interaction of defenders and adversaries offers an opportunity to learn the adversary behavior. My research interests cut across theory and practice. I believe in working on theory problems that are inspired from real-world issues and using principled theoretical techniques in practice. Indeed, my work reflects this underlying theme, having produced results of both theoretical interest and practical use in four major projects: (1) Audit Games: My work on privacy audits in hospitals yielded public policy guidelines that could aid the Health and Human Services (HHS) in designing appropriate oversight to encourage privacy audits in hospitals, (2) DARMS: The project for effective screening of passengers at US airports started as a real-world project named Dynamic Aviation Risk Management Solution (DARMS) initiated by the Transport Security Administration (TSA); it yielded theoretical advances in randomized allocation along with a pilot deployment which is planned for January 2016, (3) Urban Crime: This work started as a project with USC police and resulted in a novel Dynamic Bayesian Network (DBN) based approach to crime prevention; this technique is now part of the software tool used by USC police to aid in crime patrolling and (4) PAC model of adversary behavior: This primarily theoretical project yielded a Probabilistic Approximately Correct (PAC) formalization of learning the follower behavior in Stackelberg games; in particular, it led to a novel non-parametric learning approach that outperformed all existing approaches on predicting poaching activity in Queen Elizabeth National Park (QENP), Uganda. Security & Privacy Audits Airport Screening Urban Crime Wildlife Crime Figure 1: Domains of application of my research 1 By security I mean both physical and cyber security. Also, Security and Privacy refers to a single discipline. 2 All citations for my work are present in my CV.
2 Arunesh Sinha 2/5 Scalability in Game Theory My work on game models of defender-adversary interaction has focused on the Stackelberg (leader-follower) game model. The large number of possible allocations of defense resources results in significant scalability challenges in solving the optimization problem required to compute the Stackelberg equilibrium. Broadly, my approach to scalability has focused on compactly representing the optimization problem with provable solution guarantees. Scalability in audit games: The HIPAA privacy law was passed in 1996 to prevent inappropriate flow of private health information. Hospitals have adopted post-hoc audits of health record accesses as the preferred means of detection and remediation of HIPAA breaches, mainly due to the undesirable consequences of restricting flow of health information (e.g., in a medical emergency). However, the complicated privacy policies do not permit completely automated auditing, thus, the few human auditors are faced with a large number of suspicious cases to audit. Indeed, ad-hoc audit practices have failed to detect many HIPAA breaches in a timely fashion 3. As part of my Ph.D. work [IJCAI 2013,AAAI 2015], I proposed a Stackelberg game model of the interaction between the auditor and auditee. An important component of this auditorauditee interaction is punishments; judicious use of punishments can shape the behavior of the auditee resulting in desirable outcomes. The scalability challenge can be gauged by noting that even a small example of 100 audit cases to be inspected by 10 audit resources, results in many ( 100 ) possible allocations. Adding to this scalability problem, the decision variable for punishments makes the resultant Stackelberg equilibrium computation problem a non-convex optimization problem. I proposed a fixed parameter tractable (FPT) and a fully polynomial time approximation scheme (FPTAS) for this non-convex problem, thereby allowing for efficient computation of the equilibrium. Further improving scalability, I proposed a technique to transform the optimization problem into an equivalent compact optimization by reducing the number of variables and instead adding more constraints. I identified the conditions under which only polynomially many new constraints were added, which led to upto 3X improvement in runtime when these conditions were satisfied. These conditions are not restrictive as they capture many common auditing scenarios such as centralized auditing by a group of auditors and localized auditing of employees by immediate managers. Based on the model, I could provide an economic guided explanation for known occurrences such as hospitals not punishing top doctors for privacy transgressions. I also identified the external incentives that could encourage hospitals to conduct more thorough privacy audits, thereby providing policy tools to stimulate more rigorous auditing in hospitals. Scalability in DARMS: The TSA has launched a new initiative known as DARMS which aims to enhance aviation security. Dubbed as the future of aviation security, this ambitious project aims to provide a mathematically sound basis for intelligent screening of passengers. The TSA utilizes a number of screening resources for screening passengers, e.g., x-ray machines, metal detectors, pat-downs, etc. However, the most effective screening resources cannot be used to screen every passenger as there exists capacity bounds on the usage of each screening resource, with lower capacity for more effective resources. Thus, given the risk category of each passenger, the number of passengers and the efficacy of resources in detecting threats, the goal is to maximize the quality of security screening subject to the underlying passenger flow constraints. As part of the passenger screening component of the DARMS project, I proposed a novel Stackelberg game model for screening of threats [AAAI 2016]. Combining team formation aspects for the capacity-constrained screening resources with the need to screen every passenger in every risk category as effectively as possible resulted in a large (exponentially large) linear program (LP) required to compute equilibrium of the Stackelberg game. For example, assuming 900 and 3 See Information Week report
3 Arunesh Sinha 3/5 100 people arrive in one hour in two risk categories respectively and with 10 screening teams results in ( 909)( 109 ) variables in the LP; typically this number is much larger as the number of risk categories and teams are higher. I provided techniques for scaling up the equilibrium computation; the techniques include a novel temporal decomposition of the game and a novel alternate representation of the LP obtained by using a convex combination of a number of polytopes to represent the feasible space of the LP. In proposing this alternate representation of the LP, I advanced the techniques available in randomized allocation 4. Since I do prove the NP hardness of the optimization problem (even after temporal decomposition), the guaranteed optimal algorithm using the alternate representation of the LP has large running time for the worst case. By trading off between the worst case solution quality and running time, I provide an efficient and practical algorithm that is not worst case optimal but performs extremely efficiently in practice with practically no solution quality loss (no loss observed in random tests). This work is being tested as a pilot in one of the biggest airports in the country starting January 2016 and will hopefully be adopted by all airports in future. Learning in Games Distinct from classic game theory, the ready availability of data on defender-adversary interaction in domains such as wildlife and urban crime has brought forth the opportunity to learn adversary behavior and predict outcomes based on the learned models. My work on learning in games has been guided by the philosophy that adversary behavior should be directly learned from data with minimal prior assumptions, e.g., not assuming rationality. I believe this philosophy provides fundamental new approaches for planning optimal defender actions in adversarial game interactions. A learning theory approach to audit games: As part of my Ph.D. work, I also explored the audit scenario (described earlier) in which no assumptions are made about the auditee behavior [CSF 2011]. In such adversarial interaction scenarios, the notion of regret has been used in online learning literature to provide guarantees for the defender s utility. I formulated the audit process as a regret minimization problem for the auditor. I provided an efficient regret minimizing algorithm with stronger regret bounds for the partial information regret model than the current state of the art regret minimizing algorithms by exploiting estimatability properties of the underlying problem. A learning approach to urban crime: The Department of Public Safety (DPS) at the University of Southern California (USC) is tasked with ensuring security in and around the USC campus and, similar to other security agencies, the number of patrol officers available is quite limited. DPS has records for past crime and patrol allocations over multiple years, and their goal is to conduct preventive patrols intelligently by predicting crime. I recognized that it is almost impossible to estimate utilities for petty criminals and moreover, it has been shown empirically that criminals do not exhibit perfectly strategic behavior in practice. Also, while it is amazing that regret based approaches provide guarantees against adversaries with arbitrary behavior, I recognized that real adversaries are not completely arbitrary and are more likely to exhibit patterns in their behavior which can be exploited to obtain better guarantees. Thus, rather than using poor estimates of utility or uncertain models of bounded rationality or assuming that the adversary is completely arbitrary, I proposed a technique that directly learns the behavior of the criminals [AAMAS 2015]. I proposed a Dynamic Bayesian Network (DBN) based model for predicting crimes from available crime and patrol data; the parameters of the model capture the behavior of the criminals. Distinct from the crime predicts crime approaches in 4 E. Budish, Y.-K. Che, F. Kojima, and P. Milgrom, Designing random allocation mechanisms: Theory and applications, The American Economic Review, 2013.
4 Arunesh Sinha 4/5 criminology that rely only on crime data to predict future crime, this model learns the interaction between patrol officers and criminals using the patrol and crime data, resulting in better crime prediction than prior approaches. The learning approach used the Expectation Maximization algorithm, and used a number of independence assumptions to compactly represent the DBN model in order to avoid over-fitting and to scale up the computation. We also propose a dynamic programming based patrol planning algorithm, which projects a crime reduction of up to 50% as compared to the existing patrol strategy used by DPS. This project is now part of the software used by USC police to aid in preventive patrolling. Learning adversary response in Stackelberg games: Following from my earlier work on urban crime, I recognized that with the increasing availability of data about players past interactions any Stackelberg game can be played by directly learning the response function of the follower. This response function is the adversary s response as a function of the strategy committed to by the leader. This approach contrasts with previous approaches in Stackelberg games that use traditional game-theoretic reasoning about the follower s response through payoffs and rationality. I formalized the problem of learning the complicated stochastic response function of the adversary using any functional representation by appealing to the PAC model of learning. As an instance of the general representation, I proposed the first non-parametric class of response functions for Stackelberg games and also the learning techniques to learn the best function in this class; the richness of the non-parametric response functions (only restriction is Lipschitzness) allows for the capturing of complex human behavior in many domains. Another instance of this general representation turned out to be a classic discrete choice model that has been used previously in literature. I derived sharp sample complexity bounds for PAC learnability for this non-parametric model and the discrete choice model. When applied to the domain of wildlife crime, the nonparametric approach outperformed all known approaches in learning the poacher s response from poaching data obtained from QENP in Uganda albeit using more computational resources. Other research. The other significant pieces of work that I have done include predicting sharing policy of status messages on Facebook in order to warn and prevent users from posting privacy sensitive information and proposing a logging protocol that guarantees log-integrity (proved using formal logic) of Windows OS logs using the functionalities of the TPM2.0 chip. Vision and Future Research The recent rapid growth of AI technologies presents both an opportunity and challenge for researchers to tackle foundational problems at the intersection of AI and Security and Privacy. Cyber-security and privacy are among the top concerns hindering the large scale adoption of AI technologies. On the flip side, the rich set of techniques from AI such as game theory, machine learning and planning under uncertainty could lead to better defense mechanisms in the domain of Security and Privacy. Following my overarching goal of understanding and implementing adaptive defense against intelligent adversaries in any adversarial interaction, I aim to continue exploring the rich fundamental problems in this domain such as: 1. Adaptive Defense in Information Systems: The increased reliance on interconnected cyber and physical systems and sophisticated technologies for controlling physical systems, while definitely beneficial, has opened the door to new vulnerabilities. Examples of such systems abound: electric smart grids, the DARMS system as described above in my research, various control systems (water, electricity) controlled by software and in general the emerging phenomenon of the internet of things. A fundamental problem in both cyber and cyber-physical security is the ability of the attacker to control the information received by the defender, i.e., the defender can be fooled into believing that there is no attack in progress. I believe that two broad ap-
5 Arunesh Sinha 5/5 proaches to address this problem are: (a) Utility-Information tradeoff : The defender can invest in gathering more information about the system, possibly at the cost of efficiency. This trade-off in an adversarial environment leads to games of imperfect and incomplete information, areas that have not been studied a lot in computational sciences. Apart from the basic modeling challenge, large scale games of these types may require approximation methods such as game abstraction. (b) Intelligent use of information: More information is not useful if not acted upon in an intelligent manner. Many defense tools in use today, be it cyber (anti-virus, firewalls) or physical (access controlled doors, physical sensors, human guards), work independently and not as part of a co-ordinated plan, e.g., it should be natural that alarms going off in one part of the system should lower the threshold for alerts in other parts of the system. However, the question of how to make the best decision in the face of uncertain and possibly adversarial inputs is quite challenging. The need of the hour is an automated defense tool that can make optimal security decisions by analyzing the security inputs from many distributed sources and considering the efficiency-detectability trade-off of part (1a). 2. Improving Security Decision Making by Humans: Most automated systems in use today are administered by humans and possibly rely on human actions in their execution, e.g., networks in organizations, electric grids, etc. The increasing difficulty of attacks on software and protocols has led to attackers adapting their strategy and targeting the human in the loop. There are known issues with humans in the loop: (a) Social engineering attacks: A recognized problem, especially in cyber security, is the lack of expected behavior by human actors resulting in security vulnerabilities that are exploited by social engineering attacks, e.g., the recent cyber-attack on Sony started as a phishing attack. An end-to-end defense of such systems requires some guarantees from the human actors. An unexplored research issue centers around mechanisms to incentivize the human users of any system to act in an expected manner. Indeed, practical design of incentive mechanisms should consider behavioral models instead of the classic rational choice theory for robust results in the real world. (b) Burden of information: A reason for people not making the right security decision is because they are unable to process the vast amount of information presented to them in a security context. Automated tools using machine learning or planning techniques can guide human users in their decision making process by reducing their computational burden and narrowing down the choices to make. Further, as already stated in part (1), automated tools can also help trained security experts prioritize their investigation since overwhelming amounts of warnings lead to missed alerts and ignored signs of attacks, e.g., the ignored alerts in the recent Target credit card breach. I believe questions such as those above can be addressed by bringing together concepts from AI and Security and Privacy. Addressing such problems can lead to real world impact such as making emerging AI technologies secure and providing end-to-end security for currently deployed cyber-physical systems. I aim to build a research group that works towards the goal of solving these complex inter-disciplinary problems using techniques from various disciplines such as game theory, security and privacy, machine learning, optimization and economics.
Game Theory for Safety and Security. Arunesh Sinha
Game Theory for Safety and Security Arunesh Sinha Motivation: Real World Security Issues 2 Central Problem Allocating limited security resources against an adaptive, intelligent adversary 3 Prior Work
More informationModeling Security Decisions as Games
Modeling Security Decisions as Games Chris Kiekintveld University of Texas at El Paso.. and MANY Collaborators Decision Making and Games Research agenda: improve and justify decisions Automated intelligent
More informationStanford Center for AI Safety
Stanford Center for AI Safety Clark Barrett, David L. Dill, Mykel J. Kochenderfer, Dorsa Sadigh 1 Introduction Software-based systems play important roles in many areas of modern life, including manufacturing,
More informationDesign of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan
Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Introduction Intelligent security for physical infrastructures Our objective:
More informationDesign of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan
Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Outline Introduction to Game Theory and solution concepts Game definition
More informationA short introduction to Security Games
Game Theoretic Foundations of Multiagent Systems: Algorithms and Applications A case study: Playing Games for Security A short introduction to Security Games Nicola Basilico Department of Computer Science
More informationAnavilhanas Natural Reserve (about 4000 Km 2 )
Anavilhanas Natural Reserve (about 4000 Km 2 ) A control room receives this alarm signal: what to do? adversarial patrolling with spatially uncertain alarm signals Nicola Basilico, Giuseppe De Nittis,
More informationLocalization (Position Estimation) Problem in WSN
Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless
More informationExecutive Summary. Chapter 1. Overview of Control
Chapter 1 Executive Summary Rapid advances in computing, communications, and sensing technology offer unprecedented opportunities for the field of control to expand its contributions to the economic and
More informationChapter 2 Distributed Consensus Estimation of Wireless Sensor Networks
Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic
More informationCONTROL OF SENSORS FOR SEQUENTIAL DETECTION A STOCHASTIC APPROACH
file://\\52zhtv-fs-725v\cstemp\adlib\input\wr_export_131127111121_237836102... Page 1 of 1 11/27/2013 AFRL-OSR-VA-TR-2013-0604 CONTROL OF SENSORS FOR SEQUENTIAL DETECTION A STOCHASTIC APPROACH VIJAY GUPTA
More informationAvoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks
Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute
More informationTRB Workshop on the Future of Road Vehicle Automation
TRB Workshop on the Future of Road Vehicle Automation Steven E. Shladover University of California PATH Program ITFVHA Meeting, Vienna October 21, 2012 1 Outline TRB background Workshop organization Automation
More informationChapter 7 Information Redux
Chapter 7 Information Redux Information exists at the core of human activities such as observing, reasoning, and communicating. Information serves a foundational role in these areas, similar to the role
More informationTowards Strategic Kriegspiel Play with Opponent Modeling
Towards Strategic Kriegspiel Play with Opponent Modeling Antonio Del Giudice and Piotr Gmytrasiewicz Department of Computer Science, University of Illinois at Chicago Chicago, IL, 60607-7053, USA E-mail:
More informationElements of Artificial Intelligence and Expert Systems
Elements of Artificial Intelligence and Expert Systems Master in Data Science for Economics, Business & Finance Nicola Basilico Dipartimento di Informatica Via Comelico 39/41-20135 Milano (MI) Ufficio
More informationGame Theoretic Analysis of Security and Sustainability
Game Theoretic Analysis of Security and Sustainability Bo An boan@ntu.edu.sg School of Computer Science and Engineering Nanyang Technological University August 22, 2017@IJCAI 17, Early Career Spotlight
More informationStochastic Game Models for Homeland Security
CREATE Research Archive Research Project Summaries 2008 Stochastic Game Models for Homeland Security Erim Kardes University of Southern California, kardes@usc.edu Follow this and additional works at: http://research.create.usc.edu/project_summaries
More informationOptimal Rhode Island Hold em Poker
Optimal Rhode Island Hold em Poker Andrew Gilpin and Tuomas Sandholm Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 {gilpin,sandholm}@cs.cmu.edu Abstract Rhode Island Hold
More informationEXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF
EXECUTIVE SUMMARY St. Louis Region Emerging Transportation Technology Strategic Plan June 2017 Prepared for East-West Gateway Council of Governments by ICF Introduction 1 ACKNOWLEDGEMENTS This document
More informationTexas Hold em Inference Bot Proposal. By: Brian Mihok & Michael Terry Date Due: Monday, April 11, 2005
Texas Hold em Inference Bot Proposal By: Brian Mihok & Michael Terry Date Due: Monday, April 11, 2005 1 Introduction One of the key goals in Artificial Intelligence is to create cognitive systems that
More informationGame Theory and Randomized Algorithms
Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international
More informationArtificial Intelligence. What is AI?
2 Artificial Intelligence What is AI? Some Definitions of AI The scientific understanding of the mechanisms underlying thought and intelligent behavior and their embodiment in machines American Association
More informationThe first topic I would like to explore is probabilistic reasoning with Bayesian
Michael Terry 16.412J/6.834J 2/16/05 Problem Set 1 A. Topics of Fascination The first topic I would like to explore is probabilistic reasoning with Bayesian nets. I see that reasoning under situations
More informationResearch Statement MAXIM LIKHACHEV
Research Statement MAXIM LIKHACHEV My long-term research goal is to develop a methodology for robust real-time decision-making in autonomous systems. To achieve this goal, my students and I research novel
More informationSoftware-Intensive Systems Producibility
Pittsburgh, PA 15213-3890 Software-Intensive Systems Producibility Grady Campbell Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University SSTC 2006. - page 1 Producibility
More informationIntroduction to AI. What is Artificial Intelligence?
Introduction to AI Instructor: Dr. Wei Ding Fall 2009 1 What is Artificial Intelligence? Views of AI fall into four categories: Thinking Humanly Thinking Rationally Acting Humanly Acting Rationally The
More informationEngineered Resilient Systems DoD Science and Technology Priority
Engineered Resilient Systems DoD Science and Technology Priority Mr. Scott Lucero Deputy Director, Strategic Initiatives Office of the Deputy Assistant Secretary of Defense (Systems Engineering) Scott.Lucero@osd.mil
More informationArtificial Intelligence
Torralba and Wahlster Artificial Intelligence Chapter 1: Introduction 1/22 Artificial Intelligence 1. Introduction What is AI, Anyway? Álvaro Torralba Wolfgang Wahlster Summer Term 2018 Thanks to Prof.
More informationThe Three Laws of Artificial Intelligence
The Three Laws of Artificial Intelligence Dispelling Common Myths of AI We ve all heard about it and watched the scary movies. An artificial intelligence somehow develops spontaneously and ferociously
More informationExecutive Summary Industry s Responsibility in Promoting Responsible Development and Use:
Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the
More informationArtificial intelligence and judicial systems: The so-called predictive justice
Artificial intelligence and judicial systems: The so-called predictive justice 09 May 2018 1 Context The use of so-called artificial intelligence received renewed interest over the past years.. Computers
More informationImperfect Monitoring in Multi-agent Opportunistic Channel Access
Imperfect Monitoring in Multi-agent Opportunistic Channel Access Ji Wang Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements
More informationIndustry 4.0: the new challenge for the Italian textile machinery industry
Industry 4.0: the new challenge for the Italian textile machinery industry Executive Summary June 2017 by Contacts: Economics & Press Office Ph: +39 02 4693611 email: economics-press@acimit.it ACIMIT has
More informationGAME THEORY: STRATEGY AND EQUILIBRIUM
Prerequisites Almost essential Game Theory: Basics GAME THEORY: STRATEGY AND EQUILIBRIUM MICROECONOMICS Principles and Analysis Frank Cowell Note: the detail in slides marked * can only be seen if you
More informationChapter 3 Learning in Two-Player Matrix Games
Chapter 3 Learning in Two-Player Matrix Games 3.1 Matrix Games In this chapter, we will examine the two-player stage game or the matrix game problem. Now, we have two players each learning how to play
More informationA New Approach to the Design and Verification of Complex Systems
A New Approach to the Design and Verification of Complex Systems Research Scientist Palo Alto Research Center Intelligent Systems Laboratory Embedded Reasoning Area Tolga Kurtoglu, Ph.D. Complexity Highly
More informationDominant and Dominated Strategies
Dominant and Dominated Strategies Carlos Hurtado Department of Economics University of Illinois at Urbana-Champaign hrtdmrt2@illinois.edu Junel 8th, 2016 C. Hurtado (UIUC - Economics) Game Theory On the
More informationGame Theory. Department of Electronics EL-766 Spring Hasan Mahmood
Game Theory Department of Electronics EL-766 Spring 2011 Hasan Mahmood Email: hasannj@yahoo.com Course Information Part I: Introduction to Game Theory Introduction to game theory, games with perfect information,
More informationComputing Disciplines & Majors
Computing Disciplines & Majors If you choose a computing major, what career options are open to you? We have provided information for each of the majors listed here: Computer Engineering Typically involves
More informationCommand, Control and Interoperability
Command, Control and Interoperability Dr. David Boyd Director Command, Control and Interoperability Science and Technology Directorate U.S. Department of Homeland Security January 28, 2009 1 Command, Control
More informationA web-based early-warning service to monitor drinking-water treatment plant operations
Snapshots of Doctoral Research at University College Cork 2010 A web-based early-warning service to monitor drinking-water treatment plant operations Franclin S. Foping Cork Constraint Computation Centre,
More informationPrototyping: Accelerating the Adoption of Transformative Capabilities
Prototyping: Accelerating the Adoption of Transformative Capabilities Mr. Elmer Roman Director, Joint Capability Technology Demonstration (JCTD) DASD, Emerging Capability & Prototyping (EC&P) 10/27/2016
More informationGrand Challenges for Systems and Services Sciences
Grand Challenges for Systems and Services Sciences Brian Monahan, David Pym, Richard Taylor, Chris Tofts, Mike Yearworth Trusted Systems Laboratory HP Laboratories Bristol HPL-2006-99 July 13, 2006* systems,
More informationDesign and Implementation Options for Digital Library Systems
International Journal of Systems Science and Applied Mathematics 2017; 2(3): 70-74 http://www.sciencepublishinggroup.com/j/ijssam doi: 10.11648/j.ijssam.20170203.12 Design and Implementation Options for
More informationMilind Tambe on game theory in security applications Machine...
Milind Tambe on game theory in security applications Machine... https://intelligence.org/2014/05/30/milind-tambe/ Milind Tambe on game theory in security applications Tweet 0 Like 0 1 May 30, 2014 Luke
More informationThe Key to the Internet-of-Things: Conquering Complexity One Step at a Time
The Key to the Internet-of-Things: Conquering Complexity One Step at a Time at IEEE QRS2017 Prague, CZ June 19, 2017 Adam T. Drobot Wayne, PA 19087 Outline What is IoT? Where is IoT in its evolution? A
More informationOFDM Pilot Optimization for the Communication and Localization Trade Off
SPCOMNAV Communications and Navigation OFDM Pilot Optimization for the Communication and Localization Trade Off A. Lee Swindlehurst Dept. of Electrical Engineering and Computer Science The Henry Samueli
More informationRevolutionizing Engineering Science through Simulation May 2006
Revolutionizing Engineering Science through Simulation May 2006 Report of the National Science Foundation Blue Ribbon Panel on Simulation-Based Engineering Science EXECUTIVE SUMMARY Simulation refers to
More informationENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS
BY SERAFIN BENTO MASTER OF SCIENCE in INFORMATION SYSTEMS Edmonton, Alberta September, 2015 ABSTRACT The popularity of software agents demands for more comprehensive HAI design processes. The outcome of
More informationAlternation in the repeated Battle of the Sexes
Alternation in the repeated Battle of the Sexes Aaron Andalman & Charles Kemp 9.29, Spring 2004 MIT Abstract Traditional game-theoretic models consider only stage-game strategies. Alternation in the repeated
More informationSurveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan
Surveillance strategies for autonomous mobile robots Nicola Basilico Department of Computer Science University of Milan Intelligence, surveillance, and reconnaissance (ISR) with autonomous UAVs ISR defines
More informationDraft executive summaries to target groups on industrial energy efficiency and material substitution in carbonintensive
Technology Executive Committee 29 August 2017 Fifteenth meeting Bonn, Germany, 12 15 September 2017 Draft executive summaries to target groups on industrial energy efficiency and material substitution
More informationDatabase Audit Workload Prioritization via Game Theory
Database Audit Workload Prioritization via Game Theory CHAO YAN, Vanderbilt University, USA BO LI, University of Illinois at Urbana Champaign, USA YEVGENIY VOROBEYCHIK, Washington University in St. Louis,
More informationIntel Labs, Hillsboro, OR, June 2013 Aug 2013 Research Intern: Machine learning based detection of activity of mobile-phone users.
ARUNESH SINHA University of Michigan Cell Phone: 412-420-9628 Department of Computer Science Official Email: arunesh@umich.edu 2709 Beyster, 2260 Hayward St, Alternate Email: aruneshsinha@gmail.com Ann
More informationIEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska. Call for Participation and Proposals
IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska Call for Participation and Proposals With its dispersed population, cultural diversity, vast area, varied geography,
More informationYale University Department of Computer Science
LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work
More informationMethodology for Agent-Oriented Software
ب.ظ 03:55 1 of 7 2006/10/27 Next: About this document... Methodology for Agent-Oriented Software Design Principal Investigator dr. Frank S. de Boer (frankb@cs.uu.nl) Summary The main research goal of this
More informationOn the GNSS integer ambiguity success rate
On the GNSS integer ambiguity success rate P.J.G. Teunissen Mathematical Geodesy and Positioning Faculty of Civil Engineering and Geosciences Introduction Global Navigation Satellite System (GNSS) ambiguity
More informationGame theory attempts to mathematically. capture behavior in strategic situations, or. games, in which an individual s success in
Game Theory Game theory attempts to mathematically capture behavior in strategic situations, or games, in which an individual s success in making choices depends on the choices of others. A game Γ consists
More informationMultiple Antenna Processing for WiMAX
Multiple Antenna Processing for WiMAX Overview Wireless operators face a myriad of obstacles, but fundamental to the performance of any system are the propagation characteristics that restrict delivery
More informationSenate Bill (SB) 488 definition of comparative energy usage
Rules governing behavior programs in California Generally behavioral programs run in California must adhere to the definitions shown below, however the investor-owned utilities (IOUs) are given broader
More informationThe next level of intelligence: Artificial Intelligence. Innovation Day USA 2017 Princeton, March 27, 2017 Michael May, Siemens Corporate Technology
The next level of intelligence: Artificial Intelligence Innovation Day USA 2017 Princeton, March 27, 2017, Siemens Corporate Technology siemens.com/innovationusa Notes and forward-looking statements This
More informationTHE FUTURE OF DATA AND INTELLIGENCE IN TRANSPORT
THE FUTURE OF DATA AND INTELLIGENCE IN TRANSPORT Humanity s ability to use data and intelligence has increased dramatically People have always used data and intelligence to aid their journeys. In ancient
More informationReinforcement Learning Simulations and Robotics
Reinforcement Learning Simulations and Robotics Models Partially observable noise in sensors Policy search methods rather than value functionbased approaches Isolate key parameters by choosing an appropriate
More informationIntelligent Agents. Introduction to Planning. Ute Schmid. Cognitive Systems, Applied Computer Science, Bamberg University. last change: 23.
Intelligent Agents Introduction to Planning Ute Schmid Cognitive Systems, Applied Computer Science, Bamberg University last change: 23. April 2012 U. Schmid (CogSys) Intelligent Agents last change: 23.
More informationMachine Learning and Decision Making for Sustainability
Machine Learning and Decision Making for Sustainability Stefano Ermon Department of Computer Science Stanford University April 12 Overview Stanford Artificial Intelligence Lab Fellow, Woods Institute for
More informationCognitive Radios Games: Overview and Perspectives
Cognitive Radios Games: Overview and Yezekael Hayel University of Avignon, France Supélec 06/18/07 1 / 39 Summary 1 Introduction 2 3 4 5 2 / 39 Summary Introduction Cognitive Radio Technologies Game Theory
More informationCS 1571 Introduction to AI Lecture 12. Adversarial search. CS 1571 Intro to AI. Announcements
CS 171 Introduction to AI Lecture 1 Adversarial search Milos Hauskrecht milos@cs.pitt.edu 39 Sennott Square Announcements Homework assignment is out Programming and experiments Simulated annealing + Genetic
More informationUrban WiMAX response to Ofcom s Spectrum Commons Classes for licence exemption consultation
Urban WiMAX response to Ofcom s Spectrum Commons Classes for licence exemption consultation July 2008 Urban WiMAX welcomes the opportunity to respond to this consultation on Spectrum Commons Classes for
More informationTechnologies that will make a difference for Canadian Law Enforcement
The Future Of Public Safety In Smart Cities Technologies that will make a difference for Canadian Law Enforcement The car is several meters away, with only the passenger s side visible to the naked eye,
More informationAchieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters
Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Scott Watson, Andrew Vardy, Wolfgang Banzhaf Department of Computer Science Memorial University of Newfoundland St John s.
More informationProgram Automotive Security and Privacy
FFI BOARD FUNDED PROGRAM Program Automotive Security and Privacy 2015-11-03 Innehållsförteckning 1 Abstract... 3 2 Background... 4 3 Program objectives... 5 4 Program description... 5 5 Program scope...
More informationMAGNT Research Report (ISSN ) Vol.6(1). PP , Controlling Cost and Time of Construction Projects Using Neural Network
Controlling Cost and Time of Construction Projects Using Neural Network Li Ping Lo Faculty of Computer Science and Engineering Beijing University China Abstract In order to achieve optimized management,
More informationGet Your Workload in Order: Game Theoretic Prioritization of Database Auditing
Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing Chao Yan 1, Bo Li 2, Yevgeniy Vorobeychik 1,4, Aron Laszka 3, Daniel Fabbri 1,4, Bradley Malin 1,4 1 Department of Electrical
More informationThe Response from Motorola Ltd. to the Consultation on The Licence-Exemption Framework Review
The Response from Motorola Ltd. to the Consultation on The Licence-Exemption Framework Review June 21 st 2007. Key Points 1. The introduction of the concept of a version of Commons in which the possible
More informationFive-In-Row with Local Evaluation and Beam Search
Five-In-Row with Local Evaluation and Beam Search Jiun-Hung Chen and Adrienne X. Wang jhchen@cs axwang@cs Abstract This report provides a brief overview of the game of five-in-row, also known as Go-Moku,
More informationFrugal Sensing Spectral Analysis from Power Inequalities
Frugal Sensing Spectral Analysis from Power Inequalities Nikos Sidiropoulos Joint work with Omar Mehanna IEEE SPAWC 2013 Plenary, June 17, 2013, Darmstadt, Germany Wideband Spectrum Sensing (for CR/DSM)
More informationDistributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes
7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis
More informationThe Response of Motorola Ltd. to the. Consultation on Spectrum Commons Classes for Licence Exemption
The Response of Motorola Ltd to the Consultation on Spectrum Commons Classes for Licence Exemption Motorola is grateful for the opportunity to contribute to the consultation on Spectrum Commons Classes
More informationAGENTLESS ARCHITECTURE
ansible.com +1 919.667.9958 WHITEPAPER THE BENEFITS OF AGENTLESS ARCHITECTURE A management tool should not impose additional demands on one s environment in fact, one should have to think about it as little
More informationBuilding capacities for systemic change: diversified roadmap in the context of VTT s service research network
Building capacities for systemic change: diversified roadmap in the context of VTT s service research network Toni Ahlqvist & Minna Halonen VTT Technical Research Centre of Finland VTT Symposium on Service
More informationMohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2
AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant
More informationAdvisor: Professor Frank Y.S. Lin Present by Tim Q.T. Chen
Advisor: Professor Frank Y.S. Lin Present by Tim Q.T. Chen 1 Introduction Game Theory Attack Graph A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy Optimal Network
More informationIOT FOR AUDITORS AND ACCOUNTANTS; AUDITING THE IOT
IOT FOR AUDITORS AND ACCOUNTANTS; AUDITING THE IOT ERIC E. COHEN COHEN COMPUTER CONSULTING GENEVA, 24 APRIL 2018 1 INTERNET OF THINGS AND ACCOUNTING IoT is happening: monitoring, recording, acting Benefits
More informationCS221 Project Final Report Gomoku Game Agent
CS221 Project Final Report Gomoku Game Agent Qiao Tan qtan@stanford.edu Xiaoti Hu xiaotihu@stanford.edu 1 Introduction Gomoku, also know as five-in-a-row, is a strategy board game which is traditionally
More informationTHE GAME THEORY OF OPEN-SOURCE SOFTWARE
THE GAME THEORY OF OPEN-SOURCE SOFTWARE PAUL REIDY Senior Sophister In this paper, Paul Reidy utilises a game theoretical framework to explore the decision of a firm to make its software open-source and
More informationGeoffrey Hollinger: Research Statement Decision Making & Learning for Robotics
Geoffrey Hollinger: Research Statement Decision Making & Learning for Robotics Imagine a world where streams of sensor data are at your fingertips a world where scientists, first responders, and safety
More informationA Proposed Probabilistic Model for Risk Forecasting in Small Health Informatics Projects
2011 International Conference on Modeling, Simulation and Control IPCSIT vol.10 (2011) (2011) IACSIT Press, Singapore A Proposed Probabilistic Model for Risk Forecasting in Small Health Informatics Projects
More informationA Survey on Supermodular Games
A Survey on Supermodular Games Ashiqur R. KhudaBukhsh December 27, 2006 Abstract Supermodular games are an interesting class of games that exhibits strategic complementarity. There are several compelling
More informationA GRAPH THEORETICAL APPROACH TO SOLVING SCRAMBLE SQUARES PUZZLES. 1. Introduction
GRPH THEORETICL PPROCH TO SOLVING SCRMLE SQURES PUZZLES SRH MSON ND MLI ZHNG bstract. Scramble Squares puzzle is made up of nine square pieces such that each edge of each piece contains half of an image.
More informationNew developments in the philosophy of AI. Vincent C. Müller. Anatolia College/ACT February 2015
Müller, Vincent C. (2016), New developments in the philosophy of AI, in Vincent C. Müller (ed.), Fundamental Issues of Artificial Intelligence (Synthese Library; Berlin: Springer). http://www.sophia.de
More informationA Hybrid Risk Management Process for Interconnected Infrastructures
A Hybrid Management Process for Interconnected Infrastructures Stefan Schauer Workshop on Novel Approaches in and Security Management for Critical Infrastructures Vienna, 19.09.2017 Contents Motivation
More informationChapter Two: The GamePlan Software *
Chapter Two: The GamePlan Software * 2.1 Purpose of the Software One of the greatest challenges in teaching and doing research in game theory is computational. Although there are powerful theoretical results
More informationCHAPTER 8 RESEARCH METHODOLOGY AND DESIGN
CHAPTER 8 RESEARCH METHODOLOGY AND DESIGN 8.1 Introduction This chapter gives a brief overview of the field of research methodology. It contains a review of a variety of research perspectives and approaches
More informationLightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,
More informationAppendix A A Primer in Game Theory
Appendix A A Primer in Game Theory This presentation of the main ideas and concepts of game theory required to understand the discussion in this book is intended for readers without previous exposure to
More informationFictitious Play applied on a simplified poker game
Fictitious Play applied on a simplified poker game Ioannis Papadopoulos June 26, 2015 Abstract This paper investigates the application of fictitious play on a simplified 2-player poker game with the goal
More informationConvention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) April 2016, Geneva
Introduction Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) 11-15 April 2016, Geneva Views of the International Committee of the Red Cross
More informationMSc(CompSc) List of courses offered in
Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The
More information