Research Statement Arunesh Sinha aruneshs/

Size: px
Start display at page:

Download "Research Statement Arunesh Sinha aruneshs/"

Transcription

1 Research Statement Arunesh Sinha aruneshs/ Research Theme My research lies at the intersection of Artificial Intelligence and Security 1 and Privacy. Security and Privacy continues to remain a top concern in the physical and cyber world. Indeed, the sheer volume, diversity and persistence of cyber-attacks and crimes in the physical world point to the greater reality that defense mechanisms must be agile and adaptive to be effective against intelligent and adaptive adversaries. A critical component of adaptive defense is the defender-adversary interaction. Game theory provides a rich framework to capture such interactions between the defender and the adversary. However, there are significant challenges that need to be overcome to apply game theory in practice; I have addressed these challenges in my work 2. More specifically, I have explored the following broad areas: Scalability in game theory: A realistic model of the defender-adversary interaction results in large games that requires novel algorithmic techniques to solve such games. Machine learning in games: The availability of data about past interaction of defenders and adversaries offers an opportunity to learn the adversary behavior. My research interests cut across theory and practice. I believe in working on theory problems that are inspired from real-world issues and using principled theoretical techniques in practice. Indeed, my work reflects this underlying theme, having produced results of both theoretical interest and practical use in four major projects: (1) Audit Games: My work on privacy audits in hospitals yielded public policy guidelines that could aid the Health and Human Services (HHS) in designing appropriate oversight to encourage privacy audits in hospitals, (2) DARMS: The project for effective screening of passengers at US airports started as a real-world project named Dynamic Aviation Risk Management Solution (DARMS) initiated by the Transport Security Administration (TSA); it yielded theoretical advances in randomized allocation along with a pilot deployment which is planned for January 2016, (3) Urban Crime: This work started as a project with USC police and resulted in a novel Dynamic Bayesian Network (DBN) based approach to crime prevention; this technique is now part of the software tool used by USC police to aid in crime patrolling and (4) PAC model of adversary behavior: This primarily theoretical project yielded a Probabilistic Approximately Correct (PAC) formalization of learning the follower behavior in Stackelberg games; in particular, it led to a novel non-parametric learning approach that outperformed all existing approaches on predicting poaching activity in Queen Elizabeth National Park (QENP), Uganda. Security & Privacy Audits Airport Screening Urban Crime Wildlife Crime Figure 1: Domains of application of my research 1 By security I mean both physical and cyber security. Also, Security and Privacy refers to a single discipline. 2 All citations for my work are present in my CV.

2 Arunesh Sinha 2/5 Scalability in Game Theory My work on game models of defender-adversary interaction has focused on the Stackelberg (leader-follower) game model. The large number of possible allocations of defense resources results in significant scalability challenges in solving the optimization problem required to compute the Stackelberg equilibrium. Broadly, my approach to scalability has focused on compactly representing the optimization problem with provable solution guarantees. Scalability in audit games: The HIPAA privacy law was passed in 1996 to prevent inappropriate flow of private health information. Hospitals have adopted post-hoc audits of health record accesses as the preferred means of detection and remediation of HIPAA breaches, mainly due to the undesirable consequences of restricting flow of health information (e.g., in a medical emergency). However, the complicated privacy policies do not permit completely automated auditing, thus, the few human auditors are faced with a large number of suspicious cases to audit. Indeed, ad-hoc audit practices have failed to detect many HIPAA breaches in a timely fashion 3. As part of my Ph.D. work [IJCAI 2013,AAAI 2015], I proposed a Stackelberg game model of the interaction between the auditor and auditee. An important component of this auditorauditee interaction is punishments; judicious use of punishments can shape the behavior of the auditee resulting in desirable outcomes. The scalability challenge can be gauged by noting that even a small example of 100 audit cases to be inspected by 10 audit resources, results in many ( 100 ) possible allocations. Adding to this scalability problem, the decision variable for punishments makes the resultant Stackelberg equilibrium computation problem a non-convex optimization problem. I proposed a fixed parameter tractable (FPT) and a fully polynomial time approximation scheme (FPTAS) for this non-convex problem, thereby allowing for efficient computation of the equilibrium. Further improving scalability, I proposed a technique to transform the optimization problem into an equivalent compact optimization by reducing the number of variables and instead adding more constraints. I identified the conditions under which only polynomially many new constraints were added, which led to upto 3X improvement in runtime when these conditions were satisfied. These conditions are not restrictive as they capture many common auditing scenarios such as centralized auditing by a group of auditors and localized auditing of employees by immediate managers. Based on the model, I could provide an economic guided explanation for known occurrences such as hospitals not punishing top doctors for privacy transgressions. I also identified the external incentives that could encourage hospitals to conduct more thorough privacy audits, thereby providing policy tools to stimulate more rigorous auditing in hospitals. Scalability in DARMS: The TSA has launched a new initiative known as DARMS which aims to enhance aviation security. Dubbed as the future of aviation security, this ambitious project aims to provide a mathematically sound basis for intelligent screening of passengers. The TSA utilizes a number of screening resources for screening passengers, e.g., x-ray machines, metal detectors, pat-downs, etc. However, the most effective screening resources cannot be used to screen every passenger as there exists capacity bounds on the usage of each screening resource, with lower capacity for more effective resources. Thus, given the risk category of each passenger, the number of passengers and the efficacy of resources in detecting threats, the goal is to maximize the quality of security screening subject to the underlying passenger flow constraints. As part of the passenger screening component of the DARMS project, I proposed a novel Stackelberg game model for screening of threats [AAAI 2016]. Combining team formation aspects for the capacity-constrained screening resources with the need to screen every passenger in every risk category as effectively as possible resulted in a large (exponentially large) linear program (LP) required to compute equilibrium of the Stackelberg game. For example, assuming 900 and 3 See Information Week report

3 Arunesh Sinha 3/5 100 people arrive in one hour in two risk categories respectively and with 10 screening teams results in ( 909)( 109 ) variables in the LP; typically this number is much larger as the number of risk categories and teams are higher. I provided techniques for scaling up the equilibrium computation; the techniques include a novel temporal decomposition of the game and a novel alternate representation of the LP obtained by using a convex combination of a number of polytopes to represent the feasible space of the LP. In proposing this alternate representation of the LP, I advanced the techniques available in randomized allocation 4. Since I do prove the NP hardness of the optimization problem (even after temporal decomposition), the guaranteed optimal algorithm using the alternate representation of the LP has large running time for the worst case. By trading off between the worst case solution quality and running time, I provide an efficient and practical algorithm that is not worst case optimal but performs extremely efficiently in practice with practically no solution quality loss (no loss observed in random tests). This work is being tested as a pilot in one of the biggest airports in the country starting January 2016 and will hopefully be adopted by all airports in future. Learning in Games Distinct from classic game theory, the ready availability of data on defender-adversary interaction in domains such as wildlife and urban crime has brought forth the opportunity to learn adversary behavior and predict outcomes based on the learned models. My work on learning in games has been guided by the philosophy that adversary behavior should be directly learned from data with minimal prior assumptions, e.g., not assuming rationality. I believe this philosophy provides fundamental new approaches for planning optimal defender actions in adversarial game interactions. A learning theory approach to audit games: As part of my Ph.D. work, I also explored the audit scenario (described earlier) in which no assumptions are made about the auditee behavior [CSF 2011]. In such adversarial interaction scenarios, the notion of regret has been used in online learning literature to provide guarantees for the defender s utility. I formulated the audit process as a regret minimization problem for the auditor. I provided an efficient regret minimizing algorithm with stronger regret bounds for the partial information regret model than the current state of the art regret minimizing algorithms by exploiting estimatability properties of the underlying problem. A learning approach to urban crime: The Department of Public Safety (DPS) at the University of Southern California (USC) is tasked with ensuring security in and around the USC campus and, similar to other security agencies, the number of patrol officers available is quite limited. DPS has records for past crime and patrol allocations over multiple years, and their goal is to conduct preventive patrols intelligently by predicting crime. I recognized that it is almost impossible to estimate utilities for petty criminals and moreover, it has been shown empirically that criminals do not exhibit perfectly strategic behavior in practice. Also, while it is amazing that regret based approaches provide guarantees against adversaries with arbitrary behavior, I recognized that real adversaries are not completely arbitrary and are more likely to exhibit patterns in their behavior which can be exploited to obtain better guarantees. Thus, rather than using poor estimates of utility or uncertain models of bounded rationality or assuming that the adversary is completely arbitrary, I proposed a technique that directly learns the behavior of the criminals [AAMAS 2015]. I proposed a Dynamic Bayesian Network (DBN) based model for predicting crimes from available crime and patrol data; the parameters of the model capture the behavior of the criminals. Distinct from the crime predicts crime approaches in 4 E. Budish, Y.-K. Che, F. Kojima, and P. Milgrom, Designing random allocation mechanisms: Theory and applications, The American Economic Review, 2013.

4 Arunesh Sinha 4/5 criminology that rely only on crime data to predict future crime, this model learns the interaction between patrol officers and criminals using the patrol and crime data, resulting in better crime prediction than prior approaches. The learning approach used the Expectation Maximization algorithm, and used a number of independence assumptions to compactly represent the DBN model in order to avoid over-fitting and to scale up the computation. We also propose a dynamic programming based patrol planning algorithm, which projects a crime reduction of up to 50% as compared to the existing patrol strategy used by DPS. This project is now part of the software used by USC police to aid in preventive patrolling. Learning adversary response in Stackelberg games: Following from my earlier work on urban crime, I recognized that with the increasing availability of data about players past interactions any Stackelberg game can be played by directly learning the response function of the follower. This response function is the adversary s response as a function of the strategy committed to by the leader. This approach contrasts with previous approaches in Stackelberg games that use traditional game-theoretic reasoning about the follower s response through payoffs and rationality. I formalized the problem of learning the complicated stochastic response function of the adversary using any functional representation by appealing to the PAC model of learning. As an instance of the general representation, I proposed the first non-parametric class of response functions for Stackelberg games and also the learning techniques to learn the best function in this class; the richness of the non-parametric response functions (only restriction is Lipschitzness) allows for the capturing of complex human behavior in many domains. Another instance of this general representation turned out to be a classic discrete choice model that has been used previously in literature. I derived sharp sample complexity bounds for PAC learnability for this non-parametric model and the discrete choice model. When applied to the domain of wildlife crime, the nonparametric approach outperformed all known approaches in learning the poacher s response from poaching data obtained from QENP in Uganda albeit using more computational resources. Other research. The other significant pieces of work that I have done include predicting sharing policy of status messages on Facebook in order to warn and prevent users from posting privacy sensitive information and proposing a logging protocol that guarantees log-integrity (proved using formal logic) of Windows OS logs using the functionalities of the TPM2.0 chip. Vision and Future Research The recent rapid growth of AI technologies presents both an opportunity and challenge for researchers to tackle foundational problems at the intersection of AI and Security and Privacy. Cyber-security and privacy are among the top concerns hindering the large scale adoption of AI technologies. On the flip side, the rich set of techniques from AI such as game theory, machine learning and planning under uncertainty could lead to better defense mechanisms in the domain of Security and Privacy. Following my overarching goal of understanding and implementing adaptive defense against intelligent adversaries in any adversarial interaction, I aim to continue exploring the rich fundamental problems in this domain such as: 1. Adaptive Defense in Information Systems: The increased reliance on interconnected cyber and physical systems and sophisticated technologies for controlling physical systems, while definitely beneficial, has opened the door to new vulnerabilities. Examples of such systems abound: electric smart grids, the DARMS system as described above in my research, various control systems (water, electricity) controlled by software and in general the emerging phenomenon of the internet of things. A fundamental problem in both cyber and cyber-physical security is the ability of the attacker to control the information received by the defender, i.e., the defender can be fooled into believing that there is no attack in progress. I believe that two broad ap-

5 Arunesh Sinha 5/5 proaches to address this problem are: (a) Utility-Information tradeoff : The defender can invest in gathering more information about the system, possibly at the cost of efficiency. This trade-off in an adversarial environment leads to games of imperfect and incomplete information, areas that have not been studied a lot in computational sciences. Apart from the basic modeling challenge, large scale games of these types may require approximation methods such as game abstraction. (b) Intelligent use of information: More information is not useful if not acted upon in an intelligent manner. Many defense tools in use today, be it cyber (anti-virus, firewalls) or physical (access controlled doors, physical sensors, human guards), work independently and not as part of a co-ordinated plan, e.g., it should be natural that alarms going off in one part of the system should lower the threshold for alerts in other parts of the system. However, the question of how to make the best decision in the face of uncertain and possibly adversarial inputs is quite challenging. The need of the hour is an automated defense tool that can make optimal security decisions by analyzing the security inputs from many distributed sources and considering the efficiency-detectability trade-off of part (1a). 2. Improving Security Decision Making by Humans: Most automated systems in use today are administered by humans and possibly rely on human actions in their execution, e.g., networks in organizations, electric grids, etc. The increasing difficulty of attacks on software and protocols has led to attackers adapting their strategy and targeting the human in the loop. There are known issues with humans in the loop: (a) Social engineering attacks: A recognized problem, especially in cyber security, is the lack of expected behavior by human actors resulting in security vulnerabilities that are exploited by social engineering attacks, e.g., the recent cyber-attack on Sony started as a phishing attack. An end-to-end defense of such systems requires some guarantees from the human actors. An unexplored research issue centers around mechanisms to incentivize the human users of any system to act in an expected manner. Indeed, practical design of incentive mechanisms should consider behavioral models instead of the classic rational choice theory for robust results in the real world. (b) Burden of information: A reason for people not making the right security decision is because they are unable to process the vast amount of information presented to them in a security context. Automated tools using machine learning or planning techniques can guide human users in their decision making process by reducing their computational burden and narrowing down the choices to make. Further, as already stated in part (1), automated tools can also help trained security experts prioritize their investigation since overwhelming amounts of warnings lead to missed alerts and ignored signs of attacks, e.g., the ignored alerts in the recent Target credit card breach. I believe questions such as those above can be addressed by bringing together concepts from AI and Security and Privacy. Addressing such problems can lead to real world impact such as making emerging AI technologies secure and providing end-to-end security for currently deployed cyber-physical systems. I aim to build a research group that works towards the goal of solving these complex inter-disciplinary problems using techniques from various disciplines such as game theory, security and privacy, machine learning, optimization and economics.

Game Theory for Safety and Security. Arunesh Sinha

Game Theory for Safety and Security. Arunesh Sinha Game Theory for Safety and Security Arunesh Sinha Motivation: Real World Security Issues 2 Central Problem Allocating limited security resources against an adaptive, intelligent adversary 3 Prior Work

More information

Modeling Security Decisions as Games

Modeling Security Decisions as Games Modeling Security Decisions as Games Chris Kiekintveld University of Texas at El Paso.. and MANY Collaborators Decision Making and Games Research agenda: improve and justify decisions Automated intelligent

More information

Stanford Center for AI Safety

Stanford Center for AI Safety Stanford Center for AI Safety Clark Barrett, David L. Dill, Mykel J. Kochenderfer, Dorsa Sadigh 1 Introduction Software-based systems play important roles in many areas of modern life, including manufacturing,

More information

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Introduction Intelligent security for physical infrastructures Our objective:

More information

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Outline Introduction to Game Theory and solution concepts Game definition

More information

A short introduction to Security Games

A short introduction to Security Games Game Theoretic Foundations of Multiagent Systems: Algorithms and Applications A case study: Playing Games for Security A short introduction to Security Games Nicola Basilico Department of Computer Science

More information

Anavilhanas Natural Reserve (about 4000 Km 2 )

Anavilhanas Natural Reserve (about 4000 Km 2 ) Anavilhanas Natural Reserve (about 4000 Km 2 ) A control room receives this alarm signal: what to do? adversarial patrolling with spatially uncertain alarm signals Nicola Basilico, Giuseppe De Nittis,

More information

Localization (Position Estimation) Problem in WSN

Localization (Position Estimation) Problem in WSN Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless

More information

Executive Summary. Chapter 1. Overview of Control

Executive Summary. Chapter 1. Overview of Control Chapter 1 Executive Summary Rapid advances in computing, communications, and sensing technology offer unprecedented opportunities for the field of control to expand its contributions to the economic and

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

CONTROL OF SENSORS FOR SEQUENTIAL DETECTION A STOCHASTIC APPROACH

CONTROL OF SENSORS FOR SEQUENTIAL DETECTION A STOCHASTIC APPROACH file://\\52zhtv-fs-725v\cstemp\adlib\input\wr_export_131127111121_237836102... Page 1 of 1 11/27/2013 AFRL-OSR-VA-TR-2013-0604 CONTROL OF SENSORS FOR SEQUENTIAL DETECTION A STOCHASTIC APPROACH VIJAY GUPTA

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

TRB Workshop on the Future of Road Vehicle Automation

TRB Workshop on the Future of Road Vehicle Automation TRB Workshop on the Future of Road Vehicle Automation Steven E. Shladover University of California PATH Program ITFVHA Meeting, Vienna October 21, 2012 1 Outline TRB background Workshop organization Automation

More information

Chapter 7 Information Redux

Chapter 7 Information Redux Chapter 7 Information Redux Information exists at the core of human activities such as observing, reasoning, and communicating. Information serves a foundational role in these areas, similar to the role

More information

Towards Strategic Kriegspiel Play with Opponent Modeling

Towards Strategic Kriegspiel Play with Opponent Modeling Towards Strategic Kriegspiel Play with Opponent Modeling Antonio Del Giudice and Piotr Gmytrasiewicz Department of Computer Science, University of Illinois at Chicago Chicago, IL, 60607-7053, USA E-mail:

More information

Elements of Artificial Intelligence and Expert Systems

Elements of Artificial Intelligence and Expert Systems Elements of Artificial Intelligence and Expert Systems Master in Data Science for Economics, Business & Finance Nicola Basilico Dipartimento di Informatica Via Comelico 39/41-20135 Milano (MI) Ufficio

More information

Game Theoretic Analysis of Security and Sustainability

Game Theoretic Analysis of Security and Sustainability Game Theoretic Analysis of Security and Sustainability Bo An boan@ntu.edu.sg School of Computer Science and Engineering Nanyang Technological University August 22, 2017@IJCAI 17, Early Career Spotlight

More information

Stochastic Game Models for Homeland Security

Stochastic Game Models for Homeland Security CREATE Research Archive Research Project Summaries 2008 Stochastic Game Models for Homeland Security Erim Kardes University of Southern California, kardes@usc.edu Follow this and additional works at: http://research.create.usc.edu/project_summaries

More information

Optimal Rhode Island Hold em Poker

Optimal Rhode Island Hold em Poker Optimal Rhode Island Hold em Poker Andrew Gilpin and Tuomas Sandholm Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 {gilpin,sandholm}@cs.cmu.edu Abstract Rhode Island Hold

More information

EXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF

EXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF EXECUTIVE SUMMARY St. Louis Region Emerging Transportation Technology Strategic Plan June 2017 Prepared for East-West Gateway Council of Governments by ICF Introduction 1 ACKNOWLEDGEMENTS This document

More information

Texas Hold em Inference Bot Proposal. By: Brian Mihok & Michael Terry Date Due: Monday, April 11, 2005

Texas Hold em Inference Bot Proposal. By: Brian Mihok & Michael Terry Date Due: Monday, April 11, 2005 Texas Hold em Inference Bot Proposal By: Brian Mihok & Michael Terry Date Due: Monday, April 11, 2005 1 Introduction One of the key goals in Artificial Intelligence is to create cognitive systems that

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

Artificial Intelligence. What is AI?

Artificial Intelligence. What is AI? 2 Artificial Intelligence What is AI? Some Definitions of AI The scientific understanding of the mechanisms underlying thought and intelligent behavior and their embodiment in machines American Association

More information

The first topic I would like to explore is probabilistic reasoning with Bayesian

The first topic I would like to explore is probabilistic reasoning with Bayesian Michael Terry 16.412J/6.834J 2/16/05 Problem Set 1 A. Topics of Fascination The first topic I would like to explore is probabilistic reasoning with Bayesian nets. I see that reasoning under situations

More information

Research Statement MAXIM LIKHACHEV

Research Statement MAXIM LIKHACHEV Research Statement MAXIM LIKHACHEV My long-term research goal is to develop a methodology for robust real-time decision-making in autonomous systems. To achieve this goal, my students and I research novel

More information

Software-Intensive Systems Producibility

Software-Intensive Systems Producibility Pittsburgh, PA 15213-3890 Software-Intensive Systems Producibility Grady Campbell Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University SSTC 2006. - page 1 Producibility

More information

Introduction to AI. What is Artificial Intelligence?

Introduction to AI. What is Artificial Intelligence? Introduction to AI Instructor: Dr. Wei Ding Fall 2009 1 What is Artificial Intelligence? Views of AI fall into four categories: Thinking Humanly Thinking Rationally Acting Humanly Acting Rationally The

More information

Engineered Resilient Systems DoD Science and Technology Priority

Engineered Resilient Systems DoD Science and Technology Priority Engineered Resilient Systems DoD Science and Technology Priority Mr. Scott Lucero Deputy Director, Strategic Initiatives Office of the Deputy Assistant Secretary of Defense (Systems Engineering) Scott.Lucero@osd.mil

More information

Artificial Intelligence

Artificial Intelligence Torralba and Wahlster Artificial Intelligence Chapter 1: Introduction 1/22 Artificial Intelligence 1. Introduction What is AI, Anyway? Álvaro Torralba Wolfgang Wahlster Summer Term 2018 Thanks to Prof.

More information

The Three Laws of Artificial Intelligence

The Three Laws of Artificial Intelligence The Three Laws of Artificial Intelligence Dispelling Common Myths of AI We ve all heard about it and watched the scary movies. An artificial intelligence somehow develops spontaneously and ferociously

More information

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use: Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the

More information

Artificial intelligence and judicial systems: The so-called predictive justice

Artificial intelligence and judicial systems: The so-called predictive justice Artificial intelligence and judicial systems: The so-called predictive justice 09 May 2018 1 Context The use of so-called artificial intelligence received renewed interest over the past years.. Computers

More information

Imperfect Monitoring in Multi-agent Opportunistic Channel Access

Imperfect Monitoring in Multi-agent Opportunistic Channel Access Imperfect Monitoring in Multi-agent Opportunistic Channel Access Ji Wang Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements

More information

Industry 4.0: the new challenge for the Italian textile machinery industry

Industry 4.0: the new challenge for the Italian textile machinery industry Industry 4.0: the new challenge for the Italian textile machinery industry Executive Summary June 2017 by Contacts: Economics & Press Office Ph: +39 02 4693611 email: economics-press@acimit.it ACIMIT has

More information

GAME THEORY: STRATEGY AND EQUILIBRIUM

GAME THEORY: STRATEGY AND EQUILIBRIUM Prerequisites Almost essential Game Theory: Basics GAME THEORY: STRATEGY AND EQUILIBRIUM MICROECONOMICS Principles and Analysis Frank Cowell Note: the detail in slides marked * can only be seen if you

More information

Chapter 3 Learning in Two-Player Matrix Games

Chapter 3 Learning in Two-Player Matrix Games Chapter 3 Learning in Two-Player Matrix Games 3.1 Matrix Games In this chapter, we will examine the two-player stage game or the matrix game problem. Now, we have two players each learning how to play

More information

A New Approach to the Design and Verification of Complex Systems

A New Approach to the Design and Verification of Complex Systems A New Approach to the Design and Verification of Complex Systems Research Scientist Palo Alto Research Center Intelligent Systems Laboratory Embedded Reasoning Area Tolga Kurtoglu, Ph.D. Complexity Highly

More information

Dominant and Dominated Strategies

Dominant and Dominated Strategies Dominant and Dominated Strategies Carlos Hurtado Department of Economics University of Illinois at Urbana-Champaign hrtdmrt2@illinois.edu Junel 8th, 2016 C. Hurtado (UIUC - Economics) Game Theory On the

More information

Game Theory. Department of Electronics EL-766 Spring Hasan Mahmood

Game Theory. Department of Electronics EL-766 Spring Hasan Mahmood Game Theory Department of Electronics EL-766 Spring 2011 Hasan Mahmood Email: hasannj@yahoo.com Course Information Part I: Introduction to Game Theory Introduction to game theory, games with perfect information,

More information

Computing Disciplines & Majors

Computing Disciplines & Majors Computing Disciplines & Majors If you choose a computing major, what career options are open to you? We have provided information for each of the majors listed here: Computer Engineering Typically involves

More information

Command, Control and Interoperability

Command, Control and Interoperability Command, Control and Interoperability Dr. David Boyd Director Command, Control and Interoperability Science and Technology Directorate U.S. Department of Homeland Security January 28, 2009 1 Command, Control

More information

A web-based early-warning service to monitor drinking-water treatment plant operations

A web-based early-warning service to monitor drinking-water treatment plant operations Snapshots of Doctoral Research at University College Cork 2010 A web-based early-warning service to monitor drinking-water treatment plant operations Franclin S. Foping Cork Constraint Computation Centre,

More information

Prototyping: Accelerating the Adoption of Transformative Capabilities

Prototyping: Accelerating the Adoption of Transformative Capabilities Prototyping: Accelerating the Adoption of Transformative Capabilities Mr. Elmer Roman Director, Joint Capability Technology Demonstration (JCTD) DASD, Emerging Capability & Prototyping (EC&P) 10/27/2016

More information

Grand Challenges for Systems and Services Sciences

Grand Challenges for Systems and Services Sciences Grand Challenges for Systems and Services Sciences Brian Monahan, David Pym, Richard Taylor, Chris Tofts, Mike Yearworth Trusted Systems Laboratory HP Laboratories Bristol HPL-2006-99 July 13, 2006* systems,

More information

Design and Implementation Options for Digital Library Systems

Design and Implementation Options for Digital Library Systems International Journal of Systems Science and Applied Mathematics 2017; 2(3): 70-74 http://www.sciencepublishinggroup.com/j/ijssam doi: 10.11648/j.ijssam.20170203.12 Design and Implementation Options for

More information

Milind Tambe on game theory in security applications Machine...

Milind Tambe on game theory in security applications Machine... Milind Tambe on game theory in security applications Machine... https://intelligence.org/2014/05/30/milind-tambe/ Milind Tambe on game theory in security applications Tweet 0 Like 0 1 May 30, 2014 Luke

More information

The Key to the Internet-of-Things: Conquering Complexity One Step at a Time

The Key to the Internet-of-Things: Conquering Complexity One Step at a Time The Key to the Internet-of-Things: Conquering Complexity One Step at a Time at IEEE QRS2017 Prague, CZ June 19, 2017 Adam T. Drobot Wayne, PA 19087 Outline What is IoT? Where is IoT in its evolution? A

More information

OFDM Pilot Optimization for the Communication and Localization Trade Off

OFDM Pilot Optimization for the Communication and Localization Trade Off SPCOMNAV Communications and Navigation OFDM Pilot Optimization for the Communication and Localization Trade Off A. Lee Swindlehurst Dept. of Electrical Engineering and Computer Science The Henry Samueli

More information

Revolutionizing Engineering Science through Simulation May 2006

Revolutionizing Engineering Science through Simulation May 2006 Revolutionizing Engineering Science through Simulation May 2006 Report of the National Science Foundation Blue Ribbon Panel on Simulation-Based Engineering Science EXECUTIVE SUMMARY Simulation refers to

More information

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS BY SERAFIN BENTO MASTER OF SCIENCE in INFORMATION SYSTEMS Edmonton, Alberta September, 2015 ABSTRACT The popularity of software agents demands for more comprehensive HAI design processes. The outcome of

More information

Alternation in the repeated Battle of the Sexes

Alternation in the repeated Battle of the Sexes Alternation in the repeated Battle of the Sexes Aaron Andalman & Charles Kemp 9.29, Spring 2004 MIT Abstract Traditional game-theoretic models consider only stage-game strategies. Alternation in the repeated

More information

Surveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan

Surveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan Surveillance strategies for autonomous mobile robots Nicola Basilico Department of Computer Science University of Milan Intelligence, surveillance, and reconnaissance (ISR) with autonomous UAVs ISR defines

More information

Draft executive summaries to target groups on industrial energy efficiency and material substitution in carbonintensive

Draft executive summaries to target groups on industrial energy efficiency and material substitution in carbonintensive Technology Executive Committee 29 August 2017 Fifteenth meeting Bonn, Germany, 12 15 September 2017 Draft executive summaries to target groups on industrial energy efficiency and material substitution

More information

Database Audit Workload Prioritization via Game Theory

Database Audit Workload Prioritization via Game Theory Database Audit Workload Prioritization via Game Theory CHAO YAN, Vanderbilt University, USA BO LI, University of Illinois at Urbana Champaign, USA YEVGENIY VOROBEYCHIK, Washington University in St. Louis,

More information

Intel Labs, Hillsboro, OR, June 2013 Aug 2013 Research Intern: Machine learning based detection of activity of mobile-phone users.

Intel Labs, Hillsboro, OR, June 2013 Aug 2013 Research Intern: Machine learning based detection of activity of mobile-phone users. ARUNESH SINHA University of Michigan Cell Phone: 412-420-9628 Department of Computer Science Official Email: arunesh@umich.edu 2709 Beyster, 2260 Hayward St, Alternate Email: aruneshsinha@gmail.com Ann

More information

IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska. Call for Participation and Proposals

IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska. Call for Participation and Proposals IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska Call for Participation and Proposals With its dispersed population, cultural diversity, vast area, varied geography,

More information

Yale University Department of Computer Science

Yale University Department of Computer Science LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work

More information

Methodology for Agent-Oriented Software

Methodology for Agent-Oriented Software ب.ظ 03:55 1 of 7 2006/10/27 Next: About this document... Methodology for Agent-Oriented Software Design Principal Investigator dr. Frank S. de Boer (frankb@cs.uu.nl) Summary The main research goal of this

More information

On the GNSS integer ambiguity success rate

On the GNSS integer ambiguity success rate On the GNSS integer ambiguity success rate P.J.G. Teunissen Mathematical Geodesy and Positioning Faculty of Civil Engineering and Geosciences Introduction Global Navigation Satellite System (GNSS) ambiguity

More information

Game theory attempts to mathematically. capture behavior in strategic situations, or. games, in which an individual s success in

Game theory attempts to mathematically. capture behavior in strategic situations, or. games, in which an individual s success in Game Theory Game theory attempts to mathematically capture behavior in strategic situations, or games, in which an individual s success in making choices depends on the choices of others. A game Γ consists

More information

Multiple Antenna Processing for WiMAX

Multiple Antenna Processing for WiMAX Multiple Antenna Processing for WiMAX Overview Wireless operators face a myriad of obstacles, but fundamental to the performance of any system are the propagation characteristics that restrict delivery

More information

Senate Bill (SB) 488 definition of comparative energy usage

Senate Bill (SB) 488 definition of comparative energy usage Rules governing behavior programs in California Generally behavioral programs run in California must adhere to the definitions shown below, however the investor-owned utilities (IOUs) are given broader

More information

The next level of intelligence: Artificial Intelligence. Innovation Day USA 2017 Princeton, March 27, 2017 Michael May, Siemens Corporate Technology

The next level of intelligence: Artificial Intelligence. Innovation Day USA 2017 Princeton, March 27, 2017 Michael May, Siemens Corporate Technology The next level of intelligence: Artificial Intelligence Innovation Day USA 2017 Princeton, March 27, 2017, Siemens Corporate Technology siemens.com/innovationusa Notes and forward-looking statements This

More information

THE FUTURE OF DATA AND INTELLIGENCE IN TRANSPORT

THE FUTURE OF DATA AND INTELLIGENCE IN TRANSPORT THE FUTURE OF DATA AND INTELLIGENCE IN TRANSPORT Humanity s ability to use data and intelligence has increased dramatically People have always used data and intelligence to aid their journeys. In ancient

More information

Reinforcement Learning Simulations and Robotics

Reinforcement Learning Simulations and Robotics Reinforcement Learning Simulations and Robotics Models Partially observable noise in sensors Policy search methods rather than value functionbased approaches Isolate key parameters by choosing an appropriate

More information

Intelligent Agents. Introduction to Planning. Ute Schmid. Cognitive Systems, Applied Computer Science, Bamberg University. last change: 23.

Intelligent Agents. Introduction to Planning. Ute Schmid. Cognitive Systems, Applied Computer Science, Bamberg University. last change: 23. Intelligent Agents Introduction to Planning Ute Schmid Cognitive Systems, Applied Computer Science, Bamberg University last change: 23. April 2012 U. Schmid (CogSys) Intelligent Agents last change: 23.

More information

Machine Learning and Decision Making for Sustainability

Machine Learning and Decision Making for Sustainability Machine Learning and Decision Making for Sustainability Stefano Ermon Department of Computer Science Stanford University April 12 Overview Stanford Artificial Intelligence Lab Fellow, Woods Institute for

More information

Cognitive Radios Games: Overview and Perspectives

Cognitive Radios Games: Overview and Perspectives Cognitive Radios Games: Overview and Yezekael Hayel University of Avignon, France Supélec 06/18/07 1 / 39 Summary 1 Introduction 2 3 4 5 2 / 39 Summary Introduction Cognitive Radio Technologies Game Theory

More information

CS 1571 Introduction to AI Lecture 12. Adversarial search. CS 1571 Intro to AI. Announcements

CS 1571 Introduction to AI Lecture 12. Adversarial search. CS 1571 Intro to AI. Announcements CS 171 Introduction to AI Lecture 1 Adversarial search Milos Hauskrecht milos@cs.pitt.edu 39 Sennott Square Announcements Homework assignment is out Programming and experiments Simulated annealing + Genetic

More information

Urban WiMAX response to Ofcom s Spectrum Commons Classes for licence exemption consultation

Urban WiMAX response to Ofcom s Spectrum Commons Classes for licence exemption consultation Urban WiMAX response to Ofcom s Spectrum Commons Classes for licence exemption consultation July 2008 Urban WiMAX welcomes the opportunity to respond to this consultation on Spectrum Commons Classes for

More information

Technologies that will make a difference for Canadian Law Enforcement

Technologies that will make a difference for Canadian Law Enforcement The Future Of Public Safety In Smart Cities Technologies that will make a difference for Canadian Law Enforcement The car is several meters away, with only the passenger s side visible to the naked eye,

More information

Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters

Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Scott Watson, Andrew Vardy, Wolfgang Banzhaf Department of Computer Science Memorial University of Newfoundland St John s.

More information

Program Automotive Security and Privacy

Program Automotive Security and Privacy FFI BOARD FUNDED PROGRAM Program Automotive Security and Privacy 2015-11-03 Innehållsförteckning 1 Abstract... 3 2 Background... 4 3 Program objectives... 5 4 Program description... 5 5 Program scope...

More information

MAGNT Research Report (ISSN ) Vol.6(1). PP , Controlling Cost and Time of Construction Projects Using Neural Network

MAGNT Research Report (ISSN ) Vol.6(1). PP , Controlling Cost and Time of Construction Projects Using Neural Network Controlling Cost and Time of Construction Projects Using Neural Network Li Ping Lo Faculty of Computer Science and Engineering Beijing University China Abstract In order to achieve optimized management,

More information

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing Chao Yan 1, Bo Li 2, Yevgeniy Vorobeychik 1,4, Aron Laszka 3, Daniel Fabbri 1,4, Bradley Malin 1,4 1 Department of Electrical

More information

The Response from Motorola Ltd. to the Consultation on The Licence-Exemption Framework Review

The Response from Motorola Ltd. to the Consultation on The Licence-Exemption Framework Review The Response from Motorola Ltd. to the Consultation on The Licence-Exemption Framework Review June 21 st 2007. Key Points 1. The introduction of the concept of a version of Commons in which the possible

More information

Five-In-Row with Local Evaluation and Beam Search

Five-In-Row with Local Evaluation and Beam Search Five-In-Row with Local Evaluation and Beam Search Jiun-Hung Chen and Adrienne X. Wang jhchen@cs axwang@cs Abstract This report provides a brief overview of the game of five-in-row, also known as Go-Moku,

More information

Frugal Sensing Spectral Analysis from Power Inequalities

Frugal Sensing Spectral Analysis from Power Inequalities Frugal Sensing Spectral Analysis from Power Inequalities Nikos Sidiropoulos Joint work with Omar Mehanna IEEE SPAWC 2013 Plenary, June 17, 2013, Darmstadt, Germany Wideband Spectrum Sensing (for CR/DSM)

More information

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes 7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis

More information

The Response of Motorola Ltd. to the. Consultation on Spectrum Commons Classes for Licence Exemption

The Response of Motorola Ltd. to the. Consultation on Spectrum Commons Classes for Licence Exemption The Response of Motorola Ltd to the Consultation on Spectrum Commons Classes for Licence Exemption Motorola is grateful for the opportunity to contribute to the consultation on Spectrum Commons Classes

More information

AGENTLESS ARCHITECTURE

AGENTLESS ARCHITECTURE ansible.com +1 919.667.9958 WHITEPAPER THE BENEFITS OF AGENTLESS ARCHITECTURE A management tool should not impose additional demands on one s environment in fact, one should have to think about it as little

More information

Building capacities for systemic change: diversified roadmap in the context of VTT s service research network

Building capacities for systemic change: diversified roadmap in the context of VTT s service research network Building capacities for systemic change: diversified roadmap in the context of VTT s service research network Toni Ahlqvist & Minna Halonen VTT Technical Research Centre of Finland VTT Symposium on Service

More information

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant

More information

Advisor: Professor Frank Y.S. Lin Present by Tim Q.T. Chen

Advisor: Professor Frank Y.S. Lin Present by Tim Q.T. Chen Advisor: Professor Frank Y.S. Lin Present by Tim Q.T. Chen 1 Introduction Game Theory Attack Graph A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy Optimal Network

More information

IOT FOR AUDITORS AND ACCOUNTANTS; AUDITING THE IOT

IOT FOR AUDITORS AND ACCOUNTANTS; AUDITING THE IOT IOT FOR AUDITORS AND ACCOUNTANTS; AUDITING THE IOT ERIC E. COHEN COHEN COMPUTER CONSULTING GENEVA, 24 APRIL 2018 1 INTERNET OF THINGS AND ACCOUNTING IoT is happening: monitoring, recording, acting Benefits

More information

CS221 Project Final Report Gomoku Game Agent

CS221 Project Final Report Gomoku Game Agent CS221 Project Final Report Gomoku Game Agent Qiao Tan qtan@stanford.edu Xiaoti Hu xiaotihu@stanford.edu 1 Introduction Gomoku, also know as five-in-a-row, is a strategy board game which is traditionally

More information

THE GAME THEORY OF OPEN-SOURCE SOFTWARE

THE GAME THEORY OF OPEN-SOURCE SOFTWARE THE GAME THEORY OF OPEN-SOURCE SOFTWARE PAUL REIDY Senior Sophister In this paper, Paul Reidy utilises a game theoretical framework to explore the decision of a firm to make its software open-source and

More information

Geoffrey Hollinger: Research Statement Decision Making & Learning for Robotics

Geoffrey Hollinger: Research Statement Decision Making & Learning for Robotics Geoffrey Hollinger: Research Statement Decision Making & Learning for Robotics Imagine a world where streams of sensor data are at your fingertips a world where scientists, first responders, and safety

More information

A Proposed Probabilistic Model for Risk Forecasting in Small Health Informatics Projects

A Proposed Probabilistic Model for Risk Forecasting in Small Health Informatics Projects 2011 International Conference on Modeling, Simulation and Control IPCSIT vol.10 (2011) (2011) IACSIT Press, Singapore A Proposed Probabilistic Model for Risk Forecasting in Small Health Informatics Projects

More information

A Survey on Supermodular Games

A Survey on Supermodular Games A Survey on Supermodular Games Ashiqur R. KhudaBukhsh December 27, 2006 Abstract Supermodular games are an interesting class of games that exhibits strategic complementarity. There are several compelling

More information

A GRAPH THEORETICAL APPROACH TO SOLVING SCRAMBLE SQUARES PUZZLES. 1. Introduction

A GRAPH THEORETICAL APPROACH TO SOLVING SCRAMBLE SQUARES PUZZLES. 1. Introduction GRPH THEORETICL PPROCH TO SOLVING SCRMLE SQURES PUZZLES SRH MSON ND MLI ZHNG bstract. Scramble Squares puzzle is made up of nine square pieces such that each edge of each piece contains half of an image.

More information

New developments in the philosophy of AI. Vincent C. Müller. Anatolia College/ACT February 2015

New developments in the philosophy of AI. Vincent C. Müller. Anatolia College/ACT   February 2015 Müller, Vincent C. (2016), New developments in the philosophy of AI, in Vincent C. Müller (ed.), Fundamental Issues of Artificial Intelligence (Synthese Library; Berlin: Springer). http://www.sophia.de

More information

A Hybrid Risk Management Process for Interconnected Infrastructures

A Hybrid Risk Management Process for Interconnected Infrastructures A Hybrid Management Process for Interconnected Infrastructures Stefan Schauer Workshop on Novel Approaches in and Security Management for Critical Infrastructures Vienna, 19.09.2017 Contents Motivation

More information

Chapter Two: The GamePlan Software *

Chapter Two: The GamePlan Software * Chapter Two: The GamePlan Software * 2.1 Purpose of the Software One of the greatest challenges in teaching and doing research in game theory is computational. Although there are powerful theoretical results

More information

CHAPTER 8 RESEARCH METHODOLOGY AND DESIGN

CHAPTER 8 RESEARCH METHODOLOGY AND DESIGN CHAPTER 8 RESEARCH METHODOLOGY AND DESIGN 8.1 Introduction This chapter gives a brief overview of the field of research methodology. It contains a review of a variety of research perspectives and approaches

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

Appendix A A Primer in Game Theory

Appendix A A Primer in Game Theory Appendix A A Primer in Game Theory This presentation of the main ideas and concepts of game theory required to understand the discussion in this book is intended for readers without previous exposure to

More information

Fictitious Play applied on a simplified poker game

Fictitious Play applied on a simplified poker game Fictitious Play applied on a simplified poker game Ioannis Papadopoulos June 26, 2015 Abstract This paper investigates the application of fictitious play on a simplified 2-player poker game with the goal

More information

Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) April 2016, Geneva

Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) April 2016, Geneva Introduction Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) 11-15 April 2016, Geneva Views of the International Committee of the Red Cross

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information