首页 > 最新文献

2013 IEEE 25th International Conference on Tools with Artificial Intelligence最新文献

英文 中文
From Natural Language Requirements to Formal Specification Using an Ontology 从自然语言需求到使用本体的形式化规范
Pub Date : 2013-11-04 DOI: 10.1109/ICTAI.2013.116
Driss Sadoun, Catherine Dubois, Y. Ghamri-Doudane, Brigitte Grau
In order to check requirement specifications written in natural language, we have chosen to model domain knowledge through an ontology and to formally represent user requirements by its population. Our approach of ontology population focuses on instance property identification from texts. We do so using extraction rules automatically acquired from a training corpus and a bootstrapping terminology. These rules aim at identifying instance property mentions represented by triples of terms, using lexical, syntactic and semantic levels of analysis. They are generated from recurrent syntactic paths between terms denoting instances of concepts and properties. We show how focusing on instance property identification allows us to precisely identify concept instances explicitly or implicitly mentioned in texts.
为了检查用自然语言编写的需求规范,我们选择通过本体对领域知识建模,并通过其数量正式表示用户需求。我们的本体填充方法侧重于从文本中识别实例属性。我们使用从训练语料库和自举术语中自动获得的提取规则来实现这一点。这些规则旨在使用词法、句法和语义层面的分析,识别由术语三元组表示的实例属性提及。它们是由表示概念和属性实例的术语之间的循环语法路径生成的。我们展示了专注于实例属性识别如何使我们能够精确地识别文本中显式或隐式提到的概念实例。
{"title":"From Natural Language Requirements to Formal Specification Using an Ontology","authors":"Driss Sadoun, Catherine Dubois, Y. Ghamri-Doudane, Brigitte Grau","doi":"10.1109/ICTAI.2013.116","DOIUrl":"https://doi.org/10.1109/ICTAI.2013.116","url":null,"abstract":"In order to check requirement specifications written in natural language, we have chosen to model domain knowledge through an ontology and to formally represent user requirements by its population. Our approach of ontology population focuses on instance property identification from texts. We do so using extraction rules automatically acquired from a training corpus and a bootstrapping terminology. These rules aim at identifying instance property mentions represented by triples of terms, using lexical, syntactic and semantic levels of analysis. They are generated from recurrent syntactic paths between terms denoting instances of concepts and properties. We show how focusing on instance property identification allows us to precisely identify concept instances explicitly or implicitly mentioned in texts.","PeriodicalId":140309,"journal":{"name":"2013 IEEE 25th International Conference on Tools with Artificial Intelligence","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Controller Synthesis for Safety Critical Planning 安全关键规划的控制器综合
Andrea Orlandini, M. Suriano, A. Cesta, Alberto Finzi
Safety critical planning and execution is a crucial issue in autonomous systems. This paper proposes a methodology for controller synthesis suitable for timeline-based planning and demonstrates its effectiveness in a space domain where robustness of execution is a crucial property. The proposed approach uses Timed Game Automata (TGA) for formal modeling and the UPPAAL-TIGA model checker for controllers synthesis. An experimental evaluation is performed using a real-world control system.
安全关键规划和执行是自动驾驶系统的关键问题。本文提出了一种适合于基于时间线的规划的控制器综合方法,并证明了其在执行鲁棒性至关重要的空间域中的有效性。该方法使用定时游戏自动机(TGA)进行形式化建模,并使用UPPAAL-TIGA模型检查器进行控制器综合。利用实际控制系统进行了实验评估。
{"title":"Controller Synthesis for Safety Critical Planning","authors":"Andrea Orlandini, M. Suriano, A. Cesta, Alberto Finzi","doi":"10.1109/ICTAI.2013.54","DOIUrl":"https://doi.org/10.1109/ICTAI.2013.54","url":null,"abstract":"Safety critical planning and execution is a crucial issue in autonomous systems. This paper proposes a methodology for controller synthesis suitable for timeline-based planning and demonstrates its effectiveness in a space domain where robustness of execution is a crucial property. The proposed approach uses Timed Game Automata (TGA) for formal modeling and the UPPAAL-TIGA model checker for controllers synthesis. An experimental evaluation is performed using a real-world control system.","PeriodicalId":140309,"journal":{"name":"2013 IEEE 25th International Conference on Tools with Artificial Intelligence","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129291219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A General Privacy Loss Aggregation Framework for Distributed Constraint Reasoning 分布式约束推理的通用隐私损失聚合框架
Pub Date : 2013-11-04 DOI: 10.1109/ICTAI.2013.148
Jimmy Ho-man Lee, Terrence W.K. Mak, Yuxiang Shi
Distributed constraint solving are useful in tackling constrained problems when agents are not allowed to share his/her private information to others and/or gathering all necessary information to solve the problem in a centralized manner is infeasible. With these two limitations, distributed algorithms solve the problem by coordinating agents to negotiate with each other. However, once information is exchanged during negotiation, the private information may be leaked from one agent to another. We propose and design a framework based on Valuation of Possible States (VPS) to evaluate how well a distributed algorithm preserves the totality of all private information onthe entire system when solving distributed constraint optimization problems, by allowing the uses of different aggregators aggregating agents' individual privacy loss. Two classes of aggregators: idempotent aggregators and risk based aggregators are proposed. We further proposed generalized inference rules to infer privacy loss of individual agents. We implement our work on four distributed constraint solving algorithms: Synchronous Branch and Bound (SynchBB), Asynchronous Distributed Constraint Optimization (ADOPT), Branch and Bound ADOPT (BnB-ADOPT), and Distributed Pseudo-tree Optimization Procedure (DPOP). Preliminary experimental evaluations on two benchmarks, Distributed Multi-Event Scheduling Problem (DiMES) and Random Distributed COP, comparing the four algorithms are performed.
当代理不允许与他人共享他/她的私人信息,或者以集中的方式收集所有必要的信息来解决问题是不可行的时候,分布式约束求解在解决约束问题时是有用的。考虑到这两个限制,分布式算法通过协调代理相互协商来解决问题。然而,一旦在协商过程中交换信息,私有信息可能会从一个代理泄露到另一个代理。我们提出并设计了一个基于可能状态评估(VPS)的框架,通过允许使用不同的聚合器聚合代理的个人隐私损失,来评估分布式算法在解决分布式约束优化问题时如何很好地保留整个系统上所有隐私信息的总量。提出了两类聚类:幂等聚类和基于风险的聚类。我们进一步提出了广义推理规则来推断个体代理的隐私损失。我们实现了四种分布式约束求解算法:同步分支与绑定(SynchBB)、异步分布式约束优化(ADOPT)、分支与绑定采用(BnB-ADOPT)和分布式伪树优化程序(DPOP)。在分布式多事件调度问题(DiMES)和随机分布式COP两个基准上进行了初步的实验评估,比较了四种算法。
{"title":"A General Privacy Loss Aggregation Framework for Distributed Constraint Reasoning","authors":"Jimmy Ho-man Lee, Terrence W.K. Mak, Yuxiang Shi","doi":"10.1109/ICTAI.2013.148","DOIUrl":"https://doi.org/10.1109/ICTAI.2013.148","url":null,"abstract":"Distributed constraint solving are useful in tackling constrained problems when agents are not allowed to share his/her private information to others and/or gathering all necessary information to solve the problem in a centralized manner is infeasible. With these two limitations, distributed algorithms solve the problem by coordinating agents to negotiate with each other. However, once information is exchanged during negotiation, the private information may be leaked from one agent to another. We propose and design a framework based on Valuation of Possible States (VPS) to evaluate how well a distributed algorithm preserves the totality of all private information onthe entire system when solving distributed constraint optimization problems, by allowing the uses of different aggregators aggregating agents' individual privacy loss. Two classes of aggregators: idempotent aggregators and risk based aggregators are proposed. We further proposed generalized inference rules to infer privacy loss of individual agents. We implement our work on four distributed constraint solving algorithms: Synchronous Branch and Bound (SynchBB), Asynchronous Distributed Constraint Optimization (ADOPT), Branch and Bound ADOPT (BnB-ADOPT), and Distributed Pseudo-tree Optimization Procedure (DPOP). Preliminary experimental evaluations on two benchmarks, Distributed Multi-Event Scheduling Problem (DiMES) and Random Distributed COP, comparing the four algorithms are performed.","PeriodicalId":140309,"journal":{"name":"2013 IEEE 25th International Conference on Tools with Artificial Intelligence","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130124998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accelerating One-Pass Clustering by Cluster Selection Racing 通过聚类选择竞赛加速一次聚类
Nicolas Labroche, Marcin Detyniecki, Thomas Bärecke
This paper introduces a racing mechanism in the cluster selection process for one-pass clustering algorithms. We focus on cases where data are not numerical vectors and where it is not necessarily possible to compute a mean for each cluster. In this case, the distance of each point to existing clusters can be computed exhaustively with a quadratic complexity which is not tractable in most of nowadays use cases. In this paper we first introduce a stochastic approach for estimating the distance of each new data point to existing clusters based on Hoeffding and Bernstein bounds, that reduces the number of computations by simultaneously selecting the quantity of data to be sampled and by eliminating the non-competitive clusters. Second, this paper shows that it is possible to improve the efficiency of our approach by reducing the theoretical values of the Hoeffding and Bernstein bounds. Our algorithms, tested on real data sets, provide significant acceleration of the one-pass clustering algorithms, while making less error (or any depending on parameters) than one-pass clustering algorithm with fixed number of comparisons with each cluster.
本文介绍了单次聚类算法在聚类选择过程中的一种竞速机制。我们关注的是数据不是数值向量的情况,以及不可能为每个集群计算平均值的情况。在这种情况下,每个点到现有集群的距离可以用二次复杂度详尽地计算出来,这在现在的大多数用例中是难以处理的。在本文中,我们首先介绍了一种基于Hoeffding和Bernstein边界估计每个新数据点到现有簇的距离的随机方法,该方法通过同时选择要采样的数据量和通过消除非竞争簇来减少计算次数。其次,本文表明可以通过降低Hoeffding和Bernstein边界的理论值来提高我们方法的效率。我们的算法在真实数据集上进行了测试,提供了一次聚类算法的显著加速,同时比与每个聚类进行固定数量比较的一次聚类算法产生更少的错误(或任何取决于参数的错误)。
{"title":"Accelerating One-Pass Clustering by Cluster Selection Racing","authors":"Nicolas Labroche, Marcin Detyniecki, Thomas Bärecke","doi":"10.1109/ICTAI.2013.79","DOIUrl":"https://doi.org/10.1109/ICTAI.2013.79","url":null,"abstract":"This paper introduces a racing mechanism in the cluster selection process for one-pass clustering algorithms. We focus on cases where data are not numerical vectors and where it is not necessarily possible to compute a mean for each cluster. In this case, the distance of each point to existing clusters can be computed exhaustively with a quadratic complexity which is not tractable in most of nowadays use cases. In this paper we first introduce a stochastic approach for estimating the distance of each new data point to existing clusters based on Hoeffding and Bernstein bounds, that reduces the number of computations by simultaneously selecting the quantity of data to be sampled and by eliminating the non-competitive clusters. Second, this paper shows that it is possible to improve the efficiency of our approach by reducing the theoretical values of the Hoeffding and Bernstein bounds. Our algorithms, tested on real data sets, provide significant acceleration of the one-pass clustering algorithms, while making less error (or any depending on parameters) than one-pass clustering algorithm with fixed number of comparisons with each cluster.","PeriodicalId":140309,"journal":{"name":"2013 IEEE 25th International Conference on Tools with Artificial Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115906112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model-Guided Approaches for MaxSAT Solving 模型导向的MaxSAT求解方法
Pub Date : 2013-11-04 DOI: 10.1109/ICTAI.2013.142
António Morgado, F. Heras, Joao Marques-Silva
Maximum Satisfiability (MaxSAT) and its weighted and partial variants are well-known optimization formulations of Boolean Satisfiability (SAT). MaxSAT consists of finding an assignment that satisfies the (possibly empty) set of hard clauses, while minimizing the sum of weights of the falsified soft clauses. Recent years have witnessed the development of complete algorithms for MaxSAT motivated by a number of practical applications. The most effective approaches in such practical settings are based on iteratively calling a SAT solver and computing unsatisfiable cores to guide the search. Such approaches use computed unsatisfiable cores from unsatisfiable (UNSAT) outcomes to relax the soft clauses occurring in the computed cores. Surprisingly, only recently has an approach been proposed that exploits models from satisfiable (SAT) outcomes [1], [2] rather than unsatisfiable cores from UNSAT outcomes. This paper proposes two novel MaxSAT algorithms which exploit SAT outcomes to relax soft clauses taking into account the computed models. The new algorithms are shown to outperform classical MaxSAT algorithms and to be fairly competitive with recent core-guided MaxSAT algorithms. Finally, a well-known core-guided MaxSAT algorithm is extended to additionally exploit computed models in an attempt to integrate both approaches.
最大可满足性(MaxSAT)及其加权和部分变量是众所周知的布尔可满足性(SAT)优化公式。MaxSAT包括找到一个满足硬子句集(可能为空)的赋值,同时最小化伪造的软子句的权重总和。近年来,在许多实际应用的推动下,MaxSAT的完整算法得到了发展。在这种实际设置中,最有效的方法是基于迭代调用SAT求解器并计算不满意的核心来指导搜索。这种方法使用来自于不满意结果的计算不满意核来放松计算核中出现的软子句。令人惊讶的是,直到最近才有人提出一种方法,利用来自可满足(SAT)结果的模型[1],[2],而不是来自UNSAT结果的不可满足核心。本文提出了两种新的MaxSAT算法,利用SAT结果放宽软条款,并考虑计算模型。新算法被证明优于经典的MaxSAT算法,并与最近的核心引导MaxSAT算法相当有竞争力。最后,一个著名的核心引导的MaxSAT算法扩展到额外利用计算模型,试图整合这两种方法。
{"title":"Model-Guided Approaches for MaxSAT Solving","authors":"António Morgado, F. Heras, Joao Marques-Silva","doi":"10.1109/ICTAI.2013.142","DOIUrl":"https://doi.org/10.1109/ICTAI.2013.142","url":null,"abstract":"Maximum Satisfiability (MaxSAT) and its weighted and partial variants are well-known optimization formulations of Boolean Satisfiability (SAT). MaxSAT consists of finding an assignment that satisfies the (possibly empty) set of hard clauses, while minimizing the sum of weights of the falsified soft clauses. Recent years have witnessed the development of complete algorithms for MaxSAT motivated by a number of practical applications. The most effective approaches in such practical settings are based on iteratively calling a SAT solver and computing unsatisfiable cores to guide the search. Such approaches use computed unsatisfiable cores from unsatisfiable (UNSAT) outcomes to relax the soft clauses occurring in the computed cores. Surprisingly, only recently has an approach been proposed that exploits models from satisfiable (SAT) outcomes [1], [2] rather than unsatisfiable cores from UNSAT outcomes. This paper proposes two novel MaxSAT algorithms which exploit SAT outcomes to relax soft clauses taking into account the computed models. The new algorithms are shown to outperform classical MaxSAT algorithms and to be fairly competitive with recent core-guided MaxSAT algorithms. Finally, a well-known core-guided MaxSAT algorithm is extended to additionally exploit computed models in an attempt to integrate both approaches.","PeriodicalId":140309,"journal":{"name":"2013 IEEE 25th International Conference on Tools with Artificial Intelligence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125339308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhancing Dynamic Recommender Selection Using Multiple Rules for Trust and Reputation Models in MANETs 基于多规则的manet信任和声誉模型增强动态推荐选择
Pub Date : 2013-11-04 DOI: 10.1109/ICTAI.2013.102
A. Shabut, K. Dahal, I. Awan
Trust and reputation models are utilised by several researchers as one vital factor in the security mechanisms in MANETs to deal with selfish and misbehaving nodes and ensure packet delivery from source to destination. However, in the presence of new attacks, it is important to build a trust model to resist countermeasures related to propagation of dishonest recommendations, and aggregation which may easily degrade the effectiveness of using trust models in a hostile environment such as MANETs. However, dealing with dishonest recommendation attacks in MANETs remains an open and challenging area of research. In this work, we propose a dynamic selection algorithm to filter out recommendations in order to achieve resistance against certain existing attacks such as bad-mouthing and ballot-stuffing. The selection algorithm is based on three different rules: (i)majority rule based, (ii) personal experience based, and (iii)service reputation based. Recommendations are clustered, filtered, and selected based on these three rules in order to givethe trust and reputation model greater robustness andaccuracy over the dynamic and changeable MANETenvironment.
信任和声誉模型被一些研究人员用作manet安全机制中的一个重要因素,用于处理自私和行为不端的节点,并确保数据包从源到目的的传输。然而,在存在新的攻击的情况下,重要的是建立一个信任模型来抵抗与不诚实推荐传播和聚合相关的对策,这些对策很容易降低在恶意环境(如manet)中使用信任模型的有效性。然而,在manet中处理不诚实推荐攻击仍然是一个开放和具有挑战性的研究领域。在这项工作中,我们提出了一种动态选择算法来过滤推荐,以抵抗某些现有的攻击,如诽谤和填塞选票。选择算法基于三种不同的规则:(i)基于多数规则,(ii)基于个人经验,(iii)基于服务声誉。基于这三个规则对推荐进行聚类、过滤和选择,以使信任和声誉模型在动态和可变的maneten环境中具有更高的鲁棒性和准确性。
{"title":"Enhancing Dynamic Recommender Selection Using Multiple Rules for Trust and Reputation Models in MANETs","authors":"A. Shabut, K. Dahal, I. Awan","doi":"10.1109/ICTAI.2013.102","DOIUrl":"https://doi.org/10.1109/ICTAI.2013.102","url":null,"abstract":"Trust and reputation models are utilised by several researchers as one vital factor in the security mechanisms in MANETs to deal with selfish and misbehaving nodes and ensure packet delivery from source to destination. However, in the presence of new attacks, it is important to build a trust model to resist countermeasures related to propagation of dishonest recommendations, and aggregation which may easily degrade the effectiveness of using trust models in a hostile environment such as MANETs. However, dealing with dishonest recommendation attacks in MANETs remains an open and challenging area of research. In this work, we propose a dynamic selection algorithm to filter out recommendations in order to achieve resistance against certain existing attacks such as bad-mouthing and ballot-stuffing. The selection algorithm is based on three different rules: (i)majority rule based, (ii) personal experience based, and (iii)service reputation based. Recommendations are clustered, filtered, and selected based on these three rules in order to givethe trust and reputation model greater robustness andaccuracy over the dynamic and changeable MANETenvironment.","PeriodicalId":140309,"journal":{"name":"2013 IEEE 25th International Conference on Tools with Artificial Intelligence","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114460967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Natural Language Processing and Semantic-Based System for Contract Analysis 基于自然语言处理和语义的契约分析系统
Pub Date : 2013-11-04 DOI: 10.1109/ICTAI.2013.109
Dan Yang, Christina Leber, L. Tari, A. Chandramouli, A. Crapo, R. Messmer, Steven M. Gustafson
The Contract Search Tool is a semantic search platform that enables effective analysis of complex, long-term contractual service agreement for machines such as gas turbines. The approach we developed can effectively identify paragraphs of text for specific legal concepts. Then the key content can be decomposed and organized by the semantics model that captures key elements of the concepts and links to specific paragraphs. This is achieved by performing semantic text analysis to capture implicitly-stated provisions and the definitions of provisions, and relevant information is returned in an organized manner. The tool can be applied to increase productivity of legal review, share legal knowledge with service managers, and reduce legal risk in contract review process.
合同搜索工具是一个语义搜索平台,可以有效分析复杂的长期合同服务协议,如燃气轮机。我们开发的方法可以有效地识别特定法律概念的文本段落。然后,关键内容可以通过语义模型进行分解和组织,语义模型捕获概念的关键元素并链接到特定段落。这是通过执行语义文本分析来实现的,以捕获隐式陈述的条款和条款的定义,并以有组织的方式返回相关信息。该工具可以提高法律审查的效率,与服务经理共享法律知识,降低合同审查过程中的法律风险。
{"title":"A Natural Language Processing and Semantic-Based System for Contract Analysis","authors":"Dan Yang, Christina Leber, L. Tari, A. Chandramouli, A. Crapo, R. Messmer, Steven M. Gustafson","doi":"10.1109/ICTAI.2013.109","DOIUrl":"https://doi.org/10.1109/ICTAI.2013.109","url":null,"abstract":"The Contract Search Tool is a semantic search platform that enables effective analysis of complex, long-term contractual service agreement for machines such as gas turbines. The approach we developed can effectively identify paragraphs of text for specific legal concepts. Then the key content can be decomposed and organized by the semantics model that captures key elements of the concepts and links to specific paragraphs. This is achieved by performing semantic text analysis to capture implicitly-stated provisions and the definitions of provisions, and relevant information is returned in an organized manner. The tool can be applied to increase productivity of legal review, share legal knowledge with service managers, and reduce legal risk in contract review process.","PeriodicalId":140309,"journal":{"name":"2013 IEEE 25th International Conference on Tools with Artificial Intelligence","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115890213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Knowledge-Guided Methodology for Specification Analysis 知识导向的规范分析方法
Pub Date : 2013-11-04 DOI: 10.1109/ICTAI.2013.115
B. Singh, Arunprasath Shankar, Y. Shiyanovskii, F. Wolff, C. Papachristou, D. Weyer, Steve Clay, Jim Morrison
The number of Soft-IP vendors and designsbecoming available on the global market is growing at a phenomenal rate. The current practice of evaluating Soft IPs using their specification is a time consuming manual process. A specification document is primarily written in English, which serves as a common language for internal product development teams as well as customers. Designers have a preference for writing specifications in an informal natural language using text and notations, including diagrams, charts and tables. The lack of formality of specification documents is a limiting factor in their analysis. The current state-of-the-art in hardware design lacks any specification analysis technique. In this paper, we present a knowledge-guided methodology for specification analysis that can automatically analyze specification documents. Our approach avoids formal specification. Instead we rely on domain-based ontologies to capture design behavior. We tested our approach by analyzing floating point specification from several third party IP vendors. We define spec coverage and requirement coverage metrics to quantify our results.
全球市场上可用的软ip供应商和设计的数量正在以惊人的速度增长。目前使用其规范评估软ip的实践是一个耗时的手动过程。规范文档主要用英语编写,作为内部产品开发团队和客户的通用语言。设计人员倾向于使用文本和符号(包括图表、图表和表格)以非正式的自然语言编写规范。规范文档缺乏形式化是其分析中的一个限制因素。目前的硬件设计缺乏任何规格分析技术。在本文中,我们提出了一种知识导向的规范分析方法,可以自动分析规范文档。我们的方法避免了正式的规范。相反,我们依赖于基于领域的本体来捕获设计行为。我们通过分析来自几个第三方IP供应商的浮点规范来测试我们的方法。我们定义规范覆盖和需求覆盖度量来量化我们的结果。
{"title":"Knowledge-Guided Methodology for Specification Analysis","authors":"B. Singh, Arunprasath Shankar, Y. Shiyanovskii, F. Wolff, C. Papachristou, D. Weyer, Steve Clay, Jim Morrison","doi":"10.1109/ICTAI.2013.115","DOIUrl":"https://doi.org/10.1109/ICTAI.2013.115","url":null,"abstract":"The number of Soft-IP vendors and designsbecoming available on the global market is growing at a phenomenal rate. The current practice of evaluating Soft IPs using their specification is a time consuming manual process. A specification document is primarily written in English, which serves as a common language for internal product development teams as well as customers. Designers have a preference for writing specifications in an informal natural language using text and notations, including diagrams, charts and tables. The lack of formality of specification documents is a limiting factor in their analysis. The current state-of-the-art in hardware design lacks any specification analysis technique. In this paper, we present a knowledge-guided methodology for specification analysis that can automatically analyze specification documents. Our approach avoids formal specification. Instead we rely on domain-based ontologies to capture design behavior. We tested our approach by analyzing floating point specification from several third party IP vendors. We define spec coverage and requirement coverage metrics to quantify our results.","PeriodicalId":140309,"journal":{"name":"2013 IEEE 25th International Conference on Tools with Artificial Intelligence","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Error Allowing Minimax: Getting over Indifference 允许极大极小的错误:克服无差异
F. Wisser
We propose Error Allowing Minimax, an algorithm resolving indifferences in the choices of pure minimax players in games of perfect information, to give the opponent the biggest possible target for errors. In contrast to the usual approach of defining a domain-specific static evaluation function with an infinite codomain, we achieve fine-grained positional evaluations by general considerations of the game tree only. To achieve applicability to real-world situations we develop Error Allowing Alpha-Beta, a variant of the standard Alpha-Beta algorithm, and a variant hybridizing these two algorithms, allowing full control over the trade-off between accuracy and computational complexity. We investigate the impact of the algorithm applying it to the perfect information game Dots and Boxes.
我们提出了一种解决完全信息博弈中纯极大极小玩家选择无关的算法——误差允许极大极小算法,以给对手最大可能的错误目标。与通常定义具有无限上域的特定领域静态评估函数的方法相反,我们仅通过游戏树的一般考虑来实现细粒度的位置评估。为了实现对现实世界情况的适用性,我们开发了允许误差的Alpha-Beta算法,这是标准Alpha-Beta算法的一种变体,以及混合这两种算法的变体,允许完全控制精度和计算复杂性之间的权衡。我们研究了将该算法应用于完美信息博弈“点与盒”的影响。
{"title":"Error Allowing Minimax: Getting over Indifference","authors":"F. Wisser","doi":"10.1109/ICTAI.2013.22","DOIUrl":"https://doi.org/10.1109/ICTAI.2013.22","url":null,"abstract":"We propose Error Allowing Minimax, an algorithm resolving indifferences in the choices of pure minimax players in games of perfect information, to give the opponent the biggest possible target for errors. In contrast to the usual approach of defining a domain-specific static evaluation function with an infinite codomain, we achieve fine-grained positional evaluations by general considerations of the game tree only. To achieve applicability to real-world situations we develop Error Allowing Alpha-Beta, a variant of the standard Alpha-Beta algorithm, and a variant hybridizing these two algorithms, allowing full control over the trade-off between accuracy and computational complexity. We investigate the impact of the algorithm applying it to the perfect information game Dots and Boxes.","PeriodicalId":140309,"journal":{"name":"2013 IEEE 25th International Conference on Tools with Artificial Intelligence","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117324781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Abstract Debates 抽象的辩论
Pub Date : 2013-11-04 DOI: 10.1109/ICTAI.2013.110
Cosmina Croitoru
We introduce and study Abstract Debates, in an attempt to incorporate Dung's argumentation frameworks in a general model of social reasoning. Informally, on a shared reasons space, a society expresses a set of possibly shared forms of subjectivity, whose deeper interactions enable new consistent collective judgments, creating social inference relations. Formally, in an abstract debate each member of a society has an opinion on a set of abstract facts, that is, a pair of two disjoint subsets of agreed and disagreed facts. A semantics is a function which assigns to each abstract debate a set of possible output opinions, based only on the interactions of the individual opinions. We consider argumentative semantics providing a novel qualitative approach to social reasoning. Two other interesting semantics are discussed.
我们介绍和研究抽象辩论,试图将Dung的论证框架纳入社会推理的一般模型。非正式地,在一个共享的理由空间上,一个社会表达了一组可能共享的主体性形式,其更深层次的相互作用使新的一致的集体判断成为可能,创造了社会推理关系。形式上,在一场抽象辩论中,社会的每个成员对一组抽象事实都有自己的看法,也就是说,对两个不相交的子集,即同意和不同意的事实。语义是一个函数,它为每个抽象辩论分配一组可能的输出意见,仅基于个人意见的相互作用。我们认为论证语义学为社会推理提供了一种新的定性方法。本文还讨论了另外两个有趣的语义。
{"title":"Abstract Debates","authors":"Cosmina Croitoru","doi":"10.1109/ICTAI.2013.110","DOIUrl":"https://doi.org/10.1109/ICTAI.2013.110","url":null,"abstract":"We introduce and study Abstract Debates, in an attempt to incorporate Dung's argumentation frameworks in a general model of social reasoning. Informally, on a shared reasons space, a society expresses a set of possibly shared forms of subjectivity, whose deeper interactions enable new consistent collective judgments, creating social inference relations. Formally, in an abstract debate each member of a society has an opinion on a set of abstract facts, that is, a pair of two disjoint subsets of agreed and disagreed facts. A semantics is a function which assigns to each abstract debate a set of possible output opinions, based only on the interactions of the individual opinions. We consider argumentative semantics providing a novel qualitative approach to social reasoning. Two other interesting semantics are discussed.","PeriodicalId":140309,"journal":{"name":"2013 IEEE 25th International Conference on Tools with Artificial Intelligence","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125066895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2013 IEEE 25th International Conference on Tools with Artificial Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1