scispace - formally typeset
Search or ask a question

Showing papers in "arXiv: Artificial Intelligence in 2009"


Journal ArticleDOI
TL;DR: In this paper, a comprehensive study of the use of value precedence constraints to break value symmetry is presented, and the interaction between value precedence and symmetry breaking constraints for variable symmetries is considered.
Abstract: We present a comprehensive study of the use of value precedence constraints to break value symmetry. We first give a simple encoding of value precedence into ternary constraints that is both efficient and effective at breaking symmetry. We then extend value precedence to deal with a number of generalizations like wreath value and partial interchangeability. We also show that value precedence is closely related to lexicographical ordering. Finally, we consider the interaction between value precedence and symmetry breaking constraints for variable symmetries.

170 citations


Posted Content
TL;DR: This paper provides the first computationally feasible approximation to the AIXI agent, and introduces a new Monte-Carlo Tree Search algorithm along with an agent-specific extension to the Context Tree Weighting algorithm.
Abstract: This paper introduces a principled approach for the design of a scalable general reinforcement learning agent. Our approach is based on a direct approximation of AIXI, a Bayesian optimality notion for general reinforcement learning agents. Previously, it has been unclear whether the theory of AIXI could motivate the design of practical algorithms. We answer this hitherto open question in the affirmative, by providing the first computationally feasible approximation to the AIXI agent. To develop our approximation, we introduce a new Monte-Carlo Tree Search algorithm along with an agent-specific extension to the Context Tree Weighting algorithm. Empirically, we present a set of encouraging results on a variety of stochastic and partially observable domains. We conclude by proposing a number of directions for future research.

133 citations


Posted Content
TL;DR: This paper provides exponential tail bounds for feature hashing and shows that the interaction between random subspaces is negligible with high probability, and demonstrates the feasibility of this approach with experimental results for a new use case --- multitask learning.
Abstract: Empirical evidence suggests that hashing is an effective strategy for dimensionality reduction and practical nonparametric estimation. In this paper we provide exponential tail bounds for feature hashing and show that the interaction between random subspaces is negligible with high probability. We demonstrate the feasibility of this approach with experimental results for a new use case -- multitask learning with hundreds of thousands of tasks.

125 citations


Posted Content
TL;DR: This paper generalizes the belief propagation algorithms of sum and max-product algorithms and introduces a new set of convergent algorithms based on “convex-free-energy” and linear-programming (LP) relaxation as a zero-temperature of a convex- free-energy.
Abstract: In this paper we treat both forms of probabilistic inference, estimating marginal probabilities of the joint distribution and finding the most probable assignment, through a unified message-passing algorithm architecture. We generalize the Belief Propagation (BP) algorithms of sum-product and max-product and tree-rewaighted (TRW) sum and max product algorithms (TRBP) and introduce a new set of convergent algorithms based on "convex-free-energy" and Linear-Programming (LP) relaxation as a zero-temprature of a convex-free-energy. The main idea of this work arises from taking a general perspective on the existing BP and TRBP algorithms while observing that they all are reductions from the basic optimization formula of $f + \sum_i h_i$ where the function $f$ is an extended-valued, strictly convex but non-smooth and the functions $h_i$ are extended-valued functions (not necessarily convex). We use tools from convex duality to present the "primal-dual ascent" algorithm which is an extension of the Bregman successive projection scheme and is designed to handle optimization of the general type $f + \sum_i h_i$. Mapping the fractional-free-energy variational principle to this framework introduces the "norm-product" message-passing. Special cases include sum-product and max-product (BP algorithms) and the TRBP algorithms. When the fractional-free-energy is set to be convex (convex-free-energy) the norm-product is globally convergent for estimating of marginal probabilities and for approximating the LP-relaxation. We also introduce another branch of the norm-product, the "convex-max-product". The convex-max-product is convergent (unlike max-product) and aims at solving the LP-relaxation.

113 citations


Posted Content
TL;DR: The Dendritic Cell algorithm (DCA) as discussed by the authors is inspired by recent work in innate immunity, and its use as an anomaly detector is illustrated within the context of computer security.
Abstract: The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer security. A port scan detection task is performed to substantiate the influence of signal selection on the behaviour of the algorithm. Experimental results provide a comparison of differing input signal mappings.

101 citations


Posted Content
TL;DR: A logical language for representing probabilistic causal laws, which proves that the formal semantics of a theory in this language can be equivalently defined as a probability distribution over the well-founded models of certain logic programs, rendering it formally quite similar to existing languages such as ICL or PRISM.
Abstract: This papers develops a logical language for representing probabilistic causal laws. Our interest in such a language is twofold. First, it can be motivated as a fundamental study of the representation of causal knowledge. Causality has an inherent dynamic aspect, which has been studied at the semantical level by Shafer in his framework of probability trees. In such a dynamic context, where the evolution of a domain over time is considered, the idea of a causal law as something which guides this evolution is quite natural. In our formalization, a set of probabilistic causal laws can be used to represent a class of probability trees in a concise, flexible and modular way. In this way, our work extends Shafer's by offering a convenient logical representation for his semantical objects. Second, this language also has relevance for the area of probabilistic logic programming. In particular, we prove that the formal semantics of a theory in our language can be equivalently defined as a probability distribution over the well-founded models of certain logic programs, rendering it formally quite similar to existing languages such as ICL or PRISM. Because we can motivate and explain our language in a completely self-contained way as a representation of probabilistic causal laws, this provides a new way of explaining the intuitions behind such probabilistic logic programs: we can say precisely which knowledge such a program expresses, in terms that are equally understandable by a non-logician. Moreover, we also obtain an additional piece of knowledge representation methodology for probabilistic logic programs, by showing how they can express probabilistic causal laws.

96 citations


Posted Content
TL;DR: A totally semantic measure is presented which is able to calculate a similarity value between concept descriptions and also between concept description and individual or between individuals expressed in an expressive description logic.
Abstract: A totally semantic measure is presented which is able to calculate a similarity value between concept descriptions and also between concept description and individual or between individuals expressed in an expressive description logic. It is applicable on symbolic descriptions although it uses a numeric approach for the calculus. Considering that Description Logics stand as the theoretic framework for the ontological knowledge representation and reasoning, the proposed measure can be effectively used for agglomerative and divisional clustering task applied to the semantic web domain.

85 citations


Posted Content
TL;DR: In this paper, the authors propose leveraging semantic web technologies to merge and exploit the best features of each domain in order to facilitate and enhance the analysis of online social networks, exploiting the power of semantic social network analysis.
Abstract: Social Network Analysis (SNA) tries to understand and exploit the key features of social networks in order to manage their life cycle and predict their evolution. Increasingly popular web 2.0 sites are forming huge social network. Classical methods from social network analysis (SNA) have been applied to such online networks. In this paper, we propose leveraging semantic web technologies to merge and exploit the best features of each domain. We present how to facilitate and enhance the analysis of online social networks, exploiting the power of semantic social network analysis.

76 citations


Posted Content
TL;DR: Any instance of the problems CSP (Constraint Satisfaction Problem), QCSP, QCSP and WCSP can be represented using this format, which allows us to reference global constraints.
Abstract: We propose a new extended format to represent constraint networks using XML. This format allows us to represent constraints defined either in extension or in intension. It also allows us to reference global constraints. Any instance of the problems CSP (Constraint Satisfaction Problem), QCSP (Quantified CSP) and WCSP (Weighted CSP) can be represented using this format.

73 citations


Posted Content
TL;DR: In this article, the authors used an ad-hoc time series preprocessing and a Multi-Layer Perceptron (MLP) to predict solar radiation at daily horizon with nRMSE < 21% and RMSE < 998 Wh/m2.
Abstract: In this paper, we present an application of neural networks in the renewable energy domain. We have developed a methodology for the daily prediction of global solar radiation on a horizontal surface. We use an ad-hoc time series preprocessing and a Multi-Layer Perceptron (MLP) in order to predict solar radiation at daily horizon. First results are promising with nRMSE < 21% and RMSE < 998 Wh/m2. Our optimized MLP presents prediction similar to or even better than conventional methods such as ARIMA techniques, Bayesian inference, Markov chains and k-Nearest-Neighbors approximators. Moreover we found that our data preprocessing approach can reduce significantly forecasting errors.

53 citations


Journal Article
TL;DR: Developed Fuzzy Decision Support System (FDSS) provides better performance compared to multi layer perceptron ANN, k-NN, rule induction method called C4.5 and Repeated Incremental Pruning to Produce Error Reduction applied on UCI CAD data sets and Ipoh Specialist Hospital’s patients.
Abstract: Heart disease is any disease that affects the normal condition and functionality of heart. Coronary Artery Disease (CAD) is the most common. It is caused by the accumulation of plaques within the walls of the coronary arteries that supply blood to the heart muscles. It may lead to continued temporary oxygen deprivation that will result in the damage of heart muscles. CAD caused more than 7,000,000 deaths every year in the worldwide. It is the second cause of death in Malaysia and the major cause of death in the world. To diagnose CAD, cardiologists usually perform many diagnostic steps. Unfortunately, the results of the diagnostic tests are difficult to interpret which do not always provide definite answer, but may lead to different opinion. To help cardiologists providing correct diagnosis of CAD in less expensive and non-invasive manner, many researchers had developed decision support system to diagnose CAD. A fuzzy decision support system for the diagnosis of coronary artery disease based on rough set theory is proposed in this thesis. The objective is to develop an evidence based fuzzy decision support system for the diagnosis of coronary artery disease. This proposed system is based on evidences or raw medical data sets, which are taken from University California Irvine (UCI) database. The proposed system is designed to be able to handle the uncertainty, incompleteness and heterogeneity of data sets. Artificial Neural Network with Rough Set Theory attribute reduction (ANNRST) is proposed is the imputation method to solve the incompleteness of data sets. Evaluations of ANNRST based on classifiers performance and rule filtering are proposed by comparing ANNRST and other methods using classifiers and during rule filtering process. RST rule induction is applied to ANNRST imputed data sets. Numerical values are discretized using Boolean reasoning method. Rule selection based on quality and importance is proposed. RST rule importance measure is used to select the most important high quality rules. The selected rules are used to build fuzzy decision support systems. Fuzzification based on discretization cuts and fuzzy rule weighing based on rule quality are proposed. Mamdani inference method is used to provide the decision with centroid defuzzification to give numerical results, which represent the possibility of blocking in coronary arteries. The results show that proposed ANNRST has similar performance to ANN and outperforms k-Nearest Neighbour (k-NN) and Concept Most Common attribute value Filling (CMCF). ANNRST is simpler than ANN because it has fewer input attributes and more suitable to be applied for missing data imputation problem. ANNRST also provides strong relationship between original and imputed data sets. It is shown that ANNRST provide better RST rule based classifier than CMCF and k-NN during rule filtering process. Proposed RST based rule selection also performs better than other filtering methods. Developed Fuzzy Decision Support System (FDSS) provides better performance compared to multi layer perceptron ANN, k-NN, rule induction method called C4.5 and Repeated Incremental Pruning to Produce Error Reduction (RIPPER) applied on UCI CAD data sets and Ipoh Specialist Hospital’s patients. FDSS has transparent knowledge representation, heterogeneous and incomplete input data handling capability. FDSS is able to give the approximate percentage of blocking of coronary artery based on 13 standard attributes based on historical, simple blood test and ECG data, etc, where coronary angiography or cardiologist can not give the percentage. The results of FDSS were evaluated by three local cardiologists and considered to be efficient and useful.

Posted Content
TL;DR: This paper studies decompositions of global constraints into conjunctive normal form with the property that unit propagation on the decomposition enforces the same level of consistency as a specialized propagation algorithm.
Abstract: We show that tools from circuit complexity can be used to study decompositions of global constraints. In particular, we study decompositions of global constraints into conjunctive normal form with the property that unit propagation on the decomposition enforces the same level of consistency as a specialized propagation algorithm. We prove that a constraint propagator has a a polynomial size decomposition if and only if it can be computed by a polynomial size monotone Boolean circuit. Lower bounds on the size of monotone Boolean circuits thus translate to lower bounds on the size of decompositions of global constraints. For instance, we prove that there is no polynomial sized decomposition of the domain consistency propagator for the ALLDIFFERENT constraint.

Posted Content
TL;DR: In this paper, the authors proposed Interactive Differential Evolution (IDE) based on paired comparisons for reducing user fatigue and evaluate its convergence speed in comparison with Interactive Genetic Algorithms (IGA) and tournament IGA.
Abstract: We propose Interactive Differential Evolution (IDE) based on paired comparisons for reducing user fatigue and evaluate its convergence speed in comparison with Interactive Genetic Algorithms (IGA) and tournament IGA. User interface and convergence performance are two big keys for reducing Interactive Evolutionary Computation (IEC) user fatigue. Unlike IGA and conventional IDE, users of the proposed IDE and tournament IGA do not need to compare whole individuals each other but compare pairs of individuals, which largely decreases user fatigue. In this paper, we design a pseudo-IEC user and evaluate another factor, IEC convergence performance, using IEC simulators and show that our proposed IDE converges significantly faster than IGA and tournament IGA, i.e. our proposed one is superior to others from both user interface and convergence performance points of view.

Posted Content
TL;DR: In this paper, a system for recognizing human activity given a symbolic representation of video content is presented, where the input of the system is a set of time-stamped short-term activities detected on video frames.
Abstract: We have been developing a system for recognising human activity given a symbolic representation of video content. The input of our system is a set of time-stamped short-term activities detected on video frames. The output of our system is a set of recognised long-term activities, which are pre-defined temporal combinations of short-term activities. The constraints on the short-term activities that, if satisfied, lead to the recognition of a long-term activity, are expressed using a dialect of the Event Calculus. We illustrate the expressiveness of the dialect by showing the representation of several typical complex activities. Furthermore, we present a detailed evaluation of the system through experimentation on a benchmark dataset of surveillance videos.

Posted Content
TL;DR: This work presents a method which uses machine learning to boost solver performance through a smart selection of the restart strategy, based on easy to compute features and both a satisfiability classifier and runtime models.
Abstract: Restart strategies are an important factor in the performance of conflict-driven Davis Putnam style SAT solvers. Selecting a good restart strategy for a problem instance can enhance the performance of a solver. Inspired by recent success applying machine learning techniques to predict the runtime of SAT solvers, we present a method which uses machine learning to boost solver performance through a smart selection of the restart strategy. Based on easy to compute features, we train both a satisfiability classifier and runtime models. We use these models to choose between restart strategies. We present experimental results comparing this technique with the most commonly used restart strategies. Our results demonstrate that machine learning is effective in improving solver performance.

Posted Content
TL;DR: In this paper, the authors propose new filtering algorithms for the SEQUENCE constraint and some extensions of the SEQ constraint based on network flows, which enforce domain consistency on the SEIQ constraint in O(n 2 ) time down a branch of the search tree.
Abstract: We propose new filtering algorithms for the SEQUENCE constraint and some extensions of the SEQUENCE constraint based on network flows. We enforce domain consistency on the SEQUENCE constraint in $O(n^2)$ time down a branch of the search tree. This improves upon the best existing domain consistency algorithm by a factor of $O(\log n)$. The flows used in these algorithms are derived from a linear program. Some of them differ from the flows used to propagate global constraints like GCC since the domains of the variables are encoded as costs on the edges rather than capacities. Such flows are efficient for maintaining bounds consistency over large domains and may be useful for other global constraints.

Posted Content
TL;DR: This work characterises a number of important questions related to constraint propagation, and identifies dependencies between the tractability and intractability of the different questions, and illustrates how computational complexity can be used to determine when a lesser level of local consistency should be enforced.
Abstract: Constraint propagation is one of the techniques central to the success of constraint programming. To reduce search, fast algorithms associated with each constraint prune the domains of variables. With global (or non-binary) constraints, the cost of such propagation may be much greater than the quadratic cost for binary constraints. We therefore study the computational complexity of reasoning with global constraints. We first characterise a number of important questions related to constraint propagation. We show that such questions are intractable in general, and identify dependencies between the tractability and intractability of the different questions. We then demonstrate how the tools of computational complexity can be used in the design and analysis of specific global constraints. In particular, we illustrate how computational complexity can be used to determine when a lesser level of local consistency should be enforced, when constraints can be safely generalized, when decomposing constraints will reduce the amount of pruning, and when combining constraints is tractable.

Posted Content
TL;DR: Fuzzy Petri nets for computing with words (FPNCWs) have been proposed in this article, where the labels of transitions are some special words modeled by fuzzy sets, and a faithful extension of an FPNCW which makes it possible to compute with more words.
Abstract: Motivated by Zadeh's paradigm of computing with words rather than numbers, several formal models of computing with words have recently been proposed. These models are based on automata and thus are not well-suited for concurrent computing. In this paper, we incorporate the well-known model of concurrent computing, Petri nets, together with fuzzy set theory and thereby establish a concurrency model of computing with words--fuzzy Petri nets for computing with words (FPNCWs). The new feature of such fuzzy Petri nets is that the labels of transitions are some special words modeled by fuzzy sets. By employing the methodology of fuzzy reasoning, we give a faithful extension of an FPNCW which makes it possible for computing with more words. The language expressiveness of the two formal models of computing with words, fuzzy automata for computing with words and FPNCWs, is compared as well. A few small examples are provided to illustrate the theoretical development.

Posted Content
TL;DR: In this paper, the authors show that common and important global constraints like ALL-DIFFERENT and GCC can be decomposed into simple arithmetic constraints on which we achieve bound or range consistency, and in some cases even greater pruning.
Abstract: We show that some common and important global constraints like ALL-DIFFERENT and GCC can be decomposed into simple arithmetic constraints on which we achieve bound or range consistency, and in some cases even greater pruning. These decompositions can be easily added to new solvers. They also provide other constraints with access to the state of the propagator by sharing of variables. Such sharing can be used to improve propagation between constraints. We report experiments with our decomposition in a pseudo-Boolean solver.

Posted Content
Toby Walsh1
TL;DR: It is argued that manipulation of the veto rule is asymptotically easy for many independent and identically distributed votes even when the coalition of manipulators is critical in size, and it is shown that a rescaled probability curve displays a simple and universal form independent of the size of the problem.
Abstract: Voting is a simple mechanism to aggregate the preferences of agents. Many voting rules have been shown to be NP-hard to manipulate. However, a number of recent theoretical results suggest that this complexity may only be in the worst-case since manipulation is often easy in practice. In this paper, we show that empirical studies are useful in improving our understanding of this issue. We demonstrate that there is a smooth transition in the probability that a coalition can elect a desired candidate using the veto rule as the size of the manipulating coalition increases. We show that a rescaled probability curve displays a simple and universal form independent of the size of the problem. We argue that manipulation of the veto rule is asymptotically easy for many independent and identically distributed votes even when the coalition of manipulators is critical in size. Based on this argument, we identify a situation in which manipulation is computationally hard. This is when votes are highly correlated and the election is "hung". We show, however, that even a single uncorrelated voter is enough to make manipulation easy again.

Posted Content
TL;DR: A novel approach for learning nonlinear dynamic models leads to a new set of tools capable of solving problems that are otherwise difficult, and is applied to motion capture and high-dimensional video data, yielding results superior to standard alternatives.
Abstract: We present a novel approach for learning nonlinear dynamic models, which leads to a new set of tools capable of solving problems that are otherwise difficult. We provide theory showing this new approach is consistent for models with long range structure, and apply the approach to motion capture and high-dimensional video data, yielding results superior to standard alternatives.

Posted Content
TL;DR: In this article, it was shown that a larger class of programs, called finitely recursive programs, preserves most of the good properties of finitary programs under the stable model semantics.
Abstract: Disjunctive finitary programs are a class of logic programs admitting function symbols and hence infinite domains. They have very good computational properties, for example ground queries are decidable while in the general case the stable model semantics is highly undecidable. In this paper we prove that a larger class of programs, called finitely recursive programs, preserves most of the good properties of finitary programs under the stable model semantics, namely: (i) finitely recursive programs enjoy a compactness property; (ii) inconsistency checking and skeptical reasoning are semidecidable; (iii) skeptical resolution is complete for normal finitely recursive programs. Moreover, we show how to check inconsistency and answer skeptical queries using finite subsets of the ground program instantiation. We achieve this by extending the splitting sequence theorem by Lifschitz and Turner: We prove that if the input program P is finitely recursive, then the partial stable models determined by any smooth splitting omega-sequence converge to a stable model of P.

Posted Content
TL;DR: In this article, the authors proposed a logic that extends the General Awareness of Fagin and Halpern by allowing quantification over primitive propositions, which makes it possible to express the fact that an agent knows that there are some facts of which he is unaware.
Abstract: In earlier work, we proposed a logic that extends the Logic of General Awareness of Fagin and Halpern [1988] by allowing quantification over primitive propositions. This makes it possible to express the fact that an agent knows that there are some facts of which he is unaware. In that logic, it is not possible to model an agent who is uncertain about whether he is aware of all formulas. To overcome this problem, we keep the syntax of the earlier paper, but allow models where, with each world, a possibly different language is associated. We provide a sound and complete axiomatization for this logic and show that, under natural assumptions, the quantifier-free fragment of the logic is characterized by exactly the same axioms as the logic of Heifetz, Meier, and Schipper [2008].

Posted Content
TL;DR: To explore the applicability of the method a numerical example is considered to determine the monthly production planning quotas and profit of a home-textile group.
Abstract: Many engineering optimization problems can be considered as linear programming problems where all or some of the parameters involved are linguistic in nature. These can only be quantified using fuzzy sets. The aim of this paper is to solve a fuzzy linear programming problem in which the parameters involved are fuzzy quantities with logistic membership functions. To explore the applicability of the method a numerical example is considered to determine the monthly production planning quotas and profit of a home-textile group.

Journal ArticleDOI
TL;DR: Improvements in the evolutionary squeaky wheel optimization is achieved by selective solution disruption mixed with iterative improvement and constructive repair.
Abstract: The quest for robust heuristics that are able to solve more than one problem is ongoing. In this paper, we present, discuss and analyse a technique called Evolutionary Squeaky Wheel Optimisation and apply it to two different personnel scheduling problems. Evolutionary Squeaky Wheel Optimisation improves the original Squeaky Wheel Optimisation's effectiveness and execution speed by incorporating two extra steps (Selection and Mutation) for added evolution. In the Evolutionary Squeaky Wheel Optimisation, a cycle of Analysis-Selection-Mutation-Prioritization-Construction continues until stopping conditions are reached. The aim of the Analysis step is to identify below average solution components by calculating a fitness value for all components. The Selection step then chooses amongst these underperformers and discards some probabilistically based on fitness. The Mutation step further discards a few components at random. Solutions can become incomplete and thus repairs may be required. The repairs are carried out by using the Prioritization to first produce priorities that determine an order by which the following Construction step then schedules the remaining components. Therefore, improvement in the Evolutionary Squeaky Wheel Optimisation is achieved by selective solution disruption mixed with interative improvement and constructive repair. Strong experimental results are reported on two different domains of personnel scheduling: bus and rail driver scheduling and hospital nurse scheduling.

Posted Content
TL;DR: To model combinatorial decision problems involving uncertainty and probability, the stochastic constraint programming framework proposed in [Walsh, 2002] is extended along a number of important dimensions and a new (but equivalent) semantics based on scenarios is provided.
Abstract: To model combinatorial decision problems involving uncertainty and probability, we extend the stochastic constraint programming framework proposed in [Walsh, 2002] along a number of important dimensions (e.g. to multiple chance constraints and to a range of new objectives). We also provide a new (but equivalent) semantics based on scenarios. Using this semantics, we can compile stochastic constraint programs down into conventional (nonstochastic) constraint programs. This allows us to exploit the full power of existing constraint solvers. We have implemented this framework for decision making under uncertainty in stochastic OPL, a language which is based on the OPL constraint modelling language [Hentenryck et al., 1999]. To illustrate the potential of this framework, we model a wide range of problems in areas as diverse as finance, agriculture and production.

Posted Content
Toby Walsh1
TL;DR: The complexity of determining when to terminate eliciting preferences is studied, and it is proved that the complexity depends on the elicitation strategy, and there are voting rules which are easy to manipulate, but computationally intractable if the authors can change only some of an agent's preferences.
Abstract: Complexity theory is a useful tool to study computational issues surrounding the elicitation of preferences, as well as the strategic manipulation of elections aggregating together preferences of multiple agents. We study here the complexity of determining when we can terminate eliciting preferences, and prove that the complexity depends on the elicitation strategy. We show, for instance, that it may be better from a computational perspective to elicit all preferences from one agent at a time than to elicit individual preferences from multiple agents. We also study the connection between the strategic manipulation of an election and preference elicitation. We show that what we can manipulate affects the computational complexity of manipulation. In particular, we prove that there are voting rules which are easy to manipulate if we can change all of an agent's vote, but computationally intractable if we can change only some of their preferences. This suggests that, as with preference elicitation, a fine-grained view of manipulation may be informative. Finally, we study the connection between predicting the winner of an election and preference elicitation. Based on this connection, we identify a voting rule where it is computationally difficult to decide the probability of a candidate winning given a probability distribution over the votes.

Posted Content
Maziar Nekovee1
TL;DR: In this paper, the authors examine the implications of cognitive radio for future management of spectrum and discuss both a near-term view involving the opportunistic spectrum access model and a longer-time view involving a self-regulating dynamic spectrum access within a society of cognitive radios.
Abstract: Cognitive radio is a breakthrough technology which is expected to have a profound impact on the way radio spectrum will be accessed, managed and shared in the future. In this paper I examine some of the implications of cognitive radio for future management of spectrum. Both a near-term view involving the opportunistic spectrum access model and a longer-term view involving a self-regulating dynamic spectrum access model within a society of cognitive radios are discussed.

Posted Content
TL;DR: The Dendritic Cell Algorithm as discussed by the authors is a bio-inspired algorithm that processes information at multiple levels of resolution, resulting in the creation of information granules of variable structure.
Abstract: Dendritic cells are the crime scene investigators of the human immune system. Their function is to correlate potentially anomalous invading entities with observed damage to the body. The detection of such invaders by dendritic cells results in the activation of the adaptive immune system, eventually leading to the removal of the invader from the host body. This mechanism has provided inspiration for the development of a novel bio-inspired algorithm, the Dendritic Cell Algorithm. This algorithm processes information at multiple levels of resolution, resulting in the creation of information granules of variable structure. In this chapter we examine the multi-faceted nature of immunology and how research in this field has shaped the function of the resulting Dendritic Cell Algorithm. A brief overview of the algorithm is given in combination with the details of the processes used for its development. The chapter is concluded with a discussion of the parallels between our understanding of the human immune system and how such knowledge influences the design of artificial immune systems.

Posted Content
TL;DR: This work addresses the problem of generating preferred plans by combining the procedural control knowledge specified by Hierarchical Task Networks with rich qualitative user preferences with a provably optimal preference-based planner, HTNPLAN, that is implemented as an extension of SHOP2.
Abstract: In this paper, we address the problem of generating preferred plans by combining the procedural control knowledge specified by Hierarchical Task Networks (HTNs) with rich qualitative user preferences. The outcome of our work is a language for specifying user preferences, tailored to HTN planning, together with a provably optimal preference-based planner, HTNPLAN, that is implemented as an extension of SHOP2. To compute preferred plans, we propose an approach based on forward-chaining heuristic search. Our heuristic uses an admissible evaluation function measuring the satisfaction of preferences over partial plans. Our empirical evaluation demonstrates the effectiveness of our HTNPLAN heuristics. We prove our approach sound and optimal with respect to the plans it generates by appealing to a situation calculus semantics of our preference language and of HTN planning. While our implementation builds on SHOP2, the language and techniques proposed here are relevant to a broad range of HTN planners.