Country
Report on the First International Conference on Knowledge Capture (K-CAP)
Gil, Yolanda, Musen, Mark, Shavlik, Jude
Henry Lieberman surveyed successful techniques for programming by example, an approach where end users teach procedures to computers by demonstrating a sequence of actions on concrete examples as they how to accomplish it. This new conference series domain-independent inference practical exercises and illustrated promotes multidisciplinary research structures and reusable domain-specific the concepts with applications, including on tools and methodologies for efficiently ontologies. A related workshop of its knowledge content for communities. He received his Ph.D. in 1. portal.acm.org. For any inquiries, please email info@kcap.org.
In Memory of Ray Reiter (1939-2002)
Pirri, Fiora, Hinton, Geoffrey, Levesque, Hector
He leaves a legacy of groundbreaking, deep insights that have changed the course of AI. "Only one same reason is shared by all of us: we wish to create worlds as real as, but other than the world that is." The quotation captures what was special about Ray: He had an adventurer's desire to go beyond the boundaries of our current understanding, together with a mathematician's insistence on precision. Ray the adventurer was always eager to try new ideas and directions. He was not afraid to enter murky areas, and he always left them better illuminated. He introduced terms to the AI community such as default logic, closed-world assumption, and cognitive robotics; he opened avenues of theoretical research with new resolution proof methods and logics for nonmonotonic reasoning, diagnosis, and action; and he was the prime mover in the Cognitive Robotics initiative that has led to a whole new program of research.
AAAI 2002 Workshops
Blake, Brian, Haigh, Karen, Hexmoor, Henry, Falcone, Rino, Soh, Leen-Kiat, Baral, Chitta, McIlraith, Sheila, Gmytrasiewicz, Piotr, Parsons, Simon, Malaka, Rainer, Krueger, Antonio, Bouquet, Paolo, Smart, Bill, Kurumantani, Koichi, Pease, Adam, Brenner, Michael, desJardins, Marie, Junker, Ulrich, Delgrande, Jim, Doyle, Jon, Rossi, Francesca, Schaub, Torsten, Gomes, Carla, Walsh, Toby, Guo, Haipeng, Horvitz, Eric J., Ide, Nancy, Welty, Chris, Anger, Frank D., Guegen, Hans W., Ligozat, Gerald
The Association for the Advancement of Artificial Intelligence (AAAI) presented the AAAI-02 Workshop Program on Sunday and Monday, 28-29 July 2002 at the Shaw Convention Center in Edmonton, Alberta, Canada. The AAAI-02 workshop program included 18 workshops covering a wide range of topics in AI. The workshops were Agent-Based Technologies for B2B Electronic-Commerce; Automation as a Caregiver: The Role of Intelligent Technology in Elder Care; Autonomy, Delegation, and Control: From Interagent to Groups; Coalition Formation in Dynamic Multiagent Environments; Cognitive Robotics; Game-Theoretic and Decision-Theoretic Agents; Intelligent Service Integration; Intelligent Situation-Aware Media and Presentations; Meaning Negotiation; Multiagent Modeling and Simulation of Economic Systems; Ontologies and the Semantic Web; Planning with and for Multiagent Systems; Preferences in AI and CP: Symbolic Approaches; Probabilistic Approaches in Search; Real-Time Decision Support and Diagnosis Systems; Semantic Web Meets Language Resources; and Spatial and Temporal Reasoning.
Computational Vulnerability Analysis for Information Survivability
The infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers," have already led to severe disruption. However, a concerted and planned attack whose goal is to reap harm could lead to catastrophic results (for example, by disabling the computers that control the electrical power grid for a sustained period of time). The survivability of such information systems in the face of attacks is therefore an area of extreme importance to society. This article is set in the context of self-adaptive survivable systems: software that judges the trustworthiness of the computational resources in its environment and that chooses how to achieve its goals in light of this trust model. Each self-adaptive survivable system detects and diagnoses compromises of its resources, taking whatever actions are necessary to recover from attack. In addition, a long-term monitoring system collects evidence from intrusion detectors, firewalls, and all the selfadaptive components, building a composite trust model used by each component. Self-adaptive survivable systems contain models of their intended behavior; models of the required computational resources; models of the ways in which these resources can be compromised; and finally, models of the ways in which a system can be attacked and how such attacks can lead to compromises of the computational resources. In this article, I focus on computational vulnerability analysis: a system that, given a description of a computational environment, deduces all the attacks that are possible. In particular, its goal is to develop multistage attack models in which the compromise of one resource is used to facilitate the compromise of other, more valuable resources. Although the ultimate aim is to use these models online as part of a self-adaptive system, there are other offline uses as well that we are deploying first to help system administrators assess the vulnerabilities of their computing environment.
FLAIRS 2002 Conference Report
Sooriamurthi, Raja, Reichherzer, Thomas
The Fifteenth Annual International Conference of the Florida Artificial Intelligence Research Society (FLAIRS) was held in Pensacola Beach, Florida, 14 to 16 May 2002. Spanning a broad spectrum of AI research, the conference was composed of a general track and 14 themed special tracks. Conference highlights included invited talks by James Allen, Randall Beer, Jeff Bradshaw, Bill Clancey, Clark Glymour, and Pat Hayes. Two parallel workshops on causality and categorization and studies of expert knowledge and skill followed the conference.
MiTAP for Biosecurity: A Case Study
Damianos, Laurie, Ponte, Jay, Wohlever, Steve, Reeder, Florence, Day, David, Wilson, George, Hirschman, Lynette
MITAP (MITRE text and audio processing) is a prototype system available for monitoring infectious disease outbreaks and other global events. MITAP focuses on providing timely, multilingual, global information access to medical experts and individuals involved in humanitarian assistance and relief work. Multiple information sources in multiple languages are automatically captured, filtered, translated, summarized, and categorized by disease, region, information source, person, and organization. Critical information is automatically extracted and tagged to facilitate browsing, searching, and sorting. The system supports shared situational awareness through collaboration, allowing users to submit other articles for processing, annotate existing documents, post directly to the system, and flag messages for others to see. MITAP currently stores over 1 million articles and processes an additional 2,000 to 10,000 daily, delivering up-to-date information to dozens of regular users.
Training and Using Disciple Agents: A Case Study in the Military Center of Gravity Analysis Domain
Tecuci, Gheorghe, Boicu, Mihai, Marcu, Dorin, Stanescu, Bogdan, Boicu, Cristina, Comello, Jerome
Originally introduced them together in a synergistic manner has resulted by Clausewitz in his classical work On in faster progress for each of them. War (1976), the center of gravity is now understood Moreover, it offers a new perspective on how to as representing "those characteristics, capabilities, combine research in AI with research in a specialized or localities from which a military domain and with the development force derives its freedom of action, physical and deployment of prototype systems in education strength, or will to fight" (Joint Chiefs of Staff and practice.
The 2002 AAAI Spring Symposium Series
Karlgren, Jussi, Kanerva, Pentti, Gamback, Bjorn, Forbus, Kenneth D., Tumer, Kagan, Stone, Peter, Goebel, Kai, Sukhatme, Gaurav S., Balch, Tucker, Fischer, Bernd, Smith, Doug, Harabagiu, Sanda, Chaudri, Vinay, Barley, Mike, Guesgen, Hans, Stahovich, Thomas, Davis, Randall, Landay, James
The Association for the Advancement of Artificial Intelligence, in cooperation with Stanford University's Department of Computer Science, presented the 2002 Spring Symposium Series, held Monday through Wednesday, 25 to 27 March 2002, at Stanford University. The nine symposia were entitled (1) Acquiring (and Using) Linguistic (and World) Knowledge for Information Access; (2) Artificial Intelligence and Interactive Entertainment; (3) Collaborative Learning Agents; (4) Information Refinement and Revision for Decision Making: Modeling for Diagnostics, Prognostics, and Prediction; (5) Intelligent Distributed and Embedded Systems; (6) Logic-Based Program Synthesis: State of the Art and Future Trends; (7) Mining Answers from Texts and Knowledge Bases; (8) Safe Learning Agents; and (9) Sketch Understanding.