University of Huddersfield
A Practical Approach to Discretised PDDL+ Problems by Translation to Numeric Planning
Percassi, Francesco (University of Huddersfield) | Scala, Enrico (University of Brescia) | Vallati, Mauro (a:1:{s:5:"en_US";s:26:"University of Huddersfield";})
PDDL+ models are advanced models of hybrid systems and the resulting problems are notoriously difficult for planning engines to cope with. An additional limiting factor for the exploitation of PDDL+ approaches in real-world applications is the restricted number of domain-independent planning engines that can reason upon those models. With the aim of deepening the understanding of PDDL+ models, in this work, we study a novel mapping between a time discretisation of pddl+ and numeric planning as for PDDL2.1 (level 2). The proposed mapping not only clarifies the relationship between these two formalisms but also enables the use of a wider pool of engines, thus fostering the use of hybrid planning in real-world applications. Our experimental analysis shows the usefulness of the proposed translation and demonstrates the potential of the approach for improving the solvability of complex PDDL+ instances.
Planning with Critical Section Macros: Theory and Practice
Chrpa, Lukas | Vallati, Mauro (University of Huddersfield)
Macro-operators (macros) are a well-known technique for enhancing performance of planning engines by providing "short-cuts" in the state space. Existing macro learning systems usually generate macros by considering most frequent action sequences in training plans. Unfortunately, frequent action sequences might not capture meaningful activities as a whole, leading to a limited beneficial impact for the planning process. In this paper, inspired by resource locking in critical sections in parallel computing, we propose a technique that generates macros able to capture whole activities in which limited resources (e.g., a robotic hand, or a truck) are used. Specifically, such a Critical Section macro starts by locking the resource (e.g., grabbing an object), continues by using the resource (e.g., manipulating the object) and finishes by releasing the resource (e.g., dropping the object). Hence, such a macro bridges states in which the resource is locked and cannot be used. We also introduce versions of Critical Section macros dealing with multiple resources and phased locks. Usefulness of macros is evaluated using a range of state-of-the-art planners, and a large number of benchmarks from the deterministic and learning tracks of recent editions of the International Planning Competition.
A General Approach for Configuring PDDL Problem Models
Vallati, Mauro (University of Huddersfield) | Serina, Ivan (University of Brescia)
The development of a large number of domain-independentplanners is leading to the use of planning engines in a widerange of applications. This is despite the complexity issues inherent in plan generation, which are exacerbated by the separation of planner logic from domain knowledge. However, this separation supports the use of reformulation and configuration techniques, which transform the model representation in order to improve the planner's performance. In this paper, we investigate how the performance of domain-independent planners can be improved by problem model configuration. We introduce a fully automated method for this configuration task, that considers problem-specific aspects extracted by exploiting a problem- and domain-independent representation of the instance. Our extensive experimental analysis shows that this reformulation technique can have a significant impact on planners' performance.
Meta-Search Through the Space of Representations and Heuristics on a Problem by Problem Basis
Fuentetaja, Raquel (Universidad Carlos III de Madrid) | Barley, Michael (University of Auckland) | Borrajo, Daniel (Universidad Carlos III de Madrid) | Douglas, Jordan (University of Auckland) | Franco, Santiago (University of Huddersfield) | Riddle, Patricia (University of Auckland)
Two key aspects of problem solving are representation and search heuristics. Both theoretical and experimental studies have shown that there is no one best problem representation nor one best search heuristic. Therefore, some recent methods, e.g., portfolios, learn a good combination of problem solvers to be used in a given domain or set of domains. There are even dynamic portfolios that select a particular combination of problem solvers specific to a problem. These approaches: (1) need to perform a learning step; (2) do not usually focus on changing the representation of the input domain/problem; and (3) frequently do not adapt the portfolio to the specific problem. This paper describes a meta-reasoning system that searches through the space of combinations of representations and heuristics to find one suitable for optimally solving the specific problem. We show that this approach can be better than selecting a combination to use for all problems within a domain and is competitive with state of the art optimal planners.
Externally Supported Models for Efficient Computation of Paracoherent Answer Sets
Amendola, Giovanni (University of Calabria) | Dodaro, Carmine (University of Genova) | Faber, Wolfgang (University of Huddersfield) | Ricca, Francesco (University of Calabria)
Answer Set Programming (ASP) is a well-established formalism for nonmonotonic reasoning.While incoherence, the non-existence of answer sets for some programs, is an important feature of ASP, it has frequently been criticised and indeed has some disadvantages, especially for query answering.Paracoherent semantics have been suggested as a remedy, which extend the classical notion of answer sets to draw meaningful conclusions also from incoherent programs. In this paper we present an alternative characterization of the two major paracoherent semantics in terms of (extended) externally supported models. This definition uses a transformation of ASP programs that is more parsimonious than the classic epistemic transformation used in recent implementations.A performance comparison carried out on benchmarks from ASP competitions shows that the usage of the new transformation brings about performance improvements that are independent of the underlying algorithms.
Multiple Representations in Cognitive Architectures
Peebles, David (University of Huddersfield) | Cheng, Peter C.-H. (University of Sussex)
The widely demonstrated ability of humans to deal with multiple representations of information has a number of important implications for a proposed standard model of the mind (SMM). In this paper we outline four and argue that a SMM must incorporate (a) multiple representational formats and (b) meta-cognitive processes that operate on them. We then describe current approaches to extend cognitive architectures with visual-spatial representations, in part to illustrate the limitations of current architectures in relation to the implications we raise but also to identify the basis upon which a consensus about the nature of these additional representations can be agreed. We believe that addressing these implications and outlining a specification for multiple representations should be a key goal for those seeking to develop a standard model of the mind.
Embedding Automated Planning within Urban Traffic Management Operations
McCluskey, Thomas Leo (University of Huddersfield) | Vallati, Mauro (University of Huddersfield)
This paper is an experience report on the results of an industry-led collaborative project aimed at automating the control of traffic flow within a large city centre. A major focus of the automation was to deal with abnormal or unexpected events such as roadworks, road closures or excessive demand, resulting in periods of saturation of the network within some region of the city. We describe the resulting system which works by sourcing and semantically enriching urban traffic data, and uses the derived knowledge as input to an automated planning component to generate light signal control strategies in real time. This paper reports on the development surrounding the planning component, and in particular the engineering, configuration and validation issues that arose in the application. It discusses a range of lessons learned from the experience of deploying automated planning in the road transport area, under the direction of transport operators and technology developers.
The Fifth International Competition on Knowledge Engineering for Planning and Scheduling: Summary and Trends
Chrpa, Lukás (University of Huddersfield) | McCluskey, Thomas L. (University of Huddersfield) | Vallati, Mauro (University of Huddersfield) | Vaquero, Tiago (Massachusetts Institute of Technology)
We review the 2016 International Competition on Knowledge Engineering for Planning and Scheduling (ICKEPS), the fifth in a series of competitions started in 2005. ICKEPS series focuses on promoting the importance of knowledge engineering methods and tools for automated Planning and Scheduling systems.
The Fifth International Competition on Knowledge Engineering for Planning and Scheduling: Summary and Trends
Chrpa, Lukás (University of Huddersfield) | McCluskey, Thomas L. (University of Huddersfield) | Vallati, Mauro (University of Huddersfield) | Vaquero, Tiago (Massachusetts Institute of Technology)
We review the 2016 International Competition on Knowledge Engineering for Planning and Scheduling (ICKEPS), the fifth in a series of competitions started in 2005. ICKEPS series focuses on promoting the importance of knowledge engineering methods and tools for automated Planning and Scheduling systems.
Towards A Multi-Tiered Knowledge-Based System for Autonomous Cloud Security Auditing
Khan, Saad Ullah (University of Huddersfield) | Parkinson, Simon (University of Huddersfield)
Every cloud platform has a large number of software components, making it difficult to manage the security of the entire system. This paper discusses the requirement for an intelligent cloud security auditing solution, and an expert system architecture is presented. The solution can identify data confidentiality threats in the OpenStack cloud platform, as well as propose solutions to remove vulnerabilities before an attack occurs. Data confidentiality threats cover a wide range of security risks where attackers usually try to steal/corrupt personal data and are a major concern of users. For this reason, cloud infrastructures need frequent security auditing. The key features of the proposed expert system architecture include: acquisition of information detailing the latest cloud security threats and solutions, the conversion of acquired raw data into usable format, the application of a forward chaining inference algorithm, and the ability for the user to add/modify knowledge, which is then utilised to provide feasible solutions in ranked order. These components provide an automated mechanism to generate human-readable audit reports, improving the overall security status without the need for expert knowledge.