DARPA SHAKEN Virus-Invades-Cell Invade VirusCell Attach Penetrate Release Move invader thing invaded barrier Cell-membrane has-part subevent penetrator.

Slides:



Advertisements
Similar presentations
DPM ARCHITECT FOR XBRL XBRL taxonomy editor aimed at BUSINESS USERS Based on the DPM approach and DPM XBRL Architecture Currently on its last stage of.
Advertisements

An Introduction to Using
Engineering Education in Saudi Arabia: Problems and Solutions
101.  Computers DO NOT think for themselves. For them to do anything they need to be told what to do.  Simply put computer programming is when you tell.
Project Proposal.
Part II What SHAKEN already knows. SHAKEN’s Components What SHAKEN already knows is organized in components We will look only at the components needed.
Measuring and reporting outcomes for your BTOP grant 1Measuring and Reporting Outcomes.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
Fundamentals of Information Systems, Second Edition
Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design Third Edition.
Concordia University Department of Computer Science and Software Engineering Click to edit Master title style ADVANCED PROGRAMING PRACTICES Introduction.
Computers Are Your Future © 2008Prentice-Hall, Inc.
Examine Quality Assurance/Quality Control Documentation
Knowledge Science & Engineering Institute, Beijing Normal University, Analyzing Transcripts of Online Asynchronous.
COMPREHENSIVE Excel Tutorial 8 Developing an Excel Application.
9/5/2015 Spring Introduction to Engineering 161 Engineering Practices II Joe Mixsell Phone:
LBTO IssueTrak User’s Manual Norm Cushing version 1.3 August 8th, 2007.
intelligence study and design of intelligent agentsis the intelligence of machines and the branch of computer science that aims to create it. AI textbooks.
1 Artificial Intelligence Applications Institute Centre for Intelligent Systems and their Applications Stuart Aitken Artificial Intelligence Applications.
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design.
Part I Overview and Introduction to SHAKEN. Simplified Version of how a Virus Invades a Cell “A virus invades a cell in the following way. First, the.
DAY 2 Part I: Review Part II: Task Part III: Feedback and Suggestions.
Knowledge representation
Engaged with you. SAM Getting Started with your Course in Desire2Learn Fact: 81% of students identify SAM as a key factor in preparing to use the Office.
Knowledge Entry as the Graphical Assembly of Components Peter Clark, John Thompson (Boeing) Ken Barker, Bruce Porter (Univ Texas at Austin) Vinay Chaudhri,
Welcome to the San Bernardino County Coach Quarterly Meeting.
Learn > Succeed WebEx University. 2 Online Self-Paced Training: Anytime, Anywhere! What is Self-Paced Training? WebEx Interactive Learning features a.
Copyright 2002 Prentice-Hall, Inc. 1.1 Modern Systems Analysis and Design Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 1 The Systems Development.
Proactive Acquisition Dialogues Jihie Kim Yolanda Gil
1 Introduction to Software Engineering Lecture 1.
Building a Knowledge Base by Telling a Story: An example A virus invades a cell in the following way. First, the virus attaches to the cell membrane. It.
Webinar 13: Implementation Barriers. Summary of Last Week’s Call Making the debriefing count: The McLeod Experience Tips on engaging your colleagues when.
Communicating Effectively with Outlook 2013 Gareth Johns IT Skills Development Advisor 1.
This material is approved for public release. Distribution is limited by the Software Engineering Institute to attendees. Sponsored by the U.S. Department.
Dialog Window Ask a question Enter knowledge Test knowledge Fix errors.
Knowledge Entry as the Graphical Assembly of Components Peter Clark, John Thompson (Boeing) Ken Barker, Bruce Porter (Univ Texas at Austin) Vinay Chaudhri,
Fundamentals of Information Systems, Third Edition1 The Knowledge Base Stores all relevant information, data, rules, cases, and relationships used by the.
This material is approved for public release. Distribution is limited by the Software Engineering Institute to attendees. Sponsored by the U.S. Department.
My Mission Statement To ensure students leave the course with an intermediate knowledge of general programming skills they can transfer to other platforms.
AR350: Maintaining Customers Welcome to AR350: Maintaining Customers.
Introduction Complex and large SW. SW crises Expensive HW. Custom SW. Batch execution Structured programming Product SW.
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
Of An Expert System.  Introduction  What is AI?  Intelligent in Human & Machine? What is Expert System? How are Expert System used? Elements of ES.
Today Discussion Follow-Up Interview Techniques Next time Interview Techniques: Examples Work Modeling CD Ch.s 5, 6, & 7 CS 321 Human-Computer Interaction.
1 ARTIFICIAL INTELLIGENCE Gilles BÉZARD Version 3.16.
Part III How to use SHAKEN. How to Use SHAKEN These slides walk you through each item in SHAKEN’s main menu We will show how each item works with a demo.
E-Learning: components of e-learning Mohammed Hassan 1.
Part 1 The Basics of Information Systems. Purpose of Information Systems Information systems ◦ Collects, stores and organizes information ◦ Retrieves.
Introduction to the course Aug 30, Day 1 Object-oriented Programming thru Video Games TIDE 1840 Harry Howard Tulane University.
CHAPTER ELEVEN MANAGING KNOWLEGE. Objectives We have been through some of this already Role of knowledge management Types of knowledge management systems.
1 April 14, Starting New Open Source Software Projects William Cohen NCSU CSC 591W April 14, 2008.
Advanced Programing practices
Excel Tutorial 8 Developing an Excel Application
Chapter 1 The Systems Development Environment
Development Environment
Chapter 1 The Systems Development Environment
CSC207 Fall 2016.
Organization and Knowledge Management
Chapter 1 The Systems Development Environment
Chapter 1 The Systems Development Environment
Chapter 1 The Systems Development Environment
Getting Started: SAM in Blackboard
An Introduction to Using
CIS 111 Education for Service-- tutorialrank.com
MBI 630: Systems Analysis and Design
Getting Started: SAM in Desire2Learn
Introduction to Research Facilitation
Advanced Programing practices
Chapter 1 The Systems Development Environment
Introduction to Research Facilitation
Presentation transcript:

DARPA SHAKEN Virus-Invades-Cell Invade VirusCell Attach Penetrate Release Move invader thing invaded barrier Cell-membrane has-part subevent penetrator Welcome, and Thank You! A virus invades a cell in the following way. First, the virus adheres to the cell membrane. It penetrates the membrane and enters the cell cytoplasm. Enzymes in the cytoplasm uncoat the virus, releasing the viral DNA, which then moves into the cell nucleus. Rapid Knowledge Formation

Rapid Knowledge Formation: Program Goals ( ) Central Challenges: Knowledge entry by experts Parallel distributed teams 10 6 Axioms/Year Domain experts 6 Months12 Months 10 K 100 K 1,000 K Knowledge Engineers Research Categories: Intuitive human-system interaction Automatic elaboration of entered knowledge Automated theory manipulation & refinement Prior content facilitates knowledge entry

High Performance Knowledge Bases ( ) Build intelligent systems through “brain surgery” –Knowledge engineers trained in the art of programming knowledge bases –Tools were more like programming environments Assumed you know formal logic Assumed you know how to find and fix “bugs” Assumed you speak obscure low-level code Small incursions with end users – Army officers at BCBL, Ft Leavenworth

Teaching Biological Processes to a Virtual Student Our 3-year goal is to build SHAKEN, a “virtual” student –Today you will use our first version of it! You need to teach SHAKEN about a new biological process it does not know about We want to see whether SHAKEN is a good student: we need your help! –This is the first of a series of tests with users

Our Plan Day 1 –Session 1: introduction and tutorial of SHAKEN –Session 2: tutorial and practice Day 2 –Session 1: teaching SHAKEN on your own –Session 2: feedback and suggestions

Our Goals Our goal is to understand the limitations of our technology with respect to domain experts –Establish a watermark for our techniques and tools –We want these tools to help domain experts like yourselves. Are we on the right track? This is not a test of your capabilities, knowledge, or ability to perform the tasks –It is our tools that we are putting to the test! –If you cannot accomplish a task, it simply means the tool we are using is not helping you as it should

What we will ask you to do We will give you a task, i.e., a bunch of statements in English that describe some new knowledge that you’ll need to add in the system We will ask you to use SHAKEN to enter that knowledge Today we need to train you on how to use SHAKEN

How you can help us best Today, make sure you understand how to use SHAKEN –Ask anything anytime anywhere –Try things out in SHAKEN Tomorrow, we will give you an English description of what you’ll need to teach –At any point, you can ask for clarification or help We will just give you a hint

Tell Us About Your Background College and/or graduate degrees Do you have a personal computer at home? How many hours per week do you typically use a computer? –at work –at home Please rate your knowledge on these topics (1) very poor (2) poor (3) moderate (4) good (5) excellent Microsoft Office object-oriented programming spreadsheets databases any programming language Artificial intelligence knowledge-based systems, rule-based systems ontologies knowledge acquisition

DAY 1 Part I: Introduction to SHAKEN Part II: What SHAKEN already knows Part III: How to use SHAKEN Part IV: Hands-on practice