Annual Conference of ITA ACITA 2009 Agent Support for Policy-driven Collaborative Planning in Ad-hoc Teams Martin J. Kollingbaum, Timothy J. Norman Computing.

Slides:



Advertisements
Similar presentations
How to manage your supervisor Tennie Videler Vitae Programme Manager: researchers.
Advertisements

Timothy J. Norman Challenges for Effective Open Virtual Organisations Timothy J. Norman Department of Computing Science University of Aberdeen
Annual Conference of ITA ACITA 2009 Realising Management and Composition of Self-Managed Cells in Body Area Networks Alberto Schaeffer-Filho, Emil Lupu,
Varieties of Understanding Annual Conference of ITA ACITA 2009 Towards an Understanding of Shared Understanding in Military Coalition Contexts Paul R.
Annual Conference of ITA ACITA 2009 Agent Assistance in Forming Swift Trust in Ad-Hoc Decision-Making Teams Chris Burnett Timothy J.
Annual Conference of ITA ACITA 2009 Chukwuemeka D. Emele, Timothy J. Norman, Frank GuerinSimon Parsons Computing Science Department, University of Aberdeen,
Annual Conference of ITA ACITA 2009 Knowledge-Driven Agile Sensor-Mission Assignment A. Preece*, D. Pizzocaro*, K. Borowiecki*, G. de Mel, W. Vasconcelos,
1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
Timothy E. Gowen NATO Ad Hoc Airworthiness Group
Regional Policy EUROPEAN COMMISSION 1 EGTC regulation EGTC regulation ESF and EGTC regulations Regulation of the European Parliament and of the Council.
ATHENA EU MILITARY OPERATIONS : PREPARATORYPHASE.
Health and Safety Executive Health and Safety Executive CDM 2007 Training Package Session 2 - Clients Version: September 07.
What is an intelligent product? Vaggelis Giannikas Duncan McFarlane Mark Harrison.
APEC Air Cargo Security Workshop Bangkok, Thailand June 2008.
Fawzy Al-Alami G Term Paper.  Introduction.  Effect of Teamwork in Design-Build. Construction Contract.  Factors Can Enhance Design-Build.
Routing in mobile ad hoc networks Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University
Intelligent Architectures for Electronic Commerce Part 1.5: Symbolic Reasoning Agents.
Congratulations, 80 years of Social Insurance Czech Republic After the Party, an ICT perspective, Prague, Martin Huizenga, the Netherlands,
Contractor Security Support For Government Facilities.
CIP Cyber Security – Security Management Controls
JSIMS 28-Jan-99 1 JOINT SIMULATION SYSTEM Modeling Command and Control (C2) with Collaborative Planning Agents Randall Hill and Jonathan Gratch University.
Team Software Process By: Bryan Peterson. Presentation Topics History Brief overview of the Team Software Process (TSP) TSP Team Launch Team-working Conclusion.
1 PAGE TITLE GOES HERE December 2013 Role and Function of the FMCS.
JEAN OH FELIPE MENEGUZZI KATIA SYCARA CARNEGIE MELLON UNIVERSITY TIMOYHY NORMAN UNIV. OF ABERDEEN Anticipatory information & planning agent.
© 2003 Carnegie Mellon University slide 1 Building CSIRT Capabilities and the State of the Practice Georgia Killcrece CSIRT Development Team CERT ® Training.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
MokSAF: Agent-based Team Assistance for Time Critical Tasks Katia Sycara The Robotics Institute
Effective Coordination of Multiple Intelligent Agents for Command and Control The Robotics Institute Carnegie Mellon University PI: Katia Sycara
AAMAS 2009, Budapest1 Analyzing the Performance of Randomized Information Sharing Prasanna Velagapudi, Katia Sycara and Paul Scerri Robotics Institute,
Project Team Building “Teamwork is the ability to work together toward a common vision. The ability to direct individual accomplishments toward organizational.
Intelligent Software Agents Lab The Robotics Institute Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA (U.S.A.)
Virtual Organizations as Normative Multiagent Systems Guido Boella Università di Torino, Joris Hulstijn Vrije Universiteit, Amsterdam,
Control of UAV Teams Paul Scerri & Katia Sycara Carnegie Mellon University Michael Lewis University of Pittsburgh P-LOCAAS Flight Test AC-130 Flank Support.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Per Anders Eriksson
1 CHCOHS312A Follow safety procedures for direct care work.
©PCaW London 20 July 2010.
Managing Social Influences through Argumentation-Based Negotiation Present by Yi Luo.
E-Science Meeting April Trusted Coordination in Dynamic Virtual Organisations Santosh Shrivastava School of Computing Science Newcastle University,
FMCS Federal Mediation and Conciliation Service 1 PAGE TITLE GOES HERE February 2015 Role and Function of the FMCS.
Coping with Exceptions in Agent-Based Workflow Enactments Frank Guerin University of Aberdeen.
Pervasive software interoperability for the Operating Room of the Future May 10, 2005.
E NFORCEMENT OF I NTERNATIONAL L AW Campbell, Genevieve and Stewart.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences The Holistan Scenario.
Consensus and Its Impossibility in Asynchronous Systems.
1 USC INFORMATION SCIENCES INSTITUTE CALO, 8/8/03 Acquiring advice (that may use complex expressions) and action specifications Acquiring planning advice,
Learning Agents Center George Mason University Computer Science Department Partners Day Symposium May 4, 2004 Gheorghe Tecuci, Mihai Boicu, Dorin Marcu,
Carnegie Mellon Interactive Resource Management in the COMIREM Planner Stephen F. Smith, David Hildum, David Crimm Intelligent Coordination and Logistics.
E-Science Projects and Security M. Angela Sasse & Mike Surridge.
Responding to the Unexpected Yigal Arens Paul Rosenbloom Information Sciences Institute University of Southern California.
Software Engineering CSC 342/Dr. Ghazy Assassa Chapter 10, Architectural Design “Sommerville +.. “ Slide 1 CSC 342 Semester II: H ( G)
Pascucci-1 Valerio Pascucci Director, CEDMAV Professor, SCI Institute & School of Computing Laboratory Fellow, PNNL Massive Data Management, Analysis,
Mgt 4310 Teamwork. Teams? What if we: Select Train Compensate Promote Fire All at the team level?
Internet Architecture and Governance
Basics for „Crises Management Operations“ Theresan Military Academy Institute for Basic Officer Training 2014.
Real-Time Systems, Events, Triggers. Real-Time Systems A system that has operational deadlines from event to system response A system whose correctness.
8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Synthetic Forces Behavioral Architecture Ian Page
Boeing-MIT Collaborative Time- Sensitive Targeting Project July 28, 2006 Stacey Scott, M. L. Cummings (PI) Humans and Automation Laboratory
NSF Cyber Trust Annual Principal Investigator Meeting September 2005 Newport Beach, California UMBC an Honors University in Maryland Trust and Security.
May 7-8, 2007ICVCI 2007 RTP Autonomic Approach to IT Infrastructure Management in a Virtual Computing Lab Environment H. Abdel SalamK. Maly R. MukkamalaM.
The Department of National Defence and the Canadian Armed Forces: An Introduction.
Human Factors Ontario Search and Rescue Volunteer Association Team Leader Training.
Intelligent Agents: Technology and Applications Unit Five: Collaboration and Task Allocation IST 597B Spring 2003 John Yen.
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
Open Science Grid Consortium Meeting
Constructs agent’s situational picture from messages and sensor input
Outcome TFCS-11// February Washington DC
UN Office for the Coordination of Humanitarian Affairs (OCHA)
Ethics, Innovation and the Law
Presentation transcript:

Annual Conference of ITA ACITA 2009 Agent Support for Policy-driven Collaborative Planning in Ad-hoc Teams Martin J. Kollingbaum, Timothy J. Norman Computing Science, University of Aberdeen, UK Communication Interface Planning Interface Communication Interface Planning Interface Humanitarian Party Military Party Agent Critic/Censor Agent Critic/Censor Intelligence Request for Support Commitments Plan Quality: - Rescue wounded as early as possible - Minimize norm violations Plan Quality: - Minimize cost of military action and support to humanitarian party - Minimize norm violations Humanitarian Organisation Has to evacuate wounded from regions where a military task force is operating. Collaboration with military force is essential to guarantee the safety of the humanitarian operation Challenges for agent support: (a)mission policies have to be represented in a form that can be processed by a software agent (b)such an agent must be able to keep track of the ``normative state'' of the human planner -- what are the planner's current obligations, permissions and prohibitions, and (c)the agent must be able to reason about the current actions of the human planner, so that it can provide feedback about violations of policies, and advise the human planner about alternative courses of action. Human test subjects use a planning and communication environment to create plans and communicate in a controlled language. Agents are tested in two designs: 1.Critic condition: the agent detects policy violations of human planners. The agent (a) intercepts the sending of a message or (b) interrupts the planning of actions due to violating actions -- the planner can then decide whether to adhere to such an advice 2.Censor condition: the agent still monitors the activities of the human planner, but silently interferes with the communication by deleting offending parts of the exchanged messages Prohibition of Humanitarian Organisation (Party A): -IF you have intelligence of threats along route R on day D AND you do not have a commitment of escort from party B for route R on day D THEN you are forbidden from deploying ground and air vehicles along route R on day D Prohibition of Humanitarian Organisation (Party A): -IF you have intelligence of threats along route R on day D AND you do not have a commitment of escort from party B for route R on day D THEN you are forbidden from deploying ground and air vehicles along route R on day D Katia Sycara, Jean Oh, Joseph A. Giampapa Robotics Institute, Carnegie Mellon University, USA Scenario Prohibition of Military Force (Party B): -IF you grant clearance to party A for route R on day D OR you commit to escort party B along route R on day D THEN you are prohibited from performing military operations along route R on day D Prohibition of Military Force (Party B): -IF you grant clearance to party A for route R on day D OR you commit to escort party B along route R on day D THEN you are prohibited from performing military operations along route R on day D Military Force Has to perform military operations against insurgent strongholds. Collaboration with humanitarian organisation is essential to guarantee save evacuation of wounded. The creation of joint plans within teams is a complex task: (a)Teams are formed ad-hoc with limited co-training, (b)For joint missions, each team member has to form a (sub-)plan, the sum of all sub-plans forms the overall joint plan (c)Each team member holds private mission policies, planning constraints and has to plan under these policies and constraints without knowing the plans of other team members (d)Information exchange between team members has to take place to guarantee the consistency of the overall joint plan. (e)The overall joint plan may not be known in its completeness to any of the team members. ProblemAgent Support Experiments References: Martin J Kollingbaum, Joseph A. Giampapa, Katia Sycara, Timothy J. Norman (2009). Agent Support for Collaborative Mission Planning in Ad-hoc Teams. ACITA Chris Burnett, Daniele Masato, Mairi McCallum, Timothy J. Norman, Joseph A. Giampapa, Martin J. Kollingbaum, Katia Sycara (2008). Agent Support for Mission Planning under Policy Constraints. ACITA Wamberto Vasconcelos, Martin J. Kollingbaum, Timothy J. Norman (2007). Resolving Conflict and Inconsistency in Norm- regulated Virtual Organizations. AAMAS 2007