Towards Ad-hoc Situation Determination Graham Thomson, Paddy Nixon and Sotirios Terzis.

Slides:



Advertisements
Similar presentations
Design Project (Last updated: Nov. 22/2010) Change since August 31: added the notes to the presentation in the next slide.
Advertisements

Chapter 11 user support. Issues –different types of support at different times –implementation and presentation both important –all need careful design.
1 H2 Cost Driver Map and Analysi s Table of Contents Cost Driver Map and Analysis 1. Context 2. Cost Driver Map 3. Cost Driver Analysis Appendix A - Replica.
School Based Assessment and Reporting Unit Curriculum Directorate Reporting.
CompLACS Composing Learning for Artificial Cognitive Systems Year 2: Specification of scenarios.
Chapter 9: Ontology Management Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns, Wiley, 2005.
Chapter 9: Ontology Management Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns, Wiley, 2005.
7.1 A Bridge to Design & Construction
Watching Unlabeled Video Helps Learn New Human Actions from Very Few Labeled Snapshots Chao-Yeh Chen and Kristen Grauman University of Texas at Austin.
Making Choices using Structure at the Instance Level within a Case Based Reasoning Framework Cormac Gebruers*, Alessio Guerri †, Brahim Hnich* & Michela.
Recommender Systems Aalap Kohojkar Yang Liu Zhan Shi March 31, 2008.
Introduction to Automatic Classification Shih-Wen (George) Ke 7 th Dec 2005.
Pervasive Computing Framework development Kartik Vishwanath Arvind S. Gautam Rahul Gupta Sachin Singh.
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
1 Validation and Verification of Simulation Models.
CSE5610 Intelligent Software Systems Semester 1 Enabling Intelligent Systems in Pervasive Computing.
Meaningful Learning in an Information Age
Oral Defense by Sunny Tang 15 Aug 2003
Unit 3a Industrial Control Systems
The chapter will address the following questions:
[ §6 : 1 ] 6. Basic Methods II Overview 6.1 Models 6.2 Taxonomy 6.3 Finite State Model 6.4 State Transition Model 6.5 Dataflow Model 6.6 User Manual.
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
Reverse Engineering State Machines by Interactive Grammar Inference Neil Walkinshaw, Kirill Bogdanov, Mike Holcombe, Sarah Salahuddin.
An Introduction to MBT  what, why and when 张 坚
WMS systems manage and coordinate several independent subtasks. The coordination problems get even more serious when the subtasks are performed on separate.
 Knowledge Acquisition  Machine Learning. The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
We introduce the use of Confidence c as a weighted vote for the voting machine to avoid low confidence Result r of individual expert from affecting the.
Resolving abbreviations to their senses in Medline S. Gaudan, H. Kirsch and D. Rebholz-Schuhmann European Bioinformatics Institute, Wellcome Trust Genome.
Requirements Elicitation. Who are the stakeholders in determining system requirements, and how does their viewpoint influence the process? How are non-technical.
Human Computer Interaction
1 ENTROPY-BASED CONCEPT SHIFT DETECTION PETER VORBURGER, ABRAHAM BERNSTEIN IEEE ICDM 2006 Speaker: Li HueiJyun Advisor: Koh JiaLing Date:2007/11/6 1.
Time Series Data Analysis - I Yaji Sripada. Dept. of Computing Science, University of Aberdeen2 In this lecture you learn What are Time Series? How to.
Universit at Dortmund, LS VIII
RCDL Conference, Petrozavodsk, Russia Context-Based Retrieval in Digital Libraries: Approach and Technological Framework Kurt Sandkuhl, Alexander Smirnov,
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
BUSINESS FUNCTIONS & INFORMATION SYSTEM. What is a System? System is simply a set of components that interact to accomplish some purpose. Business is.
Supporting Scenario-Based Requirements Engineering IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 24, NO. 12, DECEMBER, 1998 A. G. Sutcliffe, N. A. M.
Indirect Supervision Protocols for Learning in Natural Language Processing II. Learning by Inventing Binary Labels This work is supported by DARPA funding.
1 Chapter 3 1.Quality Management, 2.Software Cost Estimation 3.Process Improvement.
A Scalable Machine Learning Approach for Semi-Structured Named Entity Recognition Utku Irmak(Yahoo! Labs) Reiner Kraft(Yahoo! Inc.) WWW 2010(Information.
Theme 2: Data & Models One of the central processes of science is the interplay between models and data Data informs model generation and selection Models.
Dynamic Trust Models for Ubiquitous Computing Environments Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick, Helen Lowe Department of Computer.
1 A Biterm Topic Model for Short Texts Xiaohui Yan, Jiafeng Guo, Yanyan Lan, Xueqi Cheng Institute of Computing Technology, Chinese Academy of Sciences.
Iterative similarity based adaptation technique for Cross Domain text classification Under: Prof. Amitabha Mukherjee By: Narendra Roy Roll no: Group:
Refactoring Agile Development Project. Lecture roadmap Refactoring Some issues to address when coding.
1 Usability evaluation and testing User interfaces Jaana Holvikivi Metropolia.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Refined Online Citation Matching and Adaptive Canonical Metadata Construction CSE 598B Course Project Report Huajing Li.
(6) Estimating Computer’s efficiency Software Estimation The objective of Software Estimation is to provide the skills needed to accurately predict the.
Chapter 5: Software effort estimation
Pedagogical aspects in assuring quality in virtual education environments University of Gothenburg, Sweden.
Done by Fazlun Satya Saradhi. INTRODUCTION The main concept is to use different types of agent models which would help create a better dynamic and adaptive.
Laurea Triennale in Informatica – Corso di Ingegneria del Software I – A.A. 2006/2007 Andrea Polini XVIII. Software Testing.
Introduction to Machine Learning, its potential usage in network area,
Welcome to M301 P2 Software Systems & their Development
Information Organization: Overview
Automatic cLasification d
OVERVIEW Impact of Modelling and simulation in Mechatronics system
Unified Modeling Language
Iterative design and prototyping
Object-Oriented Analysis
Objective of This Course
Designing a mathematics curriculum for a user programme
Service-Oriented Computing: Semantics, Processes, Agents
Chapter 11 user support.
Service-Oriented Computing: Semantics, Processes, Agents
Information Organization: Overview
Kostas Kolomvatsos, Christos Anagnostopoulos
Presentation transcript:

Towards Ad-hoc Situation Determination Graham Thomson, Paddy Nixon and Sotirios Terzis

Pervasive and Global Computing Introduction  PlaceLab has been successful in making location information freely available for use in experimental ubiquitous computing applications.  We envisage a need for tools that can deliver a much richer set of contextual information.  The high-level situation of the current environment is a key contextual element.

Pervasive and Global Computing Scenario  Jane captures a ‘coffee break’ snapshot on her smartphone and instructs it that both calls and messages should be announced audibly when she is in that situation.  Historical snapshot of ‘formal meeting’ captured from context server.  In a partner company’s building her smartphone is unable to determine the situation. The local context server reveals it is ‘formal meeting’, and the previously associated behaviours are applied.

Pervasive and Global Computing Drawbacks of the state of the art  Require an environment expert.  Reasoning mechanisms must be manually constructed and maintained.  Difficult to specify sensor to situation correlations on a large scale.  Situation specifications will suffer from the subjective bias of the expert.  Reasoning is performed by a single oracle which cannot exploit non-public knowledge.  Once programmed, situations are fixed.

Pervasive and Global Computing Drawbacks of the state of the art  Require an environment expert.  Reasoning mechanisms must be manually constructed and maintained.  Difficult to specify sensor to situation correlations on a large scale.  Situation specifications will suffer from the subjective bias of the expert.  Reasoning is performed by a single oracle which cannot exploit non-public knowledge.  Once programmed, situations are fixed.

Pervasive and Global Computing Representing the situation  Contextual information is captured as a relation between two instances of a class.  Ubiquitous computing environments are open - any number and variety of people, devices, and software may appear within them.  Contextual information they produce are therefore also open, as the instances of a relation are drawn from a potentially infinite set.  Reasoning about contextual information is then made difficult, as many machine learning techniques make strict demands on the structure and constraints of the data, e.g. the C4.5 algorithm.

Pervasive and Global Computing Representing the situation  Text classification aims to automatically assign documents to a given set of categories.  Documents may exhibit no regular structure.  The set of known terms used in the documents may grow with each new document that is classified.  Easy to see similarities between the task of text classification and that of situation determination.

Pervasive and Global Computing Situation as a document  Document  Bag of terms.  Situation  Bag of relations.  A relation is expanded to facilitate reasoning at an abstract level. JaneRobert works with

Pervasive and Global Computing Situation as a document Person JaneRobert works with Robert works with Jane works with Person

Pervasive and Global Computing Situation as a document  To reason about snapshots, we must transform them into a representation suitable for machine learning algorithms.  Use vector space model - considers a document to be a vector in a multi-dimensional Euclidean space, with each axis corresponding to a term.  Extra time axis added to vector, scaled from 0 (midnight), to 1 (just before midnight).  Approach based on Support Vector Machines (SVM), which are currently the most accurate classifiers for text.

Pervasive and Global Computing Determining the situation

Pervasive and Global Computing Determining the situation

Pervasive and Global Computing Determining the situation

Pervasive and Global Computing Determining the situation

Pervasive and Global Computing Determining the situation

Pervasive and Global Computing Drawbacks of the state of the art  Require an environment expert.  Reasoning mechanisms must be manually constructed and maintained.  Difficult to specify sensor to situation correlations on a large scale.  Situation specifications will suffer from the subjective bias of the expert.  Reasoning is performed by a single oracle which cannot exploit non-public knowledge.  Once programmed, situations are fixed.

Pervasive and Global Computing Process of interaction  Determining the situation within an environment is a cooperative effort between each participant (device) within it.  Each participant’s view is the union of its private, privileged, and public relation sets.  Make simplifying assumption that participants are in the same situation if they are in the same room.  Interaction proceeds as in the following five steps:

Pervasive and Global Computing Process of interaction Stage 1 – Proposal of current situation Formal meeting Formal meeting Formal meeting Formal meeting Coffee break

Pervasive and Global Computing Process of interaction Stage 2 – Sharing of relevant snapshots

Pervasive and Global Computing Process of interaction Stage 3 – Correction (freshness, confidence, accuracy, derivation algorithm) P = 2.3 P = 2.35 P = 1.8 P = -34 P = ?

Pervasive and Global Computing Process of interaction Stage 4 – Heuristic selection (strongest non- obvious indicator) Formal meeting

Pervasive and Global Computing Process of interaction Stage 5 – Learning (dynamic adaptation to drift) Formal meeting

Pervasive and Global Computing Drawbacks of the state of the art  Require an environment expert.  Reasoning mechanisms must be manually constructed and maintained.  Difficult to specify sensor to situation correlations on a large scale.  Situation specifications will suffer from the subjective bias of the expert.  Reasoning is performed by a single oracle which cannot exploit non-public knowledge.  Once programmed, situations are fixed.

Pervasive and Global Computing Preliminary results  Situations:  Formal group meeting  European project meeting  Informal meeting  Coffee break  Private study  Movie night  Ubicomp environments are highly dynamic - new situations will continually appear, while current situations will cease to recur.  The system must achieve an acceptable determination accuracy using as few snapshots as possible.

Pervasive and Global Computing Preliminary results

Pervasive and Global Computing Preliminary results  Almost all misclassifications occurred between the three meeting situations.  THANK YOU!