Exploiting Automatically Inferred Constraint-Models for Building Identification in Satellite Imagery Research funded by the AFSOR, grant numbers FA9550-04-1-0105.

Slides:



Advertisements
Similar presentations
Constraint Systems Laboratory February 18, 2009 CSP Modeling Examples CSP: Examples Industrial applications: scheduling, resource allocation, product configuration,
Advertisements

A survey of techniques for precise program slicing Komondoor V. Raghavan Indian Institute of Science, Bangalore.
1 Coven a Framework for High Performance Problem Solving Environments Nathan A. DeBardeleben Walter B. Ligon III Sourabh Pandit Dan C. Stanzione Jr. Parallel.
Automatically Annotating and Integrating Spatial Datasets Chieng-Chien Chen, Snehal Thakkar, Crail Knoblock, Cyrus Shahabi Department of Computer Science.
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
All Hands Meeting, 2006 Title: Grid Workflow Scheduling in WOSE (Workflow Optimisation Services for e- Science Applications) Authors: Yash Patel, Andrew.
A First Practical Algorithm for High Levels of Relational Consistency Shant Karakashian, Robert Woodward, Christopher Reeson, Berthe Y. Choueiry & Christian.
Constraint Processing Techniques for Improving Join Computation: A Proof of Concept Anagh Lal & Berthe Y. Choueiry Constraint Systems Laboratory Department.
Relational Data Mining in Finance Haonan Zhang CFWin /04/2003.
A Constraint Satisfaction Problem (CSP) is a combinatorial decision problem defined by a set of variables, a set of domain values for these variables,
 i may require adding new constraints, except for… o i =1  domain filtering o i =   constraint filtering Robert Woodward & Berthe Y. Choueiry Constraint.
Solvable problem Deviation from best known solution [%] Percentage of test runs ERA RDGR RGR LS Over-constrained.
Reformulating Constraint Models Using Input Data Martin Michalowski 1, Craig A. Knoblock 1 and Berthe Y. Choueiry 1,2 1 Information Sciences Institute,
ReQuest (Validating Semantic Searches) Norman Piedade de Noronha 16 th July, 2004.
Support: UCARE grant awarded to Chris Reeson & CAREER Award # from the National Science Foundation. To the public: –Illustrate the power of CP For.
Ken Bayer, Josh Snyder, and Berthe Y. Choueiry Constraint Systems Laboratory University of Nebraska-Lincoln A Constraint-Based Approach to Solving Minesweeper.
CGRASS A System for Transforming Constraint Satisfaction Problems Alan Frisch, Ian Miguel (York) Toby Walsh (Cork)
Abstract Shortest distance query is a fundamental operation in large-scale networks. Many existing methods in the literature take a landmark embedding.
Triple Patterning Aware Detailed Placement With Constrained Pattern Assignment Haitong Tian, Yuelin Du, Hongbo Zhang, Zigang Xiao, Martin D.F. Wong.
Science and Engineering Practices
Using Constraint Solvers as Inference Engines to Validate and Execute Rules-Based Decision Models Jacob Feldman, Ph.D. Founder & CTO, OpenRules, Inc. JSR-331.
Becerra-Fernandez, et al. -- Knowledge Management 1/e -- © 2004 Prentice Hall Chapter 16 Knowledge Application Systems: Systems that Utilize Knowledge.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
Jinhui Tang †, Shuicheng Yan †, Richang Hong †, Guo-Jun Qi ‡, Tat-Seng Chua † † National University of Singapore ‡ University of Illinois at Urbana-Champaign.
Introduction To System Analysis and design
Operations Research Models
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Design Science Method By Temtim Assefa.
CONSTRAINT PROGRAMMING Computer Science Seminar April 9 th, 2004 Kerem Kacel.
Ontology-Driven Automatic Entity Disambiguation in Unstructured Text Jed Hassell.
Metadata Models in Survey Computing Some Results of MetaNet – WG 2 METIS 2004, Geneva W. Grossmann University of Vienna.
Combined Central and Subspace Clustering for Computer Vision Applications Le Lu 1 René Vidal 2 1 Computer Science Department, Johns Hopkins University,
USING PREFERENCE CONSTRAINTS TO SOLVE MULTI-CRITERIA DECISION MAKING PROBLEMS Tanja Magoč, Martine Ceberio, and François Modave Computer Science Department,
Constraint Systems Laboratory 10/24/2015Bayer–MS Thesis Defense1 Reformulating Constraint Satisfaction Problems with Application to Geospatial Reasoning.
Constraint Propagation as the Core of Local Search Nikolaos Pothitos, George Kastrinis, Panagiotis Stamatopoulos Department of Informatics and Telecommunications.
Embedding Constraint Satisfaction using Parallel Soft-Core Processors on FPGAs Prasad Subramanian, Brandon Eames, Department of Electrical Engineering,
MURI: Integrated Fusion, Performance Prediction, and Sensor Management for Automatic Target Exploitation 1 Dynamic Sensor Resource Management for ATE MURI.
Extending context models for privacy in pervasive computing environments Jadwiga Indulska The School of Information Technology and Electrical Engineering,
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems -Ramu Bandaru Zhaoqi Chen Dmitri V.kalashnikov Sharad Mehrotra.
Constraint Satisfaction Problems/Programming ZUI 2012/2013.
A Mechanized Model for CAN Protocols Context and objectives Our mechanized model Results Conclusions and Future Works Francesco Bongiovanni and Ludovic.
Indirect Supervision Protocols for Learning in Natural Language Processing II. Learning by Inventing Binary Labels This work is supported by DARPA funding.
Quality views: capturing and exploiting the user perspective on data quality Paolo Missier, Suzanne Embury, Mark Greenwood School of Computer Science University.
Computer Science and Engineering Parallelizing Defect Detection and Categorization Using FREERIDE Leonid Glimcher P. 1 ipdps’05 Scaling and Parallelizing.
Biological Signal Detection for Protein Function Prediction Investigators: Yang Dai Prime Grant Support: NSF Problem Statement and Motivation Technical.
A Scalable Machine Learning Approach for Semi-Structured Named Entity Recognition Utku Irmak(Yahoo! Labs) Reiner Kraft(Yahoo! Inc.) WWW 2010(Information.
Nursing research Is a systematic inquiry into a subject that uses various approach quantitative and qualitative methods) to answer questions and solve.
Theme 2: Data & Models One of the central processes of science is the interplay between models and data Data informs model generation and selection Models.
Foundations of Constraint Processing, Fall 2004 October 3, 2004Interchangeability in CSPs1 Foundations of Constraint Processing CSCE421/821, Fall 2004:
Generating Precise and Concise Procedure Summaries Greta Yorsh Eran Yahav Satish Chandra.
Robust Planning using Constraint Satisfaction Techniques Daniel Buettner and Berthe Y. Choueiry Constraint Systems Laboratory Department of Computer Science.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Engr 691 Special Topics in Engineering Science Software Architecture Spring Semester 2004 Lecture Notes.
Social Information Processing March 26-28, 2008 AAAI Spring Symposium Stanford University
Resource Optimization for Publisher/Subscriber-based Avionics Systems Institute for Software Integrated Systems Vanderbilt University Nashville, Tennessee.
A Presentation on Adaptive Neuro-Fuzzy Inference System using Particle Swarm Optimization and it’s Application By Sumanta Kundu (En.R.No.
The PLA Model: On the Combination of Product-Line Analyses 강태준.
A Mixed-Initiative System for Building Mixed-Initiative Systems Craig A. Knoblock, Pedro Szekely, and Rattapoom Tuchinda Information Science Institute.
Wolfgang Runte Slide University of Osnabrueck, Software Engineering Research Group Wolfgang Runte Software Engineering Research Group Institute.
Wolfgang Runte Slide Marwane El Kharbili Wolfgang Runte University of Osnabrueck Institute of Computer Science Software Engineering Research.
Modelling and Solving Configuration Problems on Business
Automatic Test Generation
COmbining Probable TRAjectories — COPTRA
Presentations Computer Vision Research Lab
Consistency Methods for Temporal Reasoning
Robert Glaubius and Berthe Y. Choueiry
Rapid Construction of City Simulators
SAT-Based Area Recovery in Technology Mapping
Block Matching for Ontologies
L. Glimcher, R. Jin, G. Agrawal Presented by: Leo Glimcher
Presentation transcript:

Exploiting Automatically Inferred Constraint-Models for Building Identification in Satellite Imagery Research funded by the AFSOR, grant numbers FA and FA Martin Michalowski, Craig A. Knoblock University of Southern California Information Sciences Institute Kenneth M. Bayer, Berthe Y. Choueiry University of Nebraska-Lincoln Constraint Systems Lab Research funded by NSF CAREER Award No. IIS

2 Problem Statement Goal: Annotating satellite imagery with addresses Addresses can be assigned by exploiting sets of addressing “rules” Many traditional and non-traditional data sources available online How can we combine our knowledge of addressing with the available data?

3 Building Identification Process Traditional Sources Non-traditional Sources

4 Challenges Integrating heterogeneous data Modeling data and addressing characteristics Supporting various addressing schemes  One model tailored & stored per area  BAD  Non-homogenous addressing within one area Efficiently solving the constructed problem

5 Initial Approach [Michalowski & Knoblock, 2005]

6 Building Identification as a CSP [Michalowski+, 2005] Constraint Satisfaction Problem  Variables: Buildings  Variable Domains: Potential street addresses  Constraints: Global addressing characteristics (parity, ascending direction, etc.) Demonstrated the feasibility of modeling data integration for building identification as a CSP Limitations  Relied on a ‘single-model’ approach  Limited to small homogeneous areas  Did not scale

7 Why a Single Model Doesn’t Work Block Numbering YES NO Constraints apply in different contexts 12 Addresses increase WestAddresses increase East

8 Our Solution

9 Constraint Inference Problem Instance Input information F = {F 1,F 2,…,F n } Generic model C B = { C 1,C 2,…,C i } Refined model: C new = C B  C I Inference Engine Inference rules R t = {R 1,R 2,…,R z } R k : F i  F  C I   C L Constraint Library User-defined (& learned) constraints C L = {C l1,C l2,…,C lz }

Example Data points  Landmark points that describes a particular instance Obtained from any online point repository (e.g. gazetteers)  Features: Address Number, Street Name, Lat, Lon… Constraints Context (El Segundo) Loma Vista St. 834 Hillcrest St 852 Hillcrest St

11 Inferring Constraints Inference rules are evaluated using data points  Supports (+,-) provided for the constraints Constraints are partitioned based on support level  Status: Applicable, Unknown, Non-applicable Applicable constraints added to generic model Constraint Library Applicable NegativePositive Null Unknown Non-applicable Status: Support:

12 Model Generation Generates constraint model from variables and inferred constraints Model improvements over previous work  Reduces total number of variables and constraints’ arity  Reflects topology: Constraints can be declared locally & in restricted ‘contexts’ B3 B4 B5 B1 B2

13 Constraint Solver Backtrack-search with nFC3 and conflict- directed back-jumping Exploits structure of problem (backdoor variables) Implements domains as (possibly infinite) intervals Incorporates new reformulations that increase the scalability by large factors  Details available in [Bayer+, 2007]

14 Case Studies All cases are beyond what our initial work could solve

15 Experimental Results 26 points used to infer correct model (inference time < 2 secs) Inferred model greatly reduces runtime Domain reduction leads to higher precision by a significant factor Additional results show an even greater improvement (see paper)

16 Observations Constraint inference provides framework for data integration Inferred models lead to more precise results Ability to solve more complex instances Dynamic modeling makes global coverage possible and easier

Related Work Geospatial  Geocoding [Bakshi+, 2004]  Computer Vision [Agouris+, 1996; Doucette+, 1999] Modeling  Learning constraint networks from data [Coletta+, 2003; Bessière+, 2005]

18 Current Work Eliminating incorrect constraint inference  Support levels associate confidence with inferences Dealing with a lack of expressiveness in data points  Iterative algorithm with constraint propagation Generalizing context-inference mechanism  Classification in the feature space using SVMs Learning constraints to populate library  Agglomerative clustering combined with set covering

19 Thank you!!!

20 Experimental Results