1 An infrastructure for context-awareness based on first order logic 2007.04.27 송지수 ISI LAB.

Slides:



Advertisements
Similar presentations
2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
Advertisements

Semantics Static semantics Dynamic semantics attribute grammars
Naïve Bayes. Bayesian Reasoning Bayesian reasoning provides a probabilistic approach to inference. It is based on the assumption that the quantities of.
Agents That Reason Logically Copyright, 1996 © Dale Carnegie & Associates, Inc. Chapter 7 Spring 2004.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Chapter 12: Expert Systems Design Examples
Introduction to Database Management  Department of Computer Science Northern Illinois University January 2001.
Active Databases as Information Systems
FIN 685: Risk Management Topic 5: Simulation Larry Schrenk, Instructor.
A Probabilistic Framework for Information Integration and Retrieval on the Semantic Web by Livia Predoiu, Heiner Stuckenschmidt Institute of Computer Science,
Information and Telecommunication Technology Center (ITTC) University of Kansas SmartXAutofill Intelligent Data Entry Assistant for XML Documents Danico.
Constraint Logic Programming Ryan Kinworthy. Overview Introduction Logic Programming LP as a constraint programming language Constraint Logic Programming.
NaLIX: A Generic Natural Language Search Environment for XML Data Presented by: Erik Mathisen 02/12/2008.
Pervasive Computing Framework development Kartik Vishwanath Arvind S. Gautam Rahul Gupta Sachin Singh.
Cooperating Intelligent Systems Intelligent Agents Chapter 2, AIMA.
Advanced Topics COMP163: Database Management Systems University of the Pacific December 9, 2008.
1 Chapter 9 Rules and Expert Systems. 2 Chapter 9 Contents (1) l Rules for Knowledge Representation l Rule Based Production Systems l Forward Chaining.
Programming Language Semantics Mooly SagivEran Yahav Schrirber 317Open space html://
Intelligent User Interfaces Research Group Directed by: Frank Shipman.
Information Extraction from HTML: General Machine Learning Approach Using SRV.
Describing Syntax and Semantics
1 Where do spatial context-models end and where do ontologies start? A proposal of a combined approach Christian Becker Distributed Systems Daniela Nicklas.
Adapted from Discrete Math
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
CONTI’2008, 5-6 June 2008, TIMISOARA 1 Towards a digital content management system Gheorghe Sebestyen-Pal, Tünde Bálint, Bogdan Moscaliuc, Agnes Sebestyen-Pal.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Decision-Making on Robots Using POMDPs and Answer Set Programming Introduction Robots are an integral part of many sectors such as medicine, disaster rescue.
Text CONSEG 09 Domain Knowledge assisted Requirements Evolution (K-RE)
Notes for Chapter 12 Logic Programming The AI War Basic Concepts of Logic Programming Prolog Review questions.
Context Tailoring the DBMS –To support particular applications Beyond alphanumerical data Beyond retrieve + process –To support particular hardware New.
MIDDLEWARE SYSTEMS RESEARCH GROUP Denial of Service in Content-based Publish/Subscribe Systems M.A.Sc. Candidate: Alex Wun Thesis Supervisor: Hans-Arno.
A service-oriented middleware for building context-aware services Center for E-Business Technology Seoul National University Seoul, Korea Tao Gu, Hung.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
Web Usage Mining for Semantic Web Personalization جینی شیره شعاعی زهرا.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Chapter 1, Part II: Predicate Logic With Question/Answer Animations.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Efficient RDF Storage and Retrieval in Jena2 Written by: Kevin Wilkinson, Craig Sayers, Harumi Kuno, Dave Reynolds Presented by: Umer Fareed 파리드.
Propositional Calculus CS 270: Mathematical Foundations of Computer Science Jeremy Johnson.
CS Introduction to AI Tutorial 8 Resolution Tutorial 8 Resolution.
 Problem Definition  Presented by Sushant and Alex Overview of the problem space Scenario Issues Example (plant care example) Discussion conclusion open.
Probability Course web page: vision.cis.udel.edu/cv March 19, 2003  Lecture 15.
An Architecture to Support Context-Aware Applications
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Modeling Speech Acts and Joint Intentions in Modal Markov Logic Henry Kautz University of Washington.
Egocentric Context-Aware Programming in Ad Hoc Mobile Environments Christine Julien Gruia-Catalin Roman Mobile Computing Laboratory Department of Computer.
An infrastructure for context-awareness based on first order logic Ubiquitous Software Lab Oh Min Kyoung
Architecture for Context-Aware Services in Gaia Anand Ranganathan.
DeepDive Model Dongfang Xu Ph.D student, School of Information, University of Arizona Dec 13, 2015.
Reasoning about the Behavior of Semantic Web Services with Concurrent Transaction Logic Presented By Dumitru Roman, Michael Kifer University of Innsbruk,
A Lattice Model of Secure Information Flow By Dorothy E. Denning Presented by Drayton Benner March 22, 2000.
Formal Specification: a Roadmap Axel van Lamsweerde published on ICSE (International Conference on Software Engineering) Jing Ai 10/28/2003.
Raluca Paiu1 Semantic Web Search By Raluca PAIU
A Portrait of the Semantic Web in Action Jeff Heflin and James Hendler IEEE Intelligent Systems December 6, 2010 Hyewon Lim.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
From NARS to a Thinking Machine Pei Wang Temple University.
Intelligent Agents Chapter 2. How do you design an intelligent agent? Definition: An intelligent agent perceives its environment via sensors and acts.
PDEVS Protocol Performance Prediction using Activity Patterns with Finite Probabilistic DEVS DEMO L. Capocchi, J.F. Santucci, B.P. Zeigler University of.
The Context Fabric: An Infrastructure for Context-Aware Computing Jason I. Hong Group for User Interface Research, Computer Science Division University.
Artificial Intelligence Logical Agents Chapter 7.
Presented by Edith Ngai MPhil Term 3 Presentation
CHAPTER 5 Handling Uncertainty BIC 3337 EXPERT SYSTEM.
Intelligent Agents Chapter 2.
CSCE 355 Foundations of Computation
Probabilistic Databases
Representations & Reasoning Systems (RRS) (2.2)
Presentation transcript:

1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB

2 Table of Contents Introduction The context model Protocols for obtaining context The Context Infrastructure Specifying context-sensitive behavior for applications Conclusion

3 Introduction Need a uniform representation for various contexts Allow complex operations on contexts This paper uses first order logic (FOL) Supports conjunction, disjunction, negation and quantification Enable automated inductive and deductive reasoning Evaluate queries on context Based on this first order model, developed an infrastructure Performs the various operations defined in the context model Allows an easy flow of contextual information In this paper, integrated this infrastructure into Gaia

4 The context model (1/2) The basic structure – the context predicate ( 명제 or 조건자 ) Name of predicate : type of context (e.g. location, temperature) Arguments are actually constrained by the type of context Structures of different context predicates are specified in an ontology Defines various context types as well as arguments For Example, No restriction on the types of values Third argument in the location can be room or x,y, and z coordinates Can be functions that return some value

5 The context model (2/2) Operations on contexts Can construct complex context expressions For Example, Location (Lee, Entering, Room F314) ∧ Social Activity (Room F314, Meeting) NOT Location (Lee, In, Room F314) ∀ People x Location (x, In, Room F314) ∃ Person s Location (s, Entering, currentRoom()) Quantification is performed only over a specific domain of values Person set consists of the names of all people in our system. Issues – Decidability and Safety This paper uses XSB reasoning engine for evaluating queries The model allows deriving new contexts from other sensed contexts

6 Protocols for obtaining context There are two possible methods by which applications can get context The query-answer protocol Application sends a query to the Context Provider Form as queries (some fields are replaced by variables) Location (X, In, room F314) The subscribe-notify protocol Application subscribes for certain contexts and gets notify Simple callback from the Context Provider (event-based)

7 The Context Infrastructure (1/4) Context Providers obtain context from sensors or data sources Context Synthesizers derive higher level or abstract contexts Context Provider Lookup Service allows applications to find context provider Context History contains all past contexts Context Consumers (or Context-Aware Applications)

8 The Context Infrastructure (2/4) Context Providers Collect various types of contexts Allow them to be accessed by applications Type of context can be represented using a context expression E.g. Tracking Service (keep track), Weather service (keep sending) Context Consumers Obtain contexts by querying a Context Provider or by listening for events Get references to Context Providers using the Lookup Service Context history Store all context events in a DB For learning rules in Context synthesizer

9 The Context Infrastructure (3/4) Context Synthesizers Infers higher level contexts on simpler sensed contexts Gets source contexts, applies some sort of logic, and generates a new type Two basic approaches Rule-based synthesizers More than one rule can be true at the same time Return just a single value Occur Conflict Problem The newly inferred context replaces the older one

10 The Context Infrastructure (4/4) There are problems in the Rule-based synthesizers May not deduce the right context since the real world may not follow Require explicit definition by humans Not flexible and can’t adapt to changing circumstances Enhancing the context model by associating probabilities Synthesizers that learn Making use of machine learning techniques to deduce high-level context For example, User Mood Context Provider uses the Na Bayes algorithm Make use of past contexts to train the learner The result of algorithm is probabilistic Consider the mood with the highest probability and assume that to be true Of course, the predictions are not always perfect

11 Specifying context-sensitive behavior for applications (1/3) GUI shows a list of possible behaviors of the application and user selects Developer constructs complex first order expressions by mapping There are some issues in this infrastructure Optimizing context expression evaluation Whenever the context changes, the expressions must be evaluated If a large number of rules, O(n) time complexity is problem Organize all the context expressions in a poset data structure A poset is a set for which a partial order (reflexive, transitive, anti-symmetric) If cxtExp1 => cxtExp2, then The node corresponding to cxtExp1 is a child of the one to cxtExp2

12 Specifying context-sensitive behavior for applications (2/3) If the context expression of a root node evaluates to false, the context expressions of all its decedents will also be false If true, traverse the poset in a top-down manner

13 Specifying context-sensitive behavior for applications (3/3) Resolving conflicts Since multiple nodes in the poset can become true at the same time, there may be conflicts in the actions Handle these conflicts using a priority-based mechanism The Node with the higher priority wins If same, randomly choose Using machine learning Observing the user’s reaction If user reacted positively, the priority of the action could be increased Changing the rules dynamically Mobile and pervasive environments Any changes are reflected in the poset structure immediately There are standard algorithms for adding or deleting nodes into a poset Related work

14 Conclusion Provides generic mechanism for representing contexts and writing rules Allows automated reasoning and evaluating Easy to specify complex rules Various reasoning can be used Not looked at the privacy and security concerns Next study will be about one of them Concerning privacy and security Problem of contexts in autonomous distributed applications Standard algorithms for adding or deleting nodes