The growing of criminality in Brazilian cities is a common theme addressed by media as well as by the legal authorities. To effectively reduce the criminality, people and infrastructure must be carefully involved to n...
详细信息
ISBN:
(纸本)9788576693178
The growing of criminality in Brazilian cities is a common theme addressed by media as well as by the legal authorities. To effectively reduce the criminality, people and infrastructure must be carefully involved to not only punish who had committed crimes, but also predict and prevent it. Since acquiring official data about crimes is far from trivial, citizens have become important data sources through Web-based collaborative systems. These systems provide a huge volume of data that has to be analyzed. How to analyze this volume of data and identify patterns in crimes is an important, yet open, issue. Thus, this work presents a system called SiAPP. Its main objective is to support the analysis and prediction of crime patterns using a machine learning algorithm. SiAPP automatically acquires data from collaborative sources, generate logical rules and visualizes the found patterns. Experimental analysis shows that SiAPP is a promising solution tool to assist crimes prevention.
Learning symbolic-level numerical constraints is key to use abstractions in effective reasoning and transfer of knowledge for robot systems. We investigate this problem in an experience-based learning framework which ...
详细信息
ISBN:
(纸本)9781509047192
Learning symbolic-level numerical constraints is key to use abstractions in effective reasoning and transfer of knowledge for robot systems. We investigate this problem in an experience-based learning framework which uses inductive logic programming as the learning method. Our particular focus is on learning numerical constraints which is an open issue for ILP systems. Some approaches overcome this by using background knowledge given by domain experts. However, using expert knowledge is both expensive and domain dependent. To obtain more general solutions, numerical constraints should be induced by the robot system itself. For this purpose, we present a constraint induction method based on lazy evaluation, designed for deriving general numerical constraints from observations. We extend Aleph, an existing ILP system based on inverse entailment, with a constraint induction approach using a constraint solver. We analyze our method on some sample scenarios and demonstrate the cases where our method can induce the target concept while the prior lazy evaluation method cannot. Our results indicate that our method can generalize numerical constraints by the self observations of robots.
This paper introduces a new logic-based method for optimising the selection of compiler flags on embedded architectures. In particular, we use inductive logic programming (ILP) to learn logical rules that relate effec...
详细信息
This paper introduces a new logic-based method for optimising the selection of compiler flags on embedded architectures. In particular, we use inductive logic programming (ILP) to learn logical rules that relate effective compiler flags to specific program features. Unlike earlier work, we aim to infer human-readable rules and we seek to develop a relational first-order approach which automatically discovers relevant features rather than relying on a vector of predetermined attributes. To this end we generated a data set by measuring execution times of 60 benchmarks on an embedded system development board and we developed an ILP prototype which outperforms the current state-of-the-art learning approach in 34 of the 60 benchmarks. Finally, we combined the strengths of the current state of the art and our ILP method in a hybrid approach which reduced execution times by an average of 8% and up to 50% in some cases.
Today's cloud system are composed of geographically distributed datacenter interconnected by high-speed optical networks. Disaster failures can severely affect both the communication network as well as datacenters...
详细信息
Today's cloud system are composed of geographically distributed datacenter interconnected by high-speed optical networks. Disaster failures can severely affect both the communication network as well as datacenters infrastructure and prevent users from accessing cloud services. After large-scale disasters, recovery efforts on both network and datacenters may take days, and, in some cases, weeks or months. Traditionally, the repair of the communication network has been treated as a separate problem from the repair of datacenters. While past research has mostly focused on network recovery, how to efficiently recover a cloud system jointly considering the limited computing and networking resources has been an important and open research problem. In this work, we investigate the problem of progressive datacenter recovery after a large-scale disaster failure, given that a network-recovery plan is made. An efficient recovery plan is explored to determine which datacenters should be recovered at each recovery stage to maximize cumulative content reachability from any source considering limited available network resources. We devise an Integer Linear Program (ILP) formulation to model the associated optimization problem. Our numerical examples using the ILP show that an efficient progressive datacenter-recovery plan can significantly help to increase reachability of contents during the network recovery phase. We succeeded in increasing the number of important contents in the early stages of recovery compared to a random-recovery strategy with a slight increase in resource consumption.
Feature terms are a generalization of first-order terms which have recently received increased attention for their usefulness in structured machine learning, natural language processing and other artificial intelligen...
详细信息
Feature terms are a generalization of first-order terms which have recently received increased attention for their usefulness in structured machine learning, natural language processing and other artificial intelligence applications. One of the main obstacles for their wide usage is that, when set-valued features are allowed, their basic operations (subsumption, unification, and antiunification) have a very high computational cost. We present a Constraint programming formulation of these operations, which in some cases provides orders of magnitude speed-ups with respect to the standard approaches. In addition, exploiting several symmetries that often appear in feature terms databases causes substantial additional savings. We provide experimental results of the benefits of this approach. (C) 2014 Elsevier B.V. All rights reserved.
Network Function Virtualization (NFV) is promising to lower the network operator's capital expenditure and operational expenditure by replacing proprietary hardware-based network equipment with software-based virt...
详细信息
ISBN:
(纸本)9781509013296
Network Function Virtualization (NFV) is promising to lower the network operator's capital expenditure and operational expenditure by replacing proprietary hardware-based network equipment with software-based virtual network functions that can be consolidated into telecom clouds. In particular, NFV provides an efficient way to deploy network services using service function chains that consist of a set of virtual network functions interconnected by virtual links. A practical and yet theoretically challenging issue related to NFV Management and Orchestration is how to jointly optimize the topology design and mapping of multiple service function chains, which is called the JTDM problem. In this paper, we develop an Integer Linear programming (ILP) model to formulate the JTDM problem with the objective of minimizing the bandwidth consumption in the physical substrate. We propose a novel heuristic algorithm, namely Closed-loop with Critical Mapping Feedback (CCMF), to efficiently address this problem. Through comprehensive simulations, we demonstrate that the CCMF algorithm is efficient in terms of the bandwidth consumption in various scenarios, and can achieve a bandwidth consumption that is close to the minimum obtained by ILP.
inductive logic programming (ILP) and Relational Data Mining (RDM) address the task of inducing models or patterns from multi-relational data. One of the established approaches to RDM is propositionalization, characte...
详细信息
inductive logic programming (ILP) and Relational Data Mining (RDM) address the task of inducing models or patterns from multi-relational data. One of the established approaches to RDM is propositionalization, characterized by transforming a relational database into a single-table representation. This paper presents a propositionalization technique called wordification which can be seen as a transformation of a relational database into a corpus of text documents. Wordification constructs simple, easy to understand features, acting as words in the transformed Bag-Of-Words representation. This paper presents the wordification methodology, together with an experimental comparison of several propositionalization approaches on seven relational datasets. The main advantages of the approach are: simple implementation, accuracy comparable to competitive methods, and greater scalability, as it performs several times faster on all experimental databases. Furthermore, the wordification methodology and the evaluation procedure are implemented as executable workflows in the web-based data mining platform ClowdFlows. The implemented workflows include also several other ILP and RDM algorithms, as well as the utility components that were added to the platform to enable access to these techniques to a wider research audience. (C) 2015 Elsevier Ltd. All rights reserved.
This paper studies how to determine an optimal order of recovering interdependent Cyber Physical Systems (CPS) after a large scale failure. In such a CPS, some failed devices must be repaired first before others can. ...
详细信息
ISBN:
(纸本)9781509013296
This paper studies how to determine an optimal order of recovering interdependent Cyber Physical Systems (CPS) after a large scale failure. In such a CPS, some failed devices must be repaired first before others can. In addition, such failed devices require a certain amount of repair resources and may take multiple stages to repair. We consider two scenarios: 1) reserved model where all the required repair resources should be prepared at the beginning of repairing a device;and 2) opportunistic model where we can partially repair a device with only part of the required resources. For each scenario, we model it using an Integer Linear programming (ILP) and use a relaxation and rounding method to design an ILP based algorithm. In addition, we also design a Dynamic programming (DP) based algorithm. Simulation results show that ILP based algorithm outperforms DP based algorithm by 10%-20% in systems with less than 200 failed devices, but DP based algorithm can support extreme large size systems with more than 5000 failed devices.
Recent advances in information extraction have led to huge knowledge bases (KBs), which capture knowledge in a machine-readable format. inductive logic programming (ILP) can be used to mine logical rules from these KB...
详细信息
Recent advances in information extraction have led to huge knowledge bases (KBs), which capture knowledge in a machine-readable format. inductive logic programming (ILP) can be used to mine logical rules from these KBs, such as "If two persons are married, then they (usually) live in the same city." While ILP is a mature field, mining logical rules from KBs is difficult, because KBs make an open-world assumption. This means that absent information cannot be taken as counterexamples. Our approach AMIE (Galarraga et al. in WWW, 2013) has shown how rules can be mined effectively from KBs even in the absence of counterexamples. In this paper, we show how this approach can be optimized to mine even larger KBs with more than 12M statements. Extensive experiments show how our new approach, AMIE, extends to areas of mining that were previously beyond reach.
暂无评论