those planners manage to produce correct solutions for a quite large number of problems into simple and static domains, they can not cope with most of

Size: px
Start display at page:

Download "those planners manage to produce correct solutions for a quite large number of problems into simple and static domains, they can not cope with most of"

Transcription

1 Interactive Constraint Satisfaction for Information Gathering in Planning R. Barru (1), E.Lamma (1), P.Mello (2), M.Milano (1) (1) DEIS, Universita di Bologna Viale Risorgimento 2, Bologna, Italy (2) Dipartimento di Ingegneria, Universita di Ferrara Via Saragat, Ferrara, Italy Abstract Many modern Articial Intelligence planners are based on Constraint Satisfaction (CS) techniques. The basic idea is to introduce constraints which must be satised during the plan construction in order to have a consistent solution. CS techniques allow the search space to be pruned during the planning process thanks to constraint propagation. However, classical CS approaches need all the information on variable domains at the beginning of the computation. This is not the case in a typical networked environment where the knowledge is not completely dened at the beginning, but has to be dynamically acquired during the computational process. A possible solution to this problem is to introduce in the current plan sensing actions devoted to knowledge acquisition. An alternative approach is based on the idea of allowing a CSP (Constraint Satisfaction Problem) to deal with incomplete knowledge and to interactively acquire new consistent information. In this paper, we dene an Interactive CSP framework where constraints are posted on variables ranging on partially or completely undened domains. The basic idea is to use constraints both for maintaining the consistency of the current plan, and for performing knowledge acquisition when needed. A more interesting feature of this framework concerns the possibility of driving the knowledge acquisition by means of interactive constraints in order to retrieve only consistent information for the planner. 1 Introduction Planning in complex domains has to deal with the problem of incomplete knowledge. Traditional planners are based on the unrealistic assumption of omniscience, i.e., the planner requires a complete knowledge of the initial state of the world. Thus, while 1

2 those planners manage to produce correct solutions for a quite large number of problems into simple and static domains, they can not cope with most of the real world domains where the knowledge model is typically incomplete and highly dynamic. For example, the management of networked systems [7] represents a typical environment where it is not possible to have a complete knowledge, given its complexity and the large amount of data. In this paper we propose an integrated architecture based on Constraint Satisfaction (CS) techniques that joins the problem solving ability of generative (o-line) planners, as typical Partial Order Planners, and the capability of reactive (on-line) planners to acquire information on demand. A Constraint Satisfaction Problem (CSP) is dened on a set of variables fv 1 ; v 2 ; : : : ; v n g ranging on a domain fd 1 ; d 2 ; : : : ; d n g. Variables are linked by constraints c(v 1i ; : : : ; v ki ) that dene a subset of the cartesian product of variables domains, i.e., combinations of values that can appear in a consistent solution. We extend this framework in order to treat constraints on variables ranging on partially or completely undened domains. Those constraints, called Interactive Constraints [6], may result in a knowledge acquisition process and a consequent propagation. For example, suppose we have a variable P representing a printer, and we do not know at the beginning which printers are available in the system, thus the domain of variable P is undened. If the constraint online(p ) is veried it performs a knowledge acquisition in order to identify the printers available. On the other hand, if P has an already dened domain, (already retrieved by other constraints), online(p ) behaves as a standard constraint by removing those printers which are not on line. A more interesting feature of this framework is that the knowledge acquisition can be driven by interactive constraints in order to retrieve only consistent information. For example, the constraint online(p ) can guide the knowledge acquisition process in order to retrieve only printers on line and not all the printers of the domain. This feature is useful from a computational viewpoint since it allows to work with signicantly smaller domains containing only consistent values. This general framework can be used in many applications, particularly in all the applications where a low level system provides a large amount of constrained data to be processed, as for instance a vision system used for extracting visual features of objects from an image [6]. We tailor this general solution to planning problems. Basically, in our architecture the planner is not aware of all the true facts of the real world. Thus, when the planner tries to verify if a precondition is already satised in the initial state, if the necessary information is not available, it needs to acquire knowledge from the underlying system. In practice, we consider action preconditions as interactive constraints. They behave as usual preconditions and constraints when they work on variables ranging on dened domains. Otherwise, they perform knowledge acquisition. It is worth noting that in this way the knowledge acquisition process is transparent to the planner which does not need to take into account information gathering actions. The aim of this paper is to sketch this approach, and to suggest how a planner could benet from it. The paper is organised as follows: section 2 discusses the problems related with incomplete knowledge; section 3 focuses on the Interactive Constraint Satisfaction Problem (ICSP) model after a brief description of Constraints Satisfaction techniques 2

3 and their application to planning. Section 4 proposes an example in the eld of network management. Conclusion and future work follow. 2 The problem of incomplete knowledge in planning One of the main system management activities consists in performing conguration and reconguration tasks. The traditional way to deal with this issue is by mapping high level commands with shell scripts and conventional procedural applications. This approach does not cope well with a networked computer systems always growing in complexity. A promising alternative is represented by planning techniques, a much more exible approach able to deal with unexpected situations and updates of the system. Planning, in fact, allows to dynamically synthesise the sequence of commands necessary to accomplish the current goal by using basic actions. However, traditional planners make the unrealistic Close World Assumption (CWA) [5], meaning that: (i) all the information about the world is known, (ii) anything unknown is false. This hypotesis does not allow to apply planning to dynamic environments such as a networked system domain [7]. In fact, it is really inecient if not impossible to make the agent load all the hierarchical knowledge of the real system conguration. Planners which make the Open World Assumption (OWA) work in dierent way. They are based on the hypotesis that anything not indicated into the list of the known facts is unknown. Some of them base their planning decisions on assumptions made on unknown facts [7]; these assumptions are tested at execution time by means of verication actions. In case of wrong esteem the agent needs to replan. Other planners build conditional plans [11], i.e., plans with dierent alternative branches which are selected at execution time. This can lead to a computational explosion of the planning process. Another approach shifts the complexity from the planning process to the action denition, by embedding into action descriptions all the possible alternatives in which a situation can come [8]. Althought it could seem a good compromise, we cannot abuse with this sort of action denition since, in this way, we run the risk to loose all the advantages of declarativeness and dynamic planning. In general, all these options are appropriate when a limited number of possible alternatives is given. Another alternative consists of exploiting the reactive approach to planning in charge of acquiring information in a dynamic way during the planning process by interleaving planning and execution of knowledge acquisition actions 1, usually called sensing actions [10]. Sensing actions are described as proper actions in a declarative formal language by pre and post conditions. The main drawbacks of this approach mainly concern the facts that: (i) sensing actions have to be explicitly dened in the action domain; (ii) they retrieve the whole state of the underlying system in a systematic way, leaving to the planner the task of selecting information consistent with the case under consideration; (iii) often there may be plans containing many instances of the same sensing action. This happens because the planner automatically inserts an instance of a sensing action into the plan, each time a resource 1 A networked system is observable since its operative system provides sensor commands to check the state of the system (i.e. Unix commands as ls, finger, pwd and so on). 3

4 information is required, sometimes resulting in sensor abuse. Our challenge is to provide the planner with a sensing mechanism which mostly overcomes these limits. 3 Interactive Constraints Satisfaction techniques Many modern Articial Intelligence planners are based on Constraint Satisfaction Techniques. CS techniques can be used to augment the search eciency of the planner by avoiding failures instead of recovering from them, thus reducing computationally heavy backtracking steps [5, 3, 9]. In order to exploit this feature we have to map the planning problem into a Constraint Satisfaction Problem (CSP). Many approaches to planning as CS problem have been proposed. Particularly some of them exploit CS techniques for temporal reasoning [9], resource allocation [9], conicts resolution [12, 13, 3], open condition achievement [3]. We focus on the CSP represented by the variables appearing in the pre and post condition of action schemata instances introduced into the plan. They are associated to a domain which can be reduced during the computation thanks to constraint propagation. However, classical CS approaches [4] need all the information on variable domains at the beginning of the computation. This does not t with a typical networked environment where knowledge is not completely dened at the beginning; there is need of interaction between the low level system and the data processing module, which in our case is a constraint solver. The traditional approach keeps the knowledge acquisition mechanism separated from the CSP resolution. Instead, we describe a method to dynamically acquire the information from the real world during the computational process, making the CSP system itself drive the information gathering process. Our sensing mechanism represents a promising alternative to the sensing actions denition. We associate an information gathering procedure with most of the predicates, appearing as preconditions in the basic actions denition, without need to dene further declarative actions. When these preconditions are tested, they behave as Interactive Constraints [6]; that is, they behave as pure constraints when their variable domains are already dened, otherwise information is gathered from the real world in order to dene the domains. It is worth noting that, those constraints retrieve only information consistent with the context so as to simplify the task of pruning inconsistent alternatives. The context in which this framework works is a Partial Order Planner (POP) whose kernel is similar to the UCPOP algorithm [5]. As all the POP algorithms, our planner performs least commitment on ordering decisions. It does not commit prematurely to a complete, totally ordered sequence of actions. Plans are represented as a partially ordered sequence, and only the essential ordering decisions are recorded into a set O. During the planning process the consistency of O has to be ensured. In this context the planner needs also to ensure that the dierent actions introduced for dierent goals do not interfere each other. Casual links (set L) record the dependencies between actions so as, when a threat to one of these links, (i.e., a newly introduced action which might interferes with past decisions), is detected, the planner makes some commitments in order to remove it. As the UCPOP algorithm, our planner starts by generating the NullP lan with the dummy actions Start and End. Start has no preconditions and its postconditions consist of a set, 4

5 called InitialState (IS). IS contains the knowledge of the underlying system that the planner is aware of, while in a traditional generative planner it represents all the true facts in the real world. All the knowledge in IS is organized in information clusters according to the \type" of the object to which the information is referred. For instance as far as the object type \le" is concerned, in the IS there will be facts structured as follows: file(rights; name; path; disk; dim; type; date). In our framework IS is not a static set, but grows continuously according to the new information retrieved by the planner. The End action has no eects, and its preconditions are the conjunction of the goals of the planning problem. All these conjuncts are initially put into an Agenda representing the set of subgoals the planner has to satisfy. During the planning process, as soon as a new action is introduced into the plan, its preconditions are added to Agenda. Since the planner treats preconditions as constraint, as soon as it selects one item from the Agenda it will put it into the constraint store. These constraint are called `Interactive Constraints' (IC) since on one hand they represent constraints of the plan (precisely they represent constraints between the variables of the predicate itself), on the other hand they are \interactive" because they treat also the case in which the domains of these variables are not yet completely dened into the planning problem, (i.e., the IS set does not cointain all the information on the variables of the precondition itself). In these cases such constraints run low level functions that work as access modules to the real world which will retrieve the values of the variable domain satisfying the constraint represented by the predicate under consideration. In other words those variables range on partially dened domain D i = fdef i [ Undef i g where Def i represents the set of dened values of the variable i and Undef i represents the information not yet available which can be gathered by knowledge acquisition. The implementation of an interactive constraints is uniformly associated with each predicate. Note that we make the assumption that all the predicates are expressed as binary constraints. Operationally, they work as follows: 1. If no variable is associated to a domain, suspend the constraint; 2. else, if both the variables are associated to a domain, propagate the constraint; in this case it can return: (a) the previous domains pruned from all the values not consistent with the constraint itself; if one of the domain is empty the procedure returns a failure; else suspend the constraint. (b) the same domain if all the previously existing values satisfy the constraint; 3. else, if no domain is associated to one of the variables, knowledge acquisition is performed; the procedure returns: (a) a nite set of values representing the domain associated to the variable; update IS; suspend the constraint again; (b) an empty set; in this case the procedure results in a failure; 4. else if both variables are instantiated the procedure returns a boolean value: 5

6 (a) the true value means satisfaction; (b) the false value results in a failure. These constraints are awaked, during the planning process, when some variables are instantiated or their domain pruned. The main steps of the algorithm are the following: PLAN(hA; O; Li) 1. Termination. If the Agenda is empty then perform the labeling of not yet instantiated variables and return ha; O; Li. 2. Goal selection. Choose a pair hq; A k i from the Agenda where A k belongs to the set A of actions already instantiated and Q is a precondition of A k. 3. Action selection. Choose no deterministically either Start or an action A j (either newly instantiated from the domain theory, or already in A) which can be consistently ordered prior to A k and whose eects cointain a conjunct R that unies with Q consistenly with the constraints of the problem. if the chosen action is Start then call the Interactive Constraint associated to Q (IC(Q)): if IC(Q) does not fail (i.e. Start satises Q) then Update L: L1 = L [ fstart Q! A k g, Update O: O1 = O [ fstart < A k g [ fa k < endg; else fail. else Unify Q with R Q Update L: L1 = L [ fa j! A k g, Update O: O1 = O [ fa j < A k g, if A j is a newly instantiated action then Update A: A1 = A [ fa j g 8 precondition Q i of A j : Agenda = Agenda + hq i ; A j i else if no such action exists then return failure; 4. Update the goal set. Agenda = Agenda? hq; A k i 5. Casual link protection. For each causal link c = fa i q! A j g 2 L and for each Action A t threatening c choose a consistent ordering constraint, by either demotion (A j < A t ) or promotion (A t < A i ). If neither constraint is consistent, then return failure. 6. Recursive invocation of PLAN(hA; O; Li). 6

7 4 Example in the eld of network systems We are currently implementing some of these constraints by using the nite domain libraries of ECL i P S e [1], a Constraint Logic Programming (CLP) system. CLP is an approach to programming which merges all the features and advantages of Logic Programming and Constraint Satisfaction techniques [2, 4]. CLP(FD) can be used to represent planning problems as CSPs. In order to see how our planner works, we present an example in the eld of network management. Let's suppose to have as goal the task to move the le \mydocument" in the disk \B" and let's suppose that this le is initially located in disk \A". In the domain theory there are the following two action schemata: Action MakeSpace(Disk) - Preconditions: disk(disk), le(file), type(file; \tmp"), ondisk(file; Disk), fdim(file; Dimens), dspace(disk; Fs). Postconditions: dspace(disk; Fs + Dimens), not le(file), not ondisk(file; Disk). Action MvFileToDisk(File; Disk1 ; Disk2 ) - Preconditions: disk(disk1 ), disk(disk2 ), le(file), Disk1 6= Disk2, dspace(disk1 ; Fs1 ) ondisk(file; Disk1 ), fdim(file; Dim), dspace(disk2 ; Fs2 ), Fs2 Dim. Postconditions: ondisk(file; Disk2 ); dspace(disk2 ; Fs2? Dim), not ondisk(file; Disk1 ), dspace(disk1 ; Fs1 + Dim). The former is devoted to free some space on a disk by deleting some \:tmp" les. The latter moves a le from a location to another. Our goal is G = ondisk(\mydocument"; \B"). If the planner tries to verify the goal in the initial state it nds that IS is empty, thus it needs to acquire information from the underlying system. Since both the variables are bound the low level procedure associated to the predicate ondisk(f ile; Disk) will return a boolean value, f alse in this case, which means failure. Thus, the goal can not be satised from the action Start. The planner introduces into the plan the action MvF ilet odisk(f ile; Disk1; Disk2) since one of its eect, ondisk(f ile; Disk2) unies with G, with F ile instantiated to the value \mydocument", and Disk2 to \B". The sets A, O, L and Agenda are update. In order to verify if Start satises the precondition ondisk(\mydocument"; Disk1), since the domain of Disk1 is still undened, the planner needs to acquire, from the underlying system, the values of the variable Disk1 satisfying the predicate ondisk. Here we are supposing that only disk \A" contains a le named \mydocument", thus the domain of Disk1 is represented exclusively from the value \A". Disk1 is instantiated to the value \A", and the fact file(rights; \mydocument"; path; \A"; dim; type; date) is added to IS along with the fact disk(\a"; dimens; partitions; f reespace; :::); nally the sets O and L are updated. When the planner veries f dim(\mydocument"; Dim) in the initial state, it nds the values of the domain of Dim in the item \dim" of the les whose name is \mydocument". The value returned is the actual dimension \size" of \mydocument": Start satises f dim(\mydocument"; \size"). The algorithm instantiates the variable Dim to \size" 7

8 and updates O and L. To check if Start satises dspace(\b"; F s2) the planner would need to perform knowledge acquisition; the value returned is the actual free space of the disk \B", \f reeb"; the information disk(\b"; dimens; partitions; \f reeb"; :::) is added to IS. If the value \freeb" veries the constraint F s2 \size" it means that the condition is satised in the initial state, thus F s2 is instantiated to the value \freeb", O and L are updated and the plan returned. Otherwise, the planner performs a backtracking step and goes on considering other actions (dierent from Start) in order to nd those that can satisfy the constraints dspace(\b"; F s2), consistently with the constraint F s2 \size". If the action M akespace(disk) is selected, the variable Disk is istantiated to the value \B" and, the variable F s2 is unied with F s + Dimens, then the constraint F s2 \size" becomes F s + Dimens \size". When the condition ondisk(f ile; \B") is considered, the domain of F ile is acquired by the interactive constraint associated and it cointains all the les of the disk \B". For each of them a fact file(rights; name; path; \B"; dim; type; date) is added to the IS set so as the verication of the precondition type(f ile; \tmp") will result in a propagation of the constraint on the domain of F ile. All the values but the les \:tmp" will be pruned from this domain. Furthermore, in order to verify dspace(\b"; F s) in the initial state the variable F s is instantiated to the values \f reeb". When f dim(f ile; Dimens) is selected the planner nds the information needed in IS; the domain of F ile is pruned from all the values whose dimension does not satisfy the constraint \freeb" + Dimens \size". If the domain becomes empty it means that there is need to delete more than one le in order to obtain the free space needed; thus iteratively the plan will add an instance of the actions M akespace(disk) until the constraint \f reeb"f+dimensg \size" will be satised. 5 Conclusion and future work We presented an hybrid approach to planning which integrates the problem solving ability of a generative planner and the capacity of acquiring information on demand typical of a reactive planner. We provided it with an ICSP model which allows the planner to exploit Constraint Satisfaction techniques to improve its eciency both during the computation of the plan and in the knowledge acquisition activity. Particularly, this framework makes it possible to integrate the two processes driving the planner in its decisions by means of constraints maintenance and propagation. The work in progress mostly regards the application of the planner to a computer network domain. One of our main purpose is to reduce as much as possible the interaction of the planner with the real system so as to avoid sensor abuse, by providing it with a mechanism to know when to stop sensing. A good approach is the one that use the Local Closed World (LCW) [7] assumption instead than the OWA which basically consists in adding a LCW annotation all the time the knowledge of the planner about a kind of information is complete. In the IS set knowledge is represented in such a way that allows the planner to reason about local closed world information, so as to avoid redundant information gathering activity. In practice we want to explicit the fact that the planner is aware of everything about a circumscripted set of information, i.e. if the planner performs knowledge acquisition with 8

9 the predicate ondisk(f; Disk1), it means that afterwards it will be aware of all the les on Disk1, thus it adds to the IS, the information LCW (ondisk(disk1)). We are also considering the possibility to interface the planner with a \proxy" system, instead than directly with the real world, which would behave as a knowledge acquisition module. In this context it would be possible to further reduce the number of sensing operations by querying this system with conjunction of goals concerning the same variable so as to retrieve only information consistent with all the conjuncts. In the example above, the preconditions type(f ile; \tmp") and ondisk(f ile; \B") would be veried as conjunction by retrieving, for the variable F ile, those values whose type is \tmp" and whose location is disk \B". References [1] ECL i PS e User Manual Release 3.3, ECRC [2] J.Jaar, M.J.Maher, \Constraint Logic Programming: a Survey", Journal of Logic Programming on 10 years of Logic Programming, [3] D.Joslin, M.Pollack, \Passive and Active Decision Postponment", Proceedings of European Workshop of Planning, [4] P.Van Hentenryck, \Constraint Satisfaction in Logic Programming", MIT Press, [5] D.S. Weld, \An Introduction to Least Commitment Planning", AI Magazine, vol. 15, 1994, pp. 27{61. [6] E. Lamma, M. Milano, R. Cucchiara, P. Mello, \An Interactive Constraint based system for selective attention in Visual search", Proceedings of the 10th ISMIS, [7] K. Golden, \Planning and Knowledge Representation for Softbots", PHD Thesis, University of Washgton, 1997 [8] R.J. Firby, \Adaptive Execution in Complex Dynamic Worlds", Yale University, 1989 [9] J. Lever, B. Richards, \parcplan: a Planning Architecture with Parallel Actions, Resources and Constraints", Proceedings of the 8th ISMIS, [10] K. Golden, D. Weld, \Representing sensing actions: The middle ground revisited", Proceedings of the 5th Int. Conf. on Knowledge Representation and Reasoning, [11] M. Peot, D. Smith, \Conditional Nonlinear Planning" Proceedings of the 1st Int. Conf. on Principles of Knowledge Representation and Reasoning, [12] Subbarao Kambhampati, \Using Disjunctive orderings instead of Conict Resolution in Partial order planning", Technical Report, Department of Computer Science and Engineering Arizona State University, January [13] Qiang Yang, \A theory of conict resolution in planning", Articial Intelligence, no. 58 (1992), Elsevier Science Publisher, pp. 361{392. 9

Two Problems - Two Solutions: One System - ECLiPSe. Mark Wallace and Andre Veron. April 1993

Two Problems - Two Solutions: One System - ECLiPSe. Mark Wallace and Andre Veron. April 1993 Two Problems - Two Solutions: One System - ECLiPSe Mark Wallace and Andre Veron April 1993 1 Introduction The constraint logic programming system ECL i PS e [4] is the successor to the CHIP system [1].

More information

Planning as Search. Progression. Partial-Order causal link: UCPOP. Node. World State. Partial Plans World States. Regress Action.

Planning as Search. Progression. Partial-Order causal link: UCPOP. Node. World State. Partial Plans World States. Regress Action. Planning as Search State Space Plan Space Algorihtm Progression Regression Partial-Order causal link: UCPOP Node World State Set of Partial Plans World States Edge Apply Action If prec satisfied, Add adds,

More information

A deterministic action is a partial function from states to states. It is partial because not every action can be carried out in every state

A deterministic action is a partial function from states to states. It is partial because not every action can be carried out in every state CmSc310 Artificial Intelligence Classical Planning 1. Introduction Planning is about how an agent achieves its goals. To achieve anything but the simplest goals, an agent must reason about its future.

More information

Algebraic Properties of CSP Model Operators? Y.C. Law and J.H.M. Lee. The Chinese University of Hong Kong.

Algebraic Properties of CSP Model Operators? Y.C. Law and J.H.M. Lee. The Chinese University of Hong Kong. Algebraic Properties of CSP Model Operators? Y.C. Law and J.H.M. Lee Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR, China fyclaw,jleeg@cse.cuhk.edu.hk

More information

KI-Programmierung. Planning

KI-Programmierung. Planning KI-Programmierung Planning Bernhard Beckert UNIVERSITÄT KOBLENZ-LANDAU Winter Term 2007/2008 B. Beckert: KI-Programmierung p.1 Outline Search vs. planning STRIPS operators Partial-order planning The real

More information

Planning with Execution and Incomplete Information Keith Golden Oren Etzioni Daniel Weld 3 Department of Computer Science and Engineering University o

Planning with Execution and Incomplete Information Keith Golden Oren Etzioni Daniel Weld 3 Department of Computer Science and Engineering University o Planning with Execution and Incomplete Information Keith Golden, Oren Etzioni and Daniel Weld Technical Report UW-CSE-96-01-09 Department of Computer Science and Engineering University of Washington Department

More information

size, runs an existing induction algorithm on the rst subset to obtain a rst set of rules, and then processes each of the remaining data subsets at a

size, runs an existing induction algorithm on the rst subset to obtain a rst set of rules, and then processes each of the remaining data subsets at a Multi-Layer Incremental Induction Xindong Wu and William H.W. Lo School of Computer Science and Software Ebgineering Monash University 900 Dandenong Road Melbourne, VIC 3145, Australia Email: xindong@computer.org

More information

Issues in Interleaved Planning and Execution

Issues in Interleaved Planning and Execution From: AAAI Technical Report WS-98-02. Compilation copyright 1998, AAAI (www.aaai.org). All rights reserved. Issues in Interleaved Planning and Execution Scott D. Anderson Spelman College, Atlanta, GA andorson

More information

2 Keywords Backtracking Algorithms, Constraint Satisfaction Problem, Distributed Articial Intelligence, Iterative Improvement Algorithm, Multiagent Sy

2 Keywords Backtracking Algorithms, Constraint Satisfaction Problem, Distributed Articial Intelligence, Iterative Improvement Algorithm, Multiagent Sy 1 The Distributed Constraint Satisfaction Problem: Formalization and Algorithms IEEE Trans. on Knowledge and DATA Engineering, vol.10, No.5 September 1998 Makoto Yokoo, Edmund H. Durfee, Toru Ishida, and

More information

Interpreting Abduction in CLP

Interpreting Abduction in CLP Interpreting Abduction in CLP M. Gavanelli 1, E. Lamma 1, P. Mello 2, M. Milano 2, and P. Torroni 2 1 Dip. di Ingegneria, Università di Ferrara Via Saragat 1, 44100 Ferrara, Italy {mgavanelli, elamma}@ing.unife.it

More information

The element the node represents End-of-Path marker e The sons T

The element the node represents End-of-Path marker e The sons T A new Method to index and query Sets Jorg Homann Jana Koehler Institute for Computer Science Albert Ludwigs University homannjkoehler@informatik.uni-freiburg.de July 1998 TECHNICAL REPORT No. 108 Abstract

More information

Formalizing the PRODIGY Planning Algorithm

Formalizing the PRODIGY Planning Algorithm Formalizing the PRODIGY Planning Algorithm Eugene Fink eugene@cs.cmu.edu http://www.cs.cmu.edu/~eugene Manuela Veloso veloso@cs.cmu.edu http://www.cs.cmu.edu/~mmv Computer Science Department, Carnegie

More information

Validating Plans with Durative Actions via Integrating Boolean and Numerical Constraints

Validating Plans with Durative Actions via Integrating Boolean and Numerical Constraints Validating Plans with Durative Actions via Integrating Boolean and Numerical Constraints Roman Barták Charles University in Prague, Faculty of Mathematics and Physics Institute for Theoretical Computer

More information

Planning. Qiang Yang Shuo Bai and Guiyou Qiu. Department of Computer Science National Research Center for

Planning. Qiang Yang Shuo Bai and Guiyou Qiu. Department of Computer Science National Research Center for A Framework for Automatic Problem Decomposition in Planning Qiang Yang Shuo Bai and Guiyou Qiu Department of Computer Science National Research Center for University ofwaterloo Intelligint Computing Systems

More information

Integrating HTN Planning and Semantic Web Ontologies for Efficient Information Integration

Integrating HTN Planning and Semantic Web Ontologies for Efficient Information Integration Integrating HTN Planning and Semantic Web Ontologies for Efficient Information Integration Jeff Heflin and Hector Muñoz-Avila Dept. of Computer Science & Engineering Lehigh University 19 Memorial Drive

More information

Towards a Reference Framework. Gianpaolo Cugola and Carlo Ghezzi. [cugola, P.za Leonardo da Vinci 32.

Towards a Reference Framework. Gianpaolo Cugola and Carlo Ghezzi. [cugola, P.za Leonardo da Vinci 32. Inconsistencies in Software Development: Towards a Reference Framework Gianpaolo Cugola and Carlo Ghezzi [cugola, ghezzi]@elet.polimi.it Dipartimento di Elettronica e Informazione Politecnico di Milano

More information

LOGICAL OPERATOR USAGE IN STRUCTURAL MODELLING

LOGICAL OPERATOR USAGE IN STRUCTURAL MODELLING LOGICAL OPERATOR USAGE IN STRUCTURAL MODELLING Ieva Zeltmate (a) (a) Riga Technical University, Faculty of Computer Science and Information Technology Department of System Theory and Design ieva.zeltmate@gmail.com

More information

P Is Not Equal to NP. ScholarlyCommons. University of Pennsylvania. Jon Freeman University of Pennsylvania. October 1989

P Is Not Equal to NP. ScholarlyCommons. University of Pennsylvania. Jon Freeman University of Pennsylvania. October 1989 University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science October 1989 P Is Not Equal to NP Jon Freeman University of Pennsylvania Follow this and

More information

A Boolean Expression. Reachability Analysis or Bisimulation. Equation Solver. Boolean. equations.

A Boolean Expression. Reachability Analysis or Bisimulation. Equation Solver. Boolean. equations. A Framework for Embedded Real-time System Design? Jin-Young Choi 1, Hee-Hwan Kwak 2, and Insup Lee 2 1 Department of Computer Science and Engineering, Korea Univerity choi@formal.korea.ac.kr 2 Department

More information

Constraint (Logic) Programming

Constraint (Logic) Programming Constraint (Logic) Programming Roman Barták Faculty of Mathematics and Physics, Charles University in Prague, Czech Republic bartak@ktiml.mff.cuni.cz Sudoku Combinatorial puzzle, whose goal is to enter

More information

Summary: Issues / Open Questions:

Summary: Issues / Open Questions: Summary: The paper introduces Transitional Locking II (TL2), a Software Transactional Memory (STM) algorithm, which tries to overcomes most of the safety and performance issues of former STM implementations.

More information

Chapter 9: Constraint Logic Programming

Chapter 9: Constraint Logic Programming 9. Constraint Logic Programming 9-1 Deductive Databases and Logic Programming (Winter 2007/2008) Chapter 9: Constraint Logic Programming Introduction, Examples Basic Query Evaluation Finite Domain Constraint

More information

A CSP Search Algorithm with Reduced Branching Factor

A CSP Search Algorithm with Reduced Branching Factor A CSP Search Algorithm with Reduced Branching Factor Igor Razgon and Amnon Meisels Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, 84-105, Israel {irazgon,am}@cs.bgu.ac.il

More information

Which Role for an Ontology of Uncertainty?

Which Role for an Ontology of Uncertainty? Which Role for an Ontology of Uncertainty? Paolo Ceravolo, Ernesto Damiani, Marcello Leida Dipartimento di Tecnologie dell Informazione - Università degli studi di Milano via Bramante, 65-26013 Crema (CR),

More information

such internal data dependencies can be formally specied. A possible approach to specify

such internal data dependencies can be formally specied. A possible approach to specify Chapter 6 Specication and generation of valid data unit instantiations In this chapter, we discuss the problem of generating valid data unit instantiations. As valid data unit instantiations must adhere

More information

avid E, Smith 1 Introduction 2 Operator graphs

avid E, Smith 1 Introduction 2 Operator graphs From: AAAI-93 Proceedings. Copyright 1993, AAAI (www.aaai.org). All rights reserved. avid E, Smith Rockwell International 444 High St. Palo Alto, California 94301 de2smith@rpal.rockwell.com Department

More information

second_language research_teaching sla vivian_cook language_department idl

second_language research_teaching sla vivian_cook language_department idl Using Implicit Relevance Feedback in a Web Search Assistant Maria Fasli and Udo Kruschwitz Department of Computer Science, University of Essex, Wivenhoe Park, Colchester, CO4 3SQ, United Kingdom fmfasli

More information

On Object Orientation as a Paradigm for General Purpose. Distributed Operating Systems

On Object Orientation as a Paradigm for General Purpose. Distributed Operating Systems On Object Orientation as a Paradigm for General Purpose Distributed Operating Systems Vinny Cahill, Sean Baker, Brendan Tangney, Chris Horn and Neville Harris Distributed Systems Group, Dept. of Computer

More information

Slot Models for Schedulers Enhanced by Planning Capabilities

Slot Models for Schedulers Enhanced by Planning Capabilities Slot Models for Schedulers Enhanced by Planning Capabilities Roman Barták * Charles University, Faculty of Mathematics and Physics Department of Theoretical Computer Science Malostranske namesti 2/25,

More information

Kalev Kask and Rina Dechter. Department of Information and Computer Science. University of California, Irvine, CA

Kalev Kask and Rina Dechter. Department of Information and Computer Science. University of California, Irvine, CA GSAT and Local Consistency 3 Kalev Kask and Rina Dechter Department of Information and Computer Science University of California, Irvine, CA 92717-3425 fkkask,dechterg@ics.uci.edu Abstract It has been

More information

Operational Semantics

Operational Semantics 15-819K: Logic Programming Lecture 4 Operational Semantics Frank Pfenning September 7, 2006 In this lecture we begin in the quest to formally capture the operational semantics in order to prove properties

More information

VS 3 : SMT Solvers for Program Verification

VS 3 : SMT Solvers for Program Verification VS 3 : SMT Solvers for Program Verification Saurabh Srivastava 1,, Sumit Gulwani 2, and Jeffrey S. Foster 1 1 University of Maryland, College Park, {saurabhs,jfoster}@cs.umd.edu 2 Microsoft Research, Redmond,

More information

GSAT and Local Consistency

GSAT and Local Consistency GSAT and Local Consistency Kalev Kask Computer Science Department University of California at Irvine Irvine, CA 92717 USA Rina Dechter Computer Science Department University of California at Irvine Irvine,

More information

Rajiv Chopra, Rohini Srihari and Anthony Ralston. labeling problem. However, these are dicult to

Rajiv Chopra, Rohini Srihari and Anthony Ralston. labeling problem. However, these are dicult to Expensive Constraints and HyperArc-Consistency Rajiv Chopra, Rohini Srihari and Anthony Ralston Dept. of Computer Science, SUNY at Bualo 224 Bell Hall, Amherst NY 14214 frchopra,rohini,ralstong@cs.buffalo.edu

More information

An Experimental CLP Platform for Integrity Constraints and Abduction

An Experimental CLP Platform for Integrity Constraints and Abduction An Experimental CLP Platform for Integrity Constraints and Abduction Slim Abdennadher and Henning Christiansen Computer Science Department, University of Munich Oettingenstr. 67, 80538 München, Germany

More information

Searching with Partial Information

Searching with Partial Information Searching with Partial Information Above we (unrealistically) assumed that the environment is fully observable and deterministic Moreover, we assumed that the agent knows what the effects of each action

More information

Search. Krzysztof Kuchcinski. Department of Computer Science Lund Institute of Technology Sweden.

Search. Krzysztof Kuchcinski. Department of Computer Science Lund Institute of Technology Sweden. Search Krzysztof Kuchcinski Krzysztof.Kuchcinski@cs.lth.se Department of Computer Science Lund Institute of Technology Sweden January 12, 2015 Kris Kuchcinski (LTH) Search January 12, 2015 1 / 46 Search

More information

of m clauses, each containing the disjunction of boolean variables from a nite set V = fv 1 ; : : : ; vng of size n [8]. Each variable occurrence with

of m clauses, each containing the disjunction of boolean variables from a nite set V = fv 1 ; : : : ; vng of size n [8]. Each variable occurrence with A Hybridised 3-SAT Algorithm Andrew Slater Automated Reasoning Project, Computer Sciences Laboratory, RSISE, Australian National University, 0200, Canberra Andrew.Slater@anu.edu.au April 9, 1999 1 Introduction

More information

Planning. Philipp Koehn. 30 March 2017

Planning. Philipp Koehn. 30 March 2017 Planning Philipp Koehn 30 March 2017 Outline 1 Search vs. planning STRIPS operators Partial-order planning The real world Conditional planning Monitoring and replanning 2 search vs. planning Search vs.

More information

Chapter 2 Overview of the Design Methodology

Chapter 2 Overview of the Design Methodology Chapter 2 Overview of the Design Methodology This chapter presents an overview of the design methodology which is developed in this thesis, by identifying global abstraction levels at which a distributed

More information

General Methods and Search Algorithms

General Methods and Search Algorithms DM811 HEURISTICS AND LOCAL SEARCH ALGORITHMS FOR COMBINATORIAL OPTIMZATION Lecture 3 General Methods and Search Algorithms Marco Chiarandini 2 Methods and Algorithms A Method is a general framework for

More information

CMPUT Language Paradigms. Programming Paradigms. Dr. B. Price & Dr. R. Greiner. 7th September Real languages draw upon multiple paradigms

CMPUT Language Paradigms. Programming Paradigms. Dr. B. Price & Dr. R. Greiner. 7th September Real languages draw upon multiple paradigms CMPUT 325 - Language Paradigms Dr. B. Price & Dr. R. Greiner 7th September 2004 Dr. B. Price & Dr. R. Greiner CMPUT 325 - Language Paradigms 1 Programming Paradigms Real languages draw upon multiple paradigms

More information

Introduction to Planning COURSE: CS40002

Introduction to Planning COURSE: CS40002 1 Introduction to Planning COURSE: CS40002 Pallab Dasgupta Professor, Dept. of Computer Sc & Engg 2 Outline Planning versus Search Representation of planning problems Situation calculus STRIPS ADL Planning

More information

Dynamic Constraint Models for Planning and Scheduling Problems

Dynamic Constraint Models for Planning and Scheduling Problems Dynamic Constraint Models for Planning and Scheduling Problems Roman Barták * Charles University, Faculty of Mathematics and Physics, Department of Theoretical Computer Science, Malostranske namesti 2/25,

More information

Transparent Access to Legacy Data in Java. Olivier Gruber. IBM Almaden Research Center. San Jose, CA Abstract

Transparent Access to Legacy Data in Java. Olivier Gruber. IBM Almaden Research Center. San Jose, CA Abstract Transparent Access to Legacy Data in Java Olivier Gruber IBM Almaden Research Center San Jose, CA 95120 Abstract We propose in this paper an extension to PJava in order to provide a transparent access

More information

Commitment Least you haven't decided where to go shopping. Or...suppose You can get milk at the convenience store, at the dairy, or at the supermarket

Commitment Least you haven't decided where to go shopping. Or...suppose You can get milk at the convenience store, at the dairy, or at the supermarket Planning as Search-based Problem Solving? Imagine a supermarket shopping scenario using search-based problem solving: Goal: buy milk and bananas Operator: buy Heuristic function: does = milk

More information

Constraint-Directed Backtracking Algorithm. Wanlin Pang. Scott D. Goodwin. May 1996

Constraint-Directed Backtracking Algorithm. Wanlin Pang. Scott D. Goodwin. May 1996 Constraint-Directed Backtracking Algorithm for Constraint-Satisfaction Problems Wanlin Pang Scott D. Goodwin Technical Report CS-96-05 May 1996 cwanlin Pang and Scott D. Goodwin Department of Computer

More information

Modelling Combinatorial Problems for CLP(FD+R) Henk Vandecasteele. Department of Computer Science, K. U. Leuven

Modelling Combinatorial Problems for CLP(FD+R) Henk Vandecasteele. Department of Computer Science, K. U. Leuven Modelling Combinatorial Problems for CLP(FD+R) Henk Vandecasteele Department of Computer Science, K. U. Leuven Celestijnenlaan 200A, B-3001 Heverlee, Belgium henk.vandecasteele@cs.kuleuven.ac.be Robert

More information

Functional Logic Programming. Kristjan Vedel

Functional Logic Programming. Kristjan Vedel Functional Logic Programming Kristjan Vedel Imperative vs Declarative Algorithm = Logic + Control Imperative How? Explicit Control Sequences of commands for the computer to execute Declarative What? Implicit

More information

Constraint Satisfaction Problems

Constraint Satisfaction Problems Constraint Satisfaction Problems CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2013 Soleymani Course material: Artificial Intelligence: A Modern Approach, 3 rd Edition,

More information

Partial-Order Planning with Concurrent Interacting Actions. Abstract

Partial-Order Planning with Concurrent Interacting Actions. Abstract Journal of Articial Intelligence Research 14 (2001) 105{136 Submitted 3/00; published 4/01 Partial-Order Planning with Concurrent Interacting Actions Craig Boutilier Department of Computer Science University

More information

Skill. Robot/ Controller

Skill. Robot/ Controller Skill Acquisition from Human Demonstration Using a Hidden Markov Model G. E. Hovland, P. Sikka and B. J. McCarragher Department of Engineering Faculty of Engineering and Information Technology The Australian

More information

Failure Driven Dynamic Search Control for Partial Order Planners: An Explanation based approach

Failure Driven Dynamic Search Control for Partial Order Planners: An Explanation based approach Failure Driven Dynamic Search Control for Partial Order Planners: An Explanation based approach Subbarao Kambhampati 1 and Suresh Katukam and Yong Qu Department of Computer Science and Engineering, Arizona

More information

Dipartimento di Elettronica Informazione e Bioingegneria. Cognitive Robotics. SATplan. Act1. Pre1. Fact. G. Gini Act2

Dipartimento di Elettronica Informazione e Bioingegneria. Cognitive Robotics. SATplan. Act1. Pre1. Fact. G. Gini Act2 Dipartimento di Elettronica Informazione e Bioingegneria Cognitive Robotics SATplan Pre1 Pre2 @ 2015 Act1 Act2 Fact why SAT (satisfability)? 2 Classical planning has been observed as a form of logical

More information

CIS4/681 { Articial Intelligence 2 > (insert-sort '( )) ( ) 2 More Complicated Recursion So far everything we have dened requires

CIS4/681 { Articial Intelligence 2 > (insert-sort '( )) ( ) 2 More Complicated Recursion So far everything we have dened requires 1 A couple of Functions 1 Let's take another example of a simple lisp function { one that does insertion sort. Let us assume that this sort function takes as input a list of numbers and sorts them in ascending

More information

Cooperative Planning of Independent Agents. through Prototype Evaluation. E.-E. Doberkat W. Hasselbring C. Pahl. University ofdortmund

Cooperative Planning of Independent Agents. through Prototype Evaluation. E.-E. Doberkat W. Hasselbring C. Pahl. University ofdortmund Investigating Strategies for Cooperative Planning of Independent Agents through Prototype Evaluation E.-E. Doberkat W. Hasselbring C. Pahl University ofdortmund Dept. of Computer Science, Informatik 10

More information

Title of Publication: Encyclopedia of Cognitive Science. Article title: Constraint Satisfaction. Article code: 26. Authors: Rina Dechter

Title of Publication: Encyclopedia of Cognitive Science. Article title: Constraint Satisfaction. Article code: 26. Authors: Rina Dechter Title of Publication: Encyclopedia of Cognitive Science. Article title: Constraint Satisfaction. Article code: 26. Authors: Rina Dechter Department of Computer and Information Science University of California,

More information

Lecture Notes on Common Subexpression Elimination

Lecture Notes on Common Subexpression Elimination Lecture Notes on Common Subexpression Elimination 15-411: Compiler Design Frank Pfenning Lecture 18 October 29, 2015 1 Introduction Copy propagation allows us to have optimizations with this form: l :

More information

PROJECTION MODELING SIMPLIFICATION MARKER EXTRACTION DECISION. Image #k Partition #k

PROJECTION MODELING SIMPLIFICATION MARKER EXTRACTION DECISION. Image #k Partition #k TEMPORAL STABILITY IN SEQUENCE SEGMENTATION USING THE WATERSHED ALGORITHM FERRAN MARQU ES Dept. of Signal Theory and Communications Universitat Politecnica de Catalunya Campus Nord - Modulo D5 C/ Gran

More information

Systems Infrastructure for Data Science. Web Science Group Uni Freiburg WS 2014/15

Systems Infrastructure for Data Science. Web Science Group Uni Freiburg WS 2014/15 Systems Infrastructure for Data Science Web Science Group Uni Freiburg WS 2014/15 Lecture II: Indexing Part I of this course Indexing 3 Database File Organization and Indexing Remember: Database tables

More information

Montreal, Canada, Planning, Executing, Sensing, and Replanning. for Information Gathering. Craig A. Knoblock Admiralty Way

Montreal, Canada, Planning, Executing, Sensing, and Replanning. for Information Gathering. Craig A. Knoblock Admiralty Way To appear in the Proceedings of the Fourteenth International Joint Conference on Articial Intelligence, Montreal, Canada, 1995. Planning, Executing, Sensing, and Replanning for Information Gathering Craig

More information

Automatic Generation of Graph Models for Model Checking

Automatic Generation of Graph Models for Model Checking Automatic Generation of Graph Models for Model Checking E.J. Smulders University of Twente edwin.smulders@gmail.com ABSTRACT There exist many methods to prove the correctness of applications and verify

More information

perform. If more storage is required, more can be added without having to modify the processor (provided that the extra memory is still addressable).

perform. If more storage is required, more can be added without having to modify the processor (provided that the extra memory is still addressable). How to Make Zuse's Z3 a Universal Computer Raul Rojas January 14, 1998 Abstract The computing machine Z3, built by Konrad Zuse between 1938 and 1941, could only execute xed sequences of oating-point arithmetical

More information

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA A taxonomy of race conditions. D. P. Helmbold, C. E. McDowell UCSC-CRL-94-34 September 28, 1994 Board of Studies in Computer and Information Sciences University of California, Santa Cruz Santa Cruz, CA

More information

CPSC W2: Assignment #2

CPSC W2: Assignment #2 CPSC 320 2016W2: Assignment #2 January 23, 2017 Please submit this assignment via GradeScope at https://gradescope.com. Detailed instructions about how to do that are pinned to the top of our Piazza board:

More information

Constraint Programming

Constraint Programming Depth-first search Let us go back to foundations: DFS = Depth First Search Constraint Programming Roman Barták Department of Theoretical Computer Science and Mathematical Logic 2 3 4 5 6 7 8 9 Observation:

More information

Assign auniquecodeto each state to produce a. Given jsj states, needed at least dlog jsje state bits. (minimum width encoding), at most jsj state bits

Assign auniquecodeto each state to produce a. Given jsj states, needed at least dlog jsje state bits. (minimum width encoding), at most jsj state bits State Assignment The problem: Assign auniquecodeto each state to produce a logic level description. Given jsj states, needed at least dlog jsje state bits (minimum width encoding), at most jsj state bits

More information

has to choose. Important questions are: which relations should be dened intensionally,

has to choose. Important questions are: which relations should be dened intensionally, Automated Design of Deductive Databases (Extended abstract) Hendrik Blockeel and Luc De Raedt Department of Computer Science, Katholieke Universiteit Leuven Celestijnenlaan 200A B-3001 Heverlee, Belgium

More information

1 Recursion. 2 Recursive Algorithms. 2.1 Example: The Dictionary Search Problem. CSci 235 Software Design and Analysis II Introduction to Recursion

1 Recursion. 2 Recursive Algorithms. 2.1 Example: The Dictionary Search Problem. CSci 235 Software Design and Analysis II Introduction to Recursion 1 Recursion Recursion is a powerful tool for solving certain kinds of problems. Recursion breaks a problem into smaller problems that are identical to the original, in such a way that solving the smaller

More information

Hybrid Constraint Programming and Metaheuristic methods for Large Scale Optimization Problems

Hybrid Constraint Programming and Metaheuristic methods for Large Scale Optimization Problems Hybrid Constraint Programming and Metaheuristic methods for Large Scale Optimization Problems Fabio Parisini Tutor: Paola Mello Co-tutor: Michela Milano Final seminars of the XXIII cycle of the doctorate

More information

A New Algorithm for Singleton Arc Consistency

A New Algorithm for Singleton Arc Consistency A New Algorithm for Singleton Arc Consistency Roman Barták, Radek Erben Charles University, Institute for Theoretical Computer Science Malostranské nám. 2/25, 118 Praha 1, Czech Republic bartak@kti.mff.cuni.cz,

More information

SAMOS: an Active Object{Oriented Database System. Stella Gatziu, Klaus R. Dittrich. Database Technology Research Group

SAMOS: an Active Object{Oriented Database System. Stella Gatziu, Klaus R. Dittrich. Database Technology Research Group SAMOS: an Active Object{Oriented Database System Stella Gatziu, Klaus R. Dittrich Database Technology Research Group Institut fur Informatik, Universitat Zurich fgatziu, dittrichg@ifi.unizh.ch to appear

More information

Structure and Complexity in Planning with Unary Operators

Structure and Complexity in Planning with Unary Operators Structure and Complexity in Planning with Unary Operators Carmel Domshlak and Ronen I Brafman ½ Abstract In this paper we study the complexity of STRIPS planning when operators have a single effect In

More information

Ordering Problem Subgoals

Ordering Problem Subgoals Ordering Problem Subgoals Jie Cheng and Keki B. Irani Artificial Intelligence Laboratory Department of Electrical Engineering and Computer Science The University of Michigan, Ann Arbor, MI 48109-2122,

More information

Lecture Notes on Linear Search

Lecture Notes on Linear Search Lecture Notes on Linear Search 15-122: Principles of Imperative Computation Frank Pfenning Lecture 5 January 28, 2014 1 Introduction One of the fundamental and recurring problems in computer science is

More information

Intelligent Agents. State-Space Planning. Ute Schmid. Cognitive Systems, Applied Computer Science, Bamberg University. last change: 14.

Intelligent Agents. State-Space Planning. Ute Schmid. Cognitive Systems, Applied Computer Science, Bamberg University. last change: 14. Intelligent Agents State-Space Planning Ute Schmid Cognitive Systems, Applied Computer Science, Bamberg University last change: 14. April 2016 U. Schmid (CogSys) Intelligent Agents last change: 14. April

More information

Worst-case running time for RANDOMIZED-SELECT

Worst-case running time for RANDOMIZED-SELECT Worst-case running time for RANDOMIZED-SELECT is ), even to nd the minimum The algorithm has a linear expected running time, though, and because it is randomized, no particular input elicits the worst-case

More information

A Hybrid Algorithm for Compiling Equality. Constraints and its Implementation. Department of Computer and Information Science

A Hybrid Algorithm for Compiling Equality. Constraints and its Implementation. Department of Computer and Information Science URL: http://www.elsevier.nl/locate/entcs/volume30.html 9 pages A Hybrid Algorithm for Compiling Equality Constraints and its Implementation Neng-Fa Zhou Department of Computer and Information Science Brooklyn

More information

EMPLOYING DOMAIN KNOWLEDGE TO IMPROVE AI PLANNING EFFICIENCY *

EMPLOYING DOMAIN KNOWLEDGE TO IMPROVE AI PLANNING EFFICIENCY * Iranian Journal of Science & Technology, Transaction B, Engineering, Vol. 29, No. B1 Printed in The Islamic Republic of Iran, 2005 Shiraz University EMPLOYING DOMAIN KNOWLEDGE TO IMPROVE AI PLANNING EFFICIENCY

More information

Chapter 6 Planning-Graph Techniques

Chapter 6 Planning-Graph Techniques Lecture slides for Automated Planning: Theory and Practice Chapter 6 Planning-Graph Techniques Dana S. Nau CMSC 722, AI Planning University of Maryland, Spring 2008 1 Motivation A big source of inefficiency

More information

Lecture Notes on Binary Decision Diagrams

Lecture Notes on Binary Decision Diagrams Lecture Notes on Binary Decision Diagrams 15-122: Principles of Imperative Computation William Lovas Notes by Frank Pfenning Lecture 25 April 21, 2011 1 Introduction In this lecture we revisit the important

More information

Dynamic Constraint Models for Planning and Scheduling Problems

Dynamic Constraint Models for Planning and Scheduling Problems Dynamic Constraint Models for Planning and Scheduling Problems Roman Barták * Charles University, Faculty of Mathematics and Physics, Department of Theoretical Computer Science, Malostranske namesti 2/25,

More information

University of Waterloo Midterm Examination Solution

University of Waterloo Midterm Examination Solution University of Waterloo Midterm Examination Solution Winter, 2011 1. (6 total marks) The diagram below shows an extensible hash table with four hash buckets. Each number x in the buckets represents an entry

More information

Hybrid Algorithms for SAT. Irina Rish and Rina Dechter.

Hybrid Algorithms for SAT. Irina Rish and Rina Dechter. To Guess or to Think? Hybrid Algorithms for SAT Irina Rish and Rina Dechter Information and Computer Science University of California, Irvine fdechter,irinarg@ics.uci.edu http://www.ics.uci.edu/f~irinar,~dechterg

More information

Set 9: Planning Classical Planning Systems. ICS 271 Fall 2013

Set 9: Planning Classical Planning Systems. ICS 271 Fall 2013 Set 9: Planning Classical Planning Systems ICS 271 Fall 2013 Outline: Planning Classical Planning: Situation calculus PDDL: Planning domain definition language STRIPS Planning Planning graphs Readings:

More information

Document Image Restoration Using Binary Morphological Filters. Jisheng Liang, Robert M. Haralick. Seattle, Washington Ihsin T.

Document Image Restoration Using Binary Morphological Filters. Jisheng Liang, Robert M. Haralick. Seattle, Washington Ihsin T. Document Image Restoration Using Binary Morphological Filters Jisheng Liang, Robert M. Haralick University of Washington, Department of Electrical Engineering Seattle, Washington 98195 Ihsin T. Phillips

More information

Lecture Notes on Memory Layout

Lecture Notes on Memory Layout Lecture Notes on Memory Layout 15-122: Principles of Imperative Computation Frank Pfenning André Platzer Lecture 11 1 Introduction In order to understand how programs work, we can consider the functions,

More information

Runtime Checking and Test Case Generation for Python

Runtime Checking and Test Case Generation for Python Runtime Checking and Test Case Generation for Python Anna Durrer Master Thesis Chair of Programming Methodology D-INFK ETH Supervisor: Marco Eilers, Prof. Peter Müller 24. Mai 2017 1 Introduction This

More information

CS 4100 // artificial intelligence

CS 4100 // artificial intelligence CS 4100 // artificial intelligence instructor: byron wallace Constraint Satisfaction Problems Attribution: many of these slides are modified versions of those distributed with the UC Berkeley CS188 materials

More information

Rina Dechter. Irvine, California, USA A constraint satisfaction problem (csp) dened over a constraint network

Rina Dechter. Irvine, California, USA A constraint satisfaction problem (csp) dened over a constraint network Constraint Satisfaction Rina Dechter Department of Computer and Information Science University of California, Irvine Irvine, California, USA 92717 dechter@@ics.uci.edu A constraint satisfaction problem

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

Multi-event IDS Categories. Introduction to Misuse Intrusion Detection Systems (IDS) Formal Specification of Intrusion Signatures and Detection Rules

Multi-event IDS Categories. Introduction to Misuse Intrusion Detection Systems (IDS) Formal Specification of Intrusion Signatures and Detection Rules Formal Specification of Intrusion Signatures and Detection Rules By Jean-Philippe Pouzol and Mireille Ducassé 15 th IEEE Computer Security Foundations Workshop 2002 Presented by Brian Kellogg CSE914: Formal

More information

Planning and Acting. CITS3001 Algorithms, Agents and Artificial Intelligence. 2018, Semester 2

Planning and Acting. CITS3001 Algorithms, Agents and Artificial Intelligence. 2018, Semester 2 Planning and Acting CITS3001 Algorithms, Agents and Artificial Intelligence Tim French School of Computer Science and Software Engineering The University of Western Australia 2018, Semester 2 Summary We

More information

Continuous Plan Evaluation with Incomplete Action Descriptions

Continuous Plan Evaluation with Incomplete Action Descriptions Continuous Plan Evaluation with Incomplete Action Descriptions Andrew Garland and Neal Lesh Mitsubishi Electric Research Laboratories {garland,lesh}@merl.com Abstract In complex environments, a planning

More information

CSE 473: Artificial Intelligence

CSE 473: Artificial Intelligence CSE 473: Artificial Intelligence Constraint Satisfaction Luke Zettlemoyer Multiple slides adapted from Dan Klein, Stuart Russell or Andrew Moore What is Search For? Models of the world: single agent, deterministic

More information

SCOS-2000 Technical Note

SCOS-2000 Technical Note SCOS-2000 Technical Note MDA Study Prototyping Technical Note Document Reference: Document Status: Issue 1.0 Prepared By: Eugenio Zanatta MDA Study Prototyping Page: 2 Action Name Date Signature Prepared

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Inconsistency and Redundancy Do Not Imply Irrelevance

Inconsistency and Redundancy Do Not Imply Irrelevance From: AAAI Technical Report FS-94-02. Compilation copyright 1994, AAAI (www.aaai.org). All rights reserved. Inconsistency and Redundancy Do Not Imply Irrelevance Eugene C. Freuder Paul D. Hubbe Daniel

More information

Using semantic causality graphs to validate MAS models

Using semantic causality graphs to validate MAS models Using semantic causality graphs to validate MAS models Guillermo Vigueras 1, Jorge J. Gómez 2, Juan A. Botía 1 and Juan Pavón 2 1 Facultad de Informática Universidad de Murcia Spain 2 Facultad de Informática

More information

Constructive Search Algorithms

Constructive Search Algorithms Constructive Search Algorithms! Introduction Historically the major search method for CSPs Reference: S.W.Golomb & L.D.Baumert (1965) Backtrack Programming, JACM 12:516-524 Extended for Intelligent Backtracking

More information