Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
Combining Theory of Mind and Abductive Reasoning in Agent-Oriented Programming
AAMAS '24: Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent SystemsPages 2839–2841Theory of Mind capabilities, i.e. the capacity to adopt and reason from the perspective of others. By combining the Theory of Mind of TomAbd agents with abductive reasoning, agents can infer explanations for the behaviour of others, which they can ...
- research-articleDecember 2022
Towards gender balance in modern hackathons: literature-based approaches for female inclusiveness
GE@ICSE '22: Proceedings of the Third Workshop on Gender Equality, Diversity, and Inclusion in Software EngineeringPages 19–26https://doi.org/10.1145/3524501.3527594Hackathons are events that originated as competitions for programmers but transformed into project-oriented events given in different contexts and with different sets of goals. Despite the wide range of topics and business fields covered by current ...
- research-articleMay 2022
BOID*: Autonomous Goal Deliberation through Abduction
AAMAS '22: Proceedings of the 21st International Conference on Autonomous Agents and Multiagent SystemsPages 1019–1027The original BOID [5] is a cognitive architecture that unifies Belief, Obligation, Intention and Desire rules to calculate which actions should an agent undertake next. In the current paper, we adapt the original BOID with an aim to model autonomous ...
- short-paperJuly 2020
L2R²: Leveraging Ranking for Abductive Reasoning
SIGIR '20: Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information RetrievalPages 1961–1964https://doi.org/10.1145/3397271.3401332The abductive natural language inference task (αNLI) is proposed to evaluate the abductive reasoning ability of a learning system. In the αNLI task, two observations are given and the most plausible hypothesis is asked to pick out from the candidates. ...
- research-articleJune 2018
Symbolic reasoning for automatic signal placement
PLDI 2018: Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 120–134https://doi.org/10.1145/3192366.3192395Explicit signaling between threads is a perennial cause of bugs in concurrent programs. While there are several run-time techniques to automatically notify threads upon the availability of some shared resource, such techniques are not widely-adopted due ...
Also Published in:
ACM SIGPLAN Notices: Volume 53 Issue 4 -
- short-paperJune 2017
Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis
SACMAT '17 Abstracts: Proceedings of the 22nd ACM on Symposium on Access Control Models and TechnologiesPages 231–238https://doi.org/10.1145/3078861.3078876Internet of Things environments enable us to capture more and more data about the physical environment we live in and about ourselves. The data enable us to optimise resources, personalise services and offer unprecedented insights into our lives. ...
- research-articleJanuary 2016
An argument for ignorance-based chance discovery
International Journal of Advanced Intelligence Paradigms (IJAIP), Volume 8, Issue 3Pages 327–342https://doi.org/10.1504/ijaip.2016.077500The human part of chance-discovery is usually analysed as an effect of the agent’s knowledge of herself and of her environment. In this paper, setting off from the importance of ‘understanding the meaning of an impending phenomenon as a chance’, we will ...
- research-articleOctober 2015
Towards Scalable and Complete Query Explanation with OWL 2 EL Ontologies
CIKM '15: Proceedings of the 24th ACM International on Conference on Information and Knowledge ManagementPages 743–752https://doi.org/10.1145/2806416.2806547Ontology-mediated data access and management systems are rapidly emerging. Besides standard query answering, there is also a need for such systems to be coupled with explanation facilities, in particular to explain missing query answers (i.e. desired ...
- research-articleAugust 2015
Cinema Data Mining: The Smell of Fear
- Jörg Wicker,
- Nicolas Krauter,
- Bettina Derstorff,
- Christof Stönner,
- Efstratios Bourtsoukidis,
- Thomas Klüpfel,
- Jonathan Williams,
- Stefan Kramer
KDD '15: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data MiningPages 1295–1304https://doi.org/10.1145/2783258.2783404While the physiological response of humans to emotional events or stimuli is well-investigated for many modalities (like EEG, skin resistance, ...), surprisingly little is known about the exhalation of so-called Volatile Organic Compounds (VOCs) at ...
- research-articleJuly 2014
Super-Solutions: Succinctly Representing Solutions in Abductive Annotated Probabilistic Temporal Logic
ACM Transactions on Computational Logic (TOCL), Volume 15, Issue 3Article No.: 18, Pages 1–35https://doi.org/10.1145/2627354Annotated Probabilistic Temporal (APT) logic programs are a form of logic programs that allow users to state (or systems to automatically learn) rules of the form “formula G becomes true Δt time units after formula F became true with ℓ to u% ...
- ArticleJuly 2014
An abductive reasoning approach to the belief-bias effect
KR'14: Proceedings of the Fourteenth International Conference on Principles of Knowledge Representation and ReasoningPages 653–656The tendency to accept or reject arguments based on own beliefs or prior knowledge rather than on the reasoning process is called the belief-bias effect. A psychological syllogistic reasoning task shows this phenomenon, wherein participants were asked ...
- ArticleJuly 2013
Validating Library Usage Interactively
CAV 2013: Proceedings of the 25th International Conference on Computer Aided Verification - Volume 8044Pages 796–812Programmers who develop large, mature applications often want to optimize the performance of their program without changing its semantics. They often do so by changing how their program invokes a library function or a function implemented in another ...
- ArticleAugust 2012
Measuring Relatedness and Augmentation of Information of Interest within Free Text Law Enforcement Documents
EISIC '12: Proceedings of the 2012 European Intelligence and Security Informatics ConferencePages 148–155https://doi.org/10.1109/EISIC.2012.49This paper defines and shows the merit of measures for quantifying the degree of relatedness of information of interest and the importance of new information found within a large number of free text documents. These measures are used for identifying and ...
- ArticleJune 2012
Many paths lead to discovery: analogical retrieval of cancer therapies
QI'12: Proceedings of the 6th international conference on Quantum InteractionPages 90–101https://doi.org/10.1007/978-3-642-35659-9_9This paper addresses the issue of analogical inference, and its potential role as the mediator of new therapeutic discoveries, by using disjunction operators based on quantum connectives to combine many potential reasoning pathways into a single search ...
- research-articleJune 2012
DiscoverHistory: understanding the past in planning and execution
AAMAS '12: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2Pages 989–996We consider the problem of automated planning and control for an execution agent operating in environments that are partially-observable with deterministic exogenous events. We describe a new formalism and a new algorithm, DiscoverHistory, that enables ...
- ArticleMarch 2012
Using Data Mining to Support Teacher's Intervention in a Robotics Class
DIGITEL '12: Proceedings of the 2012 IEEE Fourth International Conference On Digital Game And Intelligent Toy Enhanced LearningPages 39–46https://doi.org/10.1109/DIGITEL.2012.14Following students' progress in robotics classes is difficult because student groups usually take different and unpredictable paths in problem solving. To improve teachers' possibilities for intervention at the right time, Open Monitoring Environment ...
- ArticleDecember 2011
An efficient algorithm to computing max-min post-inverse fuzzy relation for abductive reasoning
SEMCCO'11: Proceedings of the Second international conference on Swarm, Evolutionary, and Memetic Computing - Volume Part IPages 505–519https://doi.org/10.1007/978-3-642-27172-4_61This paper provides an alternative formulation to computing the max-min post-inverse fuzzy relation by minimizing a heuristic (objective) function to satisfy the inherent constraints of the problem. An algorithm for computing the max-min post-inverse ...
- articleDecember 2011
An evolutionary algorithm for abductive reasoning
Journal of Experimental & Theoretical Artificial Intelligence (ETAI), Volume 23, Issue 4Pages 529–544https://doi.org/10.1080/0952813X.2010.505824Abductive reasoning (or abduction) is the process of inferring hypotheses from observed data using a certain 'knowledge' encoded in the form of inference rules (or causal relations). Many important kinds of intellectual tasks, including medical ...
- ArticleSeptember 2011
Law Enforcement Ontology for Identification of Related Information of Interest Across Free Text Dcouments
EISIC '11: Proceedings of the 2011 European Intelligence and Security Informatics ConferencePages 19–27https://doi.org/10.1109/EISIC.2011.36A law enforcement ontology that incorporates extensions such as Thesauri, specialized rules, abductivehypothesis and process modeling for expansion of extracted entity phrases, is described. The ontology is part of a project to facilitate automated, ...
- ArticleJune 2011
Finding schizophrenia's Prozac: emergent relational similarity in predication space
In this paper, we investigate the ability of the Predication-based Semantic Indexing (PSI) approach, which incorporates both symbolic and distributional information, to support inference on the basis of structural similarity. For example, given a pair ...