Probabilistic Assessment of Security Scenarios Challenges and Solutions

Size: px
Start display at page:

Download "Probabilistic Assessment of Security Scenarios Challenges and Solutions"

Transcription

1 Probabilistic Assessment of Security Scenarios Challenges and Solutions Barbara Kordy Joint work with Marc Pouly, Patrick Schweitzer Formal Methods and Security seminar INRIA Rennes, May 16, 2014

2 Barbara Kordy 2 Who am I? Ph.D. Student and Moniteur, Université d Orléans, France Automates pour l Analyse de Documents XML Compressés, Applications à la Sécurité d Accès Research Associate, University of Luxembourg Formal methods for modeling and analysis of real-life security problems

3 Barbara Kordy 3 Probabilistic Assessment of Security Scenarios security model ADTree dependency model Bayesian network probabilistic assessment of attack defense scenarios with dependencies

4 Barbara Kordy 4 Outline 1 Attack defense Trees 2 Probabilistic Evaluation 3 Efficiency Considerations 4 Wrap Up

5 Attack defense Trees Barbara Kordy 5 Modeling Security Scenarios Attack defense tree (ADTree) [FAST 10] Tree-like representation of an attack defense scenario depicting: How to attack a system How to protect against an attack Extend the industrially recognized model of attack trees [Schneier 99] Integrate Intuitive representation features [IJSSE 12, ICISC 12] Formal analysis techniques [GameSec 10, SIIS 11, JLC 14] Software application ADTool [QEST 13]

6 Attack defense Trees Barbara Kordy 6 Example: ADTree for Infecting a Computer infect computer virus on system execute virus with attachment USB stick antivirus install antivirus run antivirus fake antivirus

7 Attack defense Trees Barbara Kordy 7 Propositional Semantics for ADTrees [SIIS 11] B the set of non-refined nodes of ADTree t x {0, 1} B encodes whether actions from B succeed or not Action A B succeeds if x(a) = 1 Action A B does not succeed if x(a) = 0 Boolean function f t for t f t : {0, 1} B {0, 1} associates a Boolean value f t (x) {0, 1} with each vector x {0, 1} B x is called an attack vector if f t (x) = 1

8 Attack defense Trees Barbara Kordy 8 ADTrees as Boolean Functions Domain of f t is composed of the non-refined nodes of t Non-refined OR AND Countermeasure t t t' A t' t'' t' t'' t'' f t (A) = A f t = f t f t f t = f t f t f t = f t f t

9 Attack defense Trees Barbara Kordy 9 Example: Boolean Function for Infecting a Computer infect computer virus on system execute virus with attachment USB stick antivirus install antivirus run antivirus f t = fake antivirus ( (X EA X US ) ( X IA (X RA X FA ) )) X EV

10 Attack defense Trees Barbara Kordy 10 Example: Attack Vector infect computer true virus on system true execute virus true with attachment true USB stick false antivirus false install antivirus true run antivirus false f t = fake antivirus false ( (X EA X US ) ( X IA (X RA X FA ) )) X EV attack vector

11 Attack defense Trees Barbara Kordy 11 Importance of Probabilities Knowing the probabilities of particular attacks allow us to Identify the most vulnerable components Determine the strategic points Decide which defensive measures to implement

12 Attack defense Trees Barbara Kordy 12 Bottom-Up Evaluation of Probability on ADTrees [ICISC 12] Probability of a disjunctive subtree Probability of a conjunctive subtree Probability of a countered subtree attack attack x x y x y y

13 Attack defense Trees Barbara Kordy 12 Bottom-Up Evaluation of Probability on ADTrees [ICISC 12] Probability of a disjunctive subtree Probability of a conjunctive subtree Probability of a countered subtree attack attack x x y x y y x + y xy

14 Attack defense Trees Barbara Kordy 12 Bottom-Up Evaluation of Probability on ADTrees [ICISC 12] Probability of a disjunctive subtree Probability of a conjunctive subtree Probability of a countered subtree attack attack x x y x y y x + y xy xy

15 Attack defense Trees Barbara Kordy 12 Bottom-Up Evaluation of Probability on ADTrees [ICISC 12] Probability of a disjunctive subtree Probability of a conjunctive subtree Probability of a countered subtree attack attack x x y x y y x + y xy xy x(1 y)

16 Attack defense Trees Barbara Kordy 12 Bottom-Up Evaluation of Probability on ADTrees [ICISC 12] Probability of a disjunctive subtree Probability of a conjunctive subtree Probability of a countered subtree attack attack x x y x y y x + y xy xy x(1 y) Similarly for subtrees rooted in a defense node

17 Attack defense Trees Barbara Kordy 13 Example: Probability for Infecting a Computer infect computer virus on system execute virus 0.9 with attachment 0.5 USB stick 0.75 antivirus install antivirus 0.8 run antivirus 0.25 fake antivirus 0.25

18 Attack defense Trees Barbara Kordy 14 Limitations The bottom-up procedure does not take dependencies between actions into account. However, in practice Installing and running an antivirus Distributing and executing a virus are not independent actions. Thus, the standard bottom-up evaluation is not suitable for probabilistic assessment of attack defense trees.

19 Attack defense Trees Barbara Kordy 15 Challenges 1 How to design the appropriate formalism? 2 How to ensure that calculations reflect the reality? 3 How to guarantee the efficiency of the evaluation?

20 Probabilistic Evaluation Barbara Kordy 16 Proposed Framework [ifm 14] security model ADTree

21 Probabilistic Evaluation Barbara Kordy 16 Proposed Framework [ifm 14] security model ADTree dependency model Bayesian network

22 Probabilistic Evaluation Barbara Kordy 16 Proposed Framework [ifm 14] security model ADTree dependency model Bayesian network probabilistic assessment of attack defense scenarios with dependencies

23 Probabilistic Evaluation Barbara Kordy 17 Modeling Probability of Dependent Actions Bayesian network A directed, acyclic graph that reflects the conditional interdependencies between variables associated with the nodes of the network Dependent variables Conditional probability table for Y X Y p(y = 1 X = 1) = 0.7 p(y = 1 X = 0) = 0.2 p(y = 0 X = 1) = 0.3 p(y = 0 X = 0) = 0.8

24 Probabilistic Evaluation Barbara Kordy 18 Constructing Bayesian Network BN t for ADTree t From an ADTree t ADTree B set of all non-refined nodes of t To a Bayesian network Elements of B are nodes of the Bayesian network BN t Relations between actions are depicted by edges in BN t Conditional probability tables quantify dependencies between actions

25 Probabilistic Evaluation Barbara Kordy 19 Example: BN t for Infecting a Computer ADTree p(x EA = 1 X FA = 1) = 0.9 p(x EA = 1 X FA = 0) = 0.5 with attachment p(x FA = 1) = 0.3 fake antivirus USB stick p(x US = 1 X FA = 1) = 0.4 p(x US = 1 X FA = 0) = 0.5 execute virus p(x EV = 1 X EA = 1, X US = 1) = 0.9 p(x EV = 1 X EA = 1, X US = 0) = 0.2 p(x EV = 1 X EA = 0, X US = 1) = 0.8 p(x EV = 1 X EA = 0, X US = 0) = 0.1 install antivirus run antivirus p(x IA = 1) = 0.6 p(x RA = 1 X IA = 1) = 0.9 p(x RA = 1 X IA = 0) = 0.0

26 Probabilistic Evaluation Barbara Kordy 20 Joint Probability Distribution for the Network BN t with attachment fake antivirus execute virus USB stick install antivirus run antivirus p(x EA, X US, X IA, X RA, X FA, X EV ) = p(x EV X EA, X US ) p(x EA X FA ) p(x US X FA ) p(x FA ) p(x RA X IA ) p(x IA )

27 Probabilistic Evaluation Barbara Kordy 21 Propositional Semantics Using Algebraic Operations Non-refined OR AND Countermeasure t t t' A t' t'' t' t'' t'' f t (A) = A f t = f t f t f t = f t f t f t = f t f t

28 Probabilistic Evaluation Barbara Kordy 21 Propositional Semantics Using Algebraic Operations Non-refined OR AND Countermeasure t t t' A t' t'' t' t'' t'' f t (A) = A f t = f t f t f t = f t f t f t = f t f t id A max{f t, f t } f t f t f t (1 f t )

29 Probabilistic Evaluation Barbara Kordy 22 Probability Computation x {0, 1} B vector of successful/unsuccessful actions Probability of attack vector x f t (x) p(x) Probability related to ADTree t P(t) = x {0,1} B f t (x) p(x) Probability of the most probable attack vector P max (t) = max f t(x) p(x) x {0,1} B

30 Probabilistic Evaluation Barbara Kordy 23 Compatibility Results [ifm 14] Theorem Probability computations on propositionally equivalent ADTrees yield the same result. Observation For ADTree t without dependent actions, P(t) coincides with the result of the bottom-up computation.

31 Efficiency Considerations Barbara Kordy 24 Efficiency Problems P(t) = x {0,1} B f t (x) p(x) P max (t) = max x {0,1} B f t(x) p(x) The number of configurations x grows exponentially with the number of involved actions. For large systems, it is therefore not feasible to Enumerate all the values of f t Enumerate all the values of the joint probability distribution for BN t

32 Efficiency Considerations Barbara Kordy 25 security model ADTree dependency model Bayesian network probabilistic assessment of attack defense scenarios with dependencies

33 Efficiency Considerations Barbara Kordy 25 security model ADTree constraint reasoning fusion dependency model Bayesian network probabilistic assessment of attack defense scenarios with dependencies

34 Efficiency Considerations Barbara Kordy 26 Local Indicators ( ( )) f t = (X EA X US ) XIA (X }{{} RA X FA ) X }{{} EV Y 1 Y }{{ 2 } }{{} Y 4 } {{ } Y t Y 3 φ 1 (Y 1, X EA, X US ) = 1 exactly if Y 1 = max{x EA, X US } φ 2 (Y 2, X RA, X FA ) = 1 exactly if Y 2 = X RA (1 X FA ) φ 3 (Y 3, X IA, Y 2 ) = 1 exactly if Y 3 = X IA Y 2 φ 4 (Y 4, Y 1, Y 3 ) = 1 exactly if Y 4 = Y 1 (1 Y 3 ) φ 5 (Y t, Y 4, X EV ) = 1 exactly if Y t = Y 4 X EV

35 Efficiency Considerations Barbara Kordy 27 Global indicator function φ t for ADTree t Domain of φ t : Non-refined nodes of t Inner variables of all local indicators Global indicator function φ t = product of all local indicators φ i Y=inner variables B=non-refined nodes {}}{{}}{ φ t ( Y 1, Y 2, Y 3, Y 4, Y t, X EA, X US, X IA, X RA, X FA, X EV ) = φ 1 (Y 1, X EA, X US ) φ 2 (Y 2, X RA, X FA ) φ 3 (Y 3, X IA, Y 2 ) φ 4 (Y 4, Y 1, Y 3 ) φ 5 (Y t, Y 4, X EV ) Φ t indicates valid assignments with respect to f t

36 Efficiency Considerations Barbara Kordy 28 Important Property Theorem Consider an ADTree t over the set of non-refined nodes B and the global indicator function φ t with the set of inner variables Y. x {0, 1} B!y {0, 1} Y, such that φ t (y, x) = 1 Corollary: x {0, 1} B max φ t(y, x) = y {0,1} Y y {0,1} Y φ t (y, x) = 1

37 Efficiency Considerations Barbara Kordy 29 Filtering Interesting Assignments of φ t A t B φ t (Y t = 1, X A = 1, X B = 1) = 1 φ t (Y t = 1, X A = 1, X B = 0) = 1 φ t (Y t = 1, X A = 0, X B = 1) = 1 φ t (Y t = 0, X A = 0, X B = 0) = 1 We are only interested in assignments such that φ t = 1 and Y t = 1 Y t φ t (y, x)

38 Efficiency Considerations Barbara Kordy 30 Expressing f t with its Global Indicator x {0, 1} B : max φ t(y, x) = y {0,1} Y y {0,1} Y φ t (y, x) = 1 x {0, 1} B ( max Yt φ t (y, x) ) = y {0,1} Y y {0,1} Y = f t (x) = ( Yt φ t (y, x) ) = { 1, if x is an attack vector 0, otherwise

39 Efficiency Considerations Barbara Kordy 31 Factorized Form for Probability Formulas Probability of attack vector x ( ) f t (x) p(x) = max Y t φ t (y, x) p(x) y {0,1} Y Probability related to ADTree t P(t) = x {0,1} B f t (x) p(x) = (y,x) {0,1} Y B ( ) Y t φ t (y, x) p(x) Probability of the most probable attack vector P max (t) = ( ) max f t(x) p(x) = max Y t φ t (y, x) p(x) x {0,1} B (y,x) {0,1} Y B

40 Efficiency Considerations Barbara Kordy 32 Our Framework in the Context of Semiring Theory Inference problem over the arithmetic semiring R, +, ( ) P(t) = Y t φ t (y, x) p(x) (y,x) {0,1} Y B Inference problem over the product t-norm semiring [0, 1], max, ( ) P max (t) = max Y t φ t (y, x) p(x) (y,x) {0,1} Y B

41 Efficiency Considerations Barbara Kordy 33 Local Computation Powerful local computation algorithms } Fusion smart distributivity Variable elimination P(t) Complexity bound Using Nenok tool [IJAIT 10] Direct computation sec Using fusion sec Complexity bounded by a structural parameter of the problem

42 Summary Wrap Up

43 Wrap Up Barbara Kordy 34 Summary security model ADTree

44 Wrap Up Barbara Kordy 34 Summary security model ADTree dependency model Bayesian network

45 Wrap Up Barbara Kordy 34 Summary security model ADTree dependency model Bayesian network probabilistic assessment of attack defense scenarios with dependencies

46 Wrap Up Barbara Kordy 34 Summary security model ADTree constraint reasoning fusion dependency model Bayesian network probabilistic assessment of attack defense scenarios with dependencies

47 Wrap Up Barbara Kordy 35 Addressing Challenges 1 How to design the appropriate formalism? 2 How to ensure that calculations reflect the reality? 3 How to guarantee the efficiency of the evaluation?

48 Wrap Up Barbara Kordy 35 Addressing Challenges 1 How to design the appropriate formalism? Used by industry, intuitive & well formalized Security model and dependency network are kept separated 2 How to ensure that calculations reflect the reality? 3 How to guarantee the efficiency of the evaluation?

49 Wrap Up Barbara Kordy 35 Addressing Challenges 1 How to design the appropriate formalism? Used by industry, intuitive & well formalized Security model and dependency network are kept separated 2 How to ensure that calculations reflect the reality? Real-life data take dependencies into account Complement ADTree with additional information 3 How to guarantee the efficiency of the evaluation?

50 Wrap Up Barbara Kordy 35 Addressing Challenges 1 How to design the appropriate formalism? Used by industry, intuitive & well formalized Security model and dependency network are kept separated 2 How to ensure that calculations reflect the reality? Real-life data take dependencies into account Complement ADTree with additional information 3 How to guarantee the efficiency of the evaluation? Local computation algorithms Existing software tools, well-known heuristics

51 Wrap Up Barbara Kordy 36 Where to take it from here? Find the best elimination sequence for Bayesian ADTrees NP-complete in general Prediction is possible for specific families of graphs Extend to probability distributions Probability dependent on time Interface ADTool [QEST 13] with Nenok Automated probability assessment of large scale scenarios

52 Thank you for your attention! Barbara Kordy 37 Follow Up Project Attack Defense Trees: Theory Meets Practice Ph.D. vacancy: Contact information: Barbara Kordy

53 References Barbara Kordy 38 References I Bruce Schneier. Attack Trees. Dr. Dobb s Journal of Software Tools, 24(12):21 29, Barbara Kordy, Sjouke Mauw, Matthijs Melissen, and Patrick Schweitzer. Attack Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. In Tansu Alpcan, Levente Buttyán, and John S. Baras, editors, Decision and Game Theory for Security (GameSec 2010), volume 6442 of LNCS, pages Springer, Barbara Kordy, Sjouke Mauw, Saša Radomirović, and Patrick Schweitzer. Foundations of Attack Defense Trees. In Pierpaolo Degano, Sandro Etalle, and Joshua Guttman, editors, Formal Aspects of Security and Trust (FAST 2010), volume 6561 of LNCS, pages Springer, Marc Pouly. Nenok - a software architecture for generic inference. International Journal on Artificial Intelligence Tools, 19(1):65 99, 2010.

54 References Barbara Kordy 39 References II Barbara Kordy, Marc Pouly, and Patrick Schweitzer. Computational Aspects of Attack Defense Trees. In P. Bouvry, M. A. Klopotek, F. Leprevost, M. Marciniak, A. Mykowiecka, and H. Rybinski, editors, Security & Intelligent Information Systems (SIIS 2011), volume 7053 of LNCS, pages Springer, Barbara Kordy, Sjouke Mauw, Saša Radomirović, and Patrick Schweitzer. Attack Defense Trees. Journal of Logic and Computation (JLC), 24(1):55 87, Barbara Kordy, Piotr Kordy, Sjouke Mauw, and Patrick Schweitzer. ADTool: Security Analysis with Attack Defense Trees. In Kaustubh R. Joshi, Markus Siegle, Mariëlle Stoelinga, and Pedro R. D Argenio, editors, Quantitative Evaluation of Systems (QEST 2013), volume 8054 of LNCS, pages Springer, Alessandra Bagnato, Barbara Kordy, Per Håkon Meland, and Patrick Schweitzer. Attribute Decoration of Attack Defense Trees. International Journal of Secure Software Engineering (IJSSE), 3(2):1 35, [IGI Global s 2012 Best Article Award].

55 References Barbara Kordy 40 References III Barbara Kordy, Sjouke Mauw, and Patrick Schweitzer. Quantitative Questions on Attack Defense Trees. In Taekyoung Kwon, Mun-Kyu Lee, and Daesung Kwon, editors, Information Security and Cryptology (ICISC 2012), volume 7839 of LNCS, pages Springer, Barbara Kordy, Marc Pouly, and Patrick Schweitzer. A Probabilistic Framework for Security Scenarios with Dependent Actions Under review. Barbara Kordy, Ludovic Piètre-Cambacédès, and Patrick Schweitzer. DAG-Based Attack and Defense Modeling: Don t Miss the Forest for the Attack Trees Under submission, pre-print available at

A Probabilistic Framework for Security Scenarios with Dependent Actions

A Probabilistic Framework for Security Scenarios with Dependent Actions A Probabilistic Framework for Security Scenarios with Dependent Actions Barbara Kordy 1,2, Marc Pouly 3, Patrick Schweitzer 1 1 University of Luxembourg, SnT, Luxembourg 2 INSA/IRISA, Rennes, France barbara.kordy,patrick.schweitzer@uni.lu

More information

Probabilistic Reasoning with Graphical Security Models

Probabilistic Reasoning with Graphical Security Models Probabilistic Reasoning with Graphical Security Models Barbara Kordy a,b,, Marc Pouly c, Patrick Schweitzer b a INSA Rennes, IRISA, France b University of Luxembourg, SnT, Luxembourg c Lucerne University

More information

A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees 1 / 35 A Stochastic Framework for Quantitative Analysis of R. Jhawar K. Lounis S. Mauw CSC/SnT University of Luxembourg Luxembourg Security and Trust of Software Systems, 2016 ADT2P & TREsPASS Project

More information

arxiv: v1 [cs.cr] 8 Mar 2015

arxiv: v1 [cs.cr] 8 Mar 2015 Attack Trees with Sequential Conjunction Ravi Jhawar 1, Barbara Kordy 2, Sjouke Mauw 1, Saša Radomirović 3, Rolando Trujillo-Rasua 1 arxiv:1503.02261v1 [cs.cr] 8 Mar 2015 1 University of Luxembourg, SnT,

More information

Quantifying uncertainty & Bayesian networks

Quantifying uncertainty & Bayesian networks Quantifying uncertainty & Bayesian networks CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016 Soleymani Artificial Intelligence: A Modern Approach, 3 rd Edition,

More information

A brief introduction to Logic. (slides from

A brief introduction to Logic. (slides from A brief introduction to Logic (slides from http://www.decision-procedures.org/) 1 A Brief Introduction to Logic - Outline Propositional Logic :Syntax Propositional Logic :Semantics Satisfiability and validity

More information

Quantitative Verification and Synthesis of Attack-Defence Scenarios

Quantitative Verification and Synthesis of Attack-Defence Scenarios Quantitative Verification and Synthesis of Attack-Defence Scenarios Zaruhi Aslanyan, Flemming Nielson DTU Compute Technical University of Denmark Denmark Email: {zaas,fnie}@dtu.dk David Parker School of

More information

arxiv: v1 [cs.lo] 21 Jan 2018

arxiv: v1 [cs.lo] 21 Jan 2018 An Intuitionistic Linear Logical Semantics of SAND Attack Trees Harley Eades III arxiv:1801.06886v1 [cs.lo] 21 Jan 2018 Computer Science Augusta University harley.eades@gmail.com Abstract. In this paper

More information

Bayes Nets: Independence

Bayes Nets: Independence Bayes Nets: Independence [These slides were created by Dan Klein and Pieter Abbeel for CS188 Intro to AI at UC Berkeley. All CS188 materials are available at http://ai.berkeley.edu.] Bayes Nets A Bayes

More information

CS 5522: Artificial Intelligence II

CS 5522: Artificial Intelligence II CS 5522: Artificial Intelligence II Bayes Nets: Independence Instructor: Alan Ritter Ohio State University [These slides were adapted from CS188 Intro to AI at UC Berkeley. All materials available at http://ai.berkeley.edu.]

More information

Bayesian Networks BY: MOHAMAD ALSABBAGH

Bayesian Networks BY: MOHAMAD ALSABBAGH Bayesian Networks BY: MOHAMAD ALSABBAGH Outlines Introduction Bayes Rule Bayesian Networks (BN) Representation Size of a Bayesian Network Inference via BN BN Learning Dynamic BN Introduction Conditional

More information

Introduction to Artificial Intelligence Propositional Logic & SAT Solving. UIUC CS 440 / ECE 448 Professor: Eyal Amir Spring Semester 2010

Introduction to Artificial Intelligence Propositional Logic & SAT Solving. UIUC CS 440 / ECE 448 Professor: Eyal Amir Spring Semester 2010 Introduction to Artificial Intelligence Propositional Logic & SAT Solving UIUC CS 440 / ECE 448 Professor: Eyal Amir Spring Semester 2010 Today Representation in Propositional Logic Semantics & Deduction

More information

Uncertainty and Bayesian Networks

Uncertainty and Bayesian Networks Uncertainty and Bayesian Networks Tutorial 3 Tutorial 3 1 Outline Uncertainty Probability Syntax and Semantics for Uncertainty Inference Independence and Bayes Rule Syntax and Semantics for Bayesian Networks

More information

Artificial Intelligence Bayes Nets: Independence

Artificial Intelligence Bayes Nets: Independence Artificial Intelligence Bayes Nets: Independence Instructors: David Suter and Qince Li Course Delivered @ Harbin Institute of Technology [Many slides adapted from those created by Dan Klein and Pieter

More information

Andrew/CS ID: Midterm Solutions, Fall 2006

Andrew/CS ID: Midterm Solutions, Fall 2006 Name: Andrew/CS ID: 15-780 Midterm Solutions, Fall 2006 November 15, 2006 Place your name and your andrew/cs email address on the front page. The exam is open-book, open-notes, no electronics other than

More information

Ch.6 Uncertain Knowledge. Logic and Uncertainty. Representation. One problem with logical approaches: Department of Computer Science

Ch.6 Uncertain Knowledge. Logic and Uncertainty. Representation. One problem with logical approaches: Department of Computer Science Ch.6 Uncertain Knowledge Representation Hantao Zhang http://www.cs.uiowa.edu/ hzhang/c145 The University of Iowa Department of Computer Science Artificial Intelligence p.1/39 Logic and Uncertainty One

More information

Basing Decisions on Sentences in Decision Diagrams

Basing Decisions on Sentences in Decision Diagrams Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence Basing Decisions on Sentences in Decision Diagrams Yexiang Xue Department of Computer Science Cornell University yexiang@cs.cornell.edu

More information

CS Lecture 3. More Bayesian Networks

CS Lecture 3. More Bayesian Networks CS 6347 Lecture 3 More Bayesian Networks Recap Last time: Complexity challenges Representing distributions Computing probabilities/doing inference Introduction to Bayesian networks Today: D-separation,

More information

Reasoning with Quantified Boolean Formulas

Reasoning with Quantified Boolean Formulas Reasoning with Quantified Boolean Formulas Martina Seidl Institute for Formal Models and Verification Johannes Kepler University Linz 1 What are QBF? Quantified Boolean formulas (QBF) are formulas of propositional

More information

Semirings for Breakfast

Semirings for Breakfast Semirings for Breakfast Marc Pouly marc.pouly@unifr.ch Interdisciplinary Center for Security, Reliability and Trust University of Luxembourg July 2010 Marc Pouly Semirings for Breakfast 1/ 27 Semirings

More information

Symbolic Variable Elimination in Discrete and Continuous Graphical Models. Scott Sanner Ehsan Abbasnejad

Symbolic Variable Elimination in Discrete and Continuous Graphical Models. Scott Sanner Ehsan Abbasnejad Symbolic Variable Elimination in Discrete and Continuous Graphical Models Scott Sanner Ehsan Abbasnejad Inference for Dynamic Tracking No one previously did this inference exactly in closed-form! Exact

More information

CS 188: Artificial Intelligence Spring Announcements

CS 188: Artificial Intelligence Spring Announcements CS 188: Artificial Intelligence Spring 2011 Lecture 16: Bayes Nets IV Inference 3/28/2011 Pieter Abbeel UC Berkeley Many slides over this course adapted from Dan Klein, Stuart Russell, Andrew Moore Announcements

More information

Price: $25 (incl. T-Shirt, morning tea and lunch) Visit:

Price: $25 (incl. T-Shirt, morning tea and lunch) Visit: Three days of interesting talks & workshops from industry experts across Australia Explore new computing topics Network with students & employers in Brisbane Price: $25 (incl. T-Shirt, morning tea and

More information

PROBABILISTIC REASONING SYSTEMS

PROBABILISTIC REASONING SYSTEMS PROBABILISTIC REASONING SYSTEMS In which we explain how to build reasoning systems that use network models to reason with uncertainty according to the laws of probability theory. Outline Knowledge in uncertain

More information

Directed Graphical Models or Bayesian Networks

Directed Graphical Models or Bayesian Networks Directed Graphical Models or Bayesian Networks Le Song Machine Learning II: Advanced Topics CSE 8803ML, Spring 2012 Bayesian Networks One of the most exciting recent advancements in statistical AI Compact

More information

EE562 ARTIFICIAL INTELLIGENCE FOR ENGINEERS

EE562 ARTIFICIAL INTELLIGENCE FOR ENGINEERS EE562 ARTIFICIAL INTELLIGENCE FOR ENGINEERS Lecture 16, 6/1/2005 University of Washington, Department of Electrical Engineering Spring 2005 Instructor: Professor Jeff A. Bilmes Uncertainty & Bayesian Networks

More information

Computational Logic. Davide Martinenghi. Spring Free University of Bozen-Bolzano. Computational Logic Davide Martinenghi (1/30)

Computational Logic. Davide Martinenghi. Spring Free University of Bozen-Bolzano. Computational Logic Davide Martinenghi (1/30) Computational Logic Davide Martinenghi Free University of Bozen-Bolzano Spring 2010 Computational Logic Davide Martinenghi (1/30) Propositional Logic - sequent calculus To overcome the problems of natural

More information

CS 188: Artificial Intelligence. Bayes Nets

CS 188: Artificial Intelligence. Bayes Nets CS 188: Artificial Intelligence Probabilistic Inference: Enumeration, Variable Elimination, Sampling Pieter Abbeel UC Berkeley Many slides over this course adapted from Dan Klein, Stuart Russell, Andrew

More information

Bayesian Networks Inference with Probabilistic Graphical Models

Bayesian Networks Inference with Probabilistic Graphical Models 4190.408 2016-Spring Bayesian Networks Inference with Probabilistic Graphical Models Byoung-Tak Zhang intelligence Lab Seoul National University 4190.408 Artificial (2016-Spring) 1 Machine Learning? Learning

More information

3. Only sequences that were formed by using finitely many applications of rules 1 and 2, are propositional formulas.

3. Only sequences that were formed by using finitely many applications of rules 1 and 2, are propositional formulas. 1 Chapter 1 Propositional Logic Mathematical logic studies correct thinking, correct deductions of statements from other statements. Let us make it more precise. A fundamental property of a statement is

More information

Interleaved Alldifferent Constraints: CSP vs. SAT Approaches

Interleaved Alldifferent Constraints: CSP vs. SAT Approaches Interleaved Alldifferent Constraints: CSP vs. SAT Approaches Frédéric Lardeux 3, Eric Monfroy 1,2, and Frédéric Saubion 3 1 Universidad Técnica Federico Santa María, Valparaíso, Chile 2 LINA, Université

More information

Bayesian networks. Chapter Chapter

Bayesian networks. Chapter Chapter Bayesian networks Chapter 14.1 3 Chapter 14.1 3 1 Outline Syntax Semantics Parameterized distributions Chapter 14.1 3 2 Bayesian networks A simple, graphical notation for conditional independence assertions

More information

The Bayesian Ontology Language BEL

The Bayesian Ontology Language BEL Journal of Automated Reasoning manuscript No. (will be inserted by the editor) The Bayesian Ontology Language BEL İsmail İlkan Ceylan Rafael Peñaloza Received: date / Accepted: date Abstract We introduce

More information

Validating QBF Invalidity in HOL4

Validating QBF Invalidity in HOL4 Interactive Theorem Proving (ITP) 14 July, 2010 Quantified Boolean Formulae Quantified Boolean Formulae Motivation System Overview Related Work QBF = propositional logic + quantifiers over Boolean variables

More information

Probabilistic Reasoning. (Mostly using Bayesian Networks)

Probabilistic Reasoning. (Mostly using Bayesian Networks) Probabilistic Reasoning (Mostly using Bayesian Networks) Introduction: Why probabilistic reasoning? The world is not deterministic. (Usually because information is limited.) Ways of coping with uncertainty

More information

Comp487/587 - Boolean Formulas

Comp487/587 - Boolean Formulas Comp487/587 - Boolean Formulas 1 Logic and SAT 1.1 What is a Boolean Formula Logic is a way through which we can analyze and reason about simple or complicated events. In particular, we are interested

More information

Uncertainty and knowledge. Uncertainty and knowledge. Reasoning with uncertainty. Notes

Uncertainty and knowledge. Uncertainty and knowledge. Reasoning with uncertainty. Notes Approximate reasoning Uncertainty and knowledge Introduction All knowledge representation formalism and problem solving mechanisms that we have seen until now are based on the following assumptions: All

More information

COS402- Artificial Intelligence Fall Lecture 10: Bayesian Networks & Exact Inference

COS402- Artificial Intelligence Fall Lecture 10: Bayesian Networks & Exact Inference COS402- Artificial Intelligence Fall 2015 Lecture 10: Bayesian Networks & Exact Inference Outline Logical inference and probabilistic inference Independence and conditional independence Bayes Nets Semantics

More information

Introduction Models of Attack Trees Computational Semantics. Attack Trees. Models and Computation. Jan Willemson, Aivo Jürgenson, Margus Niitsoo

Introduction Models of Attack Trees Computational Semantics. Attack Trees. Models and Computation. Jan Willemson, Aivo Jürgenson, Margus Niitsoo Attack Trees Models and Computation Jan Willemson, Aivo Jürgenson, Margus Niitsoo Cybernetica, Estonia http://www.cybernetica.eu/ January 19th, 2010 University of Luxembourg We will use the basic multi-parameter

More information

FIRST-ORDER QUERY EVALUATION ON STRUCTURES OF BOUNDED DEGREE

FIRST-ORDER QUERY EVALUATION ON STRUCTURES OF BOUNDED DEGREE FIRST-ORDER QUERY EVALUATION ON STRUCTURES OF BOUNDED DEGREE INRIA and ENS Cachan e-mail address: kazana@lsv.ens-cachan.fr WOJCIECH KAZANA AND LUC SEGOUFIN INRIA and ENS Cachan e-mail address: see http://pages.saclay.inria.fr/luc.segoufin/

More information

Handbook of Logic and Proof Techniques for Computer Science

Handbook of Logic and Proof Techniques for Computer Science Steven G. Krantz Handbook of Logic and Proof Techniques for Computer Science With 16 Figures BIRKHAUSER SPRINGER BOSTON * NEW YORK Preface xvii 1 Notation and First-Order Logic 1 1.1 The Use of Connectives

More information

Final Exam December 12, 2017

Final Exam December 12, 2017 Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes

More information

1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT

1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT 1 Algebraic Methods In an algebraic system Boolean constraints are expressed as a system of algebraic equations or inequalities which has a solution if and only if the constraints are satisfiable. Equations

More information

A Resolution Method for Modal Logic S5

A Resolution Method for Modal Logic S5 EPiC Series in Computer Science Volume 36, 2015, Pages 252 262 GCAI 2015. Global Conference on Artificial Intelligence A Resolution Method for Modal Logic S5 Yakoub Salhi and Michael Sioutis Université

More information

Decision Procedures for Satisfiability and Validity in Propositional Logic

Decision Procedures for Satisfiability and Validity in Propositional Logic Decision Procedures for Satisfiability and Validity in Propositional Logic Meghdad Ghari Institute for Research in Fundamental Sciences (IPM) School of Mathematics-Isfahan Branch Logic Group http://math.ipm.ac.ir/isfahan/logic-group.htm

More information

Probabilistic Graphical Models and Bayesian Networks. Artificial Intelligence Bert Huang Virginia Tech

Probabilistic Graphical Models and Bayesian Networks. Artificial Intelligence Bert Huang Virginia Tech Probabilistic Graphical Models and Bayesian Networks Artificial Intelligence Bert Huang Virginia Tech Concept Map for Segment Probabilistic Graphical Models Probabilistic Time Series Models Particle Filters

More information

Product rule. Chain rule

Product rule. Chain rule Probability Recap CS 188: Artificial Intelligence ayes Nets: Independence Conditional probability Product rule Chain rule, independent if and only if: and are conditionally independent given if and only

More information

Overview. Discrete Event Systems Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for?

Overview. Discrete Event Systems Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for? Computer Engineering and Networks Overview Discrete Event Systems Verification of Finite Automata Lothar Thiele Introduction Binary Decision Diagrams Representation of Boolean Functions Comparing two circuits

More information

Quantifying Uncertainty & Probabilistic Reasoning. Abdulla AlKhenji Khaled AlEmadi Mohammed AlAnsari

Quantifying Uncertainty & Probabilistic Reasoning. Abdulla AlKhenji Khaled AlEmadi Mohammed AlAnsari Quantifying Uncertainty & Probabilistic Reasoning Abdulla AlKhenji Khaled AlEmadi Mohammed AlAnsari Outline Previous Implementations What is Uncertainty? Acting Under Uncertainty Rational Decisions Basic

More information

Knowledge base (KB) = set of sentences in a formal language Declarative approach to building an agent (or other system):

Knowledge base (KB) = set of sentences in a formal language Declarative approach to building an agent (or other system): Logic Knowledge-based agents Inference engine Knowledge base Domain-independent algorithms Domain-specific content Knowledge base (KB) = set of sentences in a formal language Declarative approach to building

More information

Y. Xiang, Inference with Uncertain Knowledge 1

Y. Xiang, Inference with Uncertain Knowledge 1 Inference with Uncertain Knowledge Objectives Why must agent use uncertain knowledge? Fundamentals of Bayesian probability Inference with full joint distributions Inference with Bayes rule Bayesian networks

More information

Propositional Logic. Testing, Quality Assurance, and Maintenance Winter Prof. Arie Gurfinkel

Propositional Logic. Testing, Quality Assurance, and Maintenance Winter Prof. Arie Gurfinkel Propositional Logic Testing, Quality Assurance, and Maintenance Winter 2018 Prof. Arie Gurfinkel References Chpater 1 of Logic for Computer Scientists http://www.springerlink.com/content/978-0-8176-4762-9/

More information

Final Exam December 12, 2017

Final Exam December 12, 2017 Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes

More information

2 : Directed GMs: Bayesian Networks

2 : Directed GMs: Bayesian Networks 10-708: Probabilistic Graphical Models, Spring 2015 2 : Directed GMs: Bayesian Networks Lecturer: Eric P. Xing Scribes: Yi Cheng, Cong Lu 1 Notation Here the notations used in this course are defined:

More information

Notes. Corneliu Popeea. May 3, 2013

Notes. Corneliu Popeea. May 3, 2013 Notes Corneliu Popeea May 3, 2013 1 Propositional logic Syntax We rely on a set of atomic propositions, AP, containing atoms like p, q. A propositional logic formula φ Formula is then defined by the following

More information

Logic: The Big Picture

Logic: The Big Picture Logic: The Big Picture A typical logic is described in terms of syntax: what are the legitimate formulas semantics: under what circumstances is a formula true proof theory/ axiomatization: rules for proving

More information

Applying Bayesian networks in the game of Minesweeper

Applying Bayesian networks in the game of Minesweeper Applying Bayesian networks in the game of Minesweeper Marta Vomlelová Faculty of Mathematics and Physics Charles University in Prague http://kti.mff.cuni.cz/~marta/ Jiří Vomlel Institute of Information

More information

Guided design of attack trees: a system-based approach

Guided design of attack trees: a system-based approach Guided design of attack trees: a system-based approach Maxime Audinot, Sophie Pinchinat Univ Rennes, CNRS, IRISA, Rennes, France {maxime.audinot, sophie.pinchinat}@irisa.fr Barbara Kordy Univ Rennes, INSA

More information

Computational Complexity of Inference

Computational Complexity of Inference Computational Complexity of Inference Sargur srihari@cedar.buffalo.edu 1 Topics 1. What is Inference? 2. Complexity Classes 3. Exact Inference 1. Variable Elimination Sum-Product Algorithm 2. Factor Graphs

More information

Alternating nonzero automata

Alternating nonzero automata Alternating nonzero automata Application to the satisfiability of CTL [,, P >0, P =1 ] Hugo Gimbert, joint work with Paulin Fournier LaBRI, Université de Bordeaux ANR Stoch-MC 06/07/2017 Control and verification

More information

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet. CS 188 Fall 2015 Introduction to Artificial Intelligence Final You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.

More information

Bayesian Networks. Marcello Cirillo PhD Student 11 th of May, 2007

Bayesian Networks. Marcello Cirillo PhD Student 11 th of May, 2007 Bayesian Networks Marcello Cirillo PhD Student 11 th of May, 2007 Outline General Overview Full Joint Distributions Bayes' Rule Bayesian Network An Example Network Everything has a cost Learning with Bayesian

More information

Introduction to Kleene Algebras

Introduction to Kleene Algebras Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)

More information

Binary Decision Diagrams. Graphs. Boolean Functions

Binary Decision Diagrams. Graphs. Boolean Functions Binary Decision Diagrams Graphs Binary Decision Diagrams (BDDs) are a class of graphs that can be used as data structure for compactly representing boolean functions. BDDs were introduced by R. Bryant

More information

Incomplete version for students of easllc2012 only. 6.6 The Model Existence Game 99

Incomplete version for students of easllc2012 only. 6.6 The Model Existence Game 99 98 First-Order Logic 6.6 The Model Existence Game In this section we learn a new game associated with trying to construct a model for a sentence or a set of sentences. This is of fundamental importance

More information

Reduced Ordered Binary Decision Diagrams

Reduced Ordered Binary Decision Diagrams Reduced Ordered Binary Decision Diagrams Lecture #12 of Advanced Model Checking Joost-Pieter Katoen Lehrstuhl 2: Software Modeling & Verification E-mail: katoen@cs.rwth-aachen.de December 13, 2016 c JPK

More information

On the Soundness of Attack Trees

On the Soundness of Attack Trees On the oundness of Attack Trees Maxime Audinot and ophie Pinchinat IRIA, Campus de Beaulieu, 35042 Rennes Cedex, FRANCE. E-mails:{maxime.audinot,sophie.pinchinat}@irisa.fr Abstract. We formally define

More information

Bayesian Networks. instructor: Matteo Pozzi. x 1. x 2. x 3 x 4. x 5. x 6. x 7. x 8. x 9. Lec : Urban Systems Modeling

Bayesian Networks. instructor: Matteo Pozzi. x 1. x 2. x 3 x 4. x 5. x 6. x 7. x 8. x 9. Lec : Urban Systems Modeling 12735: Urban Systems Modeling Lec. 09 Bayesian Networks instructor: Matteo Pozzi x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 9 1 outline example of applications how to shape a problem as a BN complexity of the inference

More information

First-Order Logic. Chapter Overview Syntax

First-Order Logic. Chapter Overview Syntax Chapter 10 First-Order Logic 10.1 Overview First-Order Logic is the calculus one usually has in mind when using the word logic. It is expressive enough for all of mathematics, except for those concepts

More information

Model Checking for Propositions CS477 Formal Software Dev Methods

Model Checking for Propositions CS477 Formal Software Dev Methods S477 Formal Software Dev Methods Elsa L Gunter 2112 S, UIU egunter@illinois.edu http://courses.engr.illinois.edu/cs477 Slides based in part on previous lectures by Mahesh Vishwanathan, and by Gul gha January

More information

CS1021. Why logic? Logic about inference or argument. Start from assumptions or axioms. Make deductions according to rules of reasoning.

CS1021. Why logic? Logic about inference or argument. Start from assumptions or axioms. Make deductions according to rules of reasoning. 3: Logic Why logic? Logic about inference or argument Start from assumptions or axioms Make deductions according to rules of reasoning Logic 3-1 Why logic? (continued) If I don t buy a lottery ticket on

More information

ECE521 Lecture7. Logistic Regression

ECE521 Lecture7. Logistic Regression ECE521 Lecture7 Logistic Regression Outline Review of decision theory Logistic regression A single neuron Multi-class classification 2 Outline Decision theory is conceptually easy and computationally hard

More information

Bayesian Network. Outline. Bayesian Network. Syntax Semantics Exact inference by enumeration Exact inference by variable elimination

Bayesian Network. Outline. Bayesian Network. Syntax Semantics Exact inference by enumeration Exact inference by variable elimination Outline Syntax Semantics Exact inference by enumeration Exact inference by variable elimination s A simple, graphical notation for conditional independence assertions and hence for compact specication

More information

Title: Logical Agents AIMA: Chapter 7 (Sections 7.4 and 7.5)

Title: Logical Agents AIMA: Chapter 7 (Sections 7.4 and 7.5) B.Y. Choueiry 1 Instructor s notes #12 Title: Logical Agents AIMA: Chapter 7 (Sections 7.4 and 7.5) Introduction to Artificial Intelligence CSCE 476-876, Fall 2018 URL: www.cse.unl.edu/ choueiry/f18-476-876

More information

Arithmetic circuits of the noisy-or models

Arithmetic circuits of the noisy-or models Arithmetic circuits of the noisy-or models Jiří Vomlel Institute of Information Theory and Automation of the ASCR Academy of Sciences of the Czech Republic Pod vodárenskou věží 4, 182 08 Praha 8. Czech

More information

CVO103: Programming Languages. Lecture 2 Inductive Definitions (2)

CVO103: Programming Languages. Lecture 2 Inductive Definitions (2) CVO103: Programming Languages Lecture 2 Inductive Definitions (2) Hakjoo Oh 2018 Spring Hakjoo Oh CVO103 2018 Spring, Lecture 2 March 13, 2018 1 / 20 Contents More examples of inductive definitions natural

More information

Propositional Logic. Methods & Tools for Software Engineering (MTSE) Fall Prof. Arie Gurfinkel

Propositional Logic. Methods & Tools for Software Engineering (MTSE) Fall Prof. Arie Gurfinkel Propositional Logic Methods & Tools for Software Engineering (MTSE) Fall 2017 Prof. Arie Gurfinkel References Chpater 1 of Logic for Computer Scientists http://www.springerlink.com/content/978-0-8176-4762-9/

More information

Bayesian Networks. Motivation

Bayesian Networks. Motivation Bayesian Networks Computer Sciences 760 Spring 2014 http://pages.cs.wisc.edu/~dpage/cs760/ Motivation Assume we have five Boolean variables,,,, The joint probability is,,,, How many state configurations

More information

First-order resolution for CTL

First-order resolution for CTL First-order resolution for Lan Zhang, Ullrich Hustadt and Clare Dixon Department of Computer Science, University of Liverpool Liverpool, L69 3BX, UK {Lan.Zhang, U.Hustadt, CLDixon}@liverpool.ac.uk Abstract

More information

Announcements. CS 188: Artificial Intelligence Spring Bayes Net Semantics. Probabilities in BNs. All Conditional Independences

Announcements. CS 188: Artificial Intelligence Spring Bayes Net Semantics. Probabilities in BNs. All Conditional Independences CS 188: Artificial Intelligence Spring 2011 Announcements Assignments W4 out today --- this is your last written!! Any assignments you have not picked up yet In bin in 283 Soda [same room as for submission

More information

COMPSCI 276 Fall 2007

COMPSCI 276 Fall 2007 Exact Inference lgorithms for Probabilistic Reasoning; OMPSI 276 Fall 2007 1 elief Updating Smoking lung ancer ronchitis X-ray Dyspnoea P lung cancer=yes smoking=no, dyspnoea=yes =? 2 Probabilistic Inference

More information

Bayesian Networks Factor Graphs the Case-Factor Algorithm and the Junction Tree Algorithm

Bayesian Networks Factor Graphs the Case-Factor Algorithm and the Junction Tree Algorithm Bayesian Networks Factor Graphs the Case-Factor Algorithm and the Junction Tree Algorithm 1 Bayesian Networks We will use capital letters for random variables and lower case letters for values of those

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

COMP3702/7702 Artificial Intelligence Week 5: Search in Continuous Space with an Application in Motion Planning " Hanna Kurniawati"

COMP3702/7702 Artificial Intelligence Week 5: Search in Continuous Space with an Application in Motion Planning  Hanna Kurniawati COMP3702/7702 Artificial Intelligence Week 5: Search in Continuous Space with an Application in Motion Planning " Hanna Kurniawati" Last week" Main components of PRM" Collision check for a configuration"

More information

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. Deductive Inference for the Interiors and Exteriors of Horn Theories

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. Deductive Inference for the Interiors and Exteriors of Horn Theories MATHEMATICAL ENGINEERING TECHNICAL REPORTS Deductive Inference for the Interiors and Exteriors of Horn Theories Kazuhisa MAKINO and Hirotaka ONO METR 2007 06 February 2007 DEPARTMENT OF MATHEMATICAL INFORMATICS

More information

Clause/Term Resolution and Learning in the Evaluation of Quantified Boolean Formulas

Clause/Term Resolution and Learning in the Evaluation of Quantified Boolean Formulas Journal of Artificial Intelligence Research 1 (1993) 1-15 Submitted 6/91; published 9/91 Clause/Term Resolution and Learning in the Evaluation of Quantified Boolean Formulas Enrico Giunchiglia Massimo

More information

Chapter 3 Deterministic planning

Chapter 3 Deterministic planning Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions

More information

Data Structures for Efficient Inference and Optimization

Data Structures for Efficient Inference and Optimization Data Structures for Efficient Inference and Optimization in Expressive Continuous Domains Scott Sanner Ehsan Abbasnejad Zahra Zamani Karina Valdivia Delgado Leliane Nunes de Barros Cheng Fang Discrete

More information

Uncertainty. Logic and Uncertainty. Russell & Norvig. Readings: Chapter 13. One problem with logical-agent approaches: C:145 Artificial

Uncertainty. Logic and Uncertainty. Russell & Norvig. Readings: Chapter 13. One problem with logical-agent approaches: C:145 Artificial C:145 Artificial Intelligence@ Uncertainty Readings: Chapter 13 Russell & Norvig. Artificial Intelligence p.1/43 Logic and Uncertainty One problem with logical-agent approaches: Agents almost never have

More information

Compiling Knowledge into Decomposable Negation Normal Form

Compiling Knowledge into Decomposable Negation Normal Form Compiling Knowledge into Decomposable Negation Normal Form Adnan Darwiche Cognitive Systems Laboratory Department of Computer Science University of California Los Angeles, CA 90024 darwiche@cs. ucla. edu

More information

Introduction to Artificial Intelligence. Unit # 11

Introduction to Artificial Intelligence. Unit # 11 Introduction to Artificial Intelligence Unit # 11 1 Course Outline Overview of Artificial Intelligence State Space Representation Search Techniques Machine Learning Logic Probabilistic Reasoning/Bayesian

More information

Towards Inference and Learning in Dynamic Bayesian Networks using Generalized Evidence

Towards Inference and Learning in Dynamic Bayesian Networks using Generalized Evidence Towards Inference and Learning in Dynamic Bayesian Networks using Generalized Evidence Christopher James Langmead August 2008 CMU-CS-08-151 School of Computer Science Carnegie Mellon University Pittsburgh,

More information

A Logically Complete Reasoning Maintenance System Based on a Logical Constraint Solver

A Logically Complete Reasoning Maintenance System Based on a Logical Constraint Solver A Logically Complete Reasoning Maintenance System Based on a Logical Constraint Solver J.C. Madre and O. Coudert Bull Corporate Research Center Rue Jean Jaurès 78340 Les Clayes-sous-bois FRANCE Abstract

More information

cse 311: foundations of computing Fall 2015 Lecture 6: Predicate Logic, Logical Inference

cse 311: foundations of computing Fall 2015 Lecture 6: Predicate Logic, Logical Inference cse 311: foundations of computing Fall 2015 Lecture 6: Predicate Logic, Logical Inference quantifiers x P(x) P(x) is true for every x in the domain read as for all x, P of x x P x There is an x in the

More information

Bayesian Networks. Vibhav Gogate The University of Texas at Dallas

Bayesian Networks. Vibhav Gogate The University of Texas at Dallas Bayesian Networks Vibhav Gogate The University of Texas at Dallas Intro to AI (CS 6364) Many slides over the course adapted from either Dan Klein, Luke Zettlemoyer, Stuart Russell or Andrew Moore 1 Outline

More information

Elementary Loops Revisited

Elementary Loops Revisited Elementary Loops Revisited Jianmin Ji a, Hai Wan b, Peng Xiao b, Ziwei Huo b, and Zhanhao Xiao c a School of Computer Science and Technology, University of Science and Technology of China, Hefei, China

More information

Logic. Introduction to Artificial Intelligence CS/ECE 348 Lecture 11 September 27, 2001

Logic. Introduction to Artificial Intelligence CS/ECE 348 Lecture 11 September 27, 2001 Logic Introduction to Artificial Intelligence CS/ECE 348 Lecture 11 September 27, 2001 Last Lecture Games Cont. α-β pruning Outline Games with chance, e.g. Backgammon Logical Agents and thewumpus World

More information

Probabilistic Partial Evaluation: Exploiting rule structure in probabilistic inference

Probabilistic Partial Evaluation: Exploiting rule structure in probabilistic inference Probabilistic Partial Evaluation: Exploiting rule structure in probabilistic inference David Poole University of British Columbia 1 Overview Belief Networks Variable Elimination Algorithm Parent Contexts

More information

Using first-order logic, formalize the following knowledge:

Using first-order logic, formalize the following knowledge: Probabilistic Artificial Intelligence Final Exam Feb 2, 2016 Time limit: 120 minutes Number of pages: 19 Total points: 100 You can use the back of the pages if you run out of space. Collaboration on the

More information