89 results on '"Nir Oren"'
Search Results
2. Kindness Makes You Happy and Happiness Makes You Healthy: Actual Persuasiveness and Personalisation of Persuasive Messages in a Behaviour Change Intervention for Wellbeing
- Author
-
Ana Ciocarlan, Judith Masthoff, and Nir Oren
- Published
- 2023
3. On probabilistic argumentation and subargument-completeness
- Author
-
Nir Oren and Régis Riveret
- Subjects
Arts and Humanities (miscellaneous) ,Logic ,Hardware and Architecture ,Computer science ,Completeness (order theory) ,Calculus ,Software ,Probabilistic argumentation ,Theoretical Computer Science - Abstract
Probabilistic argumentation combines probability theory and formal models of argumentation. Given an argumentation graph where vertices are arguments and edges are attacks or supports between arguments, the approach of probabilistic labellings relies on a probability space where the sample space is any specific set of argument labellings of the graph, so that any labelling outcome can be associated with a probability value. Argument labellings can feature a label indicating that an argument is not expressed, and in previous work these labellings were constructed by exploiting the subargument-completeness postulate according to which if an argument is expressed then its subarguments are expressed and through the use of the concept of ‘subargument-complete subgraphs’. While the use of such subgraphs is interesting to compare probabilistic labellings with other works in the literature, it may also hinder the comprehension of a relatively simple framework. In this short communication, we revisit the construction of probabilistic labellings and demonstrate how labellings can be specified without reference to the concept of subargument-complete subgraphs. By doing so, the framework is simplified and yields a more natural model of argumentation.
- Published
- 2021
4. Inverse Problems for Gradual Semantics
- Author
-
Nir Oren, Bruno Yun, Srdjan Vesic, and Murilo Baptista
- Abstract
Gradual semantics with abstract argumentation provide each argument with a score reflecting its acceptability. Many different gradual semantics have been proposed in the literature, each following different principles and producing different argument rankings. A sub-class of such semantics, the so-called weighted semantics, takes, in addition to the graph structure, an initial set of weights over the arguments as input, with these weights affecting the resultant argument ranking. In this work, we consider the inverse problem over such weighted semantics. That is, given an argumentation framework and a desired argument ranking, we ask whether there exist initial weights such that a particular semantics produces the given ranking. The contribution of this paper are: (1) an algorithm to answer this problem, (2) a characterisation of the properties that a gradual semantics must satisfy for the algorithm to operate, and (3) an empirical evaluation of the proposed algorithm.
- Published
- 2022
5. A probabilistic deontic argumentation framework
- Author
-
Régis Riveret, Giovanni Sartor, Nir Oren, Riveret R., Oren N., and Sartor G.
- Subjects
Computer science ,02 engineering and technology ,Sartor ,Argumentation framework ,Theoretical Computer Science ,Deontic argumentation ,Software ,Artificial Intelligence ,020204 information systems ,Probabilistic argumentation ,0202 electrical engineering, electronic engineering, information engineering ,GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries) ,Conceptualization ,biology ,business.industry ,Applied Mathematics ,Deontic logic ,Probabilistic logic ,biology.organism_classification ,Epistemology ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,020201 artificial intelligence & image processing ,business ,Positivism - Abstract
What does it mean that something is probably obligatory? And how does it relate to the probability that it is permitted or prohibited? In this paper, we provide a possible answer by merging deontic argumentation and probabilistic argumentation into a probabilistic deontic argumentation framework. This framework allows us to specify a semantics for the probability of deontic statuses. The deontic argumentation part builds on standard concepts from the study of computational models of argument: rule-based arguments, argumentation graphs, argument labelling semantics and statement labelling semantics. We then encapsulate this deontic composition with the approach of probabilistic labellings to probabilistic argumentation, in order to associate deontic statements with probability values. The framework is illustrated with a scenario featuring a violation and a contrary-to-duty obligation.
- Published
- 2020
6. In search of a Goldilocks zone for credible AI
- Author
-
Kevin Allan, Nir Oren, Douglas Martin, and Jacqui Hutchison
- Subjects
0303 health sciences ,Multidisciplinary ,Science ,media_common.quotation_subject ,Conformity ,Article ,Ideal (ethics) ,03 medical and health sciences ,0302 clinical medicine ,Trustworthiness ,Social cognition ,Human behaviour ,Situated ,Goldilocks principle ,Credibility ,Medicine ,Psychology ,030217 neurology & neurosurgery ,030304 developmental biology ,media_common ,Mirroring ,Cognitive psychology - Abstract
If artificial intelligence (AI) is to help solve individual, societal and global problems, humans should neither underestimate nor overestimate its trustworthiness. Situated in-between these two extremes is an ideal ‘Goldilocks’ zone of credibility. But what will keep trust in this zone? We hypothesise that this role ultimately falls to the social cognition mechanisms which adaptively regulate conformity between humans. This novel hypothesis predicts that human-like functional biases in conformity should occur during interactions with AI. We examined multiple tests of this prediction using a collaborative remembering paradigm, where participants viewed household scenes for 30 s vs. 2 min, then saw 2-alternative forced-choice decisions about scene content originating either from AI- or human-sources. We manipulated the credibility of different sources (Experiment 1) and, from a single source, the estimated-likelihood (Experiment 2) and objective accuracy (Experiment 3) of specific decisions. As predicted, each manipulation produced functional biases for AI-sources mirroring those found for human-sources. Participants conformed more to higher credibility sources, and higher-likelihood or more objectively accurate decisions, becoming increasingly sensitive to source accuracy when their own capability was reduced. These findings support the hypothesised role of social cognition in regulating AI’s influence, raising important implications and new directions for research on human–AI interaction.
- Published
- 2021
7. Security Analysis Using Subjective Attack Trees
- Author
-
Matthew Collinson, Nasser Al-Hadhrami, and Nir Oren
- Subjects
Risk analysis ,Security analysis ,Risk analysis (engineering) ,Work (electrical) ,Computer science ,0202 electrical engineering, electronic engineering, information engineering ,020206 networking & telecommunications ,020201 artificial intelligence & image processing ,Lack of knowledge ,02 engineering and technology ,Subjective logic ,Investment (macroeconomics) ,Investment analysis - Abstract
Subjective attack trees are an extension to traditional attack trees, proposed so to take uncertainty about likelihoods of security events into account during the modelling of security risk scenarios, using subjective opinions. This paper extends the work of subjective attack trees by allowing for the modelling of countermeasures, as well as conducting a comprehensive security and security investment analysis, such as risk measuring and analysis of profitable security investments. Our approach is evaluated against traditional attack trees. The results demonstrate the importance and advantage of taking uncertainty about probabilities into account. In terms of security investment, our approach seems to be more inclined to protect systems in presence of uncertainty (or lack of knowledge) about security events evaluations.
- Published
- 2021
8. Preference Elicitation in Assumption-Based Argumentation
- Author
-
Quratul-ain Mahesar, Nir Oren, and Wamberto Vasconcelos
- Subjects
Soundness ,0303 health sciences ,Theoretical computer science ,030306 microbiology ,Network security ,business.industry ,Computer science ,Inference ,02 engineering and technology ,16. Peace & justice ,Semantics ,Argumentation theory ,Set (abstract data type) ,03 medical and health sciences ,Completeness (order theory) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Preference elicitation ,business - Abstract
Various structured argumentation frameworks utilize preferences as part of their inference procedure. In this paper, we consider an inverse of the standard reasoning problem, seeking to identify what preferences could lead to a given set of conclusions being drawn. We ground our work in the Assumption-Based Argumentation (ABA) framework, and present an algorithm which computes and enumerates all possible sets of preferences (restricted to three identified cases) over the assumptions in the system from which a desired conflict-free set of conclusions can be obtained under a given semantics. After describing our algorithm, we establish its soundness, completeness and complexity.
- Published
- 2021
9. Modelling Security Risk Scenarios Using Subjective Attack Trees
- Author
-
Nir Oren, Nasser Al-Hadhrami, and Matthew Collinson
- Subjects
Risk analysis ,Risk analysis (engineering) ,Computer science ,0202 electrical engineering, electronic engineering, information engineering ,Attack tree ,020206 networking & telecommunications ,020201 artificial intelligence & image processing ,Lack of knowledge ,02 engineering and technology ,Subjective logic ,Stuxnet ,Suicide prevention ,Vulnerability (computing) - Abstract
We propose a novel attack tree model, called a subjective attack tree, aiming to address the limitations of traditional attack trees, which use precise values for likelihoods of security events. In many situations, it is often difficult to elicit accurate probabilities due to lack of knowledge, or insufficient historical data, making the evaluation of risk in existing approaches unreliable. In this paper, we consider the modelling of uncertainty about probabilities, via subjective opinions, resulting in a model taking second-order uncertainty into account. We propose an approach to derive subjective opinions about security events based on two main criteria, namely a vulnerability level and technical difficulty to conduct an attack, using subjective logic. These subjective opinions are then used as input parameters in the proposed model. The propagation method of subjective opinions is also discussed. Our approach is evaluated against traditional attack trees using the Stuxnet self-installation scenario. Our results show that taking uncertainty about probabilities into account during security risk analysis can lead to different outcomes, and therefore different security decisions.
- Published
- 2021
10. A Subjective Network Approach for Cybersecurity Risk Assessment
- Author
-
Matthew Collinson, Nir Oren, and Nasser Al-Hadhrami
- Subjects
Risk analysis ,Underpinning ,Computer science ,Bayesian network ,020206 networking & telecommunications ,02 engineering and technology ,Industrial control system ,computer.software_genre ,Computer security ,0202 electrical engineering, electronic engineering, information engineering ,Malware ,Probability distribution ,020201 artificial intelligence & image processing ,Risk assessment ,computer ,Decision analysis - Abstract
We propose a subjective Bayesian network approach for cybersecurity risk assessment to address the limitations of traditional risk assessment models, which use precise values for the likelihoods of cyber-attacks. In many situations, it is often difficult to elicit accurate probabilities due to lack of knowledge, or insufficient historical data, making the evaluation of risk in existing approaches unreliable. With this approach, we seek to better reflect the reality underpinning the model and offer a better approach to decision-making via the modelling of uncertainty about the probability distributions in the form of subjective opinions, resulting in a model taking second-order uncertainty into account. We develop a subjective Bayesian network for cybersecurity risk, and then discuss the risk evaluation and decision analysis problem under the proposed model. Finally, our approach is evaluated against classical Bayesian networks using the scenario of wiper malware in an industrial control system. Our results show that taking uncertainty about the probabilities into account during security risk analysis can lead to different outcomes, and therefore different security decisions.
- Published
- 2020
11. Argument-Based Plan Explanation
- Author
-
Wamberto Vasconcelos, Kees van Deemter, and Nir Oren
- Subjects
Computer science ,Argument ,Natural language generation ,Plan (drawing) ,Data science ,Implementation ,Domain (software engineering) ,Visualization ,Argumentation theory - Abstract
We describe a tool for providing explanation of plans to non-technical users, built on formal argumentation and dialogue theory, and supported by natural language generation and visualisation technologies. We describe how arguments can be generated from domain rules, and how justified arguments can be identified through dialogue, allowing the system to use such a dialogue to explain a plan. We provide information about our prototype system implementation, discussing its current limitations, and identifying potential avenues for future research.
- Published
- 2020
12. Accountability for Practical Reasoning Agents
- Author
-
Stephen Cranefield, Nir Oren, and Wamberto Vasconcelos
- Subjects
business.industry ,media_common.quotation_subject ,Accountable autonomy ,Context (language use) ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Drone ,Practical reason ,010201 computation theory & mathematics ,Software agent ,Health care ,Accountability ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Engineering ethics ,Sociology ,business ,Autonomy ,media_common - Abstract
Artificial intelligence has been increasing the autonomy of man-made artefacts such as software agents, self-driving vehicles and military drones. This increase in autonomy together with the ubiquity and impact of such artefacts in our daily lives have raised many concerns in society. Initiatives such as transparent and ethical AI aim to allay fears of a “free for all” future where amoral technology (or technology amorally designed) will replace humans with terrible consequences. We discuss the notion of accountable autonomy, and explore this concept within the context of practical reasoning agents. We survey literature from distinct fields such as management, healthcare, policy-making, and others, and differentiate and relate concepts connected to accountability. We present a list of justified requirements for accountable software agents and discuss research questions stemming from these requirements. We also propose a preliminary formalisation of one core aspect of accountability: responsibility.
- Published
- 2019
13. Landmark-Based Approaches for Goal Recognition as Planning
- Author
-
Nir Oren, Ramon Fraga Pereira, and Felipe Meneguzzi
- Subjects
Supplementary data ,FOS: Computer and information sciences ,Linguistics and Language ,Landmark ,Computer science ,business.industry ,Computer Science - Artificial Intelligence ,Plan recognition ,02 engineering and technology ,Machine learning ,computer.software_genre ,Language and Linguistics ,Artificial Intelligence (cs.AI) ,Artificial Intelligence ,020204 information systems ,Automated planning and scheduling ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,Heuristics ,business ,computer ,Goal recognition - Abstract
Recognizing goals and plans from complete or partial observations can be efficiently achieved through automated planning techniques. In many applications, it is important to recognize goals and plans not only accurately, but also quickly. To address this challenge, we develop novel goal recognition approaches based on planning techniques that rely on planning landmarks. In automated planning, landmarks are properties (or actions) that cannot be avoided to achieve a goal. We show the applicability of a number of planning techniques with an emphasis on landmarks for goal recognition tasks in two settings: (1) we use the concept of landmarks to develop goal recognition heuristics; and (2) we develop a landmark-based filtering method to refine existing planning-based goal and plan recognition approaches. These recognition approaches are empirically evaluated in experiments over several classical planning domains. We show that our goal recognition approaches yield not only accuracy comparable to (and often higher than) other state-of-the-art techniques, but also result in substantially faster recognition time over existing techniques.
- Published
- 2019
- Full Text
- View/download PDF
14. A Coalitional Algorithm for Recursive Delegation
- Author
-
Juan Afanador, Murilo S. Baptista, and Nir Oren
- Subjects
Mathematical optimization ,Delegate ,Delegation ,Computer science ,Heuristic ,media_common.quotation_subject ,010401 analytical chemistry ,02 engineering and technology ,01 natural sciences ,0104 chemical sciences ,Resource (project management) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,media_common - Abstract
Within multi-agent systems, some agents may delegate tasks to other agents for execution. Recursive delegation designates situations where delegated tasks may, in turn, be delegated onwards. In unconstrained environments, recursive delegation policies based on quitting games are known to outperform policies based on multi-armed bandits. In this work, we incorporate allocation rules and rewarding schemes when considering recursive delegation, and reinterpret the quitting-game approach in terms of coalitions, employing the Shapley and Myerson values to guide delegation decisions. We empirically evaluate our extensions and demonstrate that they outperform the traditional multi-armed bandit based approach, while offering a resource efficient alternative to the quitting-game heuristic.
- Published
- 2019
15. An Adversarial Algorithm for Delegation
- Author
-
Juan Afanador, Nir Oren, and Murilo S. Baptista
- Subjects
021103 operations research ,Delegation ,Computer science ,business.industry ,Service economy ,media_common.quotation_subject ,0211 other engineering and technologies ,02 engineering and technology ,010501 environmental sciences ,01 natural sciences ,Task (project management) ,Outsourcing ,Adversarial system ,Task delegation ,Computational trust ,business ,Algorithm ,0105 earth and related environmental sciences ,media_common - Abstract
Task delegation lies at the heart of the service economy, and is a fundamental aspect of many agent marketplaces. Research in computational trust considers which agent a task should be delegated to for execution given the agent’s past behaviour. However, such work does not consider the effects of the agent delegating the task onwards, forming a chain of delegations before the task is finally executed (as occurs in many human outsourcing scenarios). In this paper we consider such delegation chains, and empirically demonstrate that existing trust based approaches do not handle these situations as well. We then introduce a new algorithm based on quitting games to cater for recursive delegation.
- Published
- 2019
16. Using Sub-Optimal Plan Detection to Identify Commitment Abandonment in Discrete Environments
- Author
-
Nir Oren, Ramon Fraga Pereira, and Felipe Meneguzzi
- Subjects
FOS: Computer and information sciences ,Delegate ,Computer Science - Artificial Intelligence ,Creditor ,Computer science ,Abandonment (legal) ,Commit ,Theoretical Computer Science ,Task (project management) ,Artificial Intelligence (cs.AI) ,Risk analysis (engineering) ,Action (philosophy) ,Artificial Intelligence ,Computer Science - Multiagent Systems ,Heuristics ,TRACE (psycholinguistics) ,Multiagent Systems (cs.MA) - Abstract
Assessing whether an agent has abandoned a goal or is actively pursuing it is important when multiple agents are trying to achieve joint goals, or when agents commit to achieving goals for each other. Making such a determination for a single goal by observing only plan traces is not trivial, as agents often deviate from optimal plans for various reasons, including the pursuit of multiple goals or the inability to act optimally. In this article, we develop an approach based on domain independent heuristics from automated planning, landmarks, and fact partitions to identify sub-optimal action steps—with respect to a plan—within a fully observable plan execution trace. Such capability is very important in domains where multiple agents cooperate and delegate tasks among themselves, such as through social commitments , and need to ensure that a delegating agent can infer whether or not another agent is actually progressing towards a delegated task. We demonstrate how a creditor can use our technique to determine—by observing a trace—whether a debtor is honouring a commitment. We empirically show, for a number of representative domains, that our approach infers sub-optimal action steps with very high accuracy and detects commitment abandonment in nearly all cases.
- Published
- 2019
- Full Text
- View/download PDF
17. Policies to Regulate Distributed Data Exchange
- Author
-
Nir Oren, Samuel R. Cauvin, and Wamberto Vasconcelos
- Subjects
Computer science ,Formalism (philosophy) ,Control (management) ,020206 networking & telecommunications ,Context (language use) ,02 engineering and technology ,Data science ,Compliance (psychology) ,Data sharing ,Data access ,Data exchange ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Social responsibility - Abstract
Data sharing is becoming an integral part of many aspects of our daily lives. We propose a method for controlling access to data and knowledge through fine-grained, user-specified explicitly represented policies. We present an overview of a policy formalism and mechanisms to facilitate distributed data sharing. We provide a breakdown of how our approach defines compliance and violation, specifically providing a new outlook on violation of permissions within the context of data sharing. We also examine how our mechanisms have been adapted to support socially responsible interactions between participants, whilst still providing them with control over their own data. We also explore a series of planned experiments investigating how users understand and interact with policies in a simplified version of our formalism.
- Published
- 2019
18. Persuasive Strategies for Encouraging Social Interaction for Older Adults
- Author
-
Somayajulu Sripada, John Paul Vargheese, Judith Masthoff, and Nir Oren
- Subjects
Persuasion ,media_common.quotation_subject ,05 social sciences ,Applied psychology ,ComputingMilieux_PERSONALCOMPUTING ,050109 social psychology ,Human Factors and Ergonomics ,Persuasive technology ,Social relation ,Computer Science Applications ,Human-Computer Interaction ,03 medical and health sciences ,0302 clinical medicine ,medicine ,0501 psychology and cognitive sciences ,Generalizability theory ,030212 general & internal medicine ,InformationSystems_MISCELLANEOUS ,Social isolation ,medicine.symptom ,Older people ,Psychology ,media_common - Abstract
Social isolation among older adults represents a significant societal challenge in which persuasion offers a potential solution. To develop a persuasive interactive system for this purpose, we conducted a modeling study with carers to discover how persuasion is used to encourage social interaction among older adults. From an analysis of the results, we identified and defined effective persuasive strategies grounded in theories of persuasion and developed a computational model for applying them. This article reports the findings from an evaluation of the generalizability of this model and presents a revised version based on these results. The article concludes with a discussion on possible domain-specific conceptual features between the model evaluated and the revised model developed.
- Published
- 2016
19. Kindness is Contagious
- Author
-
Judith Masthoff, Nir Oren, and Ana Ciocarlan
- Subjects
0301 basic medicine ,Computer science ,Kindness ,media_common.quotation_subject ,05 social sciences ,Behavior change ,Applied psychology ,Psychological intervention ,Persuasive technology ,050105 experimental psychology ,03 medical and health sciences ,030104 developmental biology ,Intervention (counseling) ,Gratitude ,Happiness ,Personality ,0501 psychology and cognitive sciences ,media_common - Abstract
Participating in kindness activities, being generous and showing gratitude, can help people increase their overall happiness levels and improve their levels of wellbeing. This paper describes an installation which will run during the UMAP 2018 Conference. We demonstrate how a gamified digital behavior change intervention can be used to encourage people of different personality types to engage in simple acts of kindness. The system will have implications for future work on personalising persuasive interventions for wellbeing and developing user models through self-assessment and objective behavioural outcomes.
- Published
- 2018
20. Enumerating Preferred Extensions: A Case Study of Human Reasoning
- Author
-
Timothy J. Norman, Alice Toniolo, Nir Oren, Black, Elizabeth, Modgil, Sanjay, Oren, Nir, University of St Andrews. School of Computer Science, and Toni, Francesca
- Subjects
QA75 ,Computer science ,QA75 Electronic computers. Computer science ,Association (object-oriented programming) ,T-NDAS ,Probabilistic semantics ,Context (language use) ,Outcome (game theory) ,Theoretical Computer Science ,Argumentation theory ,User evaluation ,Argumentation ,Heuristics ,Set (psychology) ,Computer Science(all) ,Cognitive psychology ,Event (probability theory) - Abstract
This paper seeks to better understand the links between human reasoning and preferred extensions as found within formal argumentation, especially in the context of uncertainty. The degree of believability of a conclusion may be associated with the number of preferred extensions in which the conclusion is credulously accepted. We are interested in whether people agree with this evaluation. A set of experiments with human participants is presented to investigate the validity of such an association. Our results show that people tend to agree with the outcome of a version of Thimm’s probabilistic semantics in purely qualitative domains as well as in domains in which conclusions express event likelihood. Furthermore, we are able to characterise this behaviour: the heuristics employed by people in understanding preferred extensions are similar to those employed in understanding probabilities. Postprint
- Published
- 2018
21. On the Links Between Argumentation-Based Reasoning and Nonmonotonic Reasoning
- Author
-
Simon Parsons, Nir Oren, and Zimi Li
- Subjects
Discrete mathematics ,Deductive reasoning ,business.industry ,Argument ,Rationality ,Artificial intelligence ,Non-monotonic logic ,business ,Relation (history of concept) ,Axiom ,Mathematics ,Argumentation theory - Abstract
In this paper we investigate the links between instantiated argumentation systems and the axioms for non-monotonic reasoning described in [15] with the aim of characterising the nature of argument based reasoning. In doing so, we consider two possible interpretations of the consequence relation, and describe which axioms are met by \({{\textsc {aspic}}^\mathbf {+}}\) under each of these interpretations. We then consider the links between these axioms and the rationality postulates. Our results indicate that argument based reasoning as characterised by \({{\textsc {aspic}}^\mathbf {+}}\) is—according to the axioms of [15]—non-cumulative and non-monotonic, and therefore weaker than the weakest non-monotonic reasoning systems considered in [15]. This weakness underpins \({{\textsc {aspic}}^\mathbf {+}}\)’s success in modelling other reasoning systems. We conclude by considering the relationship between \({{\textsc {aspic}}^\mathbf {+}}\) and other weak logical systems.
- Published
- 2018
22. Meta-Argumentation Frameworks for Multi-party Dialogues
- Author
-
Nir Oren, Alice Toniolo, and Gideon Ogunniye
- Subjects
0301 basic medicine ,03 medical and health sciences ,Computer science ,Argument ,030106 microbiology ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,02 engineering and technology ,Object (philosophy) ,Argumentation theory ,Epistemology - Abstract
The conclusions drawn from a dialogue depend both on the content of the arguments, and the level of trust placed in the arguments and the entity advancing them. In this paper, we describe a framework for dialogue where such trust forms the basis for expressing preferences between arguments, and in turn, for computing conclusions of the dialogue. Our framework contains object and meta-level arguments, and uses ASPIC+ to represent arguments, while argument schemes capture meta-level arguments about trust and preferences.
- Published
- 2018
23. Computing Preferences in Abstract Argumentation
- Author
-
Quratul-ain Mahesar, Nir Oren, and Wamberto Vasconcelos
- Subjects
Soundness ,Theoretical computer science ,Semantics (computer science) ,Computer science ,Multi-agent system ,02 engineering and technology ,Extension (predicate logic) ,Semantics ,Argumentation framework ,Argumentation theory ,03 medical and health sciences ,0302 clinical medicine ,Argument ,Completeness (order theory) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,030212 general & internal medicine - Abstract
We present an extension-based approach for computing preferences in an abstract argumentation system. Although numerous argumentation semantics have been developed previously for identifying acceptable sets of arguments from an argumentation framework, there is a lack of justification behind their acceptability based on implicit argument preferences. This paper presents a novel algorithm for exhaustively computing and enumerating all possible sets of preferences for a conflict-free set of arguments in an abstract argumentation framework. We prove the soundness and completeness of the algorithm. The research establishes that preferences are determined using an extension-based approach after the evaluation phase (acceptability of arguments) rather than stated beforehand. We also present some novel insights by comparing the computed preferences for the extensions.
- Published
- 2018
24. Sensor Placement for Plan Monitoring Using Genetic Programming
- Author
-
Ramon Fraga Pereira, Felipe Meneguzzi, and Nir Oren
- Subjects
Computational complexity theory ,SIMPLE (military communications protocol) ,Computer science ,Heuristic (computer science) ,Formalism (philosophy) ,Semantics (computer science) ,Distributed computing ,Genetic programming ,Plan (drawing) ,Norm enforcement - Abstract
Monitoring plan execution is useful in various multi-agent applications, from agent cooperation to norm enforcement. Realistic environments often impose constraints on the capabilities of such monitoring, limiting the amount and coverage of available sensors. In this paper, we consider the problem of sensor placement within an environment to determine whether some behaviour has occurred. Our model is based on the semantics of planning, and we provide a simple formalism for describing sensors and behaviours in such a model. Given the computational complexity of the sensor placement problem, we investigate heuristic techniques for performing sensor placement, demonstrating that such techniques perform well even in complex domains.
- Published
- 2018
25. BDI reasoning with normative considerations
- Author
-
Odinaldo Rodrigues, Michael Luck, Felipe Meneguzzi, Wamberto Vasconcelos, and Nir Oren
- Subjects
Knowledge management ,business.industry ,Process (engineering) ,Computer science ,media_common.quotation_subject ,Deontic logic ,Multi-agent system ,Risk analysis (engineering) ,Artificial Intelligence ,Control and Systems Engineering ,Normative reasoning ,Selection (linguistics) ,Normative ,Electrical and Electronic Engineering ,business ,Set (psychology) ,Autonomy ,media_common - Abstract
Systems of autonomous and self-interested agents interacting to achieve individual and collective goals may exhibit undesirable or unexpected behaviour if left unconstrained. Norms have been widely proposed as a means of defining and enforcing societal constraints by using the deontic concepts of obligations, permissions and prohibitions to describe what must, may and should not be done, respectively. However, recent efforts to provide norm-enabled agent architectures that guide plan choices suffer from interfering with an agent?s reasoning process, and thus limit the agent?s autonomy more than is required by the norms alone. In this paper we describe an extension of the Beliefs-Desires-Intentions (BDI) architecture that enables normative reasoning used to help agents choose and customise plans taking norms into account. The paper makes three significant contributions: we provide a formal framework to represent norms compactly and to manage them; we present a formal characterisation of the normative positions induced by norms of an agent?s execution within a given time period; and finally, we put forth a mechanism for plan selection and ranking taking into consideration a set of normative restrictions.
- Published
- 2015
26. Qualitative Study into Adapting Persuasive Games for Mental Wellbeing to Personality, Stressors and Attitudes
- Author
-
Judith Masthoff, Nir Oren, and Ana Ciocarlan
- Subjects
Extraversion and introversion ,Computer science ,media_common.quotation_subject ,05 social sciences ,Applied psychology ,ComputingMilieux_PERSONALCOMPUTING ,Psychological intervention ,050109 social psychology ,Conscientiousness ,02 engineering and technology ,Personality psychology ,Mental health ,Focus group ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Personality ,0501 psychology and cognitive sciences ,Big Five personality traits ,media_common - Abstract
Our wider research project investigates the design of a persuasive game for preventing mental health problems and improving subjective wellbeing in a student population. In this paper, we explore how persuasive game elements and interactions can be adapted to different student personalities, active stressors and attitudes. In six focus groups we investigated (1) which key stressors are experienced by students, (2) what characteristics of students need to be considered for adapting game interactions and challenges, and (3) which approaches to personalisation could be applied. Participants were shown stories about a fictional student, conveying high and low levels of three personality traits (Conscientiousness, Emotional Stability and Extraversion), levels of active stressors, and varying attitudes towards change. Participants discussed how to tailor game interactions, activities and challenges to the characteristics of the fictional student. In general, participants perceived real-time personalisation using implicit measures as more effective, but recognised explicit profiling as a valuable complementary method. These findings have implications for the personalisation and design of persuasive game based interventions for health.
- Published
- 2017
27. Personalising Healthy Eating Messages to Age, Gender and Personality
- Author
-
Rosemary Josekutty Thomas, Nir Oren, and Judith Masthoff
- Subjects
Persuasion ,InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.,HCI) ,Computer science ,media_common.quotation_subject ,05 social sciences ,ComputingMilieux_PERSONALCOMPUTING ,050109 social psychology ,Virtual agent ,Healthy eating ,02 engineering and technology ,Framing (social sciences) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Message type ,Personality ,0501 psychology and cognitive sciences ,InformationSystems_MISCELLANEOUS ,Personality Assessment Inventory ,Social psychology ,media_common - Abstract
We examine how persuasive messages can be used to promote and encourage healthy eating based on personality. After a personality assessment, participants assessed the persuasiveness of messages designed using Cialdini's principles of persuasion. The results of our study indicate that 'Authority' messages were most influential. In addition, we observed that positively framed messages were significantly more persuasive than negatively framed ones. Furthermore, personality had a significant influence on the best message type, with agreeable subjects being more inclined to persuasion than others.
- Published
- 2017
28. Adapting Healthy Eating Messages to Personality
- Author
-
Judith Masthoff, Rosemary Josekutty Thomas, and Nir Oren
- Subjects
Persuasion ,media_common.quotation_subject ,Healthy eating ,02 engineering and technology ,Framing (social sciences) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Personality ,020201 artificial intelligence & image processing ,Big Five personality traits ,Personality Assessment Inventory ,Psychology ,Social psychology ,media_common - Abstract
This paper considers how persuasive messages – within the healthy eating domain – should be communicated to individuals with different personality types. Following a personality assessment, subjects imagined themselves in a scenario and evaluated the effectiveness of messages constructed using Cialdini’s principles of persuasion. Our results suggest that messages exploiting the principle of authority are the most effective across a range of personality types. In addition, personality had a statistically significant impact on the persuasiveness of messages, with “conscientious” subjects more willing to be persuaded than others. Finally, we found that positively framed messages were more preferred than negatively ones. We also found some interaction effects between personality traits and Cialdini’s principles and framing on persuasiveness.
- Published
- 2017
29. Supporting Trust Assessment and Decision Making in Coalitions
- Author
-
Timothy J. Norman, Katia Sycara, Chris Burnett, and Nir Oren
- Subjects
Context model ,Decision support system ,Knowledge management ,Artificial Intelligence ,Computer Networks and Communications ,Computer science ,business.industry ,Multi-agent system ,Intelligent decision support system ,Context (language use) ,Information acquisition ,business - Abstract
Modern multiorganizational coalitions can bring diverse sets of capabilities, assets, and information sources to bear on complex and dynamic operations. However, successfully completing these operations places demands on the trust between coalition partners. When it's necessary to rely on other partners, decision makers must be able to make rapid and effective trust assessments and decisions. Here, the authors focus on coalition information acquisition and discuss mechanisms for assessing trust and arriving at decisions about how to act when trust can be supplemented by controls. They also discuss future directions for these systems and highlight outstanding challenges.
- Published
- 2014
30. A Two-Phase Dialogue Game for Skeptical Preferred Semantics
- Author
-
Nir Oren and Zohreh Shams
- Subjects
Non-cooperative game ,Sequential game ,Computer science ,business.industry ,Normal-form game ,ComputingMilieux_PERSONALCOMPUTING ,Screening game ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Extensive-form game ,Game design ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Repeated game ,020201 artificial intelligence & image processing ,Simultaneous game ,Artificial intelligence ,business ,Mathematical economics - Abstract
In this paper we propose a labelling based dialogue game for determining whether a single argument within a Dung argumentation framework is skeptically preferred. Our game consists of two phases, and determines the membership of a single argument within the extension, assuming optimal play by dialogue participants. In the first phase, one player attempts to advance arguments to construct an extension not containing the argument under consideration, while the second phase verifies that the extension is indeed a preferred one. Correctness within this basic game requires perfect play by both players, and we therefore also introduce an overarching game to overcome this limitation.
- Published
- 2016
31. Development of an integrated flexible transport systems platform for rural areas using argumentation theory
- Author
-
Nicolás D. Rotstein, John D. Nelson, Steve Wright, Nir Oren, Nagendra R. Velaga, and Timothy J. Norman
- Subjects
Engineering ,Decision support system ,Strategy and Management ,media_common.quotation_subject ,Economics, Econometrics and Finance (miscellaneous) ,General Decision Sciences ,Transportation ,Context (language use) ,Argumentation theory ,Management Science and Operations Research ,computer.software_genre ,Transport engineering ,Rural transport ,Intelligent agent ,Business and International Management ,media_common ,Flexibility (engineering) ,Service (business) ,business.industry ,Service provider ,Payment ,Risk analysis (engineering) ,Tourism, Leisure and Hospitality Management ,Flexible transport systems ,business ,computer - Abstract
Flexible transport systems (FTS) offer a promising approach to improving the efficiency and performance of passenger transportation services. FTS aim to provide passengers with flexibility in choosing routes, times, modes of transport, service provider and payment systems. In order to achieve this additional flexibility, a well-designed FTS integrate different modes of transport, possibly spanning multiple service providers, to provide more sophisticated, comfortable and cost-effective transport opportunities. The concept of flexible transport is not new; many existing systems, including shared taxicabs, Dial-A-Ride services, and car-clubs, contain elements of such a system. In this paper, we concentrate on FTS within rural areas, which generally suffer from lack of service availability and demand uncertainties, and for which existing FTS solutions are not well suited. We present an agent-based flexible transport systems platform developed using argumentation theory. Formal argumentation is a powerful technique borrowed from artificial intelligence, and in this context is used to weigh-up the conflicting choices available to both passengers and service providers. The resultant platform for FTS in rural areas acts as a virtual transport market place that would more effectively match existing demand and supply for transport services than existing solutions.
- Published
- 2012
- Full Text
- View/download PDF
32. Subjective logic and arguing with evidence
- Author
-
Alun Preece, Timothy J. Norman, and Nir Oren
- Subjects
Cognitive science ,Linguistics and Language ,Subjective logic ,Computer science ,business.industry ,Dialogue game ,Evidential reasoning approach ,Argumentation framework ,Language and Linguistics ,Domain (software engineering) ,Argumentation theory ,Artificial Intelligence ,Argument ,Argumentation ,Situated ,Artificial intelligence ,business ,Evidence ,Simple (philosophy) - Abstract
This paper introduces a subjective logic based argumentation framework primarily targeted at evidential reasoning. The framework explicitly caters for argument schemes, accrual of arguments, and burden of proof; these concepts appear in many types of argument, and are particularly useful in dialogues revolving around evidential reasoning. The concept of a sensor is also useful in this domain, representing a source of evidence, and is incorporated in our framework. We show how the framework copes with a number of problems that existing frameworks have difficulty dealing with, and how it can be situated within a simple dialogue game. Finally, we examine reasoning machinery that enables an agent to decide what argument to advance with the goal of maximising its utility at the end of a dialogue.
- Published
- 2007
33. Coordination, Organizations, Institutions, and Norms in Agent Systems X
- Author
-
Aditya Ghose, Nir Oren, John Thangarajah, and Pankaj R. Telang
- Subjects
Intelligent agent ,Knowledge management ,Sociotechnical system ,Knowledge representation and reasoning ,business.industry ,Computer science ,Multi-agent system ,Graph algorithms ,business ,computer.software_genre ,computer - Published
- 2015
34. Argumentation-based Normative Practical Reasoning
- Author
-
Nir Oren, Marina De Vos, Julian Padget, Zohreh Shams, and Ken Satoh
- Subjects
Practical reason ,Persuasion ,Deductive reasoning ,Management science ,Computer science ,media_common.quotation_subject ,Normative ,Semantics ,Verbal reasoning ,media_common ,Task (project management) ,Argumentation theory - Abstract
Reasoning about what is best for an agent to do in a particular situation is a challenging task. What makes it even more challenging in a dynamic environment is the existence of norms that aim to regulate a self-interested agent’s behaviour. Practical reasoning is reasoning about what to do in a given situation, particularly in the presence of conflicts between the agent’s practical attitude such as goals, plans and norms. In this paper we: (i) introduce a formal model for normative practical reasoning that allows an agent to plan for multiple and potentially conflicting goals and norms at the same time (ii) identify the best plan(s) for the agent to execute by means of argumentation schemes and critical questions (iii) justify the best plan(s) via an argumentation-based persuasion dialogue for grounded semantics.
- Published
- 2015
35. Theory and Applications of Formal Argumentation
- Author
-
Elizabeth Black, Sanjay Modgil, and Nir Oren
- Subjects
Computer science ,Formal epistemology ,Formal system ,Formal science ,Epistemology ,Argumentation theory - Published
- 2015
36. Argument Schemes for Normative Practical Reasoning
- Author
-
Nir Oren
- Subjects
Scheme (programming language) ,business.industry ,Management science ,Joint action ,Practical reason ,Action (philosophy) ,Argument ,Order (exchange) ,Normative model of decision-making ,Normative ,Artificial intelligence ,business ,computer ,Mathematics ,computer.programming_language - Abstract
This paper describes a framework for practical reasoning in the presence of norms. We describe a formal normative model constructed using Action-based Alternating Transition Systems. This model is able to represent goals; obligations and prohibitions and their violation; and permissions, which are used to derogate the former. Inspired by Atkinson’s scheme for practical reasoning, we utilise argument schemes and critical questions to both show and reason about how goals and obligations lead to preferences over the possible executions of the system. The model then allows us to determine if sufficient information has been provided in order to perform practical reasoning, identify the best courses of action, and explain why specific sequences of actions should be executed by agents within the system.
- Published
- 2014
37. Information Revelation Strategies in Abstract Argument Frameworks Using Graph Based Reasoning
- Author
-
Madalina Croitoru and Nir Oren
- Subjects
Structure (mathematical logic) ,Information sensitivity ,Argument ,Order (exchange) ,Simple (abstract algebra) ,business.industry ,Bond ,Confidentiality ,Artificial intelligence ,business ,Time complexity ,Mathematical economics ,Mathematics - Abstract
The exchange of arguments between agents can enable the achievement of otherwise impossible goals, for example through persuading others to act in a certain way. In such a situation, the persuading argument can be seen to have a positive utility. However, arguments can also have a negative utility uttering the argument could reveal sensitive information, or prevent the information from being used as a bargaining chip in the future. Previous work on arguing with confidential information suggested that a simple tree based search be used to identify which arguments an agent should utter in order to maximise their utility. In this paper, we analyse the problem of which arguments an agent should reveal in more detail. Our framework is constructed on top of a bipolar argument structure, from which we instantiate bonds subsets of arguments that lead to some specific conclusions. While the general problem of identifying the maximal utility arguments is NP-complete, we give a polynomial time algorithm for identifying the maximum utility bond in situations where bond utilities are additive.
- Published
- 2014
38. Reasoning with uncertain information and trust
- Author
-
Jeff Z. Pan, Achille Fokoue, Katia Sycara, Lance M. Kaplan, Tien Pham, Yuqing Tang, Nir Oren, Timothy J. Norman, Murat Sensoy, Geeth de Mel, Özyeğin University, and Şensoy, Murat
- Subjects
Computer science ,business.industry ,Theory of evidence ,Uncertainty ,Probabilistic logic ,Trust ,Fuzzy logic ,Description Logics ,Formalism (philosophy of mathematics) ,Description logic ,Dempster–Shafer theory ,Scalability ,Semantic memory ,Artificial intelligence ,business ,Information Fusion - Abstract
A limitation of standard Description Logics is its inability to reason with uncertain and vague knowledge. Although probabilistic and fuzzy extensions of DLs exist, which provide an explicit representation of uncertainty, they do not provide an explicit means for reasoning about second order uncertainty. Dempster-Shafer theory of evidence (DST) overcomes this weakness and provides means to fuse and reason about uncertain information. In this paper, we combine DL-Lite with DST to allow scalable reasoning over uncertain semantic knowledge bases. Furthermore, our formalism allows for the detection of conflicts between the fused information and domain constraints. Finally, we propose methods to resolve such conflicts through trust revision by exploiting evidence regarding the information sources. The effectiveness of the proposed approaches is shown through simulations under various settings. U.S. Army Research Laboratory ; U.K. Ministry of Defence.
- Published
- 2013
39. Persuasive dialogue for older adults
- Author
-
John Paul Vargheese, Judith Masthoff, Somayajulu Sripada, Nir Oren, Vicki L. Hanson, and Patricia Schofield
- Subjects
InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.,HCI) ,Telecare ,Applied psychology ,ComputingMilieux_PERSONALCOMPUTING ,Social relation ,InformationSystems_MODELSANDPRINCIPLES ,Order (business) ,Component (UML) ,medicine ,ComputingMilieux_COMPUTERSANDSOCIETY ,Interview study ,InformationSystems_MISCELLANEOUS ,Social isolation ,medicine.symptom ,Psychology - Abstract
We describe a persuasive dialogue component for promoting and encouraging social interaction for older adults. In order to identify effective persuasive strategies we conducted an interview study with formal carers for older adults. From the results of our study we have identified 6 persuasive strategies, information requirements and developed a model using rules for assessing older adult profiles and applying persuasive strategies.
- Published
- 2013
40. Agent-Driven Variable Pricing in Flexible Rural Transport Services
- Author
-
Timothy J. Norman, John D. Nelson, C. David Emele, Steve Wright, Cheng Zeng, Nir Oren, Nagendra R. Velaga, and John Farrington
- Subjects
Microeconomics ,Passenger transport ,Intelligent agent ,Computer science ,Variable pricing ,Quality of service ,Fixed price ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Rural area ,computer.software_genre ,computer ,Externality ,Profit (economics) - Abstract
The fares that passengers are asked to pay for their journey have implications on such things as passenger transport choice, demand, cost recovery and revenue generation for the transport provider. Designing an efficient fare structure is therefore a fundamental problem, which can influence the type of transport options passengers utilise, and may determine whether or not a transport provider makes profit. Fixed pricing mechanisms (e.g., zonal based fares) are rigid and have generally been used to support flexible transport services; however, they do not reflect the cost of provision or quality of service offered. In this paper, we present a novel approach that incorporates variable pricing mechanisms into fare planning for flexible transport services in rural areas. Our model allows intelligent agents to vary the fares that passengers pay for their journeys on the basis of a number of constraints and externalities. We empirically evaluate our approach to demonstrate that variable pricing mechanisms can significantly improve the efficiency of transport systems in general, and rural transport in particular. Furthermore, we show that variable pricing significantly outperforms more rigid fixed price regimes.
- Published
- 2013
41. Highlights on Practical Applications of Agents and Multi-Agent Systems
- Author
-
Nir Oren
- Published
- 2013
42. An Empirical Evaluation of Geometric Subjective Logic Operators
- Author
-
Alice Toniolo, Federico Cerutti, Timothy J. Norman, and Nir Oren
- Subjects
Core (game theory) ,Discounting ,Theoretical computer science ,Operator (computer programming) ,business.industry ,Reputation system ,Line (geometry) ,Context (language use) ,Artificial intelligence ,Computational trust ,business ,Subjective logic ,Mathematics - Abstract
Computational trust mechanisms aim to produce a trust rating from both direct and indirect information about agents behaviour. Josang's Subjective Logic has been widely adopted as the core of such systems via its fusion and discount operators. Recently we proposed an operator for discounting opinions based on geometrical properties, and, continuing this line of investigation, this paper describes a new geometry based fusion operator. We evaluate this fusion operator together with our geometric discount operator in the context of a trust system, and show that our operators outperform those originally described by Josang. A core advantage of our work is that these operators can be used without modifying the remainder of the trust and reputation system.
- Published
- 2013
43. Summary Report of The First International Competition on Computational Models of Argumentation
- Author
-
Federico Cerutti, Hannes Strass, Mauro Vallati, Serena Villata, Matthias Thimm, Nir Oren, Universität Koblenz-Landau [Koblenz], Web-Instrumented Man-Machine Interactions, Communities and Semantics (WIMMICS), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Scalable and Pervasive softwARe and Knowledge Systems (Laboratoire I3S - SPARKS), Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), Université Nice Sophia Antipolis (1965 - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (1965 - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA), Department of Computing Science - University of Aberdeen (CSD), University of Aberdeen, Universität Leipzig, University of Huddersfield, Université Nice Sophia Antipolis (... - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (... - 2019) (UNS), and Universität Leipzig [Leipzig]
- Subjects
QA75 ,Computational model ,Computer science ,business.industry ,Management science ,[SCCO.COMP]Cognitive science/Computer science ,02 engineering and technology ,Competitor analysis ,Task (project management) ,Argumentation theory ,Competition (economics) ,Artificial Intelligence ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,Enhanced Data Rates for GSM Evolution ,QA ,business - Abstract
Computational models of argumentation are an active research discipline within Artificial Intelligence that has grown since the beginning of the 1990s (Dung 1995).\ud While still a young field when compared to areas such as SAT solving and Logic Programming, the argumentation community is very active, with a conference series (COMMA, which began in 2006) and a variety of workshops and special issues of journals. Argumentation has also worked its way into a variety of applications. For example, Williams et al. (2015) described how argumentation techniques are used for recommending cancer treatments, while Toniolo et\ud al. (2015) detail how argumentation-based techniques can support critical thinking and collaborative scientific inquiry or intelligence analysis.\ud Many of the problems that argumentation deals with are computationally difficult, and applications utilising argumentation therefore require efficient solvers. To encourage this line of research, we organised the First International\ud Competition on Computational Models of Argumentation (ICCMA), with the intention of assessing and promoting state of the art solvers for abstract argumentation problems, and to identify families of challenging benchmarks for\ud such solvers.\ud The objective of ICCMA’15 is to allow researchers to compare the performance of different solvers systematically on common benchmarks and rules. Moreover, as witnessed by competitions in other AI disciplines such as planning and SAT solving, we see ICCMA as a new pillar of the community which provides information and insights on the current state of the art, and highlights future\ud challenges and developments.\ud This article summarises the first ICCMA held in 2015 (ICCMA’15). In this competition, solvers were invited to address standard decision and enumeration problems of abstract argumentation frameworks (Dunne and Wooldridge 2009).\ud Solvers’ performance is evaluated based on their time taken to provide a correct solution for a problem; incorrect results were discarded. More information about the competition, including complete results and benchmarks, can be found on the ICCMA website.
- Published
- 2016
44. Trust and obfuscation
- Author
-
Chris Burnett, Timothy J. Norman, Mani Srivastava, Lance M. Kaplan, Murat Sensoy, Nir Oren, and Chatschik Bisdikian
- Subjects
Order (exchange) ,Computer science ,Reliability (computer networking) ,Obfuscation ,Computer security ,computer.software_genre ,Private information retrieval ,computer - Abstract
In modern coalition operations, decision makers must be capable of obtaining and fusing data from diverse sources. The reliability of these sources can vary, and, in order to protect their interests, the data they provide can be obfuscated. The trustworthiness of fused data depends on both the reliability of these sources and their obfuscation strategy. Information consumers must determine how to evaluate trust in the presence of obfuscation, while information providers must determine the appropriate level of obfuscation in order to ensure both that they remain trusted, and do not reveal any private information. In this paper, through a coalition scenario, we discuss and formalise trust and obfuscation in these contexts and the complex relationships between them.
- Published
- 2012
45. Resource Boundedness and Argumentation
- Author
-
Nicolás D. Rotstein, Nir Oren, and Timothy J. Norman
- Subjects
Abstraction principle ,Theoretical computer science ,Application domain ,Argumentation semantics ,Boolean function ,Argumentation framework ,Algorithm ,Mathematics ,Argumentation theory ,Scheduling (computing) - Abstract
In this paper we extend the traditional Dung argumentation framework with cardinality constraints over the set of warranted arguments. This results in a new definition for argumentation semantics wherein arguments within an extension are both in some sense consistent and compliant with the constraints imposed on the system. After discussing the theoretical aspects of such a resource-bounded argumentation framework we describe its utility via an application to a concrete application domain: the scheduling of demand responsive transport.
- Published
- 2012
46. Probabilistic Argumentation Frameworks
- Author
-
Hengfei Li, Nir Oren, and Timothy J. Norman
- Subjects
Set (abstract data type) ,Argument ,Probabilistic logic ,Bayesian network ,Averaging argument ,Probabilistic relevance model ,Algorithm ,Mathematical economics ,Argumentation framework ,Probabilistic argumentation ,Mathematics - Abstract
In this paper, we extend Dung's seminal argument framework to form a probabilistic argument framework by associating probabilities with arguments and defeats. We then compute the likelihood of some set of arguments appearing within an arbitrary argument framework induced from this probabilistic framework. We show that the complexity of computing this likelihood precisely is exponential in the number of arguments and defeats, and thus describe an approximate approach to computing these likelihoods based on Monte-Carlo simulation. Evaluating the latter approach against the exact approach shows significant computational savings. Our probabilistic argument framework is applicable to a number of real world problems; we show its utility by applying it to the problem of coalition formation.
- Published
- 2012
47. Understanding Permissions through Graphical Norms
- Author
-
Michael Luck, Nir Oren, Madalina Croitoru, and Simon Miles
- Subjects
Derogation ,Knowledge management ,business.industry ,Human–computer interaction ,Computer science ,Conceptual graph ,Obligation ,Norm (social) ,Permission ,business - Abstract
Norm-aware agents are able to reason about the obligations, permissions and prohibitions that affect their operation. While much work has focused on the creation of such norm-aware agents, less effort has been placed on enabling system designers and users to understand the interactions between norms. Providing designers with such an understanding can aid in eliminating redundant norms and errors in norm specifications, while enhancing user understanding can increase the trust placed in a system. In this paper we make use of conceptual graph based semantics to provide a graphical representation that is designed to enhance the understanding of the interactions between different types of norms. More specifically, permissions derogate obligations and prohibitions, and the latter two norm types interact by conflicting with each other. Tracking these interactions in standard symbolic norm representations is difficult given a large set of norms, yet our work allows for the easy understanding of whether a permission causes obligation or prohibition derogation.
- Published
- 2011
48. Acting on Norm Constrained Plans
- Author
-
Felipe Meneguzzi, Michael Luck, Nir Oren, and Wamberto Vasconcelos
- Subjects
Risk analysis (engineering) ,Compromise ,media_common.quotation_subject ,Plan library ,Operations management ,Norm (social) ,Mathematics ,media_common - Abstract
The behaviour of deliberative agents is often guided by a plan library designed to achieve goals given certain environmental conditions. Plans in these plan libraries are designed to achieve individual goals, and cannot possibly account for all possible variations of restrictions in the societies within which these agents must operate. These restrictions, captured through norms, include obligations, prohibitions, and permissions. Unlike traditional planning restrictions, norms can often be contradictory and impossible to achieve simultaneously, necessitating some form of compromise. In this paper we describe a technique for taking norms into consideration when deciding how to execute a plan. Our norms are constraint based, allowing for fine-grained control over actions. Our technique allows for reasoning about the interactions between norms, and resolves conflict by selecting actions where the cost of violating one set of norms is outweighed by the reward obtained in complying with another.
- Published
- 2011
49. High-frequency ultrasound biomicroscopy of the anterior segment morphometry before and immediately after pars plana vitrectomy
- Author
-
Nir Oren, Meira Neudorfer, and Adiel Barak
- Subjects
Pars plana ,Adult ,Male ,medicine.medical_specialty ,Intraocular pressure ,genetic structures ,Anterior Chamber ,medicine.medical_treatment ,Ultrasound biomicroscopy ,Microscopy, Acoustic ,Vitrectomy ,Scleral buckle ,03 medical and health sciences ,0302 clinical medicine ,Retinal Diseases ,Ophthalmology ,Lens, Crystalline ,medicine ,Humans ,Postoperative Period ,Prospective Studies ,Intraocular Pressure ,Aged ,Aged, 80 and over ,business.industry ,Ciliary Body ,General Medicine ,Middle Aged ,eye diseases ,Surgery ,medicine.anatomical_structure ,Cross-Sectional Studies ,Lens (anatomy) ,Preoperative Period ,030221 ophthalmology & optometry ,Female ,sense organs ,Tamponade ,business ,030217 neurology & neurosurgery ,High frequency ultrasound - Abstract
Pur P ose . To characterize short-term changes induced by pars plana vitrectomy on anterior segment depth and lens thickness by means of high-frequency ultrasound biomicroscopy. Methods . We undertook a prospective case series study on consecutive patients referred for pars plana vitrectomy as the sole procedure in our institution between 2005 and 2007. Twenty-eight eyes of 28 patients undergoing pars plana vitrectomy were studied by ultrasound biomicroscopy. Neither silicone oil nor scleral buckle was used for any of the procedures. Anterior chamber depth and lens thickness were compared before and immediately after surgery, and their results were compared to the postoperative intraocular pressure measurements. results . There was a significant decrease in anterior chamber depth in the study eyes of patients who had undergone gas tamponade (p
- Published
- 2010
50. Arguing Using Opponent Models
- Author
-
Nir Oren and Timothy J. Norman
- Subjects
Fictitious play ,business.industry ,Argument ,Heuristic ,Computer science ,Line (geometry) ,Relevance (information retrieval) ,Artificial intelligence ,Adversary ,business ,ComputingMethodologies_ARTIFICIALINTELLIGENCE ,Argumentation theory ,Domain (software engineering) - Abstract
While researchers have looked at many aspects of argumentation, an area often neglected is that of argumentation strategies. That is, given multiple possible arguments that an agent can put forth, which should be selected in what circumstances. In this paper we propose a heuristic that implements one such strategy. The heuristic is built around opponent modelling, and operates by selecting the line of argument that yields maximal utility, based on the opponent's expected response, as computed by the opponent model. An opponent model may be recursive, with the opponent modelling of the agent captured by the original agent's opponent model. Computing the utility for each possible line of argument is thus done using a variant of M* search, which in itself is an enhancement of min-max search. After describing the M* algorithm we show how it may be adapted to the argumentation domain, and then study what enhancements are possible for more specific types of dialogue. Finally, we discuss how this heuristic may be extended in future work, and its relevance to argumentation theory in general.
- Published
- 2010
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.