Reading and Reasoning T hrough S imulation Andrei Barbu Gary Borchardt and Boris Katz MIT Computer Science and Artificial Intelligence Laboratory July 8 2014 The Freedom Brigade carried out 7 kidnappings in 2013 ID: 263372
Download Presentation The PPT/PDF document "Understanding Emerging Events:" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Understanding Emerging Events:Reading and Reasoning Through Simulation
Andrei Barbu, Gary Borchardt and Boris Katz
MIT Computer Science and
Artificial Intelligence Laboratory
July 8, 2014Slide2
The Freedom Brigade carried out 7 kidnappings in 2013.
The Freedom Brigade has expressed a dislike of Trifex Corporation.
A scenario
Recently-intercepted communications from the Freedom Brigade suggest a possible attack Thursday evening.
Philippe Henson is an executive at Trifex Corporation.
Philippe Henson recently hired a new security detail.Philippe Henson's financial situation has drastically deteriorated.Philippe Henson typically visits his cousin Olmert Lee on Thursdays.
It is 4:00pm Thursday, and Olmert Lee claims Philippe Henson is missing.
There has been a 10-hour power outage in Philippe Henson's neighborhood.Slide3
Narratives
Plans
Routines
Actions
EventsChangesStatesAttributesObjectsTimes
4:00pm Thursday, Thursday eveningMultiple levels of abstraction
The Freedom Brigade, Philippe Henson, a neighborhood
Location, financial situation, dislike, employment
At 4:00pm Thursday, Philippe Henson is missing.
Deterioration of Philippe Henson's financial situation
A 10-hour power outage in Philippe Henson's neighborhood
Philippe Henson recently hired a new security detail.
Philippe Henson typically visits Olmert Lee on Thursdays.
Different ways of carrying out kidnappings
An update regarding the Freedom BrigadeSlide4
NarrativesPlansRoutines
Actions
EventsChangesStatesAttributesObjectsTimes
Reported actions and events
Progress from our ICArUS effortSlide5
Envisioning in support of plan recognitionreported actions
Plan Recognition
Envisioning
p
ostulated plan executions
traveling to a locationplacing/retrieving an objectmeeting someone
giving an objectbuilding/detonating an IEDmaking a phone callraising an alertthreatening someone
IED attacksmugglingrobberykidnappingSlide6
not appear
Language-motivated
r
epresentation
. . .
ActionsEventsChangesStatesAttributesObjectsTimes
being an instance of a typebeing a part of an object
position of an objectspeed of an objectheading of an objectdistance between two objectspossession of an object by a humanuse of an object by a humaninteraction between two humanscontrol of a human by a humanbeing afraid
being an instance of a type
being a part of an object
possession of an object by a human
use of an object by a human
interaction between two humans
control of a human by a human
being afraid
position
of an object
heading of
an
object
speed of
an object
distance between two objects
appear
disappear
change
increase
decrease
not decrease
not increase
not change
not disappear
f
or Boolean
attributes
f
or qualitative
attributes
for quantitative
attributesSlide7
Event modelsSlide8
Agent-1 meets Agent-2 at Location-1.
Agent-1 gives IED-1 to Agent-2.
Agent-2 retrieves Explosive-Materials-1 from Location-5.Agent-2 travels to Location-9.Agent-2 builds IED-1 using Explosive-Materials-1.
Agent-2 travels to
Location-7.Agent-2 makes a phone call.Agent-2 meets Agent-3 at Location-7.Agent-2 gives IED-1 to Agent-3.Agent-3 travels to Location-3.
Agent-3 places IED-1 at Location-3.Agent-3 detonates IED-1.Agent-3 makes a phone call.IED-1 self-detonates.An IED attackstart
0.50.250.25
end
0.5
0.5
0.5
0.5
0.5
0.5
Agent-1 meets Agent-2 at
Location-1.
Agent-2 travels to
Location-7.
Agent-3 travels to
Location-3.
Agent-1 gives IED-1 to Agent-2.
Agent-2 meets Agent-3 at
Location-7.
Agent-2 gives IED-1 to Agent-3.Agent-3 places IED-1 at Location-3.IED-1 self-detonates.Agent-3 detonates IED-1.Agent-3 makes a phone call.Agent-2 retrieves Explosive-Materials-1 from Location-5
.
Agent-2 travels to
Location-9.
Agent-2 builds IED-1 using Explosive-Materials-1.
Agent-2 meets Agent-3 at
Location-7.
Agent-2 gives IED-1 to Agent-3.
Agent-3 places IED-1 at
Location-3.
IED-1 self-detonates.
Agent-2 makes a phone call.
Agent-3 detonates IED-1.
Agent-3 makes a phone call.
Agent-2 meets Agent-3 at
Location-7.
Agent-2 gives IED-1 to Agent-3.
Agent-3 places IED-1 at
Location-3.
IED-1 self-detonates.
Agent-3 detonates IED-1.
Agent-3 makes a phone call.Slide9
Envisioning two simultaneous event occurrences
. . .
. . .
. . .
. . .
. . .
. . .Slide10
Envisioning two sequential event occurrences
Conflicts Detected
In the second event, IED-11 does not initially exist, whereas at the end of the first event, it does.In the second event, Agent-15 is not initially in possession of the IED, whereas at the end of the first event, Agent-15 is in possession of the IED.
Hypothesized
Agent-15 retrieves IED-11 from Location-15 from 11:10 to 11:20.Agent-15 builds IED-11 using Explosive-Material-11 from 11:30 to 11:40.