understanding emerging events: reading and reasoning t hrough s imulation
DESCRIPTION
Understanding Emerging Events: Reading and Reasoning T hrough S imulation. Andrei Barbu, Gary Borchardt and Boris Katz MIT Computer Science and Artificial Intelligence Laboratory July 8, 2014. A scenario. The Freedom Brigade carried out 7 kidnappings in 2013. - PowerPoint PPT PresentationTRANSCRIPT
MIT
Understanding Emerging Events:Reading and Reasoning Through Simulation
Andrei Barbu, Gary Borchardt and Boris Katz
MIT Computer Science and Artificial Intelligence Laboratory
July 8, 2014
MIT
The Freedom Brigade carried out 7 kidnappings in 2013.
The Freedom Brigade has expressed a dislike of Trifex Corporation.
A scenario
Recently-intercepted communications from the Freedom Brigade suggest a possible attack Thursday evening.
Philippe Henson is an executive at Trifex Corporation.
Philippe Henson recently hired a new security detail.
Philippe Henson's financial situation has drastically deteriorated.
Philippe Henson typically visits his cousin Olmert Lee on Thursdays.
It is 4:00pm Thursday, and Olmert Lee claims Philippe Henson is missing.
There has been a 10-hour power outage in Philippe Henson's neighborhood.
MIT
Narratives
Plans
Routines
Actions
Events
Changes
States
Attributes
Objects
Times4:00pm Thursday, Thursday evening
Multiple levels of abstraction
The Freedom Brigade, Philippe Henson, a neighborhood
Location, financial situation, dislike, employment
At 4:00pm Thursday, Philippe Henson is missing.
Deterioration of Philippe Henson's financial situation
A 10-hour power outage in Philippe Henson's neighborhood
Philippe Henson recently hired a new security detail.
Philippe Henson typically visits Olmert Lee on Thursdays.
Different ways of carrying out kidnappings
An update regarding the Freedom Brigade
MIT
NarrativesPlansRoutinesActionsEventsChangesStatesAttributesObjectsTimes
Reported actions and events
Progress from our ICArUS effort
MIT
Envisioning in support of plan recognition
reported actions
Plan Recognition
Envisioning
postulated plan executions
traveling to a locationplacing/retrieving an objectmeeting someonegiving an objectbuilding/detonating an IEDmaking a phone callraising an alertthreatening someone
IED attacksmugglingrobberykidnapping
MIT
not appear
Language-motivated representation
. . .
Actions
Events
Changes
States
Attributes
Objects
Times
being an instance of a typebeing a part of an objectposition of an objectspeed of an objectheading of an objectdistance between two objectspossession of an object by a humanuse of an object by a humaninteraction between two humanscontrol of a human by a humanbeing afraid
being an instance of a typebeing a part of an object
possession of an object by a humanuse of an object by a humaninteraction between two humanscontrol of a human by a humanbeing afraid
position of an object
heading of an objectspeed of an object
distance between two objects
appear
disappear
change
increase
decrease not decrease
not increase
not change
not disappear
for Booleanattributes
for qualitativeattributes
for quantitativeattributes
MIT
Event models
MIT
Agent-1 meets Agent-2 at Location-1.
Agent-1 gives IED-1 to Agent-2.
Agent-2 retrieves Explosive-Materials-1
from Location-5.
Agent-2 travels to Location-9.
Agent-2 builds IED-1 using Explosive-
Materials-1.
Agent-2 travels to Location-7.
Agent-2 makes a phone call.
Agent-2 meets Agent-3 at Location-7.
Agent-2 gives IED-1 to Agent-
3.
Agent-3 travels to Location-3.
Agent-3 places IED-1 at
Location-3.
Agent-3 detonates
IED-1.
Agent-3 makes a phone call.
IED-1 self-detonates.
An IED attack
start 0.5
0.25
0.25
end
0.5
0.5
0.50.5 0.5
0.5
Agent-1 meets Agent-2 at Location-1.
Agent-2 travels to Location-7.
Agent-3 travels to Location-3.
Agent-1 gives IED-1 to Agent-2.
Agent-2 meets Agent-3 at Location-7.
Agent-2 gives IED-1 to Agent-
3.
Agent-3 places IED-1 at
Location-3.
IED-1 self-detonates.
Agent-3 detonates
IED-1.
Agent-3 makes a phone call.
Agent-2 retrieves Explosive-Materials-1
from Location-5.
Agent-2 travels to Location-9.
Agent-2 builds IED-1 using Explosive-
Materials-1.
Agent-2 meets Agent-3 at Location-7.
Agent-2 gives IED-1 to Agent-
3.
Agent-3 places IED-1 at
Location-3.
IED-1 self-detonates.
Agent-2 makes a phone call.
Agent-3 detonates
IED-1.
Agent-3 makes a phone call.
Agent-2 meets Agent-3 at Location-7.
Agent-2 gives IED-1 to Agent-
3.
Agent-3 places IED-1 at
Location-3.
IED-1 self-detonates.
Agent-3 detonates
IED-1.
Agent-3 makes a phone call.
MIT
Envisioning two simultaneous event occurrences
. . .
. . .
. . .
. . .
. . .
. . .
MIT
Envisioning two sequential event occurrences
Conflicts Detected In the second event, IED-11 does not initially exist, whereas at
the end of the first event, it does. In the second event, Agent-15 is not initially in possession of the
IED, whereas at the end of the first event, Agent-15 is in possession of the IED.
Hypothesized Agent-15 retrieves IED-11 from Location-15 from 11:10 to 11:20. Agent-15 builds IED-11 using Explosive-Material-11 from 11:30
to 11:40.