Professional Documents
Culture Documents
AI IA 2013 Advances in Artificial Intelligence XIIIth International Conference of the Italian Association for Artificial Intelligence Turin Italy December 4 6 2013 Proceedings 1st Edition Mario Alviano 2024 scribd download
AI IA 2013 Advances in Artificial Intelligence XIIIth International Conference of the Italian Association for Artificial Intelligence Turin Italy December 4 6 2013 Proceedings 1st Edition Mario Alviano 2024 scribd download
AI IA 2013 Advances in Artificial Intelligence XIIIth International Conference of the Italian Association for Artificial Intelligence Turin Italy December 4 6 2013 Proceedings 1st Edition Mario Alviano 2024 scribd download
OR CLICK LINK
https://textbookfull.com/product/ai-
ia-2013-advances-in-artificial-intelligence-
xiiith-international-conference-of-the-italian-
association-for-artificial-intelligence-turin-
italy-december-4-6-2013-proceedings-1st-edition-
mario-alvian/
Read with Our Free App Audiobook Free Format PFD EBook, Ebooks dowload PDF
with Andible trial, Real book, online, KINDLE , Download[PDF] and Read and Read
Read book Format PDF Ebook, Dowload online, Read book Format PDF Ebook,
[PDF] and Real ONLINE Dowload [PDF] and Real ONLINE
More products digital (pdf, epub, mobi) instant
download maybe you interests ...
https://textbookfull.com/product/artificial-intelligence-
xxxvi-39th-sgai-international-conference-on-artificial-
intelligence-ai-2019-cambridge-uk-
Artificial Intelligence XXXVII 40th SGAI International
Conference on Artificial Intelligence AI 2020 Cambridge
UK December 15 17 2020 Proceedings 1st Edition Max
Bramer
https://textbookfull.com/product/artificial-intelligence-
xxxvii-40th-sgai-international-conference-on-artificial-
intelligence-ai-2020-cambridge-uk-
december-15-17-2020-proceedings-1st-edition-max-bramer/
https://textbookfull.com/product/ambient-intelligence-4th-
international-joint-conference-ami-2013-dublin-ireland-
december-3-5-2013-proceedings-1st-edition-serge-autexier/
https://textbookfull.com/product/ai-2019-advances-in-artificial-
intelligence-32nd-australasian-joint-conference-adelaide-sa-
australia-december-2-5-2019-proceedings-jixue-liu/
AI*IA 2013:
LNAI 8249
Advances in
Artificial Intelligence
XIIIth International Conference
of the Italian Association for Artificial Intelligence
Turin, Italy, December 2013, Proceedings
123
Lecture Notes in Artificial Intelligence 8249
AI*IA 2013:
Advances in
Artificial Intelligence
XIIIth International Conference
of the Italian Association for Artificial Intelligence
Turin, Italy, December 4-6, 2013
Proceedings
13
Volume Editors
Matteo Baldoni
Cristina Baroglio
Guido Boella
Roberto Micalizio
Università degli Studi di Torino
Dipartimento di Informatica
via Pessinetto 12
10149 Torino, Italy
E-mail:{baldoni, baroglio, guido, micalizio}@di.unito.it
CR Subject Classification (1998): I.2, F.1, F.4.1, I.2.6, H.2.8, I.5, H.3-5
holders from the industrial world, and students. Attendees had the possibility
to book directly with authors time slots for discussion, through the web, or to
roam from table to table at the conference, browsing through discussions.
AI*IA 2013 received 86 submissions from 23 countries. Each submission was
reviewed by at least 3 Program Committee members. The Committee decided
to accept 45 papers. They are grouped in this volume in eight areas: knowledge
representation and reasoning, machine learning, natural language processing,
planning, distributed artificial intelligence: robotics and multi-agent systems,
recommender systems and semantic web, temporal reasoning and reasoning un-
der uncertainty, artificial intelligence applications. AI*IA 2013 was honored to
host also two invited speakers: prof. Giuseppe Attardi, from the University of
Pisa, and prof. Rafael H. Bordini, from the Pontificia Universidade Católica do
Rio Grande do Sul.
We would like to thank all the authors for their participation and the members
of the Program Committee for their excellent work during the reviewing phase.
Moreover, we would like to thank all the members of the Steering Committee of
AI*IA for their advice, a special thanks to Fabrizio Riguzzi, and Sara Manzoni
also for their support in the organization. Finally, we are very grateful to prof.
Paola Mello for her personal involvement and constant encouragement all along
the months which led to AI*IA 2013.
This event was sponsored by AI*IA, by the Department of Computer Science
of the University of Torino, and by the Artificial Intelligence Journal, and it
obtained the “patrocinio” by Regione Piemonte. The submission, revision, and
proceeding preparation phases were supported by EasyChair.
Organizing Committee
Matteo Baldoni University of Torino, Italy
Cristina Baroglio University of Torino, Italy
Guido Boella University of Torino, Italy
Federico Capuzzimati University of Torino, Italy
Vincenzo Lombardo University of Torino, Italy
Alessandro Mazzei University of Torino, Italy
Roberto Micalizio University of Torino, Italy
Program Committee
Giuliano Armano University of Cagliari, Italy
Matteo Baldoni University of Torino, Italy
Cristina Baroglio University of Torino, Italy
Roberto Basili University of Roma Tor Vergata, Italy
Federico Bergenti University of Parma, Italy
Stefano Bistarelli University of Perugia, Italy
Guido Boella University of Torino, Italy
Luciana Bordoni ENEA, Italy
Marco Botta University of Torino, Italy
Stefano Cagnoni University of Parma, Italy
Diego Calvanese Free University of Bozen-Bolzano, Italy
Antonio Camurri University of Genova, Italy
Amedeo Cappelli ISTI-CNR, Italy
Luigia Carlucci Aiello University of Roma “Sapienza”, Italy
Amedeo Cesta CNR, Italy
Antonio Chella University of Palermo, Italy
Luca Console University of Torino, Italy
Rosaria Conte ICST-CNR, Italy
Gabriella Cortellessa ISTC-CNR, Italy
Mehdi Dastani Utrecht University, The Netherlands
Giuseppe De Giacomo University of Roma “Sapienza”, Italy
X Organization
Additional Reviewers
Alviano, Mario Baioletti, Marco Bellandi, Andrea
Antonello, Mauro Basile, Pierpaolo Bellodi, Elena
Armano, Giuliano Basso, Filippo Benotto, Giulia
Organization XI
Sponsoring Institutions
AI*IA 2013 was partially finded by the Artificial Intelligence Journal, by the
Computer Science Department of the University of Turin, and by the Italian
Association for Artificial Intelligence. AI*IA 2013 received the “patrocinio” of
Regione Piemonte.
Table of Contents
Entity-from-Relationship Modelling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Claudio Masolo and Alessandro Artale
Machine Learning
Supervised Learning and Distributional Semantic Models for
Super-Sense Tagging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Pierpaolo Basile, Annalina Caputo, and Giovanni Semeraro
Planning
Offline and Online Plan Library Maintenance in Case-Based
Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Alfonso E. Gerevini, Anna Roubı́čková, Alessandro Saetti, and
Ivan Serina
Table of Contents XV
AI Applications
Reasoning-Based Techniques for Dealing with Incomplete Business
Process Execution Traces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Piergiorgio Bertoli, Chiara Di Francescomarino,
Mauro Dragoni, and Chiara Ghidini
CDoT: Optimizing MAP Queries on Trees . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Roberto Esposito, Daniele P. Radicioni, and Alessia Visconti
Gesture Recognition for Improved User Experience in a Smart
Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Salvatore Gaglio, Giuseppe Lo Re, Marco Morana, and
Marco Ortolani
An Efficient Algorithm for Rank Distance Consensus . . . . . . . . . . . . . . . . . 505
Liviu P. Dinu and Radu Tudor Ionescu
Table of Contents XVII
1 Introduction
M. Baldoni et al. (Eds.): AI*IA 2013, LNAI 8249, pp. 1–12, 2013.
c Springer International Publishing Switzerland 2013
2 M. Alviano, C. Dodaro, and F. Ricca
2 Preliminaries
In this section, we first introduce the syntax and the semantics of ASP. Then, we sketch
an algorithm for answer set computation.
12 AnalyzeConflictAndLearnConstraints(I);
13 return Incoherent ;
for an atom a. This notation extends to sets of literals, i.e., L := { | ∈ L} for a set
of literals L.
An interpretation I is a set of literals, i.e., I ⊆ A ∪ A. Intuitively, literals in I are
true, literals whose complements are in I are false, and all other literals are undefined.
I is total if there are no undefined literals, and I is inconsistent if there is a ∈ A such
that {a, not a} ⊆ I. An interpretation I satisfies a rule r if H(r) ∩ I = ∅ whenever
B(r) ⊆ I. On the contrary, I violates r if H(r) ∪ B(r) ⊆ I. Given an interpretation I
for Π, a positive literal is supported if there exist a rule r ∈ Π such that: a ∈ H(r),
B(r) ⊆ I and H(r) \ {} ∩ I = ∅. In this case r is said to be a supporting rule for in
I. A model of a program Π is a total consistent interpretation satisfying all rules of Π.
The reduct [1] Π M of Π w.r.t. M is obtained by deleting from Π each rule r such that
B − (r) ∩ I = ∅, and then by removing all the negative literals from the remaining rules.
A model M is an answer set for Π if Π M has no model N s.t. N + ⊂ M + , where N +
and M + are the sets of positive literals in N and M , respectively. If M is an answer set
of a program Π, then all positive literals in M are supported.
still undefined atoms, a heuristic criterion is used to chose one, say , and the compu-
tation proceeds recursively on I ∪ {}. If the recursive call returns an answer set, the
computation ends returning it. Otherwise, if an inconsistency arises, chosen literals are
unrolled until consistency of I is restored (backjumping), and the computation resumes
by propagating the consequences of the constraints learned by the conflict analysis.
In Algorithm 1, an important role is played by the inference rules implemented by
function Propagate, which may benefit of search space pruning operators specific of
ASP. In particular, in addition to unit propagation, the inference rule implemented by
SAT solvers, ASP solvers may rely on support propagation and unfounded set propaga-
tion. A brief description of these inference rules is provided below, and a more in-depth
analysis of the unfounded set propagation is reported in the next section.
Unit Propagation. An undefined literal is inferred by unit propagation if there is a
rule r that can be satisfied only by , i.e., r is such that ∈ H(r) ∪ B(r) and (H(r) ∪
B(r)) \ {} ⊆ I.
Support Propagation. Answer sets are supported models: for each atom a in an
answer set M there is a rule r such that B(r) ⊆ M and H(r) ∩ M = {a}; such a r is
referred to as a supporting rule of a. Support propagation applies either when an atom
a has no candidate supporting rules, or when a true atom has exactly one candidate
supporting rule r. In the first case, atom a is derived false, while in the second case all
undefined atoms in H(r) are derived false and all literals in B(r) are inferred true.
Unfounded Set Propagation. The answer sets of a program Π constitute an antichain
of the partial ordered set defined by the subset-containment relation over the set of
all interpretations for Π. Stated differently, any pair of distinct answer sets of Π is
incomparable with respect to subset-containment. It turns out that supportedness is not
sufficient for characterizing answer sets in general, and supported models not being
answer sets are referred to as unfounded. Unfounded set propagation aims at detecting
unfounded atoms, which are then deterministically inferred as false.
e c a f
g d b h
12 return C \ F oundedAtoms;
7 foreach a ∈ S do
8 if FindSourcePointer(a, C, S) then
9 S := S \ {a}; Q := {a};
10 foreach a ∈ Q do
11 foreach internal rule r of C s.t. a ∈ B + (r) do
12 Let a be the unique atom in H(r) ∩ C;
13 if a ∈ S and r can support a and B + (r) ∩ S = ∅ then
14 S := S \ {a }; source pointer(a ) := r;
15 Q := Q ∪ {a };
16 return S;
and the process is repeated (lines 2–6). Then, new source pointers are computed by
means of function FindSourcePointer, which looks for a supporting rule whose positive
body literals already have source pointers. During this process, each atom assigned to a
source pointer is removed from S, which may result in new source pointer assignments
(lines 7–15).
Example 3. Consider Example 1, and let us assume the following source pointers:
source pointer(a) := r6 , source pointer(b) := r1 , source pointer(c) := r7 ,
source pointer(d) := r3 . Suppose that literal not e is chosen by procedure Choose-
UndefinedLiteral (line 6 in Alg.1). Rules r4 and r5 become satisfied due to a false body
literal, but Alg. 3 is not run because neither r4 nor r5 is a source pointer. Suppose now
that procedure ChooseUndefinedLiteral picks literal not f , thus satisfying rule r6 , the
source pointer of atom a. Alg. 3 is then run for S := {a}. First, source pointers whose
bodies are not disjoint from S have to be unset. In this case, rule r1 contains atom a in
its positive body; atom b is then added to S and its source pointer unset. At this point,
the algorithm looks for new source pointers. Concerning atom a, the external rules r4
and r6 cannot be source pointers because their bodies are false, while the internal rule
r0 cannot be a source pointer because its positive body contains an atom belonging to
S. Similarly, rule r1 cannot be a source pointer of b because B + (r1 ) ∩ S = ∅. Finally,
the algorithm terminates returning the unfounded set S = {a, b}.
8 M. Alviano, C. Dodaro, and F. Ricca
10 return FALSE;
4 Experiments
In this section we first report a few details on the benchmark problems considered in
our experiment. Then, we analyze the performance of the algorithms for unfounded set
detection presented in the previous section.
can be modified by pushing rows and columns, so that the avatar can reach the goal field
(which changes its location when its location is pushed) from its starting field in less
than a given number of allowed pushes. The following rules apply to the considered
variant of the problem: (i) pushing out a field of the labyrinth causes it to reappear on
the other end of the pushed row or column, respectively; (ii) the avatar can move to
any field reachable via a path in which every (non-terminal) field has a connection to
its successor, and vice versa; (iii) there is a unique starting and a unique goal field in
the labyrinth. A solution is represented by pushes of the labyrinth’s rows and columns
needed to guide the avatar to its goal.
Numberlink. Numberlink is a type of logic puzzle involving finding paths to connect
numbers in a grid. All the matching numbers on the grid have to be paired with single
continuous lines that never cross over each other. The problem has been generalized
so that the grid can be seen as an undirected graph. The goal is to find a list of paths
connecting two terminal vertices for each connection such that no vertex is included in
more than two paths.
MazeGeneration. This problem consists of generating a maze in an m × n grid by
placing some walls in the available cells. In a valid solution each cell is either left empty
or contains a wall, two distinct cells on the edges are indicated as entrance and exit, and
the following conditions are satisfied: (i) each cell on the edge of the grid is a wall,
except entrance and exit that are empty; (ii) there is no 2 × 2 square of empty cells
or walls; (iii) if two walls are on a diagonal of a 2 × 2 square, then not both of their
common neighbors are empty; (iv) no wall is completely surrounded by empty cells;
(v) there is a path from the entrance to every empty cell.
Concerning the hardware settings, the experiment was run on a four core Intel Xeon
CPU X3430 2.4 GHz, with 4 GB of physical RAM and PAE enabled, running Linux De-
bian Lenny (32bit). Only one of the four processors was enabled and time and memory
limits were set to 600 seconds and 3 GiB (1 GiB = 230 bytes), respectively. Execution
times were measured with the Benchmark Tool Run (http://fmv.jku.at/run/).
4.3 Result
The result of the experiment is reported in Table 1. The table features a column for
each executable, and a row for each problem. For each pair executable-problem the
10 M. Alviano, C. Dodaro, and F. Ricca
table reports the number of solved instances and the average execution time. Totals are
reported in the last row of the table.
In our experiment, the algorithms based on source pointers perform better than those
implemented in DLV. In fact, waspSP DLV
split solved 18 instances more than waspsplit , and
SP DLV
wasp solved 29 instances more than wasp . Looking in detail, it can be observed
that the source pointer algorithm is preferable in all domains, but the differences are
more significant for SokobanDecision and MazeGeneration. Indeed, waspSP split solved 4
instances of SokobanDecision more than waspDLV split , spending around half of the execu-
tion time on the average in this domain. The difference between waspsplit and waspDLV
SP
split
is even more marked in MazeGeneration. In fact, in this case waspSP split (resp. wasp
SP
)
DLV DLV
solved 11 more instances than waspsplit (resp. wasp ). The different behaviors can
be explained by a downside of the DLV-like algorithms. In fact, these algorithms have
to be executed after any potential supporting rule for some atom in a cyclic HCF com-
ponent is lost; on the other hand, the source pointer algorithms are only run when some
source pointer is lost. This difference between the two algorithms seems to affect per-
formances significantly.
Concerning the effect of splitting the programs in components, the results reported
in Table 1 outline that it is in general advantageous to divide the input program to local-
ize unfounded set computation. In fact, both of the algorithms waspSP DLV
split and waspsplit
SP
outperform the corresponding 1-component versions. In particular, waspsplit solved (in
total) 3 instances more than waspSP , and waspDLV split solved 14 more instances than
DLV
wasp . Looking in detail, splitting the program pays of in both Labyrinth and Num-
berlink, since the instances of these problems feature a dependency graph with sev-
eral cyclic components. Conversely, splitting in components introduces a little overhead
(i.e., a slowdown of around 2%) for KnightTour and MazeGeneration. This behavior can
be explained by the fact that the instances of these two problems feature a dependency
graph with only one cyclic component. Now consider the case of SokobanDecision,
where the instances feature a dependency graph composed of one big cyclic compo-
nent and some cyclic components containing few atoms. Here waspDLV split outperforms
waspDLV , but waspSP split in total is slower than wasp SP
. This can be explained by a
heuristic factor. In fact, by analyzing all instances, waspSP split is faster than waspSP in
15 instances, while it is slower in just 8 instances. To have an evidence of our conjunc-
ture, we repeated the experiment for Sokoban by forcing the same heuristic choices in
waspDLV
split waspDLV waspSP
split waspSP
Solved Time (s) Solved Time (s) Solved Time (s) Solved Time (s)
10-SokobanDecision 18 4578.71 16 3478.27 22 2739.45 22 2605.49
12-KnightTour 7 99.43 7 99.36 8 272.01 8 266.84
17-Labyrinth 29 3784.78 19 2879.38 30 3729.56 28 2773.71
20-Numberlink 32 1946.98 30 3199.03 33 2012.69 32 1982.96
33-MazeGeneration 39 3947.03 39 3852.47 50 1346.29 50 1322.99
Total 125 14356.93 111 13508.51 143 10100.00 140 8951.99
Another random document with
no related content on Scribd:
RETREAT OF THE UNION ARMY.
The Federal troops remained in Springfield until Monday
morning, and then started on their retreat towards Rolla,
unmolested by the rebels. The enemy entered the town immediately
after its evacuation by the Federal forces, having suffered the loss of
a large portion of their tents, baggage and camp stores by the attack
of Sigel.
Hundreds of the inhabitants of this section were now compelled to
leave their homes, and the exiles were seen every day on the roads
leading to St. Louis, fleeing for refuge beyond the lines of the
insurgents, plundered of everything and destitute, having been
forced to abandon their homes and property to save their lives.
The loyal people who remained were favored with proclamations
by McCulloch and Price, which abounded in abuse and
misrepresentation of the Federal army, and were filled with
professions and promises which strikingly contrasted with their
administration and conduct.
This calamity was not merely disastrous by its positive loss, but it
gave a prestige of success to the rebel leaders, and afforded an
opportunity for them to increase the spirit of rebellion among the
people, as well as to nerve themselves to other enterprises. On the
17th, fifteen hundred recruits had assembled in Saline county, and
were preparing to join General Price, or to engage in local operations
in the surrounding counties. On the 18th, about one thousand men
from Chariton county crossed the Missouri at Brunswick, with a
large number of horses and wagons, on their march to join Price’s
division.
The rebels were so much elated with the death of General Lyon
and the abandonment of Springfield by the Federal troops, that they
became more reckless than ever in their depredations and
persecutions of the loyal citizens. In St. Louis on the 14th, after the
retreat became known, they became so bold and defiant that General
Fremont proclaimed martial law, and appointed Major J. McKinstry
as Provost-Marshal.
On the 20th, a train on the Hannibal and St. Joseph’s railroad was
fired into, and one soldier killed and six wounded. The train was
immediately stopped, and two of the guerrillas were killed and five
captured.
Five days afterwards, on the 25th, Governor Gamble issued a
proclamation calling for forty-two thousand volunteers to defend the
State, restore peace and subdue the insurrection; the term of service
to be six months, unless sooner discharged.
KENTUCKY.