Constructing transition models of AI planner behavior
نویسندگان
چکیده
Evaluation and debugging of AI systems require coherent views of program performance and behavior. We have developed a family of methods, called Dependency Detection, for analyzing execution traces for small patterns. Unfortunately, these methods provide only a local view of program behavior. The approach described in this paper integrates two methods, dependency detection [10] and CHAID-based analysis [3], to produce an abstract model of system behavior: a transition diagram of merged states. We present the algorithm and demonstrate it on synthetic examples and data from two AI planning and control systems. The models produced by the algorithm summarize sequences and cycles evident in the synthesized models and highlight some key aspects of behavior in the two systems. We conclude by identifying some of the inadequacies of the current algorithm and suggesting enhancements.
منابع مشابه
The Multimission VICAR Planner: Automated Image Processing for Scientific Data Analysis
The Multimission VICAR Planner (MVP) system is an AI planning system which constructs executable image processing programs to support Operational Science Analysis (OSA) requests made to the Jet Propulsion Laboratory (JPL) Multimission Image Processing Subsystem (MIPS). MVP accepts as input: image files and a high-level specification of desired corrections, enhancements, output properties (such ...
متن کاملQualitative Modeling in Education
valuable way for students to learn. Two modelbuilding environments, VMODEL and HOMER/VISIGARP, are presented that support learners by constructing conceptual models of systems and their behavior using qualitative formalisms. Both environments use diagrammatic representations to facilitate knowledge articulation. Preliminary evaluations in educational settings provide support for the hypothesis ...
متن کاملLearning Player Behavior Models to Enable Cooperative Planning for Non-Player Characters
In video games, non-player characters (NPCs) tend to have trouble initiating cooperative tactics because players usually have an unspoken preference for how to solve a challenge. For example, in a “Capture the Flag” game where players have to reach an objective, it is usually difficult to program an NPC to accommodate both players that want to stealthily reach the goal and players that want to ...
متن کاملModelling Discrete Event Sequences as State Transition Diagrams
Discrete event sequences have been modeled with two types of representation: snapshots and overviews. Snapshot models describe the process as a collection of relatively short sequences. Overview models collect key relationships into a single structure, providing an integrated but abstract view. This paper describes a new algorithm for constructing one type of overview model: state transition di...
متن کاملAlgebraic Matching of Vulnerabilities in a Low-Level Code
This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996