MENU
STIDS 2012 Home
About--
Topic list
Program Committee
Venue & Local info
Registration
Sponsors
Program--
Keynote Speakers
Tutorials
Best Paper Award
Agenda & Papers
Download Agenda
Proceedings
Call for Papers
Important dates
Submission details
Download CFP
Attendees
C4I
Home
|
SEMANTIC
TECHNOLOGY FOR
INTELLIGENCE,
DEFENSE, AND
SECURITY
STIDS 2012
Schedule of Events
Wednesday, October 24th
08:00 - 09:00 |
|
Registration and Breakfast |
|
|
|
09:00 - 09:10 |
|
Initial remarks - Paulo Costa, STIDS 2012 Co-Chair |
|
|
|
09:10 - 09:30 |
|
Welcome - Mark Pullen, Director of the C4I Center |
|
|
|
09:30 - 10:30 |
|
Keynote Address |
|
Mike Dean
A Pragmatic View of the Semantic Web and Ontologies
Presentation
I continue to be excited about the accomplishments and potential of the
Semantic Web and related technologies. In this talk, I'll review some
of those accomplishments, present some applications, discuss various
emerging technologies (Wikidata, GeoSPARQL, SILK, PROV, Big Data,
stream processing, etc.), identify some things that are still missing,
and perhaps offer some predictions for the future.
( Bio)
|
|
|
|
10:30 - 11:00 |
|
Break |
|
|
|
11:00 - 12:00 |
|
Research Session -
Chair: Dan Maxwell, KaDSci, Inc. |
11:00 - 11:30 |
|
Using Ontologies in a Cognitive-Grounded System:
Automatic Action Recognition in Video-Surveillance
Paper
Presentation
|
Alessandro Oltramari, Christian Lebiere
Carnegie Mellon University
|
|
Abstract
This article presents an integrated cognitive system for automatic video-surveillance: in particular, we focus on
the task of classifying the actions occurring in a scene. For this purpose, we developed a semantic infrastructure
on top of a hybrid computational ontology of actions. The article outlines the core features of this infrastructure,
illustrating how the processing mechanisms of the cognitive system benefit from knowledge capabilities in fulfilling
the recognition goal. Ultimately, the paper demonstrates that ontologies can enhance a cognitive architecture's
functionalities, allowing for high-level performance in complex task execution.
|
11:30 - 12:00 |
|
Horizontal Integration of Warfighter Intelligence Data: A Shared Semantic Resource for the Intelligence Community
Paper
Presentation
|
Barry Smith (a), Tatiana Malyuta (b), William S. Mandrick (b), Chia Fu (b),
Kesny Parent ( c), Milan Patel (c)
a. University at Buffalo, b. Data Tactics Corp., c. Intelligence and Information Warfare Directorate (I2WD)
|
|
Abstract
We describe a strategy that is being used for the horizontal integration of warfighter intelligence data within
the framework of the US Army's Distributed Common Ground System Standard Cloud (DSC) initiative. The strategy
rests on the development of a set of ontologies that are being incrementally applied to bring about what we call
the 'semantic enhancement' of data models used within each intelligence discipline. We show how the strategy
can help to overcome familiar tendencies to stovepiping of intelligence data, and describe how it can be applied
in an agile fashion to new data resources in ways that address immediate needs of intelligence analysts.
|
12:00 - 13:30 |
|
Lunch |
|
|
|
13:30 - 15:00 |
|
Research Session -
Chair: Robert Schrag, Digital Sandbox, Inc. |
13:30 - 14:00 |
|
Constellation: A Prototype ISO/IEC 11179 Metadata Registry
Paper
Presentation
|
Gramm Richardson(a), Elli Schwarz(b)
a. US DOD and b. SRA International
|
|
Abstract
Different systems across the government, as well as in the private sector, use different country names or country codes
to represent the notion of a "country" within a particular problem domain. These systems may choose to represent countries
using a particular standard for county names and country codes. Often times these systems find themselves interacting with
other systems that may use another standard for country representation. This makes it difficult to compare and link
country-related data in a consistent fashion. We describe our work on the Constellation system using the ISO/IEC 111179
metadata standard to register the various country code sets in a common metamodel. This facilitates management, querying,
updating and mapping the elements within the code sets.
|
14:00 - 14:30 |
|
The URREF Ontology for Semantic Wide Area Motion Imagery Exploitation
Presentation
|
Erik Blasch(a), Paulo Costa (b), Kathryn Laskey (b), Haibin Ling ( c), Genshe Chen (d)
a. Air Force Research Lab, b. George Mason University, c. Temple University, d. Information Fusion Tech
|
|
Abstract
Current advances operational information fusion systems (IFSs) require common semantic ontologies for collection,
storage, and access to multi intelligence information. One example is the connections between physics-based (e.g. video)
and text-based (e.g. reports) describing the same situation. Situation, user, and mission awareness are enabled through
a common ontology. In this paper, we utilize the uncertainty representation and reasoning evaluation framework (URREF)
ontology as a basis for describing wide-area motion imagery (WAMI) analysis to determine uncertainty attributes. As part
of the Evaluation of Technologies for Uncertainty Representation Working Group (ETURWG), both the URREF and a WAMI
challenge problem are available for research purposes from which we describe the URREF, a exemplar schema to link
physics-based and text-based uncertainty representations, and explore an example from WAMI exploitation for a
common uncertainty demonstration.
|
14:30 - 15:00 |
|
Developing an Ontology of the Cyber Security Domain
Paper
Presentation
|
Leo Obrst, Penny Chase, Richard Markeloff
The MITRE Corporation
|
|
Abstract
This paper reports on a trade study we performed to support the development of a Cyber ontology from an initial
malware ontology. The goals of the Cyber ontology effort are first described, followed by a discussion of the
ontology development methodology used. The main body of the paper then follows, which is a description of the
potential ontologies and standards that could be utilized to extend the Cyber ontology from its initially constrained
malware focus. These resources include, in particular, Cyber and malware standards, schemas, and terminologies that
directly contributed to the initial malware ontology effort. Other resources are upper (sometimes called 'foundational')
ontologies. Core concepts that any Cyber ontology will extend have already been identified and rigorously defined in
these foundational ontologies. However, for lack of space, this section is profoundly reduced. In addition, utility
ontologies that are focused on time, geospatial, person, events, and network operations are briefly described. These
utility ontologies can be viewed as specialized super-domain or even mid-level ontologies, since they span many, if not
most, ontologies -- including any Cyber ontology. An overall view of the ontological architecture used by the trade study
is also given. The report on the trade study concludes with some proposed next steps in the iterative evolution of the
Cyber ontology.
|
|
|
|
15:00 - 15:30 |
|
Break |
|
|
|
15:30 - 17:00 |
|
Research Session - Chair: Charles Twardy, George Mason University |
15:30 - 16:00 |
|
Ontological Considerations for Uncertainty Propagation
in High Level Information Fusion
Paper
Presentation
|
Mark Locher(a,b), Paulo Costa(a)
a. GMU and b. SRA International
|
|
Abstract
Uncertainty propagation in a level 2 high level information fusion (HLIF) process is affected by a number of
considerations. These include the varying complexities of the various types of level 2 HLIF. Five different
types are identified, ranging from simple entity attribute refinement using situation status data to the
development of a complete situation assessment assembled from applicable situational fragment data. Additional
considerations include uncertainty handling in the input data, uncertainty representation, the effects of the
reasoning technique used in the fusion process, and output considerations. Input data considerations include
the data's relevance to the situation, its credibility, and its force or weight. Uncertainty representation
concerns follow the uncertainty ontology developed by the W3C Incubator Group on Uncertainty Reasoning. For
uncertainty effects of the fusion process, a basic fusion process model is presented, showing the impacts of
uncertainty in four areas. Finally, for output uncertainty, the significance of a closed-world versus
open-world assumption is discussed.
|
16:00 - 16:30 |
|
A Semantic Approach to Evaluate the Impact of Cyber Actions to the Physical Domain
Paper
Presentation
|
Alexandre Barreto (a,b), Paulo Costa (a), Edgar Yano (b)
a. C4I Center, George Manson University and
b. Inst. Technológico de Aeronáutica, Brazil
|
|
Abstract
Evaluating the impact that events within the cyber domain inflict to a military operation and its critical
infrastructure is a non-trivial question, which remains unanswered so far in spite of the various research
efforts addressing it. The key issue underlying this question is the difficulty in correlating cyber and physical
behaviors in an integrated view, thus allowing for real-time task evaluation. This paper addresses the issue
with the development of an ontology-based framework in which the cyber and physical behaviors are integrated
in a consolidated view, using a combination of open standards protocols and semantic technologies. In our
approach, the mission and its physical aspects are modeled using a business process language (e.g., BPMN)
and an information infrastructure based on Simple Network Management Protocol (SNMP). In this scheme, changes
in the environment are captured using the output of sensor components existing in the infrastructure. In order
to ensure a complete and integrated analysis of the accruing data, we have developed a Cyber Situation ontology
(in OWL language) and a methodology for mapping the cyber and the physical domains. In this framework, mission
data from the environment is retrieved and fused using an engine based on the semantic rule language (SWRL).
The output of this process is then presented to an analyst in a way that only the most important information
needed to support his/her decisions is shown. To validate our approach, a fictitious air traffic scenario was
modeled and many simulated flights were generated in support to our experiments.
|
16:30 - 17:00 |
|
Intrinsically Resilient Energy Control Systems
Paper
Presentation
|
Frederick Sheldon (a), Jingshan Huang (b), Jiangbo Dang( c), Daniel Fetzer (a),
Stuart Goose( c), Jonathan Kirsch ( c), David Manz (d), Thomas Morris (e), Dong Wei (c)
a. Oak Ridge Natl Laboratory, b. University of S. Alabama, c. Siemens Corporation,
d. Pacific NW Natl Laboratory, e. Mississippi St. University
|
|
Abstract
To preserve critical energy control functions while under attack, it is necessary to perform comprehensive analysis
on the root cause and impact of an ongoing cyber intrusion without sacrificing the availability of energy delivery.
In this position paper, we present a proof of concept of an intrinsically resilient energy control system, with the
ultimate goal of ensuring availability/resiliency of energy delivery functions, along with the capability to assess
root causes and impacts of cyber intrusions.
|
|
|
|
17:00 - 18:30 |
|
Poster Session / Social Event
|
|
|
Study of MEBN Learning for Relational Model
Paper
Presentation
|
Cheol Young Park, Kathryn Blackmond Laskey, Paulo Costa, Shou Matsumoto
George Mason University
|
|
Abstract
In the past decade, Statistical Relational Learning (SRL) has emerged as a new branch of machine learning for
representing and learning a joint probability distribution over relational data. Relational representations
have the necessary expressive power for important real-world problems, but until recently have not supported
uncertainty. Statistical relational models fill this gap. Among the languages recently developed for statistical
relational representations is Multi-Entity Bayesian Networks (MEBN). MEBN is the logical basis for Probabilistic
OWL (PR-OWL), a language for uncertainty reasoning in the Semantic Web. However, until now there has been no
implementation of MEBN learning. This paper describes the first implementation of MEBN learning. The algorithm
learns a MEBN theory for a domain from data stored in a relational Database. Several issues are addressed such
as aggregating influences, optimization problem, and so on. In this paper, as our contributions, we will provide
a MEBN-RM (Relational Model) Model which is a bridge between MEBN and RM, and suggest a basic structure learning
algorithm for MEBN. And the method was applied to a test case of a maritime domain in order to prove our
basic method.
|
|
|
Social Sifter: An Agent-Based Recommender System to Mine the Social Web
Paper
|
M. Omar Nachawati, Rasheed Rabbi, Genong (Eugene) Yu, Larry Kerschberg, Alexander Brodsky
George Mason University
|
|
Abstract
With the recent growth of the Social Web, an emerging challenge is how can we integrate information from the
heterogeneity of current Social Web sites to improve semantic access to the information and knowledge across the
entire World Wide Web. While each individual Social Web site may provide its own semantic facilities, when it
comes to interoperability across the Social Web in its entirety, even the simplest of inferences based on data
from different sites can appear intractable without the Ňsemantic training wheelsÓ pioneered by the Semantic Web
effort. Even if such data were interoperable across multiple Social Web sites, the ability of a system of collective
intelligence to make meaningful inferences, depends largely on both its ability to marshal such semantic data as
well as its ability to understand accurately and respond precisely to queries from its users.
Applications of collective intelligence systems are numerous, and can be used, for instance, to build social
semantic search engines and recommender systems. In this paper we present the architecture for Social Sifter,
an agent-based, collective intelligence system for assimilating information and knowledge across the Social Web.
As a proof-of-concept, we have prototyped a health recommender system, using the Social Sifter architecture,
which recommends treatments, prevention advice, and therapies for ailments; it also recommends doctors and
hospitals based on shared experiences available on the Social Web.
This paper discusses in more detail the challenges of assimilating the Social Web and query classification and
enrichment, and describes the general architecture of the Social Sifter and our proof-of-concept health
recommender system, as well as presents our experimental findings.
|
|
|
|
Thursday, October 25th
08:30 - 09:00 |
|
Breakfast |
|
|
|
09:00 - 10:00 |
|
Keynote Speaker |
|
Jay Holcomb
An Insider Perspective of how Semantic Technologies are supporting the DHS efforts in Cybersecurity
U.S. Computer Emergency Readiness Team
National Cyber Security Division (NCSD)
U.S. Department of Homeland Security
|
|
|
|
10:00 - 10:30 |
|
Break |
|
|
|
10:30 - 12:00 |
|
Research Session
Chair: - Richard Lee, Booz Allen Hamilton |
10:30 - 11:00 |
|
D2RCrime: A Tool for Helping to Publish Crime Reports
on the Web from Relational Data
Paper
Presentation
|
Julio Tavares, Vasco Furtado, Henrique Santos, Eurico Vasconcelos
Universidade de Fortaleza, Brazil
|
|
Abstract
In the Law Enforcement context more and more data about crime occurrences are becoming available to the general
public. For an effective use of open data, it is desirable that the different sources of information follow a
pattern, which allows reliable comparisons. In addition, it is expected that the task of creating a correspondence
between the pattern and the internal representations of each source of information is not a steep learning curve.
These two conditions are hardly found in the actual stage where open data about crime occurrences is referred to
as the data opened by each police department in its own way. This paper proposes an interactive tool, called
D2RCrime, that assists the designer/DBA of relational crime databases to make the correspondence between the
relational data and the classes and properties of a crime ontology. The ontology plays the role of a pattern to
represent the crime concepts and crime report and is also the interface to publish on-the-fly relational
crime data. This correspondence allows the automatic generation of mapping rules between the two representations,
what allows for accessing relational data from SPARQL. An evaluation of D2RCrime is done with DBA/System analysts
who used the tool for establishing correspondences between relational data and the ontology.
|
11:00 - 11:30 |
|
Exploiting inference to improve temporal RDF annotations and queries for machine reading
Paper
Presentation
|
Robert Schrag
Digital Sandbox, Inc.
|
|
Abstract
We describe existing and anticipated future benefits of an end-to-end methodology for annotating formal RDF
statements representing temporal knowledge to be extracted from text, as well as for authoring and validating
test and/or application queries to exercise that knowledge. Extraction is driven by a target ontology of
temporal and domain concepts supporting an intelligence analystŐs timeline tool. Both the tool and the methodology
are supported at several points by an implemented temporal reasoning engine, in a way that we argue ultimately
advances machine reading technology by increasing both sophistication and quality expectations about temporal
annotations and extraction.
|
11:30 - 12:00 |
|
Best-practice Time Point Ontology for Event Calculus-based Temporal Reasoning
Paper
Presentation
|
Robert Schrag
Digital Sandbox, Inc.
|
|
Abstract
We argue for time points with zero real-world duration as a best ontological practice in point and interval-based
temporal representation and reasoning. We demonstrate anomalies that unavoidably arise in the event calculus when
real-world time intervals corresponding to finest anticipated calendar units (e.g., days or seconds, per application
granularity) are taken (naively or for implementation convenience) to be time "points." Our approach to eliminating
the undesirable anomalies admits durations of infinitesimal extent as the lower and/or upper bounds that may
constrain two time points' juxtaposition. Following Dean and McDermott, we exhibit axioms for temporal constraint
propagation that generalize corresponding na•ve axioms by treating infinitesimals as orthogonal first-class quantities
and we appeal to complex number arithmetic (supported by programming languages such as Lisp) for straightforward
implementation. The resulting anomaly-free operation is critical to effective event calculus application in
commonsense understanding applications, like machine reading.
|
|
|
|
12:00 - 13:30 |
|
Lunch |
|
|
|
13:30 - 14:45 |
|
Panel - Moderator: Leo Obrst |
|
|
Cyber Ontology: Is it the World Squared?
Panelists Info
Obrst intro
Presentation - Mike Dean
Presentation - Duminda Wijesekera
Presentation - Brian Haugh
|
Mike Dean - Raytheon BBN Technologies
Duminda Wijesekera - C4I Center - GMU
Brian Haugh - Institute for Defense Analyses
Bill Mandrick - Data Tactics
Randall Dipert - University at Buffalo
|
|
|
|
14:45 - 15:15 |
|
Break |
|
|
|
15:15 - 16:45 |
|
Research Session - Chair:
Richard Markeloff, MITRE Corp
|
|
|
|
|
15:15 - 15:45 |
|
The Why Agent: Enhancing user trust in automation through explanation dialog
Paper
Presentation
|
Rob Cole(a), Jim Jacobs(a), Michael Hirsch(a), Robert L. Sedlmeyer(b, c)
a. Raytheon Company, b. Indiana University, c. Purdue University
|
|
Abstract
Lack of trust in autonomy is a recurrent issue that is becoming more and more acute as manpower reduction
pressures increase. We address the socio-technical form of this trust problem through a novel decision
explanation approach. Our approach employs a semantic representation to capture decision-relevant concepts
as well as other mission-relevant knowledge along with a reasoning approach that allows users to pose queries
and get system responses that expose decision rationale to users. This representation enables a natural,
dialog-based approach to decision explanation. It is our hypothesis that the transparency achieved through
this dialog process will increase user trust in autonomous decisions. We tested our hypothesis in an experimental
scenario set in the maritime autonomy domain. Participant responses on psychometric trust constructs were
found to be significantly higher in the experimental group for the majority of constructs, supporting our
hypothesis. Our results suggest the efficacy of incorporating a decision explanation facility in systems
for which a socio-technical trust problem exists or might be expected to develop.
|
15:45 - 16:15 |
|
Rapid Argumentation Capture from Analysis Reports: The Case Study of Aum Shinrikyo
Paper
Presentation
|
Mihai Boicu, Gheorghe Tecuci, Dorin Marcu
Learning Agents Center, George Mason University
|
|
Abstract
The availability of subject matter experts has always been a challenge for the development of
knowledge-based cognitive assistants incorporating their expertise. This paper presents an approach
to rapidly develop cognitive assistants for evidence-based reasoning by capturing and operationalizing
the expertise that was already documented in analysis reports. It illustrates the approach with the
development of a cognitive assistant for assessing whether a terrorist organization is pursuing weapons
of mass destruction, based on a report on the strategies followed by Aum Shinrikyo to develop and use
biological and chemical weapons.
|
16:15 - 16:45 |
|
A Policy-Based Dialogue System for Physical Access Control
Paper
Presentation
|
Mohammad Ababneh (a), Duminda Wijesekera(a), James Bret Michael(b)
a. George Mason University b. Naval Postgraduate School
|
|
Abstract
We prototype a policy-based dialog system for providing physical access control to secured facilities and
smart buildings. In our prototype system, physical access control policies are specified using the
eXtensible Access Control Markup Language. Based on the policy and the user's presence information, our
dialog system automatically produces a series of questions and answers that, if correctly answered, permit
the requester to enter the secure facility or smart building. The novelty of this work is the system's
ability to generate questions appropriate to the physical location, time of day, and the requester's
attributes.
|
|
|
|
16:45 - 17:00 |
|
Best Paper Award - Chair: Daniel Maxwell |
|
|
|
17:00 - 17:15 |
|
Wrap Up - Paulo Costa |
|
|
|
|