AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf ·...

24

Transcript of AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf ·...

Page 1: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist
Page 2: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter 106 October 2001

AI FIGHTING TERRORISM

Editor-in-chief

The acts of terrorism against the US continue to dominate the news. There is a great deal of discussion on how toprevent terrorist attacks in the future. Security measures are tightened in all Western countries. In suchcircumstances the prevailing question is: Can AI make a contribution to the common fight against terrorism?

Below I discuss two applications where AI is potentially helpful: (1) detecting terrorist plots and (2) identifyingterrorists. This may sound far-fetched, so let us see how realistic these ideas are.

On April 19, 1995, Timothy McVeigh destroyed a federal building in Oklahoma City with a truck bomb, killinghundreds of people. Later it turned out that several of McVeigh’s orders were stored in databases, for instance,the buying of fertilizer, the rental of the truck, and the booking of his hotel room near the building. If all suchdatabases had been accessible, a variety of facts – among them the three mentioned above – could have beencombined and would have set off an alarm bell. Applied Systems Intelligence Inc. claims that their KnowledgeAided Retrieval in Activity Context system (KARNAC) is capable of detecting terrorist plots this way. However,in my opinion it is questionable whether such a system would work in practice. First of all it is currently bothtechnically and legally impossible to access ‘all such databases’ (whatever that means). Moreover it is mostlyforbidden to extract meaningful information from them, and then, how does one train such a system? Formachine-learning techniques, positive examples must be supplied. Given the many ways a terrorist act may bedevised, supplying sufficient examples to attain only a few false positives and false negatives seems unfeasible.For the same reason, hardwiring the rules in the system is out of question too. If there is any value in thisapproach, it is to be found in a very restricted, well-defined domain with well-described questions.

As to identifying terrorists, we observe that the first applications of biometrics on airports are now installed.Since October, Schiphol Airport uses the iris-scan technique for identification. Passengers can register once andfrom then on use their iris scan to pass the customs faster. Even more sophisticated is the use of face-recognitiontechniques at Iceland Airport. Passengers are checked against a database containing images of wanted terrorists.Another application of biometrics is lie detection. The polygraph (i.e., the conventional lie detector) measuresheart rate, blood pressure, skin conductance, and respiratory dynamics. Research has shown that liars may alsobe identified by their facial expressions, pupillary response, and voice pitch. Remarkably, recognition of afamiliar visual stimulus is reflected in the EEG pattern. Hence, terrorists may be identified by obtaining an EEGwhile being exposed to pictures of, for instance, terrorist training camps. Unfortunately, none of these techniquesyield sufficiently reliable results; only in combination the appropriate level of reliability can be obtained. So, AIcan be used to make the combination by applying dedicated hardware and advanced software.

The futuristic approaches described above have one impediment in common: the danger of false positives. Takefor example the terrorist-recognition task on airports. Assume that a system issues a false alarm in 0.1% of thecases. For an airport such as Schiphol, this would mean 100 false alarms per day!

Since its early days AI has made promises of which some have come true, and others not. Today, AI researchersshould be cautious in making bold claims especially with such an important and sensitive subject as terrorism. Itherefore encourage all readers to continue their research and advise them to refrain from making bold claimsthat are not supported by evidence.

KARNAC: http://www.newscientist.com/news/news.jsp?id=ns99991368Schiphol iris scanning: http://news.airwise.com/stories/2001/10/1004008821.htmlAirport Face recognition: http://www.cnn.com/2001/US/09/28/rec.airport.facial.screening/http://www.cnn.com/2001/US/09/28/rec.face.recognition.cnna/Lie detection: http://homestead.juno.com/crdillingham/files/media.htm

Page 3: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001107

TABLE OF CONTENTS

AI Fighting Terrorism (Editor-in-Chief).............................................................................................................. 106

Table of Contents .................................................................................................................................................. 107

BNVKI-Board News (Joost Kok) ......................................................................................................................... 108

Opening Address BNAIC 2001 (Annejet Meijler) .............................................................................................. 109

Beyond Ph.D. Theses (Jaap van den Herik).......................................................................................................... 111

Squangles (Henk Visser) ....................................................................................................................................... 112

The CMG 6th Computer Olympiad and the Computer-Games Workshop (Mark Winands) ................................ 115

Fifth International Conference on Computing Anticipatory Systems (Daniel Dubois)........................................ 118

AI in Business........................................................................................................................................................ 119Bolesian Part of Cap Gemini Ernst & Young (Bas Zinsmeister) ....................................................................119

SIKS (Richard Starmans) ...................................................................................................................................... 120Social Event for SIKS Ph.D. students ............................................................................................................. 120Advanced Course Multi-Agent Systems ......................................................................................................... 120SIKS/SOBU Symposium................................................................................................................................. 121Two Basic Courses: System Modelling and Knowledge Modelling .............................................................. 122

Section Knowledge Systems in Law and Computer Science (Radboud Winkels) ............................................... 122Second International Workshop on Legal Ontologies..................................................................................... 122Lezingen JURIX Bijeenkomst (Jacqueline Dake)........................................................................................... 123

Conferences, Symposia, Workshops ..................................................................................................................... 126

E-mail addresses Board Members/ Editors BNVKI Newsletter / How to become a member?/ Submissions ..... 127

Advertisement........................................................................................................................................................ 128

The BNVKI is sponsored by AHOLD and by BOLESIAN

Photographs by Jaap van den Herik (p. 110), Jeroen Donkers (p. 116), and Theo van der Storm (p. 117)

Page 4: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001108

BNVKI-Board News

Joost Kok

The very successful thirteenth BNAIC has justfinished. Time did not permit to report on theconference in this Newsletter, therefore the reportson all BNAIC'01 sessions will appear in the comingissue. The exception is the opening address of mrs.Dr. A.P. Meijler, director of the Science Area of theNetherland Organisation for Scientific Research(NWO) that is included on page 109 of this issue.

On the general meeting of the BNVKI Newsletteron October 25 several important changes weremade in the BNVKI board. We have taken leave ofthree board members: Yao-Hua Tan, Luc DeHaspe,and Walter Daelemans. The BNVKI thanks themkindly for their work in the Board during the pastyears. Four new members were appointed at thismeeting. We introduce them below. The renewedboard looks forward to further AI in the LowCountries with renewed vigour!

DR. A. VAN DEN BOSCH

Antal van den Bosch (MA, KU Brabant; Ph.D.,Universiteit Maastricht), assistant professor at KUBrabant (dept. of Computational Linguistics andAI) and currently on leave at WhizBang! Labs Inc.,Pittsburgh, PA, USA, has a background both inmachine learning and in computational linguistics.Having been a close witness of the amazingfruitfulness of the interaction that has sproutedbetween both fields during the past decade, Van denBosch’ mission as a board member of BNVKI willbe twofold: (1) to continue, broaden, and intensifythe integration of researchers in natural languageand text processing, information retrieval, and webmining into the Belgian and Dutch AI community,and (2) to promote these areas as interestingapplication areas of AI methods by means oforganising invited lectures, tutorials, and specialsessions at AI meetings.

MRS. DR. C. JONKER

Mrs. Dr. Catholijn Jonker is assistant professor atthe Department of Artificial Intelligence of theVrije Universiteit Amsterdam. She has over sevenyears of experience as a designer of intelligentsystems, using advanced artificial intelligencetechniques.

Her background includes working on tele-communications projects and research projects onintelligent agents. She is an experienced teacher ofcourses on the design of intelligent multi-agentsystems both for graduate students and forcompanies. Dr. Jonker organises workshops onagent research and is a member of the programmecommittees of several agent workshops. Dr. Jonkerhas also been Intelligent Systems expert for theconsultant company American ManagementSystems Inc. For AMS she helped to develop anintelligent system to support automatedpersonalised recharging of mobile phones withenhanced capabilities and furthered the researchinto eBusiness and automated negotiation.

As a board member of BNVKI, Catholijn Jonker’sspecial aim will be to promote interaction betweenAI researchers in Belgium and the Netherlands, topromote the use of AI techniques in companies andto promote and improve the integration of womenresearchers in AI.

PROF. M. DENECKER

Marc Denecker studied mathematics andinformatics at the KU Leuven and obtained hisPh.D in informatics at the same university. He is

Page 5: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001109

leading the Knowledge Representation andReasoning subgroup (KRR) of the research groupDeclarative Languages and Artificial Intelligence(DTAI) at the KU Leuven. The basic goal of theKRR subgroup is the development of logic-basedknowledge representation (KR) and reasoningsystems. Research themes range overepistemological and semantical foundations ofnonmonotonic knowledge representation languages,KR methodology, abduction and implementation ofabductive reasoning systems, application of thesesystems for temporal reasoning, scheduling, naturallanguage analysis, etc. The DTAI has also strongexpertise in Inductive Logic Programming andMachine Learning, implementation, abstract inter-pretation and analysis of logic programmingsystems.

As a board member of BNVKI, Marc Denecker'sspecial aim will be to promote and improve theintegration of Flemish and Walloon researchers andthe larger Dutch AI-community, in order to createmore opportunities for exchange of ideas,collaboration and education between researchersand Ph.D. students of the two communities.

PROF. DR. IR. J.A. LA POUTRÉ

Han La Poutré is research group leader at CWI inAmsterdam, heading the theme group“Evolutionary Systems and Applied Algorithmics”.He also is professor of “e-Business and ComputerScience” at the Capacity Group Information andTechnology (Faculty of Management Science) ofEindhoven University of Technology. He holds aM.Sc. degree in Mathematics from the TUEindhoven (cum laude), and a Ph.D. degree inComputer Science from Utrecht University; he hasbeen researcher at Princeton University (USA). Hisresearch interests include evolutionary systems,neural networks, on-line algorithms, e-commerce,agent systems, and agent-based computationaleconomics.

Han La Poutré received the STOC award for thebest Ph.D. Paper (STOC: ACM Symposium onTheory of Computing, USA), a NATO Science

Fellowship, and a KNAW Fellowship (KNAW:Royal Netherlands Academy of Sciences and Arts).He has been conference co-chair and organiser ofthe Dutch NAIC conference on AI (1998) and ismember of the editorial board of the JournalNetnomics, concerning Internet economics and e-commerce, and of the new, upcoming journalComputational Management Science.

He is and has been project leader of severalprojects, including scientific projects funded bythird parties (e.g. NWO, TI), application projects(e.g. companies, also yielding the SKBS award atBNAIC99), and educational projects. In 1999, hisresearch group was rated excellent in theevaluation/visitation of the CWI by NWO (theNetherlands Organisation for Scientific Research).

Han La Poutré is interested to contribute to themanagement of the BNVKI. Amongst others, he isinterested in stimulating the development of newapplication and cooperation possibilities for AI withrespect to societal sciences and institutions. Thisincludes fields like economics, sociology,management sciences, and the growing areas ofintelligent systems for the e-society.

Opening Address, Belgian-DutchArtificial Intelligence Conference 2001

October 25, 2001 Amsterdam

Mrs. Dr. A.P. Meijler,Director Physical Sciences, NWO

It is a great pleasure to be here on behalf of theNetherlands Organisation for Scientific Research(NWO) to open this, already 13th, BNAIC. I amglad to see so many enthusiastic visitors. We havegladly sponsored the keynote speech by SebastianThrun, because in our opinion, internationalspeakers enhance the quality of the discussion at aconference like this. I would like to congratulatethe organising committee on the interestingprogramme it has put together.

Twenty years after the foundation of the DutchArtificial Intelligence Association, more thantwenty groups in the Netherlands and Belgium areactive in artificial intelligence. Hundreds ofstudents and numerous researchers are involved inthe subject. This is a sign of the continuing interestamong talented young people. In our own NationalResearch Agenda for Computer Science, wedesignated Intelligent Systems as one of seven areasthat deserve our special attention. In this document,Nationale Onderzoeksagenda Informatica (NOAG-i), published in August 2001 by the Informatica

Page 6: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001110

Platform Nederland (IPN) and the AdviescommissieInformatica (ACI) of NWO’s Physical Sciencesdepartment, the following 7 research themes areselected: Parallel and Distributed Computing(PDC), Embedded Systems (ES), SoftwareEngineering (SE), Multimedia (MM), Modelling,Simulation and Visualization (MSV), IntelligentSystems (IS), and Algorithms and Formal Methods(AFM).More information can be found on our website:www.nwo.nl/nwohome.nsf/pages/ACPP_4X6R3M.

Artificial Intelligence is very interesting from thefundamental point of view of understandingthinking-processes. At the same time, we think thatthe research in this area will make significantcontributions to society.

For example, intelligent systems may find practicaluse in search and retrieval techniques, userprofiling, multi-agent systems, and ambientintelligence. It is not surprising that some of thepresentations during this conference touch uponthese subjects. In the coming four years, progressin these areas is to be expected.

Mrs. Dr. A.P. Meijler

It is clear that more support from the Dutchgovernment will be needed to meet thesechallenges. Just shuffling around some of ourresearch funds will not be sufficient. We arestriving for the release of additional funds. In thecoming years, the investments in computer science

should double, if we are to fulfil the needs ofsociety. The government is aware of the importanceof information and communication technology, andthe formation of a new cabinet in eight months’time looks like an opportunity to turn politicalattention to the issue. We want to focus theinvestments on three objectives: the development oftalent, the improvement of the interaction with otherfields of science, and the transfer of knowledge topotential users and industry.

The development of talent is a matter of providingthe right climate. Talented researchers should havethe intellectual room and financial means to developinto top researchers, who can achieve realbreakthroughs. They also need a high-qualityenvironment, where they are trained and scouted.We would like the Dutch computer science researchcommunity to grow from 850 people now to 1500in 2005. This should pay off, among other things, inthe form of an improved overall score in the NECcitation index.

One straightforward way to reap the benefits ofcomputer science is the interaction with other fieldsof science. Disciplines like physics, medicalsciences, and linguistics can make good use of thefruits of computer science. Conversely, the socialand juristic sciences have researched theproliferation of information systems into variousquarters of society. In five years’ time, the numberof inter-disciplinary research projects should besubstantially higher.

The transfer of knowledge to potential users isessential for every branch of science. Computerscientists are definitely doing their part, but surveyshave suggested that it needs improvement.Business, government, and research institutesoutside ICT are often in need of knowledge thatexists only within the computer science researchcommunity. The ambition is to foster knowledge-transfer and public-private cooperation. In 2005,we hope that a significant improvement will showup in the ICT scan from TNO.

The planned increase to 1500 researchers in theNetherlands should enable many research groups toreach the critical mass of about 25 people. It willalso lead to a much better career perspective in theacademic world. Many young talents will find acareer in research more attractive than they do now.As long as the research groups are still smaller,close cooperation throughout the Benelux is anadequate way to reach critical mass. Thisconference is a good example of that.

Thirteen years ago, this conference was firstorganised, in the same city where it is today. Most

Page 7: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001111

of you were still in high school, playing with yourCommodore 64. Impressive developments havetaken place since then. Chess computers havelearned how to beat the world champion. At thesame time, some other aspirations of ArtificialIntelligence have proven more difficult to achieve.In a recent issue of the Newsletter of the BNVKI,Joost Kok wrote: “At present we do not see eventhe beginning of thinking machines.” You havecome a long way, but there is still a lot to do. Ihope this conference will inspire you.

Beyond Ph.D. Theses

Jaap van den HerikIKAT, Universiteit Maastricht

Ph.D. Theses are produced in clusters. Looking atthe various faculties in which AI research takesplace, we see that the continuous stream of Ph.D.sas seen over a period of ten years, has peaks. In thelast year I have seen peaks for the supervisors John-Jules Meyer and Hans van Vliet. Apparently, at thismoment there is no peak, but a non-zero dip. Withrespect to the previous list we may publish two newannouncements of Ph.D. defenses that will takeplace in the year 2002. They are Nikos Massios(January 25) and Klaas Schilstra (March). We wishboth Ph.D. students a good New Years Eve.

Marcel van Lohuizen and Tom van Engers arecongratulated with the completion of their thesesand we wish them a good performance during theofficial defence.

Although we have not so many Ph.D.announcements – at least we have four – thenumber of Ph.D. reviews is even less, namely zero.Our reviewers informed us that they were too busyand did not make the deadline. The Editorial Boardof the Newsletter regrets the omission of Ph.D.reviews since we are informed that theannouncement and review section is wellappreciated by our community. The best I can do isto encourage our readers and especially the (daily)supervisors to provide us with as much informationas possible.

This topic brings me to a new one, recentlydiscussed at a SIKS meeting, during a pleasantdinner where usually the best ideas emerge. Thesimple question is: why do we restrict providinginformation to our readers to the Ph.D.announcements, reviews, and SIKS courses. We donot inform them on new professorial appointments,on inaugural addresses, and on farewell speeches. Imust admit I have never seriously thought aboutmaking a section on this information. I find it rather

useful, but as an Editor I also know that it is quite ajob, since you have to hunt for this information.Nobody is bringing the information to the BNVKINewsletter.

To show my willingness, and to encourage allreaders to send analogous information [email protected] I provide you with a fewfacts.

Prof.dr. Arno Siebes will inaugurate on November7, 2001 at the Universiteit Utrecht (16.15 hours).

The Rijksuniversiteit Groningen has appointed Dr.Lambert Schomaker as ordinary professor inArtificial Intelligence per January 1, 2001 (so he isalready 10 months in action).

Prof.dr. Peter Apers has changed his chair onDatabases for a place in the Board of the UniversityAuthorities.

The BNVKI Newsletter Board congratulates allthree persons with the new challenges they havefound in life.

M.P. van Lohuizen (November 6, 2001) ParallelNatural Language Parsing: From Analysis toSpeedup. TU Delft. Promotores: Prof.dr. H.J. Sipsand Prof.dr. A. Nijholt. Assistant promotor: Dr. R.Sommerhalder.

T.M. van Engers (December 11, 2001) KnowledgeManagement: The Role of Mental Models inBusiness Systems Design. Vrije UniversiteitAmsterdam. Promotor: Prof.dr. J.M. Akkermans.Co-promotor: Dr. G.C. van der Veer.

N. Massios (January 25, 2002) Decision-theoreticRobotic Surveillance. Universiteit van Amsterdam.Promotores: Prof.dr.ir. F.C.A. Groen and prof.dr.M. van Lambalgen. Co-promotores: Dr.ir. L. Dorstand dr. F.P.J.M. Voorbraak

K.O. Schilstra (March 2002) Towards ContinuousKnowledge Engineering. TU Delft. Promotor:Prof.dr. H. Koppelaar.

Arno Siebes (left) and Lambert Schomaker (right)

Page 8: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001112

Squangles

Henk VisserIKAT, Universiteit Maastricht

COMP. Good morning Math, what can I do foryou?

MATH. Nothing at all, but I want to show yousomething.

COMP. Go ahead, my computer can wait.

MATH. Do you remember my TranspositionalTricks?

COMP. Of course, I liked your geometricalpictures, do you have more of those nice things?

MATH. In a way, yes, but let me first of all state theproblem. You know that I found a beautifulrepresentation of the equation 666 = 441 + 225,which I analyzed as an equation between thetriangular number of a square – 36 – and thesquares of two successive triangular numbers – 15and 21. Well, when I looked at the tables of thesquares and the triangular numbers, I noticed that36 occurs in both of them and so I wonderedwhether there are more squares that are alsotriangles. By the way, I call such numberssquangles.

COMP. Was this your problem? Wait a momentand my computer will give you the answer!

MATH. Stop, this is not a computational problem. Iwanted to have insight into the mathematics behindthe equation s(m) = t(n), I am not interested in thesolutions as such.

COMP. I see, tell me what you’ve found.

MATH. (walks to the blackboard) First of all I drewthe following picture of the equation s(6) = t(8):

I noticed that two triangles of 2 are added to thesquare of 6 in order to get the triangle of 8 whereasone triangle of 3 is removed. My intuitive inferencewas that in general each squangle can betransformed in this way, that is, by replacing atriangle number by two congruent triangles. Thefollowing figure or scheme pictures this result:

My promising conclusion was that a table withtriangular numbers and their doubles would lead mefaster to more examples of squangles.

COMP. So you used a computer for theconstruction of such a table?

MATH. Not at all. I only calculated as much valuesof t(n) and 2t(n) as was necessary to find the nextsquangle after 36. Here I will do it again and markthe equal outcomes:

n t(n) 2t(n)0 0 01 1 22 3 63 6 124 10 205 15 306 21 427 28 568 36 729 45 9010 55 11011 66 13212 78 15613 91 18214 105 21015 120 24016 136 27217 153 30618 171 34219 190 38020 210 420

You see, twice the triangle of 14 gives the triangleof 20. This means that the square of 14 + 1 + 20,that is 35, is also the triangle of 35 + 14, that is 49.

Page 9: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001113

COMP. My computer would have told you the samething much faster, so what is your point?

MATH. My purpose was to demonstrate howmathematical intuition can, so to say, unfold itselfalong with perspicuous representations. It seemsthat this is what Poincaré meant when he attributedthe intuitions of Sophus Lie to his ability to think inpictures. Perhaps you know the fragment in whichhe compared Lie with Sonja Kowalewski, whom heconsidered a “logicienne”, as if mathematicianswho do not think in pictures have no intuitions.

COMP. You know that I always had difficultieswith the notion of intuition. I understand now thatyou regard intuition as a process with at least twoaspects, an intuitive inference and a promisingconclusion. I accept the notion of promisingconclusion, but am still in doubt about thosemagnificent intuitive inferences. I agree thatmathematicians sometimes make good guesses, butI hesitate to use the term intuition for them.Moreover good guesses can occur on any occasion,and certainly not only in connection with pictures,as Poincaré seems to have thought.

MATH. This is just what I wanted to discuss,because I used the two examples of squanglesmyself in order to see if they could bring mefurther. However, I made use of a perspicuousrepresentation, albeit not a pictorial one. Look:

62 = ½ · 8 · 9352 = ½ · 49 · 50

When I wrote this down some days ago, it occurredto me that both squares have come about throughtwo other numbers with a difference of 1, a squareand the double of a square, 9 and 8, the double of 4,49 and 50, the double of 25. That I still speak of anintuitive inference is because it came suddenly andbecause it was accompanied by a conviction ofcorrectness or Helmholtz’s Überzeugung derGewissheit. I was certain that it was more than agood guess: I had found the characteristic propertyof the equations. This discovery was followed bythe promising conclusion that a table with squaresand their doubles would lead me even faster to moresquangles than the earlier table.

COMP. So you began to make the new table inorder to find the next squangle. What a primitiveprocedure in this age of the computer!

MATH. Be quiet, I am not yet finished. But let mefirst write down the relevant values of s(n) and2s(n) and mark the outcomes with a difference 1:

n s(n) 2s(n)0 0 01 1 22 4 83 9 184 16 325 25 506 36 727 49 988 64 1289 81 16210 100 20011 121 24212 144 28813 169 33814 196 39215 225 45016 256 51217 289 578

COMP. So you finally found that the square of12·17 is equal to the triangle of 289. It took a lot oftime, but I agree that it would have cost you moretime to find that both 2042 and ½·288·289 have thesame outcome, let me see, 41616, if you hadcalculated all squares and triangular numbers up tothis number. But I understand that this is not allthere is.

MATH. Indeed. For I got the idea of making a listof the pairs of those numbers that successivelyproduced 2 and 1, 8 and 9, 50 and 49, and 288 and289:

(0, 1)(1, 1)(2, 3)(5, 7)

(12, 17)

COMP. I see, the next pair is (29, 41) and thismeans that the square of 29·41 is also a triangularnumber. Interesting, but did you prove theFibonacci-like rule that supports my uh... intuitiveinference?

MATH. Of course I did, in spite of my convictionof correctness. I even found the rule that lies behindthe pairs that gave the desired values of t(n) and2t(n), but only after I had enlarged the list with thehelp of the pairs (12, 17) and (29, 41) from the otherlist:

(0, 0)(2, 3)

(14, 20)(84, 119)

(492, 696)

Page 10: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001114

I saw immediately that each second component is 1more than the sum of the three preceding numbers:3 = 0 + 0 + 2 + 1, 20 = 2 + 3 + 14 + 1, 119 = 14 +20 + 84 + 1, and 696 = 84 + 119 + 492 + 1, but ittook somewhat longer before I found the rule forthe first components: 14 = 4·3 + 0 + 2, 84 = 4·20 +2 + 2 and 492 = 4·119 + 14 + 2. The proof thatthese rules are correct was not very simple, so I willnot bother you with it.

COMP. Why did you rack your brains about a proofwhen you had no doubt of the correctness of theconclusion?

MATH. Well, that is just what makes mathematicschallenging. Finding a proof is like a treasure hunt.But I am still not finished, for after I had found therules for the lists, I wondered whether it would notbe possible to derive a rule for the sequence ofsquangles themselves from them. However, thealgebraic approach did not give much hope, becauseof the complexity of the Fibonacci-like rule. Butwhen I looked again at the last list but one, Idiscovered that there is already a connectionbetween the x-coordinates alone: from the third x-coordinate each is a simple linear combination ofthe two preceding ones: xn+2 = 2xn+1 + xn and thesame holds for the y-coordinates. But then I turnedto the squangles:

0, 1, 6, 35, 204, 1189, ...

I imagined that here, from the third term on, eachterm might also be a simple combination of the twopreceding ones. I was right! Do you see it too?

COMP. I am sorry but I already left my computertoo long alone. Thank you for your lecture, and seeyou later. (Leaves the classroom while Math beginsto scrawl on a piece of paper, trying for ageneralization. Ten minutes later Comp returns)

MATH. Hallo Comp, did you set your computer towork?

COMP. Yes, and how! I wrote a program thatcalculated the first twelve squangles. It also foundthe rule that governs it. I shall write it down in yournotation:

tn+2 = 6tn+1 - tn

MATH. And now you are certainly going to arguethat my work was superfluous? But who inventednot only the problem, but also the kinds ofsequences and rules that brought the problem to asolution? I begin almost to think that you could notfind the last rule yourself!

COMP. Goodbye Math! (leaves the classroom witha shrug of the shoulders)

Notes

1. The above dialogue is by no means meant as acriticism of the work of creative computerscientists. Their approaches can be veryoriginal as I learned from Marjan Dragt(GUTS), who wrote the program alluded to inthe text.

2. The notion of “perspicuous representation”played an important role in Wittgenstein’slater work. Hubert Dreyfus (1967: 40) used itin his criticism of Artificial Intelligenceresearch.

3. The notion of “scheme” originally comes fromKant (1781: A 140), who distinguished“schemes” from “pictures”. An example of thelatter is the following representation of thenumber five by five points: ·····, whereas ascheme would enable us to think of a number“in general”. It would be rather a “method forrepresenting a number by a picture” than thepicture itself. It is conceivable that Kant’sdifficulties with this notion would have beenless great, if he had made use of the notion of“variable” or if he had acknowledged thatmathematicians often “draw figures” of allkinds. For the role of figures in the solution ofproblems, I refer to Polya’s (1945) little bookon invention and discovery.

4. “Intuition” is, of course, a delicate subject.Scientists such as Helmholtz (1903), Poincaré(1905), and Mach (1905) acknowledged it as animportant source of discoveries, and theyalready tried to get a grip of the relevantphenomena. Bertrand Russell (1948: 421-422)once gave the example of the sum of the firsttwo, three and four cubic numbers, but headmitted that he did not know “how to makeexplicit what guides mathematical intuition insuch cases”.

5. The idea of presenting arguments in the form ofa dialogue is nothing new. My first seriouscontact with this approach was throughHeyting’s (1958) book on intuitionism.

REFERENCES

Dreyfus, Hubert (1967). What Computers can’t do.A Critique of Artificial Reason. New York: Harperand Row.

Helmholtz, Hermann von (1903). Vorträge undReden. Fünfte Auflage. Braunschweig: FriedrichVieweg und Sohn.

Page 11: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001115

Heyting, Arend (1958). Intuitionism. AnIntroduction. Amsterdam: North-Holland.

Kant, Immanuel (1781). Kritik der reinen Vernunft.Riga: Johann Friedrich Hartknoch.

Mach, Ernst (1905). Erkenntnis und Irrtum. Skizzenzur Psychologie der Forschung. Leipzig: JohannAmbrosius Barth.

Poincaré, Henri (1905). La Valeur de la Science.Paris: Ernest Flammarion.

Polya, George (1945). How to solve it. A newAspect of Mathematical Method. Princeton, N.J.:Princeton University Press.

Russell, Bertrand (1948). Human Knowledge. ItsScope and Limits. London: George Allen andUnwin.

Visser, Henk (2001). Transpositional Tricks.BNVKI Newsletter. Vol. 18.2, pp. 30-34. ALPNewsletter.

More information:htttp://www.cwi.nl/projects/alp/newsletter.

The CMG 6th Computer Olympiad andthe Computer-Games Workshop

Mark WinandsIKAT, Universiteit Maastricht

From August 18 to 23 the Institute for Knowledgeand Agent Technology (IKAT) organised the CMG6th Computer Olympiad at the UniversiteitMaastricht (UM). Together with the Olympiad aComputer-Games workshop was organised. Thisevent took place from August 20 to 22. Both eventsare described in this report.

THE COMPUTER OLYMPIAD

The Computer Olympiad is a multi-games event inwhich all of the participants are computer programs.The Olympiad is a brainchild of David Levy, whoorganised this tournament in 1989 (London) for thefirst time. The next four editions were held in 1990(London), 1991 (Maastricht), 1992 (London) and2000 (London). This year was the second time thatthe event was held in Maastricht. IKAT, under theleadership of Jaap van den Herik, was responsiblefor the organisation. Similar to last year, Van denHerik was the tournament director. The purpose ofthe Olympiad is to find the strongest program foreach game. The Olympiad has also grown to asocial event, as the authors of the programs are not

bound to silence during the play as in humantournaments. The event is a reunion asprogrammers meet to discuss ideas and renewacquaintances. Some teams arrive with clear goalsof winning, some just to participate, some to testtheir new ideas under tournament conditions. TheOlympiad is a truly international event. This year,participants were coming from all over the world:USA, Canada, The Caribbean, Japan, Taiwan, Israeland the European Union. The event was held underthe auspices of the ICCA (International ComputerChess Association), which gave it an official status.This year, there were competitions in six games:Chess, Chinese Chess, Shogi, Amazons, Lines ofAction (LOA) and Gipf. Below we will give a shortdescription of each of the tournaments.

Computer chess was the main tournament of theOlympiad. The computer chess competition had thehighest number of participants, 18, an increase of 4compared to last year. The computer chesstournament had a special status since it was theofficial 18th World Microcomputer ChessChampionship (WMCC 2001). Unlike othercompetitions, there were several titles to gain in thecomputer-chess tournament. This year theorganisation allowed programs running on multi-processor machines. Because this gave a cleardisadvantage for the programs still running onsingle-processor machines, the organisation decidedthat there were two world-champion titles. Theleading program executing on a single processorwas declared the World Microcomputer ChessChampion - single processor. The leading programexecuting on multiple processors was declared theWorld Microcomputer Chess Champion - multipleprocessor. Among the participants there were 6commercial programs. The authors of theseprograms are professionals, who have the resourcesto fine-tune and optimise their program. Therefore,the professionals have a great advantage over theamateurs. Because the amateurs have hardly anychance of winning the tournament in practice, thetitle World Microcomputer Chess Champion –amateur exists for them. Due to the high number ofparticipants a Swiss tournament was playedconsisting of nine rounds. The games were playedduring the morning and the afternoon. Each daythere was a press briefing given by the well-knownchess master Hans Böhm. These sessions were veryinteresting and amusing. Although the top programsplay at a higher level than Böhm does, he was stillable to uncover some weaknesses in thoseprograms. After five days of tough battle JUNIOR(Ban, Israel) was the best multi-processor programand the winner of the chess tournament, SHREDDER(Meyer-Kahlen, Germany) the best single-processorprogram and GROMITCHESS (Skibbe, Germany), thebest amateur program.

Page 12: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001116

A popular new game in the AI community isAmazons. It is a simple board game of occupyingand enlarging territory. The game is quite similar toGo. Because of the large branching factor, a brute-force approach, like in chess, is unfeasible inAmazons. Paradoxically, the chess programmerJohan de Koning claimed that he still could use alot of his chess-programming experience in hisprogram 8QP. For the second time his program wonthe Amazon competition with a perfect score!

Diederik Wentink: GIPFTED

After the absence of last year Chinese Chessreturned as a part of the Olympiad. The Asianprograms dominated the tournament. The battle forthe first place was between ELP (Chen, Taiwan)and SG 8.2 (Hsu, Taiwan). Those two programsplaying against each other was a derby, since bothbelong to the same research group. In the end theprogram ELP won this exciting competition.

Shogi is the Japanese version of chess. Thecomplexity of this game is higher than of WesternChess. At the moment computer Shogi tournamentsare very popular in Japan. In this country Shogi isalso a popular domain for AI research. Because ofthe travelling distance between Japan andMaastricht, there were only three programsparticipating. But the authors of the programs stillhad a lot of fun in competing at the Olympiad. Thetournament was won with a perfect score bySHOTEST 5.6 (Rolasson, UK). A European programas winner of the tournament shows that thisgame is not exclusively a domain for Japaneseresearchers.

The LOA tournament was for the second timepresent at the Olympiad. LOA is a chess-like

connection game, which is getting steadily moreattention in the game-playing community. The LOAtournament was the only tournament that needed aplay-off. The LOA programs YL (Björnsson,Canada) and MIA II (Winands, The Netherlands)shared the same number of points after the regulartournament. The play-off was won after some nicetactical play by YL.

Gipf, a fairly new domain in the game-playingcommunity, was a newcomer at the ComputerOlympiad this year. The game, mostly common inBelgium, is played on a hexagonal board with thepieces being pushed from the sides. Despite Gipf’snewness two quite strong Gipf programs werepresent at the Olympiad: GIPFTED (Wentink, TheNetherlands) and GF1 (Van den Branden,Belgium). After some interesting matches it wasGF1 that won the competition.

At the last day of the Olympiad a social dinner wasorganized for the authors of the participatingprograms. This was a good moment for theprogrammers to discuss the performance of theirmachines at the Olympiad with each other. Duringthe meals the medals and prizes were presented tothe winners of each tournament. At this occasionseveral authors thanked the organisation for thesuccess of the Olympiad.

THE COMPUTER-GAMES WORKSHOP

As a successor of last year’s Computer-GamesWorkshop at the Fifth Computer Olympiad inLondon, Jos Uiterwijk (IKAT) again organised athree-day workshop during the evenings, fromAugust 20 to 22. The workshop focused on thelatest developments in games programming. Eachevening, the workshop attracted an audience ofsome 25 to 30 people, from all over the world. Theevent consisted of three invited lectures, thanks to agrant from NWO, and ten regular presentations.Each day started with an invited lecture (45minutes) followed by three or four presentations (25minutes each). Summaries below were adaptedfrom Jos Uiterwijk’s more extensive report in theICGA Journal (Vol. 24, No. 3).

The first invited lecture of the workshop was givenby Ernst Heinz (MIT, USA) and was entitledSelected Goodies of DARKTHOUGHT. In this lecturehe revealed many so far unpublished details abouthis chess program DARKTHOUGHT, mainlyconcerning search extensions, transposition tablesand material signatures. This lecture was inspiringfor those building competitive game programs.Next, Jeroen Donkers (UM, The Netherlands)presented a talk entitled Learning Opponent-typeProbabilities for PrOM Search. He explained the

Page 13: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001117

PrOM (for Probabilistic OM)-search algorithm,which is an extension of plain OM (Opponent-Model) search. Subsequently, Don Beal (Universityof London, UK) talked about Learning to Play Wellfrom Observing Bad Play. He illustrated howTD(λ), the most best-known algorithm for self-learning in games, deteriorates when a programtries to learn from games of a lower quality than theprogram itself, but that an enhanced algorithm doesmuch better. Then, Levente Kocsis (UM, TheNetherlands) gave the presentation named LearningMove Ordering in Chess. He showed how neuralnetworks can be applied to order the moves in thealpha-beta search. Finally, this day saw an inserted(light) talk by Henk van Haeringen (TheNetherlands). He explained the rules of a chessvariant invented by him, called SuperChess. Themain difference with standard chess is the additionof extra types of pieces.

At the second day, Hiroyuki Iida (ShizuokaUniversity, Japan), discussing the Advances ofAND/OR-Tree Search Algorithms in Shogi MatingSearch, presented the second invited lecture of theworkshop. He gave characteristics of a family ofAND/OR tree-search algorithms, mainly proof-number (PN) variants (PN*, PDS and DF-PN). Mostof them are depth-first algorithms, some of whichonly make use of proof numbers, whereas othersuse both proof and disproof numbers. Although theexact details of all these algorithms are not yet cleartheir prospects are very promising in Shogi. Next,Diederik Wentink (UM, The Netherlands) went intosome details of his MSc. research Analysis andImplementation of the Game of Gipf. He explainedthe rules and the game properties of Gipf. ThenBruno Bouzy (Université Paris 5, France) explainedGo Patterns Generated by Retrograde Analysis. Hecalculated all pattern game values for small boardsup to 3×3, and for open boards (i.e., without edgeconstraints) up to 4×4. The last talk of the day wasby Erik van der Werf (UM, The Netherlands),presenting his experiments on Visual Learning inGo. He presented his neural-network architecture,called ERNA, which learned firstly to determineconnectedness from raw board representations andsecondly to count the number of liberties of stones.

The invited lecture of the final day was given byChristian Posthoff (The University of The WestIndies, Trinidad and Tobago), who entrusted to theaudience his thoughts on Computer Chess andArtificial Intelligence from an AcademicPerspective. He covered a period of some thirtyyears, in which he was personally involved in thefield. Particularly, his revelations on the work donein the early sixties in the former GDR wereinteresting. Then Mark Winands (UM, TheNetherlands) showed results of his experiments

Christian Posthoff

with PN, PN2 and PN* in Lines of Action. All thesethree proof-number-search variants turned out to bequite useful in the endgame of LOA in finding deepforced wins. Next, Michael Buro (NEC ResearchInstitute, USA) gave An Overview of NECI’sGeneric Game Server and its accompanying clientsoftware. The system is more flexible and has alarger set of rich features than the traditional gameservers. At the moment the system offers servicesfor the following games: Amazons, Checkers,Chess, Hex, Go, Othello and Phutball. Due to theabsence of Guy Haworth (UK), Ernst Heinzpresented the lecture Four Notes on ChessEndgames. In these notes Haworth gave somerecent reflections on notions such as the“discarding-like-pieces” guideline and the “depth-by-the-rule” metric.

FINAL REMARKS

The participants who I spoke were all very positiveabout this Olympiad. Most of them promised tocome back next year. A few of them even promisedto participate in other games too. The future of theevent is prosperous. The major sponsor, CMG,promised to support the event for at least three moreyears. Next year the Olympiad will be probablyheld in Maastricht again. Moreover, the workshopwas well received by the participants. It was aninteresting workshop, where many refreshing ideaswere exposed.

The detailed results and game scores of the severalcompetitions can be found at the website.Regarding the workshop, there are proceedingsconsisting of 7 full papers and 5 abstracts. Theworkshop proceedings can be obtained from Joke

Page 14: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001118

Hellemons via [email protected]. All theworkshop presentations available in PowerPointformat can be seen or downloaded from the website.

I look forward to the next Computer Olympiad andComputer-Games Workshop!

Olympiad website:http://www.cs.unimaas.nl/olympiad/

Fifth International Conference onComputing Anticipatory Systems

Daniel M. Dubois Institute of Mathematics, Université de Liège

Like the 4 preceding CASYS conferences,CASYS'01 (August 13-18, 2001) was organized bythe Centre for Hyperincursion and Anticipation inOrdered Systems (CHAOS asbl), which belongs tothe Institute of Mathematics of the University ofLiège. The scope of the conference was the study,research and development of concepts,methodologies, theories and mathematical modelsfor designing, modeling, simulating, optimizing andcontrolling computing anticipatory systems.

ANTICIPATION

“Computing system” refers to any rule-based andlearning-based evolving natural and artificialsystem. Computation deals with manipulation ofsymbols in a large sense, including calculation. In1985, Robert Rosen published his bookAnticipatory Systems (Pergamon Press, New York)where he defined an anticipatory system as a systemcontaining a model of itself and/or its environment,which adapts its current state to the prediction of itsmodel. Just like a past event (a memory) isrepresented by a variable that gives at the currenttime its value taken in the past, a future event (ananticipation) is represented by a variable that givesat the current time its potential future value. Let uspoint out that the concept of anticipatory systemdeals not only with the prediction of events (aprojection of the present to the future) but also withthe construction, by the anticipatory system, of thefuture events (not a projection of the present to thefuture, but a constructed future which conditions thepresent).

In 1992, Daniel Dubois and Germano Resconipublished the book Hyperincursivity: a newmathematical theory (Presses Universitaires deLiège, Belgium), where the notions of incursion(INclusive reCURSION) and hyperincursion (anincursion with multiple solutions) were proposed.An incursive systems is an inclusive or implicit

recursive system, for example, x(t+1) := F(x(t),x*(t+1)), where each iteration x(t+1) is computed ateach time step t = 1,2,3,... from a function F of x(t)and x*(t+1), where x*(t+1) is the anticipation of x(t)at the next time step, computed from the systemitself or from a model. A hyperincursive system isan incursive system which generates multipleiterations at each computing step. With incursivesystems, the systems depend not only on past andpresent states (as in recursive systems), but also onfuture states.

During the last 5 years, significant developments ofanticipatory systems were made and presented atthe CASYS conferences. This year’s edition of theconference can be considered as a turning point inthis field, because of the development of a moreprecise mathematical foundation of anticipatorysystems. Important elements are the extension ofdifferential delay difference equations to differentialadvance (anticipatory) difference equations; theanticipatory synchronization of a slave system to amaster system and the mathematical generalizationof strong and weak incursive (anticipatory) systems.

INVITED SPEAKERS

The conference was proud to welcome the invitedspeakers, two world-renowned personalities, Prof.Dr. George Klir (Binghamton University, USA),who received the CASYS Award for hisoutstanding work on anticipatory and intelligentsystems, and Prof. Dr. Ian Stewart (University ofWarwick, UK), who received the CHAOS Awardfor his outstanding work on chaos and mathematicalsystems.

Prof. Klir presented a talk on The Role ofAnticipation in Intelligent Systems, in which therole of anticipation in intelligent systems wasdiscussed. He argued that the area of intelligentsystems can greatly benefit by importing the variousresults developed within the area of anticipatorysystems. He also argued that the area of anticipatorysystems could enlarge its scope by importingknowledge regarding soft systems and softcomputing from the area of intelligent systems.

Prof. Stewart presented an invited talk on Systemswith Emergent Dynamics. According to prof.Stewart, evolutionary biologists often rejectdeterministic models of evolutionary processesbecause they equate 'deterministic' with 'goal-seeking', and have learned the hard way not to trustgoal-seeking explanations of evolutionaryadaptations. On the other hand, he argues that thegeneral theory of dynamical systems potentially hasmuch to offer for evolutionary biology, forexample, as a resolution of the conflict between

Page 15: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001119

gradualism and punctuated equilibrium. Theconcept of a system with emergent dynamics retainsthe deterministic nature of dynamical systems,while eliminating any goal-seeking interpretation.Then systems with emergent dynamics aredeterministic but not goal-seeking. As such, theyoffer a sensible way to use dynamical systems asmodels for evolutionary processes in biology, andin other areas.

In all, 166 papers were proposed by 282 scientificauthors/co-authors from 45 different countries,presented in 10 symposiums. More informationabout CASYS can be found on the web:http://www.ulg.ac.be/mathgen/CHAOS/CASYS.htmlandhttp://www.ulg.ac.be.mathgen/CHAOS/CHAOS.html

Bolesian Part of Cap GeminiErnst & Young

Bas Zinsmeister, Bolesian

Cap Gemini Ernst & Young decided to integrate theactivities of Bolesian into their own organisation.This means that all employees of the former‘Bossche company’ will work for CGE&Y as ofnow. The activities and domain of special attentionstay the same; also our services remain unchanged.The only real change is our location; from now onwe reside in Utrecht instead of Den Bosch.

In the words of Henk Broeders (CEO of CapGemini Ernst & Young in the Benelux) the addedvalue of the integration into Cap Gemini Ernst &Young is that: “By integrating Bolesian’s activities,we are able to gain even more advantages ofsynergy. We will realise those advantages bylinking Bolesian’s knowledge and skills to ourmanagement and IT consultancy. For ourcustomers, this will definitely result in added value,and that’s exactly what we want. ”

For many companies, knowledge is an essentialpart of critical business processes. Knowledgeplays an important role, especially in decision-making processes. Bolesian uses knowledgetechnology to make this knowledge explicit and torepresent it in the most suitable form. Bolesian’sknowledge-analysts are specialists in interviewingexperts and elicitating, structuring and modellingtheir knowledge. This explicit knowledge is the

foundation for the system development path thatfollows.

Bolesian maintains connections in scientific circles.Consequently, we are able to translate the newesttechnologies into practical solutions for bothbusiness and authorities alike. One of theadvantages of the analysis and modellingtechniques that Bolesian employees apply, is thatspecific knowledge is being disconnected frompersons and processes. Therefore the particularknowledge is better and more broadly accessible inthe organisation. A positive consequence ofseparating explicit knowledge from their processesis knowledge that is easier to maintain. Theknowledge systems of Bolesian are often integratedwith already existing operational systems, either asa separate component, or as a completely integratedpackage.

From within Cap Gemini Ernst & Young, Bolesianremains focussed on several types of problems invarious market sectors. We operate in therecruitment and employment branche (matching onjob-sites), trade and industry (product-configuration, monitoring, planning and schedulingand diagnosis), the world of social security,financial and insurance companies (assessment)and more.

When you are interested in our service-offerings foryour company or institution you can contact us atthe address stated below.

Cap Gemini Ernst & Young Nederland B.V.Bolesian,Daltonlaan 300Postbus 25753500 GN UtrechtTel.: +31 30 689 89 89Fax: +31 30 689 99 99www.nl.cgey.com

AI IN BUSINESS

Page 16: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001120

Section EditorRichard Starmans

Social Event for SIKS Ph.D. students

November 9, 2001, Utrecht

Quite some time has already passed since the lastSIKS students social event, when we went cartingwith several Ph.D. students. The SIKS-promovendiraad (students council) considered it agood initiative to have similar events on a regularbasis.

The next social event is planned for FridayNovember 9. We will meet around 14.30 in thestation Utrecht Centraal, near the exitJaarbeurszijde. From there, we will visit theMuntmuseum (coin museum) - a current topic -have a tour through the grachten (channels) anddine together. SIKS supports this activity with afinancial contribution; part of the diner and the tripwill be at your own expense.

This is a prime occasion to meet the SIKS Ph.D.students outside work. In addition, it is simply funand interesting. If you would like to participate,please register before October 26 with me (DavidJansen, [email protected]). If you only canparticipate in a part of the program, please mentionthis clearly in your message.

Advanced Course Multi-Agent Systems

November 12 and 13, 2001, Apeldoorn

On November 12 and 13 2001 the School forInformation and Knowledge Systems (SIKS) willorganize an Advanced Course on Multi-AgentSystems. The course takes two days, will be given inEnglish and is part of the so called AdvancedComponents Stage of the Educational Program forSIKS Ph.D. students. Although these courses areprimarily intended for SIKS Ph.D. students, otherparticipants are not excluded. However, theirnumber of passes will be restricted and depends onthe number of students taking the course. Thecourse is given by experienced lecturers actively

involved in the research areas related to the topicsof the course.

LocationHotel Apeldoorn, Soerenseweg 73 in Apeldoorn.

Scientific directorsdr. C. Witteveen (TUD)prof. dr. J.-J. Ch. Meyer (UU)dr. W. van der Hoek (UU)

Provisionary program:

Monday, November 12

10.15 - 10.30 Opening by prof. dr. J.-J.Ch.Meyer (UU)

10.30 - 11.30 dr. W. van der Hoek (UU): Modaland Epistemical Logic

11.30 - 11.45 Break

11.45 - 12.45 prof. dr. J.-J. Ch. Meyer: Logicfor Intelligent Agents

12.45 - 14.00 Lunch

14.00 - 15.00 dr. W. van der Hoek: the AgentLanguage GOAL (UU)

15.00 - 16.00 dr. T. Grant (Origin): SingleAgent Planning Techniques

16.00 - 16.15 Break

16.15 - 17.15 dr. T. Grant: Single AgentPlanning Techniques (part 2)

Tuesday, November 13

10.00 - 11.00 prof. dr. J.-J. Ch. Meyer: Multi-Agent Epistemic Logic

11.00 - 11.15 Break

11.15 - 12.45 dr. R. Verbrugge (RUG): Logicfor Multi-Agent Systems

12.45 - 14.00 Lunch

14.00 - 16.00 dr. C. Witteveen (TUD):Problems and Techniques inMulti-Agent Planning

16.00 - 16.15 Break

Page 17: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001121

16.15 - 17.15 dr. H. Tonino (TUD): PlanCoordination

17.15 - 17.30 Conclusions and Evaluation

RegistrationIn the conference center is a limited number ofplaces is available, while there is interest from othergroups in the topic as well. Therefore, an earlyregistration is required. Deadline for registration forSIKS Ph.D. students: October 26, 2001. After thatdate, applications to participate will be honored in afirst-come first-serve manner. Of course,applications to participate from other interestedgroups are welcome already. They will receive anotification whether they can participate as soon aspossible.

Information for non-SIKS Ph.D. students: SIKSneeds a confirmation from your supervisor/officethat they agree with the arrangement and payingconditions.

Anyone who is interested in the courses, is kindlyrequested to fill out the registration form on oursite.

CostsArrangement 1: one stay in a standard room,breakfast, two lunches, dinner, course materialincluded:Fully registrated SIKS Ph.D. students: no chargeSIKS research fellow/associated member: ƒ 400,=Ph.D. students from IPA, ASCI, OZSL, TRAIL,BETHA or JF Schouten Institute: ƒ 400,=Other academic participants: ƒ 800,=Non-academic participants: ƒ 1.500,=

Arrangement 2: same arrangement, but with theexclusion of one stay in a standard room andbreakfast:Fully registrated SIKS Ph.D. students: no chargeSIKS research fellow/associated member: ƒ 250,=Ph.D. students from IPA, ASCI, OZSL, TRAIL,BETHA or JF Schouten Institute: ƒ 300,=Other academic participants: ƒ 600,=Non-academic participants: ƒ 1.250,=

Cancellation regulationIf registration is cancelled before November 3, 2001the course fee may be refunded. After that date, noreimbursement is possible. For all questionsregarding the content of the course and theeducational program, please contact the SIKSoffice.

SIKS/SOBU symposium Contracts andCoordination

November 23, 2001, Tilburg

Communication and coordination between systemsbecomes more and more a focus of attention besidesthe internal design of systems. One of the ways inwhich coordination can be specified is by means of"contracts". Contracts are used in real-life, forexample, in commerce, but also in system design tostructure agent societies or connect workflows fromdifferent organizations. This symposium bringstogether different perspectives on contracts andreports about on-going research on how contractscan be used in developing information andcommunication systems.

LocationKatholieke Universiteit Brabant (Room to beannounced).

Hostdr. H. Weigand (KUB)

Preliminary program (titles mentioned are workingtitles only)

10.00-10.15 Coffee/tea

10.15-10.30 Opening

10.30-11.15 Henry Prakken (UU) Contractsfrom an AI & Law perspective

11.15-12.00 Yao-Hua Tan (VU) Logicalanalysis of e-commerce contracts

12.00-13.00 Lunch

13.00-13.30 Thijs Ott de Vries (Ordina/KUB)Contracts for interorganizationalsystems

13.30-14.00 Virginia Dignum (Achmea/UU)Designing agents for KnowledgeManagement

14.00-15.00 Jose Fiadeiro (University ofLisbon) Contracts and softwareevolution

15.00-15.15 Coffee/tea break

15.15-16.00 Roel Wieringa (UT) A softwareengineering perspective oncontracts

16.00 Closing

Page 18: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001122

OrganizationThe symposium is sponsored by the SOBU L&Igroup and the research school SIKS. Admission isfree; lunch is free for SIKS Ph.D. students, researchfellows of SIKS and for members of SOBU L&I.

For other participants the costs for lunch areƒ 25,=. However, the number of participants islimited, hence it is necessary to register in advance.Applications to participate will be honored in afirst-come first-serve manner. The local organizer isHans Weigand ([email protected], tel. 013-4662806).

RegistrationPlease, register with mrs. Alice Kloosterhuis, email:[email protected], phone 013-4663020.Please indicate whether you are a SIKS Ph.D.student, a research fellow of SIKS or a member ofSOBU L&I, and whether you want to join thelunch.

Two Basic Courses: System Modelingand Knowledge Modeling

17 -21 December, 2001, Lunteren

From December 17 to December 21, the School forInformation and Knowledge Systems (SIKS)organizes two basic courses: System Modeling (B7)and Knowledge Modeling (B8) in Lunteren. Thelocation will probably be conference center "HetBosgoed". Both courses will be given in Englishand are part of the obligatory Basic Course Programfor SIKS Ph.D. students. Although these courses areprimarily intended for SIKS Ph.D. students, otherparticipants are not excluded. However, theirnumber of passes will be restricted and depends onthe number of SIKS Ph.D. students taking thecourse.

Organizationdr. G. Schreiber (UvA)prof. dr. R. Wieringa (UT)prof. dr. A. de Bruin (EUR)

ProgramThe program will be made available in the nextissue of the Newsletter.

Second International Workshop onLegal ontologies

13-14 December, 2001 Universiteit van Amsterdam

This workshop is organised in conjunction withJURIX 2001: the Fourteenth Annual InternationalConference on Legal Knowledge and InformationSystems (see http://www.lri.jur.uva.nl/jurix2001 formore details)

In 1997 we held the First International Workshopon Legal Ontologies in conjunction with the SixthInternational Conference on Artificial Intelligenceand Law at the University of Melbourne, Australia(see http://www.csc.liv.ac.uk/~pepijn/legont.htmlfor more details). It was a successful workshop inwhich 8 papers were presented on issues rangingfrom proposals for legal (core) ontologies, throughthe comparison of different ontologies, to means ofbuilding them automatically from legal sources.

Since then, much research has been done, especiallyin the broader fields of ontological engineering andknowledge management, systems using (legal)ontologies have been built, and both practical andtheoretical problems and opportunities have beenencountered. It seems like a good time to have afollow-up workshop for the legal domain.

WORKSHOP AIMS

We welcome (short) papers addressing all aspectsof legal ontologies, but as a source of inspiration welist some potential issues:• Tools and languages for constructing and

maintaining large legal ontologies: support for(semi-)automatic ontology construction,support for validating ontologies, the use of(Legal)XML, RDF

• Use ans reuse of legal and other ontologies inbuilding legal knowledge and informationsystems: how to decide which ontologies areuseful, setting up libraries of legal ontologies

Coördinator Research School SIKSDr. R.J.C.M. StarmansP.O. Box 800893508 TB UTRECHTTel: (030) 2534083/1454Email: [email protected]

SECTION KNOWLEDGESYSTEMS IN LAW

AND COMPUTER SCIENCE

Section EditorRadboud Winkels

Page 19: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001123

• Comparison of different (legal) ontologies:criteria for comparison, reasons for or benefitsfrom ontology comparison

• Legal ontologies in practice: experiences withsystems in legal practice that are based on oruse legal ontologies

IMPORTANT DATES

Deadline for submissions: October 30, 2001Notification of acceptance: November 15, 2001

WORKSHOP ORGANIZERS

Dr. Radboud WinkelsDepartment of Computer Science & LawUniversiteit van Amsterdam, PO Box 10301000 BA Amsterdam, The [email protected]

Drs. Tom van EngersDutch Tax and Customs AdministrationUtrecht, The [email protected]

Dr. Trevor Bench-CaponDepartment of Computer ScienceUniv. of Liverpool, PO Box 147Liverpool L69 7ZF, [email protected]

Lezingen JURIX Bijeenkomst

Report by Jacqueline DakeFdL, KU Brabant

Op 28 september 2001 vond een JURIXbijeenkomst in Leuven plaats. Hieronder worden devier lezingen besproken die daar gehouden werden.

APPLICATIES VAN ZENO

Tom van Buggenhout (Zeno) sprak over de veletoepassingen op het gebied van de juridischeinformatica die Zeno ontwikkelt.

Zeno richt zich op alle stappen in het proces dat vandata via informatie en kennis naar beslissingenleidt. Dit betreft toepassingen als datare-engineering, information retrieval, decision-support- en expert systemen.

Zeno is ontstaan uit SD Worx, de grootste groep ophet gebied van geïntegreerd personeelsbeheer inBelgië. Voor SD Worx heeft Zeno Juridiskontwikkeld. Juridisk is een sociaal-juridischedatabank voor België waarin ca. 150.000 docu-menten op het terrein van arbeidsrecht, sociale

zekerheid, CAO-wetgeving, loonfiscaliteit, inter-nationaal recht en rechtspraak zijn opgenomen. Dejuridische database die bij SD al aanwezig was, isdoor Zeno gestructureerd met behulp van SGML.Het invoerproces moest intact worden gelaten en ermoesten meerdere bevragings-interfaces ontwikkeldworden.

Momenteel werkt Zeno aan het project Edulex inopdracht van het Ministerie van Onderwijs. Ditproject behelst het beschikbaar maken van deonderwijsreglementering op het WWW. VanBuggenhout besprak nog andere Zeno-cases. Dezezijn te vinden op de website van Zeno.

Kernpunt in de lezing van Van Buggenhout was datautomatisering van kennis de kennis eenvormig,overdraagbaar, onderhoudbaar en sneller beschik-baar maakt.

Op dit onderwerp haakte Jaap Hage, voorzitter vanJurix, in met de vraag of er andersom een drukvoelbaar is om procedures te uniformiseren met hetoog op de automatiseerbaarheid ervan. VanBuggenhout beaamt dit. Zeno streeft uniformiteit nadoor kenniscomponenten te ontwikkelen, interface-afspraken te maken en gebruik te maken van XML.

Verder benadrukte Van Buggenhout in zijn lezinghet belang van de inbreng van de gebruiker bij deontwikkeling van een systeem. Zeno vindt zijninspiratie wat dit betreft in de KISS-methode vanGerald Kristen. In de lezing van Marie-FrancineMoens later op de dag, kwam het belang van hetbetrekken van de gebruiker bij het heleontwikkelingsproces nogmaals aan de orde.

WETGEVINGSDATABANKEN:PROBLEMEN EN OPLOSSINGEN

Marie-Francine Moens (KU Leuven) besprak tweeprojecten: het Agora-Lex project en het vervolgervan, het E-Lex project. Het doel van het Agora-Lex project was het electronisch beschikbaar makenen ontsluiten van Belgische wetgeving enregelgeving.

België is een uitstekende proeftuin voor Europa,gezien de speciale problematiek van de twee-taligheid.

Bij het Agora-Lex project bleek dat de handmatigeinvoer van teksten en referentiegegevens veelproblemen veroorzaakte. Het is arbeidsintensief enhierdoor is er vrijwel geen sprake van versiebeheer.Gevolg is ook dat de teksten van geconsolideerdeversies niet elektronisch beschikbaar zijn op hetmoment dat de wijzigende akten worden ge-publiceerd. Het laatste is temeer een probleem daar

Page 20: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001124

in februari 2001 de Raad van Europa aan delidstaten de verplichting oplegde dat wetgevingelectronisch beschikbaar moet zijn voor het publiek,correct en up-to-date, en zowel de oorspronkelijkeals de geconsolideerde versies.

Een belangrijke conclusie uit het Agora-Lex projectwas dat er een grotere mate van automatiseringmoest zijn in de gehele levenscyclus vandatabanken, te beginnen bij het opstellen vanwetgeving. Door bijvoorbeeld in deze fasesjablonen aan te bieden, wordt de structuur en hetgebruik van standaardformuleringen bevordert.

Bij documentuitwisseling is het bestandsformaat(ASCII) en de mark-up taal van belang (SGML,XML). Officiële electronische publicatie van wet-geving is een streefdoel. Groot aandachtspunt zaluiteraard het garanderen van de authenticiteit zijn.Bij het bewaren voor toekomstige generaties isuiteraard de blijvende toegankelijkheid van belang.Het indexeren van gestructureerde informatie zaleenvoudiger zijn te automatiseren dan het indexerenvan ongestructureerde informatie. In beide gevallenis het streven om intelligente tools te ontwikkelenen gebruiken.

Moens sloot haar lezing af met een samenvattingvan de positieve effecten van een grotereautomatisering in de volledige levenscyclus vanwetgeving:1. volledigheid, ook qua versiebeheer;2. het vermijden van menselijke fouten met

betrekking tot consolidaties en referentie-gegevens (metadata);

3. het elektronisch beschikbaar komen van tekstenvan gewijzigde wetgeving komen elektronischbeschikbaar op het moment van de publicatievan de wijzigende akte.

LEXICAL CHAINS

Roxana Angheluta (KU Leuven) legde in haarlezing uit wat lexical chains zijn, hoe ze berekendkunnen worden, en waarvoor ze gebruikt kunnenworden.

Om met het laatste te beginnen, lexical chainsvinden toepassingen bij het automatisch samen-vatten van tekst, bij tekst categorisatie (een teksttoewijzen aan een categorie), het linken vandocumenten en in het juridische domeinbijvoorbeeld bij het desambigueren van juridischetermen.

Angheluta legde uit dat lexical chains eenrepresentatie zijn van de lexicale cohesie van eentekst. Een lexical chain wordt gevormd doorwoorden in een tekst die (semantisch) gerelateerd

zijn. Bij het bepalen van lexical chains wordenveelal alleen zelfstandige naamwoorden inbeschouwing genomen, omdat deze het meestbepalend zijn voor de inhoud van een tekst.

Om de relaties tussen woorden te bepalen, maaktAngheluta bij haar promotieonderzoek gebruik vanWordNet. WordNet is ontwikkeld op de PrincetonUniversity. Het is een database met woorden en derelaties tussen die woorden. Woorden worden insynsets (verzamelingen van synoniemen)ondergebracht, en ook tussen de synsets zijn weerrelaties aangebracht. Naast synonymie zijn inWordNet onder andere relaties tussen woordenopgenomen, waaronder: hyponymie (bank, stoel,tafel zijn hyponiemen van meubel) en hypernymie(meubel is een hyperniem van bank).

Met dergelijke relaties uit WordNet is het mogelijkom de similarity tussen woorden te bepalen.Vervolgens kunnen chains worden gevormd vanwoorden met een hoge onderlinge similarity.

Het eerste algoritme dat Angheluta besprak,desambigueert de woorden met behulp van eensimilarity matrix. In zo'n matrix staan horizontaalen verticaal alle zelfstandige naamwoorden van detekst. Een cel bevindt zich dus altijd op de kruisingvan twee woorden. De cel bevat een lijst met voorelke combinatie van betekenissen van de tweewoorden een similarity-score (deze wordt bepaaldaan de hand van de mate van relatie tussen dezetwee betekenissen in WordNet). Uit deze matrixwordt voor elk woord de 'beste' betekenis gekozen,dat is de betekenis waarvan de som van desimilarity-scores het hoogst is.

Het tweede algoritme dat Angheluta besprak isgeïnspireerd door Barzilay en Elhadad. Ditalgoritme is een min of meer uitputtende zoek-methode naar alle mogelijke chains uitgaande vanalle betekenissen van de woorden. Hoe meerverbindingen tussen woorden in een bepaalde inter-pretatie, hoe plausibeler die interpretatie is. Zwakkeinterpretaties worden tussentijds verwijderd, enuiteindelijk wordt gekozen voor de sterksteinterpretatie.

Tot nu toe zijn de resultaten van het tweedealgoritme beter dan die van het eerste, maarAngheluta verwacht dat een verfijning van desimilarity-maat tussen synsets de resultaten van heteerste algoritme zullen verbeteren.

LINGUÏSTIEK

Rik De Busser (KU Leuven) begon zijn lezing methet beantwoorden van de vraag waarom tot nu toede resultaten van linguïstisch onderzoek vrijwel

Page 21: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001125

genegeeerd zijn bij de ontwikkeling van informatie-extractie (IE) systemen. In de eerste plaats hebbende ontwikkelaars van IE-systemen veelal eentechnische benadering, waardoor zij vaak ad hocoplossingen kiezen. Ten tweede zijn theorieën uitde formele taalkunde veelal zeer complex en lastigimplementeerbaar. Ook zijn het vaak partiëletheorieën, die wel de basiseigenschappen verklarenen enkele uitzonderingen, maar lang niet alletaalverschijnselen dekken. Het succes vanstatistische technieken bij IE-onderzoek heeftmogelijk ook een rol gespeeld. Het lijkt er echter opdat deze technieken een plateau bereikt hebben.

De Busser wil in zijn promotie-onderzoektaalkundige theorie integreren in de statistischemethodieken. Hij besprak twee theorieën diehiervoor geschikt zouden kunnen zijn.

Rhetorical Structure Theory (RST) is eind jaren '80,begin jaren '90 geformaliseerd. Met RST kan eentekst worden geanalyseerd. De bouwstenen van detekst worden geïdentificeerd en de relaties tussendie bouwstenen worden benoemd. Relaties zijnbijvoorbeeld: elaboration, contrast, justification,concession en exemplification. Twee bouwstenenmet hun onderlinge relatie kunnen weer eenbouwsteen vormen op een hoger niveau. RST levertals analyse van een tekst dus uiteindelijk eenboomstructuur op.

RST is een gereedschap waarmee belangrijke delenvan een tekst onderscheiden kunnen worden van deminder belangrijke delen, hetgeen bijvoorbeeld vanbelang is voor het maken van automatischesamenvattingen. De Busser noemde nog enkeleonvolkomenheden van RST: retorische relaties zijnniet altijd expliciet aanwezig; de cues die een relatiesignaleren in een tekst, zijn soms ambigu en derelaties zelf zijn soms ook ambigu.

De tweede theorie die De Busser besprak was deFunctionele Grammatica (FG). Deze relateertsyntactische frasen aan functionele rollen, zoals:actor (= degene die de handeling verricht), process(= de gebeurtenis), goal (= wat de actor wilbereiken; syntactisch veelal het lijdend voorwerp).

De Busser noemde als groot voordeel van de FGboven klassieke IE-technieken, dat eerstgenoemdedomeinonafhankelijk is, terwijl de klassieke IE-technieken zwaar leunen op input vandomeinkennis.

De Busser besloot met het toelichten van de functievan de FG in het juridisch domein: het kan dekwaliteit van automatische samenvattingen vanvonnissen bevorderen, waar de bijdrage van de FG

met name ligt bij de identificatie van semantischerollen.

Links met betrekking tot bovenstaande lezingen:Zeno:http://www/zeno.be/Raad van Europa verplichtingen:http://cm.coe.int/ta/rec/2001/2001r3.htmWordnet:http://www.cogsci.princeton.edu/~wn/index.shtml

ADVERTISEMENT POLICY OFTHE BNVKI

1. We allow announcements andadvertisements to be included into theNewsletter at the cost of Dfl. 300,- perfull page and Dfl. 200,- per half page ofone issue. The subscriber receives threeproof copies.

2. We allow announcements andadvertisements to be included into theNewsletter at the cost of Dfl. 500,- perfull page and Dfl. 350.- per half page fortwo subsequent issues. The subscriberreceives three proof copies of each issue.

3. We allow announcements andadvertisements to be included into theNewsletter at the cost of Dfl. 1.000.- perfull page and Dfl. 750.- per half page forsix issues (one Volume). The subscriberreceives three proof copies of each issue.

The contents of the text offered must berelated to AI. The Editorial Board has theright to change the text or to refuse it, if theybelieve the publication intended does not fitthe Newsletter. Moreover, the Board of theBNVKI has decided upon the followingalternatives.4. We allow promotional leaflets to be

included into the membership mailing ofthe Newsletter. The costs for mailing areDfl. 400.-.

Page 22: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001126

Below, the reader finds a list of conferences andweb sites or email addresses for further information.

November 5-7, 2001The 8th International Conference on MultimediaModeling (MMM2001). CWI, Amsterdam, TheNetherlands.Information:http://www.cwi.nl/conferences/MMM01/

November 18-21, 2001The 7th Australian and New Zealand IntelligentInformation Systems conference (ANZIIS). Perth,Australia.Information: http://www.arcme.uwa.edu.au/~anziis/

November 23, 20011ste Grote Terminologiedag: Terminologie enTaaltachnologie. Antwerpen, België.Information: http://www.taalunieversum.org/tst/

November 29-December 2, 2001The 2001 IEEE International Conference on DataMining (ICDM ’01). Silicon Valley, California.Information:http://www.cs.uvm.edu/~xwu/icdm-01.html

December 10-12, 2001The twenty-first Annual International Conference ofthe British Computer Society's Specialist Group onKnowledge Based Systems and Applied ArtificialIntelligence (ES2001). Cambridge, England.Information: http://www.bcs-sges.org/es2001/

December 13-14, 2001Fourteenth Annual International Conference onLegal Knowledge and Information Systems.University of Amsterdam, The Netherlands.Information: http://www.lri.jur.uva.nl/jurix2001/

March 1-8, 2002Interdisziplinäres Kolleg 2002. Focus Theme:Autonomie and Emotion. Günne am Möhnesee,Germany.Information: http://www.tzi.de/ik2002/

March 20-22, 2002Fifth IFIP International Conference on FormalMethods for Open Object-based DistributedSystems. Universiteit Twente, The Netherlands.Information:http://trese.cs.utwente.nl/fmoods2002/

March 19-22, 2002The IFIP 14th International Conference on Testingof Communicating Systems (IFIP TC 6 / WG 6.1).Berlin, Germany.Information: http://www.fokus.gmd.de/events/

April 2-5, 2002Sixteenth European Meeting on Cybernetics andSystems Research. Vienna, Austria.Information: http://www.oefai.at/emcsr/

April 8-11, 2002Fifth International Conference on CoordinationModels and Languages. York, UKInformation: http://www-users.cs.york.ac.uk/~wood/Coord02/Coordination2002.html

April 19-21, 2002NMR’2002 session on Argument, Dialogue andDecision. Toulouse, France.Information:http://www.cs.uu.nl/people/henry/add02/add02.html

June 26-28, 20024th International Conference on Advanced A/D andD/A. Prague, Chech Republiqic.Information: http://measure.feld.cvut.cz/

July 15-19, 2002Autonomous Agents & Multiagent Systems(AAMAS2002).Information: http://lia.deis.unibo/it/aamas2002

July 21-26, 200215th European Conference on Artificial Intelligence(ECAI). Lyon, France.Information: http://ecai2002.univ-lyon1.fr/

July 25-27, 20023rd International Conference on Computers andGames. Edmonton, Canada.Information: http://www.cs.ualberta.ca.cg2002

October 21-22, 200214th Belgian-Dutch Conference on ArtificialIntelligence (BNAIC 2002). Leuven, Belgium.Information: [email protected]

November 26-29, 2002The 2002 IEEE International Conference om DataMining (ICDM’02). Maebashi City, Japan.Information: http://kis.maebashi-it.ac.jp/icdm02

CONFERENCES, SYMPOSIAWORKSHOPS

Page 23: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BNVKI Newsletter October 2001127

ADDRESSESBOARD MEMBERS BNVKI

Prof.dr. J. N. Kok (chair)Wiskunde en Natuurwetenschappen, Dept. of Computer ScienceUniversiteit Leiden, Niels Bohrweg 1, 2333 CA LeidenTel: + 31 71 5277057. E-mail: [email protected]

Dr. R. Verbrugge (secretary)Rijksuniversiteit Groningen, Cognitive Science and EngineeringGrote Kruisstraat 2/1, 9712 TS Groningen.Tel.: + 31 50 3636334. E-mail: [email protected]

Dr. W. van der Hoek (treasurer)Universiteit Utrecht, Department of Computer ScienceP.O. Box 80089, 3508 TB UtrechtTel.: + 31 30 2533599. E-mail: [email protected]

Dr. A. van den BoschKatholieke Universiteit Brabant, Taal- en Literatuurwetenschap,Postbus 90153, 5000 LE TilburgTel.: + 31 13 4668260. E-mail: [email protected]

Prof. M. DeneckerKatholieke Universiteit LeuvenDept. of Computer Science, Clestijnenlaan 200AB-3001 Heverlee, BelgiëTel.: + 32 16327544. E-mail: [email protected]

Dr. C. JonkerVrije Universiteit Amsterdam, Dept. of Artificial Intelligencede Boelelaan 1081, 1081 HV AmsterdamTel.: + 31 20 4447743. E-mail: [email protected]

Prof.dr.ir. J.A. La PoutréCentrum voor Wiskunde en InformaticaP.O. Box 940791090 GB AmsterdamTel.: + 31 20 592 9333. E-mail: [email protected]

Dr. F. WiesmanUniversiteit Maastricht, IKATPostbus 616, 6200 MD MaastrichtTel.: + 31 43 3883379. E-mail: [email protected]

Drs. B. ZinsmeisterCap Gemini Ernst & Young/Service Practice BolesianPostbus 25753500 GN UtrechtTel.: + 31 30 6893394. E-mail: [email protected]

EDITORS BNVKI Newsletter

Dr. F. Wiesman (editor in chief)(See addresses Board Members)

Dr. E.O. PostmaUniversiteit Maastricht, IKATPostbus 616, 6200 MD MaastrichtTel: + 31 43 3883493. E-mail: [email protected]

Prof. dr. H.J. van den HerikUniversiteit Maastricht, IKATPostbus 616, 6200 MD MaastrichtTel.: + 31 43 3883485. E-mail: [email protected]

Dr. R.G.F. Winkels (section editor)Universiteit van Amsterdam, RechtsinformaticaPostbus 1030, 1000 BA AmsterdamTel.: + 31 20 5253485. E-mail: [email protected]

Dr. J. van Looveren (editor Belgium)Vrije Universiteit Brussel, AI LabPleinlaan 2, 1050 Brussel, Belgium.Tel.: + 32 6293702. E-mail: [email protected]

Dr. R.J.C.M. Starmans (section editor)Coordinator Research school SIKS, P.O. Box 800893508 TB UtrechtTel.: + 31 30 2534083/1454. E-mail: [email protected]

HOW TO SUBSCRIBE

The BNVKI/AIABN Newsletter is a direct benefit ofmembership of the BNVKI/AIABN. Membership dues are Dfl.75,- or BF 1.400 for regular members; Dfl. 50,- or BF 900 fordoctoral students (AIO's); and Dfl. 40,- or BF 700 for students.In addition members will receive access to the electronic versionof the European journal AI Communications. The Newsletterappears bimonthly and contains information about conferences,research projects, job opportunities, funding opportunities, etc.,provided enough information is supplied. Therefore, all membersare encouraged to send news and items they consider worthwhileto the editorial office of the BNVKI/AIABN Newsletter.Subscription is done by payment of the membership due toRABO-Bank no. 11.66.34.200 or Postbank no. 3102697 for theNetherlands, or KBC Bank Veldwezelt No. 457-6423559-31, 2e

Carabinierslaan 104, Veldwezelt, Belgium. In both cases, specifyBNVKI/AIABN in Maastricht as the recipient, and please do notforget to mention your name and address. Sending of theBNVKI/AIABN Newsletter will only commence after yourpayment has been received. If you wish to conclude yourmembership, please send a written notification to the editorialoffice before December 1, 2001.

COPY

The editorial board welcomes product announcements, bookreviews, product reviews, overviews of AI education, AIresearch in business, and interviews. Contributions statingcontroversial opinions or otherwise stimulating discussions arehighly encouraged. Please send your submission by E-mail (MSWord or text) to [email protected].

ADVERTISING

It is possible to have your advertisement included in theBNVKI/AIABN Newsletter. For further information aboutpricing etc., see elsewhere in the Newsletter or contact theeditorial office.

CHANGE OF ADDRESS

The BNVKI/AIABN Newsletter is sent from Maastricht. TheBNVKI/AIABN board has decided that the BNVKI/AIABNmembership administration takes place at the editorial office ofthe Newsletter. Therefore, please send address changes to:

Editorial Office BNVKI/AIABN NewsletterUniversiteit Maastricht, Hazel den Hoed,Dept. Computer Science, P.O. Box 616, 6200 MDMaastricht, The NetherlandsE-mail: [email protected]

OFFICIAL WEBSITE

http://www.cs.unimaas.nl/~bnvki/

Page 24: AI FIGHTING TERRORISM - TU Delftii.tudelft.nl/bnvki/wp-content/uploads/2017/03/18.5.pdf · machine-learning techniques, positive examples must be supplied. Given the many ways a terrorist

BolesianCap Gemini Ernst & Young heeft een grote groep specialisten op het gebied van kennistechnologie, kennismanagement en andere interessante onderwerpen opICT-gebied. Zij werken in de kennistechnologie-practice Bolesian en houden zich voornamelijk bezig met innovatieve projecten. Hierbij kan gedacht worden aan:intelligente matching, bijvoorbeeld resource- en reisplanning, vraagbaaksystemen, beoordelingssystemen binnen financiële instellingen en intelligente planning enschedulingsystemen binnen industrie.

Groeien op een goede voedingsbodemBewust omgaan met kennis en kansen, dat is het kenmerkend cultuurelement en een goede voedingsbodem voor uitdagende werkzaamheden bij de practiceBolesian. Cap Gemini Ernst & Young stimuleert haar medewerkers om hun kennis verder uit te bouwen en daarna uit te dragen binnen bijvoorbeeld internewerkgroepen, de zogenaamde Special Interest Groups. Uitwisseling van kennis met universiteiten en hogescholen behoort tot onze dagelijkse praktijk.Medewerkers van Bolesian participeren actief in onderzoek en onderwijs. Uitdragen van kennis trekt nieuwe kennis aan en brengt onze organisatie in contact mettoonaangevende marktpartijen. Niet voor niets verwachten we van onze specialisten dat zij als spreker aanwezig zijn op congressen en dat zij publiceren in devakbladen. Iedereen bij Cap Gemini Ernst & Young, in welke functie dan ook, kan suggesties doen en initiatieven ontplooien die een verrijking vormen voor CapGemini Ernst & Young en haar opdrachtgevers.

Verantwoordelijkheid dragen en doorgroeienWerken bij Cap Gemini Ernst & Young moet blijven boeien. Daarom zorgen we ervoor, dat binnen relatief kleinschalige projecten met een platteorganisatiestructuur, professionals in een goede sfeer met elkaar samenwerken. Daarbij wordt van elke medewerker verwacht dat hij of zij verantwoordelijkheiddraagt. Op die manier wordt doorgroeien een vanzelfsprekendheid. Maar ook buiten het eigen project worden medewerkers steeds op de hoogte gehouden.Daarvoor organiseren we bedrijfs- en projectpresentaties. De Sociale Commissie organiseert vier maal per jaar avontuurlijke activiteiten, waarbij collega’s elkaarook op een andere manier leren kennen. Zo zie je onze kennistechnologen ook eens waterskiën, karten of op survival.

CAP GEMINI ERNST & YOUNGCap Gemini Ernst & Young behoort wereldwijd tot de grootste managementadvies- en IT-servicesorganisaties en neemt met deze gecombineerde expertise eenunieke positie in. De onderneming is in meer dan dertig landen actief op het gebied van business- en IT-strategie, managementconsulting, technologieontwikkelingen outsourcing. Deze diensten worden geïntegreerd aangeboden vanuit marktgerichte sectoren waarin branchekennis is gebundeld. Mede dankzij hetmultinationale karakter van de onderneming beschikt Cap Gemini Ernst & Young over een bijna onuitputtelijke bron van kennis, methodieken en innovatieveoplossingen. Door hergebruik hiervan en door intensief kennismanagement wordt de time-to-market voor klanten verkort en kunnen zij hun marktvoorsprongvergroten. Cap Gemini Ernst & Young telt wereldwijd meer dan 60.000 medewerkers van wie 7.000 in Nederland en behaalde in 2000 een omzet van 8,5 miljardeuro.

Meer informatieMeer informatie over specifieke dienstverlening, kantoren en research is beschikbaar op: www.cgey.com en www.nl.cgey.com of stuur een mailtje [email protected].