Table 1: Results of the preliminary tests.
Test case Exceptions Abductions Previsions
Scenario a, without delegation 1 36 11
Scenario b, without delegation 2 18 11
Scenario a, with delegation 1 14 11
Scenario b, with delegation 2 10 11
Scenario a, standard application 12 36 -
Scenario b, standard application 6 18 -
structure, where the number of layers is domain-
dependant. The internal structure of each layer is the
same and reifies the patterns of abduction, verifica-
tion and possibly delegation. This allows for the re-
duction of information flows and computational over-
head thanks to an exception-based mechanisms which
allows information to flow upwards in the layer stack
only when something unexpected happens.
In order to validate the proposed approach, a sim-
ple implementation of the general structure has been
created and used to build a three-layer test application
modeling a virtual instrumented environment. The
behavior of the test application has been observed
in several simple situations in order to obtain a first,
quantitative estimate of the benefits of this approach.
The results show how the ALARM approach actu-
ally helps in reducing computational overhead with
respect to a traditional data-driven implementation.
Its stratification and modularization make it easy to
reuse components and adapt the architecture behavior
to fit different specific needs. The hypothesis verifica-
tion pattern improves responsiveness, while the dele-
gation pattern improves the decentralization of heavy
computations.
In order to give a more thorough evaluation of the
computational and informational gain introduced by
ALARM, a series of more accurate and extended tests
are needed. In particular, implementing real life cases
will be the only way to establish the actual level of
improvement.
Several open issues will be the subject of future
developments. First of all, the association of a con-
fidence level to both hypotheses and previsions must
be thoroughly examined, given the unavoidable un-
certainties in both the abductive and the forecasting
processes. Moreover, the concept of delegation can
be raised at a meta-level: in many cases, the down-
stream flow might consist of rules for defining pre-
visions, rather than of already formulated previsions.
Finally, matching hypotheses against previsions is a
complicated issue: both are timed predicates about
objects. Predicates include operators like “similar to”,
“close to”, “simultaneous”, which can be hardly de-
fined once for all. Such operators are expected to be
overloaded by specific classes of objects exploiting
domain-specific algorithms.
REFERENCES
Boyd, J. (1987). A discourse of winning and losing. Un-
published collection of lecture slides available via In-
terlibrary Loan from such sources as the Marine Corps
University Library.
Bruckner, D., Zeilinger, H., and Dietrich, D. (2012). Cog-
nitive automation - survey of novel artificial general
intelligence methods for the automation of human
technical environments. Industrial Informatics, IEEE
Transactions on, 8(2):206–215.
Fiamberti, F., Micucci, D., and Tisato, F. (2012). An object-
oriented application framework for the development
of real-time systems. In Furia, C. and Nanz, S., edi-
tors, Objects, Models, Components, Patterns, volume
7304 of Lecture Notes in Computer Science. Springer
Berlin Heidelberg.
Hall, C., McMullen, S., Hall, D., McMullen, M., and
Pursel, B. (2008). Perspectives on visualization and
virtual world technologies for multi-sensor data fu-
sion. In Information Fusion, 2008 11th International
Conference on.
Hall, D. and Llinas, J. (1997). An introduction to multisen-
sor data fusion. Proceedings of the IEEE, 85(1).
Harris, C., Bailey, A., and Dodd, T. (1998). Multi-sensor
data fusion in defence and aerospace. The Aeronauti-
cal Journal, 102(1015).
Jotshi, A., Gong, Q., and Batta, R. (2009). Dispatching and
routing of emergency vehicles in disaster mitigation
using data fusion. Socio-Economic Planning Sciences,
43(1).
Pau, L. F. (1988). Sensor data fusion. Journal of Intelligent
& Robotic Systems, 1(2).
Peirce, C. S. (1935). Collected papers of Charles Sanders
Peirce. Belknap Press.
Shulsky, A. and Schmitt, G. (2002). Silent warfare: un-
derstanding the world of intelligence. Potomac Books
Inc.
Steinberg, A., Bowman, C., and White, F. (1999). Revisions
to the JDL Data Fusion Model. In Society of Photo-
Optical instrumentation Engineers (SPIE) Conference
Series, volume 3719.
White, F. (1991). Data fusion lexicon. http://oai.
dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html
&identifier=ADA529661.
ALayeredArchitecturebasedonPrevisionalMechanisms
359