skip to main content
article
Free Access

Proactive information gathering for homeland security teams

Authors Info & Claims
Published:01 March 2004Publication History
Skip Abstract Section

Abstract

Supporting counterterrorism analysts with software agents that dynamically anticipate their information requirements.

References

  1. Cannon-Bowers, J.A., Salas, E., and Convers, S.A. Cognitive psychology and team training: Training shared mental models and complex systems. In Human Factors Society Bulletin, 1990.Google ScholarGoogle Scholar
  2. Kogut, P. and Heflin, J. Semantic Web technologies for aerospace. In Proceedings of IEEE Aerospace Conference, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  3. Tambe, M. Towards flexible teamwork. Journal of Artificial Intelligence Research 7 (1997), 83--124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Yen, J., Fan, X., and Volz, R.A. On proactive delivery of needed information to teammates. In Proceedings of the AAMAS 2002 Workshop of Teamwork and Coalition Formation, 2002.Google ScholarGoogle Scholar
  5. Yen, J. et al. CAST: Collaborative Agents for Simulating Teamwork. In Proceedings of the 7th International Joint Conference on Artificial Intelligence (IJCAI-01), 2001, 135--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Yin, J. et al. A knowledge-based approach for designing intelligent team training systems. In Proceedings of the Fourth International Conference on Autonomous Agents, 2000, 427--434. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Proactive information gathering for homeland security teams

            Recommendations

            Reviews

            John W. Fendrich

            This paper is a short report on the role of software agents in supporting a team of people in accomplishing a time-critical task related to US homeland security activities. The specific role discussed in the paper used collaborative agents for simulating teamwork (CAST). The paper and the work it reports on are the results of a collaborative project between Lockheed Martin and Pennsylvania State University's School of Information Sciences and Technology. The role presented is distinguished from others, such as control of agent-based systems (CoABs), within the US Defense Advance Research Projects Agency (DARPA), and STEAM (counter-strike games), because it enables agents to dynamically infer the information needs of teammates, using a shared mental model about the structure and processes of the team. The model is expressed in the multi-agent logic-based language for encoding teamwork (MALLET), a knowledge representation language. Incoming messages and documents are processed by the Management and Data Systems Intelligent Information Factory. The process extracts a shared memory model, captured in MALLET, and results in CAST agents triggering actions, and interacting with the reasoning infrastructure/world knowledge base (RTWKB), or other CAST agents, to present relevant, concise, personalized information to users. Web scraping, information extraction, and semantic Web markup are used to build the RTWKB. The authors suggest that the general architecture presented could be tailored for other application domains, such as supporting teams of investors in the financial domain, or teams of managers of large enterprises with diverse architectures. There is also a hint at further research directions, specifically on augmenting the architecture presented with machine learning. There is a six-item bibliography, as well as two uniform resource locators (URLs). The paper is quite short, and compact in its presentation. Online Computing Reviews Service

            Access critical reviews of Computing literature here

            Become a reviewer for Computing Reviews.

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 47, Issue 3
              Homeland security
              March 2004
              91 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/971617
              Issue’s Table of Contents

              Copyright © 2004 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 March 2004

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format