Reports of the Workshops Held at the 2019 AAAI Conference on Artificial Intelligence

Total Page:16

File Type:pdf, Size:1020Kb

Reports of the Workshops Held at the 2019 AAAI Conference on Artificial Intelligence Workshop Reports Reports of the Workshops Held at the 2019 AAAI Conference on Artificial Intelligence Guy Barash, Mauricio Castillo-Effen, Niyati Chhaya, Peter Clark, Huáscar Espinoza, Eitan Farchi, Christopher Geib, Odd Erik Gundersen, Seán Ó hÉigeartaig, José Hernández-Orallo, Chiori Hori, Xiaowei Huang, Kokil Jaidka, Pavan Kapanipathi, Sarah Keren, Seokhwan Kim, Marc Lanctot, Danny Lange, David Martinez, Marwan Mattar, Mausam, Julian McAuley, Martin Michalowski, Reuth Mirsky, Roozbeh Mottaghi, Joseph C. Osborn, Julien Pérolat, Martin Schmid, Arash Shaban-Nejad, Onn Shehory, Biplav Srivastava, William Streilein, Kartik Talamadupula, Julian Togelius, Koichiro Yoshino, Quanshi Zhang, Imed Zitouni The workshop program of the Thirty- Affective Content Analysis and Third AAAI Conference on Artificial Intelligence (AAAI-19) was held in CL-Aff Shared Task: In Pursuit of Happiness Honolulu, Hawaii, on Sunday and The Affective Content Analysis workshop series held at the Monday, January 27 and 28, 2019. There were 16 workshops in the AAAI Conference on Artificial Intelligence is an interdis- program: Affective Content Analy- ciplinary platform intended to engage the AI and machine- sis: Modeling Affect-in-Action; Agile learning communities about open problems in affective Robotics for Industrial Automation content analysis and understanding, with a special focus Competition; Artificial Intelligence for on affect in language and text. The theme of this second Cyber Security; Artificial Intelligence workshop was modeling affect-in-action, with a shared task Safety; Dialog System Technology (CL-Aff — in pursuit of happiness) to encourage the devel- Challenge; Engineering Dependable opment of new models and approaches for modeling happy and Secure Machine Learning Systems; moments. Games and Simulations for Artifi- cial Intelligence; Health Intelligence; Knowledge Extraction from Games; Network Interpretability for Deep Learning; Plan, Activity, and Intent Recognition; Reasoning and Learn- ing for Human-Machine Dialogues; Reasoning for Complex Question Answering; Recommender Systems Meet Natural Language Processing; Reinforcement Learning in Games; and Reproducible AI. This report con- tains brief summaries of all the work- shops that were held. Copyright © 2019, Association for the Advancement of Artificial Intelligence. All rights reserved. ISSN 0738-4602 FALL 2019 67 Workshop Reports Affective computing has traditionally focused on Artificial Intelligence modeling human reactions using multimodal sen- sor data but not using text. Sentiment and emo- for Cyber Security Workshop tion analysis, on the other hand, has been applied The 2019 Artificial Intelligence for Cyber Security on text as well as multimodal data sets, but this workshop focused on research and applications of research has been limited to quantifying well-defined AI to operational problems in cybersecurity, includ- human reactions. Affect analysis, that is, tech- ing machine learning, game theory, threat mode- niques and applications that understand the expe- ling, and automated and assistive reasoning. The rience of an emotion in the context of language and workshop began with a keynote speech by Craig text, is an upcoming research space. Little has been Knoblock, executive director of USC/ISI, on building done to explore the affective facets of dynamic or knowledge graphs for cybersecurity. Knoblock began multimedia data. Furthermore, the subjective nature with a brief overview of graph analysis, including a of human affect suggests the need to measure in ways useful analysis pipeline to frame the application of that recognize multiple interpretations of human graphical techniques to complex data. He provided responses. Other challenges include standardizing several motivating examples, including recent ap- the measurement of affect to meaningfully com- plication of the techniques to the problem of fore- pare different affective models against each other, casting evolving cyber threats within an enterprise addressing the challenges in cross-media, cross-domain, environment. and cross-platform affect analysis, and identify- The initial session featured several talks on the ing consumer psychology theories and behaviors application of AI to problems in cybersecurity. The related to affect, which are amenable to computa- first paper presented results on leveraging Markov tional modeling game modeling of moving target defenses to protect The workshop program focused on the analysis against multistage cyber threats in a cloud network of emotions, sentiments, and attitudes in textual, environment. Results compared favorably with static visual, and multimodal content for applications nongraph-based techniques. The second paper pre- in psychology, language understanding, and com- sented work in leveraging game-theoretical models to puter vision. Besides original research presenta- optimize defenses for so-called watering hole attacks. tions and posters, the workshop hosted a range of Experimental analyses demonstrated the benefit of keynote speakers, whose presentations highlighted the approach. A third paper explored the application the state of the art in affective computing in a range of planning and model-based diagnosis to automate of fields. the process of cyber physical system design while Alon Halevy talked about various efforts toward taking affect analysis techniques to practice, spe- at the same time meeting security constraints. The cifically focusing on affective search. Rada Mihalcea technique’s effectiveness was evaluated on an auto- from the University of Michigan discussed the pilot model. importance of grounding emotion and affect anal- The first three workshop papers were followed by ysis in context. The study emphasized the impor- a panel discussion: Thirsty in the Age of Plenty — tance of looking beyond the language, including user A Discussion on (Lack of) Datasets for AI and preferences and environmental variables. Ellen Cyber Security. The panel participants were from Riloff from the University of Utah shared an anal- industry, government, and academia. The IMPACT ysis of affective events and reasons behind their data repository, hosted by the Department of polarity. Atanu Sinha from Adobe Research shared Homeland Security, contains a corpora of network two studies that look at affect understanding data, cyber defense data, and cyber attack data. and interpretation from a consumer psychology Two important takeaways from the panel were the perspective. The talk focused on studying facial need for a definition of success when defending expressions and their impact on offers and counter- networks and the need for more representative offers in a negotiation context. Finally, Lyle Ungar data, such as data from realistic live environments. from the University of Pennsylvania talked about It was also pointed out by the panelists that data studying empathy in social media content. He used in operational environments are different introduced the challenges in building computational from data used for advancing research. The data models for psychology-based theories and dis- for research are best when these data represent cussed novel methodologies based on the machine- evolving threats. learning model The morning session concluded with two techni- The workshop concluded with a panel discussion cal papers. The first presented work in using novel among the keynote speakers, moderated by the data masking techniques to protect a machine-learning organizers, on potential directions for future events classifier. Theoretical guarantees of the technique and the scope of interdisciplinary research. The papers were developed and evaluated on benchmark data of the workshop were published as CEUR Workshop sets. The final paper of the morning discussed the use Proceedings, Volume 2328. The workshop was cochaired of fuzzy hashes extracted from kernel embeddings to by Niyati Chhaya and Kokil Jaidka, who also wrote enable file matching, despite adversary insertion and this report. deletion operations. Results compare quite favorably 68 AI MAGAZINE Workshop Reports with stan dard hashing techniques used to recognize codified their winning approach in a series of prin- malware. ciples and a general framework that can be used The afternoon keynote presented by Una-May by others to address adversarial learning attacks in O’Reilly, professor and research scientist at MIT/ general. CSAIL, dealt with artificial adversary intelligence. The workshop was cochaired by William Streilein, O’Reilly began her keynote with a review of recent David Martinez, Jason Matterer, Una-May O’Reilly, work in generating adversarial malware examples Howie Shrobe, and Arunesh Sinha. The papers while still preserving malicious function. Capturing of the workshop were published on arXiv. This the conflicting defender goal of minimizing error report was written by William Streilein and David and the attacker goal of maximizing misclassifi- Martinez. cation, results showed enhanced robustness for machine learning algorithms trained on generated adversarial examples. O’Reilly then described work Artificial Intelligence Safety in applying principles of coevolution to under- standing and predicting behavior of cyber attackers Safety in AI should be not an option but a design and defenders. Leveraging a game theoretical rep- principle. However, there are varying levels of resentation, results were presented showing the tech- safety, diverse sets of ethical standards and values, nique can be used to anticipate
Recommended publications
  • Iot Mag April May 2017.Qxp Layout 1
    IoT Now: ISSN 2397-2793 APRIL/MAY 2017 • VOLUME 7 • ISSUE 2 TALKING HEADS Aeris CTO explains why IoT needs and deserves to have security by design INSIDE: The Enterprise Buyer's Guide – Which IoT Platform 2017 SECURE IoT SMART ENERGY INDUSTRIAL IoT TRANSPORT IoT GLOBAL NETWORK How to address the New efficiency for living, The new interconnected Connections for a Log on at growing threat. See our working and playing. manufacturing environment. moving industry. www.iotglobalnetwork.com Analyst Report at See our Analyst Report at See our Analyst Report at Read our exclusive Analyst to discover our new portal for www.iot-now.com www.iot-now.com www.iot-now.com Report inside this issue products, services and insight PLUS: 18 PAGE TRANSPORT INSIGHT REPORT: Unlimit CEO says IoT success in India means focusing on the long tail • HMS Industrial Networks on why it's time to skip the scary stories and focus on what's needed to secure manufacturing IoT • Geolocation in the Port of Barcelona with Actility • AT&T on why IoT platforms must address organisations’ different needs for functionality• Inside Digicel's deployment of Stream Technologies' IoT-X platform with added Starhome Mach technologies in 33 M2M markets • How Vodafone connectivity helps precision manufacturer ensure maximum uptime for machines • News at www.iot-now.com Get to market faster with IoT services 7RƫQGRXWPRUHQRNLDFRPLRW CONTENTS IoT NOW 10 ANALYST 27 TALKING HEADS REPORT 16 50 SECURITY IoT PLATFORMS INTERVIEW TO WATCH IN THIS ISSUE 20 CASE STUDY 58 COMPANY PROFILE Inside Actility,
    [Show full text]
  • Extended Resources
    Generalization & Democratization of Artificial Intelligence & Machine Learning Extended Resources 1. This TEDxTalk, given by Dr. Ben Goertzel, illustrates some of the most pressing issues of artificial intelligence in today’s world. Dr. Goertzel, CEO of SingularityNET, details the importance of advancing and improving the human experience through a decentralized platform of artificial agents which may ultimately lead to the “singularity” of artificial general intelligence. 2. https://www.youtube.com/watch?v=r4manxX5U-0 3. Fig. 1.1: Agent Interaction. Montes, G. A., & Goertzel, B. (2019). Retrieved October 7, 2020. 4. Fig 1.2: Silo Based Decision Tree Model. Schofield, M., & Thielscher, M., (2019). Retrieved October 15, 2020. 5. Fig 1.3: Conceptual Model For Simulated Recall. Nadji-Tehrani, M., & Eslami, A. (2020). Retrieved October 15, 2020. 6. Fig. 1.4: Basic Neural Network. Zhou, V. (2019, March 3). Retrieved October, 13, 2020. 7. Another TEDxTalk, given by Karen Hao, details the catastrophic effects of artificial intelligence including: deep fakes, job-search discrimination, facial recognition, etc. Hao details the historical success of the improvement in car safety through the adoption and regulation of seatbelts and uses this example to show how the development of AI is outpacing its regulation. Hao proposes that regulation and the evaluation of the technology's impact should happen before the technology is released instead of after. a. https://www.youtube.com/watch?v=D28aL_5LH2Q 8. Podcast conversation discussing artificial general intelligence between Dr. Lex Fridman (MIT) and Dr. Ilya Sutskever (OpenAI). The discussion is around the current AI technologies that have seen advancements toward and possible next steps of technology needed to achieve AGI.
    [Show full text]
  • Mitcnc Tech Conference 
    MIT CLUB OF NORTHERN CALIFORNIA MENS ET MANUS + MACHINES The Future of AI MITCNC TECH CONFERENCE REDWOOD CITY – MARCH , CONFERENCE DETAILS www.mitcnc.org/techconference2017 Discover The Untapped Opportunities of Applied AI AI trailblazers, machine learning experts, forward thinking uncover AI's limitations and untapped opportunities and executives, data scientists, and product and engineering anticipate how AI will change the business landscape. innovators will gather at the MITCNC The Future of AI Conference – Mens Et Manus + Machines – (Mind Don’t miss this business changing opportunity to connect and Hands + Machines) to share how to build with 500 AI founders, execs, and decision makers over an real-world AI solutions as well as discuss the impact of AI action-packed day of unparalleled networking, learning in our society and life. from those who’ve really done it, and of course, great food, generously poured drinks, and plenty of fun. Underneath all the AI hype, real breakthroughs are happening allowing AI developers to create solutions We hope you can join us at the MITCNC The Future of AI which are predictive of the needs of its users. AI and be inspired to make AI work for your business. capabilities are growing at exponential rates. We'd love to see you The MITCNC The Future of AI Conference is where cutting-edge science meets new business implementation. It's a deep dive into emerging AI techniques and technologies with a focus on how to use it in real-world implementations. You'll dissect case studies, delve into the latest
    [Show full text]
  • Chaos in Innovation and Ai
    CHAOS IN INNOVATION AND AI NEXT CHAPTER: THE AGE OF THE BOLD ONES Andreas Sjöström, CTO Digital Advisory Services Your innovation partner Next chapter: The bold ones The bold ones learn fearlessly 4 Children Sleeping Room @ #HACKFORSWEDEN Innovation is uncertainty Most are overweighted in horizon 1 From bell to shark fin: Threat and opportunity Open innovation. Open APIs. Ecosystems. Startups. Where’s the idea? What is it? Does it actually work? Chaos vs order GO Value Ideation Refinement/ Incubation Portfolio of selection future options Chaos vs order Operations Innovation Performance engine Dedicated team Efficient Unregulated Routines & rules Experiments Rational decisions Bold ideas Calculated results Unpredictable outcomes Aimed at guarding the status quo Constantly challenging the status quo Short-term goals Long-term goals Driven by the belief that current Driven by the belief that current operations keep the company alive operations will not fuel growth forever Managing fundamental tensions New types of tests Where to innovate: Design thinking and ecosystems Inspiration Book Airport Onboard Destination Platform eats product for breakfast Book flight Contextual baggage info Flight status Proactive notifications Boarding pass Seat reminder Chatbot @ SAS Biohacking Experimenting, Proof Test Smoke Test, Wow Test Two faces of AI: AI in testing. Testing AI. A human hiding behind the system “Does the system seem to be very reasonable? Does it almost seem like there’s a human hiding behind the system, interacting with me and making me feel comfortable? I get this sense that the system knows a lot about what I want and helps me get the thing that I want.
    [Show full text]
  • The Venue Join Us Hear from Infrastructure Insiders Such As
    20 September 2018 | San Francisco, California, USA IEEE Infrastructure Conference Gain insight and inspiration to think, or re-think, your Hear from infrastructure in sessions guided by and in discussion with Infrastructure foremost experts across the technology industry. Insiders such as... Join us as we discuss big picture questions to give you overall, forward thinking insight, as well as operational nuts & bolts for maximizing your infrastructure, such as: Danny Lange | Unity Technologies » Understanding the evolving role of AI to automate, address complex Vice President of AI and Machine challenges, and improve overall productivity and customer experience Learning » Leveraging systems, services design, and operational management in scale Benjamin Treynor Sloss | Google » Managing failures and lessons learned using real-world scenarios Vice President of Engineering and examples » Assessing trust models in your system paradigms » Addressing the engineering culture and customer experience Let's learn from each other, tell our stories, and create a The Venue community and network that we can trust and reach out to when needed. Step away from your daily routine and join us at San What Makes this Conference Different Francisco’s Terra Gallery for the day. The open space encourages » Designed for and by practitioners, with speakers who have all led, managed or built large infrastructures themselves collaboration and networking, while also inspiring innovation. » An intimate, neutral environment for networking and learning with leaders from top technology companies Terra Gallery » Convened by IEEE, the world's largest technical professional association 51 Harrison Street dedicated to advancing technology for the benefit of humanity San Francisco, CA 94105 Topics include: » Artificial Intelligence & Machine Learning » Storage & Data » Micro-services & Programming Models Join Us » Security & Trust » Linux & System Management Registration is open for » Scalability & Reliability 2018 IEEE Infrastructure.
    [Show full text]
  • September 28-29, 2016 Fort Mason Center San Francisco
    ® THE WORLD’S FIRST & LARGEST EVENT DEDICATED TO ARTIFICIAL INTELLIGENCE FOR THE BUSINESS WORLD SEPTEMBER 28-29, 2016 FORT MASON CENTER SAN FRANCISCO WWW.THEAISUMMIT.COM JOIN THE OUR EARLY CONFIRMED TH 4 INDUSTRIAL REVOLUTION! PARTNERS AI is already here. It’s happening in many, if not most industries; its application in the business environment is growing fast. On many estimates, over the next 10 years, enterprise FOUNDING PARTNERS spending on AI technology will increase from $200m to over $50billion. AI will drive business growth, and rather than detract from human contribution it will release workers to complete more creative and valuable tasks. A number of leading organisations spanning finance, law, healthcare, manufacturing, transport, energy, education and many more are looking to implement the technologies or have already started! AIBusiness.org was founded in 2014 as the world’s first comprehensive news portal & online community dedicated to the advancement of Artificial intelligence and its impact on business. In 2016, we launched the hugely succesful AI Summit in London on the 5th of May DIAMOND SPONSOR bringing together 400+ business leaders from all over Europe and attracting huge media interest. Our San Francisco show is expected to fill the 600-seat Cowell Theatre and Fort Mason Center exhibition areas in what is the first business-orientated AI event in the Bay Area. Indeed, rather than the usual academic, research and technical audience that existing AI/Enterprise PLATINUM SPONSORS IT events gather, we target the Enterprise IT Business leader interested in the practical applications of AI. We also look at all the technologies under the AI ‘umbrella’: Machine Learning, Deep Learning, NLP, Image/Video recognition, Speech/Voice Recognition, Cognitive computing.
    [Show full text]
  • A HANDS-ON LOOK at JAVA MOBILE AGENTS What Are the Benefits
    . FEATURE A HANDS-ON LOOK AT JAVA MOBILE AGENTS What are the benefits and drawbacks of JOSEPH KINIRY AND DANIEL ZIMMERMAN California Institute of Technology current Java mobile agent systems? The authors installed everal companies riding the current wave of popularity of Java and evaluated three want to let you play in the mobile agent sandbox. Each claims Sthat mobile agent technologies are going to change the way we live and work, and each wants to be the company that provides the leading systems breakthrough system we all end up using. What do these agent sys- tems actually do and, more importantly, what distinguishes one agent system from another? available for download To help answer these questions, we downloaded three of the lead- ing commercial systems—General Magic’s Odyssey, IBM’s Aglets, and ObjectSpace’s Voyager—and looked at issues such as ease of from the Web. installation, feature set, documentation, and cost. We also discuss new capabilities of Java 1.1 that show promise as simple yet powerful means to create mobile agent systems. We conclude with a brief look at the ways in which mobile agents are currently being used and the limitations of today’s technologies. JAVA MOBILE AGENT SYSTEMS The current explosion of interest in mobile agent systems is due almost entirely to the widespread adoption of Java. As recently as three years ago, only a few mobile agent systems were under development based primarily on research languages like Tcl, Scheme, Oblique, and Rosette. Only one system was commercially available, Telescript from General Magic. Java has changed all that.
    [Show full text]
  • Using Java for Intelligent Agents
    68991_CH01I 2/21/01 12:07 PM Page 1 CHAPTER 1 Introduction n this chapter, we present an introduction to the two major topics covered in this book: artificial intelligence (AI) and intelligent agents. We trace the history of AI research and Idiscuss the basic premises of both the symbol processing and neural network schools. We explore the evolution of AI systems from a promising but largely discredited tech- nology into the basis for today’s intelligent agent applications. The simultaneous emer- gence of network computing and the Web, and their requirements for intelligent software are also discussed. We present key attributes of intelligent agents such as autonomy, mobility, and intelligence and provide a taxonomy for classifying various intelligent agent applications. We also discuss the unique features of the Java program- ming language that support our agent requirements. Artificial Intelligence The science of AI is approximately forty years old, dating back to a conference held at Dartmouth in 1958. During the past forty years, the public perception of AI has not always matched the reality. In the early years, the excitement of both scientists and the popular press tended to overstate the real-world capabilities of AI systems. Early success in game playing, mathematical theorem proving, common-sense reasoning, and college mathematics seemed to promise rapid progress toward practical machine intelligence. During this time, the fields of speech recognition, natural language understanding, and image optical character recognition all began as specialties in AI research labs. However, the early successes were followed by a slow realization that what was hard for people and easy for computers was more than offset by the things that were easy for people to do but almost impossible for computers to do.
    [Show full text]
  • United States Patent (19) 11 Patent Number: 6,163,794 Lange Et Al
    USOO6163794A United States Patent (19) 11 Patent Number: 6,163,794 Lange et al. (45) Date of Patent: Dec. 19, 2000 54 NETWORKSYSTEM EXTENSIBLE BY C. Daniel Wolfson, et al., “Intelligent Routers,” The 9th USERS International Conference on Distributed Computing Sys tems, IEEE Computer Society Press, 1989, pp. 371-376. 75 Inventors: Danny Lange, Cupertino; Barbara Nelson, San Mateo; Jing Su, Cupertino; James E. White, San Carlos, all of Primary Examiner Mehmet B. Geckil Calif. Attorney, Agent, or Firm-Philip W. Woo, Esq.; Skjerven 73 Assignee: General Magic, Sunnyvale, Calif. Morrill et al. 57 ABSTRACT 21 Appl. No.: 09/178,366 In one aspect, a network System includes a user interface 22 Filed: Oct. 23, 1998 which allows a user to interact with the network System. An (51) Int. Cl." ...................................................... G06F 15/16 agent Server is coupled to the user interface. The agent Server 52 U.S. Cl. ............................................. 709/202; 709/226 manages the operation of the network System. Furthermore, 58 Field of Search ..................................... 709/202, 203, the agent Server in conjunction with the user interface is 709/205, 204, 224, 226, 225, 228, 229, operable to create or modify an agent in response to inter 223,317; 707/10, 9, 104; 379/88.13, 88.19, action by the user. In another aspect, a network System 88.17 includes an agent Server which manages the operation of the 56) References Cited network System. An agent is operable to utilize a Service within the network System. A Service wrapper, associated PUBLICATIONS with the Service, cooperates with the agent Server to mediate JP Morgenthal, “XML Agents,” NC.Focus website interaction between the Service and the agent.
    [Show full text]
  • How Creative Leaders Use High Compute Trends to Power Breakthroughs in Their Industries
    RESHAPING CREATIVITY HOW CREATIVE LEADERS USE HIGH COMPUTE TRENDS TO POWER BREAKTHROUGHS IN THEIR INDUSTRIES AN EXCLUSIVE TREND REPORT FROM CONTENTS INTRO 3D: DEMAND FOR THE THIRD DIMENSION AI: EXPANDING THE LIMITS OF YOUR CREATIVITY (N)K RESOLUTION: THE IMMINENT NEED FOR INFINITE PIXELS CONCLUSION CONTRIBUTORS INTRODUCTION TECHNOLOGY TRENDS REVOLUTIONIZING CREATIVITY And as creators embrace this tech, 3D is finding “Increasingly, customers expect technology to The digital landscape in which most creative professionals its way into every industry. David McGavran, CEO of understand their intent and for software to be much more work is evolving so quickly that it’s as if the technological Maxon, describes the most common applications for intuitive as a result,” says Mark Linton, Vice President the company’s 3D suite. “Cinema 4D is used in motion for Portfolio, Solutions & Marketing at Microsoft. AI is tectonic plates under their feet are in constant motion. In areas graphics, game development, general design, live reshaping software, from content-aware fills in Photoshop design for concerts and stage events, and visualization to photogrammetry tools that can recreate photorealistic as disparate as 3D, artificial intelligence, and infinite resolution, for architecture, engineering, scientific and medical environments in 3D renders. advancements are continuously redefining what’s possible – applications.” Even that list isn’t exhaustive; applications Through all of this, how creators interact with their tools that were once relegated to the realm of science fiction, remains an exciting area of innovation. Technology has a from fully interactive ray-traced 3D models rendered in like virtual reality and augmented reality, now depend on habit of becoming less apparent, and already we can see real time to resolution independent texture models that creators working with 3D tools on a daily basis.
    [Show full text]
  • Mobile Agent Security
    AlllOt 3&7&0& P'JBLICATIONS NiST Special Publication 800-19 Mobile Agent Security U.S. DEPARTMENT OF COMMERCE Wayne Jansen and Tom Karygiannis Technology Administration National Institute of Standards and Technology COMPUTER SECURITY V i I PsHSF NO.800-19 1999 he National Institute of Standards and Technology was established in 1988 by Congress to "assist industry in the development of technology . needed to improve product quality, to modernize manufacturing processes, to ensure product reliability . and to facilitate rapid commercialization ... of products based on new scientific discoveries." NIST, originally founded as the National Bureau of Standards in 1901, works to strengthen U.S. industry's competitiveness; advance science and engineering; and improve public health, safety, and the environment. One of the agency's basic functions is to develop, maintain, and retain custody of the national standards of measurement, and provide the means and methods for comparing standards used in science, engineering, manufacturing, commerce, industry, and education with the standards adopted or recognized by the Federal Government. As an agency of the U.S. Commerce Department's Technology Administration, NIST conducts basic and applied research in the physical sciences and engineering, and develops measurement techniques, test methods, standards, and related services. The Institute does generic and precompetitive work on new and advanced technologies. NIST's research facilities are located at Gaithersburg, MD 20899, and at Boulder, CO 80303.
    [Show full text]
  • How Is Artificial Intelligence Shaping the Future of Tech in Silicon Valley?
    Orange Institute #18 April 24 – 27, 2017 How is Artificial Intelligence shaping the future of Tech in Silicon Valley? Orange Institute 1 Orange Institute 2 Orange Institute Orange Institute is your guide to the long, convening inside tech hubs from survival and growth. As the corporate rapidly expanding Digital Economy, Silicon Valley to Seoul, hosted by global sponsor of this activity, Orange is a force for positive change in the giants and animated by entrepreneurs committed to sharing and discussing workplace, our daily life, and society. across a broad spectrum of disciplines new concepts and ideas - we believe Our member companies have been and focus areas. Our topics range from that by helping others to understand, collaboratively learning how to adapt neuroscience to navigation, from Big we can also see more clearly. and prosper, both as enterprises and Data to e-health, from designing new as citizens, by immersing ourselves in consumer experiences to cutting-edge Our commitment is to curate insightful the world’s creative capitals since 2009. data centers. con versations with the entrepreneurs, disruptive companies, researchers and The format for this learning and Learning dynamically in a non-linear investors who are passionate about connecting has been evolving with world is not a luxury, it is a necessity for change. Please join us on the journey! each new session, typically 2-4 days Orange Institute 3 Table of Contents Monday 6 San Francisco visit 8 Icebreaker and Welcome dinner T u e s d a y 10 State of play: Machine Intelligence
    [Show full text]