-
Illuminating the Space of Enemies Through MAP-Elites
Authors:
Breno M. F. Viana,
Leonardo T. Pereira,
Claudio F. M. Toledo
Abstract:
Action-Adventure games have several challenges to overcome, where the most common are enemies. The enemies' goal is to hinder the players' progression by taking life points, and the way they hinder this progress is distinct for different kinds of enemies. In this context, this paper introduces an extended version of an evolutionary approach for procedurally generating enemies that target the enemy…
▽ More
Action-Adventure games have several challenges to overcome, where the most common are enemies. The enemies' goal is to hinder the players' progression by taking life points, and the way they hinder this progress is distinct for different kinds of enemies. In this context, this paper introduces an extended version of an evolutionary approach for procedurally generating enemies that target the enemy's difficulty as the goal. Our approach advances the enemy generation research by incorporating a MAP-Elites population to generate diverse enemies without losing quality. The computational experiment showed the method converged most enemies in the MAP-Elites in less than a second for most cases. Besides, we experimented with players who played an Action-Adventure game prototype with enemies we generated. This experiment showed that the players enjoyed most levels they played, and we successfully created enemies perceived as easy, medium, or hard to face.
△ Less
Submitted 6 May, 2022; v1 submitted 19 February, 2022;
originally announced February 2022.
-
Illuminating the Space of Dungeon Maps, Locked-door Missions and Enemy Placement Through MAP-Elites
Authors:
Breno M. F. Viana,
Leonardo T. Pereira,
Claudio F. M. Toledo
Abstract:
Procedural Content Generation (PCG) methods are valuable tools to speed up the game development process. Moreover, PCG may also present in games as features, such as the procedural dungeon generation (PDG) in Moonlighter (Digital Sun, 2018). This paper introduces an extended version of an evolutionary dungeon generator by incorporating a MAP-Elites population. Our dungeon levels are discretized wi…
▽ More
Procedural Content Generation (PCG) methods are valuable tools to speed up the game development process. Moreover, PCG may also present in games as features, such as the procedural dungeon generation (PDG) in Moonlighter (Digital Sun, 2018). This paper introduces an extended version of an evolutionary dungeon generator by incorporating a MAP-Elites population. Our dungeon levels are discretized with rooms that may have locked-door missions and enemies within them. We encoded the dungeons through a tree structure to ensure the feasibility of missions. We performed computational and user feedback experiments to evaluate our PDG approach. They show that our approach accurately converges almost the whole MAP-Elite population for most executions. Finally, players' feedback indicates that they enjoyed the generated levels, and they could not indicate an algorithm as a level generator.
△ Less
Submitted 6 April, 2022; v1 submitted 18 February, 2022;
originally announced February 2022.
-
Towards an Adaptive and Normative Multi-Agent System Metamodel and Language: Existing Approaches and Research Opportunities
Authors:
Marx Viana,
Paulo Alencar,
Carlos Lucena
Abstract:
Several Multi-Agent System (MAS) metamodels and languages have been proposed in the literature to support the development of agent-based applications. MAS metamodels are used to capture a collection of concepts the relevant entities and relationships in the MAS domain, which include entities such as agent, message, role, action and plan, and relationships that represent, for example, that a role i…
▽ More
Several Multi-Agent System (MAS) metamodels and languages have been proposed in the literature to support the development of agent-based applications. MAS metamodels are used to capture a collection of concepts the relevant entities and relationships in the MAS domain, which include entities such as agent, message, role, action and plan, and relationships that represent, for example, that a role is responsible for one or more tasks. In addition, to models, MAS modeling languages have also been used to support the development of MASs in a wide variety of domains, including social networking, robotics, security and smart city environments. However, there is a lack of support in these models and languages for abstractions involving norms and adaptations as well as their interactions. This paper presents a survey of some existing metamodels and languages and compares their expressiveness using abstractions related to agents, norms and adaptation. The comparison serves as a basis for the definition of a new MAS metamodeling.
△ Less
Submitted 25 November, 2021;
originally announced November 2021.
-
Governance in Adaptive Normative Multiagent Systems for the Internet of Smart Things: Challenges and Future Directions
Authors:
Marx Viana,
Lauro Caetano,
Francisco Cunha,
Paulo Alencar,
Carlos Lucena
Abstract:
The rapidly changing environments in which companies operate to support the Internet of Things (IoT) and Autonomous Vehicles is challenging traditional Multi agent System (MAS) approaches. The requirements of these highly dynamic environments gave rise to Adaptive Normative MAS approaches. At the same time, governance is an essential and challenging feature that still needs to be addressed in adap…
▽ More
The rapidly changing environments in which companies operate to support the Internet of Things (IoT) and Autonomous Vehicles is challenging traditional Multi agent System (MAS) approaches. The requirements of these highly dynamic environments gave rise to Adaptive Normative MAS approaches. At the same time, governance is an essential and challenging feature that still needs to be addressed in adaptive normative MAS. Indeed, governance of individual and societal agent behavior in Adaptive Normative MASs is still a vague concept that has not been properly investigated, modeled and implemented. However, governance is fundamental for solving problems involving MAS coordination, organizations and institutions. In this paper, we present our ongoing research towards understanding and improving governance in Adaptive Normative MASs. We also discuss challenges and future directions that will facilitate the development of domain specific smart IoT systems with governance features.
△ Less
Submitted 10 December, 2018;
originally announced December 2018.
-
A neural attention model for speech command recognition
Authors:
Douglas Coimbra de Andrade,
Sabato Leo,
Martin Loesener Da Silva Viana,
Christoph Bernkopf
Abstract:
This paper introduces a convolutional recurrent network with attention for speech command recognition. Attention models are powerful tools to improve performance on natural language, image captioning and speech tasks. The proposed model establishes a new state-of-the-art accuracy of 94.1% on Google Speech Commands dataset V1 and 94.5% on V2 (for the 20-commands recognition task), while still keepi…
▽ More
This paper introduces a convolutional recurrent network with attention for speech command recognition. Attention models are powerful tools to improve performance on natural language, image captioning and speech tasks. The proposed model establishes a new state-of-the-art accuracy of 94.1% on Google Speech Commands dataset V1 and 94.5% on V2 (for the 20-commands recognition task), while still keeping a small footprint of only 202K trainable parameters. Results are compared with previous convolutional implementations on 5 different tasks (20 commands recognition (V1 and V2), 12 commands recognition (V1), 35 word recognition (V1) and left-right (V1)). We show detailed performance results and demonstrate that the proposed attention mechanism not only improves performance but also allows inspecting what regions of the audio were taken into consideration by the network when outputting a given category.
△ Less
Submitted 27 August, 2018;
originally announced August 2018.
-
An argument in favor of strong scaling for deep neural networks with small datasets
Authors:
Renato L. de F. Cunha,
Eduardo R. Rodrigues,
Matheus Palhares Viana,
Dario Augusto Borges Oliveira
Abstract:
In recent years, with the popularization of deep learning frameworks and large datasets, researchers have started parallelizing their models in order to train faster. This is crucially important, because they typically explore many hyperparameters in order to find the best ones for their applications. This process is time consuming and, consequently, speeding up training improves productivity. One…
▽ More
In recent years, with the popularization of deep learning frameworks and large datasets, researchers have started parallelizing their models in order to train faster. This is crucially important, because they typically explore many hyperparameters in order to find the best ones for their applications. This process is time consuming and, consequently, speeding up training improves productivity. One approach to parallelize deep learning models followed by many researchers is based on weak scaling. The minibatches increase in size as new GPUs are added to the system. In addition, new learning rates schedules have been proposed to fix optimization issues that occur with large minibatch sizes. In this paper, however, we show that the recommendations provided by recent work do not apply to models that lack large datasets. In fact, we argument in favor of using strong scaling for achieving reliable performance in such cases. We evaluated our approach with up to 32 GPUs and show that weak scaling not only does not have the same accuracy as the sequential model, it also fails to converge most of time. Meanwhile, strong scaling has good scalability while having exactly the same accuracy of a sequential implementation.
△ Less
Submitted 13 July, 2020; v1 submitted 24 July, 2018;
originally announced July 2018.
-
Predicting breast tumor proliferation from whole-slide images: the TUPAC16 challenge
Authors:
Mitko Veta,
Yujing J. Heng,
Nikolas Stathonikos,
Babak Ehteshami Bejnordi,
Francisco Beca,
Thomas Wollmann,
Karl Rohr,
Manan A. Shah,
Dayong Wang,
Mikael Rousson,
Martin Hedlund,
David Tellez,
Francesco Ciompi,
Erwan Zerhouni,
David Lanyi,
Matheus Viana,
Vassili Kovalev,
Vitali Liauchuk,
Hady Ahmady Phoulady,
Talha Qaiser,
Simon Graham,
Nasir Rajpoot,
Erik Sjöblom,
Jesper Molin,
Kyunghyun Paeng
, et al. (8 additional authors not shown)
Abstract:
Tumor proliferation is an important biomarker indicative of the prognosis of breast cancer patients. Assessment of tumor proliferation in a clinical setting is highly subjective and labor-intensive task. Previous efforts to automate tumor proliferation assessment by image analysis only focused on mitosis detection in predefined tumor regions. However, in a real-world scenario, automatic mitosis de…
▽ More
Tumor proliferation is an important biomarker indicative of the prognosis of breast cancer patients. Assessment of tumor proliferation in a clinical setting is highly subjective and labor-intensive task. Previous efforts to automate tumor proliferation assessment by image analysis only focused on mitosis detection in predefined tumor regions. However, in a real-world scenario, automatic mitosis detection should be performed in whole-slide images (WSIs) and an automatic method should be able to produce a tumor proliferation score given a WSI as input. To address this, we organized the TUmor Proliferation Assessment Challenge 2016 (TUPAC16) on prediction of tumor proliferation scores from WSIs. The challenge dataset consisted of 500 training and 321 testing breast cancer histopathology WSIs. In order to ensure fair and independent evaluation, only the ground truth for the training dataset was provided to the challenge participants. The first task of the challenge was to predict mitotic scores, i.e., to reproduce the manual method of assessing tumor proliferation by a pathologist. The second task was to predict the gene expression based PAM50 proliferation scores from the WSI. The best performing automatic method for the first task achieved a quadratic-weighted Cohen's kappa score of $κ$ = 0.567, 95% CI [0.464, 0.671] between the predicted scores and the ground truth. For the second task, the predictions of the top method had a Spearman's correlation coefficient of r = 0.617, 95% CI [0.581 0.651] with the ground truth. This was the first study that investigated tumor proliferation assessment from WSIs. The achieved results are promising given the difficulty of the tasks and weakly-labelled nature of the ground truth. However, further research is needed to improve the practical utility of image analysis methods for this task.
△ Less
Submitted 29 March, 2019; v1 submitted 22 July, 2018;
originally announced July 2018.
-
A Systematic Mapping Study on Security in Agile Requirements Engineering
Authors:
H. Villamizar,
M. Kalinowski,
M. Viana,
D. Méndez Fernández
Abstract:
[Background] The rapidly changing business environments in which many companies operate is challenging traditional Requirements Engineering (RE) approaches. This gave rise to agile approaches for RE. Security, at the same time, is an essential non-functional requirement that still tends to be difficult to address in agile development contexts. Given the fuzzy notion of "agile" in context of RE and…
▽ More
[Background] The rapidly changing business environments in which many companies operate is challenging traditional Requirements Engineering (RE) approaches. This gave rise to agile approaches for RE. Security, at the same time, is an essential non-functional requirement that still tends to be difficult to address in agile development contexts. Given the fuzzy notion of "agile" in context of RE and the difficulties of appropriately handling security requirements, the overall understanding of how to handle security requirements in agile RE is still vague. [Objective] Our goal is to characterize the publication landscape of approaches that handle security requirements in agile software projects. [Method] We conducted a systematic mapping to outline relevant work and contemporary gaps for future research. [Results] In total, we identified 21 studies that met our inclusion criteria, dated from 2005 to 2017. We found that the approaches typically involve modifying agile methods, introducing new artifacts (e.g., extending the concept of user story to abuser story), or introducing guidelines to handle security issues. We also identified limitations of using these approaches related to environment, people, effort and resources. [Conclusion] Our analysis suggests that more effort needs to be invested into empirically evaluating the existing approaches and that there is an avenue for future research in the direction of mitigating the identified limitations.
△ Less
Submitted 4 June, 2018;
originally announced June 2018.
-
CodeCity for (and by) JavaScript
Authors:
Marcos Viana,
Andre Hora,
Marco Tulio Valente
Abstract:
JavaScript is one of the most popular programming languages on the web. Despite the language popularity and the increasing size of JavaScript systems, there is a limited number of visualization tools that can be used by developers to comprehend, maintain, and evolve JavaScript software. In this paper, we introduce JSCity, an implementation in JavaScript of the well-known Code City software visuali…
▽ More
JavaScript is one of the most popular programming languages on the web. Despite the language popularity and the increasing size of JavaScript systems, there is a limited number of visualization tools that can be used by developers to comprehend, maintain, and evolve JavaScript software. In this paper, we introduce JSCity, an implementation in JavaScript of the well-known Code City software visualization metaphor. JSCity relies on JavaScript features and libraries to show "software cities" in standard web browsers, without requiring complex installation procedures. We also report our experience on producing visualizations for 40 popular JavaScript systems using JScity.
△ Less
Submitted 15 May, 2017;
originally announced May 2017.
-
On time-varying collaboration networks
Authors:
Matheus P. Viana,
Diego R. Amancio,
Luciano da F. Costa
Abstract:
The patterns of scientific collaboration have been frequently investigated in terms of complex networks without reference to time evolution. In the present work, we derive collaborative networks (from the arXiv repository) parameterized along time. By defining the concept of affine group, we identify several interesting trends in scientific collaboration, including the fact that the average size o…
▽ More
The patterns of scientific collaboration have been frequently investigated in terms of complex networks without reference to time evolution. In the present work, we derive collaborative networks (from the arXiv repository) parameterized along time. By defining the concept of affine group, we identify several interesting trends in scientific collaboration, including the fact that the average size of the affine groups grows exponentially, while the number of authors increases as a power law. We were therefore able to identify, through extrapolation, the possible date when a single affine group is expected to emerge. Characteristic collaboration patterns were identified for each researcher, and their analysis revealed that larger affine groups tend to be less stable.
△ Less
Submitted 17 February, 2013;
originally announced February 2013.
-
Predicting epidemic outbreak from individual features of the spreaders
Authors:
Renato Aparecido Pimentel da Silva,
Matheus Palhares Viana,
Luciano da Fontoura Costa
Abstract:
Knowing which individuals can be more efficient in spreading a pathogen throughout a determinate environment is a fundamental question in disease control. Indeed, over the last years the spread of epidemic diseases and its relationship with the topology of the involved system have been a recurrent topic in complex network theory, taking into account both network models and real-world data. In this…
▽ More
Knowing which individuals can be more efficient in spreading a pathogen throughout a determinate environment is a fundamental question in disease control. Indeed, over the last years the spread of epidemic diseases and its relationship with the topology of the involved system have been a recurrent topic in complex network theory, taking into account both network models and real-world data. In this paper we explore possible correlations between the heterogeneous spread of an epidemic disease governed by the susceptible-infected-recovered (SIR) model, and several attributes of the originating vertices, considering Erdös-Rényi (ER), Barabási-Albert (BA) and random geometric graphs (RGG), as well as a real case of study, the US Air Transportation Network that comprises the US 500 busiest airports along with inter-connections. Initially, the heterogeneity of the spreading is achieved considering the RGG networks, in which we analytically derive an expression for the distribution of the spreading rates among the established contacts, by assuming that such rates decay exponentially with the distance that separates the individuals. Such distribution is also considered for the ER and BA models, where we observe topological effects on the correlations. In the case of the airport network, the spreading rates are empirically defined, assumed to be directly proportional to the seat availability. Among both the theoretical and the real networks considered, we observe a high correlation between the total epidemic prevalence and the degree, as well as the strength and the accessibility of the epidemic sources. For attributes such as the betweenness centrality and the $k$-shell index, however, the correlation depends on the topology considered.
△ Less
Submitted 15 June, 2012; v1 submitted 31 January, 2012;
originally announced February 2012.
-
Unveiling the Relationship Between Structure and Dynamics in Complex Networks
Authors:
Cesar H. Comin,
João B. Bunoro,
Matheus P. Viana,
Luciano da F. Costa
Abstract:
Over the last years, a great deal of attention has been focused on complex networked systems, characterized by intricate structure and dynamics. The latter has been often represented in terms of overall statistics (e.g. average and standard deviations) of the time signals. While such approaches have led to many insights, they have failed to take into account that signals at different parts of the…
▽ More
Over the last years, a great deal of attention has been focused on complex networked systems, characterized by intricate structure and dynamics. The latter has been often represented in terms of overall statistics (e.g. average and standard deviations) of the time signals. While such approaches have led to many insights, they have failed to take into account that signals at different parts of the system can undergo distinct evolutions, which cannot be properly represented in terms of average values. A novel framework for identifying the principal aspects of the dynamics and how it is influenced by the network structure is proposed in this work. The potential of this approach is illustrated with respect to three important models (Integrate-and-Fire, SIS and Kuramoto), allowing the identification of highly structured dynamics, in the sense that different groups of nodes not only presented specific dynamics but also felt the structure of the network in different ways.
△ Less
Submitted 13 September, 2011;
originally announced September 2011.
-
How Many Nodes are Effectively Accessed in Complex Networks?
Authors:
Matheus P. Viana,
João L. B. Batista,
Luciano da F. Costa
Abstract:
The measurement called accessibility has been proposed as a means to quantify the efficiency of the communication between nodes in complex networks. This article reports important results regarding the properties of the accessibility, including its relationship with the average minimal time to visit all nodes reachable after $h$ steps along a random walk starting from a source, as well as the numb…
▽ More
The measurement called accessibility has been proposed as a means to quantify the efficiency of the communication between nodes in complex networks. This article reports important results regarding the properties of the accessibility, including its relationship with the average minimal time to visit all nodes reachable after $h$ steps along a random walk starting from a source, as well as the number of nodes that are visited after a finite period of time. We characterize the relationship between accessibility and the average number of walks required in order to visit all reachable nodes (the exploration time), conjecture that the maximum accessibility implies the minimal exploration time, and confirm the relationship between the accessibility values and the number of nodes visited after a basic time unit. The latter relationship is investigated with respect to three types of dynamics, namely: traditional random walks, self-avoiding random walks, and preferential random walks.
△ Less
Submitted 1 October, 2011; v1 submitted 27 January, 2011;
originally announced January 2011.