Lecture Notes in Artiﬁcial Intelligence Edited by R. Goebel, J. Siekmann, and W. Wahlster
Subseries of Lecture Notes i...

This content was uploaded by our users and we assume good faith they have the permission to share this book. If you own the copyright to this book and it is wrongfully on our website, we offer a simple DMCA procedure to remove your content from our site. Start by pressing the button below!

Lecture Notes in Artiﬁcial Intelligence Edited by R. Goebel, J. Siekmann, and W. Wahlster

Subseries of Lecture Notes in Computer Science

6489

Paolo Frasconi Francesca A. Lisi (Eds.)

Inductive Logic Programming 20th International Conference, ILP 2010 Florence, Italy, June 27-30, 2010 Revised Papers

13

Series Editors Randy Goebel, University of Alberta, Edmonton, Canada Jörg Siekmann, University of Saarland, Saarbrücken, Germany Wolfgang Wahlster, DFKI and University of Saarland, Saarbrücken, Germany Volume Editors Paolo Frasconi Università degli Studi di Firenze Dipartimento di Sistemi e Informatica Via di Santa Marta, 3, 50139 Firenze, Italy E-mail: [email protected]ﬁ.it Francesca A. Lisi Università degli Studi di Bari "Aldo Moro" Dipartimento di Informatica Campus Universitario "E. Quagliariello" Via E. Orabona, 4, 70125 Bari, Italy E-mail: [email protected]

ISSN 0302-9743 e-ISSN 1611-3349 ISBN 978-3-642-21294-9 e-ISBN 978-3-642-21295-6 DOI 10.1007/978-3-642-21295-6 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: Applied for CR Subject Classiﬁcation (1998): F.4.1, I.2.3, I.2.6, F.1, H.2.8, H.3, F.3 LNCS Sublibrary: SL 7 – Artiﬁcial Intelligence

© Springer-Verlag Berlin Heidelberg 2011 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, speciﬁcally the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microﬁlms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a speciﬁc statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Typesetting: Camera-ready by author, data conversion by Scientiﬁc Publishing Services, Chennai, India Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Preface

This volume contains a selection of revised papers from the 20th International Conference on Inductive Logic Programming (ILP 2010) held in Firenze, Italy, during June 27–30, 2010. The ILP conference series started in 1991 and is the premier international forum on logic-based approaches to machine learning. The conference has recently explored several intersections with statistical learning and other probabilistic approaches, expanding research horizons signiﬁcantly. The 20th edition was structured with invited talks, regular talks, a poster session, a panel session, and featured for the ﬁrst time a tutorial day. The invited speakers were Michael Kifer, Avi Pfeﬀer, and David Poole. Abstracts of their talks can be found in this volume. Gianluigi Greco and Francesco Scarcello presented a tutorial on “Structural Decomposition Methods: Identifying Easy Instances of Hard Problems”; Volker Tresp presented a tutorial on “Multivariate Models for Relational Learning.” Ivan Bratko, Luc De Raedt, Peter Flach, Katsumi Inoue, Stephen Muggleton, David Poole, and Ashwin Srinivasan participated in a panel session highlighting successes and future trends of ILP 20 years after the ﬁrst meeting. The overall program featured 16 oral presentations and 15 poster presentations. The presentations of both kind were selected on the basis of extended abstracts. Following the recent tradition of the conference, a selection of the papers accepted at ILP 2010 are published in this volume of the Lecture Notes in Artiﬁcial Intelligence series and in a special issue of the Machine Learning journal. From the initially submitted 44 extended abstracts (8 pages in LNCS format), 31 were accepted for presentation at the conference. Each submission was refereed by at least three Program Committee members and was accessible for additional comments by the entire Program Committee (except in the cases of conﬂict of interest) thanks to the open reviewing model supported by EasyChair. Out of the accepted contributions 5 were selected for the special issue, 11 were published as a long paper (16 pages), and 15 more as a short paper (8 pages) in the proceedings. These papers were prepared after the conference. Supplementary materials for some of the accepted papers can be retrieved from the conference website (http://ilp2010.dsi.unifi.it/). ILP 2010 would not have taken place without the contribution of many people. We would like to thank the invited and tutorial speakers, the panelists, the Program Committee members, the additional reviewers, the authors of submitted papers, the participants, the local organizers (especially Marco Lippi)

VI

Preface

as well as the sponsors (the Artiﬁcial Intelligence journal, the Machine Learning journal, the Association for Logic Programming, the University of Bari “Aldo Moro,” the PASCAL 2 Network of Excellence, and the Oﬃce of Naval Research Global) for their generous ﬁnancial support. March 2011

Paolo Frasconi Francesca Alessandra Lisi

Organization

Program Chairs Paolo Frasconi Francesca A. Lisi

Universit` a degli Studi di Firenze, Italy Universit`a degli Studi di Bari “Aldo Moro”, Italy

Program Committee Erick Alphonse Annalisa Appice Hendrik Blockeel James Cussens Luc De Raedt Saso Dzeroski Nicola Fanizzi Alan Fern Peter Flach Nuno Fonseca Lise Getoor Pascal Hitzler Tamas Horvath Katsumi Inoue Manfred Jaeger Kristian Kersting Ross King Tolga Konik Stefan Kramer Niels Landwehr Nada Lavrac Sofus Macskassy Donato Malerba Lily Mihalkova Brian Milch Stephen Muggleton Ramon Otero David Page Andrea Passerini Jan Ramon Oliver Ray Chiaki Sakama

Universit´e Paris-Nord, France Universit` a degli Studi di Bari “Aldo Moro”, Italy Katholieke Universiteit Leuven, Belgium University of York, UK Katholieke Universiteit Leuven, Belgium Jozef Stefan Institute, Slovenia Universit`a degli Studi di Bari “Aldo Moro”, Italy Oregon State University, USA University of Bristol, UK CRACS-INESC Porto LA, Portugal University of Maryland, USA Wright State University, USA University of Bonn and Fraunhofer AIS, Germany NII, Japan Aalborg University, Denmark Fraunhofer IAIS and University of Bonn, Germany University of Wales, UK Stanford University, USA TU M¨ unchen, Germany University of Potsdam, Germany Jozef Stefan Institute, Slovenia Fetch Technologies Universit`a degli Studi di Bari “Aldo Moro”, Italy University of Maryland, USA Google, USA Imperial College London, UK University of Corunna, Spain University of Wisconsin, USA Universit`a degli Studi di Trento, Italy Katholieke Universiteit Leuven, Belgium University of Bristol, UK Wakayama University, Japan

VIII

Organization

V´ıtor Santos Costa Taisuke Sato Jude Shavlik Takayoshi Shoudai Ashwin Srinivasan Prasad Tadepalli Volker Tresp Christel Vrain Stefan Wrobel Akihiro Yamamoto Gerson Zaverucha Filip Zelezny

Universidade do Porto, Portugal Tokyo Institute of Technology, Japan University of Wisconsin, USA Kyushu University, Japan IBM India Research Lab, India Oregon State University, USA Siemens AG Munich, Germany LIFO - Universit´e d’Orl´eans, France University of Bonn and Fraunhofer IAIS, Germany Kyoto University, Japan PESC/COPPE - UFRJ, Brazil Czech Technical University, Czech Republic

Additional Reviewers Aleksovski, Darko Camacho, Rui Ceci, Michelangelo Duboc, Ana Lu´ısa Dutra, Inˆes Gonzalez, Jorge Hadiji, Fabian Illobre, Alberto Kameya, Yoshitaka Kimmig, Angelika Lehmann, Jens

Mantadelis, Theofrastos Nickel, Maximilian Paes, Aline Rettinger, Achim Riguzzi, Fabrizio Romero, Javier Slavkov, Ivica Steinke, Florian Stojanova, Daniela Suzuki, Yusuke Tran, Son

Local Arrangements Committee Marco Lippi Arianna Sciarrillo

Universit`a degli Studi di Firenze, Italy Universit`a degli Studi di Firenze, Italy

Sponsors Artiﬁcial Intelligence journal Association for Logic Programming Machine Learning journal Oﬃce of Naval Research Global PASCAL 2 Network of Excellence Universit` a degli Studi di Bari “Aldo Moro”

Table of Contents

Abstracts of Invited Talks Rule Interchange Format: Logic Programming’s Second Wind? . . . . . . . . . Michael Kifer

1

Practical Probabilistic Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Avi Pfeﬀer

2

Probabilistic Relational Learning and Inductive Logic Programming at a Global Scale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . David Poole

4

Research Papers Learning Multi-class Theories in ILP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tarek Abudawood and Peter A. Flach

6

A Numerical Reﬁnement Operator Based on Multi-Instance Learning . . . Erick Alphonse, Tobias Girschick, Fabian Buchwald, and Stefan Kramer

14

Not Far Away from Home: A Relational Distance-Based Approach to Understanding Images of Houses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Laura Antanas, Martijn van Otterlo, Jos´e Oramas M., Tinne Tuytelaars, and Luc De Raedt

22

Approximate Inference for Logic Programs with Annotated Disjunctions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Stefano Bragaglia and Fabrizio Riguzzi

30

Approximate Bayesian Computation for the Parameters of PRISM Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . James Cussens

38

Probabilistic Rule Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Luc De Raedt and Ingo Thon

47

Interactive Discriminative Mining of Chemical Fragments . . . . . . . . . . . . . Nuno A. Fonseca, Max Pereira, V´ıtor Santos Costa, and Rui Camacho

59

MMRF for Proteome Annotation Applied to Human Protein Disease Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Beatriz Garc´ıa-Jim´enez, Agapito Ledezma, and Araceli Sanchis

67

X

Table of Contents

Extending ProbLog with Continuous Distributions . . . . . . . . . . . . . . . . . . . Bernd Gutmann, Manfred Jaeger, and Luc De Raedt

76

Multivariate Prediction for Learning on the Semantic Web . . . . . . . . . . . . Yi Huang, Volker Tresp, Markus Bundschus, Achim Rettinger, and Hans-Peter Kriegel

92

Learning Action Descriptions of Opponent Behaviour in the Robocup 2D Simulation Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alberto Illobre, Jorge Gonzalez, Ramon Otero, and Jose Santos

105

Hypothesizing about Causal Networks with Positive and Negative Eﬀects by Meta-level Abduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Katsumi Inoue, Andrei Doncescu, and Hidetomo Nabeshima

114

BET: An Inductive Logic Programming Workbench . . . . . . . . . . . . . . . . . . Srihari Kalgi, Chirag Gosar, Prasad Gawde, Ganesh Ramakrishnan, Kekin Gada, Chander Iyer, T.V.S. Kiran, and Ashwin Srinivasan Seeing the World through Homomorphism: An Experimental Study on Reducibility of Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ˇ Ondˇrej Kuˇzelka and Filip Zelezn´ y Learning Discriminant Rules as a Minimal Saturation Search . . . . . . . . . . Matthieu Lopez, Lionel Martin, and Christel Vrain Variation of Background Knowledge in an Industrial Application of ILP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Stephen H. Muggleton, Jianzhong Chen, Hiroaki Watanabe, Stuart J. Dunbar, Charles Baxter, Richard Currie, Jos´e Domingo Salazar, Jan Taubert, and Michael J.E. Sternberg Pruning Search Space for Weighted First Order Horn Clause Satisﬁability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Naveen Nair, Anandraj Govindan, Chander Jayaraman, T.V.S. Kiran, and Ganesh Ramakrishnan Multi-relational Pattern Mining Based-on Combination of Properties with Preserving Their Structure in Examples . . . . . . . . . . . . . . . . . . . . . . . . Yusuke Nakano and Nobuhiro Inuzuka

130

138

146

158

171

181

Learning from Noisy Data Using a Non-covering ILP Algorithm. . . . . . . . Andrej Oblak and Ivan Bratko

190

Can HOLL Outperform FOLL? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Niels Pahlavi and Stephen Muggleton

198

Table of Contents

XI

Incremental Learning of Relational Action Models in Noisy Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Christophe Rodrigues, Pierre G´erard, and C´eline Rouveirol

206

When Does It Pay Oﬀ to Use Sophisticated Entailment Engines in ILP? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jos´e Santos and Stephen Muggleton

214

Stochastic Reﬁnement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alireza Tamaddoni-Nezhad and Stephen Muggleton Fire! Firing Inductive Rules from Economic Geography for Fire Risk Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . David Vaz, V´ıtor Santos Costa, and Michel Ferreira Automating the ILP Setup Task: Converting User Advice about Speciﬁc Examples into General Background Knowledge . . . . . . . . . . . . . . . Trevor Walker, Ciaran O’Reilly, Gautam Kunapuli, Sriraam Natarajan, Richard Maclin, David Page, and Jude Shavlik

222

238

253

Speeding Up Planning through Minimal Generalizations of Partially Ordered Plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ˇ ˇ Radom´ır Cernoch and Filip Zelezn´ y

269

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

277

Rule Interchange Format: Logic Programming’s Second Wind? Michael Kifer Department of Computer Science State University of New York at Stony Brook Stony Brook, NY 11794-4400, USA [email protected]

Abstract. Recent years have witnessed a strong upswing in the interest in rule systems technologies—both in their own right and in combination with existing Web standards. In particular, the Semantic Web is now seen as a vast playing ﬁeld for rules within the academia as well as the industry. This renewed interest motivated the development of the Rule Interchange Format (RIF), a recent W3C Web standard for exchanging rules among diﬀerent and dissimilar systems [1–5]. Despite its name, RIF is not merely a format: it is a collection of concrete rule languages, called RIF dialects, and a framework for deﬁning new ones in harmony with each other. This includes formal speciﬁcations of the syntax, semantics, and XML serialization. In this talk we argue that RIF is a major opportunity to re-introduce rule based technologies into the mainstream of knowledge representation and information processing, and to rekindle the interest in logic programming. First, we will introduce the main principles behind RIF and then discuss the application landscape that could emerge if this standard is embraced by the relevant communities: Logic Programming, Semantic Web, and Knowledge Representation. We will also reﬂect on the past of logic programming and speculate on how it could beneﬁt from and contribute to RIF in the future.

References 1. Boley, H., Hallmark, G., Kifer, M., Paschke, A., Polleres, A., Reynolds, D.: RIF Core dialect. Working draft, W3C (July 3, 2009) 2. Boley, H., Kifer, M.: RIF Framework for logic dialects. Working draft, W3C (July 3, 2009) 3. Boley, H., Kifer, M.: RIF basic logic dialect. Working Draft, W3C (July 3, 2009) 4. de Sainte Marie, C., Paschke, A., Hallmark, G.: RIF Production rule dialect (March 2009), http://www.w3.org/2005/rules/wiki/PRD 5. Polleres, A., Boley, H., Kifer, M.: RIF Datatypes and built-ins 1.0 (July 2009), http://www.w3.org/2005/rules/wiki/DTB

P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, p. 1, 2011. © Springer-Verlag Berlin Heidelberg 2011

Practical Probabilistic Programming Avi Pfeffer Charles River Analytics, 625 Mount Auburn Street, Cambridge, MA 02140, USA [email protected]

Abstract. Probabilistic programming promises to make probabilistic modeling easier by making it possible to create models using the power of programming languages, and by applying general-purpose algorithms to reason about models. We present a new probabilistic programming language named Figaro that was designed with practicality and usability in mind. Figaro can represent models naturally that have been difficult to represent in other languages, such as probabilistic relational models and models with undirected relationships with arbitrary constraints. An important feature is that the Figaro language and reasoning algorithms are embedded as a library in Scala. We illustrate the use of Figaro through a case study. Keywords: Probabilistic modeling, representation languages, probabilistic programming.

1 Introduction Probabilistic models are ever growing in richness and diversity. Models may be hierarchical, relational, spatio-temporal, recursive and infinite, among others. Developing the representation, inference, and learning algorithms for new models is a significant task. Probabilistic programming has the potential to make this task much easier by allowing the modeler to represent rich, complex probabilistic models using the full power of programming languages, including data structures, control mechanisms, functions and abstraction. The language provides inference and learning algorithms so the model designer does not need to implement them. Most importantly, a probabilistic programming language (PPL) provides the modeler with the language and tools with which to think of and formulate new models for complex domains. To this point, most of the research on PPLs has focused on improving the power of a language, both in terms of what it can represent and in terms of the algorithms it uses to reason about models written in the language. PPLs today can represent an extremely wide range of models and use increasingly sophisticated algorithms. However, there has been less focus hitherto on usability of the languages. Ultimately, the goal of PPL research is to provide languages that can be used by many people, not just experts in probabilistic programming. We present Figaro, a PPL that is designed to be usable without sacrificing any power. In designing the language for usability, we identified the following four goals: (1) Implement the language as a library that can be used by a wide range of programmers; (2) Naturally represent both directed and undirected models with arbitrary constraints; (3) Naturally represent models with interacting objects; (4) Modular, extensible algorithm specification. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 2–3, 2011. © Springer-Verlag Berlin Heidelberg 2011

Practical Probabilistic Programming

3

An important characteristic of Figaro that distinguishes it from previous probabilistic programming languages is that it is a language not only for representing rich probabilistic models but also for constructing such models. It achieves this property by being embedded in Scala, which is an object-oriented and functional programming language that is interoperable with Java. Figaro inherits the object-oriented and functional nature of Scala. Languages such as IBAL [1] and Church [2] already demonstrated the power of functional probabilistic programming. As a result of its embedding, a Figaro program can be constructed by an arbitrarily complex Scala program. In particular, the Scala program can create data structures that cannot be achieved by an ordinary functional probabilistic program. Thus, the embedding in Scala achieves the first three goals: Figaro is an extensible library that can be used by many programmers; Figaro can represent undirected models with arbitrary constraints, and even directed cyclic models which have been very difficult to represent to this point; and Figaro can naturally capture object-relational models like probabilistic relational models while maintaining their object structure. The fourth goal is also achieved through the embedding in Scala. Figaro programs are Scala data structures that have declarative semantics as probabilistic models that are independent of any specific reasoning algorithm. Therefore, any reasoning algorithm can be written that respects the semantics and applied to the data structures. Figaro provides an extensible class library of such algorithms. We illustrate the use of Figaro through a case study, in which we implemented a system to infer the capabilities and intentions of an adversarial agent. Our system was given a history of past situations involving the agent and its goal was to reason about a new situation. Different situations provide the agent with different objectives and means with which to achieve them, but some objectives and means are shared across situations. In addition, different objectives share the same logical structure with different parameterizations, and the realization of that logical structure in a situation depends on which elements are related in that situation. Figaro was able to capture this rich structure easily, using the language to construct a specific model for each situation while sharing knowledge between situations, and exploiting the sharing of logical structure between objectives while relating each objective to the appropriate related objectives.

References 1. Pfeffer, A.: The Design and Implementation of IBAL: A General-Purpose Probabilistic Language. In: Getoor, L., Taskar, B. (eds.) Statistical Relational Learning. MIT Press, Cambridge (2007) 2. Goodman, N.D., Mansinghka, V.K., Roy, D., Bonawitz, K., Tenenbaum, J.B.: Church: A Language for Generative Models. In: Uncertainty in Artificial Intelligence (UAI) (2008)

Probabilistic Relational Learning and Inductive Logic Programming at a Global Scale David Poole Department of Computer Science, University of British Columbia Vancouver, BC, Canada http://www.cs.ubc.ca/~ poole/

Abstract. Building on advances in statistical-relational AI and the Semantic Web, this talk outlined how to create knowledge, how to evaluate knowledge that has been published, and how to go beyond the sum of human knowledge. If there is some claim of truth, it is reasonable to ask what evidence there is for that claim, and to not believe claims that do not provide evidence. Thus we need to publish data that can provide evidence. Given such data, we can also learn from it. This talk outlines how publishing ontologies, data, and probabilistic hypotheses/theories can let us base beliefs on evidence, and how the resulting world-wide mind can go beyond the aggregation of human knowledge. Much of the world’s data is relational, and we want to make probabilistic predictions in order to make rational decisions. Thus probabilistic relational learning and inductive logic programming need to be a foundation of the semantic web. This talk overviewed the technology behind this vision and the considerable technical and social problem that remain. Keywords: Statistical relational AI, Probabilistic Relational Learning, Semantic Science, Lifted Probabilistic Inference, World-Wide Mind.

To make decisions, we should base them on the best information available; we need to be able to ﬁnd all relevant information and condition on it eﬀectively. We have called the technology to support decisions “semantic science” [7,8], based on the semantic web, which is an endeavor to make all of the world’s knowledge accessible to computers, and using scientiﬁc methodology to make predictions. Figure 1 shows the main components of semantic science. Ontologies are used to deﬁne the vocabulary of data and hypotheses. These are needed to enable us to ﬁnd and use all relevant information. Observational data, which depends on the world and the ontologies, are published. Such data sets can be very heterogenous, at widely varying levels of abstraction and detail. Hypotheses that make probabilistic predictions are also published. Hypotheses are not created in isolation, but depend on some training data. Hypotheses can be judged by their prior plausibility and how well they predict the data. Given a new case, various hypotheses are combined to form models that can be used to make predictions on that case. Given a prediction, users can ask what hypotheses were used to P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 4–5, 2011. c Springer-Verlag Berlin Heidelberg 2011

Probabilistic Relational Learning at a Global Scale

5

make that prediction, and for each hypothesis, users can ﬁnd the relevant data to evaluate the hypothesis. In this way decisions can be based on all of the applicable evidence. Typically data is not just a set of mappings from features into a ﬁxed set of values, as is often assumed by traditional machine learning, but often refers to individuals that are only referred to by name; it is the properties of these individuals and the relationships among these individuals that is important for prediction. Following the publication of what could be argued was the ﬁrst probabilistic relational language [1,2,5], the combiWorld nation of logical and probabilistic reasoning, Ontologies Data and probabilistic programming languages Training [6] has blossomed. There are still many Data Hypotheses/ open fundamental problems for representaTheories New tions, inference and learning. [3] proposed Cases the problem of lifted inference: carrying Models/ Predictions out probabilistic inference reasoning about classes of individuals as a unit, without Fig. 1. Semantic Science reasoning about them individually. Another problem is where models refer to individuals in terms of the roles they ﬁll, but the data does not label the observed individuals with roles [4]. There is still lots of exciting research to be done!

References 1. Poole, D.: Probabilistic Horn abduction and Bayesian networks. Artiﬁcial Intelligence 64(1), 81–129 (1993) 2. Poole, D.: The independent choice logic for modelling multiple agents under uncertainty. Artiﬁcial Intelligence 94, 7–56 (1997); special issue on economic principles of multi-agent systems 3. Poole, D.: First-order probabilistic inference. In: Proc. Eighteenth International Joint Conference on Artiﬁcial Intelligence (IJCAI 2003), Acapulco, Mexico, pp. 985– 991 (2003) 4. Poole, D.: Logical generative models for probabilistic reasoning about existence, roles and identity. In: 22nd AAAI Conference on AI, AAAI 2007 (July 2007) 5. Poole, D.: The independent choice logic and beyond. In: De Raedt, L., Frasconi, P., Kersting, K., Muggleton, S.H. (eds.) Probabilistic Inductive Logic Programming. LNCS (LNAI), vol. 4911, pp. 222–243. Springer, Heidelberg (2008) 6. Poole, D.: Probabilistic programming languages: Independent choices and deterministic systems. In: Dechter, R., Geﬀner, H., Halpern, J. (eds.) Heuristics, Probability and Causality: A Tribute to Judea Pearl, pp. 253–269. College Publications (2010) 7. Poole, D., Smyth, C., Sharma, R.: Semantic science: Ontologies, data and probabilistic theories. In: da Costa, P.C.G., d’Amato, C., Fanizzi, N., Laskey, K.B., Laskey, K.J., Lukasiewicz, T., Nickles, M., Pool, M. (eds.) URSW 2005 - 2007. LNCS (LNAI), vol. 5327, pp. 26–40. Springer, Heidelberg (2008) 8. Poole, D., Smyth, C., Sharma, R.: Ontology design for scientiﬁc theories that make probabilistic predictions. IEEE Intelligent Systems 24(1), 27–36 (2009)

Learning Multi-class Theories in ILP Tarek Abudawood and Peter A. Flach Intelligent Systems Laboratory, University of Bristol, UK [email protected], [email protected]

Abstract. In this paper we investigate the lack of reliability and consistency of those binary rule learners in ILP that employ the one-vs-rest binarisation technique when dealing with multi-class domains. We show that we can learn a simple, consistent and reliable multi-class theory by combining the rules of the multiple one-vs-rest theories into one rule list or set. We experimentally show that our proposed methods produce coherent and accurate rule models from the rules learned by a well known ILP learner Aleph.

1 Introduction Inductive Logic Programming (ILP) is concerned with inducing first-order clausal models from examples and background knowledge. Symbolic rule learning systems in ILP, such as FOIL [1], PROGOL [2] and Aleph [3], learn rules from positive and negative examples. They are known for their ability to learn from complex structured data and build effective classification models in a range of domains. Unfortunately, they struggle in dealing with multi-class problems. In most situations they reduce a multi-class problem into multiple binary problems following the pairwise one-vs-one or one-vs-rest binarisation techniques. Aleph, for example, can learn a multi-class theory in the one-vs-rest paradigm where the outcome of its induction can be seen as a combination of several black-box models. Each model induces rules for one specific (positive) class, and a default rule is added to predict the remaining classes. This one-vs-rest approach is a commonly used machine learning technique due to its simplicity in solving multi-class problems. It has been proven to be powerful when compared to other multi-class approaches [4]. However, we argue in this paper that the one-vs-rest technique is not suitable for first-order rule learners as there is a strong bias toward the negative classes leading to unrealistic estimates of predictive power. In addition, the lack of integrity between the different binary models leads to inconsistent predictions. We investigate the reliability (how much one can rely on the quality of a model) and consistency (how consistent are the predictions of multiple related models) of onevs-rest binary models and illustrate the difference with a proper multi-class model in Sect. 2. In Sect. 3 our goal is to investigate several methods to overcome the problems of the current application of one-vs-rest technique in ILP rule learners. We experimentally demonstrate the performance of our suggested methods in Sect. 4 and compare them with the standard binary method of Aleph. In Sect. 5 we briefly revisit related work before we draw the conclusion in the final section. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 6–13, 2011. c Springer-Verlag Berlin Heidelberg 2011

Learning Multi-class Theories in ILP

7

2 Motivation In machine learning accuracy is commonly used for comparing the classification performance and thus many researchers report their results in terms of accuracy, and compare their results against accuracies of other algorithms. The accuracy of a model can be interpreted as the expectation of correctly classifying a randomly selected example.

Pred. c+ c− c+ T P FN Act. − c FP T N Tot. Eˆ + Eˆ −

c1 c1 T P1 c2 FN2 Act. c3 FN3 ... ... cn FNn Tot. Eˆ i

Tot. E+ E− E

(a)

Pred. c2 c3 FN1 FN1 T P2 FN2 FN3 T P3 ... ... FNn FNn Eˆ 2 Eˆ 3

... ... ... ... ... ... ...

cn FN1 FN2 FN3 ... T Pn Eˆn

Tot. E1 E2 E3 ... En E

(b)

Fig. 1. Contingency tables for a binary model (a) and a multi-class model (b)

Using the notation explained in Fig. 1, we introduce the following definitions. Definition 1 (Recall). The recall of a given class ci , denoted Recalli or Recalli+ , is the proportion of examples of class ci that is correctly classified by a model (Recalli = T Pi /Ei ). The negative recall of class ci , denoted Recalli− , is the proportion of examples of class ci incorrectly classified (Recalli− = 1 − T Pi /Ei ). In case of two classes, positive and negative, we denote the recall of the positive class as Recall + = T P/E + and of the negative class as Recall − = T N/E − . Definition 2 (Accuracy). Given two classes c+ and c− , the binary accuracy of a model is defined as Accuracybin =

TP+TN E+ E− = Recall + + Recall − E E E

That is, binary accuracy is a weighted average of the positive and negative recall, weighted by the class prior. This extends to multiple classes: n

n n T Pi Ei T Pi Ei =∑ = ∑ Recalli+ E E E i i=1 i=1 i=1 E

Accuracy = ∑

For this reason we sometimes refer to accuracy as (weighted) average positive recall. Definition 3 (Multi-Model Accuracy). Given n classes and n one-vs-rest models, one for each class, the multi-model accuracy is defined as the average binary accuracy of the n models: E− 1 n E+ Accuracymm = ∑ ( i Recalli+ + i Recalli− ) n i=1 E E The following simple result is worth noting.

8

T. Abudawood and P.A. Flach

Lemma 1. The accuracy of a single multi-class model is not equivalent to the multimodel accuracy of the one-vs-rest models derived from the multi-class model. Proof. E− 1 n Ei+ ( Recalli+ + i Recalli− ) ∑ n i=1 E E

(1)

=

1 n Ei+ 1 n Ei− + Recall + ∑ E ∑ E Recalli− i n i=1 n i=1

(2)

=

1 1 n E− Accuracy + ∑ i Recalli− n n i=1 E

(3)

Accuracymm =

In going from (2) to (3) we rely on the fact that the one-vs-rest models are derived from a single multi-class model. If this isn’t the case (as in Aleph, for instance), then weighted average positive recall is not the same as accuracy, which compounds the issue. It can be seen from Lemma 1 that the two accuracies are different. Accuracy of a multiclass model relies on the positive recalls weighted by the class priors. On the other hand, the average accuracy of multiple binary models relies on the recalls of both classes where the importance of the positive recalls is decreased n times, hence, there is an increase of the importance of classifying a negative example n times. The following example demonstrates why multi-model accuracy is misleading. Example 1 (A random classifier). Let us consider a 3-class problem comprising 108 examples uniformly distributed among the classes. A random 3-class classifier would result in the uniform contingency table shown in Fig. 2(a). On the other hand, if a random binary classifier is applied to the three one-vs-rest binary problems we obtain the three contingency tables in Figs. 2(b)-2(d). The accuracy of the multi-class model is 0.33, while the multi-model accuracy of the binary models is 0.50. Pred. c1 c2 c3 c1 12 12 12 Act. c2 12 12 12 c3 12 12 12 Tot. 36 36 36

(a)

Tot. 36 36 36 108

Pred. c1 c2,3 c1 18 18 Act. c2,3 36 36 Tot. 54 54

(b)

Tot. 36 72 108

Pred. c2 c1,3 c2 18 18 Act. c1,3 36 36 Tot. 54 54

(c)

Tot. 36 72 108

Pred. c3 c1,2 c3 18 18 Act. c1,2 36 36 Tot. 54 54

Tot. 36 72 108

(d)

Fig. 2. Four contingency tables on a three-class problem showing the predictions of a random multi-class classifier (a) and three random one-vs-rest classifiers (b)-(d)

It is clear that the average accuracy of the binary models is 1.5 times more than the accuracy of the multi-class model because the weight of the negative class is twice the weight of the positive class. When having a proper multi-class model, there are only credits for classifying examples correctly. Averaging the positive and negative recalls for multiple one-vs-one theories could be misleading but it is even more harmful when it comes to one-vs-rest theories as the problem is propagated.

Learning Multi-class Theories in ILP

9

Another problem arising when inducing multiple independent binary theories is the lack of integrity between the predictions of the different binary theories. This may cause an example to have different possible predictions in several contingency tables because each model produces predictions independently of the others. The predictions of the models on each example should be consistent. For instance, by considering n one-vsrest models where each model is trained to predict one class as positive, then the prediction for an example x on the i-th model should be be consistent with its prediction on the j-th model, cˆi (x) = +ve and cˆj (x) = −ve ∀ j = i, where cˆj (x) and cˆj (x) express the prediction of the i-th and the jth binary model respectively for example x. If the predictions are inconsistent then such conflicts need to be solved to ensure the consistency in the predictions for each example in all models. All one-vs-rest models of support vector machines and naive Bayes [5] resolve these collisions by obtaining n scores from each one of the n models and the model with the maximum score wins the prediction [4]. A rule learner such as CN2 [6] learns ordered rule lists in one of its settings to avoid such conflicts. In pairwise techniques voting methods [7, 8, 9, 10] can be considered to integrate the predictions. The discussion about unreliability and inconsistency holds generally when applying one-vs-rest technique in any learning system but we would like to emphasise the importance of this issue particularly in ILP binary rule learning systems such as Aleph. This is because we only induce rules for the positive class in each one-vs-rest model while a default rule that always predicts the negative class is added in case an example can not be classified by any induced rule. The default rules give credits for not classifying negative examples which makes it easy to obtain high negative recalls without inducing any rules for the negatives. For instance, one could obtain 0.67 multi-model accuracy with three empty theories1 on the problem of Example 1. Hence, there is a need to integrate the different binary models of such rule learning systems in order to ensure the reliability and consistency of their predictions.

3 Improved Learning of Multi-class Theories In this section we investigate how one could improve the reliability of the all one-vsrest theories in ILP by combining their binary models into a single rule listor rule set model. Our approach is different from the other first-order rule learning approaches in various respects. First, it does not treat the n various models as independent black-box models, but instead combines the rules of all the models into a single model. Secondly, there is only one default rule and the class of the default rule is determined probabilistically according to the distribution of the uncovered training examples of all the classes. Finally, a single prediction is obtained for each example in one multi-class contingency table. Despite the simplicity of our approaches, their predictions are reliable, consistent and accurate, as we will show in our experiments. In any rule list model, the rules are ordered in the final theory according to a certain criterion. When an unseen example is encountered, the rules are tried one by one in the order of the list and the first rule that fires determines the class of the example. So the 1

An empty theory is a theory where a binary rule learner fails to induce any rule for the positive examples.

10

T. Abudawood and P.A. Flach

key idea is how to order these rules. One needs to evaluate the rules induced by the n models and assign them scores. We adopt Chi2 as our multi-class evaluation measure for the rules and used it to build a Multi-class Rule List (MRL) model. Definition 4 (Chi-Squared [11]). The Chi-squared score of a rule r j of the i-th class is i] defined as Chi2 (r j ) = ∑ni=1 [eeEi E−eE where e is the number of examples covered by r j , i (E−e) ei the number of examples correctly classified by r j , Ei is the total number of examples of the i-th class, and E is the total number of examples. 2

MRL In this method, after learning rules for all classes, the rules are re-ordered on decreasing Chi2 . The ties are broken randomly. If a rule is added to the rule list, then all examples it covers are removed from the training set and the rest of the rules are re-evaluated based on the remaining examples until no further rule is left. At the end, a single default rule is assigned predicting the majority class of the uncovered examples. In a rule set model, the rules are unordered and the class of a new example is determined based on the training statistics of all rules that fire for that particular example. For instance, the CN2 rule learner [6] learns a rule set model and tags the rules with their coverage over all the classes. If a new example is to be classified, CN2 sums up the coverage of all rules that fire over each class and the class with the highest coverage wins. We propose two methods to handle multi-class rule set theories, the Multi-class Rule Set Intersection (MRSI) method and the Multi-class Rule Set Union (MRSU) method. The descriptions of the two methods are discussed below. MRSI In MRSI every rule from the multiple one-vs-rest models is evaluated over the entire training set once, and the identifiers of the examples they cover are stored. A default rule is formed based on the majority class of the uncovered training examples. If a new example is to be classified, all the rules are tried. For those rules that fire, we determine the intersection of their training set coverage using the example identifiers, and their class distribution gives us the empirical probability of each class. The class with the maximum probability is predicted for the example. Again the ties are broken randomly. In the case of an empty intersection, the majority class is assigned to the example. MRSU The MRSU method differs from the MRSI method in that it determines the class of a new example based on the union of the training coverage of all rules that cover the new example, instead of the intersection. The MRSU method is closer in spirit to the CN2 method, which adds up the coverage of all rules that fire. However, by using example identifiers we avoid double-counting of examples that are covered by several rules, which means that we obtain proper empirical probabilities rather than CN2’s estimates.

4 Empirical Evaluation In this section we evaluate and compare our proposed single multi-class theory learning methods (MRL, MRSU and MRSI) over 6 multi-class data sets and 5 binary data sets

Learning Multi-class Theories in ILP

11

Table 1. Data sets used in the experiments. The group to the left are multi-class data sets while the group to the right are binary data sets. Starred data sets are propositional; the rest is relational. Data set no. 1 2 3 4 5 6

Name Car* Diterpene Ecoli* English Protein Scale*

Class dist. 1210, 384, 69, 65 447, 355, 352, 155, 71 143, 77, 52 50, 50, 50 116, 115, 77, 73 288, 288, 49

Data set no. 7 8 9 10 11

Class. dist Mutagenesis Amine (Alzheimer) Choline (Alzheimer) Scopolamine (Alzheimer) Toxic (Alzheimer)

125, 63 1026, 343 1026, 343 1026, 343 1026, 343

(Table 1). We use Aleph as our base-learner, learning rules for each class in turn. We then turn the rules learned by Aleph into coherent multi-class models using the techniques proposed in this paper. We compare against the CN2 rule set method described above. For each data set, cross-validated accuracies (Table 2) and AUCs (Table 3) were recorded. MRL method does not produce class probabilities and hence produces a single point in a ROC plot: in this case, AUC boils down to the (unweighted) average of true positive and true negative rates. MRSU, MRSI and CN2 produce class probabilities and hence AUC evaluates their ranking performance in the usual way. A multi-class AUC is obtained by averaging each one-vs-rest AUC weighted by the class prior. Since averaging performance across data sets has limited meaning as the values may not be commensurate, we report the ranks (1 is best, 4 is worst) of the accuracies and AUCs on each data set. We use the Friedman significance test on these ranks at p = 0.05 with Bonferroni-Dunn post-hoc test on our three proposed methods. In the Friedman test we record wins and losses in the form of ranks and ignore the magnitude of these wins and losses. The use of the Friedman test to evaluate multiple classifiers on multiple data sets is considered to be more appropriate than the conventional tests, see [12] for further details. By looking at the average performance rank, and calculating the posthoc test and Critical Difference (CD = 1.78/2) with CN2 as control, on the multi-class data sets, MRSI is significantly better than CN2 on both accuracy and AUC, while MRSU performs significantly worse on AUC. If we take a look at the binary data sets (CD = 1.95/2) we can see that both MRL and MRSI are significantly superior over CN2 w.r.t. AUC while no statistical significance is reported regarding their accuracies. The conclusion seems warranted that MRSI is preferable for multi-class data sets, while MRL is preferable for binary data sets.

5 Related Work As discussed earlier, many ILP rule learning systems including Aleph, PROGOL and FOIL can only induce binary theories and multi-class theories are obtained by converting a multi-class problem into several binary problems. The rules of the final model are, in practice, a combination of independent multiple binary theories. Inductive Logic Constraint (ICL) [13] upgraded the propositional CN2 to handle multi-class first-order theories. Our CN2 implementation is similar to ICL (learning from and handling multiclass structural domains) but was built over Aleph. The experiments demonstrate that we can improve over the CN2 probability estimation method.

12

T. Abudawood and P.A. Flach

Table 2. Accuracies of our new multi-class methods (MRL, MRSU and MRSI) compared against CN2 accuracy, with average ranks in brackets. The 6th column shows the multi-model accuracy as reported by Aleph, which is particularly optimistic for multi-class problems due to overemphasising the default rules. The right-most column shows the average positive recall, which ignores the default rules but is still not equal to multi-class accuracy as conflicting predictions are not taken into account. MRL 1 2 3 4 5 6 Average 7 8 9 10 11 Average

81.43 (2.00) 83.70 (2.00) 90.43 (1.00) 60.67 (3.00) 80.48 (3.00) 80.64 (2.00) 79.56 (2.17) 77.06 (2.00) 60.18 (4.00) 78.24 (1.00) 76.56 (2.00) 74.95 (3.00) 73.40 (2.40)

MRSU MRSI Multi-class accuracy 81.32 (4.00) 83.98 (1.00) 83.55 (3.50) 84.86 (1.00) 86.77 (4.00) 89.75 (2.00) 58.00 (4.00) 64.00 (1.00) 80.69 (2.00) 79.70 (4.00) 72.51 (4.00) 83.68 (1.00) 77.14 (3.58) 80.99 (1.67) 77.06 (2.00) 76.55 (4.00) 60.91 (3.00) 65.38 (1.00) 76.07 (3.00) 77.14 (2.00) 76.56 (2.00) 76.48 (4.00) 75.02 (2.00) 74.59 (4.00) 73.12 (2.40) 74.03 (3.00)

CN2 81.38 (3.00) 83.55 (3.50) 88.92 (3.00) 62.67 (2.00) 80.94 (1.00) 76.20 (3.00) 78.94 (2.58) 77.06 (2.00) 60.98 (2.00) 75.55 (4.00) 76.56 (2.00) 75.09 (1.00) 73.05 (2.20)

Aleph Standard Multi-model accuracy Average recall 86.90 82.18 91.52 82.91 90.27 86.46 72.44 48.00 89.91 70.82 79.04 71.20 85.01 73.59 73.97 73.97 77.06 77.06 60.11 60.18 76.56 76.56 74.80 74.80 72.50 72.51

Table 3. Average one-vs-rest AUCs of our multi-class methods (MRL, MRSU and MRSI) compared against CN2, with average ranks in brackets. The AUCs reported for Aleph are for reference only, as these arise from over-emphasising the default rules. 1 2 3 4 5 6 Average 7 8 9 10 11 Average

MRL 83.03 (1.00) 88.72 (4.00) 91.97 (3.00) 70.50 (4.00) 87.28 (2.00) 82.05 (1.00) 83.92 (2.50) 64.03 (1.00) 60.77 (1.00) 74.48 (1.00) 55.07 (1.00) 65.46 (1.00) 63.96 (1.00)

MRSU 75.21 (3.00) 89.65 (1.00) 92.63 (2.00) 72.67 (2.00) 86.62 (4.00) 74.03 (3.00) 81.80 (2.50) 57.19 (4.00) 51.70 (3.00) 63.91 (3.00) 52.70 (3.50) 56.15 (3.00) 56.33 (3.30)

MRSI 73.92 (4.00) 88.90 (3.00) 93.38 (1.00) 74.15 (1.00) 89.03 (1.00) 81.41 (2.00) 83.46 (2.00) 57.28 (2.00) 57.10 (2.00) 72.38 (2.00) 52.70 (2.00) 57.06 (2.00) 59.30 (2.00)

CN2 Aleph Standard 75.39 (2.00) 82.80 89.58 (2.00) 88.66 91.43 (4.00) 86.78 72.60 (3.00) 66.33 86.63 (3.00) 83.29 73.27 (4.00) 76.38 81.48 (3.00) 80.71 57.19 (3.00) 63.93 51.39 (4.00) 64.03 60.93 (4.00) 60.90 52.70 (3.50) 55.07 55.53 (4.00) 64.71 55.55 (3.70) 61.73

While most of the ILP systems implement the covering approach (separate-andconquer), TILDE [14] implements a divide-and-conquer approach and induces a single first-order logic multi-class theory that take a form of decision tree. Tree models handle multiple classes naturally. We plan an experimental comparison with TILDE in future work. Several papers suggested different approaches of dealing with multiple binary models [4, 15, 7, 8, 9, 10, 5]. A comparison of many such approaches were made in [4] suggesting a superiority of the one-vs-rest approach in general but they also pointed out that the choice of the binarisation technique makes little difference once we learn good binary models.

6 Concluding Remarks In this paper we investigated the lack of reliability and consistency of the one-vs-rest technique on multi-class domains. We showed that we could learn a simple and single

Learning Multi-class Theories in ILP

13

multi-class rule list (MRLmethod) or rule set (MRSU and MRSI methods) model by combining the rules of all one-vs-rest models and turn them into a coherent multi-class classifier. Our proposed methods generate consistent and reliable multi-class predictions and we experimentally showed that they produce significant results, w.r.t. accuracy and AUC, on both multi-class and binary domains when compared against the CN2 method. When classification is made based on rule intersection, MRSI, the best accuracies and AUCs were achieved taking the multi-class data sets into account. Multi-class rule list, MRL, method seem to be suitable for two-class problems. The origin of this difference is subject of ongoing investigations.

References 1. Quinlan, J.R., Cameron-Jones, R.M.: FOIL: A Midterm Report. In: Proc. European Conf. on Machine Learning, pp. 3–20. Springer, Heidelberg (1993) 2. Muggleton, S.: Inverse Entailment and Progol. In: Proc. 6th International Workshop on Inductive Logic Programming, vol. 13, pp. 245–286. Springer, Heidelberg (1995) 3. Srinivasan, A.: The Aleph Manual. Technical report, University of Oxford (2001) 4. Rifkin, R., Klautau, A.: In Defense of One-Vs-All Classification. Machine Learning Research 5, 101–141 (2004) 5. Zadrozny, B., Elkan, C.: Transforming Classifier Scores Into Accurate Multiclass Probability Estimates. In: Proc. 8th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 694–699. ACM, New York (2002) 6. Clark, P., Niblett, T.: The CN2 Induction Algorithm. Machine Learning 3, 261–283 (1989) 7. Friedman, J.H.: Another approach to polychotomous classification. Technical report, Stanford University, Department of Statistics (1996) 8. Platt, J.C., Cristianini, N.: Large Margin DAGs for Multiclass Classification. In: Advances in Neural Information Processing Systems, vol. 12. MIT Press, Cambridge (2000) 9. Kijsirikul, B., Ussivakul, N., Meknavin, S.: Adaptive Directed Acyclic Graphs for Multiclass Classification. In: Ishizuka, M., Sattar, A. (eds.) PRICAI 2002. LNCS (LNAI), vol. 2417, pp. 158–168. Springer, Heidelberg (2002) 10. Dietterich, T.G., Bakiri, G.: Solving Multiclass Learning Problems via Error-Correcting Output Codes. Artificial Intelligence Research 2, 263–286 (1995) 11. Abudawood, T., Flach, P.: Evaluation Measures for Multi-class Subgroup Discovery. In: Buntine, W., Grobelnik, M., Mladeni´c, D., Shawe-Taylor, J. (eds.) ECML PKDD 2009. LNCS, vol. 5781, pp. 35–50. Springer, Heidelberg (2009) 12. Demˇsar, J.: Statistical Comparisons of Classifiers Over Multiple Data Sets. Machine Learning Research 7, 1–30 (2006) 13. De Raedt, L., Van Laer, W.: Inductive Constraint Logic. In: Zeugmann, T., Shinohara, T., Jantke, K.P. (eds.) ALT 1995. LNCS, vol. 997, pp. 80–94. Springer, Heidelberg (1995) 14. Blockeel, H., De Raedt, L.: Top-down Induction of Logical Decision Trees. Artificial Intelligence 101, 285–297 (1997) 15. Hsu, C.-W., Lin, C.-J.: A Comparison of Methods for Multiclass Support Vector Machines. Neural Networks 13, 415–425 (2002) 16. Fawcett, T.: An Introduction to ROC Analysis. Pattern Recognition Letters 27(8), 861–874 (2006)

A Numerical Refinement Operator Based on Multi-Instance Learning Erick Alphonse1 , Tobias Girschick2 , Fabian Buchwald2 , and Stefan Kramer2 1

Laboratoire d’Informatique de l’universit´e Paris-Nord, 99, Av. Jean-Baptiste Cl´ement, 93430 Villetaneuse, France 2 Technische Universit¨ at M¨ unchen, Institut f¨ ur Informatik I12, Boltzmannstr. 3, 85748 Garching b. M¨ unchen, Germany

Abstract. We present a numerical reﬁnement operator based on multiinstance learning. In the approach, the task of handling numerical variables in a clause is delegated to statistical multi-instance learning schemes. To each clause, there is an associated multi-instance classiﬁcation model with the numerical variables of the clause as input. Clauses are built in a greedy manner, where each reﬁnement adds new numerical variables which are used additionally to the numerical variables already known to the multi-instance model. In our experiments, we tested this approach with multi-instance learners available in the Weka workbench (like MISVMs). These clauses are used in a boosting approach that can take advantage of the margin information, going beyond standard covering procedures or the discrete boosting of rules, like in SLIPPER. The approach is evaluated on the problem of hexose binding site prediction, a pharmacological application and mutagenicity prediction. In two of the three applications, the task is to ﬁnd conﬁgurations of points with certain properties in 3D space that characterize either a binding site or drug activity: the logical part of the clause constitutes the points with their properties, whereas the multi-instance model constrains the distances among the points. In summary, the new numerical reﬁnement operator is interesting both theoretically as a new synthesis of logical and statistical learning and practically as a new method for characterizing binding sites and pharmacophores in biochemical applications.

1

Introduction and Background

It has often been acknowledged that numerical learning in ILP is limited because of the choice of logic programming as representation language [1,2]. Function symbols are not interpreted in logic programming, they simply are seen as functors of Herbrand terms. For instance, the + function symbol being not interpreted, both terms of the following equation cannot be uniﬁed and the equation X +Y = 0 cannot be solved. To solve this problem, the hypothesis representation language has been extended by a Constraint Programming Language (CLP) [3]. A large number of CLP languages have been proposed, some with complete and eﬃcient solvers. In ILP, the interpreted predicate symbols are often the same as P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 14–21, 2011. c Springer-Verlag Berlin Heidelberg 2011

A Numerical Reﬁnement Operator Based on Multi-Instance Learning

15

the ones used in attribute-value learning, like =, ≤, ≥, ∈, but also linear, nonlinear, arithmetic or trigonometric functions have been used [4]. The large family of systems able to learn constraints are all based on the technique introduced in the classical INDUCE system [5] and later popularised and developed in the system REMO [6] and other systems [7,3,1,4,2,8]. This technique separates learning the logical part of the hypothesis from learning its constraint part (usually nominal and numerical constraint variables). If we refer to the covering test deﬁnition, for the positive examples, at least one of the possible matching substitutions between the logical part of the hypothesis and the logical part of the positive example must satisfy the constraint part. Conversely, for the negative examples, for all possible substitutions, none must satisfy the constraint part. The key idea is to ﬁrst compute the set of substitutions matching the hypothesis’ logical part with the learning examples, and then from the induced tabular representation, where constraint variables are attributes, learn the constraint part of the hypothesis. Zucker and Ganascia note that such a tabular representation is a multi-instance representation in the general case (the constraints are satisﬁed by at least one matching substitution to a positive example, and none to a negative example), and that multi-instance learners have to be used to learn the hypothesis’ constraint part. The diﬀerent approaches can be compared with respect to the way they deﬁne the hypothesis’ logical part and when they delegate learning to an attribute-value or a multi-instance learner. INDUCE completely separates the two processes and ﬁrst searches for a good logical part (following an lgg-based approach), which is then specialized by constraints. A subsequent approach [6] sets the single logical part beforehand, either user-speciﬁed or built from the examples. Model selection can then be used to reﬁne increasingly complex hypotheses. Anthony and Frisch [1] limit the constraint part, only allowing a constraint variable to appear in the clause’s head, such that they only deal with a single matching substitution, limiting the interest of delegating numerical learning to attribute-value learners. Other systems [7,4] do not limit the logical part, but also do not use the link between θ-subsumption and multi-instance problems and thus treat all matchings to a positive clausal example as a positive attribute-value example. Recently, Srinivasan et al. [8] independently proposed the same approach as Zucker et al. [6], where the logical part is restricted to one user-deﬁned clause. Finally, an interesting approach, although not too closely related, is MIR-SAYU [9], which learns drug activity from a multi-instance representation of the drugs. The multi-instance representation does not arise from multiple matchings like in INDUCE, but from the multiple conformations that a drug can take in 3D-space: The authors use a rule-based propositionalisation approach to solve the learning problem and obtain a multiinstance representation by applying it to each conformation. In this paper, we present an approach that does not limit the logical part of a hypothesis: we search in the hypothesis space for a good logical part which, when introducing constraint variables (presently limited to numerical ones), delegates constraint learning to a multi-instance learner. This is diﬀerent from the classical INDUCE system and more recent approaches, given that intertwining logical

16

E. Alphonse et al.

and constraint learning should be able to improve search. This also introduces some interesting properties that can be leveraged by a boosting approach (to be explained below). In the following, we present the technical details of the approach.

2

Method

Before we can describe the method in detail, we have to introduce some notation. Let S = {(x1 , y1 ), . . . , (xn , yn )} denote a training set of classiﬁed examples. Each example is described by a set of tuples from several relations over nominal and continuous variables, denoted by xi , and assigned to a class yi . We restrict ourselves to binary classiﬁcation problems in this paper (yi ∈ {+1, −1}). The size of the training set is denoted by |S| = n. We follow standard multi-instance terminology and make a distinction between examples and instances: an example is deﬁned as a bag of instances (to be deﬁned later). As we follow a boosting approach for the outer loop of the algorithm (see below), we have a weight wi associated with each example, which is initialized to n1 . In the following we will deal with negation-free program clauses. Given a set of clauses, we let t denote the index of the t-th clause Ct . Clauses are learned one after the other, using a generalisation of boosting to real-valued weak hypotheses [10]. The weak learner builds a clause Ct as a hypothesis, where t denotes both the index of the clause and the index of the boosting iteration. The boosting procedure constitutes the outer loop of the algorithm (for details we have to refer to the original publication [10]), whereas the construction of clauses constitutes the inner loop. Due to the size of the search space, clauses are built in a greedy manner, with one reﬁnement after the other. A reﬁnement consists of the addition of one or several literals to the body of a clause according to the modes of a language bias declaration. The reﬁnement operator providing all specializations of a clause is denoted by ρ(C). In the following, our starting point is a clause C, which is to be reﬁned in a subsequent step: C = class(X, Y ) : − p1 (X, X1,1 , . . . , X1,n1 ), ..., pk (X, Xk,1 , . . . , Xk,nk ). Upper-case characters X and Y denote, similar to the deﬁnition of the training set S above, the identiﬁer of a clausal example (X) and its class Y (either −1 or +1). Given such a clause, its constraint variables can be obtained by a function vars(C) = {X1,1 , . . . , X1,n1 , . . . , Xk,1 , . . . , Xk,nk }. Additionally, we have functions varsn (C) picking the nominal variables of a clause and varsc (C) picking the continuous variables (vars(C) = varsn (C) ∪ varsc (C)).

A Numerical Reﬁnement Operator Based on Multi-Instance Learning

17

For simplicity and without loss of generality, we assume that exactly one literal is added to clause C in the course of a reﬁnement C ∈ ρ(C): C = class(X, Y ) : − p1 (X, X1,1 , . . . , X1,n1 ), ..., pk (X, Xk,1 , . . . , Xk,nk ), pk+1 (X, Xk+1,1 , . . . , Xk+1,nk+1 ) We also make the assumption that at least one additional continuous variable is available after a reﬁnement. In other words, for each C ∈ ρ(C) we assume there exists an Xk+1,l ∈ varsc (C ). It is clear that due to multiplicities (1 : n and m : n relationships between the head variable X and the body variables) multi-instance problems over the body variables arise. As our goal is to improve the capability of ILP learning systems to handle continuous variables, we let the multi-instance problems range only over those variables of a clause. The structure of a clause and the remaining variables only serve to give us the deﬁnition of a multi-instance problem. To be more precise, we obtain a dataset for multi-instance learning from ﬁrst materializing the relation from the body (ranging over all variables vars(C)) and subsequently projecting it onto the variables {X} ∪ varsc (C). Proceeding in this way, the question is (a) how to guide the search for suitable clauses and (b) how to decide when to stop reﬁning a clause. For the former question, we decided to use the margin of the classiﬁer (in the sense of boosting). Consider the output of the clause together with the multiinstance classiﬁer is given by a function h(.), which tells us not only the class of the prediction (its sign), but also its conﬁdence. Then the mean margin of h(.) can be deﬁned as n

μ ¯h =

1 yi h(xi ) n i=1

(1)

As to decide when to stop reﬁning a clause, we need a criterion that acts as a regularisation parameter for the multi-instance learner. A natural choice is to limit the number of attributes in the datasets that are passed to it. It translates to limiting the number of constraint variables that can be introduced in the logical part, also regularising its complexity. For the outer loop generating one clause including a multi-instance classiﬁer after the other, we employ a generalization of AdaBoost to real-valued weak hypotheses [10]. For each example covered by a clause Ct , the function ht (.) (deﬁned in terms of the clause itself plus its multi-instance classiﬁer ft (.)) will provide a diﬀerent prediction. For the examples not covered by the clause, the weak hypothesis abstains on them and outputs a prediction of 0. In that sense, this is more general than SLIPPER’s rules [11], which either abstain or predict the positive class. The boosting algorithm will focus on those examples in the later stages, forcing the weak learner to search for good logical structures that can discriminate between them:

18

E. Alphonse et al.

h∗t = max |ht (xi )| μt =

1≤i≤n n

1 h∗t

wt,i yi ht (xi ) ∈ [−1, +1]

(2) (3)

i=1

1 − μt yi ht (xi )/h∗t ) 1 − μ2t 1 1 + μt αt = ∗ ln 2ht 1 − μt

wt+1,i ← wt,i × (

(4) (5)

Overall, the model that is learned is a sequence of clauses Ct along with associated multi-instance models ft . Both Ct and ft give ht , the weak classiﬁers that are boosted in the outer loop of the algorithm. Additionally, we have the weights originating from the boosting iterations: ((h1 , α1 ), . . . , (hT , αT )) = (((C1 , f1 ), α1 ), . . . , ((CT , fT ), αT )). In the following we call the described method NuRMI (Numerical Reﬁnement operator based on Multi-Instance learning).

3

Experiments

In this section we give an overview of the datasets we used in this study, describe the experimental setup for our method and the two tested baseline methods. Finally, we compare the results. 3.1

Datasets

First, we describe the datasets that we used in our experimental evaluation of the methods.1 Hexose Binding Site Dataset. This dataset was compiled by Nassif et al. [12]. It is composed of 80 protein-hexose binding sites (positive set/class) and an equal number of non-hexose binding sites and non-binding surface grooves (negative set/class) selected/extracted from Protein Data Bank [13]. For each molecule ◦we have the 3D coordinates of all atoms that have a distance of less than 10 A from the binding site center. Additionally, for each atom its charge, hydrogen bonding and hydrophobic properties are provided. Mutagenicity Dataset. We run our experiments on the (by now classical) regression-friendly mutagenicity dataset introduced by Srinivasan et al. [14]. It consists of 188 aromatic and heteroaromatic nitrocompounds with a discretized mutagenicity endpoint (positive or negative log mutagenicity). In our experiments, we use B2 background knowledge which focuses on numerical learning on the partial charges. 1

We would like to thank David Page for providing the ﬁrst and third dataset of our study.

A Numerical Reﬁnement Operator Based on Multi-Instance Learning

19

Dopamine Agonists Dataset. The dopamine agonists dataset is also provided by Davis et al. [15]. It is composed of 23 dopamine agonists with 5 to 50 conformations for each molecule. The discretized activity levels of the dopamine agonists represent the classes. Finally, we have 18 positively labeled instances and 5 negatives. Available features are hydrogen acceptors/donors, hydrophobes and basic nitrogen groups. 3.2

Experimental Setup

As a ﬁrst comparison, we chose the Aleph (http://www.comlab.ox.ac.uk/ oucl/research/areas/machlearn/Aleph/) system and the relational decision tree induction algorithm Tilde from the ACE Data Mining System (http://www. cs.kuleuven.ac.be/~dtai/ACE/). Both algorithms serve as a baseline for our newly developed algorithm NuRMI. It should be pointed out that neither Aleph nor Tilde was particularly optimized on those datasets. On the other hand, we also did not make any eﬀort to optimize the NuRMI parameters. Therefore, the compared systems should be considered to be at approximately the same level of optimization. The results for the dopamine dataset are obtained using leave-one-out crossvalidation, those for the hexose binding experiments and mutagenicity with tenfold cross-validation. For the Aleph results on dopamine, we used the parameter settings from Davis et al. [15]. The clause length is set to 100, the minimum accuracy of a clause is set to 80 %, and the minimum number of positives examples that a clause must cover is set to ﬁve. For results on the hexose binding problem, the parameter settings from the reference paper by Nassif et al. [12] were used. The maximal clause length is set to eight literals, with only one in the head. The coverage of maximal ﬁve negative training examples is accepted with the objective to cover with a rule as many positive examples as possible and to avoid covering negative examples. Aleph’s heuristic search is used to speed up the calculations. In Tilde, we used gain ratio as evaluation function for candidate tests. The remaining parameters are Tilde’s default parameters. 3.3

Experimental Results

To investigate the performance of our algorithm compared to the reference classiﬁers Aleph and Tilde, we tested them on the above datasets. The predictive accuracies estimated by cross-validation are given in Table 1. JRip, MiSVM and MiSMO are abbreviations of multi-instance learning algorithms implemented in the Weka workbench [16] that were plugged into NuRMI. The results show that on two of the three datasets NuRMI performs favorably. On the dopamine dataset, we observe that both Aleph and Tilde perform worse than a random-guessing classiﬁer. In contrast, NuRMI outperforms the baseline classiﬁers and apparently is the best choice on this dataset with a predictive accuracy of 82.61%. This suggests that the coverage measure used by Aleph and the gain ratio splitting criterion used by Tilde to choose tests ﬁnally

20

E. Alphonse et al.

Table 1. Comparison of NuRMI prediction accuracy (%) with Aleph and Tilde. The result of Progol (*) on the mutagenicity dataset is taken from Srinivasan et al. [14]. NuRMI results are given for one, three and ﬁve rounds of boosting. Program NuRMI JRip 1 NuRMI JRip 3 NuRMI JRip 5 NuRMI MiSVM NuRMI MiSVM NuRMI MiSVM NuRMI MiSMO NuRMI MiSMO NuRMI MiSMO Aleph Tilde Progol

1 3 5 1 3 5

dopamine 78.26 78.26 82.61 65.22 73.91 73.91 78.26 78.26 78.26 48.00 61.29 -

hexose mutagenicity 53.75 80.34 51.25 81.39 51.88 81.46 58.75 66.47 60.63 66.47 61.25 66.47 76.13 81.92 81.82 67.50 65.00 79.00 79.79*

do not result in rules which are able to generalize suﬃciently well on this dataset. On the mutagenicity dataset, only the JRip and MiSMO but not the MiSVM NuRMI approach are able to improve upon the 79.79% reported for Progol. On the hexose binding site data, all three classiﬁers are above the random guessing baseline of 50%. We observe that NuRMI, a combination of a coverage-based and a marginbased method, is the most accurate on two of the three datasets tested. However, this experimental comparison has to be extended to shed more light on the relative advantages and disadvantages and also on the trade-oﬀs involved.

4

Conclusion

We presented a novel approach to handling numerical reﬁnements based on multi-instance learning (NuRMI). It aims to combine the strengths of Inductive Logic Programming (interpretability) and statistical learning (predictive power). NuRMI generates clauses in a style typical for ILP systems, and evaluates them based on multi-instance classiﬁers constructed on the numerical variables of a clause. The conﬁdence of the predictions of multi-instance classiﬁers also guides search and thus drives the reﬁnement steps. In experiments, we have tested the usefulness of NuRMI for biochemical applications, in particular the characterization of binding sites and pharmacophores, and toxicity prediction (including numerical node labels in graph-like representations of molecules). Although the system still has a lot of unused ﬂexibility, e.g., in the choice of (multi-instance) base learners, our preliminary results already hint at the usefulness in the envisaged application domains.

A Numerical Reﬁnement Operator Based on Multi-Instance Learning

21

References 1. Anthony, S., Frisch, A.M.: Generating numerical literals during reﬁnement. In: Lavraˇc, N., Dˇzeroski, S. (eds.) ILP 1997. LNCS, vol. 1297, pp. 61–76. Springer, Heidelberg (1997) 2. Botta, M., Piola, R.: Reﬁning numerical constants in ﬁrst order logic theories. Machine Learning 38(1/2), 109–131 (2000) 3. Sebag, M., Rouveirol, C.: Constraint inductive logic programming. In: Advances In Inductive Logic Programming, pp. 277–294 (1996) 4. Srinivasan, A., Camacho, R.: Numerical reasoning with an ILP system capable of lazy evaluation and customised search. Journal of Logic Programming 40(2-3), 185–213 (1999) 5. Dietterich, T.G., Michalski, R.S.: A comparative review of selected methods for learning from examples. In: Michalski, R.S., Carbonell, J.G., Mitchell, T.M. (eds.) Machine Learning, an Artiﬁcial Intelligence Approach, vol. 1, pp. 41–81 (1983) 6. Zucker, J.-D., Ganascia, J.-G.: Selective reformulation of examples in concept learning. In: Proc. of ICML 1994, pp. 352–360 (1994) 7. Fensel, D., Zickwolﬀ, M., Wiese, M.: Are substitutions the better examples? Learning complete sets of clauses with Frog. In: Proc. of ILP 1995, pp. 453–474 (1995) 8. Srinivasan, A., Page, D., Camacho, R., King, R.D.: Quantitative pharmacophore models with inductive logic programming. Machine Learning 64(1-3), 65–90 (2006) 9. Davis, J., Costa, V.S., Ray, S., Page, D.: An integrated approach to feature invention and model construction for drug activity prediction. In: Proc. of ICML 2007 (2007) 10. Nock, R., Nielsen, F.: A real generalization of discrete adaboost. In: Brewka, G., Coradeschi, S., Perini, A., Traverso, P. (eds.) Proc. of ECAI 2006, vol. 141 (2006) 11. Cohen, W.W., Singer, Y.: A simple, fast, and eﬀective rule learner. In: Proc. of AAAI 1999, pp. 335–342 (1999) 12. Nassif, H., Hassan, A., Sawsan, K., Keirouz, W., Page, D.: An ILP Approach to Model and Classify Hexose Binding Sites. In: Proc. of ILP 2009, vol. 78 (2009) 13. Berman, H.M., Westbrook, J., Feng, Z., Gilliland, G., Bhat, T.N., Weissig, H., Shindyalov, I.N., Bourne, P.E.: The Protein Data Bank. Nucleic Acids Research 28, 235–242 (2000) 14. Srinivasan, A., Muggleton, S., King, R.D., Sternberg, M.J.E.: Mutagenesis: ILP experiments in a non-determinate biological domain. In: Proc. of ILP 1994, vol. 237, pp. 217–232 (1994) 15. Davis, J., Santos Costa, V., Ray, S., Page, D.: Tightly integrating relational learning and multiple-instance regression for real-valued drug activity prediction. In: Proc. of ICML 2007, vol. 287 (2007) 16. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: An update. SIGKDD Explorations 11 (2009)

Not Far Away from Home: A Relational Distance-Based Approach to Understanding Images of Houses Laura Antanas, Martijn van Otterlo, Jos´e Oramas M., Tinne Tuytelaars, and Luc De Raedt Katholieke Universiteit Leuven, Belgium

Abstract. Augmenting vision systems with high-level knowledge and reasoning can improve lower-level vision processes, by using richer and more structured information. In this paper we tackle the problem of delimiting conceptual elements of street views based on spatial relations between lower-level components, e.g. the element ‘house’ is composed of windows and a door in a spatial arrangement. We use structured data: each concept can be seen as a graph representing spatial relations between components, e.g. in terms of right, up, close. We employ a distance-based approach between logical interpretations to match parts of images with known examples and provide an experimental evaluation on real images.

1 Introduction In the context of image interpretation, the field of computer vision has developed many techniques over the past decades for segmenting, classifying and recognizing objects and scenes. Many of these techniques use a plethora of low-to medium-level and local features such as lines, blobs, regions, interest points, and many more [1, 2], which are mostly employed in feature-based, probabilistic classifiers [3–6]. However, many visual scenes can best be described in terms of hierarchical structures, expressing the natural composition of scenes into objects, parts of objects and lower-level substructures [7, 8]. For example, a typical house consists of windows, one or more doors, possibly a chimney; all displayed in a particular configuration. Following the hierarchical aspect, the chimney itself is composed of a specific arrangement of local features (e.g. “brick”-like patterns). As a result, we advocate the use of high-level representations such as graphs, and more generally using logical languages [9]. The use of such formalisms in vision can improve feature-based approaches. Although high-level representations have been considered before, the actual computational use of these languages for representation, inference and learning has been less studied in computer vision (but see [10, 11]). In this paper, we investigate how logical generalization techniques can help to recognize and delineate substructures in an image. In order to do so, we propose a distancebased technique for image interpretation. In a more general framework, our aim is to employ a hierarchical representation of images where each image consists of several layers of information. The base layer is a set of features generated by a vision system, e.g. local patterns. A subsequent layer consists of objects, e.g. windows and doors, and a higher level consists of configurations of objects, e.g. houses. In this paper we focus on the delineation of meaningful substructures at one particular layer – the house level. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 22–29, 2011. c Springer-Verlag Berlin Heidelberg 2011

Not Far Away from Home

23

Fig. 1. (a) Annotated/labeled image (Eindhoven). (b) Annotated image (Eindhoven).

We represent a house as a set of objects and a set of spatial relations defined on them (hence; a relational attribute graph). Each house is annotated with the locations and shapes of windows and doors, such that each image structure is spatially embedded in a 2D plane, and objects are related to each other with respect to this space. Related to our work, several papers have explored structured models for building facades [12, 13], but as far as we know, none of these models is based on distances between logical structures. In [14] a distance measure is employed for images of documents, and similar problems were tackled using inductive rule learning [15]. However, our approach builds on recent general results on distance metrics for structured data [17] to show how easily they can be used for computer vision tasks. In addition, we focus on a new problem; that of delineating houses in street view images. This can be very useful to enhance G OOGLE Street View images, or for home delivery robots to better localize the destination.

2 Setting For our problem setting we work with street view images of houses. In the Netherlands many streets exist along which houses are built in one block so as to minimize heat loss and to keep a uniform architecture (Fig. 1). They exhibit some variation in doors and windows appearance (e.g. windows having different frame colors), however often there is considerable consistency in the way these elements are structured at the house level. A surprisingly limited number of configurations define the concept house. The precise location, shape or size of a composing elements may vary, but the overall configuration remains intact. For example, the door is always on the left or right side of the house and a window is always above a door. In this work we identify such structures from real images. Utilizing this, we solve the delineation problem, where the goal is to distinguish individual houses in images that depict rows of adjacent houses, i.e. of repeated structures. We can use the same setup for other knowledge levels (e.g. from lower-level features to the concept window), but in this paper we stop at the level of houses. Detecting house structures from images assumes access to manually labeled examples of houses. Each house is annotated with the bounding boxes and the labels of its composing elements in the image, i.e windows and doors (Fig. 1(a)). This captures the inherent structure of the concept of a house. The configuration is extracted from these features by defining 2D spatial relations such as right, above, left, below, close and touch on the labeled bounding boxes. In this way, any structure can be expressed in terms of bounding boxes, their labels and spatial relations between them.

24

L. Antanas et al.

In order to map images to logical representations, we introduce some terminology. A logical atom is an expression of the form p(t1 , . . . , tn ) where p/n is a predicate symbol and ti are terms. We assume a functor-free language, hence terms are built from constants and variables. Constants are denoted in lower case and variables in upper case. Ground atoms do not contain variables and will be called facts. A Herbrand interpretation i assigns to each fact in the language a truth-value. We identify i with the set of facts {a1 , . . . , aN } to which it assigns true. A substitution θ = {X1 /t1 , . . . , Xn /tn } is an assignment of terms t1 , . . . , tn to variables X1 , . . . , Xn . Given i1 and i2 interpretations, i1 θ-subsumes i2 iff there is a substitution θ such that i1 ⊆ i2 . Now we can describe an image Z as follows. First, we obtain a set of objects {o1 , o2 , . . . , on }, by assigning to each bounding box1 a constant oi . We derive a ground atom for each object j in the form part(oj , label), forming the set O(Z). Second, we use definitions of spatial relations between bounding boxes in our background knowledge (BK) to derive a set of spatial relations that hold among the objects in O(Z). The resulting set is denoted R(Z). An example of such an atom derived from the spatial relation close right is cRight(oj , ok , distance value), which says that object oj is close2 , on the right of object ok . The term distance value should be within a threshold for the relation to be true. Similarly, cAbove and tRight define close above and touch right, respectively. The BK can easily be extended, and enables to construct a logical representation of visual data: Definition 1. A visual interpretation V of an image Z is the union of a set of object atoms O(Z) and the set of spatial relation atoms R(Z). A visual interpretation can be seen as a graph; object atoms are attributed vertices and relation atoms are directed (attributed) edges between the vertices. New relations can be used to extend each visual interpretation, by defining them in the BK or adding new attributes to the existing ones. The key point about visual interpretations is that they are fully determined by the set of objects and the background knowledge. This implies that for one image, we can construct multiple visual interpretations by considering different subsets of the objects in the image, i.e. considering different subgraphs in the image. These graphs – in the context of our application in vision – will typically be connected. We can now use the visual interpretations as an instance space, and in effect, a concept represents a set of visual interpretations. For example, some visual interpretations will belong to the concept ’house’ whereas many others will not. For a particular image and its corresponding set of objects o, the different possible instances will be the visual interpretations of the subsets o ⊆ o. We denote ζ as the set of all labeled examples of a concept, called prototypes (Fig. 1(a)). Example 1. A visual interpretation of the image in Fig. 1(b) is: Iimg = {part(o1 , window), part(o2 , door), part(o3 , window), part(o4 , window), part(o5 , door), part(o6 , window), part(o7 , window), part(o8 , window), part(o9 , window), part(o10 , window), cRight(o2 , o1 , 60.0), tRight(o3 , o2 , 1.0), cRight(o4 , o3 , 10.0), cAbove(o9 , o3 , 68.0), cAbove(o10 , o1 , 73.0), cRight(o9 , o10 , 70.0), 1 2

Bounding box is a general term; in our experiments we employ polygon-like shapes. In practice we use approximate measures to correct for slight deviations stemming from noise.

Not Far Away from Home

25

... ...

cAbove,70 o4 o12 cRight,60

o2 cRight,61

tRight,1

o11

o13

cAbove,70 o15

o14

prototype

tRight,2

cRight,65

cRight,10 cAbove,70

o1

o6

o8

o3

o10

o5

tRight,3

cAbove,70

cRight,20

cAbove,72 cAbove,68 cRight,70

tRight,1

cAbove,70 cRight,65

cRight,60

...

cRight,70

o7

o9

image

Fig. 2. Graph representations of a prototype and an image interpretation cRight(o8 , o9 , 20.0), cRight(o8 , o4 , 70.0), cRight(o7 , o8 , 60.0), cAbove(o7 , o6 , 70.0), cRight(o6 , o5 , 65.0), tRight(o5 , o4 , 1, 0)}. The prototype house in Fig. 1(a) is: ζi = {part(o11 , window), part(o12 , door), part(o13 , window), part(o14 , window), part(o15 , door), cRight(o12 , o11 , 60.0), tRight(o13 , o12 , 1.0), cAbove(o14 , o13 , 68.0), cRight(o14 , o15 , 70.0), cAbove(o15 , o11 , 68.0)}.

Intuitively our goal is to look for known structures in a new image by trying to embed prototypes as well as possible in the image. In this direction we define the following: Definition 2. A matching between two interpretations i1 and i2 , m(i1 , i2 ), is a mapping such that each atom a1 ∈ i1 corresponds to at most one atom a2 ∈ i2 and vice versa. To each matching we associate a dissimilarity score d(i1 , i2 ), which indicates how different the two interpretations are. A possible matching between two interpretations (depicted as graphs) is shown in Fig. 2. The quality of the matchings is evaluated by the dissimilarity score. In the next section we will express this score in terms of a distance metric between interpretations. We formulate the delineation problem in the following, general, way: Definition 3. The delineation problem is defined as: given a set of prototypes ζ, a visual interpretation V of image Z, a dissimilarity score d, find the set of matchings between parts of V and any of the prototypes in ζ, such that all objects appearing in V are matched once, and the score d over the matchings is minimized. In effect, solving the delineation problem will carve up the visual interpretation of an image into a set of known structures, i.e. individual houses in this paper.

3 Approach We propose a possible scoring function d and show how to match prototypes in a new image Z. We combine structure matching and distances on interpretations. Our method consists of four steps. First, we define spatial BK, and the set of prototypes ζ. Second, we determine all candidate parts of V . Third, we compute distances between all our candidate structures and our prototypes. Fourth, we use the computed distances to find the best delineation. We will now explain the steps. Step 1 Generate visual interpretations. We first extract image features from Z and generate a set of objects that together with BK forms a visual interpretation V . In ad-

26

L. Antanas et al.

dition, we have a set of labeled prototypes ζ generated in the same manner. We try to find groups of elements which are spatially close and we choose our BK relations accordingly, with relations such as cRight (more details in the experimental section). Step 2 Generate matching candidates. Here we investigate parts of a visual interpretation that could be similar to a prototype. We only select sets of objects (and their corresponding relations) that are connected, resulting in the set M . Each element m of M is a possible candidate matching, and m must consist of at least two object atoms and a relation atom and at most all atoms in V . To be able to find the best delineation in case of noisy information, candidates with a small number of atoms are also needed. For example, if the image contains only a part of a (hypothetical) house, containing for example a door or window, they could be grouped with other elements or can be regarded as configurations on their own to best fit the image. Step 3 Compute distances. To compute the quality of a matching we use a distance metric between two visual interpretations. It evaluates how well the two interpretations match structurally. Although other solutions exist ([16]), here we employ a recent result of [17] which shows that one can construct a metric for any partially ordered hypothesis space L (such as a subsumption lattice) under some mild assumptions. That is, d is a metric if it is defined in terms of the generality order on the hypothesis space, |.| an (anti-monotonic) and strict order preserving size function and d(x, y) = |x| + |y| − 2| mgg(x, y)|, ∀x, y ∈ L. Here, mgg denotes the minimally general generalization of two hypotheses x and y. The result allows to derive distance metrics for different types of objects, including graphs, and therefore this result can be used to compute distances between interpretations. For example, one can choose a graph isomorphism as a partially ordered relation which induces a generality order on graphs, where the size function can be the number of vertices (see also [18]). Here the mgg corresponds to the maximal common subgraph. Computing the distance between graphs g1 and g2 is equivalent to calculating the distance between their corresponding visual interpretations using mgg(g1 , g2 ). Compared to the least general generalization (lgg), which is obtained under θsubsumption, the mgg represents computing the lgg under the assumption of object identity (OI) [19]. The lgg could also be used to find a common part between interpretations (resp. graphs) but it allows for different variables in the lgg to unify. This collapse of literals into one would violate the strictly ordering preserving condition for the size function. The mgg on the other hand is not unique (we can find multiple common parts) and is the result of exact structure matching, i.e. each constant in an interpretation (resp. each node in a graph) must be matched against a different constant (resp. node) in the other. Exact structure matching makes also more sense in our setting, since we want to find specific structures and do not want for example to collapse two windows into one. An illustration of mgg under OI-assumption is shown in Example 2. Example 2. Let i1 = {cRight(o1 , o2 , 2)} and i2 = {cRight(o3 , o4 , 2), cRight(o5 , o4 , 2)}. Under θ-subsumption mgg θ = {cRight(X1 , X2 , 2), cRight(X3 , X2 , 2)} with θ1 = {X1 /o1 , X2 /o2 , X3 /o1 }, θ2 = {X1 /o3 , X2 /o4 , X3 /o5 }. Under OI-subsumption there are two possible mggs: mgg0OI = {cRight(X1 , X2 , 2)} with θ10 = {X1 /o1 , X2 /o2 }, θ20 = {X1 /o3 , X2 /o4 } and mgg1OI = {cRight(X1 , X2 , 2)} with θ11 = {X1 /o1 , X2 /o2 }, θ21 = {X1 /o5 , X2 /o4 }.

Not Far Away from Home

27

Algorithm 1. Step 4 Delineate the image Require: prototypes ζ, distance function d, visual interpretation V and matchings M dij 1: compute Di = j |ζ| , ∀mi ∈ M 2: rank mi ∈ M according to Di , select the k-best, forming Mk = {(mi , Di )} 3: let S be all subsets of Mk such that ∀S ∈ S all object atoms in V appear exactly once in S 4: rank all full solutions S ∈ S according to ds = 5: return the n-best solutions Sn∗ = {S }

(mi ,Di )∈S

Di

Given the set mggall = {mgg(i1 , i2 )}, where i1 and i2 are interpretations we now define the distance between them in the sense of structural matching as: d(i1 , i2 ) =

min (|i1 | + |i2 | − 2|m|)

m∈mggall

(1)

where | . | is the number of atoms in the interpretation or in the mgg. In practice, we use a normalized metric d(i1 , i2 ) = min (1 − |m|/max(|i1 |, |i2 |)). Now we can m∈mggall

calculate dij = d(mi , ζj ) which is the distance between matching mi and prototype ζj . Step 4 Delineate the image. We use dij to find the best delineation (see Algorithm 1). Di is the average of the distances from the candidate matching mi to all the prototypes of a same concept3 . Hence, it deals with the situation when among prototypes there are noisy examples4. We select the first k pairs (mi , Di ) with the smallest distance, obtaining the set Mk . In a third step we perform a complete search among all subsets of Mk and select the subsets S satisfying certain constraints. In this work we enforce that the union of all object atoms in a subset S ∈ S is the set of object atoms in the image interpretation V and the union of all relation atoms in S is included or equal to the set of relation atoms in V . A possible variation is to allow more relaxed versions of delineations where only some parts of the image are matched, or where matchings can overlap. The constraints can then enforce that e.g. a tree cannot be part of a house. Finally, we select from S the set Sn∗ = {S }, where S is among the n solutions that best minimize the sum of distances ds . Once the delineation at the house level is obtained we can use this information at a next layer (e.g. streets).

4 Experimental Setup and Results For our experiments we use street view images from Eindhoven. In our dataset there are two possible configurations depending on the position of the door (on the right or left side of the house, see Fig. 1(a)). The image dataset was collected using G OOGLE Street View, and we used the M ATLAB toolbox for the L ABEL M E image database [20] to annotate our images. For each image we annotated the windows and the doors. For the training images we annotated also the houses (Fig. 1(a)). The data is represented in XML format and then translated into P ROLOG format. We use close to the right (cRight), close above (cAbove) and touch to the right (tRight) as spatial relations. Thresholds are used on the distance between house elements for 3 4

In our case the concept of house. This can happen when perfect examples are not available, but variations from prototypes are.

28

L. Antanas et al.

Fig. 3. No complete occlusions: (a) Correct delineation. (b) Delineation obtained.

Fig. 4. Image with 5 occluded elements: (a) Correct delineation. (b) Delineation obtained. Table 1. Delineation results. The accuracy increases as more top ranked solutions are considered. n first solutions Accuracy

1 0.73

2 0.76

3 0.83

4 0.9

5 0.93

6 0.93

7 0.93

8 0.93

9 0.93

10 0.96

close (10 ≤ θ ≤ θmax ) and touch (θ < 10). θmax is defined relatively to the size of the objects in the image. The amount k of best matchings is heuristically set to min(200 + 20% · |M |, 500). Choosing a k too small leads to finding no solution, while a high value can give a large search space, prevented by up-bounding k. However, the best solutions are likely to be found among the first ranked candidates. We use 2 noisefree house structures (Fig. 1(a)), one for each configuration, to delineate 30 new test images of houses with the same characteristics as the prototypes, but also different in appearance, size of house elements and distances between elements. Yet, they keep the same repeated structure of the houses as in the examples and also contain several occluded elements. We are able to delineate the houses for less occluded (Fig. 3) and for noisier images (Fig. 4). For all images we considered the first 1 ≤ n ≤ 10 solutions, based on the distance value ds . Table 1 shows the experimental evaluation in terms of accuracy, i.e. the percentage of images with a correct delineation. A delineation of an image is correct if all individual houses in that image are recognized.

5 Conclusions In this paper we have introduced a simple technique in which logic and distances between relational interpretations are used for the recognition of known structures in images. We have shown that our algorithm can identify substructures that form individual houses, effectively delineating a block of houses. Both the delineation problem, as well as the logical decomposition utilizing distances are relatively novel aspects of our approach. Future work includes incorporating attribute values in the distance function,

Not Far Away from Home

29

richer background knowledge bases, and more complex house structures. The most prominent direction is that of replicating our approach in a hierarchical fashion, thereby performing the interpretation process from low-level to high-level. Another, straightforward direction is to employ first-order kernels [21] as our distance function.

References 1. Forsyth, D.A., Ponce, J.: Computer Vision: A Modern Approach. Prentice-Hall, Englewood Cliffs (2003) 2. Tuytelaars, T., Mikolajczyk, K.: Local invariant feature detectors: A survey. Foundations and Trends in Computer Graphics and Vision 3(3), 177–280 (2007) 3. Li, L.-J., Socher, R., Fei-Fei, L.: Towards total scene understanding: Classification, annotation and segmentation in an automatic framework. In: IEEE Conference on Computer Vision and Pattern Recognition (2009) 4. Wang, G., Zhang, Y., Li, F.: Using dependent regions for object categorization in a generative framework. In: Proceedings of CVPR 2006, pp. 1597–1604 (2006) 5. Sudderth, E.B., Torralba, A., Freeman, W.T., Willsky, A.S.: Describing visual scenes using transformed objects and parts. Int. J. on Computer Vision 77(1-3), 291–330 (2008) 6. Bar-Hillel, A., Weinshall, D.: Efficient learning of relational object class models. IJCV 77(13), 175–198 (2008) 7. Witkin, A., Tenenbaum, J.: On the role of structure in vision. In: Beck, J., Hope, B., Rosenfeld, A. (eds.) Human and Machine Vision. Academic Press, New York (1983) 8. Pinz, A.J., Bischof, H., Kropatsch, W.G., Schweighofer, G., Haxhimusa, Y., Opelt, A., Ion, A.: Representations for cognitive vision: A review of appearance-based, spatio-temporal, and graph-based approaches. Elec. Let. on Comp. Vision and Im. Analysis 7(2) (2008) 9. De Raedt, L.: Logical and Relational Learning. Springer, Heidelberg (2008) 10. Needham, C.J., Santos, P.E., Magee, D.R., Devin, V.E., Hogg, D.C., Cohn, A.G.: Protocols from perceptual observations. AI 167(1-2), 103–136 (2005) 11. Tran, S.D., Davis, L.S.: Event modeling and recognition using markov logic networks. In: Forsyth, D., Torr, P., Zisserman, A. (eds.) ECCV 2008, Part II. LNCS, vol. 5303, pp. 610– 623. Springer, Heidelberg (2008) 12. Hartz, J., Neumann, B.: Learning a knowledge base of ontological concepts for high-level scene interpretation. In: ICMLA 2007, pp. 436–443 (2007) 13. M¨uller, P., Zeng, G., Wonka, P., Van Gool, L.J.: Image-based procedural modeling of facades. ACM Transactions on Graphics 26(3), 85 (2007) 14. Esposito, F., Malerba, D., Semeraro, G.: Classification in noisy environments using a distance measure between structural symbolic descriptions. IEEE TPAMI 14(3), 390–402 (1992) 15. Esposito, F., Ferilli, S., Basile, T.M.A., Mauro, N.D.: Discovering logical structures in digital documents. In: Intelligent Information Systems, pp. 513–521 (2004) 16. Ramon, J., Bruynooghe, M.: A framework for defining distances between first-order logic objects. In: Page, D.L. (ed.) ILP 1998. LNCS, vol. 1446, pp. 271–280. Springer, Heidelberg (1998) 17. De Raedt, L., Ramon, J.: Deriving distance metrics from generality relations. Pattern Recognition Letters 30(3), 187–191 (2009) 18. Bunke, H., Shearer, K.: A graph distance metric based on the maximal common subgraph. Pattern Recognition Letters 19(3-4), 255–259 (1998) 19. Khoshafian, S., Copeland, G.: Object identity. In: 1st ACM OOPSLA, pp. 406–416 (1986) 20. Russell, B.C., Torralba, A., Murphy, K.P., Freeman, W.T.: LabelMe: A database and webbased tool for image annotation. Int. J. of Computer Vision 77(1-3), 157–173 (2008) 21. G¨artner, T.: A survey of kernels for structured data. SIGKDD Explorations 5, 49–58 (2003)

Approximate Inference for Logic Programs with Annotated Disjunctions Stefano Bragaglia and Fabrizio Riguzzi DEIS – University of Bologna, ENDIF – University of Ferrara {stefano.bragaglia,fabrizio.riguzzi}@unibo.it

Abstract. Logic Programs with Annotated Disjunctions (LPADs) are a promising language for Probabilistic Inductive Logic Programming. In order to develop eﬃcient learning systems for LPADs, it is fundamental to have high-performing inference algorithms. The existing approaches take too long or fail for large problems. In this paper we adapt to LPAD the approaches for approximate inference that have been developed for ProbLog, namely k-best and Monte Carlo. k-Best ﬁnds a lower bound of the probability of a query by identifying the k most probable explanations while Monte Carlo estimates the probability by smartly sampling the space of programs. The two techniques have been implemented in the cplint suite and have been tested on real and artiﬁcial datasets representing graphs. The results show that both algorithms are able to solve larger problems often in less time than the exact algorithm. Keywords: Probabilistic Inductive Logic Programming, Logic Programs with Annotated Disjunctions, ProbLog.

1

Introduction

Statistical Relational Learning and Probabilistic Inductive Logic Programming provide successful techniques for learning from real world data. Such techniques usually require the execution of a high number of inferences in probabilistic logics, which are costly tasks. In order to reduce the computational load, we may resort to approximate inference that trades accuracy for speed. In this paper we present two approaches for computing the probability of queries from Logic Programs with Annotated Disjunctions (LPADs) [6] in an approximate way. LPADs are particularly interesting because of their sound semantics, of their intuitive syntax and because they allow to exploit many of the techniques developed in Logic Programming for probabilistic reasoning. We present two approaches inspired by those available for ProbLog [2]: k-best and Monte Carlo. The ﬁrst ﬁnds a lower bound for the probability of a query by considering only the k most probable explanations, while the latter estimates the probability of the query by the fraction of sampled possible worlds where the query is true. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 30–37, 2011. c Springer-Verlag Berlin Heidelberg 2011

Approximate Inference for Logic Programs with Annotated Disjunctions

2

31

Logic Programs with Annotated Disjunctions

A Logic Programs with Annotated Disjunctions T [6] consists of a ﬁnite set of disjunctive clauses of the form (H1 : α1 ) ∨ (H2 : α2 ) ∨ . . . ∨ (Hn : αn ) ← B1 , B2 , . . . Bm called annotated disjunctive clauses. The Hi , Bi and αi that appear in such a clause are respectively logical atoms, logical n literals and real n numbers in the interval [0, 1] such that i=1 αi ≤ 1. If i=1 αi < 1, the head of the annotated disjunctive clause implicitly contains an extra atom null n that does not appear in the body of any clause and whose annotation is 1 − i=1 αi . For an clause C of the form above, we deﬁne head(C) as {(H ni : αi )|1 ≤ i ≤ n} if i=1 αi = 1 and as {(Hi : αi )|1 ≤ i ≤ n} ∪ {(null : 1 − i=1 αi )} otherwise. Moreover, we deﬁne body(C) as {Bi |1 ≤ i ≤ m}, Hi (C) as Hi and αi (C) as αi . In order to deﬁne the semantics of an LPAD T , we need to consider its grounding ground(T ) that must be ﬁnite, so T must not contain function symbols if it contains variables. More speciﬁcally, an atomic choice is a triple (C, θ, i) where C ∈ T , θ is a substitution for the variables of C and i ∈ {1, . . . , |head(C)|} meaning that the head Hi (C)θ : αi (C) was chosen for the clause Cθ. A composite choice κ is a set of atomic choices that are ground (Cθ is ground) and consistent ((C, θ, i) ∈ κ, (C, θ, j) ∈ κ ⇒ i = j, meaning that only one head is selected for a ground clause) whose probability P (κ) is given by P (κ) = (C,θ,i)∈κ αi (C). A selection σ is a composite choice containing an atomic choice (C, θ, i) in σ for each clause Cθ in ground(T ) and identiﬁes a normal logic program wσ called a possible world (or simply world) of T and deﬁned as follows wσ = {(Hi (C)θ ← body(C))θ|(C, θ, i) ∈ σ}. WT denotes the set of all the possible worlds of T . Since selections are composite choices, we can assign a probability to possible worlds: P (wσ ) = P (σ) = (C,θ,i)∈σ αi (C). The probability of a closed formula φ according to an LPAD T is given by the sum of the probabilities of the possible worlds where the formula is true according to the WFS: P (φ) = σ∈WT ,wσ |=φ P (σ). It is easy to see that P satisﬁes the axioms of probability. In order to compute the probability of a query from a probabilistic logic program, [6] proposed to ﬁrst ﬁnd a covering set of explanations for the query and then compute the probability from the set by using Binary Decision Diagrams. An explanation is a composite choice κ such that the query is true in all the possible worlds consistent with κ. A set K of explanations is covering if each possible world where the query is true is consistent with at least one of the explanations in K. The cplint system1 [5] applied this approach to LPADs. cplint ﬁrst computes a covering set of explanations for a query by using a Prolog meta-interpreter that performs resolution and keeps a set of atomic choices that represents a partial explanation. Each time the meta-interpreter resolves the selected goal with a disjunctive clause, it adds a (possibly non-ground) atomic choice to the partial explanation and checks for its consistency. If the program is range-restricted, when the meta-interpreter reaches the empty goal, every atomic choice in the 1

http://www.ing.unife.it/software/cplint/

32

S. Bragaglia and F. Riguzzi

partial explanation becomes ground and an explanation is obtained. By enclosing the meta-interpreter in a findall call, a covering set K of explanations is found. Then cplint converts the following Disjunctive Normal Form K into (DNF) logical formula F = κ∈K (C,θ,i)∈κ (XCθ = i). The probability of the query is then given by the probability of F taking value 1. F is converted to a Decision Diagram that is traversed by using a dynamic programming algorithm to compute the probability. Speciﬁcally, cplint uses Binary Decision Diagram (BDD) because of the availability of highly eﬃcient packages for processing them. Since disjunctive clauses may contain any number of logical heads, multivalued variables are binary encoded by means of boolean variables to be used in BDDs.

3

Approximate Inference

In some domains, computing exactly the probability of a query may be impractical and it may be necessary to resort to some forms of approximations. [2,3] proposed various approaches for approximate inference. With iterative deepening, upper and lower bounds for the probability of the query are computed and their diﬀerence is gradually decreased by increasing the portion of the search tree that is explored. With the k-best algorithm, only the k most probable explanations are considered and a lower bound is found. With Monte Carlo, the possible worlds are sampled and the query is tested in the samples. An estimate of the probability of the query is given by the fraction of sampled worlds where the query succeeds. All three approaches have been adapted to LPADs and included in cplint. In the following we report only on the k-best and Monte Carlo, since iterative deepening was not giving clear advantages with respect to exact inference on the datasets tested. 3.1

k-best Algorithm

According to [3], using a ﬁxed number of proofs to approximate the probability is fundamental when many queries have to be evaluated because it allows to control the overall complexity. The k-best algorithm uses branch and bound to ﬁnd the k most probable explanations, where k is a user-deﬁned parameter. The algorithm records the k best explanations. Given a partial explanation, its probability (obtained by multiplying the probability of each atomic choice it contains) is an upper bound on the probability that a complete explanation extending it can achieve. Therefore, a partial explanation can be pruned if its probability falls below the probability of the k-th best explanation. Our implementation of the k-best algorithm interleaves tree expansion and pruning: a set of partial explanations are kept and are iteratively expanded for some steps. Those whose upper bound is worse than the k-th best explanation are pruned. Once the proof tree has been completely expanded, the k best explanations are translated into a BDD to compute a lower bound of the probability of the query. This solution uses a meta-interpreter while ProbLog uses a form of iterative deepening that builds derivations up to a certain probability threshold and then increases the

Approximate Inference for Logic Programs with Annotated Disjunctions

33

Algorithm 1. Function solve 1: function solve(Goal, Explan) 2: if Goal is empty then 3: return 1 4: else 5: Let Goal = [G|T ail] 6: if G =(\+ Atom) then 7: V alid :=solve([Atom], Explan) 8: if V alid = 0 then 9: return solve(T ail, Explan) 10: else 11: return 0 12: end if 13: else 14: Let L be the list of couples (GL, Step) where GL is obtained by resolving 15: Goal on G with a program clause C on head i with substitution θ 16: and Step = (C, θ, i) 17: return sample cycle(L, Explan) 18: end if 19: end if 20: end function

threshold if k explanations have not been found. The meta-interpreter approach has the advantages of avoiding to repeat resolution steps at the expense of a more complex bookkeeping. 3.2

Monte Carlo Algorithm

In [3] the Monte Carlo algorithm for ProbLog is realized by using a vector with an entry for every probabilistic fact. The entries store whether the facts have been sampled true, sampled false or not yet sampled. The vector is initialized with not yet sampled for all facts. Then a transformed ProbLog program is executed that derives the goal and updates the vector each time a new probabilistic fact is sampled. ProbLog’s algorithm requires all the probabilistic facts to be ground in the input program. While LPADs can be converted to ProbLog programs [1], the result of the conversion may contain non ground probabilistic facts so ProbLog’s Monte Carlo algorithm may not always be used. Our Monte Carlo algorithm for LPADs uses a meta-interpreter that keeps a partial explanation containing atomic choices for the disjunctive clauses sampled up to that point. The meta-interpreter is realized by Function solve in Algorithm 1 and returns 1 if the list of atoms of the goal is derivable in the sample and 0 otherwise. In order to derive the selected literal G of the current goal, solve ﬁnds all the matching clauses and builds a list of couples (new goal, atomic choice) for each matching clause. Then, it calls Function sample cycle in Algorithm 2 whose aim is to perform sampling steps for the matching clauses until the truth of the selected literal is determined and a consistent set of ground

34

S. Bragaglia and F. Riguzzi

Algorithm 2. Function sample cycle 1: function sample cycle(L, Explan) 2: Derivable = 0 3: while Derivable = 0 and L = ∅ do 4: Remove the ﬁrst element (GL, (C, θ, i)) from L 5: repeat 6: if Cθ is ground then 7: if (C, θ) is already present in Explan with head j then 8: h := j 9: else 10: h :=sample(C) 11: end if 12: else 13: h :=sample(C) 14: end if 15: Explan := Explan ∪ {(C, θ, h)} 16: if h = i then 17: Derivable :=solve(GL, Explan) 18: else 19: Derivable := 0 20: end if 21: until consistent(Explan) 22: end while 23: return Derivable 24: end function

atomic choices is obtained. Each matching clause is sampled independently and the resulting atomic choice is added to the partial explanation that is passed by reference to future calls of solve and sample cycle. Since a matching clause may be sampled when it is still not completely ground, further grounding/sampling may lead to inconsistency in the partial explanation. To address this problem, sampling is repeated until a consistent partial explanation is found. The algorithm is guaranteed to terminate because the same head will be eventually sampled for each couple of identical groundings of a clause. Also note that the sampling distribution is not aﬀected since inconsistency arises independently of the success or failure of a query. In Algorithm 2, consistent(Explan) returns true if Explan is consistent while sample(C) samples a head index for clause C. solve is called repeatedly to obtain the samples of truth values for the goal. The fraction of true values is an estimation of the probability of the query of interest. The conﬁdence interval on those samples is computed every m samples and the simulation ends when its value drops below a user-deﬁned δ.

4

Experiments

We considered three datasets: graphs of biological concepts from [2], artiﬁcial graphs and the UWCSE dataset from [4]. All the experiments have been

Approximate Inference for Logic Programs with Annotated Disjunctions 10

10

35

6

9 8

10

4

10

2

10

0

Time (log s)

Answers

7 6 5 4 3 2 1 0

exact k-best monte carlo PL exact PL k-best PL monte carlo 500 1000 1500

10

2000 2500 Edges

3000

3500

6

10

4

10

2

10

10

10

0

−2

−4

50

100

150 200 Size (steps)

exact k-best monte carlo PL exact PL k-best 250 300

(c) Execution times on Lanes graphs.

−4

500

1000

1500

2000 2500 Edges

exact k-best monte carlo PL exact PL k-best PL monte carlo 3000 3500 4000

(b) Execution times on biological graphs.

Time (log s)

Time (log s)

(a) Successes on biological graphs. 10

10

4000

−2

10

3

10

2

10

1

10

0

10

−1

10

−2

10

−3

exact k-best monte carlo PL exact

2

4

6

8

10 12 Size (steps)

14

PL k-best 16 18

20

(d) Execution times on Branches graphs.

3

10

10

2

10

1

10

0

10

−1

10

−2

2

1

10

Time (log s)

Time (log s)

10

0

10

−1

10

−2

10

−3

10

2

4

6

8

10 12 Size (steps)

14

exact k-best monte carlo PL exact PL k-best 16 18 20

(e) Execution times on Parachutes graphs.

5

10

15 Students

exact k-best monte carlo PL exact PL k-best 20 25

(f) Execution times on UWCSE graphs.

Fig. 1. Experimental results

performed on Linux machines with an Intel Core 2 Duo E6550 (2333 MHz) processor and 4 GB of RAM. The algorithms were implemented in YAP Prolog and run on the data for 24 hours or until the program ended for lack of memory. The values used for the parameters are k = 64 as the number of explanations to consider for k-best and δ = 0.01 as the maximum conﬁdence interval width for Monte Carlo algorithm because they represent a good compromise between speed and accuracy. The biological networks represent relationships among biological entities. Each edge is associated with a probability value that expresses the strength of the relationship. Determining the probability of an indirect association among a couple of entities is the same as computing the probability that a path exists

36

S. Bragaglia and F. Riguzzi

between their nodes. The datasets are obtained from a network containing 11530 edges and 5220 nodes built around four genes responsible of Alzheimer’s disease. Ten samples were extracted from the whole network each containing 50 graphs of increasing size (from 200 to 5000 nodes). For our test purposes we queried the probability that the genes HGNC 620 and HGNC 983 are related. Figure 1 presents the results of the experiments: the number of graphs for which the computation succeeded is reported on Figure 1(a), while Figure 1(b) reports the CPU time in seconds averaged over the graphs on which the algorithms succeeded as a function of the number of edges. The experimental results suggest that k-best does not improve with respect to exact because of the cost of keeping partial explanations sorted in sparse graphs, but Monte Carlo can solve twice as much problems than exact (up to 4000 edges). In terms of time, each algorithm performs almost like its ProbLog counterpart. With regard to the average absolute error, both k-best algorithms show a value of about 0.9%. Monte Carlo’s average absolute error, however, is 4.9% for our implementation and 6.7% for ProbLog. The artiﬁcial networks were used to evaluate the eﬀective speedup in speciﬁc scenarios. The datasets contain graphs of increasing size that have diﬀerent complexity with respect to the branching ratio and the length of paths between the terminal nodes. The graphs are built iteratively and are named after their shape: lanes, branches and parachutes. Lanes graphs, for example, gain a new parallel path a node longer than the previous graph. Branches are more complex because every step adds a new set of paths a node longer than before by forking at each node. Parachutes graphs are a trade-oﬀ between the two: they fork but each step introduces only one node (open paths fall back on existing nodes). Each dataset has a probability 0.3 on the edges and the path deﬁnition of lanes and parachutes contain 300 graphs, while branches only 25. Figure 2 shows an example for each dataset.

(a) Lanes.

(b) Branches.

(c) Parachutes.

Fig. 2. Examples of artiﬁcial graphs

Again, we queried the probability that a path exists between the terminal nodes (0 and 1) of the graphs. Figures 1(c), 1(d) and 1(e) show that in almost any case, our algorithms have performed better than their ProbLog equivalent, with Monte Carlo always being the fastest. The average absolute error for k-best and Monte Carlo is 0.001% and 3.170% respectively. ProbLog’s Monte Carlo is not applicable because of the presence of a probability value in rules for path.

Approximate Inference for Logic Programs with Annotated Disjunctions

37

On the UWCSE dataset, Monte Carlo took 3.873 seconds to solve the problem with 20 students, while the algorithm CVE of [4] can solve at most the problem with 7 students and taking around 1000 seconds. For 7 students Monte Carlo takes 1.961 seconds and incurs in a 4.3% absolute error on the problem with 0 students, the only one for which we have the exact result (see Figure 1(f)). ProbLog’s Monte Carlo was not applicable because the problem involves non ground probabilistic facts. ProbLog’s k-best managed to solve the problem with 25 students thus resulting to be the fastest algorithm on this dataset. It incurs into an absolute error of 4.7% on the problem with 0 students. The source code of the algorithms together with more details on the datasets and the experiments are available at the address http://sites.google.com/a /unife.it/ml/acplint.

Acknowledgements This work has been partially supported by the Italian MIUR PRIN 2007 project No. 20077WWCR8.

References 1. De Raedt, L., Demoen, B., Fierens, D., Gutmann, B., Janssens, G., Kimmig, A., Landwehr, N., Mantadelis, T., Meert, W., Rocha, R., Santos Costa, V., Thon, I., Vennekens, J.: Towards digesting the alphabet-soup of statistical relational learning. In: NIPS*2008 Workshop on Probabilistic Programming (2008) 2. De Raedt, L., Kimmig, A., Toivonen, H.: ProbLog: A probabilistic Prolog and its application in link discovery. In: 20th International Joint Conference on Artiﬁcial Intelligence, pp. 2468–2473. AAAI Press, Menlo Park (2007) 3. Kimmig, A., Santos Costa, V., Rocha, R., Demoen, B., De Raedt, L.: On the eﬃcient execution of probLog programs. In: Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. LNCS, vol. 5366, pp. 175–189. Springer, Heidelberg (2008) 4. Meert, W., Struyf, J., Blockeel, H.: CP-logic theory inference with contextual variable elimination and comparison to BDD based inference methods. In: De Raedt, L. (ed.) ILP 2009. LNCS, vol. 5989, pp. 96–109. Springer, Heidelberg (2010) 5. Riguzzi, F.: A top down interpreter for LPAD and CP-logic. In: Basili, R., Pazienza, M.T. (eds.) AI*IA 2007. LNCS (LNAI), vol. 4733, pp. 109–120. Springer, Heidelberg (2007) 6. Vennekens, J., Verbaeten, S., Bruynooghe, M.: Logic programs with annotated disjunctions. In: Demoen, B., Lifschitz, V. (eds.) ICLP 2004. LNCS, vol. 3132, pp. 95–119. Springer, Heidelberg (2004)

Approximate Bayesian Computation for the Parameters of PRISM Programs James Cussens Department of Computer Science & York Centre for Complex Systems Analysis University of York Heslington, York, YO10 5DD, UK [email protected]

Abstract. Probabilistic logic programming formalisms permit the definition of potentially very complex probability distributions. This complexity can often make learning hard, even when structure is ﬁxed and learning reduces to parameter estimation. In this paper an approximate Bayesian computation (ABC) method is presented which computes approximations to the posterior distribution over PRISM parameters. The key to ABC approaches is that the likelihood function need not be computed, instead a ‘distance’ between the observed data and synthetic data generated by candidate parameter values is used to drive the learning. This makes ABC highly appropriate for PRISM programs which can have an intractable likelihood function, but from which synthetic data can be readily generated. The algorithm is experimentally shown to work well on an easy problem but further work is required to produce acceptable results on harder ones.

1

Introduction

In the Bayesian approach to parameter estimation a prior distribution for the parameters is combined with observed data to produce a posterior distribution. A key feature of the Bayesian approach is that the posterior provides a full picture of the information contained in prior and data: with an uninformative prior and little data we are not in a position to make conﬁdent estimates of the parameters and this will be reﬂected in a ﬂat posterior. In contrast when much data is available the posterior will concentrate probability mass in small regions of the parameter space reﬂecting greater conﬁdence in parameter estimates. Despite its attractive features the Bayesian approach is problematic because in many cases computing or even representing the posterior distribution is very diﬃcult. One area in which this is often the case is statistical relational learning (SRL). SRL formalisms combine probabilistic models with rich representation languages (often logical) which allows highly complex probabilistic models to be described. In particular, the likelihood function (the probability of observed data as a function of the model’s parameters) is often intractable. This makes Bayesian and non-Bayesian parameter estimation diﬃcult since the likelihood function plays a key role in both. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 38–46, 2011. c Springer-Verlag Berlin Heidelberg 2011

Approximate Bayesian Computation for the Parameters of PRISM Programs

39

In this paper an approximate Bayesian computation (ABC) method is presented which approximates the posterior distribution over the parameters for a PRISM program with a given structure. The key feature of ABC approaches is that the likelihood function is never calculated. Instead synthetic datasets are generated and compared with the actually observed data. If a candidate parameter set generates synthetic datasets which are mostly ‘close’ to the real data then it will tend to end up with high posterior probability. The rest of the paper is set out as follows. In Section 2 an account of approximate Bayesian computation is given. In Section 3 the essentials of PRISM programs are explained. Section 4 is the core of the paper where it is shown how to apply ABC to PRISM. Section 5 reports on initial experimental results and the paper concludes with Section 6 which includes pointers to future work.

2

Approximate Bayesian Computation

The ABC method applied in this paper is the ABC sequential Monte Carlo (ABC SMC) algorithm devised by Toni et al [1] and so the basic ideas of ABC will be explained using the notation of that paper. ABC approaches are motivated when the likelihood function is intractable but it is straightforward to sample synthetic data using any given candidate parameter set θ ∗ . The simplest ABC algorithm is a rejection sampling approach described by Marjoram et al [2]. Since this is a Bayesian approach there must be a user-deﬁned prior distribution π(θ) over the model parameters. Let x0 be the observed data. If it is possible to readily sample from π(θ) then it is possible to sample from the posterior distribution π(θ|x0 ) as follows: (1) sample θ ∗ from π, (2) sample synthetic data x∗ from the model with its parameters set to θ∗ , (i.e. sample from f (x|θ∗ ) where f is the likelihood function), (3) if x0 = x∗ accept θ∗ . The problem, of course, with this algorithm is that in most real situations the probability of sampling synthetic data which is exactly equal to the observed data will be tiny. A somewhat more realistic option is to deﬁne a distance function d(x0 , x∗ ) which measure ‘how close’ synthetic data x∗ is to the real data x0 . x∗ is now accepted at stage (3) above when d(x0 , x∗ ) ≤ for some user-deﬁned . With this adaptation the rejection sampling approach will produce samples from π(θ|d(x0 , x∗ ) ≤ ) As long as is reasonably small, this will be a good approximation to π(θ|x0 ). Choosing a value for is crucial: too big and the approximation to the posterior will be poor, too small and very few synthetic datasets will be accepted. A way out of this conundrum is to choose not one value for , but a sequence of decreasing values: 1 , . . . T (1 > · · · > T ). This is the key idea behind the ABC sequential Monte Carlo (ABC SMC) algorithm: In ABC SMC, a number of sampled parameter values (called particles) {θ(1) . . . θ(N ) }, sampled from the prior distribution π(θ), is propagated through a sequence of intermediate distributions π(θ|d(x0 , x∗ ) ≤

40

J. Cussens

t ), t = 1, . . . T − 1, until it represents a sample from the target distribution π(θ|d(x0 , x∗ ) ≤ T ). [1] An important problem is how to move from sampling from π(θ|d(x0 , x∗ ) ≤ t ) to sampling from π(θ|d(x0 , x∗ ) ≤ t+1 ). In ABC SMC this is addressed via importance sampling. Samples are, in fact, not sampled from π(θ|d(x0 , x∗ ) ≤ t ) but from a diﬀerent sequence of distributions ηt (θ). Each such sample θt is then ∗ 0 ,x )≤t ) weighted as follows wt (θt ) = π(θt |d(x . η1 , the ﬁrst distribution sampled ηt (θt ) from, is chosen to be the prior π. Subsequent distributions ηt are generated via a user-deﬁned perturbation kernels Kt (θt−1 , θt ) which perform moves around the parameter space. These are the basic ideas of the ABC SMC algorithm; full details are supplied by Toni et al [1] (particularly Appendix A). As a convenience the description of the ABC SMC algorithm supplied in that paper is reproduced (almost verbatim) in Fig. 1. S1

Initialise 1 , . . . T . Set the population indicator t = 0.

S2.0 Set the particle indicator i = 1. S2.1 If t = 0, sample θ∗∗ independently from π(θ). (i) If t > 0, sample θ∗ from the previous population {θt−1 } with weights wt−1 ∗∗ ∗ and perturb the particle to obtain θ ∼ Kt (θ|θ ), where Kt is a perturbation kernel. If π(θ∗∗ ) = 0, return to S2.1 Simulate a candidate dataset x∗(b) ∼ f (x|θ∗∗ ) Bt times (b = 1, . . . , Bt ) and t ∗ calculate bt (θ ∗∗ ) = B b=1 1(d(x0 , x(b) ) ≤ t ). ∗∗ If bt (θ ) = 0, return to S2.1. (i)

(i)

S2.2 Set θt = θ ∗∗ and calculate the weight for particle θt , ⎧ ⎨ bt (θt(i) ), if t = 0 (i) (i) (i) wt = π(θt )bt (θt ) ⎩ N if t > 0 (j) (j) (j) j=1

wt−1 Kt (θt−1 ,θt

)

If i < N set i = i + 1, go to S2.1 S.3 Normalize the weights. If t < T , set t = t + 1, go to S2.0 Fig. 1. ABC SMC algorithm reproduced from Toni et al [1]

Note, from Fig. 1, that rather than generate a single dataset from f (x|θ∗∗ ), Bt datasets are sampled where Bt is set by the user. The quantity bt (θ∗∗ ) is the count of synthetic datasets which are within t . The intuitive idea behind ABC SMC is that a particle θ∗∗ that generates many synthetic datasets ‘close’ to x0 , will get high weight and is thus more likely to be sampled for use at the next iteration.

Approximate Bayesian Computation for the Parameters of PRISM Programs

3

41

PRISM

PRISM (PRogramming In Statistical Modelling) [3] is a well-known SRL formalism which deﬁnes probability distributions over possible worlds (Herbrand models). The probabilistic element of a PRISM program is supplied using switches. A switch is syntactically deﬁned using declarations such as those given in Fig. 2 for switches init, tr(s0), tr(s1), out(s0) and out(s1). The declaration in Fig. 2 for init, for example, deﬁnes an inﬁnite collection of independent and identically distributed binary random variables init1 , init2 , . . . with values s0 and s1 and with distribution P (initi = s0) = 0.9, P (initi = s1) = 0.1 for all i. The rest of a PRISM program is essentially a Prolog program. Switches provide the probabilistic element via the built-in predicate msw/2. Each time a goal such as :- msw(init,S) is called the variable S is instantiated to s0 with probability 0.9 and s1 with probability 0.1. If this were the ith call to this goal then this amounts to sampling from the variable initi . Although later versions of PRISM do not require this, it is convenient to specify a target predicate where queries to the target predicate will lead to calls to msw/2 goals (usually via intermediate predicates). The target predicate is thus a probabilistic predicate: the PRISM program deﬁnes a distribution over instantiations of the variables in target predicate goals. For example, in the PRISM program in Fig. 2 which implements a hidden Markov model, hmm/1 would be the target predicate. A query such as :- hmm(X). will lead to instantiations such as X = [a,a,b,a,a]. values(init,[s0,s1]). values(out(_),[a,b]). values(tr(_),[s0,s1]).

% state initialization % symbol emission % state transition

hmm(L):msw(init,S), hmm(1,5,S,L).

% To observe a string L: % Choose an initial state randomly % Start stochastic transition (loop)

hmm(T,N,_,[]):- T>N,!. hmm(T,N,S,[Ob|Y]) :msw(out(S),Ob), msw(tr(S),Next), T1 is T+1, hmm(T1,N,Next,Y).

% Stop the loop % Loop: current state is S, current time is T % Output Ob at the state S % Transit from S to Next. % Count up time % Go next (recursion)

:- set_sw(init, [0.9,0.1]), set_sw(tr(s0), [0.2,0.8]), set_sw(tr(s1), [0.8,0.2]), set_sw(out(s0),[0.5,0.5]), set_sw(out(s1),[0.6,0.4]).

Fig. 2. PRISM encoding of a simple 2-state hidden Markov model (this example is distributed with the PRISM system)

42

J. Cussens

The switch probabilities are the parameters of a PRISM program and the data used for parameter estimation in PRISM will be a collection of ground instances of the target predicates which are imagined to have been sampled from the unknown ‘true’ PRISM program with the ‘true’ parameters. PRISM contains a built-in EM algorithm for maximum likelihood parameter and maximum a posteriori (MAP) estimation [4]. In both cases a point estimate for each parameter is provided. In contrast here an approximate sample from the posterior distribution over parameters is provided by a population of particles.

4

ABC for PRISM

To apply the ABC SMC algorithm it is necessary to choose: (1) a prior distribution for the parameters, (2) a distance function, (3) a perturbation kernel and (4) also the speciﬁc experimental parameters such as the sequence of t, etc. The ﬁrst of these three are dealt with in the following three sections (4.1–4.3). The choice of experimental parameters is addressed in Section 5. 4.1

Choice of Prior Distribution

The ‘obvious’ prior distribution is chosen. Each switch has a user-deﬁned Dirichlet prior distribution and the full joint prior distribution is just a product of these. This is the same as the prior used for MAP estimation in PRISM [4, §4.7.2]. To sample from this prior it is enough to sample from each Dirichlet independently. Sampling from each Dirichlet is achieved by exploiting the relationship between Dirichlet and Gamma distributions. To produce a sample (p1 , . . . , pk ) from a Dirichlet with parameters (α1 , . . . αk ), values zi are sampled from Gamma(αi , 1) and then pi is set to zi /(z1 + · · · + zk ). The zi are sampled using the algorithm of Cheng and Feast [5] for αi > 1 and the algorithm of Ahrens and Dieter [6] for αi ≤ 1. Both these algorithms are given in [7]. For Dirichlet distributions containing small values of αi , numerical problems sometimes produced samples where pi = 0 for some i which is wrong since the Dirichlet has density 0 for any probability distribution containing a zero value. This problem was solved by the simple expedient of not choosing small values for the αi ! 4.2

Choice of Distance Function

The basic ABC approach leads to a sample drawn from π(θ|d(x0 , x∗ ) ≤ ) rather than π(θ|x0 ). For this to be a good approximation it is enough that f (x∗ |θ) ≈ f (x0 |θ) for all x∗ where d(x0 , x∗ ) ≤ . With this in mind d is deﬁned as follows. Let P (x0 ) be the empirical distribution deﬁned by the real data x0 . P (x0 ) assigns a probability to every possible ground instance of the target predicate. This probability is just the frequency of the ground instance in the data divided by the total number of datapoints. P (x∗ ) is the corresponding empirical distribution

Approximate Bayesian Computation for the Parameters of PRISM Programs

43

for fake data x∗ . Both P (x0 ) and P (x∗ ) can be viewed as (possibly countably inﬁnite) vectors of real numbers. The distance between x and x∗ is then deﬁned to be the squared Euclidean distance between P (x0 ) and P (x∗ ). Formally: (P (x0 )(i) − P (x∗ )(i))2 (1) d(x, x∗ ) = i∈I

where I is just some (possibly countably inﬁnite) index set for the set of all ground instances of the target predicate. In practice most terms in the sum on the RHS of (1) will be zero, since typically most ground instances appear neither in the real data nor in fake datasets. 4.3

Choice of Perturbation Kernel

Recall that each particle θ ∗ deﬁnes a multinomial distribution of the appropriate dimension for each switch of the PRISM program. The perturbation kernel Kt (θ|θ ∗ ) has two stages. Firstly, Dirichlet distributions are derived from θ ∗ by multiplying each probability in θ∗ by a global value αt where αt > 0. Secondly, a new particle is sampled from this product of Dirichlets using exactly the same procedure as was used for sampling from the original prior distribution. Large values of αt will make small moves in the parameter space likely (since the Dirichlet distributions will be concentrated around θ∗ ) and small values of αt will encourage larger moves. An attractive option is to start with small values of αt to encourage exploration of parameter space and to progressively increase αt in the hope of convergence to a stable set of particles giving a good approximation to the posterior.

5

Experimental Results

The ABC SMC algorithm has been implemented as a PRISM program which is supplied in the supplementary materials. PRISM 2.0 beta 4, kindly supplied by the PRISM developers, was used. As an initial test, ABC was done for the simplest possible parameter estimation problem. A PRISM program representing a biassed coin (P (heads) = 0.7, P (tails) = 0.3) was written and data of 100 simulated tosses were produced. This resulted in 67 heads and 33 tails. ABC was run several times with the following (more or less arbitrarily chosen) parameters: prior distribution π(θ) = Dir(1, 1), sequence of thresholds = (0), number of synthetic datasets Bt = 50, perturbation kernel parameter αt = 2, number of particles T = 50 and population size N = 50. As expected the ﬁnal population of (weighted) particles were always concentrated around the maximum likelihood estimate P (heads) = 0.67, P (tails) = 0.33. Here are the 4 most heavily weighted particles with their weights from one particular run: (0.646, 0.3534), (w = 0.051), (0.647, 0.353), (w = 0.044), (0.667, 0.332), (w = 0.044), (0.62, 0.38), (w = 0.037). Estimates of the posterior mean were similar for diﬀerent ABC runs: here are such estimates from 5 runs: (0.663, 0.337),

44

J. Cussens

0.4

0.6

0.8

Density

1.0

1.2

1.4

init

0.0

0.2

0.4 N = 200

0.6

0.8

1.0

0.8

1.0

0.8

1.0

0.8

1.0

Bandwidth = 0.09713

0.8 0.2

0.4

0.6

Density

1.0

1.2

1.4

out(s0)

0.0

0.2

0.4 N = 200

0.6 Bandwidth = 0.08416

Density

0.5

1.0

1.5

out(s1)

0.0

0.2

0.4 N = 200

0.6 Bandwidth = 0.06591

0.8 0.2

0.4

0.6

Density

1.0

1.2

tr(s0)

0.0

0.2

0.4 N = 200

0.6 Bandwidth = 0.08916

0.6

0.8

Density

1.0

1.2

tr(s1)

0.0

0.2

0.4 N = 200

0.6

0.8

1.0

Bandwidth = 0.09311

Fig. 3. Posterior distributions for HMM switch probabilities init, out(s0), out(s1), tr(s0), tr(s1) as estimated by three diﬀerent runs of ABC.

Approximate Bayesian Computation for the Parameters of PRISM Programs

45

(0.655, 0.345), (0.664, 0.336), (0.667, 0.333), (0.677, 0.323). Note that, in this trivial problem, successful parameter estimation was possible by going directly for a zero distance threshold = (0). For a more substantial test, 100 ground hmm/1 atoms were sampled from the PRISM encoded HMM show in Fig. 2. Dir(1, 1) priors were used for all 5 switches. The experimental parameters were αt = 10, Bt = 100, N = 200 and = (0.1, 0.05). Ideally, diﬀerent runs of ABC should generate similar approximations to posterior quantities. To look into this, marginal posterior distributions for the probability of the ﬁrst value of each of the 5 switches were estimated using 3 diﬀerent ABC runs. The results are shown in Fig. 3. These plots were produced using the density function in R with the ﬁnal weighted population of particles as input. There is evident variation between the results of the 3 runs, but similarities also. All 3 densities for init contain two local modes, all 3 for out(s1) put most mass in the middle, all 3 for tr(s0) have a fairly even spread apart from extreme values.

6

Conclusions and Future Work

This paper has described ABC SMC for PRISM programs and has shown some initial results for a working implementation. Evidently, considerably more experimentation and theoretical analysis is required to provide reliable approximations to posterior quantities using ABC SMC. In the experiments reported above the perturbation kernel Kt did not vary with t. It is likely that better results are possible by reducing the probability of big perturbations as t increases. In addition the choice for the sequence t thresholds was fairly arbitrary. Finally, it may be that better results are achievable by throwing more computational resources at the problem: most obviously increasing the number of particles, but also by lengthening the sequence of t thresholds to eﬀect a smoother convergence to the posterior. Another avenue for improvement is the choice of distance function. The function introduced in Section 4.2 is a generic function that is applicable to any PRISM program. It seems likely that domain knowledge could be used to choose domain-speciﬁc distance functions which reﬂect the ‘real’ diﬀerence between different ground atoms. The function used here treats all distinct pairs of ground atoms as equally diﬀerent which will not be appropriate in many cases.

References 1. Toni, T., Welch, D., Strelkowa, N., Ipsen, A., Stumpf, M.P.: Approximate Bayesian computation scheme for parameter inference and model selection in dynamical systems. Journal of the Royal Society Interface 6(31), 187–202 (2009) 2. Marjoram, P., Molitor, J., Plagnol, V., Tavar´e, S.: Markov chain Monte Carlo without likelihoods. Proceedings of the National Academy of Science 100, 15324–15328 (2003) 3. Sato, T., Kameya, Y.: Parameter learning of logic programs for symbolic-statistical modeling. Journal of Artiﬁcial Intelligence Research 15, 391–454 (2001)

46

J. Cussens

4. Sato, T., Zhou, N.F., Kameya, Y., Izumi, Y.: PRISM User’s Manual, Version 1.12.1 (2009) 5. Cheng, B., Feast, G.: Some simple gamma variate generators. Applied Statistics 28, 290–295 (1979) 6. Ahrens, J., Dieter, U.: Computer methods for sampling from gamma, beta, Poisson and binomial distributions. Computing 12, 223–246 (1974) 7. Robert, C.P., Casella, R.: Monte Carlo Statistical Methods, 2nd edn. Springer, New York (2004)

Probabilistic Rule Learning Luc De Raedt and Ingo Thon Department of Computer Science, Katholieke Universiteit Leuven, Belgium

Abstract. Traditionally, rule learners have learned deterministic rules from deterministic data, that is, the rules have been expressed as logical statements and also the examples and their classiﬁcation have been purely logical. We upgrade rule learning to a probabilistic setting, in which both the examples themselves as well as their classiﬁcation can be probabilistic. The setting is incorporated in the probabilistic rule learner ProbFOIL, which combines the principles of the relational rule learner FOIL with the probabilistic Prolog, ProbLog. We report also on some experiments that demonstrate the utility of the approach.

1

Introduction

Rule learners are amongst the most popular and easiest to use machine learning systems. They learn logical rules from deterministic examples but do not really take into account uncertainty. On the other hand, the graphical model and statistical relational learning community are able to reason about uncertainty but have not yet contributed many approaches to learning logical rules. This paper wants to alleviate this situation by introducing a novel probabilistic rule learning setting. In this setting, logical rules are learned from probabilistic data in the sense that both the examples themselves and their classiﬁcations can be probabilistic. As a motivating example that we will use throughout this paper, consider the following windsurﬁng problem. It is inspired by Quinlan’s play-tennis example. The diﬀerence between playing tennis and going windsurﬁng is that windsurfing typically needs to be planned ahead of time, say on the previous day. The eﬀect is that the weather conditions at the next day will still be uncertain at the time of deciding whether to go surﬁng or not. The forecast might state that tomorrow the probability of precipitation (pop) is 20%, the wind will be strong enough with probability 70%, and the sun is expected to shine 60% of the time, which could be represented by the facts 0.2::pop(t). 0.7::windok(t). 0.6::sunshine(t). where the t indicates the identiﬁer for the example. Past experience in this case would consist of such descriptions together with a probability value for the target predicate (e.g., 0.7::surfing(t)), which could indicate, for instance, the percentage of persons in our team that enjoyed the activity, the percentage of time that we enjoyed the surﬁng, etc. This type of data can be represented using P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 47–58, 2011. c Springer-Verlag Berlin Heidelberg 2011

48

L. De Raedt and I. Thon

a traditional attribute-value table, where the attributes are all Boolean and the values are the probabilities with which the attribute is true. The probabilistic rule learning problem, introduced in this paper, is now to induce a set of rules that allows one to predict the probability of the example from its description. For instance, for the surﬁng example, the following rules could be induced: surfing(X) :- not pop(X), windok(X). surfing(X) :- not pop(X), sunshine(X). where the argument X speciﬁes the identiﬁer of the example. The ﬁrst rule states that if the expected precipitation is low and the wind is ok, the surﬁng is likely to be good. There is thus a declarative logical reading of these rules, but also a probabilistic one: the lower the precipitation is and the higher the probability of windok and sunshine the higher the probability that the surﬁng will be enjoyable. Using the description of the example (0.2::pop(t). 0.7::windok(t). 0.6::sunshine(t).), we can compute the probability of surfing(t) under this hypothesis. Assuming all facts in the description are independent, this reduces to P (surfing(t)) = P ((¬pop(t) ∧ windok(t)) ∨ (¬pop(t) ∧ sunshine(t)) = P ((¬pop(t) ∧ windok(t)) ∨(¬pop(t) ∧ sunshine(t) ∧ ¬windok(t))) = 0.8 × 0.7 + 0.8 × 0.6 × 0.3 = 0.704 where the rewriting is needed to make the two rules mutually exclusive. Observe that although the windsurﬁng example is a toy example, this type of probabilistic data arises naturally in many application domains, such as robotics, vision, natural language processing and the life sciences. For instance, in a vision context there might be uncertainty about the identity, features or class of the object just observed; cf. also the experimental section. In the literature this kind of evidence is known as soft evidence, which has been studied in the context of probabilistic graphical models. The goal is there typically to calculate the most likely state for the remaining distributions [1]. One might want to tackle the probabilistic rule learning problem with traditional rule learning techniques. Two approaches come to mind, but turn out to be problematic. First, one might simply ignore the probabilities in the example and take the most likely value instead. Applied to the above example, this would yield the positive example (because 0.7 ≥ 0.5) with the description (not pop(t). windok(t). sunshine(t).). Even though the two rules – in this case – would predict the correct class, this approach necessarily leads to a loss of information as only 0/1 values can be predicted, which also results in a loss of prediction accuracy. Secondly, one might want to turn the probabilistic example into a set of deterministic ones by sampling instances from the example. Indeed, for each fact and the target predicate in the example one could sample possible deterministic facts. Each fact p :: f would be sampled as true with probability p

Probabilistic Rule Learning

49

and as false with probability 1 − p. This causes two problems. First, the generated examples may be inconsistent with one another as generated examples may be identical except for their target class. This will cause problems to many rule learners. Second, it requires one to sample a lot of deterministic instances from a probabilistic one to avoid overﬁtting. If there are n facts and approximating one attribute up to a certain accuracy requires k samples, approximating the entire example with the same accuracy will require k n deterministic examples. Although from these examples one could in principle learn the rules, and one could use the rules to compute the probability of an example by classifying a set of deterministic samples from that example, it should be clear that this approach will lead to combinatorial problems. A further approach that one might try is to consider the learning task as a regression problem. In the inductive logic programming community several techniques have been developed that integrate rule learning with regression, cf. [2,3]. These can also be applied to learn a set of Prolog rules that would compute the probability of an example. However, these rules typically contain a (complicated) equation that allows one to compute the probability or value of the example in terms of the probability of the features. While the performance of such approaches is typically good, the resulting rules are much harder to interpret than the logical ones that we induce. Furthermore, this type of approach is not really integrated in a probabilistic logical or statistical relational learning system. This paper is organized as follows: In Section 2, we review ProbLog and formally introduce the problem; in Section 3, we analyze the problem of probabilistic rule learning and compare it to the deterministic case; in Section 4, we introduce the probabilistic rule learner ProbFOIL which integrates principles of FOIL and ProbLog; in Section 5, we report on some preliminary experiments, and ﬁnally, in Section 6, we conclude.

2

Problem Specification

We ﬁrst introduce ProbLog, a probabilistic Prolog [4,5]. A ProbLog program consists of a set of deﬁnite clauses D and a set of probabilistic facts pi :: ci , which are facts ci labeled with the probability pi that their ground instances ci θ are true. It is also assumed that the probabilities of all ground instances ci θ are mutually independent. Given a ﬁnite set of possible substitutions {θj1 , . . . θjij } for each probabilistic fact pj :: cj , a ProbLog program T = {p1 :: c1 , · · · , pn :: cn } ∪ D deﬁnes a probability distribution P (L | T ) = pi (1 − pi ) ci θj ∈L

ci θj ∈LT \L

over ground subprograms L ⊆ LT = {c1 θ11 , . . . c1 θ1i1 , · · · , cn θn1 , . . . , cn θnin }. ProbLog is then used to compute the success probability Ps (T |= q) = P (q|L ∪ D) · P (L|T ) L⊆LT

50

L. De Raedt and I. Thon

of a query q in a ProbLog program T , where P (q|L ∪ D) = 1 if there exists a θ such that L ∪ D |= qθ, and P (q|L ∪ D) = 0 otherwise. In other words, the success probability of query q corresponds to the probability that the query q is entailed using the background knowledge together with a randomly sampled set of ground probabilistic facts. An example ProbLog program and query is shown above in the surfing example. For more details on ProbLog as well as on its eﬃcient implementation, we refer to [5]. We are now able to formalize the problem of inductive probabilistic logic programming or probabilistic rule learning as follows: Given: 1. E = {(xi , pi )|xi a ground fact for the unknown target predicate t; pi ∈ [0, 1] the target probability of xi }, the set of examples; 2. a background theory B containing information about the examples in the form of a probabilistic ProbLog program; 3. a loss function loss(H, B, E), measuring the loss of a hypothesis H (that is, a set of clauses) w.r.t. B and E; Find: arg minH loss(H, B, E) = arg minH ei ∈E |Ps (B ∪ H |= e) − pi | This loss function aims at minimizing the absolute diﬀerence between the predictions and the observations. The reason for this choice is, on the one hand, that it is the simplest possible choice and, on the other hand, that well-known concepts and notions from rule learning and classiﬁcation carry over to the probabilistic case when this loss function is used as we shall show. There are several interesting observations about this problem setting. First, it generalizes both traditional rule learning and inductive logic programming to a probabilistic setting. The propositional case illustrated in the windsurﬁng example is an example of probabilistic rule learning. Furthermore, when the background theory contains also relations and possibly clauses deﬁning further predicates we obtain an inductive probabilistic logic programming setting. In both cases, the original setting is obtained by assuming that the background theory is purely logical and having as only values for the examples 1 and 0; 1 corresponding to the positive examples and 0 to the negative ones. This is in line with the theory of probabilistic logic learning [6] and the inductive logic programming setting obtained would be that of learning from entailment because examples are facts that are probabilistically entailed by the theory. Second, as in traditional symbolic learning the goal is to ﬁnd a set of logical rules that satisfy certain constraints, while the rules themselves do not possess any parameters. To the best of the authors’ knowledge this problem has not been studied before. It is also interesting to position this problem in the context of the literature on uncertainty in artiﬁcial intelligence. There one typically makes a distinction between parameter learning and structure learning, the latter being an extension of the former in that also in structure learning the parameters have to be estimated. The probabilistic rule learning problem introduced above is in a sense dual to the parameter estimation problem. Indeed, when estimating

Probabilistic Rule Learning

51

parameters, the structure of the model is assumed to be given and ﬁxed, while here the parameters (the probability values) are ﬁxed and the structure, that is, the rules are to be learned. It is of course also possible to extend the problem setting so that induced rules may contain new predicates deﬁned by probabilistic facts with unknown probability values. This can be realized by adding to each clause h :- b1 , ..., bm in a hypothesis a new literal l where l would be deﬁned through a probabilistic predicate that would be unique to the clause. This type of extension would require both rule learning and parameter estimation. Although we are currently exploring this setting, we will – in the present paper – not consider this setting any further and focus instead on the pure probabilistic rule learning problem because it is this setting that directly upgrades the well established rule-learning problem.

3

Analysis

A key diﬀerence between the probabilistic and the deterministic setting is that each example ei now has a target probability pi as opposed to a 1/0 value. Furthermore, while in the deterministic case one obtains a 1/0 error, the probabilistic case is more subtle. To clarify this, we use pi to denote the positive and ni = 1 − pi the negative part of the example ei , while ph,i and nh,i = 1 − ph,i denote the positive and negative prediction w.r.t. the hypothesis h, and introduce the following quantities: 1. 2. 3. 4.

the the the the

true positive part tpi = min(pi , ph,i ), true negative part tni = min(ni , nh,i ), false positive part f pi = max(0, ni − tni ), and false negative part f ni = max(0, pi − tpi ).

These notions are graphically illustrated in Figure 1. If the prediction is perfect, that is, if ph,i = pi , then nh,i = ni , then the true positive and negative parts are maximal and the false positive and negative part are minimal, that is, 0. However, if ph,i > pi the hypothesis h overestimates the positive part of the example, and hence, the true positive part is still pi but the false positive part will be non-zero. Dually, if ph,i < pi , the true negative part is still ni but the false negative part will be non-zero. Furthermore, let us denote by TP = tpi ; T N = tni ; F P = f pi ; F N = f ni i

i

i

i

that is, the sum of the tpi , tni , f pi and f ni , where the sum is taken over all examples in the dataset and by pi ; N = ni M = |E|; P = i

i

These notions can be displayed in a contigency table, cf. Table 1. It should be clear that this probabilistic contingency table and the above introduces notions

52

L. De Raedt and I. Thon

Table 1. A probabilistic contingency table Real True Real False

Predicted True Predictive False TP FN P FP TN N M

Fig. 1. The true and false positive and negative part of a single example

directly generalize the deterministic case. To see this, consider that any positive example classiﬁed as such will contribute a value of tpi = 1 to T P and f ni = 0 to F N , and any positive example classiﬁed as negative will contribute tpi = 0 to T P and f ni = 1 to F N . Thus we have the following property. Property 1. The probabilistic contingency table generalizes the deterministic one. The diﬀerent notions are graphically displayed in Figure 2, in which the x-axis contains the examples and the y-axis their probability and all the examples are ordered according to increasing target probability. The areas then denote the respective rates. The deterministic case is illustrated in the ﬁgure 2 (right), which shows that in this case the examples take on 1/0 values. Because the T P and F P rates form the basis for ROC analysis, traditional ROC analysis, as used in rule learning and classiﬁcation systems can be applied to the probabilistic rule learning setting that we study in this paper. The reason is that any given hypothesis corresponds to a point in ROC space and can be interpreted in a similar way as in traditional rule learning. Therefore, ROC analysis techniques and measures such as AUC essentially carry over to the probabilistic case. Using these notions we also deﬁne precision, recall (true positive rate) and accuracy using the standard formulas. precision = recall =

TP T P +F P

TP T P +F N

m-estimate = accuracy =

P T P +m· N T P +F P

T P +T N T P +T N +F P +F N

Probabilistic Rule Learning

53

Fig. 2. The true and false positive part of an entire dataset for the probabilistic (left) case, and for the deterministic case (right)

4

ProbFOIL: A Probabilistic First Order Rule Learner

We now develop a probabilistic rule learner called ProbFOIL, which is able to induce probabilistic logic programs from examples. The rule learner is simple in that it follows the standard and generally accepted principles of rule learners (as described by [7,8]) but does not yet incorporate advanced pruning strategies. Instead of incorporating very elaborated pruning techniques we restrict ourselves to incremental reduced error pruning which is known to have a good trade-oﬀ between complexity and quality and the m-estimate which is known to give reliable results in the presence of noise. While developing ProbFOIL (Algorithm 1) we started from the generic separate and conquer paradigm (sometimes called the sequential covering algorithm) and modiﬁed it as little as possible. Essentially, the algorithm repeatedly adds clauses to the hypothesis in the outer loop until adding further clauses decreases the quality of the hypothesis. Furthermore, while searching ﬀor the next clause (lines 5-8) it searches greedily according to some local scoring function in which it repeatedly adds literals to the current clause until some local stopping criterion is satisﬁed. To determine the possible literals, a reﬁnement operator ρ is applied to the current clause; cf. [6]. We also employ list notation for the bodies of the rules, where the notation [b, l] denotes the result of appending the literal l to the body b. The post-processing step of the rule in lines 9-11 implements a kind of post-pruning akin to that in IREP [9]. The resulting algorithm is very much like the standard rule-learning algorithm known from the literature; cf. [7,8]. While the algorithm is similar to that of typical rule-learners, it is important to realize that there are also some subtleties. First, adding clauses to the hypothesis for the target predicate is a monotonic operation, that is, it can only increase the probability of an individual example because adding a clause results in extra possibilities for proving that the example is true. More formally: Property 2. For all hypotheses H1 , H2 : H1 ⊆ H2 → T P (H1 ) + F P (H1 ) ≤ T P (H2 ) + F P (H2 ).

54

L. De Raedt and I. Thon

Interpreted using Figure 2, adding clauses to a hypothesis can only increase the FP and TP regions, that is, move them upwards, and at the same time reduce the FN and TP ones. This explains why ProbFOIL stops adding clauses to the hypothesis when adding the rule found last does not result in a better global score. This is akin to the standard stopping criterion employed in many rule learners. As the global scoring function we employ accuracy(H). Secondly, notice that specializing a clause, that is, adding literals to a clause can only decrease the probability of examples (and hence, decrease the TP and FP regions). Property 3. For all hypotheses H and clauses h ← l1 , ..., ln and literals l: T P (H ∪ {h ← l1 , ..., ln })+F P (H∪{h ← l1 , ..., ln }) ≤ T P (H∪{h ← l1 , ..., ln , l})+F P (H∪ {h ← l1 , ..., ln , l}) Thirdly, while traditional deterministic rule learners typically manipulate also the set of examples (e.g. deleting the already covered examples), our probabilistic rule learner takes into account all examples all of the time. In the deterministic case, deleting the already covered examples is warranted because if one rule in the hypothesis covers the example, the overall hypothesis will cover the example. In the probabilistic case, this is more subtle as a given rule may only cover part of the example, and therefore a multi-rule hypothesis may be needed to cover the full positive part of an example. Our algorithm takes this into account in the heuristics used in its inner loop, where it will make decisions based on the extra parts of the examples that become covered by the new rule. In terms of the visualization in Figure 2, this is the diﬀerence between the old and new TP and FP parts. However, because each rule may only cover fractions of the examples, we use the diﬀerence in m-estimate, i.e., localscore(H, c) = m-estimate(H ∪ {c}) − m-estimate(H) The m-estimate, on which the local scoring function is based, is a variant of precision that is more robust against noise in the training data. Finally, ProbFOIL stops reﬁning rules when the current rule does not cover any extra negative part any more, or when it does not cover any extra positive part any more. More formally, localstop(H, c) = (T P (H ∪ {c}) − T P (H) = 0) ∨ (F P ({c}) = 0) It should also be clear that standard extensions of rule-learning, such as those for dealing with multiple classes, using beam-search, and look-ahead, can easily be incorporated in ProbFOIL.

5

Experiments

We demonstrate our approach in two experiments. In the ﬁrst experiment we learned the rules for the surfing example, in the second experiment we learned the underlying rules in the Eulisis game starting from image data. We used the YAP-ProbLog implementation and computed all scores using exact inference. All experiments were performed on a 3GHz Machine with 2GB of Ram.

Probabilistic Rule Learning

55

Algorithm 1. The ProbFOIL algorithm 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14:

5.1

h := t(X1 , . . . , Xn ) where t is the target predicate and the Xi distinct variables; H := ∅; b := []; c := (h ← b); repeat b := []; initially the body of the rule is empty; while ¬localstop(H,h ← b) do Grow rule l := arg maxl∈ρ(h←b) localscore(h ← [b, l]) b := [b, l] let b = [l1 , . . . , ln ] i := arg maxi localscore(H, h ← l1 , ..., li ); c := p(X1 , . . . , Xn ) ← l1 , . . . , li ; if globalscore(H) < globalscore(H ∪ {c}) then H := H ∪ {c} until globalscore(H) > globalscore(H ∪ {c}) return H

Surfing

For the surﬁng example we generated a dataset of 20 training examples starting from the two clauses listed in the introduction. The probabilities of the features were randomly initialized, and we were able to rediscover the original rule set. The runtime was less than 40 seconds. Afterwards we tried to rediscover the original rule-set. The rule-set inferred was 1.) surfing(I):- windok(I),\+ pop(I) 2.) surfing(I):- \+ pop(I),sunshine(I). 3.) % surfing(I):- sunshine(I),\+ windok(I). Please note that when calculating the score of a rule I is ground. This allows to calculate the probability of negated literals. The last rule decreases the total accuracy therefor it is in accordance to the algorithm not added to the ﬁnal rule-set and search is stopped. Runtime was less then 40 seconds. 5.2

Eulisis

For the second experiment we used the game of Eulisis [10]. Eulisis is a game where the dealer has a secret set of rules in mind. For each partial sequence of cards, the rules specify which cards are valid extensions of the sequence and which ones are not. After a card is played, the players are told whether the card is a valid extension or not. Using this information they have to guess the set of secret rules. The concept represented by the rules has to be expressed in terms of the suit, rank, color of the card, and whether it is is even or a face card. We played this game against the computer by taking actual images of the played cards (cf. also Figure 2). First, we presented the computer a sequence of 32 cards in a random order. For each card in the sequence the computer is told whether the card is a positive extension of the present partial sequence or not, and hence, each card played together with the previous card yields one example.

56

L. De Raedt and I. Thon

0.13::sift(26,card(diamonds,’9’)). 0.24::sift(26,card(heart,’9’)). 0.09::sift(26,card(spades,’10’)). 0.40::sift(26,card(spades,’9’)). Fig. 3. SIFT feature matches for spades nine and spades 10 (left). All matches for the 26th card which is a spades 9 bottom (right,bottom). Accuracy of the rule-set after each iteration on the red implies even dataset (right,top).

The cards are classiﬁed using SIFT (sale-invariant feature transforms) features [11] (corresponding to the start/end points of the thin lines in Fig 3). Each SIFT feature identiﬁes points of interest in the images. The main advantage of SIFT features is that they are easy to calculate. While each image contains a large number of features (typically around 1000) normally only a few (∼ 70) will match with a prototype (thin lines in Fig. 3). On the other hand, if a consistent transformation (scaling/rotation/translation) of only a small set of features (∼ 10−20, thick lines in Fig. 3) between the image and the prototype can be calculated, the probability of a miss-classiﬁcation is extremely low. To calculate the transformation we used the RANSAC (random consensus) algorithm [12], which automatically eliminates false matches (like in the hair region in Figure 3). The number of matched features is considered to be proportional to the probability of the card being a match. The output generated by the image analysis is highly interesting in our context because it often results in confusions between similar cards. Typical confusions occur between cards of the same suit (e.g, the 9 versus the 10) as well as between numbered cards belonging to diﬀerent suits. These confusions show that this is a realistic setting for probabilistic rule learning. We used two concepts to test the algorithm. The ﬁrst sequence contains the concept that states that the next card has to be red, that is, trans(PrevPos,Curr) :- red(Curr). Learning this concept took 45 seconds. ProbFOIL found this rule but also discovered an extra rule

Probabilistic Rule Learning

57

trans(PrevPos,Curr) :- black(PrevPos). The last rule is valid but only an artifact as it does not cover any example neither positive nor negative. It disappears, when the m of the m-estimates is set to zero. The second concept to learn was that black cards have to be followed by odd cards and red cards by even cards. The correct rule-set consists therefore of the two rules: trans(PrevPos,Curr) :- black(PrevPos),odd(Curr) and trans(PrevPos,Curr) :- red(PrevPos),even(Curr) Again, ProbFOIL learned some extra rules covering some very small noisy fractions of examples: trans(PrevPos,Curr) :- odd(Curr),even(Curr),red(Curr) and trans(PrevPos,Curr) :- black(Curr),even(Curr),odd(Curr). The last two rules are logically inconsistent as cards cannot be even and odd at the same time, but due to the noise in the observations, they provide some extra accuracy. In any case it is interesting to see how the accuracy evolves as more rules are learned. This is graphically depicted in Figure 2 right. The accuracy of the rule stating that everything is positive is 0.56, the accuracy of the diﬀerent rule-sets learned by ProbFOIL are in order of discovery 0.574, 0.671, 0.673, 0.673. This also implies that the target concept itself has only an accuracy of 0.671, and that the last two rules that are added only account for 0.2% accuracy. Thus the improvement of these last two rules is marginal and they would typically be removed should we employ a kind of post-pruning.

6

Conclusions

We have introduced a novel setting for probabilistic rule learning and developed the ProbFOIL algorithm for solving it using the probabilistic logic programming system ProbLog. The result is a natural probabilistic extension of inductive logic programming and rule learning. There are several remaining open questions that we are currently exploring. First, it would be interesting to experimentally compare the present approach to some alternative approaches (as sketched in the introduction). Secondly, we are developing an approach to probabilistic rule learning in which each rule contains an extra probabilistic predicate.

Acknowledgements The authors thank Manfred Jaeger, Guy Van den Broeck, Peter Flach, and Wannes Meert for helpful discussions. This research was supported by the FWO project: Relational action and activity learning and the GOA/08/008 project Probabilistic Logic Learning.

58

L. De Raedt and I. Thon

References 1. Pan, R., Peng, Y., Ding, Z.: Belief update in bayesian networks using uncertain evidence. In: ICTAI 2006: Proceedings of the 18th IEEE International Conference on Tools with Artiﬁcial Intelligence, pp. 441–444. IEEE Computer Society, Washington, DC, USA (2006) 2. Karalic, A., Bratko, I.: First order regression. Machine Learning 26(2-3), 147–176 (1997) 3. Srinivasan, A., Page, D., Camacho, R., King, R.D.: Quantitative pharmacophore models with inductive logic programming. Machine Learning 64(1-3), 65–90 (2006) 4. De Raedt, L., Kimmig, A., Toivonen, H.: Problog: A probabilistic Prolog and its application in link discovery. In: Veloso, M. (ed.) Proceedings of the 20th International Joint Conference on Artiﬁcial Intelligence, pp. 2462–2467 (2007) 5. Kimmig, A., Santos Costa, V., Rocha, R., Demoen, B., De Raedt, L.: On the eﬃcient execution of probLog programs. In: Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. LNCS, vol. 5366, pp. 175–189. Springer, Heidelberg (2008) 6. De Raedt, L.: Logical and Relational Learning. Springer, Heidelberg (2008) 7. Mitchell, T.M.: Machine Learning. McGraw-Hill, New York (1997) 8. F¨ urnkranz, J., Flach, P.A.: Roc ‘n’ rule learning — towards a better understanding of covering algorithms. Machine Learning 58(1), 39–77 (2005) 9. F¨ urnkranz, J., Widmer, G.: Incremental reduced error pruning. In: Cohen, W., Hirsh, H. (eds.) ICML 1994: Proceedings of the 11th International Conference on Machine Learning, pp. 70–77. Morgan Kaufmann, San Francisco (1994) 10. Dietterich, T., Michalski, R.: Learning to predict sequences. In: Michalski, R., Carbonell, J., Mitchell, T. (eds.) Machine learning: An Artiﬁcial Intelligence Approach, vol. 2. Morgan Kaufmann, San Francisco (1986) 11. Lowe, D.G.: Object recognition from local scale-invariant features. In: ICCV, pp. 1150–1157 (1999) 12. Fischler, M.A., Bolles, R.C.: Random sample consensus: a paradigm for model ﬁtting with applications to image analysis and automated cartography. Communications of the ACM 24(6), 381–395 (1981)

Interactive Discriminative Mining of Chemical Fragments Nuno A. Fonseca1 , Max Pereira1,2 , V´ıtor Santos Costa3 , and Rui Camacho2 1

CRACS-INESC Porto LA, Universidade do Porto, Rua do Campo Alegre 1021/1055, 4169-007 Porto, Portugal 2 LIAAD-INESC Porto LA & DEI-FEUP, Universidade do Porto, Rua Dr Roberto Frias s/n, 4200-465 Porto, Portugal 3 CRACS-INESC Porto LA & DCC-FCUP, Universidade do Porto, Rua do Campo Alegre 1021/1055, 4169-007 Porto, Portugal

Abstract. Structural activity prediction is one of the most important tasks in chemoinformatics. The goal is to predict a property of interest given structural data on a set of small compounds or drugs. Ideally, systems that address this task should not just be accurate, but they should also be able to identify an interpretable discriminative structure which describes the most discriminant structural elements with respect to some target. The application of ILP in an interactive software for discriminative mining of chemical fragments is presented in this paper. In particular, it is described the coupling of an ILP system with a molecular visualisation software that allows a chemist to graphically control the search for interesting patterns in chemical fragments. Furthermore, we show how structural information, such as rings, functional groups such as carboxyls, amines, methyls, and esters, are integrated and exploited in the search. Keywords: Drug design, graphical mining, eﬃciency.

1

Introduction

Structural activity prediction is one of the most important tasks in chemoinformatics. The goal is to predict a property of interest given structural data on a set of small compounds or drugs. This task can be seen as an instance of a more general task, Structure-Activity Relationship (SAR), where one aims at predicting the activity of a compound under certain conditions, given structural data on the compound. Ideally, systems that address this task should not just be accurate, they should be able to identify an interpretable discriminative structure which describes the most discriminant structural elements with respect to some target. In an invited talk to Computational Logic 2000 and ILP’2000 David Page [1] highlighted the importance of interactive ILP systems for SAR problems. The application of Inductive Logic Programming (ILP) in an interactive software P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 59–66, 2011. c Springer-Verlag Berlin Heidelberg 2011

60

N.A. Fonseca et al.

for discriminative mining of chemical fragments is presented in this paper. In particular, it is described a software application, called iLogCHEM , that allows a chemist to graphically control the search for interesting patterns in chemical fragments. iLogCHEM couples an ILP system with a molecular visualisation software, thus leveraging the ﬂexibility of ILP while addressing the SAR task mentioned above. iLogCHEM can input data from chemical representations, such as MDL’s SDF ﬁle format, and display molecules and matching patterns using visualisation tools such as VMD [2]. It has been demonstrated [3] that iLogCHEM can be used to mine eﬀectively large chemoinformatics data sets, such as the DTP AIDS data set [4]. The focus of this paper is on allowing domain expert users to participate in the drug discovery process in a number of ways: 1. We propose the ability to incorporate user-provided abstractions of interest to the chemoinformatics domain, that can be used to aid the discovery process. As a ﬁrst experiment, we have allowed users to specify a common chemical structure, aromatic rings. The user has available in iLogCHEM , apart from the aromatic rings, functional groups such as carboxyl, amine, ester, methyl, phenyl etc. This is supported through a macro mechanism (described in more detail in Section 4) where the user provides a pattern which is used to control rule reﬁnement. 2. We propose an interactive reﬁnement process where the user can interact with the proposed model, adapting it, evaluating it, and using it to guide (constrain) the search. 3. A common procedure in drug design is to introduce small variations in well known molecules. This procedure leads to data bases with groups of molecules that are very similar. When data sets are assembled from these data bases there is a “similarity bias”. To attenuate that eﬀect iLogCHEM allows the user to compute the similarity between the data set molecules and discard the more similar ones, retaining a set of “representative” ones. A more detailed description of this facility is described in Section 3. The rest of the paper is organised as follows. Section 2 provides a brief introduction to the SAR problem and the issue of molecular representations. Section 3 introduces iLogCHEM and describes its main components. Section 4 describes its ability to incorporate user-provided abstractions of interest to the chemoinformatics domain through the use of what we have designated as macros. Section 5 explains the facilities for interactive search and reﬁnement. Finally, conclusions and future work are described in Section 6.

2

Background

Structure activity relationships (SAR) describe empirically derived relationships between a molecule and its activity as a drug. In a typical SAR problem the goal is to construct a predictive theory relating the structure of a molecule to its activity given a set of molecules of known structure and activity.

Interactive Discriminative Mining of Chemical Fragments

61

A problem that one has to address is how to describe molecules. Coordinatebased representations usually operate by generating features from a molecule’s 3D-structure [5]. The number of features of interest can grow very quickly, hence the problem that these systems need to address is how to select the most interesting features and build a classiﬁer from them. Coordinate-free representations can use atom pair descriptors or just the atom-bond structure of the molecule. In the latter case, ﬁnding a discriminative component quite often reduces to the problem of ﬁnding a Maximum Common Substructure (MCS). Exact MCS search in a molecule represented as a set of atoms and bonds can be seen as a graph-mining task. In this case, a molecule is represented as a graph GM = (V, E) where V , the vertices, are atom labels, and E, the edges, are bonds. The search can be improved by adding atom and bond properties. The earliest approaches to search for common substructures or fragments were based on ideas from Inductive Logic Programming (ILP). ILP techniques are very appealing because they are based on a very expressive representation language, ﬁrst order logic, but they have been criticised for exhibiting signiﬁcant eﬃciency problems. As stated by Karwath and De Raedt [6], “their application has been restricted to ﬁnding relatively small fragments in relatively small databases”. Specialised graph miners have therefore become quite popular. Systems such as SUBDUE [7] started from the empty graph and then generate reﬁnements either using beam-search or breadth-ﬁrst search. More recent systems such as MoFa [8], gSpan [9], FFSM [10], Gaston [11], FMiner [12] and SMIREP [6], perform depth-ﬁrst search, and use compact and eﬃcient representations, such as SMILES, for which matching and canonical forms algorithms exist. Arguably, although such systems diﬀer widely, they all use three main principles: (i) only reﬁne fragments that appear in the database; (ii) ﬁlter duplicates; and (iii) perform eﬃcient homomorphism testing.

3

The iLogCHEM System

iLogCHEM is an interactive tool for discriminative mining of chemical fragments. iLogCHEM uses a logic representation of the molecules, where atoms and bonds are facts stored in a database. Although our representation is less compact than a specialised representation such as SMILES, used in MOLFEA [13] and SMIREP [6], it oﬀers a number of important advantages. First, it is possible to store information both on atoms and on their location: this is useful for interfacing with external tools. Second, iLogCHEM can take advantage of the large number of search algorithms implemented in ILP. Third, given that we implement the basic operations eﬃciently, we can now take advantage of the ﬂexibility of our framework to implement structured information. The interaction with the system is made through a graphical user interface. The system requires two input ﬁles: one is in SDF format with atom and bond data on a set of molecules; the other is a ﬁle which labels (discriminates) the compounds. We use SDF because it is highly popular and because it can convey 3D structure information. Other formats, such as SML can be translated to SDF

62

N.A. Fonseca et al.

through tools such as OpenBabel [14]. Also note that some datasets, such as the DSSTox [15] collection of datasets with at most 2000 molecules, include 2D and 3D information in the SDF format. Furthermore, the user may choose from 22 1D descriptors, 300 molecular ﬁngerprints and 242 2D descriptors, predeﬁned by chemists. These descriptors can be analysed with propositional tools, not just ILP. The input ﬁles (in SDF format) are processed and given as input to a rule discovery algorithm, that is implemented as an extension of an ILP system (currently Aleph [16]). We signiﬁcantly improved the ILP search algorithm for this task, as explained in the next section. The ILP engine allows the introduction of extra background knowledge for rule discovery. As an example, we take advantage of this ﬂexibility by allowing the user to introduce well-known molecular structures in the search process. This is supported through a macro mechanism (described in more detail in Section 4) where the user provides a pattern which is used to control rule reﬁnement. The output of the ILP system will be a set of rules, or theory. Most often, chemists will be interested in looking at individual rules. iLogCHEM ﬁrst matches the rules against the database, and then allows the user to navigate through the list of matches and visualise them. iLogCHEM uses VMD [2] to display the molecules and the matching substructures. The key component of iLogCHEM is rule discovery. From a number of ILP algorithms, we chose to base our work on Progol’s greedy cover algorithm with Mode Directed Inverse Entailment algorithm (MDIE) [17], as implemented in the Progol, April [18], and Aleph systems [16]. We rely on MDIE to achieve directed search, and we use greedy cover removal as a natural algorithm for ﬁnding interesting patterns. Figure 1 shows an example pattern for the HIV data set. The pattern is shown as a wider atoms and bonds, and it includes a sulphur atom and part of an aromatic ring. Molecular Filtering. It is a common practise in drug design to take a small molecule that exhibits some activity and introduce small changes to it to improve its activity. This procedure produces a large set of similar molecules. Most of the available data for drug design suﬀer from this “similarity bias”. Using iLogCHEM the similarities between any two pairs of molecules can be computed and retain only the “representative” ones, producing an unbiased data set. iLogCHEM uses Tanimoto distance to assess the similarity of two molecules. The user can specify a threshold value to be used in the ﬁltering procedure. Pattern Enumeration. iLogCHEM enumerates patterns (or sub-graphs) contained in an example molecule, the seed. To do so it uses the LogCHEM algorithm [3], based on the Aleph ILP system [16] to constrain the search space. This algorithm keeps a trie with previously

Fig. 1. HIV Pattern (wider atoms and bonds) discovered by ILP

Interactive Discriminative Mining of Chemical Fragments

63

generated clauses, according to a Morgan normal form, and tries to optimise rule evaluation for the speciﬁc domain of chemical compounds. Pattern Matching. Given a new pattern, we are interested in ﬁnding out how many molecules support the pattern. ILP systems rely on refutation for this purpose. However, this introduces a problem. Consider the clause: active(C) ← atom(C, Id1 , c)∧ atom bond(C, Id1 , Id2 , c, n, 2)∧ atom bond(C, Id1 , Id3 , c, n, 2)

Fig. 2. An Example Pattern from a Small Organic Molecule: Aalpha-C

that represents a N = C = N pattern. Figure 2 matches the molecule A-alpha-C against the pattern. Clearly, there is no match. Unfortunately, Prolog ﬁnds a match by matching the same nitrogen against the pattern twice. This problem, known as Object Identity [19], is addressed by dynamically rewriting the rules so that diﬀerent variables match diﬀerent atoms: active(C) ← atom(C, Id1 , c)∧ atom bond(C, Id1 , Id2 , c, n, 1)∧ Id1 = Id2 ∧ atom bond(C, Id1 , Id3 , c, n, 1)∧ Id1 = Id3 ∧ Id2 = Id3

iLogCHEM includes a number of further optimisations. Namely, we rewrite bond information in such a way as to minimise backtracking. Also, by default, iLogCHEM compiles every pattern, instead of interpreting them, as usual in ILP [3].

4

Integrating Structural Information in the Search

The iLogCHEM system has the ability to integrate complementary information in the pattern search process. Our work was motivated by two observations. First, quite often chemists rely on well-known structures that are typically inﬂuential in the chemical properties of compounds. Second, global properties of the compound may be good indicators of activity. 4.1

Macros

A ﬁrst step forward stems from observing Figure 1: does the pattern include part of the ring because only part of the ring matters or, as it is more natural from the chemists point of view, should we believe that the whole ring is in the pattern? Quite often discriminative miners will only include part of a ring because it is suﬃcient for classiﬁcation purposes. But this may not be suﬃcient to validate the pattern. The logical representation used in iLogCHEM makes it natural to support macro structures, such as rings used in MoFa [8] in a straightforward fashion. The next example shows such a description:

64

N.A. Fonseca et al.

macro(M,(atom(A1,c), bond(A1,A2,_), atom(A2,c), bond(A2,A3,_), atom(A3,c), bond(A3,A4,_), atom(A4,c), bond(A4,A5,_), atom(A4,c), bond(A4,A5,_), atom(A5,c), bond(A5,A6,_), atom(A6,c), bond(A6,A1,_))).

Initial experiments with iLogCHEM show that using such macros results in similar accuracy, but returns easier to interpret rules. iLogCHEM has available a library of functional groups that may be used as macros to speed up search and are very useful to improve understandability of the models. Some of the functional groups available include: aldehyde, amine, methyl, ester, ketone, hydroxyl, cyano, carboxylic acid, etc 4.2

Molecular Properties

One of the major beneﬁts of ILP for SAR is its ability to combine very diverse sources of information. iLogCHEM allows the user to select chemical properties of interest for a compound, and combine them with pattern generation. Properties of interest are obtained through the graphical interface, and then passed on to the miner. In iLogCHEM the user may choose from a wide set of 1D molecular descriptors. As an example, consider this predicate clause for the CPDBAS dataset [15]: active(A) :logp(A,B), B =< -0.73333657, atom(A,C,c), atom_bond(A,C,D,c,c,4), atom_bond(A,D,E,c,o,4).

The constant −0.73333657 is obtained from a seed example by saturation. Experiments with NCTRER dataset show that this feature can be quite useful in complementing graph search.

5

Interactive Search and Refinement

After choosing the data set of molecules and then ﬁltering them out using Tanimoto distance the user may launch the ILP and obtain a ﬁrst model. The user may then choose to visualise each rule of the model and overlap a rule (pattern) on the structure of a molecule covered by that rule (as shown in Figure 1). Once a model is constructed there are two possible interactions the user can take. The user may decide to do a “local and manual” search or he can specify constraints on the visualised pattern and ask the ILP system to produce a new model. In the ﬁrst case the user may incrementally produce changes in the pattern (adding or deleting atoms and/or bonds) and then ask iLogCHEM to immediately evaluate the changed pattern. Whenever an evaluation is done the user can see a list of the “positive and negative” molecules covered. If “local and manual” search does not produce the desired results the user may interactively (again adding/removing atoms and bonds) deﬁne a new pattern. This new pattern can be converted into a clause and used as the starting clause of the search space. That is, the user is commanding the system to ﬁnd useful reﬁnements of the provided pattern.

Interactive Discriminative Mining of Chemical Fragments

6

65

Conclusions

This paper reports on iLogCHEM , an interactive tool to be used in interactive drug design tasks. iLogCHEM is designed to give users who have little knowledge of, or interest in ILP the beneﬁts of this learning mechanism. Thus, it can be seen as step forward in “enhancing human–computer interaction to make ILP systems true collaborators with human experts” [20]. iLogCHEM is founded on previous work to create an eﬀective rule miner for ILP [3]. The system was driven by expert requirements, extending the previous work as follows by introducing i) a library of preexisting common patterns, considered relevant by experts, that are immediately available for discovery; and ii) the ability to deﬁne a new pattern graphically and then translate it to the iLogCHEM internal representation. These new facilities enable the expert to: i) look at the pattern highlighted on the molecule structure; ii) interact with the visualisation tool and specify constraints not satisﬁed by the pattern presented; and iii) rerun the ILP system with the speciﬁed constraints added to the data set. These steps are the centre of the main loop of the interaction where the expert guides the process of pattern discovery. Additionally the tool also allows the expert user to specify a list of chemical structures (rings and functional groups) that are used as macro operators. The use of chemical structures may be very useful to achieve more compact and comprehensible models than the ones described with atoms and bonds.

Acknowledgements This work has been partially supported by the project ILP-Web-Service (PTDC/EIA/70841/2006), HORUS (PTDC/EIA-EIA/100897/2008), and by the Funda¸c˜ao para a Ciˆencia e Tecnologia. Max Pereira is funded by FCT grant SFRH/BPD/37087/2007.

References 1. Page, D.L.: ILP: Just do it. In: Cussens, J., Frisch, A.M. (eds.) ILP 2000. LNCS (LNAI), vol. 1866, pp. 3–18. Springer, Heidelberg (2000) 2. Humphrey, W., Dalke, A., Schulten, K.: VMD – Visual Molecular Dynamics. Journal of Molecular Graphics 14, 33–38 (1996) 3. Costa, V.S., Fonseca, N.A., Camacho, R.: LogCHEM: Interactive Discriminative Mining of Chemical Structure. In: Proceedings of 2008 IEEE International Conference on Bioinformatics and Biomedicine (BIBM 2008), pp. 421–426. IEEE Computer Society, Philadelphia (2008) 4. Collins, J.M.: The DTP AIDS antiviral screen program (1999), http://dtp.nci.nih.gov/docs/aids/aids_data.html 5. Maggiora, G.M., Shanmugasundaram, V., Lajiness, M.J., Doman, T.N., Schultz, M.W.: A practical strategy for directed compound acquisition, pp. 315–332. WileyVCH, Chichester (2004)

66

N.A. Fonseca et al.

6. Karwath, A., De Raedt, L.: Predictive Graph Mining. In: Suzuki, E., Arikawa, S. (eds.) DS 2004. LNCS (LNAI), vol. 3245, pp. 1–15. Springer, Heidelberg (2004) 7. Chittimoori, R.N., Holder, L.B., Cook, D.J.: Holder, and Diane J. Cook. Applying the subdue substructure discovery system to the chemical toxicity domain. In: Kumar, A.N., Russell, I. (eds.) Proceedings of the Twelfth International Florida Artiﬁcial Intelligence Research Society Conference, Orlando, Florida, USA, May 1-5, pp. 90–94. AAAI Press, Menlo Park (1999) 8. Borgelt, C., Berthold, M.R.: Mining molecular fragments: Finding relevant substructures of molecules. In: Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), Japan, pp. 51–58 (2002) 9. Yan, X., Han, J.: gspan: Graph-based substructure pattern mining. In: Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), Maebashi City, Japan, December 9-12 (2002) 10. Huan, J., Wang, W., Prins, J.: Eﬃcient mining of frequent subgraphs in the presence of isomorphism. In: Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), Melbourne, Florida, USA, December 19-22, pp. 549–552. IEEE Computer Society, Los Alamitos (2003) 11. Nijssen, S., Kok, J.N.: Frequent graph mining and its application to molecular databases. In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics, The Hague, Netherlands, October 10-13, pp. 4571–4577. IEEE, Los Alamitos (2004) 12. Maunz, A., Helma, C., Kramer, S.: Large-scale graph mining using backbone reﬁnement classes. In: KDD, pp. 617–626 (2009) 13. Kramer, S., De Raedt, L., Helma, C.: Molecular feature mining in hiv data. In: KDD, NY, USA, pp. 136–143 (2001) 14. Guha, R., Howard, M.T., Hutchison, G.R., Murray-Rust, P., Rzepa, H., Steinbeck, C., Wegner, J.K., Willighagen, E.L.: The Blue Obelisk–Interoperability in Chemical Informatics. Journal of Chemical Information and Modeling 46, 991–998 (2006) 15. Richard, A.M., Williams, C.R.: Distributed structure-searchable toxicity (dsstox) public database network: a proposal. Mutation Research/Fundamental and Molecular Mechanisms of Mutagenesis 499, 27–52(26) (2002) 16. Srinivasan, A.: The Aleph Manual. University of Oxford (2004), http://www.comlab.ox.ac.uk/oucl/research/areas/machlearn/Aleph/ 17. Muggleton, S.: Inverse entailment and Progol. New Generation Computing, Special issue on Inductive Logic Programming 13(3-4), 245–286 (1995) 18. Fonseca, N.A., Silva, F., Camacho, R.: April – An Inductive Logic Programming System. In: Fisher, M., van der Hoek, W., Konev, B., Lisitsa, A. (eds.) JELIA 2006. LNCS (LNAI), vol. 4160, pp. 481–484. Springer, Heidelberg (2006) 19. Lisi, F.A., Ferilli, S., Fanizzi, N.: Object identity as search bias for pattern spaces. In: van Harmelen, F. (ed.) Proceedings of the 15th Eureopean Conference on Artiﬁcial Intelligence, ECAI 2002, pp. 375–379. IOS Press, Amsterdam (2002) 20. Page, D., Srinivasan, A.: ILP: A short look back and a longer look forward. Journal of Machine Learning Research 4, 415–430 (2003)

MMRF for Proteome Annotation Applied to Human Protein Disease Prediction Beatriz Garc´ıa-Jim´enez, Agapito Ledezma, and Araceli Sanchis Universidad Carlos III de Madrid Av.Universidad 30, 28911, Legan´es, Madrid, Spain [email protected]

Abstract. Biological processes where every gene and protein participates is an essential knowledge for designing disease treatments. Nowadays, these annotations are still unknown for many genes and proteins. Since making annotations from in-vivo experiments is costly, computational predictors are needed for diﬀerent kinds of annotation such as metabolic pathway, interaction network, protein family, tissue, disease and so on. Biological data has an intrinsic relational structure, including genes and proteins, which can be grouped by many criteria. This hinders the possibility of ﬁnding good hypotheses when attribute-value representation is used. Hence, we propose the generic Modular Multi-Relational Framework (MMRF) to predict diﬀerent kinds of gene and protein annotation using Relational Data Mining (RDM). The speciﬁc MMRF application to annotate human protein with diseases veriﬁes that group knowledge (mainly protein-protein interaction pairs) improves the prediction, particularly doubling the area under the precision-recall curve. Keywords: Relational Data Mining, Human Disease Annotation, MultiClass Relational Decision Tree, First-Order Logic, Structured Data.

1

Introduction

Functional annotation consists of attaching biological information to gene and genetic product sequences. For instance, identifying whether a gene is involved in a biological process, a regulation network or a molecular function; or assigning to a protein its expression proﬁle or phenotype (tissue or disease association). Knowing the processes in which genes and proteins are involved is an essential knowledge to design disease treatments. Nowadays, a gene/protein appears annotated in multiple distributed repositories. However, many proteins have still few or no annotation in a large number of species, because experimental techniques are costly in resources and time. This process is also overwhelmed by the high amount of data that need to be acquired and managed. Therefore, computational prediction methods have shown an useful alternative in the last years [16], in order to focus the experimental veriﬁcations on the hypotheses (predicted annotations) that are more likely to be true. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 67–75, 2011. c Springer-Verlag Berlin Heidelberg 2011

68

B. Garc´ıa-Jim´enez, A. Ledezma, and A. Sanchis

Many diverse prediction techniques have been proposed to solve the genome1 annotation problem. Each method uses diﬀerent kind and amount of input data, and is focused on a particular prediction goal. This variability in methods makes diﬃcult a comparison among them. The simplest prediction approach is based on sequence similary, as Blast2GO [1], only useful for Gene Ontology (GO) annotation. Others predictors just include sequence and structure features [13]; while more sophisticated methods integrate heterogeneous data sources, such as Fatigo [1] and DAVID [5]. Some techniques simplify the data representation to numerical features, applying subsymbolic machine learning algorithms [10,12]; but others preserve the intrinsic structure of biological data, applying Multi-Relational Data Mining (MRDM). These techniques take advantages of the interpretable symbolic representation, such as [4,7,21] in functional annotation and [19,20] in other related bioinformatic domains. Despite all these eﬀorts, the proteome annotation problem remains open. We do not know functions and tasks for all proteins, and many annotations are neither veriﬁed by experts nor complete in all the biological ﬁelds of interest. Particularly, there are few specialized predictors in disease annotation, being an essential knowledge to design new drugs. Morbid OMIM (Online Mendelian Inheritance in Man) [2] contains information on all known mendelian disorders and associated genes. It is the most complete and updated repository about genetic disorders. This repository is carefully curated and frequently referenced by biological and medical scientists. For these reasons, we decide to use OMIM instead of other less known disease vocabulary such as eVOC pathology [11]. Most annotation methods using OMIM perform search rather than prediction. Some approaches predict new annotation [14], but none applies MRDM. To summarize, genome and proteome annotation prediction is still an open problem with regard to various kind of speciﬁc annotation. Disease annotation is one of special interest. This paper proposes applying MRDM to a relevant annotation domain: human disease prediction. Besides, we want to verify the relevance of biological group relations using data integrated from diﬀerent data sources. This group data is very suitable to be exploited by relational learning. We address this problem adapting a generic and ﬂexible framework, MMRF [6], which can easily predict diﬀerent annotations. Several facts support this proposal. First, MRDM have been succesfully applied to other related bioinformatic domains. Second, we use up to date data from diﬀerent biological databases used in many current science projects. Finally, we have made a special eﬀort in data collection, selecting only experimental data, when it is possible, in order to avoid indirect redundancies coming from internal predictions from other applications, which can bias the results. This paper is organized as follows: Section 2 brieﬂy explains the Modular Multi-Relational Framework. The human protein OMIM disease prediction domain is described in Section 3. Section 4 presents and analyzes the application results. Finally, in Section 5, conclusions and future work are summarized. 1

In annotation context, the terms gene and protein or genome and proteome are indistinctly used.

MMRF for Proteome Annotation Applied

2

69

Modular Multi-Relational Framework

Modular Multi-Relational Framework (MMRF) [6] is a system originally designed for gene Group function prediction domain, facing the problem from a relational and ﬂexible point of view. It has been applied to predict function for S.cerevisiae (i.e.Yeast) genes grouped by complexes [7]. Now, we adapt the framework since we have realized that group annotation problem is very complex to face in a single step [7]. The changes aim to solve gene and protein individual function annotation prediction problem, instead of group annotation. Nevertheless, this MMRF layout can also be considered the ﬁrst phase for the group annotation problem. The complete process could be achieved obtaining ﬁrst annotations for individual group elements using MMRF, and then combining them for group annotations using an alternative method (for example, union or intersection of individual annotations). MMRF preserves the same main properties as the original layout. It is designed by modules for managing the high variability that the functional annotation biological domain entails. This facilitates changing independiently data, criteria and methodology. MMRF uses a multi-relational approach (in representation and learning) for ﬁtting the intrinsic relational structure of gene and protein group data, and for integrating diﬀerent data sources. Figure 1 shows the new MMRF layout oriented to individual protein annotation prediction. Module 2 is now called Selecting annotation where the annotation vocabulary is chosen and assigned to individual gene or protein. The relational knowledge about belonging to speciﬁc biological groups (i.e.metabolic pathways, regulation networks, etc.[6,7]) is handled in module 3.

" #

#

$

% & '

)(

* +

(

!

Fig. 1. A new schema of the Modular Multi-Relational Framework (MMRF). The rectangles represent modules and the ellipses represent data.

70

3

B. Garc´ıa-Jim´enez, A. Ledezma, and A. Sanchis

MMRF Applied to Human Protein Disease Prediction

This section describes the MMRF module instantiations for applying the framework to the Human Protein OMIM Disease Prediction domain. 1.Obtaining individual features. In this application, there are 7 features derived from gene sequence (such as chromosome name and length, or transcript count) and 27 features from protein sequence (including length, positive and negative charge from the sequence, aminoacid composition and whether the protein contains a transmembrane, signal or coiled-coil domain). Also, 5 diﬀerent kinds of protein functional annotations are collected, related with protein family (from Pfam), protein domain (from InterPro), biological process, cellular component and molecular function. The last three come from Gene Ontology (GO), and are only from experimental results, ignoring automated annotation, for avoiding biases induced by overlaps with others annotation sources. The numerical protein sequence features are computed with BioWeka [8] using as input the UniProt aminoacid sequences in FASTA format. Only SwissProt sequences are included, because the remainder (TrEMBL sequences) have not been reviewed by experts. The rest of features are retrieved from Ensembl project, through the BioMart tool [17]. See the module 1 instantiation schema in Supplementary Material. 2.Selecting annotation. The annotation goal is genetic disorders using gene-disease associations from Morbid OMIM [2]. We apply a manual OMIM disorder categorization made by experts [9]. These disease categories have been recently used in other studies [14]. Thus, the 4,927 OMIM disorders 2 are categorized in 23 disease classes based on the aﬀected physiological system. Some of the classes are: neurological, cancer, cardiovascular, inmunological or endocrine disease (see a complete list in Supplementary Material). Therefore, this MMRF application classiﬁes proteins in these general disease categories [9]. However, a simple modiﬁcation in MMRF module 2 could easily build a particular predictor for diseases at lower level, for instance, knowing in which speciﬁc kind of cancer (leukemia, melanoma, breast cancer, etc.) a protein is involved. 3.Retrieving group data. Two sources of group data are included, though it could be easily increased with others, as protein complexes or co-expresion data. The ﬁrst data source consist of protein-protein interaction pairs, retrieved from BioGRID repository (2.0.59 Release) [18], which integrates important interaction databases as MINT, IntAct or HPRD. We select BioGRID pairs from real binary relations identiﬁed by evidences codes Co-crystal structure, Far Western, FRET, PCA and Two-Hybrid. These interactions do not include pairs split oﬀ from N -ary relations. It results in 21,687 proteins with 229,407 interactions among them. The second data source comprises metabolic pathways, which correspond to the 52 top-level human Reactome [15] pathways including 5,128 proteins, on average 159.85 proteins per pathway. See the module 3 instantiation schema in Supplementary Material. 2

From OMIM Morbid Map on November 17th, 2009.

MMRF for Proteome Annotation Applied

71

Data sources collected in modules 1 to 3 use diﬀerent gene or protein identiﬁers. The original identiﬁers are all mapped to Ensembl (gene or protein) IDs using the cross-references from BioMart [17] queries. 4.Transforming to representation language. The knowledge representation language is a subset of ﬁrst-order logic. All the collected data previously described is represented as predicates in Prolog syntax (see Figure 2). Since for humans, we can not assume the simpliﬁcation 1-gene:1-protein, as simpler organism does, the representation language has to handle information level with regard to gene and protein. These levels are related by the 1-gene:N-proteins relation (represented as N binary predicates protein gene/2 per gene). Thus, the diﬀerent features are separately associated to genes (predicates with geneID as key) or to proteins (predicates with protID as key) (see Figure 2). Moreover, the group data has a diﬀerent representation depending on the number of elements in the group. Binary relations are represented as pairs (i.e. ppinteracion pair/2). N-ary relations are represented with one group identiﬁer plus N binary predicates (i.e. protein in pathway/2), where each predicate relates a group element with the group identiﬁer. gene(geneID,name,length,strand,trCount). protein(protID,length,posCharge,negCharge). aa composition(protID,aaID,proportionAA). go annotation bioProcess(protID,goID). ppinteraction pair(protID,protID). protein in pathway(groupID,protID). ...

gene biotype(geneID,bioType). protein class(protID,omimID). protein gene(protID,geneID). transmembrane domain(protID). ncoils domain(protID). pfam domain(protID,pfamID).

Fig. 2. Fragment of the knowledge representation language in proteome disease prediction domain

The instantiation of module 5.Relational Learning consist of applying the algorithm Tilde [3], implemented in the ACE tool, using a multi-class and multi-label learning, inspired by other works [21]. The instantiation of module 6.Interpretation and Analysis consist of evaluating the result with PrecisionRecall curves (PRC). For more details, see a previous MMRF application [7], which shares the same instantiations of modules 5 and 6.

4

Results and Discussion

This section describes the results of predicting human protein diseases with MMRF. The whole data set comprises 6,958 protein-disease annotations, for 5,640 diﬀerent proteins (examples) and 21 diseases (classes). Each protein can be associated with more than one disease, ranged from 1 to 5, in this set. On average, there are 331.3 annotations per disease. There are at least 40 proteins per class (the two classes with less than this minimum have been ignored). On average, there are around 5% positive vs 95% negative examples per class, although the protein class distribution is not equitable (see Supplementary Material). Each of the four majority classes has more than 10% of all annotations.

72

B. Garc´ıa-Jim´enez, A. Ledezma, and A. Sanchis

The background knowledge also includes related proteins without disease associations, but belonging to a metabolic pathway or having an interaction with a disease protein. We compare two conﬁgurations, which diﬀer in module 3 instantiation, it means on group relational data used for learning. The ﬁrst one (a.-Without groups) does not included neither pathway nor protein-protein interaction data. The second conﬁguration (b.-With groups) includes both kind of data from biological groups. In addition, we analize the learning implications of relational knowledge representation for groups. The results shown in Table 1 and Figure 3 come from three folds cross validation experiments. Table 1 shows several quantitative measures and PrecisionRecall curves appear in Figure 3 for the two conﬁgurations. All of them are the average results about overall 21 classes.

Table 1. Quantitative results from human protein disease prediction with MMRF. AU(PRC): Area Under Precision-Recall Curve. MSE: Mean Squared Error. Relational knowledge a) without groups b) with groups AU(PRC): 0.282 0.625 Correlation: 0.290 0.599 MSE: 0.049 0.034

Fig. 3. Precision-Recall curves from human protein disease prediction with MMRF, in diﬀerent conﬁgurations

Table 1 and Figure 3 point out that prediction with group data (conﬁguration “b”, on the right) improves the double upon without groups (conﬁguration “a”, on the left), in both AU(PRC) and correlation. Hence, this comparison asserts that knowledge about proteins belonging to a biological group is very relevant in disease annotation prediction. Figure 4 presents a fragment of a relational decision tree from conﬁguration with group data (b). The ﬁrst tree node (see line 3) determines that ppinteraction pair/2 (a protein-protein interaction relation) is the most discriminative predicate. This fact conﬁrms the relevance of group knowledge to predict annotations. Moreover, in the ﬁrst ’yes’-branch (line 4), the second node includes a typical feature in protein function prediction: the positive charge of protein sequence [12] (variable Y ), partially supporting the model reliability. Besides, in the ﬁrst ’no’-branch (line 11), the most relevant query includes a N:1 relation (predicate protein gene/2 relates a protein with the gene it comes from), emphasizing the high inﬂuence of relational knowledge on the prediction.

MMRF for Proteome Annotation Applied

73

1: class(-A,-B,-C,-D,-E,-F,-G,-H,-I,-J,-K,-L,-M,-N,-O,-P,-Q,-R,-S,-T,-U,-V) 2: [0.011436170212766] 3760.0 3: ppinteraction_pair(A,-W),not(W=A) ? 4: +--yes: [0.0188476036618201] 1857.0 5: | protein(W,-X,-Y,-Z),Y>=0.107506 ? 6: | +--yes: [0.0219123505976096] 1004.0 7: | | ppinteraction_pair(W,W) ? 8: | | +--yes: [0.0569948186528497] 386.0 9: | | | transmembrane_domain(W) ? 10:... 11:+--no: [0.00420388859695218] 1903.0 12: protein_gene(A,-M26),gene(M26,-N26,-O26,-P26,-Q26),O26>=84418 ? 13: +--yes: [0.00981996726677578] 611.0 14: ...

Fig. 4. Fragment of a relation decision tree in conﬁguration with groups

Therefore, the importance of protein-protein interaction and protein-gene relations indicates that Relational Data Mining is essential in this domain. This is because to propositionalize this kind of data would be very complex or resulting in having redundant data. For instance, for protein binary relations, the single attribute-value table should have thousands of Boolean attributes, one per each protein. In addition, it should repeat all the gene features as attributes for all proteins that come from the same gene. Furthermore, attribute-value learning can not represent knowledge or retrieve hypotheses about features of related genes and proteins, as tree fragment in Figure 4 shows.

5

Conclusions and Further Work

This work highlights the relevance of biological group data for annotation prediction, particularly in proteome disease association. Since the most eﬃcient and viable representation of this group knowledge is with relations, relational learning and the Modular Multi-Relational Framework are conﬁrmed as very suitable for solving the proteome annotation problem. This is particularly relevant since the data comes from the integration of multiple up to date biological databases. Besides, the hypotheses learned through Relational Data Mining are mostly unfeasible to achieve in attribute-value learning and it holds the advantage of being readable for biology experts. This work has two main diﬀerences from a previous MMRF application [7]. For the annotation goal, diseases from OMIM morbid are used instead of general functions of GO Slim. Moreover the organism has been changed from yeast to human, which is more complex but more interesting. Thus, the obtained predictor let us select a subset of unknown protein-disease association (the most likely predictions) to be veriﬁed by in-vivo experiments. As further work, many alternatives appear. It would be interesting to make a comparison between this overall classes predictor and 21 independent predictors, one per each disease class. Other possibilities would be related to biological MMRF applications. For instance, including new group data, such as protein

74

B. Garc´ıa-Jim´enez, A. Ledezma, and A. Sanchis

complexes or co-expression data; applying the predictor to annotate unknown proteins; or changing the prediction goal to a diﬀerent annotation ﬁeld, as predicting if a protein belongs to a metabolic pathway. Acknowledgments. This research has been supported by CICYT, TRA 200767374-C02-02 project and by the expert biological knowledge of the Structural Computational Biology Group in Spanish National Cancer Research Centre (CNIO). The authors would like to thank members of Tilde tool developer group in K.U.Leuven for providing their help and many useful suggestions. Supplementary Materials (for online version). They include two schemas about obtaining individual features and retrieving group data, the complete list of 23 disease categories and a ﬁgure showing the protein per disease distribution.

References 1. Al-Shahrour, F., et al.: Babelomics: a systems biology perspective in the functional annotation of genome-scale experiments. Nucl. Acids Res. 34, W472–W476 (2006) 2. Amberger, J., et al.: McKusick’s Online Mendelian Inheritance in Man (OMIM(R)). Nucl. Acids Res. 37, D793–D796 (2009) 3. Blockeel, H., De Raedt, L.: Top-down induction of logical decision trees. Artiﬁcial Intelligence 101(1-2), 285–297 (1998) 4. Clare, A.: Machine learning and data mining for yeast functional genomics. PhD thesis, University of Wales, Aberystwyth (2003) 5. Dennis, G., et al.: DAVID: Database for Annotation, Visualization, and Integrated Discovery. Genome Biology 4(5), P3 (2003) 6. Garc´ıa, B., et al.: Modular Multi-Relational Framework for Gene Group Function Prediction.. In: Online Proceedings ILP (2009) 7. Garc´ıa Jim´enez, B., Ledezma, A., Sanchis, A.: S.cerevisiae complex function prediction with modular multi-relational framework. In: Garc´ıa-Pedrajas, N., Herrera, F., Fyfe, C., Ben´ıtez, J.M., Ali, M. (eds.) IEA/AIE 2010. LNCS, vol. 6098, pp. 82– 91. Springer, Heidelberg (2010) 8. Gewehr, J., et al.: BioWeka extending the Weka framework for bioinformatics. Bioinformatics 23(5), 651–653 (2007) 9. Goh, K., et al.: The human disease network. PNAS 104(21), 8685–8690 (2007) 10. Jensen, J., et al.: Prediction of human protein function according to Gene Ontology categories. Bioinformatics 19(5), 635–642 (2003) 11. Kelso, J., et al.: eVOC: A Controlled Vocabulary for Unifying Gene Expression Data. Genome Research 13(6a), 1222–1230 (2003) 12. Lee, B., et al.: Identiﬁcation of protein functions using a machine-learning approach based on sequence-derived properties. Proteome Science 7(1), 27 (2009) 13. Lee, D., et al.: Predicting protein function from sequence and structure. Nature reviews. Molecular Cell Biology 8(12), 995–1005 (2007) 14. Linghu, B., et al.: Genome-wide prioritization of disease genes and identiﬁcation of disease-disease associations from an integrated human functional linkage network. Genome Biology 10(9), R91 (2009) 15. Matthews, L., et al.: Reactome knowledgebase of human biological pathways and processes. Nucl. Acids Res. 37, D619–D622 (2009)

MMRF for Proteome Annotation Applied

75

16. Pe˜ na-Castillo, L., et al.: A critical assessment of mus musculus gene function prediction using integrated genomic evidence. Genome Biology 9, S2 (2008) 17. Smedley, D., et al.: BioMart-biological queries made easy. BMC Genomics 10 (2009) 18. Stark, C., et al.: BioGRID: a general repository for interaction datasets. Nucl. Acids Res. 34, 535–539 (2006) 19. Trajkovski, I., et al.: Learning relational descriptions of diﬀerentially expressed gene groups. IEEE Transactions on Systems, Man, and Cybernetics 38(1), 16–25 (2008) 20. Tran, T.N., Satou, K., Ho, T.-B.: Using inductive logic programming for predicting protein-protein interactions from multiple genomic data. In: Jorge, A.M., Torgo, L., Brazdil, P.B., Camacho, R., Gama, J. (eds.) PKDD 2005. LNCS (LNAI), vol. 3721, pp. 321–330. Springer, Heidelberg (2005), http://dx.doi.org/10.1007/11564126_33 21. Vens, C., et al.: Decision trees for hierarchical multi-label classiﬁcation. Machine Learning 73(2), 185–214 (2008)

Extending ProbLog with Continuous Distributions Bernd Gutmann1 , Manfred Jaeger2, and Luc De Raedt1 1

Department of Computer Science, Katholieke Universiteit Leuven, Belgium {bernd.gutmann,luc.deraedt}@cs.kuleuven.be 2 Department of Computer Science, Aalborg University, Denmark [email protected]

Abstract. ProbLog is a recently introduced probabilistic extension of Prolog. The key contribution of this paper is that we extend ProbLog with abilities to specify continuous distributions and that we show how ProbLog’s exact inference mechanism can be modiﬁed to cope with such distributions. The resulting inference engine combines an interval calculus with a dynamic discretization algorithm into an eﬀective solver.

1

Introduction

Continuous distributions are needed in many applications for building a natural model. Probabilistic logic programming languages, such as ProbLog and CPLogic [1], have, so far, largely focused on modeling discrete distributions and typically perform exact inference. The PRISM [2] system provides primitives for Gaussian distributions but requires the exclusive explanation property which complicates modeling. On the other hand, many of the functional probabilistic programming languages, such as BLOG [3] and Church [4], can cope with continuous distributions but only perform approximate inference by a Markov Chain Monte Carlo approach. Typical statistical relational learning systems such as Markov Logic and Bayesian Logic Programs have also been extended with continuous distributions. The key contribution of this paper is a simple probabilistic extension of Prolog based on the distribution semantics with both discrete and continuous distributions. This is realized by introducing a novel type of probabilistic fact where arguments of the fact can be distributed according to a continuous distribution. Queries can then be posed about the probability that the resulting arguments fall into speciﬁc intervals. We introduce the semantics of using continuous distributions in combination with comparison operations and show how ProbLog’s inference mechanism, based on Binary Decision Diagrams (BDDs) [5], can be extended to cope with these distributions. The resulting language is called Hybrid ProbLog. Similarly to Hybrid ProbLog, Hybrid Markov Logic Networks (HMLNs) [6] aim at integrating Boolean and numerical random variables in a probabilisticlogic modeling framework. The kind of modeling supported by HMLNs is quite diﬀerent in nature from the kind of modeling for which Hybrid ProbLog is designed. In an HMLN, one deﬁnes equations that function as soft constraints for P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 76–91, 2011. c Springer-Verlag Berlin Heidelberg 2011

Extending ProbLog with Continuous Distributions

77

relationships among numerical and logical variables. For example, one could express that the temperature on day d is typically around 20◦ Celsius using the weighted equality w temperature(d) = 20, where larger weights w lead to a larger penalty for deviations of temperature(d) from 20. All weighted formulae containing temperature(d), together, implicitly deﬁne a probability distribution for the random variable temperature(d) due to HMLN semantics. However, one cannot directly specify this distribution to be Gaussian with, for example, mean 20 and standard deviation 5. No exact inference methods have been developed for HMLNs. It is also instructive to compare Hybrid ProbLog with Hybrid Bayesian Networks [7]. Apart from one being a logical-relational, and the other a purely propositional framework, there is also a key diﬀerence in the interaction between continuous and discrete random variables permitted. In Hybrid Bayesian Networks, the distributions of continuous variables (usually Gaussian) are typically conditioned on discrete variables, but continuous variables cannot be parents of discrete ones. In Hybrid ProbLog this order is reversed: continuous variables are at the roots of the directed model, and the discrete (Boolean) variables are conditioned on the continuous ones. Thus, Hybrid ProbLog provides modeling capabilities and exact inference procedures that, for the propositional case, are in some sense complementary to Hybrid Bayesian networks. This paper has three main contributions. (1) An extension of ProbLog with continuous distributions, (2) formal study of its semantics, and (3) an eﬃcient inference algorithm based on dynamic discretization. The rest of this paper is organized as follows. Section 2 reviews basic concepts from ProbLog. Section 3 introduces the syntax and semantics of Hybrid ProbLog. Section 4 describes our exact inference algorithm. Before concluding, we evaluate the algorithm in Section 5.

2

ProbLog

ProbLog [8] is a recent probabilistic extension of Prolog. A ProbLog theory T = F ∪ BK consists of a set of labeled facts F = {p1 :: f1 , · · · , pn :: fn } and a set of deﬁnite clauses BK that express the background knowledge. The facts pj :: fj in F are annotated with a probability pj stating that fj θ is true with probability pj for all substitutions θ grounding fj . The resulting facts fj θ are called atomic choices and represent random variables; they are assumed to be mutually independent. It is not allowed to use a probabilistic fact in the heads of clauses in BK. Let Θ = {θj1 , . . . θjij |j = 1, . . . n} be a ﬁnite1 set of possible substitutions for the variables in the probabilistic facts where ij is the number of substitutions for fact j, then a ProbLog theory describes a probability distribution over Prolog programs L ⊆ LF where LF = F Θ and F Θ denotes the set of all possible ground instances of facts in F : PP (L|F ) := pj (1 − pj ) . (1) fj θjk ∈L 1

fj θjk ∈LF \L

Throughout the paper, we assume that F Θ is ﬁnite, but see [2] for the inﬁnite case.

78

B. Gutmann, M. Jaeger, and L. De Raedt

The success probability of a query q then is Ps (q|T ) := P (L|F ) .

(2)

L⊆LF : L∪BK|=q

ProbLog also deﬁnes a probability distribution Pw over possible worlds, that is Herbrand interpretations. Each total choice L ⊆ LF can be extended to a possible world by computing the least Herbrand model of L. This possible world is assigned the probability Pw = P (L|F ). Thus a set of total choices represents an assignment of truth-values to all atomic choices.

3

Hybrid ProbLog

A Hybrid ProbLog theory T = F ∪ F c ∪ BK is a ProbLog theory extended by a set of continuous probabilistic facts2 of the form c F c = {(X1 , φ1 ) :: f1c , · · · , (Xm , φm ) :: fm }

where Xi is a Prolog variable, appearing in the atom fic and φi is a density function. The fact (X, gaussian(2, 8)) :: temp(D, X), for example, states that the temperature for day D is Gaussian-distributed with mean 2 and standard deviation 8. The syntax allows one to specify multivariate distributions, i.e., ((X, Y), gaussian([1, 0], [[1, 0.5], [0.5, 1]]) :: f(X, Y) . In this paper, however, we restrict ourselves to the univariate case. From a user’s perspective, continuous facts are queried like normal Prolog facts, and the value of the continuous variable is instantiated with a value drawn from the underlying distribution. Hybrid ProbLog adds the following predicates to the background knowledge of the theory to process values stemming from continuous facts: – below(X,c) succeeds if X is a value from a continuous fact, c is a number constant, and X < c – above(X,c) succeeds if X is a value from a continuous fact, c is a number constant, and X > c – ininterval(X,c1 ,c2 ) succeeds if X is a value from a continuous fact, c1 and c2 are number constants, and X ∈ [c1 , c2 ] Uniﬁcation with number constants is not supported for the values of continuous facts, i.e. the call temp(d, 0) fails. But one can express the same using temp(d, T), ininterval(T, 0, 0) . Similarly, standard Prolog comparison operators are not supported and one has to use the corresponding comparison predicate from the background knowledge: temp(d1, T), T > 5 2

We denote facts, values, and substitutions related to the continuous part of T by the superscript c .

Extending ProbLog with Continuous Distributions

79

has to be written as temp(d1, T), above(T, 5) . Arithmetic expressions are not supported, i.e the query temp(d1, T), Fahrenheit is 9/5 ∗ X + 32, Fahrenheit > 41 is illegal. There is no equivalent predicate for that in the background knowledge. Also, the comparison of two continuous facts is not supported, i.e. the query temp(d1, T1), temp(d2, T2), above(T1, T2) is illegal. The latter restriction, in particular, prevents two or more continuous variables getting “coupled”, i.e. there is a dependency that requires one to always consider the values of both variables simultaneously. Furthermore, disallowing arithmetic expressions ensures that one can partition the underlying Rn space into simple intervals rather than into complex-shaped continuous sets. Despite being fairly restrictive, our framework allows for non-trivial programs. Example 1 (Gaussian Mixture Model). The following theory encodes a Gaussian mixture model. The atom mix(X) can be used later on as if it were a simple continuous fact, which means the variable X can be processed using above/2, below/2 and ininterval/3. 0.6::heads. (X, gaussian(0, 1))::g(X).

tails :- problog not(heads). mix(X) :- heads, g(X).

(X, gaussian(5, 2))::h(X).

mix(X) :- tails, h(X).

The predicate problog not/1 is provided by the ProbLog inference engine. It allows one to negate an atom, similar to Prolog’s \+, but can only be applied on ground probabilistic facts. The following theory shall be used as running example throughout the paper to deﬁne the semantics of Hybrid Problog and to explain the inference algorithm. Example 2 (Weather). This theory models weather during winter time. The background knowledge states that a person catches a cold when the temperature is below 0◦ Celsius or when it is colder than 5◦ Celsius while it rains. 0.8::rain. (T, gaussian(2, 8))::temp(T).

catchcold :- rain, temp(T), below(T, 5). catchcold :- temp(T), below(T, 0).

The semantics of Hybrid ProbLog theory T = F ∪F c ∪BK is given by probability distributions over subsets of the facts fi (called subprograms), and over sample values for the numeric variables in the continuous facts fic (called continuous subprograms). The subprograms L ⊆ LF are distributed as in ProbLog (cf. Equation (1)), and the continuous subprograms are distributed as described in Section 3.1. Combining both gives one the success probability of queries in a Hybrid ProbLog theory as described in Section 3.2.

80

3.1

B. Gutmann, M. Jaeger, and L. De Raedt

Distribution Over Continuous Subprograms

c c , . . . θji Let Θc = {θj1 |j = 1, . . . , m} be a ﬁnite set of possible substitutions j for the non-numeric variables in the continuous facts (Xj , φj ) :: fjc where ij c is the number of substitutions for fact j. Each substitution instance fjc θjk is associated with a random variable Xjk with probability distribution φj . The Xjk are assumed to be independent. Let X denote the |Θc |-dimensional vector of the random variables, and f (x) their joint density function. A sample value c x for X deﬁnes the continuous subprogram Lx := {fjc θjk {Xjk ← xjk } | j = 1, . . . , m; k = 1, . . . ij } where {Xjk ← xjk } is the substitution of Xjk by xjk .

Example 3 (Continuous Subprogram). Consider the following set of continuous facts where the second fact is non-ground. That is, one can obtain several ground instances where each instance has a continuous value drawn independently from the same distribution. (X, gaussian(1, 2)) :: h(X).

(X, gaussian(4, 3)) :: f(X, Y).

c c c = ∅, θ2,1 = {Y ← a}, θ2,2 = {Y ← b} When one applies the substitutions θ1,1 together with the point x1,1 = 0.9, x2,1 = 2.3, x2,2 = 4.2, one obtains the continuous subprogram Lx = {h(0.9), f(2.3, a), f(4.2, b)}.

The joint distribution of X thus deﬁnes a distribution over continuous subc , bθ c ] × . . . × programs. Speciﬁcally, for a |Θ c |-dimensional interval I = [aθ11 11 c c [aθmi , b ] (which may also be open or half-open in every dimension), one θmi m m obtains the probability of the set of continuous subprograms with continuous parameters in I: bθc

bθc

PP (X ∈ I|F c ) :=

11

mim

··· aθc

11

f (x) dx

(3)

aθ c

mim

Example 4 (Joint Density). In Example 3, the joint density function is f (x) = f (x1,1 , x2,1 , x2,2 ) = ϕ1,2 (x1,1 ) × ϕ4,3 (x1,2 ) × ϕ4,3 (x2,2 ) where ϕμ;σ is the density of a normal distribution N (μ, σ). 3.2

Success Probabilities of Queries

The success probability Ps (q) of a query q is the probability that q is provable in L ∪ Lx ∪ BK, where L is distributed according to (1), and x according to f (x) respectively. The key to computing success probabilities is the consideration of admissible intervals, as introduced in the following deﬁnition. c

Definition 1. An interval I ⊆ R|Θ | is called admissible for a query q and a theory T = F ∪ F c ∪ BK iﬀ (4) ∀x, y ∈ I, ∀L ⊆ LF : L ∪ Lx ∪ BK |= q ⇔ L ∪ Ly ∪ BK |= q

Extending ProbLog with Continuous Distributions

81

If (4) holds, we can also write L ∪ LI ∪ BK |= q. c A partition A = I1 , I2 , . . . , Ik of R|Θ | is called admissible for a query q and a theory T iﬀ all Ii are admissible intervals for q and T . In other words, an admissible interval I is “small enough” such that the values of the continuous variables, as long as they are in I, do not inﬂuence the provability of q. Within an admissible interval, the query either always fails or always succeeds for any sampled subset L ⊆ LF of probabilistic facts. Example 5 (Admissible Intervals). Consider the Hybrid ProbLog theory consisting out of a single continuous fact: (X, gaussian(1, 2)) :: h(X) For the query h(X), ininterval(X, 5, 10), the interval [0, 10] is not admissible in this theory. The reason is, that for x = 4 ∈ [0, 10] the query fails but for x = 6 ∈ [0, 10] it succeeds. The intervals [6, 9), [5, 10], or (−∞, 5), for example, are all admissible. Note, that the inference engine allows one to evaluate conjunctive queries and that the predicate ininterval/3 is automatically added to the background knowledge. Definition 2 (Discretized Theory). Let T = F ∪F c ∪BK be a Hybrid ProbLog theory, then the discretized theory TD is deﬁned as F ∪ {f c {X ← f c } | (X, φ) :: f c ∈ F c } ∪ BK ∪ {below(X, C), above(X, C), ininterval(X, C1, C2)} where f c {X ← f c } is the atom resulting from substituting the variable X by the term f c . The substitutions simplify the inference process. Whenever a continuous variable is used in a comparison predicate, the variable will be bound to the original continuous fact. Therefore, one can use a standard proof algorithm without keeping track of continuous variables. The discretized theory still contains probabilistic facts if F is not empty, thus it is a ProbLog theory. Deﬁnition 2 allows one to merge the inﬁnite number of proofs, which every Hybrid ProbLog theory has, into a potentially ﬁnite number of proofs. This property is needed to compute the admissible intervals eﬃciently. Example 6 (Proofs in the discretized theory). The discretized theory TD for Example 2 is 0.8::rain. temp(temp(T)).

catchcold :- rain, temp(T), below(T, 5). catchcold:- temp(T), below(T, 0).

below(X, C).

above(X, C).

ininterval(X, C1, C2).

The discretized theory contains two proofs for the query catchcold. For each proof, one can extract

82

B. Gutmann, M. Jaeger, and L. De Raedt

– fi the probabilistic facts used in the proof – ci the continuous facts used in the proof – di the comparison operators used in the proof The proofs of catchcold can be characterized by: f1 = {rain}

c1 = {temp(temp(T))}

d1 = {below(temp(T), 5)}

f2 = ∅

c2 = {temp(temp(T))}

d2 = {below(temp(T), 0)}

It is possible, though not in Example 6, that the same continuous fact is used by several comparison operators within one proof, i.e. fi = {below(f(X), 10), above(f(X), 0)}. In such cases, one has to build the intersection of all intervals to determine the interval in which all comparison operators succeed, i.e. fi = {ininterval(f(X), 0, 10)}. If that intersection is empty, the proof will fail in the original non-discretized theory. Building the intersections can also be interleaved with proving the goal. The following theorem guarantees that an admissible partition exists for each query which has ﬁnitely many proofs in the discretized theory. Theorem 1. For every theory T , every query q that has only ﬁnitely many proofs in TD , and all ﬁnite sets of possible substitutions for the probabilistic c facts and the continuous facts Θ, Θc , there exists a ﬁnite partition of R|Θ |that is admissible for T and q. Proof. This follows from the fact that conditions deﬁned by below/2, above/2, and ininterval/3 are satisﬁed by intervals of sample values, and ﬁnite combinations of such conditions, which may appear in a proof, still deﬁne intervals.

Algorithm 2 can be used to ﬁnd admissible partitions. The algorithm has to be modiﬁed as described in Section 4 to respect interval endpoints. Given an admissible partition A one obtains the success probability of a query q as follows: PP (L|F ) · PP (X ∈ I|F c ) (5) Ps,A (q|T ) := L⊆LF

I∈A: L∪LI ∪BK|=q

The following theorem shows that the values of Ps are independent of the partition A and therefore we can write Ps (q|T ) instead of Ps,A (q|T ). Theorem 2. Let A and B be admissible partitions for the query q and the theory T then Ps,A (q|T ) = Ps,B (q|T ). Proof. Proven directly, by showing that for two admissible partitions one can construct a third partition that returns the same success probability. Using the deﬁnition for the success probability (5) we get: PP (L|F ) · PP (X ∈ I|F c ) (6) Ps,A (q|T ) := L⊆LF

Ps,B (q|T ) :=

L⊆LF

I∈A: L∪LI ∪BK|=q

I∈B: L∪LI ∪BK|=q

PP (L|F ) · PP (X ∈ I|F c )

(7)

Extending ProbLog with Continuous Distributions

83

Since A and B are both ﬁnite, one can construct a partition C such that it subsumes both A and B, that is ∀I ∈ A : ∃I1 , . . . , In ∈ C : I = I1 ∪ . . . ∪ In and ∀I ∈ B : ∃I1 , . . . , In ∈ C : I = I1 ∪ . . . ∪ In Because A is admissible and by construction of C, we can represent any summand in (6) as a sum over intervals in C. That is, for each L ⊆ LF and each I ∈ A there exist I1 , . . . , In ∈ C such that PP (L|F ) · PP (X ∈ I|F c ) =

n

PP (L|F ) · PP (X ∈ Ii |F c ) .

(8)

i=1

Because A is a partition and by construction of C, the intervals needed to cover I ∈ A are disjoint from the intervals needed to cover I ∈ A if I = I . Therefore PP (L|F )·PP (X ∈ I|F c ) = PP (L|F )·PP (X ∈ I|F c ) (9) I∈A: L∪LI ∪BK|=q

I∈C: L∪LI ∪BK|=q

for any subprogram L ⊆ LF . From (9) and the deﬁnition of the success probability (5) follows Ps,A (q|T ) = Ps,C (q|T ) . Similarly, one can show that Ps,B (q|T ) = Ps,C (q|T ) .

Theorem 1 and 2 guarantee that the semantics of Hybrid ProbLog, i.e. the fragment that restricts the usage of continuous values, is well-deﬁned. The imposed restrictions provide a balance between expressivity and tractability. They allow one to discretize the space Rn of possible assignments to the continuous facts in multidimensional intervals such that the actual values within one interval do not matter. In turn, this makes eﬃcient inference algorithms possible. Comparing two continuous values against each other would couple them. This would require a more complicated discretization of Rn in the form of polyhedra which are harder to represent and to integrate over. Allowing arbitrary functions to be applied on continuous values, eventually, leads to a fragmentation of the space in arbitrary sets. This makes exact inference virtually intractable.

4

Exact Inference

In this section we present an exact inference algorithm for Hybrid ProbLog. Our approach generalizes De Raedt et al.’s BDD algorithm [8] and generates a BDD [5] that is evaluated by a slight modiﬁcation of the original algorithm. The pseudocode is shown in Algorithm 1, 2 and 3. In the remainder of this section, we explain the inference steps on Example 2 and calculate the success probability of the query catchcold.

84

B. Gutmann, M. Jaeger, and L. De Raedt

Algorithm 1. The inference algorithm collects all possible proofs and partitions the Rn space according to the constraints imposed by each proof. The intermediate variables fu and cu are superﬂuous and have been added to simplify the explanations in this section. 1: function SuccessProb(query q, theory T ) 2: {(fi , ci , di )}1≤i≤m ← FindAllProofs(T, q) Backtracking in Prolog 3: for cθ ∈ ∪1≤i≤m ci do Iterate over used ground continuous facts 4: Acθ ←CreatePartition({d1 , . . . , dm }) 5: {bcθ,I }I∈Acθ ←CreateAUXBodies(Acθ ) 6: end for 7: u←0 # disjoint proofs 8: for i = 1, 2, . . . , m do Go over all proofs 9: (ˆ c1 θˆ1 , . . . , cˆt θˆt ) ← ci All cont. facts of proof i (this simpliﬁes notation) 10: (dˆ1 , . . . , dˆt ) ← di Intervals in proof i (this simpliﬁes notation) 11: for (I1 , . . . , It ) ∈ Acˆ1 θˆ1 × · · · × Acˆt θˆt do Go over all possible intervals 12: if (d1 ∩ I1 = ∅) ∧ . . . ∧ (dt ∩ It = ∅) then 13: u←u+1 Add one more disjoint proof 14: fu ← fi Probabilistic facts stay the same 15: cu ← ci Continuous facts stay the same 16: du ← {dom(ˆ c1 θˆ1 ) = I1 , . . . , dom(ˆ ct θˆt ) = It } Domains are adapted 17: fu ← fi ∪ {bcθ,I |cθ ∈ cu , I ∈ du } Add aux. bodies to the facts 18: end if 19: end for 20: end for 21: BDD ←GenerateBDD( 1≤i≤u f ∈f f ) cf. [9] i 22: return Prob(root(BDD)) cf. [8] 23: end function

1. All proofs for catchcold are collected by SLD resolution (Line 2 in Algorithm 1). f1 = {rain} f2 = ∅

c1 = {temp(T)} c2 = {temp(T)}

d1 = {T ∈ (−∞, 5)} d2 = {T ∈ (−∞, 0)}

Each proof is described by a set of probabilistic facts fi , a set of continuous facts ci , and an interval for each continuous variable in ci . When a continuous fact is used within a proof, it is added to ci and the corresponding variable X is added to di with X ∈ (−∞, ∞). When later on above(X,c1 ) is used in the same proof, the interval I stored in di is replaced by I ∩ (c1 , ∞), similarly for below(X,c2 ) it is replaced by I ∩ (−∞, c2 ), and for ininterval(X, c1, c2 ) it is replaced by I ∩ [c1 , c2 ], 2. We partition R1 because one continuous fact is used. The loop in Line 3 of Algorithm 1 iterates over (∪1≤i≤m ci ) = {temp(T)}. When calling the function CreatePartition({d1 , d2 }) (cf. Algorithm 2) we obtain the admissible partition {(−∞, 0), [0, 5), [5, ∞)} which is used to disjoin the proofs with respect to the continuous facts (Line 8-20 in Algorithm 1):

Extending ProbLog with Continuous Distributions

85

Algorithm 2. This function returns a partition of R by creating intervals touching the given intervals. Partitions of Rn can be obtain by building the cartesian product over the partitions for each dimension. This is possible due to the restrictions imposed in Section 3. 1: function CreatePartition(Set of intervals D = {d1 , . . . dm }) 2: C← m lowi and highi are interval endpoints of di i=1 {lowi , highi } 3: C ← C ∪ {−∞, ∞} add upper and lower limit of R 4: (c1 , . . . , ck ) ←SortAndIgnoreDuplicates(c) 5: Result ← { (−∞, c2 ], (ck−1 , ∞) } c1 = −∞ and ck = ∞ 6: for i = 2, . . . , k − 1 do 7: Result ← Result ∪ { (ci−1 , ci ] } 8: end for 9: return Result 10: end function

f1 = {rain} f2 = {rain}

c1 = {temp(T)} c2 = {temp(T)}

d1 = {T ∈ (−∞, 0)} d2 = {T ∈ [0, 5)}

f3 = ∅

c3 = {temp(T)}

d3 = {T ∈ (−∞, 0)}

3. We create one auxiliary fact per continuous fact and interval. They are dependent, i.e. temp(T)[−∞,0) and temp(T)[0,5) cannot be true at the same time. We have to make the dependencies explicit by adding, conceptually, the following clauses to the theory and replacing calls to continuous facts and background predicates by the bodies bcθ,I : call temp(T)(−∞,0) :- temp(T)(−∞,0) call temp(T)[0,5) :- ¬temp(T)(−∞,0) , temp(T)[0,5) call temp(T)[5,∞) :- ¬temp(T)(−∞,0) , ¬temp(T)[0,5) , temp(T)[5,∞) Only one of the clauses can be true at the same time. The bodies encode a linear chain of decisions. The probability attached to an auxiliary fact temp(T)[l,h) is the conditional probability that the sampled value of T is in the interval [l, h) given it is not in (−∞, l) ⎡ h ⎤ ⎡ ⎤−1 l P temp(T)[l,h] := ⎣ N (2, 8, x) dx⎦ · ⎣1 − N (2, 8, x) dx⎦ l

(10)

−∞

where N is the density of the Gaussian speciﬁed for temp/1 in the program. This encodes a switch (cf. [11]) such that the success probability of h call temp(T)[l,h] is exactly l N (2, 8, x) dx. To evaluate the cumulative density function, we use the function Phi as described in [10]. If we want to use any other distribution, we have to only replace the evaluation function of the

86

B. Gutmann, M. Jaeger, and L. De Raedt

Algorithm 3. To evaluate the BDD we run a modiﬁed version of De Raedt et al.’s algorithm that takes the conditional probabilities for each continuous node into account. For Gaussian-distributed continuous facts we use the function h Phi [10] to evaluate li i N (x, μi , σi ) dx which performs a Taylor approximation of the cumulative density function (CDF). If the program uses distributions other than Gaussians, the user has to provide the corresponding CDF. 1: function Prob(node n) 2: if n is the 1-terminal then return 1 3: if n is the 0-terminal then return 0 4: Let h and l be the high and low children of n 5: ph ← Prob(h) 6: pl ← Prob(l) 7: if n is a continuous node with attached interval [a, b] and density φn then −1 ln h 8: p ← lnn φn (x) dx · 1 − −∞ φn (x) dx 9: else 10: p ← pn the probability attached to the fact in the ProbLog program 11: end if 12: return p · ph + (1 − p) · pl 13: end function

density, as all the rest of the algorithm does not depend on the particular distribution. Adding the bodies of the auxiliary clauses to fi yields the ﬁnal set of proofs (Line 17 in Algorithm 1): f1 = {rain, temp(T)(−∞,0) } f2 = {rain, ¬temp(T)(−∞,0) , temp(T)[0,5) } f3 = {temp(T)(−∞,0) } The proofs are now disjoint with respect to the continuous facts. That is, either the intervals for continuous facts are disjoint or identical. With respect to the probabilistic facts, they are not disjoint and summing up the probabilities of all proofs would yield a wrong result. One would count the probability mass of the overlapping parts multiple times [8]. 4. To account for that, we translate the proofs into a Boolean expression in disjunctive normal form (cf. Line 21 in Algorithm 1) and represent it as BDD (cf. Figure 1). This step is similar to ProbLog’s inference mechanism rain ∧ temp(T)(−∞,0) ∨ rain ∧ ¬temp(T)(−∞,0) ∧ temp(T)[0,5) ∨ temp(T)(−∞,0) 5. We evaluate the BDD with Algorithm 3 and get the success probability of catchcold. This is a slight modiﬁcation of De Raedt et al.’s algorithm (cf. [8,9] for the details) that takes into account the continuous nodes.

Extending ProbLog with Continuous Distributions

⎛ p =⎝

temp(T)(−∞,0)

87

⎞⎛

⎞ −1 −∞ N (x, 2, 8) dx⎠ ⎝1 − N (x, 2, 8) dx)⎠

0

−∞

−∞

≈0.401 1

Prob =1 · 0.401 + 0.327 · (1 − 0.401) ≈ 0.597

0

rain

p =0.8 Prob =0.409 · 0.8 + 0 · (1 − 0.8) ≈ 0.327

1

0 ⎛ p =⎝

temp(T)[0,5) 1

1

⎞⎛ N (x, 2, 8) dx⎠ ⎝1 −

0

0

⎞−1 N (x, 2, 8) dx)⎠

−∞

≈0.409

0

Prob = 1

5

Prob =1 · 0.409 + 0 · (1 − 0.409) ≈ 0.409 0

Prob = 0

Fig. 1. This BDD [5] encodes all proofs of catchcold in the theory from Example 2. The dashed boxes show the intermediate results while traversing the BDD with Algorithm 3. The success probability of the query is returned at the root and is 0.597.

The function CreatePartition (cf. Algorithm 2) does not necessarily return an admissible partition as it ignores the interval endpoints by creating right-open intervals. For instance, if one obtains two proofs which impose as constraint the intervals [1, 2] and [2, 3), the minimal admissible partition is {(−∞, 1), [1, 2), [2, 2], (2, 3), [3, ∞)} . The function CreatePartition, however, returns the inadmissible partition {(−∞, 1), [1, 2), [2, 3), [3, ∞)} . With respect to the interval [2, 3), the ﬁrst proof succeeds for x = 2 but fails for any other value in [2, 3) – which is not allowed for admissible intervals (cf. Deﬁnition 1). Though, when calculating the success probability, one can ignore interval h endpoints. Since the calculation involves integrals of the form li i φ(x) dx, it is irrelevant whether intervals are open or closed (cf. Equation (10)). Also, an integral over a single point interval has value 0. However, when one wants to know whether there is a proof with speciﬁc values for some or all continuous facts, one has to be precise about the interval endpoints

88

B. Gutmann, M. Jaeger, and L. De Raedt

f(Val2, 2) 1

1 2 1 4

1 3 1 5

0

0

11 1 54 3

1 2

1 f(Val1, 1)

Fig. 2. The query s(5, 2) succeeds, if both values f(Val1, 1) and f(Val2, 2) lie in one of the intervals [0, 11 ], [0, 12 ], . . ., [0, 15 ]. These areas correspond to the thick-lined squares starting at (0, 0). Since they overlap, one has to partition the space R2 in order to disjoin the proofs. Due to the restrictions of Hybrid ProbLog program, i.e., continuous variables cannot be compared against each other, one can obtain an admissible partition for each dimension independently. Algorithm 2 returns the partitions shown by the dotted lines. The horizontal lines partition the space of f(Val2, 2) and the vertical the space of f(Val1, 1).

and use a modiﬁed algorithm. Admissibility can be ensured, for instance, by creating for each pair of constants the open interval (li , hi ) and the single point interval [li , hi ]. For the former example this is {(−∞, 1), [1, 1], (1, 2), [2, 2], (2, 3), [3, 3], (3, ∞)} .

5

Experiments

We implemented Hybrid ProbLog in YAP 6.0.7 and set up experiments to answer the question How does the inference algorithm (cf. Algorithm 1) scale in the size of the partitions and in the number of ground continuous facts? In domains where exact inference is feasible, the number of continuous facts and comparison operations is typically small compared to the rest of the theory. Our algorithm is an intermediate step between SLD resolution and BDD generation. Therefore, it is useful to know how much the disjoining operations cost compared to the other inference steps. We tested our algorithm on the following theory: (Val, gaussian(0, 1)) :: f(Val, ID). s(Consts, Facts) :- between(1, Facts, ID), between(1, Consts, Top), High is Top/Consts, f(Val, ID), ininterval(Val, 0, High).

Extending ProbLog with Continuous Distributions

89

1200 SLD Resolution Disjoin BDD Script BDD total

1000

time [ms]

800 600

400

200

0 0

10

20

30

40

50

60

70

80

90

100

number of constants Fig. 3. Runtimes for calculating the success probability of s(Consts, Facts) for varying the number of constants s(1, 1), · · · s(100, 1). As the graphs show, most of the time is spent on disjoining the proofs, that is partitioning the domains. The BDD time stays more or less constant, this is due to the fact that the resulting Boolean expression, i.e. ¬s(Val, 1)(−∞,0) ∧ s(Val, 1)[0, 1 ) ∨ s(Val, 1)[ 1 , 1 ) ∨ . . . ∨ s(Val, 1)[ 1 ,1) , is rather n n n−1 2 simple. This can be detected and exploited by the BDD package.

The query s(Consts, Facts) has Consts × Facts many proofs where both arguments have to be positive integers. The ﬁrst argument determines the number of partitions needed to disjoin the proofs with respect to the continuous facts and the second argument determines how many continuous facts are used. The query s(5, 2), for instance, uses two continuous facts, f(Val1, 1) and f(Val2, 1), and compares them to the intervals [0, 1], [0, 12 ], · · · [0, 15 ]. Figure 2 shows the resulting partitioning when proving the query s(5, 2). In general, one obtains (Consts + 1)Facts many partitions of the space RFacts . The success probability of s(Consts, Facts) is independent of Consts. That is, for ﬁxed Facts and any c1 , c2 ∈ N Ps (s(c1 , Facts)|T ) = Ps (s(c2 , Facts)|T ) We ran two series of queries3 . First, we used one continuous fact and varied the number of constants from 1 to 100. As the graph in Figure 3 shows, the disjoin 3

The experiments were performed on an Intel Core 2 Quad machine with 2.83GHz and 8GB of memory. We used the CUDD package for BDD operations and set the reordering heuristics to CUDD REORDER GROUP SIFT. Each query has been evaluated 20 times and the runtimes were averaged.

90

B. Gutmann, M. Jaeger, and L. De Raedt 100000 10000

time [ms]

1000 100 10 SLD Resolution Disjoin BDD Script BDD total

1 0.1 0.01 0

10

20

30

40

50

60

70

80

90

100

number of ground continuous facts Fig. 4. Runtimes for calculating the success probability of s(Consts, Facts) for varying the number of dimensions s(5, 1), . . . , s(5, 100). In this setting, most of the time is spent in the BDD package, that is building the BDD based on the script and traversing it. The runtime for our disjoin operation grows only linearly. This is due to the fact that the partitions of Rn can be factorized into each dimensions because we do not allow comparisons between two continuous variables.

operation – that is ﬁnding all partitions, generating the auxiliary bodies and rewriting the proofs – runs in O(Consts2 ) when everything else stays constant. In this case, due to compression and pruning operations during the BDD script generation [9] (the input for the BDD package), building and evaluating the BDD runs in quasi-linear time. In the second run, we varied the number of continuous facts by evaluating the queries s(5, 1), · · · , s(5, 100). As Figure 4 shows, our algorithm (depicted by the Disjoin graph) runs in linear time. The runtime for the BDD operations grows exponentially due to the reordering heuristics used by the BDD package.

6

Conclusions and Future Work

We extended ProbLog with continuous distributions and introduced an exact inference algorithm. The expressivity has been restricted to make inference tractable. Possible directions for future work include comparisons between two continuous facts and applying functions on continuous values. We are working on upgrading existing ProbLog parameter learning methods to continuous facts. ProbLog is available for download at http://dtai.cs.kuleuven.be/problog.

Extending ProbLog with Continuous Distributions

91

Acknowledgments Bernd Gutmann is supported by the Research Foundation-Flanders (FWOVlaanderen). This work is supported by the GOA/08/008 project “Probabilistic Logic Learning”.

References 1. Vennekens, J., Denecker, M., Bruynooghe, M.: Representing causal information about a probabilistic process. In: Fisher, M., van der Hoek, W., Konev, B., Lisitsa, A. (eds.) JELIA 2006. LNCS (LNAI), vol. 4160, pp. 452–464. Springer, Heidelberg (2006) 2. Sato, T.: A statistical learning method for logic programs with distribution semantics. In: Sterling, L. (ed.) Proceedings of the Twelfth International Conference on Logic Programming (ICLP 1995), pp. 715–729. MIT Press, Cambridge (1995) 3. Milch, B., Marthi, B., Russell, S.J., Sontag, D., Ong, D.L., Kolobov, A.: Blog: Probabilistic models with unknown objects. In: Kaelbling, L.P., Saﬃotti, A. (eds.) IJCAI 2005: Proceedings of the Nineteenth International Joint Conference on Artiﬁcial Intelligence, Edinburgh, Scotland, UK, July 30-August 5, pp. 1352–1359. Professional Book Center (2005) 4. Goodman, N., Mansinghka, V.K., Roy, D.M., Bonawitz, K., Tenenbaum, J.B.: Church: a language for generative models. In: McAllester, D.A., Myllym¨ aki, P. (eds.) UAI 2008: Proceedings of the 24th Conference in Uncertainty in Artiﬁcial Intelligence, July 9-12, pp. 220–229. AUAI Press, Helsinki (2008) 5. Bryant, R.E.: Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers 35(8), 677–691 (1986) 6. Wang, J., Domingos, P.: Hybrid markov logic networks. In: Fox, D., Gomes, C.P. (eds.) Proceedings of the Twenty-Third AAAI Conference on Artiﬁcial Intelligence, AAAI 2008, July 13-17, pp. 1106–1111. AAAI Press, Menlo Park (2008) 7. Murphy, K.: Inference and learning in hybrid bayesian networks. Technical Report UCB/CSD-98-990, University of Berkeley (1998) 8. De Raedt, L., Kimmig, A., Toivonen, H.: ProbLog: A probabilistic Prolog and its application in link discovery. In: Veloso, M.M. (ed.) IJCAI 2007: Proceedings of the 20th International Joint Conference on Artiﬁcial Intelligence, Hyderabad, India, pp. 2462–2467 (2007) 9. Kimmig, A., Santos Costa, V., Rocha, R., Demoen, B., De Raedt, L.: On the eﬃcient execution of probLog programs. In: Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. LNCS, vol. 5366, pp. 175–189. Springer, Heidelberg (2008) 10. Marsaglia, G.: Evaluating the normal distribution. Journal of Statistical Software 11(5), 1–11 (2004) 11. De Raedt, L., Demoen, B., Fierens, D., Gutmann, B., Janssens, G., Kimmig, A., Landwehr, N., Mantadelis, T., Meert, W., Rocha, R., Santos Costa, V., Thon, I., Vennekens, J.: Towards digesting the alphabet-soup of statistical relational learning. In: Roy, D., Winn, J., McAllester, D., Mansinghka, V., Tenenbaum, J. (eds.) Proceedings of the 1st Workshop on Probabilistic Programming: Universal Languages, Systems and Applications, Whistler, Canada (December 2008)

Multivariate Prediction for Learning on the Semantic Web Yi Huang1, Volker Tresp1 , Markus Bundschus2, Achim Rettinger3 , and Hans-Peter Kriegel2 1

2

Siemens AG, Corporate Technology, Munich, Germany Ludwig-Maximilians-Universit¨at M¨unchen, Munich, Germany 3 Karlsruhe Institute of Technology, Karlsruhe, Germany

Abstract. One of the main characteristics of Semantic Web (SW) data is that it is notoriously incomplete: in the same domain a great deal might be known for some entities and almost nothing might be known for others. A popular example is the well known friend-of-a-friend data set where some members document exhaustive private and social information whereas, for privacy concerns and other reasons, almost nothing is known for other members. Although deductive reasoning can be used to complement factual knowledge based on the ontological background, still a tremendous number of potentially true statements remain to be uncovered. The paper is focused on the prediction of potential relationships and attributes by exploiting regularities in the data using statistical relational learning algorithms. We argue that multivariate prediction approaches are most suitable for dealing with the resulting high-dimensional sparse data matrix. Within the statistical framework, the approach scales up to large domains and is able to deal with highly sparse relationship data. A major goal of the presented work is to formulate an inductive learning approach that can be used by people with little machine learning background. We present experimental results using a friend-ofa-friend data set.

1 Introduction The Semantic Web (SW) is becoming a reality. Most notably is the development around the Linked Open Data (LOD) initiative, where the term Linked Data is used to describe a method of exposing, sharing, and connecting data via dereferenceable Unique Resource Identifiers (URIs) on the Web. Typically, existing data sources are published in the Semantic Web’s Resource Description Framework (RDF), where statements are expressed as simple subject-property-object (s, p, o) triples and are graphically displayed as a directed labeled link between a node representing the subject and a node representing the object (Figure 1). Data sources are interlinked with other data sources in the LOD cloud. In some efforts, subsets of the LOD cloud are retrieved in repositories and some form of logical reasoning is applied to materialize implicit triples. The number of inferred triples is typically on the order of the number of explicit triples. One can certainly assume that there are a huge number of additional true triples which are neither known as facts nor can be derived from reasoning. This might concern both P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 92–104, 2011. c Springer-Verlag Berlin Heidelberg 2011

Multivariate Prediction for Learning on the Semantic Web

93

triples within one of the contributing data sources such as DBpedia1 (intralinks), and triples describing interlinks between the contributing data sources. The goal of the work presented here is to estimate the truth values of triples exploiting patterns in the data. Here we need to take into account the nature of the SW. LOD data is currently dynamically evolving and quite noisy. Thus flexibility and ease of use are preferred properties if compared to highly sophisticated approaches that can only be applied by machine learning experts. Reasonable requirements are as follows: – Machine learning should be “push-button” requiring a minimum of user intervention. – The learning algorithm should scale well with the size of the SW. – The triples and their probabilities, which are predicted using machine learning, should easily be integrated into SPARQL-type querying.2 – Machine learning should be suitable to the data situation on the SW with sparse data (e.g., only a small number of persons are friends) and missing information (e.g., some people don’t reveal private information). Looking at the data situation, there are typically many possible triples associated with an entity (these triples are sometimes called entity molecules or, in our work, statistical unit node set) of which only a small part is known to be true. Due to this large degree of sparsity of the relationship data in the SW, multivariate prediction is appropriate for SW learning. The rows, i.e., data points in the learning matrix are defined by the key entities or statistical units in the sample. The columns are formed by nodes that represent the truth values of triples that involve the statistical units. Nodes representing aggregated information form the inputs. The size of the training data set is under the control of the user by means of sampling. Thereby the data matrix size, and thus also training time, can be made independent or only weakly dependent on the overall size of the SW. For the experiments in this paper we use the friend-of-a-friend (FOAF) data set, which is a distributed social domain describing persons and their relationships in SW-format. Our approach is embedded in a statistical framework requiring the definition of a statistical unit and a population. In our experiments we compare different sampling approaches and analyze generalization on a test set. The paper is organized as follows. In the next section we discuss related work, In Section 3 we discuss how machine learning can be applied to derive probabilistic weights for triples whose truth values are unknown and introduce our approach. In Section 4 we present experimental results using a friend-of-a-friend (FOAF) data set. Finally, Section 5 contains conclusions and outlines further work.

2 Related Work The work on inductive databases [1] pursues similar goals but is focussed on the lessproblematic data situation in relational databases. In [2] the authors describe SPARQLML, a framework for adding data mining support to SPARQL. SPARQL-ML was 1 2

http://dbpedia.org/ SPARQL is a new standard for querying RDF-specific information and for displaying querying results.

94

Y. Huang et al.

Fig. 1. Example of an RDF graph displaying a social friendship network in which the income of a person is an attribute. Resources are represented by circular nodes and triples are represented by labeled directed links from subject node to object node. The diamond-shaped nodes stand for random variables which are in state one if the corresponding triples exist. Nodes representing statistical units (here: Persons) have a darker rim.

inspired by Microsoft’s Data Mining Extension (DMX). A particular ontology for specifying the machine learning experiment is developed. The SRL methods in [2] are ILP-type approaches based on a closed-world assumption (Relational Bayes Classifier (RBC) and Relational Probabilistic Trees (RPT)). This is in difference to the work presented here, which maintains more of an open-world assumption that is more appropriate in the context of the SW. Another difference is that in our work, both model training and statement prediction can be performed off-line, if desired. In this case inferred triples with their associated certainty values can be stored , e.g., in a triple store, enabling fast query execution. Unsupervised approaches (examples that are suitable for the relational SW domain are [3–6]) are quite flexible and interpretable and provide a probability distribution over a relational domain. Although unsupervised approaches are quite attractive, we fear that the sheer size of the SW and the huge number of potentially true statements make these approaches inappropriate for Web-scale applications. Supervised learning, where a model is trained to make a prediction concerning a single random variable typically shows better predictive performance and better scalability. Typical examples are many ILP approaches [7, 8] and propositionalized ILP approaches [9, 10]. Multivariate prediction generalizes supervised learning to predict several variables jointly, conditioned on some inputs. The improved predictive performance in multivariate prediction, if compared to simple supervised learning, has been attributed to the sharing of statistical strength between the multiple tasks, i.e., data is used more efficiently see [11] and citations therein for a review). Due to the large degree of sparsity of the relationship data in the SW, we expect that multivariate prediction is quite interesting for SW learning and we will apply it in the following.

Multivariate Prediction for Learning on the Semantic Web

95

3 Statistical Modeling 3.1 Defining the Sample We must be careful in defining the statistical unit, the population, the sampling procedure and the features. A statistical unit is an object of a certain type, e.g., a person. The population is the set of statistical units under consideration. In our framework, a population might be defined as the set of persons that attend a particular university. For learning we use a subset of the population. In the experimental section we will explore various sampling strategies. Based on the sample, a data matrix is generated where the statistical units in the sample define the rows. 3.2 The Random Variables in the Data Matrix We now introduce for each potential triple a triple node drawn as a diamond-shaped node in Figure 1. A triple node is in state one (true) if the triple is known to exist and is in state zero (false) if the triple is known not to exist. Graphically, one only draws the triple nodes in state one, i.e., the existing triples. We now associate some triples with statistical units. The idea is to assign a triple to a statistical unit if the statistical unit appears in the triple. Let’s consider the statistical unit Jane. Based on the triples she is participating in, we obtain (?personA, typeOf, Person), (Joe, knows, ?personA), and (?personA, hasIncome, High) where ?personA is a variable that represents a statistical unit. The expressions form the random variables (outputs) and define columns in the data matrix.3 By considering the remaining statistical units Jack and Joe we generate the expressions (columns), (?personA, knows, Jane) and (Jack, knows, ?personA). We will not add (Jane, knows, ?personA) since Jane considers no one in the data base to be her friend. We iterate this procedure for all statistical units in the sample and add new expressions (i.e., columns in the data matrix), if necessary. Note that expressions that are not represented in the sample will not be considered. Also, expressions that are rarely true (i.e., for few statistical units) will be removed since no meaningful statistics can be derived from few occurrences. In [12] the triples associated with a statistical unit were denoted as statistical unit node set (SUNS). The matrix formed with the N statistical units as rows and the random variables as columns is denoted as Y . 3.3 Non-random Covariates in the Data Matrix The columns we have derived so far represent truth values of actual or potential triples. Those triples are treated as random variables in the analysis. If the machine learning algorithm predicts that a triple is very likely, we can enter this triple in the data store. We now add columns that provide additional information for the learning algorithm but which we treat as covariates or fixed inputs. First, we derive simplified relations from the data store. More precisely, we consider the expressions derived in the last subsection and replace constants by variables. For 3

Don’t confuse a random variable representing the truth value of a statement with a variable in a triple, representing an object.

96

Y. Huang et al.

example, from (?personA, knows, Jane) we derive (?personA, knows, ?personB) and count how often this expression is true for a statistical unit ?personA, i.e., we count the number of friends of person ?personA. Second, we consider a simple type of aggregated features from outside a SUNS. Consider first a binary triple (?personA, knows, Jane) . If Jane is part of another binary triple, in the example, (?personA, hasIncome, High) then we form the expression (?personA, knows, ?personB) ∧ (?personB, hasIncome, High) and count how many rich friends a person has. A large number of additional features are possible but so far we restricted ourselves to these two types. The matrix formed with the N statistical units as rows and the additional features as columns is denoted as X. After construction of the data matrix we prune away columns in X and in Y which have ones in fewer than percent of all rows, where is usually a very small number. This is because for those features no meaningful statistical analysis is possible. Note that by applying this pruning procedure we reduce the exponential number of random variables to typically a much smaller set. 3.4 Algorithms for Learning with Statistical Units Node Sets In a statistical setting as described above, the statistical unit node set (SUNS) is defined mostly based on local neighborhoods of statistical units. By adding aggregated information derived from the neighborhood, homophily can also be modeled. For instance, the income of a person can be predicted by the average income of this person’s friends. As we will see in the experiments, the resulting data matrices are typically highdimensional and sparse. In this situation, multivariate prediction approaches have been most successful [11]. In multivariate prediction all outputs are jointly predicted such that statistical strength can be shared between outputs. The reason is that some or all model parameters are sensitive to all outputs, improving the estimates of those parameters.4 We apply four different multivariate prediction approaches. First, we utilize a reduced rank penalized regression (RRPP) algorithm to obtain an estimated matrix via the formula dk ˆ Y = Ur diagr UrT Y dk + λ where dk and Ur are derived from a r-rank eigen decomposition of the kernel matrix k K ≈ Ur Dr UrT . Ur is a N × r matrix with r orthonormal columns, diagr dkd+λ is a diagonal matrix containing the r largest eigen values and λ is a regularization parameter. The kernel matrix K can be defined application specifically. Typically, as in the following application, one works with a linear kernel defined by K = ZZ T , where Z = [αX, Y ] is formed by concatenating X and Y and where α is a positive weighting factor.5 4

5

Although the completion is applied to the entire matrix, only zeros —representing triples with unknown truth values— are overwritten. Alternatively, we can define a linear kernel solely based on the input attributes K = XX T , when α → ∞, or solely based on the output attributes K = Y Y T , when α = 0.

Multivariate Prediction for Learning on the Semantic Web

97

Fig. 2. Entity-relationship diagram of the LJ-FOAF domain

Besides RRPP we investigate three other multivariate prediction approaches based on matrix completion, i.e., singular value decomposition (SVD), non-negative matrix factorization (NNMF) [13] and latent Dirichlet allocation (LDA) [14]. All approaches estimate unknown matrix entries via a low-rank matrix approximation. NNMF is a decomposition under the constraints that all terms in the factoring matrices are nonnegative. LDA is based on a Bayesian treatment of a generative topic model. After matrix completion of the zero entries in the data matrix, the entries are interpreted as certainty values that the corresponding triples are true. After training, the models can also be applied to statistical units in the population outside the sample.

4 Experiments 4.1 Data Set and Experimental Setup Data Set. The experiments are based on friend-of-a-friend (FOAF) data. The purpose of the FOAF project [15] is to create a web of machine-readable pages describing people, their relationships, and people’s activities and interests, using W3C’s RDF technology. The FOAF ontology is based on RDFS/OWL and is formally specified in the FOAF Vocabulary Specification 0.916. We gathered our FOAF data set from user profiles of the community website LiveJournal.com7. All extracted entities and relations are shown in Figure 2. In total we collected 32,062 persons and all related attributes. An initial pruning step removed little connected persons and rare attributes. Table 1 lists the number of different individuals (top rows) and their known instantiated relations (bottom rows) in the full triple set, in the pruned triple set and in triples sets in different experiment settings (explained below). The resulting data matrix, after pruning, has 14,425 rows (persons) and 15,206 columns. Among those columns 14,425 ones (friendship attributes) refer to the property knows. The remaining 781 columns (general attributes) refer to general information about age, location, number of blog posts, attended school, online chat account and interest. 6 7

http://xmlns.com/foaf/spec/ http://www.livejournal.com/bots/

98

Y. Huang et al.

setting 1

setting 2

setting 3

setting 4

Fig. 3. Evaluated sampling strategies

Data Retrieval and Sampling Strategies. In our experiments we evaluated the generalization capabilities of the learning algorithms given eight different settings. The first four settings are illustrated in Figure 3. A cloud symbolizes the part of the Web that can effectively be accessed (in our case the data set given in Table 1). Crosses represent persons that are known during the training phase (training set) and circles represent persons with knows relations that need to be predicted. Setting 1 describes the situation where the depicted part of the SW is randomly accessible, meaning that all instances can be queried directly from triple stores. Statistical units in the sample for training are randomly sampled and statements for other randomly selected statistical units are predicted for testing (inductive setting). In this setting, persons are rarely connected by the knows relations. The knows relation in the training and test set is very sparse (0.18%). Setting 2 also shows the situation where statistical units in the sample are randomly selected, but this time the truth values of statements concerning the statistical units in the training sample are predicted (transductive setting). Some instances of the knows relation of the selected statistical units are withheld from training and used for prediction. Prediction should be easier here since the statistics for training and prediction match perfectly. Setting 3 assumes that the Web address of one user (i.e., one statistical unit) is known. Starting from this random user, users connected by the knows relation are gathered by breadth-first crawling and are then added as rows in the training set. The test set is gathered by continued crawling (inductive setting). In this way all profiles are (not necessarily directly) connected and training profiles show a higher connectivity (1.02%) compared to test profiles (0.44%). In this situation generalization can be expected to be easier than in setting 1 and 2 since local properties are more consistent than global ones. Setting 4 is the combination of settings 2 and 3. The truth values of statements concerning the statistical units in the training sample are predicted (transductive setting). Instances of the knows relation are withheld from training and used for prediction. Settings 5-8 use the same set of statistical units as settings 1-4 respectively. The difference is that in settings 1-4 the data matrix only contains friendship relations to persons in the sample whereas in settings 5-8, the data matrix contains friendship relations any persons in the population. In settings 5-8 we remove those users (friendship attributes) who are known by less than ten users (statistical units),

Multivariate Prediction for Learning on the Semantic Web

99

i.e., = 10. We ended up with a large number of ones in the data matrix when compared to settings 1-4. The concrete numbers of the statistical units and the friendship attributes are shown in Person (row) and Person (col) respectively in Table 1. Evaluation Procedure and Evaluation Measure. The task is to predict potential friends of a person, i.e., knows statements. For each person in the data set, we randomly selected one knows friendship statement and set the corresponding matrix entry to zero, to be treated as unknown (test statement). In the test phase we then predicted all unknown friendship entries, including the entry for the test statement. The test statement should obtain a high likelihood value, if compared to the other unknown friendship entries. Here we use the normalized discounted cumulative gain (NDCG) [16] (described in the Appendix) to evaluate a predicted ranking. Benchmark methods. Baseline: Here, we create a random ranking for all unknown triples, i.e., every unknown triple gets a random probability assigned. Friends of friends in second depth (FOF, d=2): We assume that friends of friends of a particular person might be friends of that person too. From the RDF graph point of view the knows relation propagates one step further alongside the existing knows linkages. 4.2 Results In settings 1 and 2 we randomly sampled 2,000 persons for the training set. In addition, in setting 1 we further randomly sampled 2,000 persons for the test set. In setting 3, 4,000 persons were sampled, where the first half was used for training and the second half for testing. Setting 4 only required the 2,000 persons in the training set. In settings 5-8 we followed the same sampling strategies as in settings 1-4 respectively and extracted all users known by the sampled users to form the friendship attributes. In each case, sampling was repeated 5 times such that error bars could be derived. Table 1 reports details of the samples (training set and, if applicable, test set). The two benchmark methods and the four multivariate prediction approaches proposed in Section 3.4 were then applied to the training set. For each sample we repeated the evaluation procedure as described above 10 times. Since NNMF is only applicable in a transductive setting, it was only applied in setting 1, 3, 5 and 7. Moreover, the FOF, d=2 is not applicable in settings 5-8, since it is impossible for many statistical units to access the friends of their friends. Figures 4 and 5 show the experimental results for our FOAF data set. The error bars show the 95% confidence intervals based on the standard error of the mean over the samples. The figures plot the NDCG all score of the algorithms against the number of latent variables in settings 1, 2, 5, 6 in Figure 4 and in settings 3, 4, 7, 8 in Figure 5. The best NDCG all scores of all algorithms in different settings are shown in Table 2, where r indicates the number of latent variables achieving the best scores. First, we observe that the experimental results in settings 5-8 are much better than those in settings 1-4. This can be attributed to the fact that in settings 5-8 columns were pruned more drastically and a more dense friendship pattern was achieved. Another observation is that all four multivariate prediction approaches clearly outperform the benchmark algorithms in all settings, although in settings 1 and 2 NNMF and SVD are only slightly better than FOF, d=2.

2,000 2,000 2,000 2,000 2,000 2,000 320 320 320 329 329 329 118 118 118 5 5 5 4 4 4 5 5 5 7,339 40,786 17,613 0.18% 1.02% 0.44% 1,106 1,172 1,217 747 718 749 246 216 208 1,087 1,168 1,075 715 779 784 1,992 1,994 1,991

setting 1 setting 2 setting 3 training test training test

32,062 14,425 2,000 2,000 - 2,000 2,000 5,673 320 320 320 15,744 329 329 329 4,695 118 118 118 5 5 5 5 4 4 4 4 5 5 5 5 530,831 386,327 7,311 7,339 0.05% 0.19% 0.18% 0.18% 24,368 7,964 1,122 1,106 31,507 5,088 676 747 9,616 1,659 206 246 19,021 8,319 1,134 1,087 10,040 5,287 777 715 31,959 14,369 1,993 1,992

pruned

setting 5 training test

2,000 2,000 2,000 2,000 1,122 1,122 320 320 320 329 329 329 118 118 118 5 5 5 4 4 4 5 5 5 40,786 14,909 16,869 1.02% 0.66% 0.75% 1,172 1,122 1,106 718 676 747 216 206 246 1,168 1,134 1,087 779 777 715 1,994 1,993 1,992

setting 4

setting 7 training test

2,000 2,000 2,000 1,122 1,297 1,297 320 320 320 329 329 329 118 118 118 5 5 5 4 4 4 5 5 5 16,869 41,705 18,595 0.75% 1.61% 0.72% 1,106 1,172 1,217 747 718 749 246 216 208 1,087 1,168 1,075 715 779 784 1,992 1,994 1,991

setting 6 2,000 1,297 320 329 118 5 4 5 41,705 1.61% 1,172 718 216 1,168 779 1,994

setting 8

setting 1

setting 2

Baseline 0.1092 ± 0.0003 0.1092 ± 0.0003 F OF, d = 2 0.2146 ± 0.0095 0.2146 ± 0.0095 NNMF NaN 0.2021 ± 0.0058 r=100 SV D 0.2174 ± 0.0061 0.2325 ± 0.0074 r=150 r=100 LDA 0.2514 ± 0.0049 0.2988 ± 0.0057 r=200 r=200 RRP P 0.2483 ± 0.0018 0.2749 ± 0.0037 r=400 r=400

Method

setting 4

0.1094 ± 0.0001 0.1094 ± 0.0001 0.1495 ± 0.0077 0.1495 ± 0.0077 NaN 0.2983 ± 0.0197 r=150 0.2085 ± 0.0147 0.3027 ± 0.0179 r=200 r=100 0.2288 ± 0.0123 0.3374 ± 0.0117 r=200 r=200 0.2252 ± 0.0049 0.3315 ± 0.0109 r=400 r=400

setting 3

setting 6

0.1213 ± 0.0005 0.1213 ± 0.0005 NaN NaN NaN 0.2864 ± 0.0067 r=150 0.2688 ± 0.0044 0.3176 ± 0.0092 r=150 r=150 0.2640 ± 0.0022 0.3359 ± 0.0079 r=150 r=200 0.2956 ± 0.0019 0.3582 ± 0.0049 r=400 r=400

setting 5

setting 8 0.1216 ± 0.0042 0.1216 ± 0.0042 NaN NaN NaN 0.3217 ± 0.0403 r=100 0.2407 ± 0.0413 0.3411 ± 0.0179 r=100 r=50 0.2331 ± 0.0143 0.3470 ± 0.0372 r=150 r=200 0.2607 ± 0.0088 0.3591 ± 0.0237 r=400 r=400

setting 7

Table 2. Best NDCG all averaged over samples with 95% confidence interval where r stands for the number of latent variables

Concept P erson (row) #Indivi. P erson (col) Location School Interest On.ChatAcc. Date #BlogP osts Role knows #Inst. (sparsity) residence attends has holds dateOf Birth posted

full

Table 1. Number of individuals and number of instantiated relations in the full triple set, in the pruned triple set (see text) and statistics for the different experimental settings

100 Y. Huang et al.

Multivariate Prediction for Learning on the Semantic Web

(a)

(c)

(b)

(d)

101

Fig. 4. Comparison between different algorithms. NDCG all is plotted against the number of latent variables: (a)-(d) for settings 1, 2, 5, 6 respectively.

Furthermore, we observe that LDA and RRPP outperform NNMF and SVD in each setting, and that LDA and RRPP are not sensitive to the number of latent variables as long as the chosen number is reasonably high. LDA reaches its maximum NDCG score, for instance, with r = 150 latent variables in setting 4 and the performance does not deteriorate when the number of latent factors is increased. The score of RRPP keeps increasing and does not drop down in the observed range of the number of latent variables. In contrast, NNMF and SVD are sensitive with respect to the predefined number of latent variables. Comparing the results over different settings we can observe that for the multivariate prediction approaches one obtains best performance in setting 4, next best performance in setting 2, then follows setting 1 and 3 is the most difficult setting. The corresponding order can be seen in settings 5-8. The baseline method, random guess, is independent to the settings and achieves almost the same score in all settings. The fact that the scores in settings 4 and 8 are the best indicates that a link-following sampling strategy in general gives better performance than random sampling. Similar results in statistical comparisons between random and link-following sampling have been obtained in other works, e.g., [17].

102

Y. Huang et al.

(a)

(c)

(b)

(d)

Fig. 5. Continue Figure 4: (a)-(d) for settings 3, 4, 7, 8 respectively

Finally, we observe that the prediction performance in setting 1 is only slightly worse than the prediction performance in setting 2, while the prediction performance in setting 4 is much better than in setting 3. This phenomenon occurs in settings 5-8 too. We attribute this to the general statistics in the training and the test set which are very different both in setting 3 and setting 7. In Table 1 it is apparent that for instance, in setting 3 the knows relation in the training data set (1.02%) is significantly more dense than in the test data set (0.44%). Intuitively speaking, the people in the training know each other quite well, but the people in the test do not know the people in the training as much.

5 Conclusions and Outlook The paper describes extensions to the SUNS approach introduced in [12]. The SUNS approach is based on multivariate prediction which is quite suitable for the typical SW data situation. In our experiments based on the FOAF data set, LDA and RRPP showed best performance, and the performance is insensitive to the rank of the approximation, resp. to the number of latent variables. This can be explained by the fact that LDA, in

Multivariate Prediction for Learning on the Semantic Web

103

contrast to NNMF, is a Bayesian approach and by the fact that the RRPP, in contrast to SVD, is regularized. Thus LDA or RRPP can be default methods being insensitive to exact parameter tuning. All four approaches exploited the benefits of multivariate prediction since approaches based on single predictions (not reported here) did not even reach the performance of the benchmark approaches. The proposed approach can be extended in many ways. One might want to allow the user to specify additional parameters in the learning process, if desired, along the line of the extensions described in [2]. Another extension concerns ontological background knowledge. So far, ontological background knowledge was considered by including logically inferred statements into learning. Ongoing work explores additional ways of exploiting ontological background information, e.g., for structuring the learning matrix. Finally we want to demonstrate how learned probabilistic statements can be queried. The following SPARQL query illustrates a query for LiveJournal users who live in Munich and might want to be Trelena’s friend: 1 2 3 4 5 6 7 8 9 10 11

PREFIX ya: http://blogs.yandex.ru/schema/foaf/ PREFIX foaf: http://xmlns.com/foaf/0.1/ PREFIX dc: http://purl.org/dc/elements/1.1/ SELECT DISTINCT ?person WHERE {?person ya:located ?city . ?person foaf:knows WITH PROB ?prob . FILTER REGEX(?city, "Munich") . } ORDER BY DESC(?prob)

The query includes the predicted knows triples for Trelena and rates them by predicted probability. Acknowledgements. We acknowledge funding by the German Federal Ministry of Economy and Technology (BMWi) under the THESEUS project and by the EU FP 7 Large-Scale Integrating Project LarKC.

References 1. Raedt, L.D., Jaeger, M., Lee, S.D., Mannila, H.: A theory of inductive query answering. In: ICDM (2002) 2. Kiefer, C., Bernstein, A., Locher, A.: Adding data mining support to SPARQL via statistical relational learning methods. In: Bechhofer, S., Hauswirth, M., Hoffmann, J., Koubarakis, M. (eds.) ESWC 2008. LNCS, vol. 5021, pp. 478–492. Springer, Heidelberg (2008) 3. Getoor, L., Friedman, N., Koller, D., Pferrer, A., Taskar, B.: Probabilistic relational models. In: Getoor, L., Taskar, B. (eds.) Introduction to Statistical Relational Learning. MIT Press, Cambridge (2007) 4. Domingos, P., Richardson, M.: Markov logic: A unifying framework for statistical relational learning. In: Getoor, L., Taskar, B. (eds.) Introduction to Statistical Relational Learning. MIT Press, Cambridge (2007) 5. Xu, Z., Tresp, V., Yu, K., Kriegel, H.P.: Infinite hidden relational models. In: Uncertainty in Artificial Intelligence (UAI) (2006)

104

Y. Huang et al.

6. Kemp, C., Tenenbaum, J.B., Griffiths, T.L., Yamada, T., Ueda, N.: Learning systems of concepts with an infinite relational model. In: Poceedings of the National Conference on Artificial Intelligence, AAAI (2006) 7. Quinlan, J.R.: Learning logical definitions from relations. Machine Learning 5(3) (1990) 8. Muggleton, S., Feng, C.: Efficient induction of logic programs. In: Proceedings of the 1st Conference on Algorithmic Learning Theory, Ohmsma, Tokyo (1990) 9. De Raedt, L.: Attribute-value learning versus inductive logic programming: The missing links (extended abstract). In: Page, D.L. (ed.) ILP 1998. LNCS, vol. 1446, Springer, Heidelberg (1998) 10. Lavraˇc, N., Dˇzeroski, S., Grobelnik, M.: Learning nonrecursive definitions of relations with LINUS. In: EWSL 1991: Proceedings of the European Working Session on Learning on Machine Learning (1991) 11. Tresp, V., Yu, K.: Learning with dependencies between several response variables. In: Tutorial at ICML (2009) 12. Tresp, V., Huang, Y., Bundschus, M., Rettinger, A.: Materializing and querying learned knowledge. In: Proceedings of the First ESWC Workshop on Inductive Reasoning and Machine Learning on the Semantic Web (2009) 13. Lee, D.D., Seung, H.S.: Learning the parts of objects by non-negative matrix factorization. Nature (1999) 14. Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. 3 (2003) 15. Brickley, D., Miller, L.: The Friend of a Friend (FOAF) project, http://www.foaf-project.org/ 16. Jarvelin, K., Kekalainen, J.: IR evaluation methods for retrieving highly relevant documents. In: SIGIR 2000 (2000) 17. Neville, J., Gallagher, B., Eliassi-Rad, T.: Evaluating statistical tests for within-network classifiers of relational data. In: ICDM 2009 (2009)

Appendix Details on the NDCG Score We use the normalized discounted cumulative gain (NDCG) to evaluate a predicted ranking. NDCG is calculated by summing over all the gains in the rank list R with a log discount factor as 1 2r(k) − 1 NDCG(R) = , Z log(1 + k) k

where r(k) denotes the target label for the k-th ranked item in R, and r is chosen such that a perfect ranking obtains value 1. To focus more on the top-ranked items, we also consider the [email protected] which only counts the top n items in the rank list. These scores are averaged over all ranking lists for comparison.

Learning Action Descriptions of Opponent Behaviour in the Robocup 2D Simulation Environment A. Illobre, J. Gonzalez, R. Otero, and J. Santos Computer Science Department, University of Corunna, Spain {infjdi00,jgonzalezi,otero,santos}@udc.es

Abstract. The Robocup 2D simulation competition [13] proposes a dynamic environment where two opponent teams are confronted in a simpliﬁed soccer game. All major teams use a ﬁxed algorithm to control its players. An unexpected opponent strategy, not previously considered by the developers, might result in winning all matches. To improve this we use ILP to learn action descriptions of opponent players; for learning on dynamic domains, we have to deal with the frame problem. The induced descriptions can be used to plan for desired ﬁeld states. To show this we start with a simpliﬁed scenario where we learn the behaviour of a goalkeeper based on the actions of a shooter player. This description is used to plan for states where a goal can be scored. This result can directly be extended to a multiplayer environment. Keywords: ILP, Action Descriptions, Answer Sets, Nonmonotonic Reasoning, Robocup Simulation Environment.

1

Introduction

RoboCup [13] is an international joint project created to promote AI and robotics research, by providing a standard problem (a simpliﬁed soccer game) where different technologies can be integrated and examined. The RoboCup competition includes real robot competitions and a software agent competition. In this last case, the soccer players must interact with a simulated environment based on incomplete and partially incorrect data1 . The RoboCup simulated league is based on rcssserver, a soccer simulation environment. In rcssserver, a match is carried out in a client/server style: the server provides a virtual ﬁeld and simulates all movements of a ball and players, while each client controls the movements of one player from a partial perception of its environment (referee messages, player body status, etc.). Time is discretized in simulation cycles. The server introduces noise in the visual sensor data as well as in the movement of objects and parameters of commands. 1

This paper has been funded by the Ministry of Science and Education of Spain through project TIN2007-64330. http://sserver.sourceforge.net/wiki/index.php/Main_Page

P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 105–113, 2011. c Springer-Verlag Berlin Heidelberg 2011

106

A. Illobre et al.

Currently teams use ﬁxed strategies to control its players. If an opponent uses an unexpected strategy, then the controlled team might show a low performance. To overcome this limitation, we propose a technique to learn action descriptions for opponent players, based on the actions performed by the team. This allows for planning for desired ﬁeld states (for instance, a state where a goal can be scored). This means that an optimal, speciﬁc strategy will be available for each opponent team. To test the proposed method, we solve the problem of placing a shooter player in a ﬁeld position where a goal can be scored, in an environment with an opponent goalkeeper. This is achieved in two steps. First, a model to decide if a goal can be scored from a given ﬁeld state is proposed, based on the position of the shooter player and the opponent goalkeeper. Then, an action description for the movement of the opponent goalkeeper is learned. The resulting model can be used to plan for optimal shooting situations. This requires to learn in a dynamic domain, so it is suitable to solve the frame problem. We do so by applying the method proposed on [11], using the system IAction [12]. The paper is organized as follows. Section 2 introduces the concept of action description, and brieﬂy describes the method [11] for learning on dynamic domains. Section 3 proposes a solution to automatically model the behaviour of opponent players, exemplifying it on the award-winning team CMUnited99 [14] goalkeeper. Finally, section 4 brieﬂy reviews previous work and presents the conclusions.

2

Action Descriptions for Dynamic Domains

We follow the method on [11] that represents dynamic domains using action descriptions. An action description represents the properties of a dynamic domain as fluents. These properties will change depending on performed actions. For example, shooting the ball in the correct direction will increase the score count. Both, actions and ﬂuents, will be represented as predicates. Each step on the evolution of the dynamic domain is represented by a situation. A narrative represents a particular example of the evolution of the domain from an initial situation s0 to a ﬁnal situation sn . Diﬀerent narratives represent diﬀerent examples of the evolution of the environment, depending on the initial state of the environment and the actions performed. An action description can be represented using several kinds of rules. Action laws take the following form: e ( S , N) :− a ( S ,N) , p r e v ( S , PS ) , PRECOND( PS ,N ) .

where e(S, N ) is a ﬂuent and a(S, N ) is an action. S and P S are situation variables, N represents a narrative. prev(S, P S) deﬁnes situation S as the successor of the situation P S. P RECON D(P S, N ) represents a conjunction of ﬂuents f1 (P S, N ), ..., fn (P S, N ) and might be missing.

Learning Action Descriptions of Opponent Behaviour

107

Intuitively, these rules state that when action a is performed on situation S and ﬂuents f1 , ..., fn are true on the previous situation P S, then the eﬀect ﬂuent e will be true on the situation S. Frame axioms take the following form: e ( S ,N) :− a ( S , N) , p r e v ( S , PS ) , e ( PS , N) , PRECOND( PS ,N ) .

Frame axioms are needed to explain the target ﬂuent e when it persists from the previous situations. Both type of rules are needed to cover the examples. We need a frame axiom for each combination of ﬂuent and action. When a domain is described with frame axioms it is said that we have the frame problem. To solve the frame problem we need a compact description of the persistence of the ﬂuents. This is solved on Stable Models [6] using inertia axioms instead of frame axioms. Two single inertia axioms for a ﬂuent replace all frame axioms with such ﬂuent in the head. Inertia axioms take the following form: e ( S , N) :− p r e v ( S , PS ) , e ( PS ,N) , n o t ne ( S ,N ) . ne ( S ,N) :− p r e v ( S , PS ) , e ( PS , N) , n o t e ( S ,N ) .

Where ne(S, N ) is the literal complementary to e and not represents negation as failure (N AF ). The ﬁrst rule should be read as: the ﬂuent e will be true on S if e is true on the previous situation P S and we cannot prove that e is false on S. 2.1

Eﬃcient Induction of Action Laws with IAction

We use the method [11] to eﬃciency learn on dynamic domains. This method uses causality to get solutions to the frame and ramiﬁcation problems in induction. Causality allows to translate the nonmonotonic induction problem to a form where monotonic methods of ILP can be used to provide a complete method for induction of action descriptions without the frame problem. Without this the methods deﬁned on monotonic formalisms will have the frame problem. A possible alternative solution would be to apply some existing restricted nonmonotonic induction methods, but it is not known how to use these methods for learning without the frame problem. A nonmonotonic induction method would include the inertia axioms in the background to provide solutions free from the frame problem. On monotonic ILP methods the frame axioms are induced to cover the ﬂuents on the examples that persist. Nevertheless we could avoid the induction of the ﬂuents that persist by not providing those persistent examples and selecting, as a target, the caused ﬂuents only. Consider a simpliﬁed Robocup domain with one player. There are two ﬂuents in this domain: goal (resp. ngoal ) represents that a goal has been scored and hasball (resp. nhasball ) represents that the player has the ball. Three actions are considered: shoot, wait (do nothing), getball. We want to learn how to score a goal. Table 2.1 shows a possible narrative for this domain. Note that the target is missing for situation 3. This is called a missing segment. A missing segment

108

A. Illobre et al. Table 1. Transformation of an input narrative by method [11] situation 0

1

2

3

4

goal

ngoal

ngoal

ngoal

?

goal

hasball

nhasball nhasball

actions

nhasball hasball

causedE + causedE − npgoal

hasball

shoot(1, 1) wait(2, 2) getball(m34, 3) shoot(m34, 4) pgoal(m34) npgoal

npgoal

represents that there is a positive example on causality on some situation inside it, similar cases have already been considered in machine learning under Multiple Instance (MI) learning. Missing example instances in the target predicate are common in learning. It is precisely because of these missing instances that alternative solutions to induction provide diﬀerent generalizations; in this sense, more missing instances allow more generalization in the solution. Induction in action seems to behave the other way around, missing examples instead of facilitating induction turn it more complex. Note also that there is no problem with missing examples when induction is directly applied on a monotonic ILP method. But recall also that all these solutions have the frame problem. This points out the close relationship between dealing with missing examples and solving the frame problem in induction. To be able to eﬃciently learn action rules without the frame problem a transformation on the input is deﬁned. Step 1: For every ﬂuent f on the domain, add the constraint : −f (S), nf (S). This representation avoids the CWA of LP for ﬂuents and allows the reference to the negative ﬂuent without using NAF, thus inside deﬁnite LP. The CWA for ﬂuents is not interesting, because when some ﬂuent instance cannot be proved it is better to assume it persisted than to assume it is false. Step 2: Deﬁne an extra argument for every action, e.g. shoot(ES,S), being ES the new argument and S the argument deﬁning the situation. Deﬁne a new constant (e.g. m34 ) for every action on the missing segment and the immediate situation after the missing segment. For any other action the ES argument is that of the situation, e.g. wait(2,2). Step 3: For every missing segment with complementary target instances at the situations immediately before and after the segment, a caused instance is deﬁned as follows: If the situation inmediately after the segment has a ﬂuent f (resp. nf ), deﬁne pf(es) (resp. pnf(es)), where es is the constant name of the missing segment. A single instance of causality is extracted from a missing segment, and the instance is at the segment es as a whole. Step 4: For the target ﬂuent f(S) deﬁne the ﬂuent npf(S) (also npnf(S) for nf(S)). Step 5: Apply a complete monotonic induction method of ILP, e.g. IE, with target ﬂuent pf(S) instead of the original target f(S), e.g. pgoal instead of goal.

Learning Action Descriptions of Opponent Behaviour

109

The causality of the target ﬂuent will be induced in the form of action laws. In our example this action law will be induced: pgoal(ES) : −shoot(ES, S), prev(S, P S), getball(P S). A simple transformation provides descriptions of actions in Stable Models [6]. For every induced causal action law put the head directly on the original target f(S), instead of the causal ﬂuent pf(S): f (S) : −prev(S, P S), f (P S), not nf (S). Complete the solution adding the inertia axioms for f(S) and nf(S).

3

Modeling Opponent Behaviour

To solve the problem of adapting to speciﬁc opponent strategies, we propose to learn an action description on opponent behaviour. This action description can then be used as input to a suitable non-monotonic formalism (e.g. Stable Models [4]) to solve planning and prediction problems on the domain. To exemplify this approach, a simpliﬁed scenario with an opponent goalkeeper and a shooter player is proposed. The objective is to model the behaviour of the goalkeeper based on the behaviour of the player. This is, we want to learn action rules for modeling how the goalkeeper is going to move, depending on the actions of the player. This action description is then combined with a generic action description describing the eﬀects of the shooter actions on the possibility of scoring a goal. The resulting theory can be used plan for states where a goal can be scored. 3.1

Discretization of the Environment

The values of the properties of the ﬁeld in rcssserver are represented as real numbers. We discretize the positions and angles with a precision of 10−1 : the ﬁeld is divided in approximately 420000 squares. Because we do not know the internal state of the oponent player it is possible, from the point of view of the shooter agent, that there are two diﬀerent situations si and sj where the ﬁeld state S and the action taken a are the same but the eﬀects of the action are diﬀerent. So we cannot learn an action rule for one of the situations without being inconsistent with the other. For dealing with these non-deterministic eﬀects we remove from the evidence all conﬂicting situations but that with the highest probability, estimated from the available examples. This preprocessing will remove only a 2% of the evidence that will be used in this work. 3.2

Representation

In the movement model used by rcssserver, a player moves by performing a dash action that results in an acceleration. The player speed is only modiﬁed by a small decay on each simulation cycle or or by another dash action. If the objective of a player is to move to a certain point, then it will apply dash actions periodically

110

A. Illobre et al.

to maintain its speed. Thus, we represent the movement of an opponent player as the distance covered after applying a certain action. By default, an opponent player will maintain its speed and direction. To explain changes on the player speed, a simpliﬁed set of possible shooter actions, based on that required by rcssserver, will be used. The selected ﬂuents encode the position and direction of the players in the ﬁeld. Every predicate representing a ﬂuent or an action will have at least a term S (situation) and a term N (narrative). For example, the action move(s3, n4) represents that the shooter will perform the action move on the situation 3 of the narrative 4. The background used for the learning task is deﬁned using the set of actions and ﬂuents described below. Actions: – move(S, N ): The shooter moves on its current direction at maximum speed. – turn(S, N, right/lef t): The shooter rotates clockwise/counterclockwise 45o . – wait(S, N ) : The shooter stays still. Fluents: – at(P, S, N, X, Y ): player P is at position (X, Y ). [0,0] represents the center of the field. Positions left or down the center take negative values. – angle(P, S, N, A): angle of player P is A. – speedx(P, S, N, Vx ): horizontal speed of the player X is Vx . Positive values represent movements to the right, negative values represents movements to the left. Speed range is [-1.1,1.1], currently discretized in 23 values. – speedy(P, S, N, Vy ): vertical speed of the player X is Vy . Positive values represent upward movements, negative values represent downward movements.

Given a simpliﬁed environment with one goalkeeper (team 1) and a player (team 2), we want to learn how the goalkeeper will move (direction and speed) depending on the movements of the player on the ﬁeld. The target predicates will be the speed and direction of the goalkeeper on the x-axis (speedx) and on the y-axis (speedy). The constant goalie represents the goalkeeper of the opposite team and the constant shooter represents the shooter player. Negative examples represent that a goalkeeper can only move on the current direction with a speed classiﬁed in the same discretization value. Evidence on goalkeeper behaviour has been extracted by developing a custom shooter player. A test set of 2000 narratives has been generated. 3.3

Learning Results

The following is an example of the learned rules. s p e e d x ( g o a l i e , S , N, − 0 . 9 ) :− t u r n ( S , N, l e f t ) , p r e v ( S , PS ) , a t ( s h o o t e r , S , N, X, Y) , l e s s e q u a l (X, 3 0 . 0 ) , l e s s e q u a l (Y, 1 0 . 0 ) , g r e a t e r e q u a l (Y, − 1 0 . 0 ) , a t ( g o a l i e , S , N, X2 , Y2 ) , l e s e q u a l ( X2 , 4 4 . 5 ) , a n g l e ( s h o o t e r , S , N, A) , g r e a t e r e q u a l (A, − 4 5 ) , l e s s e q u a l (A, 4 5 ) .

The intuitive meaning of this rule is that the goalkeeper moves forward if the player turns his back against the goal, on a certain distance. The learning process also produces the required inertia axioms for the learning target. For example: sp e e d x (P , S , N,V) :− p r e v ( S , PS ) , s p e e d ( P , PS , N, V) , n o t −s p e e d (P , S , N, V ) .

Meaning that the horizontal speed is assumed to persist unless an action causes it to change.

Learning Action Descriptions of Opponent Behaviour

111

1 0,9 0,8 0,7 0,6 0,5

ACC CREC

0,4 0,3 0,2 0,1 0 0

10

20

30 40 50 Number of narratives (t)

60

70

Fig. 1. Performance of goalie speed prediction

Validation. To assess the performance of this proposal, the following metrics have been deﬁned: (1) Accuracy (ACC): proportion of cases where, given an state and action, the speed of the opponent player is predicted correctly, (2) Change recall (CREC): proportion of cases where, given an state and action for which the speed is expected to change, the new speed value is predicted correctly. Metric values are calculated as follows. A set of narratives of size t is randomly generated, and an action description learned from it. Then, this description is tested again the test set. Figure 1 shows the results of this validation. Standard error is within ±0.02 for all cases. The results show that the method achieves high levels of accuracy with restricted evidence and time. This performance is achieved because of the chosen default assumption on the goalkeeper speed: the speed will be the same unless an action causes it to change. The accuracy on predicting speed change, however, is lower. This indicates the need for more evidence and learning time for the method to make more signiﬁcant predictions on the changes of the goalkeeper speed. An enhanced representation for the background information (for instance, considering distances between players and key points of the ﬁeld, such as the goal) could allow for a more compact description and more general rules, thus achieving higher accuracy values under the same restrictions on input evi- dence size and learning time. This is proposed as future work. Also, the movement of the opponent goalkeeper might depend on the position of other opponent players. The method can be directly extended to this multiplayer environment, by encoding the position of other players using the representation explained above. Preliminary results with the CMUnited99 goalkeeper in presence of two other opponent players, show that rules using the new information can be found.

4

Previous Work and Conclusions

There are several works for inducing the eﬀects of actions on dynamic domains. Moyle and Muggleton [9] study the induction of Event Calculus programs, a particular action formalism. The methods proposed there are diﬀerent to [11] and rely on working with negation as failure in the background (for inertia) during induction. Benson [1] describes the system TRAIL. Given an action and

112

A. Illobre et al.

a possible eﬀect on the domain (called Teleo-Operator), TRAIL tries to ﬁnd a set of preconditions under which that actions causes that eﬀect. Later, it uses this information to build a Teleo-Reactive tree to decide which actions should be applied to achieve a certain goal. There are also several proposals for learning action strategies in dynamic domains, some of which have been applied to the Robocup Simulation Environment. Driessens and De Raedt [3] learn clauses with actions in the head to describe the behaviour of a preexisting team in order to validate its implementation. Torrey and Maclin [15] use ILP to learn clauses with actions in the head as a step for transferring knowledge between reinforcement learning tasks. Khardon [5] proposes to learn production rules representing action strategies. In other line of work, Matsui et al. [7] use ILP to learn rules to decide if a certain action will be successful for a certain ﬁeld state. In this paper we have used the method on [11] to learn action descriptions on the behaviour of opponent players in the Robocup Simulation Environment, studying the case of predicting the movement of a goalkeeper based on the actions of a shooter player. With these descriptions, a suitable non-monotonic formalism, like Stable Models [4], can be used to plan for desired states. Current ILP methods are not suitable for learning in dynamic domains: most of the solutions have the frame problem. Results show that the proposed method has the potential to reach high accuracy values.

References 1. Benson, S.: Learning action models for reactive autonomous agents. Tech. rep. CS-TR-97-1589, Ph. The., Department of Computer Science, Stanford University (1997) 2. Chen, M., et al.: RoboCup Soccer Server, Users Manual (2002) 3. Driessens, K., Jacobs, N., Cossement, N., Monsieurs, P., De Raedt, L.: Inductive veriﬁcation and validation of the kULRoT roboCup team. In: Asada, M., Kitano, H. (eds.) RoboCup 1998. LNCS (LNAI), vol. 1604, pp. 193–206. Springer, Heidelberg (1999) 4. Gelfond, M., Lifschitz, V.: The Stable Model Semantics for Logic Programming. In: Proceedings of the Fifth International Conference on Logic Programming, ICLP (1988) 5. Khardon, R.: Learning to take Actions. Machine Learning 35(1) (1999) 6. Lifschitz, V.: Action languages, answer sets and planning. In: The Logic Programming Paradigm: a 25-Year Perspective. Springer, Heidelberg (1999) 7. Matsui, T., Inuzuka, N., Seki, H.: Adapting behaviour by inductive prediction in soccer agents. In: Mizoguchi, R., Slaney, J.K. (eds.) PRICAI 2000. LNCS, vol. 1886, p. 807. Springer, Heidelberg (2000) 8. McCarthy, J., Hayes, P.J.: Some philosophical problems from the standpoint of artiﬁcial intelligence. Machine Intelligence 4, 463–502 (1969) 9. Moyle, S., Muggleton, S.H.: Learning programs in the event calculus. In: Dˇzeroski, S., Lavraˇc, N. (eds.) ILP 1997. LNCS, vol. 1297. Springer, Heidelberg (1997) 10. Muggleton, S.H.: Inverse entailment and Progol. New Generation Computing 13, 245–286 (1995)

Learning Action Descriptions of Opponent Behaviour

113

11. Otero, R.: Embracing Causality in Inducing the Eﬀects of Actions. In: Conejo, R., Urretavizcaya, M., P´erez-de-la-Cruz, J.-L. (eds.) CAEPIA/TTIA 2003. LNCS (LNAI), vol. 3040, pp. 291–301. Springer, Heidelberg (2004) 12. Otero, R., Varela, M.: IAction, a System for Learning Action Descriptions for Planning. In: ILP (2006) 13. RoboCup Oﬃcial Site, http://www.robocup.org 14. Stone, P., Riley, P., Veloso, M.: The CMUnited-99 champion simulator team. AI Magazine 21(3), 33–40 (2000) 15. Torrey, L., Shavlik, J., Walker, T., Maclin, R.: Skill acquisition via transfer learning and advice taking. In: F¨ urnkranz, J., Scheﬀer, T., Spiliopoulou, M. (eds.) ECML 2006. LNCS (LNAI), vol. 4212, pp. 425–436. Springer, Heidelberg (2006)

Hypothesizing about Causal Networks with Positive and Negative Effects by Meta-level Abduction Katsumi Inoue1, Andrei Doncescu2 , and Hidetomo Nabeshima3 1

3

National Institute of Informatics 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430, Japan 2 LAAS-CNRS UPR 8001 Avenue du Colonel Roche, 31007 Toulouse, France Division of Medicine and Engineering Science, University of Yamanashi 4-3-11 Takeda, Kofu, Yamanashi 400-8511, Japan

Abstract. Meta-level abduction discovers missing links and unknown nodes from incomplete networks to complete paths for observations. In this work, we extend applicability of meta-level abduction to deal with networks containing both positive and negative causal effects. Such networks appear in many domains including biology, in which inhibitory effects are important in signaling and metabolic pathways. Reasoning in networks with inhibition is inevitably nonmonotonic, and involves default assumptions in abduction. We show that meta-level abduction can consistently produce both positive and negative causal relations as well as invented nodes. Case studies of meta-level abduction are presented in p53 signaling networks, in which causal rules are abduced to suppress a tumor with a new protein and to stop DNA synthesis when damage is occurred.

1 Introduction Abduction and induction are both ampliative reasoning, and play essential roles in knowledge discovery and development in science and technology. The use of prior or background knowledge in scientific applications has directed our attention to theory completion [12] rather than classical learning tasks such as concept learning and classification. There, abduction is used to complete proofs of observations from incomplete background knowledge. In theory completion, the larger the knowledge base becomes, the more inference steps are required. In scientific domains, background knowledge is often structured in a network form. In biology, a sequence of signalings or biochemical reactions constitutes a network called a pathway, which specifies a mechanism to explain how genes or cells carry out their functions. However, information of biological networks in public-domain databases is generally incomplete in that some details of reactions, intermediary genes/proteins or kinetic information are either omitted or undiscovered. To deal with incompleteness of pathways, we need to predict the status of relations which is consistent with the status of nodes [27,29,8,21], or insert missing arcs between nodes to explain observations

This research is supported in part by the 2008-2011 JSPS Grant-in-Aid for Scientific Research (A) No. 20240016.

P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 114–129, 2011. c Springer-Verlag Berlin Heidelberg 2011

Hypothesizing about Causal Networks with Positive and Negative Effects

115

[30,10,28,1]. These goals are characterized by abduction as theory completion, in which status of nodes or missing arcs are added to account for observations. A method to discover unknown relations from incomplete networks has been introduced in [6] based on meta-level abduction. Given a network representing causal relations, called a causal network, missing links and nodes are abduced in the network to account for observations. The method can be implemented in SOLAR [14,15], an automated deduction system for consequence finding, using a first-order representation for algebraic properties of causality and the full-clausal form of network information and constraints. Meta-level abduction by SOLAR is powerful enough to infer missing rules, missing facts, and unknown causes that involve predicate invention [13] in the form of existentially quantified hypotheses. In [6], meta-level abduction has been applied to discover physical skills in cello playing examples. and a thorough experimental analysis with a variety of problem instances has been presented in [15, Table 3]. However, all those examples of meta-level abduction in [6,15] contain only one kind of causal effects, which are positive, and it was left open how to deal with both positive and negative effects. Then, in this work, we extend applicability of meta-level abduction to deal with networks expressing both positive and negative causal effects. Such networks are often used in biological domains, where inhibitory effects are essential in gene regulatory, signaling and metabolic networks. We will present axioms for meta-level abduction to produce both positive and negative causal relations as well as newly invented nodes. Reasoning in networks with inhibition is inevitably nonmonotonic, and involves default assumptions in abduction. Then, applications to p53 signal networks [19,28] are presented as case studies of our framework, in which meta-level abduction discovers theories explaining how tumor suppressors work and how DNA synthesis stops. Such abstract signaling networks, although simple, provide one of the most fundamental inference problems in Systems Biology: Given an incomplete causal network, infer possible connections and functions of the target gene/protein. Meta-level abduction in this paper is crucial for this task: First, suggestion of possible additions to prior networks enables scientists to conduct hypothesis-driven experiments with those focused cases. Second, it is quite hard to observe activity levels or quantities of proteins in living organisms [1]. The rest of this paper is organized as follows. Section 2 offers the essential and new perspectives of meta-level abduction and its use for rule abduction. Section 3 then extends meta-level abduction to allow for two types of causal effects, in which positive and negative rules are called triggers and inhibitors, respectively. Section 4 presents case studies of meta-level abduction applied to completion of sub-networks in p53 signal networks. Section 5 discusses related work, and Section 6 gives a summary and future work.

2 Meta-level Abduction This section revisits the framework for meta-level abduction [6]. We suppose a background theory represented in a network structure called a causal graph or a causal network. A causal graph is a directed graph representing causal

116

K. Inoue, A. Doncescu, and H. Nabeshima

relations, which consists of a set of nodes and (directed) arcs (or links).1 Each node in a causal graph represents some event, fact or proposition. A direct causal relation corresponds to a directed arc, and a causal chain is represented by the reachability between two nodes. The interpretation of a “cause” here is kept rather informal, and just represents the connectivity, which may refer to a mathematical, physical, chemical, conceptual, epidemiological, structural, or statistical dependency [17]. Similarly, a “direct cause” here simply represents the adjacent connectivity, while its effect is direct only relative to a certain level of abstraction. We then consider a first-order language to express causal networks. Each node is represented as a proposition or a (ground) atom in the language. When there is a direct causal relation from a node s to a node g, we define that connected(g, s) is true. Note that connected(g, s) only shows that s is one of possible causes of g, and thus the existence of connected(g, t) (s = t) means that s and t are alternative causes for g. The fact that a direct causal link cannot exist from s to g is represented in an (integrity) constraint of the form ← connected(g, s), which is equivalent to the formula ¬connected(g, s). If a direct causal relation from s has nondeterministic effects g and h, it is represented in a disjunction of the form (1). On the other hand, the relation that “g is jointly caused by s and t”, written intuitively as (g ← s ∧ t) in the object level, is expressed in a disjunction of the form (2) at the meta level, cf., (g ← s ∧ t) ≡ (g ← s) ∨ (g ← t). gi h) g

OR

) i AND

s

connected(g, s) ∨ connected(h, s) (1)

s connected(g, s) ∨ connected(g, t) t

(2)

A complex relation of the form (g ∨ h ← s ∧ t) can be decomposed into two relations, (s-t ← s ∧ t) and (g ∨ h ← s-t), where s-t represents the intermediate complex. Any other direct causal relation in a causal network can be represented in this way using intermediate complexes and combinations of positive and negative connected literals and disjunctions of the form (1) and (2). Expression of causal networks is thus done at the meta level using the meta-predicate connected. In this way, (i) each literal in the object level is represented as a term in the meta level, and (ii) each rule in the object level is represented as a (disjunctive) fact in the meta level. The point (ii) can not only hold for rules given in the axioms, but can also be applied to express inferred rules at the meta level. Now, to express inferred rules, we introduce another meta-predicate caused. For object-level propositions g and s, we define that caused(g, s) is true if there is a causal chain from s to g. Then, the causal chains are defined transitively in terms of connected as: caused(X, Y ) ← connected(X, Y ). caused(X, Y ) ← connected(X, Z) ∧ caused(Z, Y ). 1

(3) (4)

Precisely speaking, our causal networks bring us more information than directed graphs since negation, disjunctive effects and joint causes are all represented in a network.

Hypothesizing about Causal Networks with Positive and Negative Effects

117

Other algebraic properties as well as some particular constraints (e.g., ¬caused(a, b)) can also be defined if necessary. Variables in object-level expressions like g(T ) and s(T ) can be allowed in the meta-level expression like connected(g(T ), s(T )). Reasoning about causal networks is realized by deduction and abduction from the meta-level expression of causal networks together with the axioms for causal relations including (3) and (4). In deduction, if a meta-level expression of the form caused(g, s) for some facts g and s can be derived, it means that the rule (g ← s) can be derived at the object level [6, Section 3.3]. In abduction, if an observation O is given as a causal chain caused(g, s), which corresponds to the object-level rule (g ← s), we want to explain why or how it is caused. Here, g and s are called the goal fact and the source fact, respectively. O can be given as either a real observation (called an empirical rule) or a virtual goal to be achieved. An abductive task is then to discover hidden rules that establish a connection from s to g by filling the gaps in causal networks. Logically speaking, a background theory B consists of the meta-level expression of a causal network and the axioms for causal relations in the meta-level containing (3) and (4). When B is incomplete, there may be no path between g and s in B, that is, caused(g, s) cannot be derived from B. Then, abduction infers an explanation (or hypothesis) H consisting of missing relations (links) and missing facts (nodes). This is realized by setting the abducibles Γ , the set of candidate literals to be assumed, as the atoms with the predicate connected: Γ = {connected( , )}. A set H of instances of elements of Γ is an explanation of O if B ∪ H |= O and B ∪ H is consistent. An explanation H of O is minimal if it does not imply any explanation of O that is not logically equivalent to H. Minimality of explanations in meta-level abduction corresponds to minimal additions in causal graphs, and are reasonable according to the principle of Occam’s razor. For example, suppose the observation O = caused(g, s)∧caused(h, s), that is, the multiple causal chains between two goal facts g, h and the source fact s. Examples of minimal explanations of O containing one intermediate node are as follows. H1 : ∃X(connected(g, X) ∧ connected(h, X) ∧ connected(X, s)), H2 : ∃X(connected(g, X) ∧ connected(X, h) ∧ connected(h, s)). Here, H1 corresponds to the three rules {(g ← χ), (h ← χ), (χ ← s)}, hence rule abduction is realized here. Moreover, these hypotheses contain existentially quantified variables, where χ can be regarded as either some existing node or a new unknown node. In this way, predicate invention [13] is partially realized in meta-level abduction. As H1 and H2 represent different connectivities, we can enumerate different types of network structures that are missing in the original causal network. A hypothesis of the form (2) can be obtained by adding a meta-level axiom: connected(X, Y ) ∨ connected(X, Z) ← jointly connected(X, Y, Z).

(5)

to B and the atoms with the predicate jointly connected( , , ) to Γ . Besides the use in rule abduction, meta-level abduction can also be applied to fact abduction [6], which has been focused on almost exclusively in AI literature.2 2

In [25], fact abduction and rule abduction are classified as factual abduction and lawabduction, respectively. Our meta-level abduction also gives a realization of 2nd order existential abduction, which is most important to produce new theories with new concepts [25].

118

K. Inoue, A. Doncescu, and H. Nabeshima

Abduction of facts in the object level can be formalized as query answering in the meta level. Suppose that each abducible a in the object level is declared as abd(a). Given a query of the form ← caused(g, X), answer extraction for X can be realized by giving the clause of the form: ans(X) ← caused(g, X) ∧ abd(X). Here, ans is the answer predicate [9] and the variable X is used to collect abducibles which cause the g. Furthermore, by combining rule abduction and fact abduction in the form of conditional query answering [9], which extracts answers in a query with additional abduced conditions, meta-level abduction enables us to abduce both rules and facts. All types of meta-level inferences in this section, including generation of existentially quantified hypotheses in meta-level abduction as well as conditional query answering to abduce rules and facts, can be realized by SOLAR [14,15]. SOLAR is a consequence-finding system based on SOL resolution [3] and the connection tableaux. In SOLAR, the notion of production fields [3] is used to represent language biases for hypotheses. A production field P is a pair L, Cond , where L is a set of literals and Cond is a certain condition. A clause C belongs to P = L, Cond if every literal in C is an instance of a literal in L and C satisfies Cond. The set of subsumptionminimal clauses derived from a clausal theory Σ and a production field P is called the characteristic clauses of Σ with respect to P, and is denoted as Carc(Σ, P). The new characteristic clauses of a clause C with respect to Σ and P are defined as N ewcarc(Σ, C, P) = Carc(Σ ∪ {C}, P) \ Carc(Σ, P). Given the background clausal theory B and the observations O, each abductive explanation H of O can be computed by inverse entailment [3]: B ∪ {¬O} |= ¬H, where ¬O = L∈O ¬L and ¬H = L∈H ¬L are clauses because O and H are sets of literals. Similarly, the condition that B ∪ H is consistent is equivalent to B |= ¬H. Given the abducibles Γ , any literal in ¬H is an instance of a literal in Γ = {¬L | L ∈ Γ }. Hence, the set of minimal explanations of O with respect to B and Γ is characterized as { H | ¬H ∈ N ewcarc(B, ¬O, Γ ) }.

3 Reasoning about Positive and Negative Causal Effects So far, links in a causal network have been of one kind, and connected(g, s) in the meta level, i.e., (g ← s) in the object level, just represents that g directly depends on s somehow. However, mixing different types of causalities in one type of links often makes analysis of actual causes complicated [17]. Here, we solve one of the most important problems of this kind: diagrams with two types of causalities, i.e., positive and negative causal effects. With this regard, from now on we can understand that each arc of the form connected(g, s) in Section 2 only represents positive effects. We extend applicability of meta-level abduction to deal with networks expressing both positive and negative causal effects. Such networks are seen in biological domains, where inhibition effects negatively in gene regulatory, signaling and metabolic pathways. Now we consider two types of direct causal relations: triggered and inhibited . For two nodes g and t, the relation triggered (g, t) represents a positive cause such that

Hypothesizing about Causal Networks with Positive and Negative Effects

119

t is a trigger of g, written as g ←− t in a causal network, whose meaning is (g ⇐ t) in the object level, where ⇐ represents that the causation ← appears if it is not prevented and its precise meaning will be defined later in Section 3.2. On the other hand, the relation inhibited (g, s) represents a negative cause such that s is an inhibitor of g, written as g |—– s in a causal network, whose meaning is (¬g ⇐ s) in the object level. As in Section 2, negation, disjunctive effects and conjunctive causes can be defined for triggered and inhibited , cf., (1) and (2), and complex causal relations can be represented using those combinations and intermediate complexes. For instance, g is jointly triggered by t1 and t2 can be expressed as triggered (g, t1 ) ∨ triggered(g, t2 ). The notion of causal chains is also divided into two types: the positive one (written promoted ) and the negative one (written suppressed ), respectively corresponding to triggered and inhibited . Now our task is to design the axioms for these two meta-predicates. 3.1 Alternating Axioms for Causality Suppose first that there is no inhibitor in a causal network, that is, all links are positive. In this case, the axioms for promoted should coincide with (3) and (4): promoted (X, Y ) ← triggered (X, Y ). promoted (X, Y ) ← triggered (X, Z) ∧ promoted (Z, Y ).

(6) (7)

Next, let us interpret the meaning of an inhibitor as a toggle switch of signals flowed in the inhibitor, just as an inverter in a logic circuit [26]. Then, in the presence of inhibitors, we need one more axiom which blocks an adjacent inhibitor for X in order to promote X: promoted (X, Y ) ← inhibited (X, Z) ∧ suppressed (Z, Y ). (8) As for the axioms of the negative causal chain suppressed , we can consider the following axioms, which are the counterpart of positive ones (6), (7) and (8): suppressed (X, Y ) ← inhibited (X, Y ). suppressed (X, Y ) ← inhibited (X, Z) ∧ promoted (Z, Y ). suppressed (X, Y ) ← triggered (X, Z) ∧ suppressed (Z, Y ).

(9) (10) (11)

That is, a negative causal chain to X can be established if negative influence is propagated to X either directly by an adjacent inhibitor (9–10) or indirectly by (11). One nice property with the axiomatization by (6–11) is that all possible paths from a source to a goal, which is either positive or negative, can be obtained by meta-level abduction. Meta-level abduction on causal networks with positive and negative links can now be defined by letting the abducibles Γ be those atoms with the predicates triggered and/or inhibited : Γ = {triggered( , ), inhibited ( , )}, and observations or goals are given as literals either of the form promoted (g, s) or of the form suppressed (g, s). Hence, given positive and negative observations, we can abduce both positive and negative causes, and new nodes are produced whenever necessary. Proposition 3.1. (Completeness) If there is a negative (resp. positive) causal chain from a source s to a goal g (g = s) in a causal network N , then there is an explanation E of suppressed (s, g) (resp. promoted (s, g)) from N ∪{(6–11)} and Γ such that there exist an odd (resp. even) number of direct inhibitors in E.

120

K. Inoue, A. Doncescu, and H. Nabeshima

Conversely, it can be shown that the axiomatization (6–11) is sound: if there is an explanation of suppressed (s, g) (resp. promoted (s, g)) from N ∪ {(6–11)}, then there is a negative (resp. positive) causal chain from a source s to a goal g in the causal network N . However, this axiomatization can be inconsistent in the sense that both promoted (g, s) and suppressed (g, s) can be explained at the same time. This inconsistency is, however, inevitable in this monotonic representation since we can answer to any virtual query supposing a source s and a goal g. Then, to prevent derivations of promotion and suppression simultaneously for the same s and g, the following integrity constraint can be placed at the meta level. ← promoted (X, Y ) ∧ suppressed (X, Y ).

(12)

The role of (12) is to derive nogoods, i.e., minimal incompatible combinations of instances of abducibles. Unfortunately, introduction of (12) can make those axioms inconsistent. For instance, it is easy to see that, for N0 = {triggered (g, t), triggered (s, t), inhibited (g, s)},

(13)

N0 ∪ {(6–11), (12)} is inconsistent. Also, the p53 network (23) given in Section 4 becomes inconsistent if it is combined with this axiomatization. The problem arises when two antagonistic direct causal relations appear simultaneously for the same node g as follows. t triggered (g, t) ) g / inhibited (g, s) s (14) Our intuition on the diagram (14) is as follows. (1) If the trigger t is present and the inhibitor s is not present, then g is triggered by t; (2) Else if s is present and t is not present, then g is inhibited by s. These two cases are rather clear, but what happens for g if both t and s are somehow caused? The biological literature in this case indicates that: (3) If both t and s are present, then g is inhibited by s. Namely, an inhibitor is preferred to a trigger. The last inference is nonmonotonic: a trigger of g works if there is no inhibitor for g, but if an inhibitor is added then the trigger stops. We next show another axiomatization which reflects this principle of inhibitor preference. 3.2 Axiomatization with Default Assumptions We now depart from the monotonic axiomatization of causal chains (6–11) to make reasoning about networks that are nonmonotonic. In the following new definitions of promoted and suppressed , we will associate an extra condition for each trigger to work. promoted (X, Y ) ← triggered(X, Y ) ∧ no inhibitor (X).

(15)

promoted (X, Y ) ← triggered(X, Z) ∧ no inhibitor (X) ∧ promoted (Z, Y ). (16) promoted (X, Y ) ← inhibited (X, Z) ∧ suppressed (Z, Y ). (17) suppressed (X, Y ) ← inhibited (X, Y ). suppressed (X, Y ) ← inhibited (X, Z) ∧ promoted(Z, Y ).

(18) (19)

suppressed (X, Y ) ← triggered (X, Z)∧no inhibitor (X)∧suppressed (Z, Y ). (20) ← promoted (X, Y ) ∧ suppressed (X, Y ).

(21)

Hypothesizing about Causal Networks with Positive and Negative Effects

121

The new axiom set for positive and negative causal chains (15–20) are the same as the monotonic version (6–11), except that each trigger to X (triggered (X, )) must not be inhibited (no inhibitor (X)) to give the positive effect to X in (15), (16) and (20). Here, inclusion of no inhibitor (χ) in association with triggered (χ, ψ) makes those three axioms default rules: the meaning (χ ⇐ ψ) in the object level is now given that the causation γ = (χ ← ψ) is true if γ is consistent with the union of the background theory B and a constructing hypothesis H. The literal of the form no inhibitor ( ) is thus treated as a default, which can be assumed during inference unless contradiction occurs, and constraints can also be added to reject inconsistent cases with these assumptions. Finally, the integrity constraint (21) is the same as (12) and prohibits the presence of both positive and negative causes between any pair of nodes X and Y . Meta-level abduction is now defined in the same way as in Section 3.1. Abduction of joint triggers or joint inhibitors can also be realized in the same way as jointly connected in (5) by adding the meta-level axioms triggered(X, Y ) ∨ triggered (X, Z) ← jointly triggered (X, Y, Z). inhibited (X, Y ) ∨ inhibited (X, Z) ← jointly inhibited (X, Y, Z). to the background theory B and the literals of the form jointly triggered ( , , ) and of the form jointly inhibited ( , , )) to the abducibles Γ . However, we do not need both of them if an intermediate complex is created; abduction of jointly inhibited (g, s, t) can be simulated by abduction of jointly triggered(s-t, s, t) ∧ inhibited (g, s-t). As for default assumptions of the form no inhibitor ( ), default reasoning can be implemented by assuming those literals whenever necessary during inference, and consistency of such assumptions are checked each time they are added to the current set of abduced literals. This is a simple yet powerful method for default reasoning in the case of so-called normal defaults [23,18]. Hence, the abducibles Γ now also contain the literals of the form no inhibitor ( ), and are defined as Γ = { triggered ( , ), inhibited ( , ), jointly triggered ( , , ), no inhibitor ( )}. When we are sure that there is no inhibitor for a node t, we can include the fact no inhibitor (t) in the background theory B. For instance, no inhibitor (s) can be declared as a fact in B if s is a terminal source node. Moreover, we can add a meta-level constraint ← no inhibitor (X) ∧ inhibited (X, Y ). (22) This constraint (22) blocks to assume a default no inhibitor (g) for any node g to which an inhibitor is connected. Consistency of the background theory in the meta level containing a causal network, the new axioms (15–20) and constraint (21) is now always guaranteed. This is because, unlike the axioms (6–11), the new axioms contain additional defaults of the form no inhibitor ( ). For the causal network N0 (13), B0 = N0 ∪ {(15–20), (21)} is now consistent. Still, both promoted (g, t) and suppressed (g, t) can be explained from B0 and Γ , but their explanations are not the same: {no inhibitor (g)} explains the former, while {no inhibitor (s)} explains the latter. Again, the role of (21) is

122

K. Inoue, A. Doncescu, and H. Nabeshima

Table 1. Correspondence between object-level inference and meta-level consequence finding object-level inference rule verification fact abduction fact prediction rule prediction rule abduction

top clause in SOLAR ← caused(g, s). ans(X) ← caused(g, X). ans(X) ← caused(X, s). none ← caused(g, s).

production field in SOLAR ∅ {ans( )} {ans( )} {promoted ( , ), suppressed ( , )} {¬triggered ( , ), ¬inhibited ( , )} {¬triggered ( , ), ¬inhibited ( , ), abducing rules and facts ans(X) ← caused(g, X). ans( )} {¬triggered ( , ), ¬inhibited ( , ), fact prediction + rule abduction ans(X) ← caused(X, s). ans( )} {¬triggered ( , ), ¬inhibited ( , ), rule prediction + rule abduction none promoted ( , ), suppressed ( , )}

to identify each nogood to prune all incompatible combinations of defaults and abducibles. That is, abducing literals with the predicates triggered and inhibited involves default assumptions of the form no inhibitor ( ), and any inconsistent set of abducibles can be detected by subsumption checking with nogoods. In the network N0 , the set {no inhibitor (g), no inhibitor (s)} is a nogood. In abduction, completeness is guaranteed as in Proposition 3.1. This is easily proved as each explanation obtained with the monotonic axioms (6–11) can be extended by incorporating defaults of the form no inhibitor (t) in the corresponding explanation from the axioms (15–20). Soundness of abductive explanations is similarly guaranteed. Abduction with default assumptions has been implemented in SOLAR [7]. Membership of a clause C in an extension of a default theory [23,18] is guaranteed for each consequence C ← no inhibitor (t1 ) ∧ · · · ∧ no inhibitor (tm ) if {no inhibitor (t1 ), . . . , no inhibitor (tm )} is not a nogood. Abduction of rules with positive and negative effects can be further combined with fact abduction to allow mixed forms of inferences. Table 1 summarizes the correspondence between object-level and meta-level inferences. All types of meta-level inferences, involving generation of existentially quantified hypotheses, can be realized by SOLAR. Recall that, in the context of inverse entailment, the negation of an observation is set to a top clause, and the negation of each abducible is given in a production field in SOLAR. In Table 1, “ ← caused( , )” in a “top clause” column is instantiated by either “ ← promoted ( , )” or “ ← suppressed ( , )”, and “ans( )” is an answer predicate to collect answer substitutions. In abducing object-level facts, a top clause can be further conditioned with an abducible literal “abd(X)” if the list of abducibles is given in the background theory B. In Table 1, “Rule verification” is to prove if a given causal chain can be derived or not. “Fact prediction” is to compute ramification of a source s, i.e., to derive facts that can be caused by s. “Rule prediction” is to enumerate possible causal chains from the given causal network, so a top clause is not provided in this case and characteristic clauses are computed by SOLAR.

Hypothesizing about Causal Networks with Positive and Negative Effects

123

4 Case Study: p53 Signal Networks In this section, we see that meta-level abduction can be well applied to completion of signaling networks. The importance of network completion in signaling networks has been recognized since it is hard to observe activity levels and quantities of proteins in living organisms [1]. Moreover, reporter proteins/genes are usually employed in signaling pathways, but designing and introducing reporter proteins are hard tasks. This is contrasted to the case of genetic networks, in which expression levels of most genes can be observed using DNA microarray/chip technologies. As case studies of meta-level abduction, we use two signaling networks, both of which contain the p53 protein [19] but use it for different purposes. Although these networks are rather simple, they illustrate one of the most fundamental inference problems in Systems Biology: Given an incomplete causal network, infer possible connections to promote or suppress some functions of biological systems. Those target functions are suppression of tumors in cancer and switching DNA synthesis on and off. 4.1 Enumerating Tumor Suppressors This subsection examines the p53 signal network presented in [28] by meta-level abduction. The p53 protein plays a central role as a tumor suppressor and is subjected to tight control through a complex mechanism involving several proteins [19]. The p53 protein has the transactivator domain, which bounds to the promoters of target genes, then leads to protect the cell from cancer. The level and activity of p53 in the cell is influenced by its interactions with other proteins. Tumor suppression is enabled if the interacting partners of p53 do not inhibit the functionality of the transactivator domain. Mdm2 binds to the transactivator domain of p53, thus inhibiting the p53 from tumor suppression. UV (ultraviolet light) causes stress, which may induce the upregulation of p53. However, stress can also influence the growth of tumors. These relations can be represented in solid lines of the causal network in Fig. 1. The corresponding formulas in the meta level can be simply represented by the clauses: triggered (cancer, uv), inhibited (cancer, a), inhibited (a, b),

triggered(p53, uv), triggered(a, p53),

(23)

triggered (b, p53) ∨ triggered (b, mdm2),

where a (“A” in Fig. 1) is the inhibitory domain of p53, and b (“B” in Fig. 1) is the complex p53-mdm2. Now, we consider a tumor suppressor gene X such that mutants of X are highly susceptible to cancer. Suppose in some experiments that exposure of the cell to high level UV does not lead to cancer, given that the initial concentration of Mdm2 is high. A high level of gene expression of the X protein is also observed. Those initial conditions are represented as two facts, source(uv) and source(mdm2), that is, both UV and Mdm2 can be abduced whenever necessary. The meta-predicate source thus behaves like the abducible predicate abd. Some meta-level axioms can be introduced, e.g., no inhibitor (X) ← source(X). Our objective is to hypothesize about the various possible influences of X on the p53 pathway thereby explaining how the cell can avoid cancer.

124

K. Inoue, A. Doncescu, and H. Nabeshima

UV p53 Mdm2 A

X

B

cancer

C

Fig. 1. Causal network of the p53 pathway

The observation is now expressed as ∃S(suppressed (cancer, S) ∧ source(S)). Let Γ = { triggered ( , ), inhibited ( , ), jointly triggered( , , x) }, be the abducibles, expecting that a mutant of X bound to some Z is produced in suppressing the cancer from some source. The background theory B is defined as the set consisting of the rules above, the causal axioms (15–20) and constraints (21,22), and domain constraints for pruning such as ¬inhibited (uv, Z) and ¬inhibited (mdm2, Z). In SOLAR, as in Table 1, the top clause is given as: ans(S) ← suppressed (cancer, S) ∧ source(S). The production field P is set as: P = Γ ∪ {ans( ), no inhibitor ( )}, Cond , where Cond is the length conditions such that each number of literals of the form ¬triggered ( , ), ¬inhibited ( , ) and ¬jointly triggered( , , x) must not respectively exceed 1 in each produced clause. Then, SOLAR produces the 24 new characteristic clauses in 8 seconds using a PC with Core 2 Duo 3GHz and 4GB RAM. In these 24 consequences of SOLAR, the following two clauses are included: ans(uv) ← triggered (x, uv) ∧ jointly triggered (Y, p53, x) ∧ inhibited (b, Y ) ∧ no inhibitor (Y ) (24) ans(uv) ∨ ans(mdm2) ← triggered (x, uv) ∧ jointly triggered (Y, mdm2, x) ∧ inhibited (b, Y ) ∧ no inhibitor (Y ) (25) Both (24) and (25) give conditional answers. The consequence (24) represents a definite answer indicating that the p53-X complex has the unique source UV since both p53 and X are caused by the same source UV. On the other hand, (25) represents a disjunctive answer: X is activated by UV but Mdm2 itself is assumed to be a source, hence the Mdm2-X complex has two sources. In fact, it takes more time to find the consequence (25) than to find (24) in SOLAR. Those two formulas respectively correspond to the following hypotheses: (I) triggered(x, uv) ∧ ∃Y (jointly triggered (Y, p53, x) ∧ inhibited (b, Y )), (II) triggered(x, uv) ∧ ∃Y (jointly triggered (Y, mdm2, x) ∧ inhibited (b, Y )).

Hypothesizing about Causal Networks with Positive and Negative Effects

125

The variable Y in (I) or (II) represents a new complex synthesized from X and either p53 or Mdm2, respectively. Those two hypotheses are actually suggested in [28]: (I) X directly influences p53 protein stability: Stress caused by UV induces high expression of X, which then binds to p53, so p53 is stabilized and formation of Mdm2-p53 complex is prevented; (II) X is a negative regulator of Mdm2: Stress induces high expression of X, which then binds to Mdm2, which competes against inhibiting the Mdm2-p53 interaction (depicted in dashed lines in Fig. 1). In both cases, p53 (or “A”) can be functional as a tumor suppressor. In the biological viewpoint, however, the hypothesis (I) seems preferred because p53 has more chances to be bound to other proteins. The new node Y in (I) and (II) is automatically invented in our method, while all ground candidate nodes and links to be added must be prepared as abducibles in [28]. The p53 regulatory network includes a complex array of upstream regulators and downstream effectors. The results obtained in this section are important in the sense that the activation/inhibition mechanism of p53 is linked to some proteins that might not have been found out yet. Meta-level abduction is thus crucial for this discovery task, and inferred hypotheses can suggest scientists necessary experiments with gene knockout mice as minimally as possible. 4.2 Recovering Links in CDK Networks The next case study is completion in the switch network of cyclin-dependent kinases (CDKs) [26]. CDKs are kinase enzymes that modify other proteins by chemically adding phosphate groups to them (phosphorylation), and are involved in the regulation of the cell cycle. A CDK is activated by association with a cyclin, forming a cyclin-CDK complex (Fig. 2). The Cdk2/cyclin E complex inactivates the retinoblastoma (Rb) protein, which then releases cells into the synthesis phase. Cdk2/cyclin E is regulated by both the positive switch called CAK (cdk activating kinase) and the negative switch p21/WAF1. p21/WAF1 is activated by p53, but p53 can also inhibit cyclin H, which is a source of the positive regulator of cdk2/cyclin E. The negative regulation from p53 works as a defensive system in the cells: when DNA damage occurs, it triggers p53, which then turns on the negative regulation to stop DNA synthesis, so that the damage should be repaired before DNA replication to prevent passing damaged genetic materials onto the next generation. For the CDK network in Fig. 2, we have used meta-level abduction to infer missing links. Experimental problems are designed by removing some links from Fig. 2, and then verifying if those links can be recovered or not in explaining the observation suppressed (dna synthesis, dna damage). The objective of this experiment is to show how meta-level abduction can be well applied to complete missing links. Recovery of removed links is a good testbed for this purpose because the existing natural system can be considered as an ideal solution. Yet, looking at other hypotheses, we can notice that the same functions can be realized in different ways. Table 2 shows experimental results. All experiments are done in the environment on a Mac Mini with Core 2 Duo 1.83GHz and 2GB RAM. The table shows 6 problems, each of which is given a network obtained by removing the links shown in the table. The “#H” columns shows the number of new characteristic clauses (minimal hypotheses) by SOLAR. The unit of “Time” is second. “Depth” is the maximal search depth

126

K. Inoue, A. Doncescu, and H. Nabeshima

DNA damage

(5)

p53 (4)

(6)

cyclin H p21/WAF1 cdk7

CAK

cdk2

(3)

cyclin E cyclin E/ cdk2 DNA synthesis

Rb

(2)

(1)

Fig. 2. Causal network of the CDK pathway

of SOLAR, and computation stops when no new consequences are derived at the minimum three successive depths k, k + 1 and k + 2, then we assume that all consequences have (probably) been found at depth k. The running time to obtain the set of new characteristic clauses is measured after the set of characteristic clauses (minimal nogoods) is computed. It takes 4 to 12 seconds to get all characteristic clauses. The results of recovering removed links are shown in the bottom row. Here, the result indicates a hypothesis consisting of the links that are closest to the original links. For instance, when the links {(2), (4)} are removed, then there exists the hypothesis containing exactly the same links as the removed ones in the 12 hypotheses. For a link (N), the recovered link (Ng) means that a more general hypothesis than (N) is obtained. For example, when {(1), (2)}, i.e., inhibited (dna synthesis, rb) ∧ inhibited (rb, cyclin e/cdk2) is removed, a more general hypothesis {(1g), (2g)}, which is ∃X(inhibited (dna synthesis, X) ∧ inhibited (X, cyclin e/cdk2)), is recovered. We can observe that two consecutive links are replaced by general ones with existentially quantified variables at recovery, but links that are not connected are recovered as they are. Notice that only (4) is recovered when {(4), (6)} is removed. This is because SOLAR outputs only minimal hypotheses, and only (4) is enough to explain the observation. Actually, the negative regulation by p53 has the two paths to suppress cdk2/cyclin E via (4) and (6). Although this is a biologically robust system, our result indicates that only (4) is logically sufficient to realize this function.

5 Discussion and Related Work This paper extends the method of rule abduction in [6] to deal with positive and negative causal links. Although few works on rule abduction exist previously, they focus on positive effects only unlike this paper. Poole [18] firstly considers abducible rules, which specify predefined patterns of rules for use in abduction. This is a very strong bias, and it is generally impossible to prepare all patterns of rules in advance and to perform

Hypothesizing about Causal Networks with Positive and Negative Effects

127

Table 2. Results of recovering links in the CDK pathway Removed (1) (1), (2) (1), (3) (2), (4) (4), (6) links Depth #H Time #H Time #H Time #H Time #H Time 3 1 0.6 1 0.6 1 0.7 1 0.7 1 0.7 4 2 0.6 3 0.6 3 0.7 4 0.7 5 0.8 5 3 0.7 4 1.3 5 1.2 8 1.3 6 1.2 6 3 1.3 4 1.7 6 1.6 11 1.9 8 1.8 7 4 1.7 5 2.3 7 2.3 12 2.9 8 2.9 8 4 2.2 5 3.2 7 3.5 12 3.9 8 5.0 9 4 2.5 5 3.8 7 4.2 12 6.0 8 5.5 Recovered (1) (1g), (2g) (1), (3) (2), (4) (4) links

(1), (2), (3) (4), (5) #H Time 1 1.1 4 1.5 12 1.9 25 2.8 37 3.5 37 5.7 37 6.9 (1g), (2g), (3g) (4), (5)

predicate invention. Work on Robot Scientist [10] adopts abduction to complete biochemical pathways without inhibition, and reaction edges in pathways are represented in a more complex manner [22]. Applications of SOLAR to complete metabolic pathways are also discussed in [20], but joint causes are not considered. CF-induction [4] can both abduce and induce rules, and its applications to complete causal rules as well as network status in metabolic pathways are shown in [29], but hypothesis enumeration and predicate invention are not easy tasks for CF-induction. In ILP, some previous attempts contribute to induction of causal rules [11,16,5]. Moyle [11] requires the complete initial state as input and needs to compute a complete set of narrative facts in advance, and thus cannot account for observations handled in this paper. Otero [16] considers the case of incomplete narratives, but assumes that the truth value of a goal fluent changes only once in an incomplete narrative. Our algorithm, on the other hand, can induce any case in which the fluent value has changed more than once in intermediate situations. These previous works in ILP need either frame axioms or inertia rules in logic programs. The former causes the frame problem and the latter requires induction in nonmonotonic logic programs. Inoue et al. [5] uses an action language, but requires regular inference that searches the space of possible hypotheses. There are several work on completing biological networks. Metabolic pathways are completed in [24] and are revised in [21] using answer set programming, although they do not invent new nodes. The work [24] does not consider inhibition. For revision [21], real deletion is generally impossible in biological networks unless they are subject to change. Hence, we only add new links and nodes by abduction, yet nonmonotonic features of inhibition are controlled by our method due to the axiomatization (15–20). Abduction in metabolic pathways with inhibition is considered in [27], although the problem in [27] is different from network completion and no new links/nodes are abduced. For gene regulatory networks, Gat-Viks and Shamir [2] determine a class of regulation functions, by which regulators determine transcription, and analyze their complexity. Zupan et al. [30] construct networks from mutant data using abduction, but use experts’ heuristic rules for construction. Finally, completion of signaling networks is analyzed by Akutsu et al. [1], in which unknown Boolean functions are guessed in a Boolean network whose topology is known. This contrasts with our setting that a network is incomplete and its topology is not fixed. Tran and Baral [28] use an action language

128

K. Inoue, A. Doncescu, and H. Nabeshima

which formalizes notions such as causal rules, trigger rules and inhibition rules to model cell biochemistry, and apply it to hypothesize about signaling networks. As discussed in Section 4, all ground candidate nodes and links to be added are prepared as those abducible causal/trigger/inhibition rules in advance in [28].

6 Conclusion The method of meta-level abduction [6] has been greatly extended in this paper to allow representation of positive and negative causal effects. With this extension, nonmonotonic reasoning in causal networks and abduction of positive and negative links are now possible. We have also shown an application to signaling pathways, and expect that the proposed method can be applied to abduction in other types of biological networks [2,27,29,21]. It is important to evaluate logically possible hypotheses, and some statistical methods can be applied. For example, hypotheses can be ranked according to frequencies of literals appearing in them and corresponding paths [8], and can be given their scores according to their fitness with observed data [2]. Problem solving with meta-level abduction consists of (i) design of meta-level axioms, (ii) representation of domain knowledge at the meta level, and (iii) restriction of the search space to treat large knowledge. This work supposes an incomplete network for the point (ii), whose representation is rather tractable. In fact, we have made great effort on the point (i), yet another axiomatization is possible for controlling inference in a different way. Possible extensions include introduction of time for causal chains and application of majority logic for determining values in competing cases. The point (iii) is achieved by introducing more constraints, and it is a future work to explore useful methods for inducing such constraints.

References 1. Akutsu, T., Tamura, T., Horimoto, K.: Completing Networks Using Observed Data. In: Gavald`a, R., Lugosi, G., Zeugmann, T., Zilles, S. (eds.) ALT 2009. LNCS, vol. 5809, pp. 126–140. Springer, Heidelberg (2009) 2. Gat-Viks, I., Shamir, R.: Chain functions and scoring functions in genetic networks. Bioinformatics 19(suppl.1), i108–i117 (2003) 3. Inoue, K.: Linear resolution for consequence finding. Artificial Intelligence 56, 301–353 (1992) 4. Inoue, K.: Induction as consequence finding. Machine Learning 55, 109–135 (2004) 5. Inoue, K., Bando, H., Nabeshima, H.: Inducing Causal Laws by Regular Inference. In: Kramer, S., Pfahringer, B. (eds.) ILP 2005. LNCS (LNAI), vol. 3625, pp. 154–171. Springer, Heidelberg (2005) 6. Inoue, K., Furukawa, K., Kobayashi, I., Nabeshima, H.: Discovering Rules by Meta-level Abduction. In: De Raedt, L. (ed.) ILP 2009. LNCS, vol. 5989, pp. 49–64. Springer, Heidelberg (2010) 7. Inoue, K., Iwanuma, K., Nabeshima, H.: Consequence finding and computing answers with defaults. Journal of Intelligent Information Systems 26, 41–58 (2006) 8. Inoue, K., Sato, T., Ishihata, M., Kameya, Y., Nabeshima, H.: Evaluating abductive hypotheses using an EM algorithm on BDDs. In: Proceedings of IJCAI 2009, pp. 810–815 (2009) 9. Iwanuma, K., Inoue, K.: Minimal Answer Computation and SOL. In: Flesca, S., Greco, S., Leone, N., Ianni, G. (eds.) JELIA 2002. LNCS (LNAI), vol. 2424, pp. 245–257. Springer, Heidelberg (2002)

Hypothesizing about Causal Networks with Positive and Negative Effects

129

10. King, R.D., Whelan, K.E., Jones, F.M., Reiser, P.G.K., Bryant, C.H., Muggleton, S.H., Kell, D.B., Oliver, S.G.: Functional genomic hypothesis generation and experimentation by a robot scientist. Nature 427, 247–252 (2004) 11. Moyle, S.: Using Theory Completion to Learn a Robot Navigation Control Program. In: Matwin, S., Sammut, C. (eds.) ILP 2002. LNCS (LNAI), vol. 2583, pp. 182–197. Springer, Heidelberg (2003) 12. Muggleton, S.H., Bryant, C.H.: Theory Completion Using Inverse Entailment. In: Cussens, J., Frisch, A.M. (eds.) ILP 2000. LNCS (LNAI), vol. 1866, pp. 130–146. Springer, Heidelberg (2000) 13. Muggleton, S., Buntine, W.: Machine invention of first-order predicate by inverting resolution. In: Proceedings of the 5th International Workshop on Machine Learning, pp. 339–351. Morgan Kaufmann, San Francisco (1988) 14. Nabeshima, H., Iwanuma, K., Inoue, K.: SOLAR: A consequence finding system for advanced reasoning. In: Cialdea Mayer, M., Pirri, F. (eds.) TABLEAUX 2003. LNCS, vol. 2796, pp. 257–263. Springer, Heidelberg (2003) 15. Nabeshima, H., Iwanuma, K., Inoue, K., Ray, O.: SOLAR: An automated deduction system for consequence finding. AI Communications 23(2–3), 183–203 (2010) 16. Otero, R.P.: Induction of the Indirect Effects of Actions by Monotonic Methods. In: Kramer, S., Pfahringer, B. (eds.) ILP 2005. LNCS (LNAI), vol. 3625, pp. 279–294. Springer, Heidelberg (2005) 17. Pearl, J.: Causality: Models, Reasoning, and Inference, 2nd edn., Cambridge (2009) 18. Poole, D.: A logical framework for default reasoning. Artificial Intelligence 36, 27–47 (1988) 19. Prives, C., Hall, P.A.: The p53 pathway. Journal of Pathology 187, 112–126 (1999) 20. Ray, O., Inoue, K.: A Consequence Finding Approach for Full Clausal Abduction. In: Corruble, V., Takeda, M., Suzuki, E. (eds.) DS 2007. LNCS (LNAI), vol. 4755, pp. 173–184. Springer, Heidelberg (2007) 21. Ray, O., Whelan, K., King, R.: Logic-based steady-state analysis and revision of metabolic networks with inhibition. In: Proceedings of the 3rd International Workshop on Intelligent Informatics in Biology and Medicine, pp. 661–666 (2010) 22. Reiser, P.G.K., King, R.D., Kell, D.B., Muggleton, S.H., Bryant, C.H., Oliver, S.G.: Developing a logical model of yeast metabolism. Electronic Transactions in Artificial Intelligence 5B2(024), 223–244 (2001) 23. Reiter, R.: A logic for default reasoning. Artificial Intelligence 13, 81–132 (1980) 24. Schaub, T., Thiele, S.: Metabolic Network Expansion with Answer Set Programming. In: Hill, P.M., Warren, D.S. (eds.) ICLP 2009. LNCS, vol. 5649, pp. 312–326. Springer, Heidelberg (2009) 25. Schurz, G.: Patterns of abduction. Synthese 164(2), 201–234 (2008) 26. Shmulevich, I., Dougherty, E.R., Kim, S., Zhang, W.: Probabilistic Boolean networks: A rule-based uncertainty model for gene regulatory networks. Bioinformatics 18(2), 261–274 (2002) 27. Tamaddoni-Nezhad, A., Chaleil, R., Kakas, A., Muggleton, S.: Application of abductive ILP to learning metabolic network inhibition from temporal data. Machine Learning 65, 209–230 (2006) 28. Tran, N., Baral, C.: Hypothesizing about signaling networks. Journal of Applied Logic 7(3), 253–274 (2009) 29. Yamamoto, Y., Inoue, K., Doncescu, A.: Integrating abduction and induction in biological inference using CF-Induction. In: Lodhi, H., Muggleton, S. (eds.) Elements of Computational Systems Biology, pp. 213–234. John Wiley & Sons, Chichester (2010) 30. Zupan, B., Demsar, J., Bratko, I., Juvan, P., Halter, J.A., Kuspa, A., Shaulsky, G.: GenePath: A system for automated construction of genetic networks from mutant data. Bioinformatics 19(3), 383–389 (2003)

BET : An Inductive Logic Programming Workbench Srihari Kalgi, Chirag Gosar, Prasad Gawde, Ganesh Ramakrishnan, Kekin Gada, Chander Iyer, Kiran T.V.S, and Ashwin Srinivasan Department of Computer Science and Engineering IIT Bombay, India {cgosar,ganesh}@cse.iitb.ac.in {chanderjayaraman,kekin.gada,prasg41,srihari.kalgi,t.kiran05}@gmail.com [email protected] http://www.cse.iitb.ac.in/~bet

Abstract. Existing ILP (Inductive Logic Programming) systems are implemented in diﬀerent languages namely C, Progol, etc. Also, each system has its customized format for the input data. This makes it very tedious and time consuming on the part of a user to utilize such a system for experimental purposes as it demands a thorough understanding of that system and its input speciﬁcation. In the spirit of Weka [1], we present a relational learning workbench called BET(Background + Examples = Theories), implemented in Java. The objective of BET is to shorten the learning curve of users (including novices) and to facilitate speedy development of new relational learning systems as well as quick integration of existing ILP systems. The standardized input format makes it easier to experiment with diﬀerent relational learning algorithms on a common dataset. Keywords: BET, ILP systems, Golem, Progol, FOIL, PRISM, TILDE.

1

Introduction

There have been several Inductive Logic Programming (ILP) system implementations. Each system has its own speciﬁcations for input data. Diﬀerent systems do not necessarily agree on their inputs. This often makes comparisons across diﬀerent implementations tricky, owing to either a diﬀerence in names or semantics of parameters and/or a diﬀerence in the choice of the programming language. Very often, the primitives and core components employed, such as theorem provers, SAT solvers, inference engines, etc., are also diﬀerent across diﬀerent implementations, rendering the computation and accuracy comparisons less reliable. This paper discusses a Workbench for ILP called BET. BET is developed in Java and it standardizes the speciﬁcation of input using XML (eXtensible Markup Language). It provides a common framework for “building” as well as “integrating” diﬀerent ILP systems. The provision for implementing P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 130–137, 2011. c Springer-Verlag Berlin Heidelberg 2011

BET : An ILP Workbench

131

algorithms in a common language (Java) improves the feasibility of comparing algorithms on their computational speeds. Whereas, the input standardization enables sound comparison of accuracies (or related measures) and also allows for experimenting with multiple ILP systems on the same dataset without any input conversion required to the system speciﬁc format. BET includes several evaluation functions and operator primitives such as Least General Generalization (LGG) [9], Upward cover, Downward cover, etc. These features facilitate the rapid development of new relational learning systems and also ease out the integration of existing relational systems into BET. BET also allows a user to choose from multiple theorem provers as plug and play components. Presently, YAP (Yet Another Prolog) [12] and SWI-Prolog [13] are included in the basic package. The initial version of BET has three relational systems implemented namely FOIL [4], Golem [3] and TILDE [2][10] and four relational systems integrated namely Progol [11], FOIL, Golem and PRISM [5][6] (Though PRISM is not a standard ILP system, it has been integrated with the speciﬁc intension of learning probabilities in order to associate uncertainity with theories learnt using ILP systems). We proceed with an overview of BET and the motivation to develop such a system in Section 2. Section 3 focuses on the design of the BET system. Section 4 explains how new relational learning systems can be integrated/implemented in BET. Section 5 compares BET with existing workbenches and highlights the advantages of BET. We summarize BET in Section 6.

2

Overview

A principal motivation for developing a system like BET is the reduction of the learning curve for both expert-users and novices as well as programmers in the area of relational learning, particularly ILP. For example, with BET, the enduser will need to understand only the standardized input parameters for BET. This reduces the time overheads involved in comparing diﬀerent algorithmic implementations as well as in experimenting with individual implementations. More speciﬁcally, a user need not convert datasets from one format to another while switching between ILP systems. Further, the standardized APIs in BET make development of algorithms within BET much easier. Figure 1 shows the block diagram of BET. Any ILP system in BET takes four ﬁles as its input namely positive examples, negative examples, background knowledge and language restriction ﬁles, and it outputs in the form of theories. There are primarily two important components of BET namely the BET GUI and the BET Engine. The BET Engine is the back-end engine at the core of BET and the BET GUI communicates with the BET engine through the medium of a properties ﬁle. BET users can experiment with the system using the GUI whereas programmers can use the APIs provided and extend BET with new ILP or relational learning systems. Section 5 explains how BET could be extended.

132

S. Kalgi et al.

Fig. 1. Block diagram of BET

3

Design of BET

Almost all ILP algorithms as well as systems require following ﬁve inputs: positive examples, negative examples, background knowledge, mode declarations and hyper-parameters for tuning the system. The clauses learnt may be customized by means of the mode declarations, though some algorithms/systems may not allow for the speciﬁcation of mode declarations (example is Conﬁdence-based Concept Discovery system [7]). In this Section, we discuss the need for having a standard for the input, and eventually specify the BET standard input ﬁle formats. 3.1

Need for Standard Format

There is little or no consensus between the input speciﬁcations of ILP systems. For example, FOIL has its standard input speciﬁcation which is completely diﬀerent from that of Golem or Progol. FOIL accepts the positive examples, negative examples and background knowledge in a single ﬁle. On the other hand, Golem takes three ﬁles as input viz. positive example ﬁle (.f ), negative example ﬁle (.n) and the background knowledge ﬁle (.b) which includes the mode declarations. Another ILP system Progol has an input format that is slightly similar to Golem, but has many more setting parameters. Clearly any end user, desiring to experiment with a new ILP system, is required to understand its input format thoroughly, convert the data in hand to that format and only then can he/she use it. BET assists the end user with a standardized input speciﬁcation that is generic enough and can be converted to the speciﬁcation of any existing ILP system. Section 3.2 will discuss about BET standard formats. 3.2

BET Standard Format

As already stated, BET’s inputs are comprised of four XML ﬁles namely positive examples, negative examples, background knowledge and language restriction ﬁle. Sample positive example, negative example, background knowledge and language restriction ﬁles for learning the ancestor relation are shown in Table 1, Table 2, and Table 3 respectively in the document available at [15]. The hyperparameters can be speciﬁed in Language Restriction ﬁle. The format for each ﬁle is as follows:

BET : An ILP Workbench

133

Positive Example File: The ﬁle consists of clauses which represents positive examples for the relation (predicate) for which the theory needs to be learned. Negative Example File: This ﬁle consists of clauses which represents negative examples of the predicate (relation) for which the theory needs to be learned. There may be some ILP systems which do not consider any negative examples during construction of theory, but may utilize negative examples for pruning the theories that have been learned. Background knowledge File: The background knowledge (BGK) ﬁle contains all the domain specific information which is required by the ILP system in order to learn the target predicate. All this information should be in the form of clauses. It can also contain rules instead of just facts. Language Restriction File: The structured search space (lattice or simply a partial order) of clauses which needs to be searched in order to arrive at a reasonably good hypothesis is almost inﬁnite. Language Restrictions endow an ILP system with the ﬂexibility of reducing the search space. There are three generic parts to the Language Restriction viz. Mode declaration, Type and Determination. Also we can specify the system-speciﬁc hyper-parameters like stopping threshold, minimum accuracy, etc. in this ﬁle only. Each of them, is explained below. Type: Type deﬁnes the type of constants. For example, the constant john is of type person, constant 1 is of type integer. Type speciﬁcation can be done in the language restriction ﬁle. Mode Declarations: Mode declarations declare the mode of the predicates that can be present in any of clausal theories. The mode declaration takes the form mode(RecallNumber,PredicateMode), where RecallNumber: bounds the non-determinacy of a form of predicate call. PredicateMode: has the following syntax predicate(ModeType,ModeType,...) predicate(Type,Type,...) +Type : the term must be an input variable of type Type. -Type : the term must be an output variable of type Type. #Type : the term must be a ground constant of type Type. Determination: This component of mode declarations provides information regarding which predicates need to be learned in terms of which other predicates. Hyper-parameters: Hyper-parameters are very much system speciﬁc and we can ﬁnd the diﬀerent parameters for a system by doing system-name –help or through the graphical interface for that particular system.

134

4

S. Kalgi et al.

Class Diagram and Components of BET

The class diagram of BET is shown in Figure 1 in the document available at [15]. The major components of BET are explained in subsequent sections. ClauseSet: ClauseSet refers to a set of clauses, which is often referred to in the description of ILP algorithms. The ClauseSet interface deﬁnes the signature of the methods used to access the ClauseSet object. LanguageRestriction: LanguageRestriction is an interface for mode declarations, determinations and types. InputEncoder: InputEncoder is mainly used for integrating legacy systems (i.e. ILP systems written in native code) into BET. Any wrapper around an integrated legacy system will require conversion of the BET standard data format to the format accepted by the legacy system. Any legacy system which requires to be integrated into BET has to implement InputEncoder interface and provide a method of converting the standard BET ﬁle format to the format accepted by the legacy system. TheoryLearner: TheoryLearner is an important component of BET. It is responsible for learning the theory (hypothesis) from the input. TheoryLearner has objects of type InputEncoder and EvalMetric (explained next) as its data members. In case the ILP system is completely implemented in Java (i.e., if it is not a legacy system), it can use a dummy implementation of the InputEncoder interface and pass the object to the TheoryLearner class. The dummy implementation of InputEncoder interface is mainly used to access the BET input ﬁles. EvalMetric (Evaluation Metric): Any ILP algorithm will try to explore the structured space (subsumption lattice or partial order) of clauses, by traversing the graph using reﬁnement operators. At every point in the space, the algorithm has to decide whether a clause in the space is good enough to be present in the hypothesis. For this purpose, the covers relation is employed. If the covers relation is deﬁned by Entailment (|=), then the ILP system is said to learn from entailment [9]. Some other ILP systems learn from proof traces [9], while few others learn from interpretations [9], etc. Any implementation of EvalMetric will specify the covers relation, i.e., definition of an example being covered by background knowledge (with candidate hypothesis). TheoremProver: The theorem prover is the backbone of most ILP systems. BET has two diﬀerent theorem provers namely YAP and SWI-Prolog. YAP is perhaps the fastest theorem prover as of today. YAP is built in C and doesn’t have any JNI (Java Native Interface), so the YAP process is run by spawning a process through a BET program. SWI-Prolog is also built in C, but it does support JNI (Java Native Interface). SWI-Prolog has a standard interface called JPL which comes bundled with SWI-Prolog itself.

BET : An ILP Workbench

5

135

Support for Building ILP Systems in BET

It is very easy to integrate1 an existing system into BET. Also the implementation2 of a new system within BET is faster than implementing it from scratch. The following section briefs on how to integrate and implement a system in BET. 5.1

Integrating a Legacy System in BET

Legacy systems can be integrated into BET as follows: – Implement the interface InputEncoder, which should provide a functionality to convert ﬁles from BET standard format to the format accepted by the legacy system. – Extend the TheoryLearner class and override the method learnTheory. 5.2

Implementing a New ILP System in BET

– A dummy implementation of the interface InputEncoder is required for this purpose, since the TheoryLearner class expects an object of InputEncoder while creating its object. – Extend the TheoryLearner class and override the method learnTheory. – Diﬀerent types of Evaluation Metric, Theorem provers (YAP, SWI-Prolog) can be used in implementing the ILP system.

6

Related Work

Aleph and GILPS (Generic Inductive Logic Programming System) are two earlier eﬀorts put in to develop a workbench like BET for Inductive Logic Programming. Aleph [8] is developed by Ashwin Srinivasan, whereas the GILPS [14] workbench is developed by Jose Santos. 6.1

Aleph

Aleph is written in Prolog principally for use with Prolog compilers like Yap and SWI-Prolog compiler. Aleph oﬀers a number of parameters to experiment with its basic algorithm. These parameters can be used to choose from diﬀerent search strategies, various evaluation functions, user-deﬁned constraints and cost speciﬁcations. Aleph also allows user-deﬁned reﬁnement operators. 6.2

GILPS

GILPS implements three relational systems namely TopLog, FuncLog and ProGolem. GILPS requires at least YAP 6.0 for its execution. Many of its user predicates and settings are shared with Aleph. 1 2

The authors of this paper took two weeks to integrate PRISM in BET and one week individually for integrating Golem and FOIL. The authors of this paper implemented TILDE, FOIL and Golem in BET within a week for each algorithm.

136

6.3

S. Kalgi et al.

Advantages of BET over Existing Systems

BET oﬀers following advantages over existing systems (Aleph, GILPS ,etc.): – BET is more likely to ﬁnd use in the larger applied machine learning and Mining communities who are less familiar with prolog and where it is important to interface learning tools in Java (such as BET) with applications largely written in procedural languages (very often Java). This can also make diagnosis and debugging easy. As against this, GILPS and Aleph assume familiarity with Prolog and cannot be easily invoked from applications written in Java. – In the spirit of Weka, BET provides a nice framework for the integration of legacy systems as well as for the implementation of new systems. In fact, while the basic BET framework was provided by the ﬁrst two co-authors, the remaining co-authors used that framework to implement several ILP algorithms. This is something that Aleph and GILPS do not cater to as well. – BET allows saving the learned models as serialized ﬁles which can later be used for ﬁnding models for new problems. – BET provides a choice of theorem prover where as GILPS can work only with YAP. – BET comes with a YAP installer and all the “integrated” systems. – BET has classes to convert the background knowledge, positive examples and negative examples ﬁles into XML format. Language restriction ﬁle needs little human intervention for this purpose. – BET provides a standard input/output format which enables end-user to experiment with multiple relational systems with the same datasets. Aleph uses three diﬀerent ﬁles namely (.f), (.n) and (.b) whereas GILPS takes input as prolog ﬁles (.pl).

7

Summing Up BET

The standardized input format of BET makes it more convenient for user to have only one input format for all relational systems. The ability of BET to write learned classiﬁcation/regression models as serialized ﬁles allows for saving the model and reusing the model at a later stage for classiﬁcation or regression on new problems. The BET graphical user interface makes experimentation with implemented algorithms and integrated systems much more easier. Use of JAVA as an implementation language makes BET extensible and platform independent. The only visible disadvantage of BET is that the JAVA implementation of relational systems are slower as compared to their C/C++/Progol counterparts, but we chose Java over C++ owing to ease of extending and platform independence of the former over the latter.

BET : An ILP Workbench

137

References 1. Frank, E., Hall, M.A., Holmes, G., Kirkby, R., Pfahringer, B., Witten, I.H.: WekaA machine learning workbench for data mining. In: Data Mining and Knowledge Discovery Handbook- A Complete Guide for Practitioners and Researchers, pp. 1305–1314. Springer, Berlin (2005) 2. Blockeel, H., De Raedt, L.: Top-down induction of ﬁrst-order logical decision trees. Artiﬁcial Intelligence Journal, 285–297 (1998) 3. Muggleton, S.H., Feng, C.: Eﬃcient induction of logic programs. In: Proceedings of the First Conference on Algorithmic Learning Theory, Ohmsha, Tokyo, pp. 368– 381 (1990) 4. Ross Quinlan, J., Mike Cameron-Jones, R.: FOIL: A Midterm Report. In: Brazdil, P.B. (ed.) ECML 1993. LNCS, vol. 667, pp. 3–20. Springer, Heidelberg (1993) 5. Sato, T., Kameya, Y., Zhou, N.-F.: Generative Modeling with Failure in PRISM. In: IJCAI, pp. 847–852 (2005) 6. Sato, T., Kameya, Y.: PRISM: A Language for Symbolic-Statistical Modeling. In: IJCAI, pp. 1330–1339 (1997) 7. Kavurucu, Y., Senkul, P., Toroslu, I.H.: ILP-based concept discovery in multirelational data mining. Expert Systems with Applications 36, 11418–11428 (2009) 8. Aleph Manual, http://www.comlab.ox.ac.uk/activities/machinelearning/ Aleph/aleph.html 9. Statistical Relational Learning Notes, http://www.cse.iitb.ac.in/~cs717/notes/ 10. TILDE: Top-down Induction of Logical Decision Trees, http://www-ai.ijs.si/ ~ilpnet2/systems/tilde.html 11. Progol, http://www.doc.ic.ac.uk/~shm/progol.html 12. YAP Manual, http://www.dcc.fc.up.pt/~vsc/Yap/ 13. SWI-Prolog, http://www.swi-prolog.org/ 14. General Inductive Logic Programming System, http://www.doc.ic.ac.uk/~jcs06/GILPS/ 15. ILP Systems Integrated Implemented in BET and Sample Examples, http://www. cse.iitb.ac.in/~bet/appendix.pdf

Seeing the World through Homomorphism: An Experimental Study on Reducibility of Examples ˇ Ondˇrej Kuˇzelka and Filip Zelezn´ y Intelligent Data Analysis Research Group Dept. of Cybernetics, Czech Technical University in Prague http://ida.felk.cvut.cz {kuzelo1,zelezny}@fel.cvut.cz Abstract. We study reducibility of examples in several typical inductive logic programming benchmarks. The notion of reducibility that we use is related to theta-reduction, commonly used to reduce hypotheses in ILP. Whereas examples are usually not reducible on their own, they often become implicitly reducible when language for constructing hypotheses is ﬁxed. We show that number of ground facts in a dataset can be almost halved for some real-world molecular datasets. Furthermore, we study the impact this has on a popular ILP system Aleph.

1

Introduction

In this paper, we are interested in identiﬁcation of learning examples which are not distinguishable given a ﬁxed hypothesis language. We propose a notion of safe reduction and show how it can be exploited in order to obtain smaller examples equivalent to the original ones.

2

Preliminaries

Let us ﬁrst state some notational conventions used in this paper. The set of literals in a clause C is written as lits(C), |C| = |lits(C)| is the size of C. The set of variables in a clause C is written as vars(C) and the set of all terms by terms(C). A substitution θ is a mapping from variables of a clause C to terms of a clause D. Let us now deﬁne θ-reduction [4], which will be later utilized for reduction of training examples. In order to deﬁne θ-reduction, we need the notion of θsubsumption [5]. Let us denote the set of variables contained in a clause C by vars(C). We say that a clause C θ-subsumes clause D (denoted by C θ D) if and only if there is a substitution θ : vars(C) → vars(D) such that Cθ ⊆ D. It holds that θ-subsumption implies entailment, but not vice-versa, i.e. if C θ D then C |= D, but if C |= D then C θ D may or may not be true. Definition 1 (θ-Reduction). Let C and D be clauses. We say that C and D are θ-equivalent (denoted by C ≈θ D) if and only if C θ D and D θ C. If there is a clause E such that C ≈θ E and |E| < |C| then C is said to be θ-reducible. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 138–145, 2011. c Springer-Verlag Berlin Heidelberg 2011

Seeing the World through Homomorphism: An Experimental Study

139

For example, C = east(T ) ← hasCar(T, C)∧hasLoad(C, L1)∧hasLoad(C, L2)∧ box(L2) is θ-reducible because C ≈θ E where E = east(T ) ← hasCar(T, C) ∧ hasLoad(C, L) ∧ box(L). In this short paper, we will work within the learning from entailment setting [1]. Definition 2 (Learning from Entailment). Let H and e be clausal theories. Then we say that H covers e under entailment (denoted by H E e) if and only if H |= e. For example, let e = east(t1) ← hasCar(t1, c1) ∧ hasLoad(c1, l1) ∧ box(l1) and let H = ∀T ∀C : east(T ) ← hasCar(T, C). Then we may easily check that H covers e under entailment (i.e. H E e). In what follows we will refrain from writing the universal quantiﬁers in clauses.

3

Reducing the Examples

The learning task that we study in this paper is fairly standard. We are given a set of positive and negative examples encoded as ﬁrst-order clauses and we would like to ﬁnd a classiﬁer separating the positive examples from the negative examples. This task could be solved by numerous ILP systems. We aim at ﬁnding a reduction procedure that would allow us to reduce the number of atoms in the examples while guaranteeing that the coverage of individual hypotheses would not be changed. This is formalized by the next deﬁnition which introduces the concept of safe reduction under intepretations. Definition 3 (Safe Reduction under Entailment). Let e and eˆ be two interpretations and let L be a language specifying all possible hypotheses. Then eˆ is said to be a safe reduction of e under entailment if and only if ∀H ∈ L : (H E e) ⇔ (H E eˆ) and |ˆ e| < |e|. Clearly, any hypothesis H which splits the positive examples from the negative examples correctly will also split the respective safely reduced examples correctly. Also, when predicting classes of test-set examples, any deterministic classiﬁer that bases its decisions on the queries using solely the covering relation E will return the same classiﬁcation even if we replace some of the examples by their safe reductions1 . On the other hand, even the classiﬁers constructed by a deterministic learner on reduced and non-reduced examples may be diﬀerent. For example, ILP systems that restrict their search space by bottom clauses may return diﬀerent hypotheses for reduced and non-reduced examples. However, if the search is performed exhaustively, every hypothesis discovered for the reduced data will have to cover the same set of examples as some corresponding hypothesis discovered for the non-reduced data. Let us now look at possible candidates for safe reduction. For example, θreduction eˆ of a ground example e is a safe reduction because trivially eˆ = e. 1

This is also true for propositionalization approaches that use the E relation to construct boolean vectors which are then processed by attribute-value-learners.

140

ˇ O. Kuˇzelka and F. Zelezn´ y

Assuming that in practical learning tasks, examples are very often ground, θreduction alone does not seem to help us very much. It turns out that we need some additional assumptions in order to be able to reduce even ground examples. Before we present the (admittedly very simple) kind of safe reduction that will be in the center of our interest in this paper, we go through the next simple motivating example. Example 1. Suppose that we have one positive example e+ 1 = east(t1) ← hasCar(t1, c1) ∧ hasLoad(c1, l1) ∧ hasCar(t1, c2) and one negative example e− 2 = east(t2) ← hasCar(t2, c3). Our task is to learn a non-recursive deﬁnition of predicate east/1. Let the language L contain all non-recursive Horn clauses free of functions and constants and containing only predicate east/1 in the head and predicates hasCar/2 and hasLoad/2 in the body. Because of the non-recursivity and function-freeness assumptions we can check whether H E e is true by testing θ-subsumption between the hypothesis and the example. Let e be a clause obtained by variabilizing the clause e. Since constants are not allowed in the hypothesis language L, it holds that H θ e ⇔ H θ e . Next, let eˆ be θ-reduction of e . It also holds H θ e ⇔ H θ eˆ . Clearly, if H θ e, there is a substitution θ such that Hθ ⊆ e. If we replace the constants in θ by the respective variables used when variabilizing e and obtain a substitution θ , it will also hold Hθ ⊆ e . Finally, since there is a substitution θR1 such that e θR1 ⊆ eˆ (because e ≈ eˆ ), it must also hold H θ eˆ because Hθ θR1 ⊆ eˆ . Similarly, we could justify the implication in the other direction, i.e. H θ e ⇐ H θ eˆ . Applied to the example e+ ˆ+ 1 , we have that e 1 = east(T 1) ← hasCar(T 1, C1) ∧ + hasLoad(C1, L1) is a safe reduction of e1 w.r.t. the language L. Notice that it is important to have a ﬁxed hypothesis language to perform this kind of reductions. For example, if we allowed the constants c1, c2 and c3, eˆ+ 1 would no longer be a safe reduction of e+ 1 because the hypothesis H = east(T ) ← hasCar(T, c1) ∧ hasCar(T, c2) would cover e+ ˆ+ 1 but not e 1. We are now ready to describe the reduction method. The method expects the examples encoded as ﬁrst-order clauses and a description of the hypothesis language on its input. The hypothesis language speciﬁcation should provide information about which predicates and constants can be used to build the hypotheses. It starts by variabilizing the constants which are not in the hypothesis language but appear in the examples. After that, examples are reduced using θ-reduction and these reductions are output by the algorithm. In order to justify correctness of this procedure, we need the next almost trivial proposition. Proposition 1. Let L be a hypothesis language and let e be a clause. (i) Let e˜ be a clause obtained from e by variabilizing the constants which are not contained in the hypothesis language. Then (H E e) ⇔ (H E e˜) for any H ∈ L (ii) Let eˆ be θ-reduction of e˜. Then (H E e) ⇔ (H E eˆ) for any H ∈ L. The ﬁrst part of Proposition 1 justiﬁes the step of the reduction, in which some constants are replaced by variables, and the second part justiﬁes the step, in

Seeing the World through Homomorphism: An Experimental Study

141

which the examples are reduced using θ-reduction. Optionally, we may perform also a third step in which the variables introduced in the ﬁrst step are converted back to constants. Example 2. Let us have a hypothesis language for the task of predicting mutagenicity of molecules L. Let us have one example e = pos(m) ← bond(a1, a2, 2) ∧ bond(a2, a1, 2) ∧ a(m, a1, c) ∧ a(m, a2, c) ∧bond(a1, a3, 1) ∧ bond(a3, a1, 1) ∧ a(m, a3, h) ∧ a(m, a4, h) ∧ bond(a2, a5, 1) ∧bond(a5, a2, 1) ∧ a(m, a5, h) ∧ bond(a2, a6, 1) ∧ bond(a6, a2, 1) ∧ a(m, a6, h). In the hypothesis language L we do not consider the names of atoms (i.e. constants a1, a2 etc). We start by performing the ﬁrst step of the reduction procedure, i.e. by variabilizing the constants that do not appear in the hypothesis language L. We replace constant a1 by variable A1, a2 by A2 and so on and obtain a clause e˜. After this step, we compute the θ-reduction of e˜, which is eˆ = pos(m) ← bond(A1, A2, 2) ∧ bond(A2, A1, 2) ∧ atm(m, A1, c)∧ ∧a(m, A2, c) ∧ bond(A1, A3, 1) ∧ bond(A3, A1, 1) ∧ ∧a(m, A3, h)∧ . bond(A2, A5, 1) ∧ bond(A5, A2, 1) ∧ a(m, A5, h), The θ-reduction of eˆ is witnessed by the substitution θ = {A4/A3, A6/A5}. It is easy to check that eθ ⊆ eˆ. Clause eˆ is a safe reduction of e.

4

Experiments

In this section, we discuss reducibility of examples from real-life datasets using typical hypothesis languages. We show that, in the most extreme case, some examples are reduced to one tenth of their original length. Then we study the eﬀect example reductions have on Aleph. The θ-reduction is performed by an algorithm built upon the θ-subsumption system ReSumEr2 [3]. Reduction runtimes were in all cases under 30 seconds, which is a negligible amount of time compared to time consumed by Aleph as we will see. In all of the experiments we deal only with ground examples and non-recursive clauses. Therefore, for these experiments, we do not need the whole logical formalism. It would suﬃce to consider only θ-subsumption (homomorphism). 4.1

Mutagenesis

The ﬁrst set of experiments which we performed was done with the well-known Mutagenesis dataset [6]. In the encoding which we used and which is also usually used in the experiments with most ILP systems, every molecule is described using predicates atm(M, A, T, T 2) and bond(A, B, BT ). For example, let us have a literal atm(mol, atom1, c, 22). Here, mol is an identiﬁer of the molecule, atom1 is an identiﬁer of the atom, the third argument denotes the atomic type, here c means carbon, and the constant 22 in the fourth argument means that atom1 is an aromatic atom. Similarly, bond(atom1, atom2, 1) denotes a single bond

142

ˇ O. Kuˇzelka and F. Zelezn´ y 1 0.9 0.8

Compression

0.7 0.6 0.5 0.4 0.3 0.2 0.1 0

Muta

Muta with f. g. PTC (FM) Dataset

CAD

Fig. 1. Compression rates (number of facts in reduced example / number of facts in original example) obtained for three real-life datasets (Mutagenesis [6], Mutagenesis with function groups, PTC [2] and CAD [7]). The bars show maximum, average and minimum obtained compression.

between atoms atom1 and atom2. Each atomic bond is represented by two such bond/3 literals. In this case, when testing H E e with a single non-recursive clause H, the covering relation E corresponds to homomorphism testing (or θsubsumption testing2 ). We let the hypothesis language L contain only constants corresponding to atomic types and numbers. After applying the safe reduction procedure, the number of literals in the examples decreased to 86% on average. The most succesful reduction decreased the number of literals in an example to 40% of the original count. Next, we enriched the examples and the hypothesis language L by description of function groups such as benzene, phenathrene etc. This corresponds to another frequently used setting. Interestingly, the reduction rates diﬀered only by a very small number from the previous case. The number of literals decreased to 87% on average and, for the most succesful reduction, the number of literals in one example decreased to 42% of the original count of literals. 4.2

Predictive Toxicology Challenge

The next experiment was performed with the Predictive Toxicology Challenge dataset (PTC). PTC dataset consists of molecules marked according to their carcinogenicity for female mice, male mice, female rats and male rats. Since the examples are almost the same for all of the four cases (with the exception of a few molecules contained in only some of the four datasets), we performed our experiments only for female mice. The atoms in this dataset are described at a cruder level compared to the Mutagenesis dataset. Only the basic types 2

Checking homomorphism of labeled hypergraphs, checking θ-subsumption of clauses and solving constraint satisfaction problems is essentially the same thing.

Seeing the World through Homomorphism: An Experimental Study H(3)

H(3)

C(22)

C(22)

H(3)

H(3)

C(22)

C(22) O(40)

O(40) H(3)

C(22)

C(22)

143

C(22)

N(38)

N(38)

O(40) C(22)

N(38)

O(40)

C(22)

H(3)

O(40)

A) The original example

B) The reduced example

Fig. 2. The example from the Mutagenesis dataset which was compressed most by the reduction procedure. Left: The original example. Right: The reduced example. Note that every bond is represented by a pair of bond/3 literals.

like carbon and not aromatic carbon are used. A consequence of this is that higher reduction rates are possible. After applying the safe reduction procedure, the number of literals in the examples decreased to 62% on average. The most succesful reduction decreased the number of literals in an example to just 8% of the original count. 4.3

CAD

The last experiment was performed with the CAD dataset [7]. This dataset contains 96 class-labeled product-structures desings. After applying the safe reduction procedure to the examples from the CAD dataset, the number of literals in them decreased to 77% on average. The most succesful reduction decreased the number of literals in an example to 56% of the original count. The reason for smaller diﬀerence between average and maximum reduction rates as compared to the previous two datasets was that the designs contain next/2 literals which express a sort of ordering of the elements, which limits applicability of the θ-reduction. 4.4

Aleph with Reduced and Non-reduced Data

Finally, we decided to compare performance of Aleph on reduced and nonreduced versions of the datasets. We set the maximum number of explored nodes to 100000 and the noise parameter to ﬁve percent of the number of examples in the respective dataset. For both versions of the Mutagenesis dataset (without function groups and with function groups), it took Aleph longer to produce a theory for the reduced data, however, the predictive accuracy was higher for the reduced data. In fact, the Mutagenesis dataset was the only dataset where Aleph obtained statistically signiﬁcant improvement in predictive accuracy (two-sided paired t-test with α = 0.05). For PTC dataset, reduction caused a speedup of factor 2.63. For the CAD dataset, Aleph obtained a reasonable speed-up and slightly higher predictive accuracy than for the non-reduced dataset. The reason

144

ˇ O. Kuˇzelka and F. Zelezn´ y

Table 1. Accuracy of Aleph (estimated by 10-fold cross-validation) on the reduced and non-reduced datasets. Muta is non-reduced Mutagenesis, Muta-R is reduced Mutagenesis, Muta-FG is Mutagenesis with function groups, Muta-FG-R is reduced Mutagenesis with function groups etc. Muta Muta-R Muta-FG Muta-FG-R PTC PTC-R CAD CAD-R Accu. 68.8 ± 6.6 71.6 ± 7.5 73.3 ± 11.3 73.8 ± 10.7 63.3 ± 6.7 63.6 ± 4.7 85.4 ± 9.7 88.7 ± 9.9 Run. [s] 356 378 298 339 17108 6522 244 168

why not only runtimes but also accuracies were aﬀected by the safe reduction is that through the reduction of examples we also reduce bottom clauses, which, in turn, means smaller search space for Aleph. Not only can we use the techniques introduced in this paper to reduce the examples, we may also use them to obtain an upper bound on the training set accuracy. Clearly, if we variabilize the constants that do not appear in the hypothesis language L in two examples e1 and e2 and obtain examples eˆ1 and eˆ2 and if it holds eˆ1 E eˆ2 and eˆ2 E eˆ1 then these two examples are indistinguishable using the hypotheses from L. If they have diﬀerent classiﬁcation then we have an unremovable term added to the training set error. For example, on the PTC dataset, the calculated upper bound was 98.5%. A more complicated calculation may be used to obtain a much tighter upper bound for the particular case of hypotheses in the form of clausal theories. The bound used in this subsection applies also to propositionalization approaches.

5

Conclusions

We have shown that when a hypothesis language is ﬁxed, even ground examples may become reducible. In other words, we have shown that, in many experiments commonly performed with ILP systems, there is a lot of redundant information in the examples. We have also shown how the underlying principles of the reduction procedure can be used to compute an upper bound on the training-set accuracy.

Acknowledgement The authors would like to thank the anonymous reviewers of ILP’10 for their valuable comments. The authors have been supported by the Czech Grant Agency through project 103/10/1875 (Learning from Theories).

References 1. De Raedt, L.: Logical settings for concept-learning. Artif. Intell. 95(1), 187–201 (1997) 2. Helma, C., King, R.D., Kramer, S., Srinivasan, A.: The predictive toxicology challenge 2000-2001. Bioinformatics 17(1), 107–108 (2001) ˇ 3. Kuˇzelka, O., Zelezn´ y, F.: A restarted strategy for eﬃcient subsumption testing. Fundam. Inf. 89(1), 95–109 (2009)

Seeing the World through Homomorphism: An Experimental Study

145

4. Maloberti, J., Suzuki, E.: An eﬃcient algorithm for reducing clauses based on constraint satisfaction techniques. In: Camacho, R., King, R., Srinivasan, A. (eds.) ILP 2004. LNCS (LNAI), vol. 3194, pp. 234–251. Springer, Heidelberg (2004) 5. Plotkin, G.D.: A note on inductive generalization. Machine Intelligence 5, 153–163 (1970) 6. Srinivasan, A., Muggleton, S.H.: Mutagenesis: ILP experiments in a non-determinate biological domain. In: ILP 1994 (1994) ˇ akov´ ˇ 7. Z´ a, M., Zelezn´ y, F., Garcia-Sedano, J., Tissot, C.M., Lavraˇc, N., Kˇremen, P., Molina, J.: Relational data mining applied to virtual engineering of product designs. In: International Conference on Inductive Logic Programming (ILP 2007). Springer, Heidelberg (2007)

Appendix Lemma 1 (Plotkin [5]). Let A and B be clauses. If A θ B then A |= B. Proposition 1. Let L be a hypothesis language and let e be a clause. (i) Let e˜ be a clause obtained from e by variabilizing the constants which are not contained in the hypothesis language. Then (H E e) ⇔ (H E e˜) for any H ∈ L (ii) Let eˆ be θ-reduction of e˜. Then (H E e) ⇔ (H E eˆ) for any H ∈ L. Proof. We will start by showing validity of the implication (H |= e) ⇒ (H |= e˜). For contradiction, let us assume that there is a model M of the clausal theory H such that M |= e and H |= e˜. Then there must be a substitution θ grounding all variables in e˜ such that3 M |= eθ and M |= e˜θ. Now, we will construct another model M of H in which e will not be satisﬁed. We take each constant c in e that has been replaced by a variable V in e˜ and update the assignment φ of the constants c to objects from the domain of discourse so that φ(c) = φ(V θ). Clearly, we can do this for every constant c since every constant in e has been replaced by exactly one variable. Now, we clearly see that M |= e. However, we are not done yet as it might happen that the new model with the modiﬁed φ would no longer be a model of H. However, this is clearly not the case since none of the constants c appears in H and therefore the change of φ has no eﬀect whatsoever on whether or not H is true in M . So, we have arrived at a contradiction. We have a model M such that M |= H and M |= e which contradicts the assumption H |= e. The implication (H |= e) ⇐ (H |= e˜) follows directly from Lemma 1. We have e˜ θ e therefore also e˜ |= e and ﬁnally H |= e˜ |= e. (ii) In order to show (H E e) ⇒ (H E eˆ), it suﬃces to notice that H E e and e θ eˆ imply H E eˆ. The implication (H E e) ⇒ (H E eˆ) may be shown similarly as follows: H E eˆ and eˆ θ e imply H E e.

3

We are applying θ also to e because e need not be ground.

Learning Discriminant Rules as a Minimal Saturation Search Matthieu Lopez, Lionel Martin, and Christel Vrain LIFO, University of Orl´eans Orl´eans, France [email protected]

Abstract. It is well known that for certain relational learning problems, traditional top-down search falls into blind search. Recent works in Inductive Logic Programming about phase transition and crossing plateau show that no general solution can face to all these diﬃculties. In this context, we introduce the notion of “minimal saturation” to build non-blind reﬁnements of hypotheses in a bidirectional approach. We present experimental results of this approach on some benchmarks inspired by constraint satisfaction problems. These problems can be speciﬁed in ﬁrst order logic but most existing ILP systems fail to learn a correct deﬁnition, especially because they fall into blind search.

1

Introduction

The main characteristics of an ILP system are given by the deﬁnition of a search space, a reﬁnement operator and a heuristic function able to choose, at any step, the best candidate among possible reﬁnements. In this context, the reﬁnement operator plays a central role and approaches are usually divided into two main strategies: on one hand top-down searches start with a general clause and build specializations, on the other hand bottom-up searches start with a speciﬁc clause and generalize it. Then, in most cases, the reﬁnement operator allows to organize the search space as a lattice, starting either from a general clause called top () or a speciﬁc one called bottom (⊥). The most common top clause is deﬁned by a clause having a literal built with the target predicate as head and an empty body; usual bottom clauses are built from a seed example and are obtained by a “saturation-like” operation [13]. In this paper, we propose a bidirectional search where the main process consists in reducing the search space. At any step, our search space is deﬁned by a pair (i , ⊥i ) bounding the space, and our reﬁnement operator produces new bounds (i+1 , ⊥i+1 ) where i+1 is more speciﬁc than i and ⊥i+1 is more general than ⊥i . The search stops when i = ⊥i which corresponds to the learned rule. In our approach, at any step the clause i can be deduced from ⊥i and conversely ⊥i can be deduced from i . For this reason, our main process can be viewed either as searching for i+1 from i (top-down) or searching for ⊥i+1 from ⊥i (bottom-up). P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 146–157, 2011. c Springer-Verlag Berlin Heidelberg 2011

Learning Discriminant Rules as a Minimal Saturation Search

147

This work has been motivated by a family of problems hard to solve for most existing ILP approaches: learning constraint problems (CP) that consists in ﬁnding a characterization of solutions (or non-solutions) of constraint problems. The goal is to generate a Constraint Satisfaction Problem (CSP) adapted to the problem to solve. We have shown in [8] that this problem can be transformed into a learning problem speciﬁed by positive and negative examples which are respectively non-solutions and solutions of the constraint problem, thus, learning the negation of the constraint problem. This point is detailed in Section 5. These examples are deﬁned as interpretations in a subset of FOL, and additional background knowledge is provided (also described in FOL). The goal is then to learn discriminant rules, and in theory any ILP system could be used. For example, let us consider the classical graph coloring problem expressing that a graph is well colored when two adjacent nodes have two diﬀerent colors: negative (resp. positive) examples are well-colored graphs (resp. bad colored graphs), expressed in FOL, with predicates node, edge, col. Then a discriminative rule deﬁning a bad-colored graph could be: badcol(G) ← node(G, X), node(G, Y ), col(X, C), col(Y, C), edge(X, Y ). This rule indicates that a graph is not well-colored if there exists two adjacent nodes with the same color. From a learning point of view, we can notice that this rule has a particularity. It is a discriminative one but, if we remove any literal from its body, the obtained rule has no longer a discriminative power. The main motivation of this work is that, in practice, we observe that most systems fail on this task or ﬁnd a solution after an exhaustive search. This failure can be explained since the considered problems contain speciﬁc diﬃculties that are well known in the ILP community, called blind search. Recent works on phase transition problems in ILP [6,7,14] and blind search or crossing “plateau” [1,3,2] indicate that searching a solution may have to cope with hard problems. These analysis show that there is no general solution to ILP learning problems, and some eﬀorts must be done to both propose solutions and analyze their conditions of success and limitations. In this paper, we propose a new approach for learning ﬁrst order clauses, and we characterize the situations where it can be successfully used. The approach we present in this paper is based on a special saturation called “minimal saturation”. The main drawback of standard saturation is that it helps deﬁning a search space which may be very large and redundant. Our work relies on the fact that the saturation produces a clause naturally structured in layers. We propose to consider the layers one by one: at each step we search for a minimal subpart of a layer such that the associated saturation is discriminant. In doing so, the method tries to ﬁnd a discriminating rule with a reduced size. The paper is organized as follows. Section 2 introduces some basic notions whereas the formalization of the saturation used in our algorithm described in Section 3. In Section 4, we discuss the cases that seem adapted to our method and the cases that do not beneﬁt to our search strategies. Section 5 presents the benchmarks and experiments we have made.

148

2

M. Lopez, L. Martin, and C. Vrain

Preliminaries, Notations and Saturation

The language used to deﬁne concepts is composed of a set of terms (constants and variables) and a set of predicates. Predicates have mode declaration describing for each argument, its domain specifying what type of constants can be used: by the symbol +, if it is an input, or, by the symbol − for an output. For example, the predicate sum with arity 3 and the semantic of which is X+Y=Z where X,Y and Z denote its arguments could have the mode sum(+, +, −). An atom is an expression of the form p(t1 , t2 , . . . , tk ) where p is a k-arity predicate and t1 , t2 , . . . , tk are terms. A literal is an atom or the negation of an atom. We denote by input(l) and output(l), the sets of terms containing respectively the inputs and outputs of a literal l. We use the same notation for a formula f : input(f ) = l∈f input(l) and output(f ) = l∈f output(l). Moreover, the set of terms composing a literal is denoted by terms(l). The “variabilization” of a formula f , denoted vars(f ), is the operation consisting in substituting all the constants of f with variables such that each constant is replaced by a distinct variable. As said in the introduction, the saturation is a structure organized in several layers where each layer contains literals. layer(l) gives the number of the layer in which the literal l appears. Finally, considering sets of positive and negative examples, p(f ), resp. n(f ), denote the number of positive and negative examples covered by a formula f . 2.1

Saturation of an Example

In this section, we present and formalize the saturation operator consisting in ﬁnding all ground literals describing an example. It has been ﬁrst introduced in [13]. We present a simpliﬁed version where recall numbers[10], limiting the number of times a predicate is used are not considered. We propose to illustrate the construction with the following toy example, close to Michalski’s trains: Example In this example, each train is composed of cars. Each car has diﬀerent features as its number of wheels and its size. A car carries geometrical objects, described by their shape and their quantities. For instance, two examples corresponding to a positive and a negative example of a target concept are described as follows: + + + t+ 1 : {has car(t1 , c1 ), has car(t1 , c2 ), has car(t1 , c3 ), wheels(c1 , 2), wheels(c2 , 3), wheels(c3 , 5), long(c1 ), long(c2 ), long(c3 ), load(c1 , circle, 3), load(c2 , circle, 6), load(c3 , triangle, 10)} − − − t− 2 : {has car(t2 , c1 ), has car(t2 , c2 ), has car(t2 , c3 ), wheels(c1 , 1), wheels(c2 , 4), wheels(c3 , 3), long(c1 ), long(c2 ), short(c3 ), load(c1 , circle, 4), load(c1 , rectangle, 2), load(c2, triangle, 5) load(c2 , circle, 3), load(c3 , circle, 2)}

Let us suppose that the modes are deﬁned by: has car(+, −), long(+), short(+), wheels(+, −) and load(+, −, −). Let us assume that the target deﬁnition corresponds to trains having at least two cars containing objects with the same shape

Learning Discriminant Rules as a Minimal Saturation Search

149

and such that one of the two has a greater number of objects and a greater number of wheels than the other: An example is represented with the predicate goodtrain with a single argument which is the ID of train, as for instances : goodtrain(t+ 1 ). Literals describing the train are then given as ground facts in the background knowledge as it is the case in several systems like Aleph. The background knowledge also contains intensional predicates described by of Horn clauses. goodtrain(T ) : −has car(T, C1 ), has car(T, C2 ), C1 = C2 , wheels(C1 , W1 ), wheels(C2 , W2 ), load(C1 , O, L1 ), load(C2 , O, L2 ), W1 < W2 , L1 < L2 The saturation of an example is based on information given by domains and modes of predicates. It is obtained by adding as many literals as possible w.r.t. the background knowledge such that all literals form a connected formula. The set of literals, composing the saturation, is organized in ordered layers: a literal is in a layer k if all the input terms needed to its introduction have already been introduced in previous layers, and at least one of them has been introduced in the layer k − 1. The saturation could be large and in the state-of-the-art, it is often parameterized by a maximal depth: the building steps when this depth is reached. This maximal depth is denoted by i. Before deﬁning the saturation, we introduce following notation: litsOf Layer(S, k) denotes the set of literals of a sets belonging to a layer k. It is deﬁned by: litsOf Layer(k) = {l | layer(l) = k} To deﬁne the saturation, we ﬁrst deﬁne a layer k, called satk (Sl ), where Sl is a set of literals describing previous layers (all layers j < k): satk (Sl ) = {l | input(l) ⊆ terms(Sl ) ∧ l ∈ Sl ∧ input(l) ∩ output(litsOf Layer(Sl, k − 1)) = ∅} Then, we can formalize, given a set Sl of literals introduced in layers before k, the set of literals belonging to layers k, k + 1, . . . , i: sat(Sl , k, i) = satk (Sl ) ∪ sat(Sl , k + 1, i) sat(Sl , k, i) = ∅

1≤k≤i k>i

Finally, the saturation of an example e of a target concept p with the maximal layer i can be written: sat(p(e), i) = {p(e)} ∪ sat({p(e)}, 1, i) Let us remark that the predicate p has the mode: p(−). Example (cont.) We consider that we have in the background knowledge, along the description of the examples, the predicate = comparing cars and geometrical forms with mode = (+, +), and the predicate < comparing either numbers of wheels or numbers of object with the mode < (+, +).

150

M. Lopez, L. Martin, and C. Vrain

The saturation of the example t+ 1 with the maximal depth equal to 3 is: Layer Literals 0 goodtrain(t+ 1) + + 1 has car(t+ , 1 c1 ), has car(t1 , c2 ), has car(t1 , c3 ) 2 wheels(c1 , 2), wheels(c2 , 3), wheels(c3 , 4), long(c1 ), long(c2 ), long(c3 ), load(c1 , circle, 3), load(c2 , circle, 5), load(c3 , triangle, 10), c1 = c2 , c1 = c3 , c2 = c3 3 2 < 3, 2 < 4, 3 < 4, triangle = circle, 3 < 5, 3 < 10, 5 < 10

3

Minimal Saturation to Search

In this section, we present our rule learning algorithm. A search state is a set of literals corresponding to a clause. The states are organized as a lattice with two bounds and ⊥, and a partial order to compare the generality of search states. For the partial order, we say that a state s1 is more general than an other s2 if s1 is a subset of s2 (with possible renaming of variables). The search is biased using a positive example s, called a seed. Considering the target concept p, we set to {p(s)} and ⊥ to sat(p(s), i) where i is the maximal layer of the saturation. This search space is often used in the state-of-the-art algorithms. With the assumption that ⊥ = sat(, i) rejects all negative examples, the search space contains at least one rule discriminating negative examples. It covers at least one positive example, the seed. The goal is to discover a better rule than ⊥, i.e. a rule that covers more positive examples and always no negative ones. Given a step k in the learning algorithm, we aim to set the layer k such that this layer would be shorter as possible. When the assumption is not satisﬁed, the reﬁnement algorithm throws an exception to specify the insolubility of the learning problem. Our learning algorithm is a bidirectional search where we progressively reﬁne two hypothesis H and H⊥ keeping the relation H⊥ = sat(H , i) always correct. This section is divided into two parts: ﬁrst we present our reﬁnement operator and then, the algorithm, iterating the reﬁnement steps. 3.1

Refinement Operator

Let us ﬁrst recall that we have two hypothesis H and H⊥ with the relation H⊥ = sat(H , i) where i denotes the maximal depth of the saturation. For the kth application of the reﬁnement operator, it aims at building a new couple of hypothesis (H , H⊥ ) such that H⊥ = sat(H⊥ , i) and such that the layer k is a minimal subset of literals from the layer k of H⊥ . This operator searches for a subset of literals of the layer k, such that the corresponding H⊥ discriminates some positive examples from all the negative examples, this subset will be added to H .

Learning Discriminant Rules as a Minimal Saturation Search

151

To formalize the reﬁnement operator, we start by deﬁning the set of candi date couples (H , H⊥ ) that are correct reﬁnements of a current pair of hypotheses (H , H⊥ ). Let ρ(H , H⊥ , k, i) denote this set, where k represents the layer wherein the reﬁnement searches for a subset and i the maximal depth: ρ(H , H⊥ , k, i) = {(H , H⊥ ) | H = H ∪ Sk ∧ Sk ⊂ litsOf Layer(H⊥, k) ∧ H⊥ = sat(H , k + 1, i) ∧ n(H⊥ ) = 0} Let us notice that when Sk = ∅, H = H⊥ (H have no literals in layer k and therefore subsequent layers are empty). This set contains only couples (H , H⊥ ) where H is more speciﬁc than H , H⊥ is more general than H⊥ and H⊥ rejects all negative examples. To determine the subset of literals, we search the smallest one with a greedy breadth ﬁrst search as explained in Section 3.2.

3.2

Refinements Selection

In this section, we described how we choose among all the reﬁnements in ρ. Our strategy is to select the smallest one in term of Sk , i.e. a hypothesis H with the smallest number of literals of layer k. If there are several ones, we return the one covering the maximum number of positive examples. The number of candidates is exponential comparing to the size of litsOf Layer(H⊥ , k). To avoid to generate all of them, we search the smallest one with a breadth-ﬁrst search. The reﬁnement algorithm can be written as follows: Algorithm : ref ine(H , H⊥ , k, i) 1. for j from 0 to |litsOf Layer(H⊥ , k)| 2. Sρ = ∅ 3. for each subset Sk of litsOf Layer(H⊥ , k) s.t. |Sk | = j 4. H = H ∪ Sk 5. H⊥ = H ∪ sat(H , k + 1, i) 6. if n(H⊥ ) = 0 then 7. Sρ = Sρ ∪ {(H , H⊥ )} 8. if Sρ = ∅ then )∈Sρ p(H ) 9. return argmax(H ,H⊥ ⊥ 10. throw inconsistent bottom clause We can notice that the algorithm starts with the empty subset (for j = 0). In this case, H = H = H⊥ , and if this rule is correct then the rule learning algorithm will stop since there are no literals in layers up to k (See section 3.3). Example (cont.) To illustrate the reﬁnement operator, let us consider as the current couple of + hypotheses : (H , H⊥ ) = (vars({goodtrain(t+ 1 )}), vars(sat({goodtrain(t1 )}, 3)) and then the reﬁnement produced with ref ine(H , H⊥ , 1, 3). H⊥ corresponds to the “ variabilized” version of the saturation computed in the previous example in section 2.1.

152

M. Lopez, L. Martin, and C. Vrain

The algorithm begins with subset of the ﬁrst layer of size 1. All subsets produce the same couple with a correct substitution and we obtain for ρ(H , H⊥ , 1, 3) such that |Sk | = 1, the unique couple: Layer Literals 0 goodtrain(V1 ) 1 has car(V1 , V2 ) 2 wheels(V2 , V3 ), load(V2 , V4 , V5 ), long(V2 ) 3 where H is in bold characters and H⊥ contains the saturation of H (layers 0 to 3 in the array). This couple is not correct because H⊥ covers the negative example t− 2. With subsets of size 2 ( i.e. |Sk | = 2), ρ(H , H⊥ , 1, 3) produces:

Layer Literals 0 goodtrain(V1 ) 1 has car(V1 , V2 ), has car(V1 , V6 ) 2 wheels(V2 , V3 ), wheels(V6 , V7 ), load(V2 , V4 , V5 ), load(V6 , V4 , V8 ), long(V2 ), long(V6 ), V2 = V6 3 V3 < V7 , V5 < V8 Layer Literals 0 goodtrain(V1 ) 1 has car(V1 , V2 ), has car(V1 , V9 ) 2 wheels(V2 , V3 ), wheels(V9 , V1 0), long(V2 ), long(V9 ), load(V2 , V4 , V5 ), load(V9 , V1 1, V1 2), V2 = V9 3 V3 < V1 0, V1 1 = V4 , V5 < V1 2 Just the ﬁrst one rejects the negative example and the corresponding couple of hypotheses will be returned by the reﬁning algorithm. 3.3

Learning a Rule

An interesting rule is a rule rejecting all negative examples (consistency) and covering a maximum number of positive examples. With our approach, the rule we compute could not be the better one in terms of the number of covered positive examples, because we search for minimal layers to limit the complexity of our reﬁnement algorithm. During the bidirectional search, we intend to progressively reﬁne the couple of hypotheses (H , H⊥ ), until the two hypotheses converge (H = H⊥ ). In order to obtain it, we progressively reﬁne each

Learning Discriminant Rules as a Minimal Saturation Search

153

layer starting from k = 1 to k = i where i is the maximal layer. We initialize the search with a couple corresponding to a seed example s and its saturation, where constants are replaced by variables. The following algorithm describes the search for a rule for the target concept p, where the search space is biased by the seed s: Algorithm : learnrule(p, s, i) 1. H = {vars(p(s))} 2. H⊥ = vars(sat(p(s), i)) 3. for each layer k from 1 to i 4. (H , H⊥ ) = ref ine(H , H⊥ , k, i) 5. return H

4

Advantages and Limitations

Our algorithm has been motivated by speciﬁc applications of Machine Learning to Constraints Modelling. To compute a reﬁnement, it searches among the subsets of literals contained in a layer the smallest one that corresponds to a bottom hypothesis rejecting all negative examples. To be eﬃcient our algorithm must stop before enumerating all the subsets. This means that it is dedicated to problems characterized by the following properties: the saturations of the examples can be structured into several layers and there exists discriminating rules involving few literals in each layer. For instance, it is not adapted to the classical mutagenesis benchmark [9]: the saturation of an example is composed of only two layers, most of the literals of the discriminating rules occurring in the ﬁrst layer. The learning problems we are interested in are diﬃcult for top-down approaches because search is blind: a choice must be made between reﬁnements with the same heuristic values. In some cases, this can be avoided by considering bottom-up approaches. However, the complexity of the coverage test for examples depends on the size of the saturation, becoming too expensive when the saturation is large. Our method intends to avoid the “plateau” phenomenon for top-down approaches evaluating a rule in a bottom-up way (by means of its saturation) but limiting the size of hypotheses in a top-down way. Preferring a bidirectional search, our aim is to build a minimal saturation, which can be easily tested on examples while guiding the search.

5

Application to Constraint Satisfaction Problem and Experiments

Constraint Programming (CP) is a very successful formalism to model and to solve a wide range of decision problems, from arithmetic puzzles to timetabling and industrial scheduling problems. One of our motivations for this work is to learn CSP models described in a ﬁrst order language, deﬁning the solutions of a

154

M. Lopez, L. Martin, and C. Vrain Graph coloring problem n(X), n(Y ), col(X, A) ∧ col(Y, B) → A = B ∨ ¬adj(X, Y ) Simplified school timetable timetable(L1 , T1 , R1 , S1 ) ∧ timetable(L2, T2 , R2 , S2 ) → L1 = L2 ∨ R 1 = R2 ∨ S1 = S2 timetable(L1 , T1 , R1 , S1 ) ∧ timetable(L2, T2 , R2 , S2 ) → T1 = T2 ∨ L1 = L2 ∨ S1 = S2 Simplified jobshop schedule(J, T, B,E, M ) → B < E schedule(J1 , T1 , B1 , E1 , M1 ) ∧ schedule(J2 , T2 , B2 , E2 , M2 ) → J1 = J2 ∨ M1 = M2∨ B1 > E2 ∨ E1 < B2 schedule(J1 , T1 , B1 , E1 , M1 ) ∧ schedule(J2 , T2 , B2 , E2 , M2 ) → J1 = J2 ∨ E1 < B2 ∨ prev(T1 , T2 ) N-queens problem position(Q1 , L1 , C1 ) ∧ position(Q 2 , L2 , C2 ) → Q1 = Q2 ∨ L1 = L2 position(Q1 , L1 , C1 ) ∧ position(Q 2 , L2 , C2 ) → Q1 = Q2 ∨ C1 = C2 position(Q1 , L1 , C1 ) ∧ position(Q2 , L2 , C2 ) ∧ gap(L1 , L2 , I1 ) ∧ gap(C1, C2 , I2 ) → Q1 = Q2 ∨ I1 = I2 Fig. 1. Some examples: all variables are universally quantiﬁed

CSP[8]. We have shown that this can be transformed into the problem of learning a logic program of the negative concept, composed of the non-solutions of the CSP. The process is detailed in[8], but let us illustrate it by our graph coloring problem. Finding a color for each vertex such that two adjacent vertices do not have the same color can be described by the rule: node(X) ∧ node(Y ) ∧ col(X, A) ∧ col(Y, B) → A = B ∨ ¬adj(X, Y ) Considering the negative concept of bad-colored graphs, adding a target concept badcol(G), where G is the ID of a graph and adding G also to the extensional predicates, we obtain the following datalog rule: badcol(G) ← node(G, X) ∧ node(G, Y ) ∧col(G, X, A) ∧ col(G, Y, B) ∧A = B ∧ adj(F, X, Y )

Learning Discriminant Rules as a Minimal Saturation Search Propal benchmark # learned rules time (s) Graph coloring 1 0 School timetable 3 11 Job-shop 6 103 N-queens Aleph1 Graph coloring 1 0.24 School timetable 1 1.24 Job-shop 3 1051.03 N-queens 3 489.49

Our algorithm acc. # learned rules time (s) 100% 1 0.17 98,33% 2 0.69 87,78% 5 7.37 3 29.11 Aleph2 100% 1 0.14 100% 1 0.31 100% 6 1130.88 100% 3 4583.84

155

acc. 100% 100% 100% 100% 100% 100% 96% 61.67%

Fig. 2. Experiments with CSP benchmarks

This explains why we focus on the negative concept of the constraint problem. Figure 1 presents classical CSP problems and the models we aim at learning. Let us notice that these models are independent of the size of the CSP (number of queens for instance). We have built random benchmarks for these problems. In doing so, we have generated a set of solutions and non-solutions. To produce solutions, we have chosen a random size for each problem (e.g. for the graph coloring problem, the number of vertices and colors), and then solved the CSP. For negative ones, we have proceeded in a similar way but constraints have been relaxed and we have checked that there is at least one unsatisﬁed constraint. The examples have been produced using a random heuristic when solving the CSP. We have tested diﬀerent state-of-the-art ILP systems on these benchmarks: Foil[11], Beth[16], Aleph[15], ICL[12], Propal[5]. Foil performs a Top-down search starting from the most general hypothesis and progressively specializing by adding new literals w.r.t. the θ-subsumption. As in our work, Beth keeps a kind of bottom clause in addition to a hypothesis, but it is used to avoid a complete computation of the saturation whereas ours attends to bound the search space and is used to evaluate reﬁnements. Aleph is a large ILP system allowing the use of various top-down or bottom-up strategies. ICL searches for a theory in a disjunctive normal form with a beam search. Propal uses a data driven strategy, i.e. the reﬁnement operator uses a negative example that must be rejected in the possible reﬁnements. Only Propal (the version described in [4], faster than the version given in [5]) and Aleph with certain conﬁgurations have succeeded. The ﬁrst conﬁguration of Aleph, called Aleph1, corresponds to a breadth-ﬁrst search with a maximum of 200 000 visited search nodes and an inﬁnite open list. The second one, called Aleph2, only diﬀers from the search strategy which is a heuristic search. We use the default heuristic of Aleph, called coverage, and consisting in the diﬀerence between positive examples and negative ones1 . We have implemented a prototype for our learning algorithm and Figure 2 presents the results obtained with these systems. The more complicated 1

We have tested all the heuristics implemented in Aleph with similar results

156

M. Lopez, L. Martin, and C. Vrain

the target concept, the more Propal and Aleph2 ﬁnd incorrect theory. For the n-queens problems, Propal has been stopped after ten hours. This illustrates the diﬃculty of top-down approaches when search is blind. Moreover, Propal has to face combinatorial explosion when searching for near-misses. Aleph1 succeeds with all the benchmarks. However, signiﬁcant computation times is required for complicated benchmarks. Our method has succeeded on all the benchmarks: it ﬁnds accurate theories in a short amount of times. These good results can be explained by the structure of the target concepts as described in Section 4. Our prototype, as well as the benchmarks, can be obtained by sending a mail to the authors.

6

Conclusion

In this paper, we have presented a new learning algorithm to build logic programs. Our method aims at ﬁnding a minimal saturation. It consisting in ﬁnding, for each layer of the saturation of a seed, a minimal subset of literals such that the obtained rule discriminates some positive examples from negative ones. This approach is not always eﬃcient, but in certain cases where other state-of-the-art algorithms fail, it can succeed avoiding the blindness faced by top-down strategies and the consuming coverage tests with bottom-up strategies. Our approach is eﬃcient when the saturation of seed examples produces a bottom clause structured in several layers and when there exists a discriminating rule involving few literals of each layer. We experiment our algorithm on learning problems inspired by constraint programming. These problems present aforesaid features and our algorithm succeeds when other systems fail. These results are encouraging and we aim at testing on other benchmarks. In future works, we wish to improve the reﬁnement operator by replacing the greedy breadth-ﬁrst search for layer subsets. This part of our algorithm is the principal limitation of our approach. For example, we could guide the search for subsets with classical heuristics or using a beam search. Another improvement would be to handle numeric variables. So, we could test our learning algorithm with a large range of acknowledged learning problems.

References ´ Osmani, A.: A model to study phase transition and plateaus in 1. Alphonse, E., ˇ relational learning. In: Zelezn´ y, F., Lavraˇc, N. (eds.) ILP 2008. LNCS (LNAI), vol. 5194, pp. 6–23. Springer, Heidelberg (2008) ´ Osmani, A.: On the connection between the phase transition of the 2. Alphonse, E., covering test and the learning success rate in ilp. Machine Learning 70(2-3), 135– 150 (2008) 3. Alphonse, E., Osmani, A.: Empirical study of relational learning algorithms in the phase transition framework. In: Buntine, W., Grobelnik, M., Mladeni´c, D., Shawe-Taylor, J. (eds.) ECML PKDD 2009. LNCS, vol. 5781, pp. 51–66. Springer, Heidelberg (2009)

Learning Discriminant Rules as a Minimal Saturation Search

157

´ Rouveirol, C.: Lazy propositionalisation for relational learning. In: 4. Alphonse, E., Horn, W. (ed.) ECAI, pp. 256–260. IOS Press, Amsterdam (2000) ´ Rouveirol, C.: Extension of the top-down data-driven strategy to 5. Alphonse, E., ILP. In: Muggleton, S.H., Otero, R.P., Tamaddoni-Nezhad, A. (eds.) ILP 2006. LNCS (LNAI), vol. 4455, pp. 49–63. Springer, Heidelberg (2007) 6. Botta, M., Giordana, A., Saitta, L., Sebag, M.: Relational learning: Hard problems and phase transitions. In: Lamma, E., Mello, P. (eds.) AI*IA 1999. LNCS (LNAI), vol. 1792, pp. 178–189. Springer, Heidelberg (2000) 7. Botta, M., Giordana, A., Saitta, L., Sebag, M.: Relational learning as search in a critical region. Journal of Machine Learning Research 4, 431–463 (2003) 8. Lallouet, A., Lopez, M., Martin, L., Vrain, C.: On learning constraint problems. In: 22th IEEE International Conference on Tools with Artiﬁcial Intelligence, ICTAI 2010 (2010) 9. Lodhi, H., Muggleton, S.: Is mutagenesis still challenging. In: ILP - Late-Breaking Papers (2005) 10. Muggleton, S.: Inverse entailment and progol. New Generation Computing, Special issue on Inductive Logic Programming 13(3-4), 245–286 (1995) 11. Ross Quinlan, J., Mike Cameron-Jones, R.: Foil: A midterm report. In: Brazdil, P.B. (ed.) ECML 1993. LNCS, vol. 667, Springer, Heidelberg (1993) 12. De Raedt, L., Van Laer, W.: Inductive constraint logic. In: ALT, pp. 80–94 (1995) 13. Rouveirol, C.: Extensions of inversion of resolution applied to theory completion. In: Muggleton, S. (ed.) ILP, pp. 63–92. AP (1992) 14. Serra, A., Giordana, A., Saitta, L.: Learning on the phase transition edge. In: IJCAI, pp. 921–926 (2001) 15. Srinivasan, A.: A learning engine for proposing hypotheses (Aleph), http://www.comlab.ox.ac.uk/activities/machinelearning/Aleph/aleph.html 16. Tang, L.P.R.: Integrating top-down and bottom-up approaches in inductive logic programming: applications in natural language processing and relational data mining. PhD thesis, University of Texas, Supervisor-Mooney (2003)

Variation of Background Knowledge in an Industrial Application of ILP Stephen H. Muggleton1 , Jianzhong Chen1 , Hiroaki Watanabe1 , Stuart J. Dunbar2 , Charles Baxter2 , Richard Currie2 , Jos´e Domingo Salazar2, Jan Taubert3 , and Michael J.E. Sternberg3 1

3

Imperial College London 2 Syngenta Ltd BBSRC Rothamsted Research

Abstract. In several recent papers ILP has been applied to Systems Biology problems, in which it has been used to ﬁll gaps in the descriptions of biological networks. In the present paper we describe two new applications of this type in the area of plant biology. These applications are of particular interest to the agrochemical industry in which improvements in plant strains can have beneﬁts for modelling crop development. The background knowledge in these applications is extensive and is derived from public databases in a Prolog format using a new system called Ondex (developers BBSRC Rothamsted). In this paper we explore the question of how much of this background knowledge it is beneﬁcial to include, taking into account accuracy increases versus increases in learning time. The results indicate that relatively shallow background knowledge is needed to achieve maximum accuracy.

1

Introduction

Systems Biology is a rapidly evolving discipline that seeks to determine how complex biological systems function [6]. It works by integrating experimentally derived information with mathematical and computational models. Through an iterative process of experimentation and modelling, Systems Biology aims to understand how individual components interact to govern the functioning of the system as a whole. In several recent papers [13,3], Inductive Logic Programing (ILP) has been applied to Systems Biology problems, in which it has been used to ﬁll gaps in the descriptions of biological networks. Two new industrial applications of this type in the area of plant biology are being explored within the Syngenta University Innovation Centre (see Section 2). This centre of excellence in Systems Biology aims to address biological research questions related to the improvement of plant strains involved in crops. The centre uses mathematical and computational modelling techniques developed at Imperial College London [2]. The background knowledge in these applications is generated by a system called Ondex [7]. Ondex is unique in its ability to generate large amounts of Prolog background knowledge on cell biochemistry by parsing, ﬁltering and combining various publicly-available databases. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 158–170, 2011. c Springer-Verlag Berlin Heidelberg 2011

Variation of Background Knowledge in an Industrial Application of ILP

159

In this paper we use Ondex to explore the performance eﬀects of varying the amount of background knowledge available to an ILP learning engine. This is done by generating variations of background knowledge using the Relation Neighbours Filter in Ondex together with a tehnique for sampling Relations. The eﬀects of varying the background knowledge are measured on both learning time and predictive accuracy. The experimental results indicate that while learning time increases monotonically with the amount of background knowledge, relatively shallow degree of background knowledge is required to achieve maximum accuracy. The paper is arranged as follows. In Section 2 we introduce the applications on which the experiments were conducted. We then describe the Ondex system for generating the background knowledge in Section 3. The experiments are then described in Section 4. Finally we conclude and describe further work in Section 5.

2 2.1

Application Descriptions University Innovation Centre (UIC) Overview

Agricultural research relies on understanding interactions of genes and chemicals in a biological context. The search for a new biological trait to use in a conventional or genetic modiﬁcation breeding programme is complex. It can take up to ten years and millions of dollars to bring such a development to market. The same is true for the search for new agrochemicals. Part of this development process is an assessment of the safety of the gene or chemical to the environment and its potential toxicity to both mammals and beneﬁcial organisms. Systems Biology takes a new, integrated, approach to address these important challenges. Syngenta [1] is a leading Agrichemical company with a number one position in chemicals and is number three in high value seeds. Syngenta has established a “University Innovation Centre” (UIC) on Systems Biology at Imperial College London [2] to implement a “systems approach” to agricultural research. The centre has begun with two pioneer projects, tomato ripening and predictive toxicology. 2.2

Tomato Application

The characteristics of the tomato fruit that reaches the consumer are deﬁned by the combination of its biochemical and textural properties. Metabolic components (volatiles, pigments, sugars and amino acids) deﬁne the appearance and ﬂavour whilst structural properties (cell adhesion, cell size, cuticle thickness, water content) deﬁne mouth-feel and texture perception. Together these components determine fruit quality and are crucial in inﬂuencing the success of commercial varieties. At the genetic and biochemical level the regulation of fruit development and ripening remains poorly understood. In this project we are applying ILP to

160

S.H. Muggleton et al.

deepen our understanding of the metabolic processes controlling tomato fruit development. By applying machine learning techniques to transcript and metabolite proﬁling data we are developing metabolic networks and building a predictive model of tomato ripening and fruit quality. Through the coordinated analysis of gene expression and metabolite changes across fruit development we aim to identify new genetic targets that play a role in controlling the ripening process. Such knowledge will allow us to focus on these genetic control points in breeding new tomato varieties, thus producing the most favourable combination of fruit quality characters in the ripe fruit. 2.3

Predictive Toxicology

An assessment of the potential to cause cancer is a key component of the risk assessment on a new Crop Protection Active Ingredient. The two year and 80 week bioassays in rats and mice, respectively, provide the Hazard Information to evaluate this risk. If tumours are observed in these trials, an assessment of their relevance for human risk may then be required. This typically makes use of the IPCS/HESI Human Relevance Framework, where the ﬁrst step is the development of a mode-of-action case to describe the series of causal key events that lead to rodent tumours. The second step is to examine the plausibility of these key events occurring in humans and so guide an assessment of the relevance of the rodent ﬁndings. This project aims to build a model that integrates the metabolic and gene expression regulatory networks that underlie initial key events in liver tumour promotion induced by model non-genotoxic carcinogens. It is envisaged that cycles of hypothesis generation informed by model building and experimental testing will allow the identiﬁcation of those regulatory components that are key components in liver tumour promoting modes of action. Ultimately this will allow us to improve mechanistic understanding and so provide key data to explain the basis of the thresholds in dose and species speciﬁcity in response, thereby allowing more informed human health risk assessments.

3

Ondex: A Biological Background Knowledge Generator

Data integration in the life sciences still remains a signiﬁcant challenge for bioinformatics [5]. Rather than developing a bespoke data integration solution for assembling the background knowledge for the machine learning task, the open source data integration framework Ondex [7] was selected as a general solution to bringing all the required data together. Ondex uses a graph-based approach with a data warehouse for integrating biological data. The nodes in the graph represent biological concepts, e.g. enzymes and metabolites. Edges in the graph represent relations between biological concepts, e.g. a set of enzymes catalyses a biochemical reaction. Both nodes and edges in the graph can have additional attributes, e.g. an enzyme name or an amino acid sequence. One of the reasons

Variation of Background Knowledge in an Industrial Application of ILP

161

for choosing the Ondex system as a background knowledge generator is the natural correspondence between its graph representation and the requirement of generating background knowledge as Prolog clauses for ILP learning. Data from key biological pathway and gene function information resources including KEGG [11], LycoCyc [4] were transformed into a semantically consistent graph representation using Ondex. In order to create a non-redundant and coherent knowledge base, mapping methods were used to identify equivalent and similar entities among the diﬀerent data sources. Once the databases were integrated, the resulting knowledge base was available for further analysis and visualization using the graph-based methods built in Ondex. A key feature of the Ondex user client is that it allows the extraction of subgraphs based on certain criteria. For example, it is simple to extract sub-graphs selected on by the class of biological concepts or relations, or where concepts posses a particular attribute, or from a graph-neighbourhood around particular nodes of interest. Such criteria can be combined in a workﬂow to manipulate the information to be included into the background knowledge. In order to support ILP learning, a general background knowledge generating utility was built that respected an agreed Prolog syntax, with Ondex concept class names and relation type names becoming predicate symbols and attributes becoming Prolog term structures. Every concept and relation was given a unique ID as the ﬁrst argument in each predicate, which was used by other predicates to associate attributes with concepts and relations. The translation of attributes of concepts and relations were deﬁned using the Ondex-generated Prolog code export utility. By following agreed conventions it was also possible to translate Prolog format back into an Ondex graph, thus enabling the results of the machine learning process to be imported back into Ondex where they could be visualised in the context of the original knowledge base.

4

Experiments

Two independent experiments were conducted in the study to empirically investigate the null hypothesis: variations of background knowledge (BK) do not lead to increased predictive accuracy. 4.1

Materials and Methods

Tomato Application. An initial ground background knowledge base was derived from LycoCyc database [4,9] and exported as Prolog format using the Ondex system. The knowledge base depicts the relational structure of tomato biological network (shown in Fig. 1), including the fundamental components, e.g. compounds, reactions, enzymes, and their relations, e.g. consumed by, produced by, catalysed by, etc. Two types of raw data were provided by the domain experts in the experiments using gene mutants to study altered tomato ripening - concentration changes of metabolites and gene transcripts for four genotypes during 13 time slices. The data were expressed in terms of binary

S.H. Muggleton et al.

{Enzyme}/EC

···

r

Substrate1 ···

···

···

P roduct1

inhibition/activation?

···

162

Substratem

···

P roductn

Fig. 1. Illustration of the relational background knowledge, where a set of compounds {Substrate}m 1 are consumed by a reaction r, which produce a set of compounds {P roduct}n 1 ; r is catalysed by a set of enzymes with an EC number {Enzyme}/EC which is aggregated from a set of gene transcripts; the ILP learning is to abduce inhibition/activation occured in r. {E }

{E

r

{S}m

{E}

r

| |

···

{E}

r

{S}1

{E

r

}

{

{E}

r

{E}

r

r

C | distance = 1 | | distance cpd:C05841’). % ’14366’ for the reaction ’cpd:C05841 => cpd:C05841’ part_of_catalyzing_class(’4400’,’4401’,’IMPD’). % ’4401’ is classified into EC ’4401’ concept_name(’4401’,’2.7.1.-’). % ’2.7.1.-’ is an EC catalyzed_by(’14366’,’4400’,’IMPD’). % ’14366’ is catalyzed by ’4400’ relation_day14_1500mg(is_related_to,’28501’,’22436’,’1.1385442’). % ’28501’ is an Ondex ID % ’22436’ is an Ondex ID % ’1.1385442’ is an expression level probe(’28501’,’UC’,’IMPD’). % ’28501’ is for a probe concept_name(’28501’,’1396933_s_at’). % ’1396933_s_at’ is a probe name gene(’22436’,’UC’,’IMPD’). % ’22436’ is for a gene concept_name(’22436’,’RNO:191574_GE’). % ’RNO:191574_GE’ is a gene name Appendix 3: Sample of Ondex Models

170

S.H. Muggleton et al.

Fig. 9. Visualised concepts in the Predictive Toxicology domain by Ondex (neighbour distance k = 1). Each node represents a concept and a directed edge represents a binary relation between two concepts. Users can edit the constructed model by (1) clicking the object in the view and (2) applying Ondex utilities such as ﬁlters and relation collapsers.

Fig. 10. Meta View of the Ondex model in Figure 9. Users can edit models also at this meta level.

Pruning Search Space for Weighted First Order Horn Clause Satisfiability Naveen Nair1,2,3 , Anandraj Govindan2 , Chander Jayaraman2, Kiran TVS2 , and Ganesh Ramakrishnan2,1 1 2

IITB-Monash Research Academy, Old CSE Building, IIT Bombay Department of Computer Science and Engineering, IIT Bombay 3 Faculty of Information Technology, Monash University {naveennair,ganesh}@cse.iitb.ac.in {anand.itsme,chanderjayaraman,t.kiran05}@gmail.com

Abstract. Many SRL models pose logical inference as weighted satisﬁability solving. Performing logical inference after completely grounding clauses with all possible constants is computationally expensive and approaches such as LazySAT [8] utilize the sparseness of the domain to deal with this. Here, we investigate the eﬃciency of restricting the Knowledge Base (Σ) to the set of ﬁrst order horn clauses. We propose an algorithm that prunes the search space for satisﬁability in horn clauses and prove that the optimal solution is guaranteed to exist in the pruned space. The approach ﬁnds a model, if it exists, in polynomial time; otherwise it ﬁnds an interpretation that is most likely given the weights. We provide experimental evidence that our approach reduces the size of search space substantially. Keywords: First Order Logic, Horn Clauses, MaxSAT, Satisﬁability.

1

Introduction

Representing sets of objects and their relationships in a compact form has been the focus of researchers for more than a decade. Weighted ﬁrst order formulas proved to be one such representation which also allows inference and learning in a structured way. Inference in these sets of formulas are mostly done by Satisﬁability testing. We summarize some of the works that addressed the problem of satisﬁability in the next paragraph. Traditional SAT solvers in propositional logic try to ﬁnd an assignment for all the literals that makes all the clauses true. They return a model if it exists or return unsatisﬁable. SAT solvers such as DPLL [6] give exact solutions but employ backtracking and take exponential time in the worst case. Local search methods for satisfying the maximum number of clauses (Max-SAT) has been implemented in GSAT [1], WalkSAT [2] etc. Weighted Max-SAT problems assign weights to the clauses and aim to minimize the sum of the weights of unsatisﬁed clauses. Teresa et. al. proposed a Lazy approach [9] which uses some bound computation and variable selection heuristic for satisﬁability. MiniMaxSAT [4] uses a P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 171–180, 2011. c Springer-Verlag Berlin Heidelberg 2011

172

N. Nair et al.

depth-ﬁrst branch-and-bound search approach for satisﬁability. Satisﬁability of ﬁrst order logic (universally quantiﬁed Conjunctive Normal Form (CNF)) can be done by grounding all the clauses (exponential memory cost) and then running satisﬁability as in propositional case. Since, many learning techniques require the repeated use of inference and satisﬁability, complete grounding of the clauses becomes a bottle neck. Lifted inference [5] techniques used ﬁrst order variable elimination for probabilistic inference but have not proved their applicability in large domains. As there could be many contradictions in real world, it is better to perform weighted satisﬁability. Weighted satisﬁability solvers are used for MPE/MAP inference in relational domains [7]. But the complete grounding issue remained unsolved. A LazySAT approach [8] that doesn’t ground all clauses was proposed for satisﬁability in domains where majority of ground atoms are false. Their approach, a variation of WalkSAT, keeps track of all the clauses that can be aﬀected when a literal in an unsatisﬁed clause is ﬂipped. Recently in [10], the ground clauses that are satisﬁed by the evidence are excluded. The approach, which is depended only on the evidence set, processes each clause independently and does not ﬁnd the dependent clauses transitively. Mihalkova et. al. cluster query literals and perform inference for cluster representatives [12]. Queries are clustered by computing signatures using a recursive procedure based on adjacent nodes. Inference is performed for each cluster representative by running MaxWalkSAT on corresponding Markov Network constructed recursively. Alen Fern mentions about the applicability of Forward Chaining in horn clauses [11] but has not given any algorithm or proof for doing so. In the case of contradicting clauses, it is not straight forward to do forward chaining. The objective of our work is stated in the next paragraphs. We address the issue of complete grounding by restricting our domain to ﬁrst order horn clauses and pruning the search space for satisﬁability. Our approach caters to several real world applications that use the horn clausal language. If a set of horn clauses are fully satisﬁable, then a minimal model can be found using TΣ operator (referred to as the immediate consequence operator TP in [3]) in polynomial time. However weighted unsatisﬁable problems require to ﬁnd the most likely state based on the weights. We propose an extension to the minimal model approach wherein we ﬁnd (i) the relevant set of ground horn clauses which has a potential to be part of a contradiction and (ii) an interpretation near to the result. MaxSAT algorithm can be used on this subset of clauses, (optionally) starting from the interpretation returned, to get the most likely state. We also prove that local search for optimality in the pruned space cannot aﬀect the satisﬁability of the rest of the clauses. Our experiments show that the approach reduces search space substantially and helps maxSAT to converge in short time. The paper is organized as follows. Section 2 explains the conventional TΣ operator and the proposed M odif ied TΣ operator. In section 3, we give an overall procedure for satisﬁability and also state and prove our claims. Results are discussed in section 4. We conclude our work in section 5.

Pruning Search Space for Weighted First Order Horn Clause Satisﬁability

2

173

Satisfiability in Horn Clauses

If any of the atoms in the body part of a horn clause is false, then the clause is satisﬁed because of its inherent structure of having atmost one positive atom and all others negative. The groundings of a set of ﬁrst order horn clauses (Σ) with all the constants give a large set in which majority of the atoms are false in real world. This makes a large subset of these clauses satisﬁed by default. We can neglect these clauses and restrict our attention to the clauses that have a potential to be part of a contradiction. We call this set, the relevant set (RS). We propose an algorithm, M odif ied TΣ , to identify the relevant set along with the truth assignments that are almost near to the result. Local search for optimality can be done on this set, starting with the interpretation returned, rather than considering the huge set of clauses and arbitrary truth assignments. Next we explain TΣ before going to the Modiﬁed version. 2.1

TΣ Operator

TΣ Operator provides a procedure to generate an interpretation from another. It builds on the concept that for satisﬁability in horn clauses, all the unit clauses should be True and if the body of a clause is True, then the head should also be True. Let Ik be the interpretation at the k th step of the operation. Then, Ik+1 = Ik ∪ TΣ (Ik ) where,

TΣ (I) = {a : a ← body ∈ Σ

(1) and body ⊆ I}

(2)

If we start with I = ∅, and iteratively apply the above function assignment (with respect to the set of clauses), we will eventually converge at an interpretation that is the minimal model of the formulae if one exists. If there is no model for this set, the operation will reach a contradiction and will return Unsatisﬁable. In weighted satisﬁability problems, if the given set is unsatisﬁable, we need to get a most likely state based on the weights. MaxSAT algorithms can do this optimization. Since applying MaxSAT to the complete groundings is expensive, we improve the above method to prune the search space for MaxSAT. M odif ied TΣ Step described in the next section helps us to prune the search space. 2.2

M odif ied TΣ Step

M odif ied TΣ operation returns a model if one exists; Otherwise returns the set of clauses to be used by a local search algorithm and an initial interpretation for the local search. The method is given in Algorithm 1 and is explained below. Start with applying TΣ to the set of ground clauses until it converges in a model or some contradiction is attained. In the former case, we can stop and return the current interpretation as the solution. If we land up in a contradiction, we get an atom whose truth value determines the set of clauses satisﬁed. We assign true to the atom and proceed further till no more clauses can be visited. All the clauses discovered by M odif ied TΣ irrespective of whether satisﬁed or

174

N. Nair et al.

Algorithm 1. M odif ied TΣ (Σ, DB) Input: Σ, the set of ﬁrst order clauses with weights; DB, evidence set given. Output: RS, the set of clauses to be considered for optimization; T S, truth assignments of all atoms in RS except those in DB. 1. T S := ∅ 2. RS := ∅ 3. for each unit clause c in Σ do 4. for each grounding c of c do 5. if c ∈ / RS then 6. Add c to RS 7. end if 8. if c .head ∈ / {T S ∪ DB} then 9. Add c .head to T S 10. end if 11. end for 12. end for 13. repeat 14. for each non unit clause c in Σ do 15. for each grounding c of c where c .body ⊆ {T S ∪ DB} do 16. if c ∈ / RS then 17. Add c to RS 18. end if 19. if c .head ∈ / {T S ∪ DB} then 20. Add c .head to T S 21. end if 22. end for 23. end for 24. Until no new clauses are added to the set RS 25. Return {RS, T S} not form the relevant set. The interpretation got at the end of the algorithm can optionally be used as initial truth assignment for the optimization step. Note that the truth values for evidences given are always true and cannot be changed. Any weighted satisﬁability algorithm can be applied on the Relevant Set of clauses and the (optional) initial truth values to get a minimum cost interpretation. We now discuss weighted satisﬁability approach using M odif ied TΣ .

3

Modified Weighted SAT

In the new approach, M odif ied TΣ operation is used to ﬁnd relevant subset as well as initial truth assignment. Then weighted MaxSAT version given in Algorithm 2 is used. Algorithm 3 gives the overall algorithm.

Pruning Search Space for Weighted First Order Horn Clause Satisﬁability

175

Claim 1. All the unsatisﬁed clauses will be in RS. Proof. A horn clause c is unsatisﬁed if c .body ⊆ {T S∪DB} and c .head ∈ / {T S∪ DB}. Step 6 in M odif ied TΣ adds all clauses c of the form (c .head ∨ ¬T rue) to RS irrespective of whether it is satisﬁed or not. Step 17 in M odif ied TΣ adds all clauses c where c .body ⊆ {T S ∪ DB}. This covers both the cases of c .head is T rue and c .head is F alse. All other clauses c where c .body {T S ∪ DB} are satisﬁed by default. So set of unsatisﬁed clauses is a subset of RS. Claim 2. Any ﬂip done in any maxSAT step to make an unsatisﬁed clause satisﬁable only aﬀects the satisﬁability of clauses in RS. Proof. Let us prove this by contradiction. Suppose a clause, c = (l1 ∨ ¬l2 ∨ ¬l3 ∨ . . . ∨ ¬ln ) is not satisﬁed by the current assignments in {T S ∪ DB}. This happens only when l1 ∈ / {T S ∪ DB} and ∀i = 2 . . . n li ∈ {T S ∪ DB}. To make c satisﬁed, there are two cases. case 1: ﬂip l1 , case 2: ﬂip any of l2 , l3 , . . . , ln . case 1: Flip l1 (F alse to T rue). Assume that ﬂipping l1 will aﬀect the state of a clause c ∈ / RS. Since c ∈ / RS, c .body {T S ∪ DB}. Otherwise step 17 in M odif ied TΣ would have covered c and it would have been in RS. Also all the unit clauses are covered by step 6 in M odif ied TΣ . Now let c .head = l1 . Since ﬂipping c .head to T rue changes the state of c , c .body ⊆ {T S ∪ DB}. If this is the case, c should have been covered by step 17 in M odif ied TΣ and would have been in RS. Hence the assumption that c ∈ / RS is wrong. Now let l1 ∈ c .body and ﬂipping it to T rue changes the state of c . Then c .body \l1 ⊆ {T S ∪DB}. But applying our approach to c would have made l1 ∈ T S and transitively c .body ⊆ {T S ∪ DB} and c ∈ RS. Hence the assumption that c ∈ / RS is wrong. case 2: Flip any li ∈ {l2 , l3 , . . . , ln } (T rue to F alse). Assume that ﬂipping li will aﬀect the state of a clause c ∈ / RS. Since c ∈ / RS, c .body {T S ∪ DB}. Otherwise step 17 in M odif ied TΣ would have covered c and it would have been in RS. Also all the unit clauses are covered by step 6 in M odif ied TΣ . Now let c .head = li . Since ﬂipping c .head to F alse changes the state of c , c .body ⊆ {T S ∪ DB}. If this is the case, c should have been covered by step 17 in M odif ied TΣ and would have been in RS. Hence the assumption that c ∈ / RS is wrong. Now let li ∈ c .body and ﬂipping it to F alse changes the sate of c . Then before ﬂipping, c .body ⊆ {T S ∪ DB} which must have been covered by step 17 in M odif ied TΣ and c ∈ RS. Hence the assumption that c ∈ / RS is wrong. Claim 3. If α is the cost of an optimal solution to RS, then α is the cost of an optimal solution to Σ Proof. let β and γ be the cost of optimal solutions to Σ and RS respectively. That is β should be the sum of costs of RS and Σ \ RS. Increase in cost occurs only because of contradictions and this is in the set RS (proved in claim 1). The

176

N. Nair et al.

best possible solution to the non contradicting part is zero. We get a minimum cost solution for RS part using MaxSAT and any modiﬁcation to that can result (proved in claim 2 that this doesn’t aﬀect Σ \ RS) an increase in cost only in RS. Therefore β = 0 + γ and thus β = γ Algorithm 2. Modiﬁed Weighted MaxSAT(Σg , T S, DB, target) Input: Σg , all grounded clauses with weights; TS, initial truth assignment; DB, the evidence given; target, the upper bound of cost. Output: T S, An interpretation that is the best solution found. 1. atms := atoms in Σg 2. repeat 3. cost := sum of weights of unsatisﬁed clauses 4. if cost ≤ target 5. Return Success, T S 6. end if 7. c := a randomly chosen unsatisﬁed clause 8. for each atom a ∈ c and a ∈ / DB do 9. compute DeltaCost(a), the cost incurred if a is ﬂipped 10. end for 11. af := a with lowest DeltaCost(a) 12. T S := T S with af ﬂipped 13. cost := cost + DeltaCost(af ) 14.until the cost is no more decreasing 15.Return Failure, T S Algorithm 3. Weighted HornSAT(Σ, DB, target) Input: Σ, the set of ﬁrst order clauses with weights; DB, evidence set given; target, maximum cost expected for the optimization step if required. Output: T S, An interpretation when combined with DB gives the (local) optimum solution. 1. {RS, T S} := M odif ied TΣ (Σ, DB) 2. if {T S ∪ DB} is a model for Σ then 3. Return T S 4. else 5. T S := Modiﬁed Weighted MaxSAT(RS, T S, DB, target ) 6. end if 7. Return T S

4

Results

We implemented new HornSAT algorithm with M odif ied TΣ in java. We have done our experiments in AMD Athlon 64 bit dual core machine (2.90 GHz) with 2.8 GB RAM and running Ubuntu 8.04. Our results show that, for satisﬁablility, the M odif ied TΣ method gives a fewer number of groundings to optimize and that the optimization step converges in a short time when the search space is pruned.

Pruning Search Space for Weighted First Order Horn Clause Satisﬁability

177

Table 1. Results with uwcse KB and diﬀerent evidence sets

HornSAT

Pruned + MaxWalkSAT

Complete grounding + MaxWalkSAT

Time taken (ms) HornSAT

Pruned + MaxWalkSAT

Converged Cost Complete grounding + MaxWalkSAT

Pruned

Complete

Evidence set

No. of groundings

language 508788 181 atoms

6908

90.452

70.265

70.265 2475736 1823778 6896

language 87 atoms

177738

3205

81.463

37.892

37.892 2329459 1098285 2351

AI 766 atoms

Memory 182690 Error

NA

344.584 344.584 NA

7507578 7462967

Fig. 1. Comparison of the approaches when applied to uwcse KB. a. All 181 atoms from language dataset are given. b. 87 atoms from language dataset are given. c. All 766 atoms from AI dataset are given. In this experiment, complete grounding approach failed and didnot give any result.

We used the uwcse knowledge base and dataset provided by alchemy [13] for our experiments after making small modiﬁcations to make the clause set horn. The constants given as the evidence set is considered as the complete domain for each variables. We have run three experiments on each dataset. First experiment does the complete groundings and runs MaxWalkSAT. Second grounds the clauses with pruning and runs traditional MaxWalkSAT with random truth assignments. The third experiment runs MaxWalkSAT on the pruned clauses set with the initial truth assignment returned by M odif ied TΣ . Evidence set of different sizes are used and the comparison is given in Table 1. Figures 1.a, 1.b, 1.c portrays the results when 181 atoms of uwcse language dataset, 87 atoms of uwcse language dataset and 766 atoms of uwcse AI dataset are used respectively as evidence set. Experimental results show that the proposed method outperforms the traditional approach in terms of memory and speed. Implementation and other details are available at www.cse.iitb.ac.in/~naveennair/HornSatisﬁability/

178

5

N. Nair et al.

Conclusion and Future Work

Several ground clauses formed as a result of propositionalization of ﬁrst order horn formulae are satisﬁed by default and it is a wastage of resources to consider them for optimization. We presented an algorithm that prunes the search space and proved that the optimal solution must lie in the pruned space. Experiments indicate the scope for eﬃcient inference using MaxSAT for the set of horn clauses. The algorithm can be extended for general clauses by assigning true value artiﬁcially to all non-negated atoms if all the negated atoms are true and proceeding like in Algorithm 1. Acknowledgments. We would like to thank Dr. Ashwin Srinivasan, IBM India Research Laboratory for his helpful comments.

References 1. Selman, B., Levesque, H., Mitchell, D.: A New Method for Solving Hard Satisﬁability Problems. In: AAAI 1992, San Jose, CA, pp. 440–446 (1992) 2. Selman, B., Kautz, H., Cohen, B.: Local Search Strategies for Satisﬁability Testing. In: Second DIMACS Implementation Challenge on Cliques, Coloring and Satisﬁability (1993) 3. Hogger, C.J.: Essentials of logic programming. Oxford University Press, New York (1990) 4. Heras, F., Larrosa, J., Oliveras, A.: MINIMAXSAT: an eﬃcient weighted max-SAT solver. Journal of Artiﬁcial Intelligence Research 31(1), 1–32 (2008) 5. Kisynski, J., Poole, D.: Lifted aggregation in directed ﬁrst-order probabilistic models. In: Proceedings of the 21st International Joint Conference on Artiﬁcal Intelligence, California, USA, pp. 1922–1929 (2009) 6. Davis, M., Putnam, H., Logemann, G., Loveland, D.W.: A Machine Program for Theorem Proving. Communications of the ACM 5(7), 394–397 (1962) 7. Singla, P., Domingos, P.: Discriminative training of Markov Logic Networks. In: AAAI 2005, pp. 868–873 (2005) 8. Singla, P., Domingos, P.: Memory-Eﬃcient Inference in Relational Domains. In: Proceedings of the Twenty-First National Conference on Artiﬁcial Intelligence, pp. 488–493. AAAI Press, Boston (2006) 9. Alsinet, T., Many, F., Planes, J.: An eﬃcient solver for weighted Max-SAT. Journal of Global Optimization, 61–73 (2008) 10. Shavlik, J., Natarajan, S.: Speeding up inference in Markov logic networks by preprocessing to reduce the size of the resulting grounded network. In: Proceedings of the 21st International JCAI (2009) 11. Fern, A.: A Penalty-Logic Simple-Transition Model for Structured Sequences. In: Computational Intelligence, pp. 302–334 (2009) 12. Mihalkova, L., Richardson, M.: Speeding up inference in statistical relational learning by clustering similar query literals. In: De Raedt, L. (ed.) ILP 2009. LNCS, vol. 5989, pp. 110–122. Springer, Heidelberg (2010) 13. http://alchemy.cs.washington.edu/

Pruning Search Space for Weighted First Order Horn Clause Satisﬁability

179

Glossary Atoms: They are predicates in pure form, for eg: parent(ann,mary), female(X). Body: Right side of (:-) (if) is called body of the clause. Clause: Disjunction of literals for eg: (parent(ann,mary) ∨ ¬ female(ann)) ≡ (parent(ann,mary) :- female(ann)). Clause Representation: Any clause can be written in the form of Comma separated positive literals :- Comma separated negated literals, where (:-) is pronounced as if. For example in propositional logic the clause a ∨ b ∨ ¬ c ≡ a,b :- c. Conjunctive Normal Form (CN F ): Every formulae in propositional logic or ﬁrst-order logic is equivalent to a formula that can be written as a conjunction of disjunctions i.e, something like (a (X) ∨ b (X)) ∧ (c (X) ∨ d (X)) ∧ · · ·. When written in this way the formula is said to be in conjunctive normal form or CNF. Constants: A constant symbol represents an individual in the world. In ﬁrst order logic it is represented by small letter eg: jane, 1, a etc. Definite Clause: Clauses with exactly one positive literal eg: p(X) :- c(X),d(Y). Facts: Body less horn clauses, for eg: female(ann); daughter(mary). Functions: Take input as tuple of objects and return another object eg: motherOf(ann), parentOf(mary). Ground Clause: Clauses formed as a result of replacing each variable by all possible constants in each predicate of a clause. Head: Left side of (:-) (if ) is called head of the clause. Herbrand Interpretation: A (Herbrand) interpretation is a truth assignment to all the atoms formed as a result of replacing the variables in a predicate by all the possible constants (objects). Herbrand Model: a Herbrand model is simply a Herbrand interpretation that makes a wellformed formula true. Horn Clause: Clause with atmost one positive literal for eg: (:- parent(ann,joan), female(joan).) , (parent(ann,kan) :- female(mary).)

180

N. Nair et al.

In a horn clause in CNF, all the atoms preceeded by a ¬ form the body part and the atom not preceded by a ¬ is the head. Here ¬A means (not)A. Knowledge Base: A Knowledge Base is a set of clauses which represents a theory. Literals: They are predicates in either pure form or negated form, for eg: ¬parent(ann,mary). MaxSAT: It is a local search method used for satisfying the maximum number of clauses, which starts with random truth assignments to all ground atoms and improve the solution step by step by ﬂipping one literal at a time which makes some clauses satisﬁed and some others unsatisﬁed. Model: An interpretation which makes the clause true. For eg: P : −Q, R, the models are M = φ, {P, Q, R}. Statistical Relational Learning (SRL): Statistical relational learning deals with machine learning and data mining in relational domains where observations may be missing, partially observed, and/or noisy. Variables: Starts with the capital letters for eg: X,Abs, etc. Weighted MaxSAT: Given a ﬁrst order Knowledge Base (σ), ﬁnd a Herbrand Interpretation that maximizes (or minimizes) the sum of weights of satisﬁed (unsatisﬁed) clauses.

Multi-relational Pattern Mining Based-on Combination of Properties with Preserving Their Structure in Examples Yusuke Nakano and Nobuhiro Inuzuka Nagoya Institute of Technology, Gokiso-cho, Showa, Nagoya 466-8555, Japan Tel.: +81-52-735-5050, Fax: +81-52-735-5473 [email protected], [email protected] Abstract. We propose an algorithm for multi-relational pattern mining through the problem established in WARMR. In order to overcome the combinatorial problem of large pattern space, another algorithm MAPIX restricts patterns into combination of basic patterns, called properties. A property is deﬁned as a set of literals appeared in examples and is of an extended attribute-value form. Advantage of MAPIX is to make patterns from pattern fragments occurred in examples. Many patterns which are not appeared in examples are not tested. Although the range of patterns is clear and MAPIX enumerates them eﬃciently, a large part of patterns are out of the range. The proposing algorithm keeps the advantage and extends the way of combination of properties. The algorithm combines properties as they appeared in examples, we call it structure preserving combination.

1

Introduction

This paper studies multi-relational pattern mining obeying the line of Warmr [2, 3]. Warmr generates and tests candidate patterns with a pruning technique similar to Apriori [1]. In spite of the cut-down procedure it has the exponentially growing space of hypothesis with respect to the length of patterns and the number of relations. Another algorithm Mapix restricts patterns into conjunctions of basic patterns, called properties. A property is an extended attribute-value form consisting of literals that refer to parts of objects and a literal that describes a property of or a relation among the parts. For example for a person (or his/her family) a basic pattern consists of referential literals (or an extended attribute), for example “one of his/her grandchildren”, and a descriptive literal (or an extended attribute value), for examples “it is male” and then it describes a basic property, for example “this person has a grandson”. Mapix ﬁnds patterns made of properties appeared in samples relying on type and mode information of relations. The search can be seen as a combination of bottom-up and top-down search, it constructs properties from samples in a bottom-up way and tests patterns combining the properties in a top-down way. The properties of Mapix and their conjunctions are natural but the range in which Mapix generates patterns is still narrow. There seems another natural P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 181–189, 2011. c Springer-Verlag Berlin Heidelberg 2011

182

Y. Nakano and N. Inuzuka

range of patterns to be generated. We propose another way to combine properties. For example, for a person of a family, “having a son” and “having a granddaughter” are properties and by combining them we may have “having a son and a granddaughter”. But it may not represent a real situation of the family precisely, in which it may happen that “having a son who has a daughter”. We propose an algorithm by using a structural combination [4] of basic patterns. We propose to use preserved structure in a sample and give a simple algorithm. Our algorithm generates patterns in a larger pattern space.

2

Patterns and Mapix Algorithm

Datalog is used to represent data and patterns. Datalog clauses are of the form ∀(h ← b1 ∧ . . . ∧ bn ) without functors, where ∀F means all variables in F are universally quantiﬁed and ∀ is omitted when understood. For c = h ← b1 ∧. . .∧bn , head(c) denotes the head atom h and body(c) denotes the body conjunction b1 ∧ . . . ∧ bn . A fact is a clause without body. A substitution is described by θ = {v1 /t1 , . . . , vn /tn } for variables vi and terms ti . P θ for a formula P means replacing every variable vi with ti . For our mining task a Datalog DB R is given and one of extensional relations is speciﬁed for a target (It corresponds to the concept key of Warmr). A fact of the target relation is called a target instance. A query is a clause without head ← b1 ∧ . . . ∧ bn , equivalently an existentially quantiﬁed conjunction ∃(b1 ∧ . . . ∧ bn ), where ∃Q means all variables in Q are existentially quantiﬁed. When a formula is clearly meant to be a query ∃ is dropped. A query q is said to succeed wrt R when R |= ∃q. The following gives patterns, among which we are interested in frequent ones. Definition 1 (pattern). A pattern is a Datalog clause whose head is of the target predicate. For a target instance e and a pattern P , P (e) denotes a query ∃(body(P )θ) where θ is the mgu (most general uniﬁer) of e and head(P ). When P (e) succeeds we say that e possesses P . Definition 2 (frequent pattern). The frequency of P is the number of target instances which possess P . P is frequent if its frequency exceeds supmin ·N , where supmin is a given minimal support and N is the number of all target instances. Example 1 (running example). Let us consider a DB Rfam on families (Fig. 1). It includes four relations, parent(x, y) meaning x is a parent of y, female(x) for a female x, male(x) for a male x, and grandfather(x) meaning x is someone’s grandfather. We use gf, p, m, f for the relations for short. We also abbreviate person01 as 01. Let gf be a target. Then, for example the following formula is a pattern. P = gf(A) ← m(A) ∧ p(A, B) ∧ f(B) For a target instance = gf(01), P () denotes a query, P () = ∃((m(A) ∧ p(A, B) ∧ f(B))θ) = ∃(m(01) ∧ p(01, B) ∧ f(B)).

Multi-relational Pattern Mining Based-on Combination

grandfather person01 person07 person12 person19 person20

parent person01 person02 person02 person03 ...

person02 person03 person04 person05 ...

male person01 person05 person07 person10 ...

183

female person02 person03 person04 person06 ...

Fig. 1. The family DB Rfam , including grandfather, parent, male and female, of which grandfather is a target. The persons with ∗ are female and others are male.

where θ is the mgu of and head(P ). The query P () succeeds by an assignment {B → 02} then e possesses P . Many ILP algorithms assume modes for predicates to restrict patterns. Some arguments of a predicate have a role as input (denoted by +) and some as output (−). We give parent(+, −), male(+), and female(+) to the predicates in Rfam . We distinguish between two classes of predicates. Predicates with at least one

−-arg. are called path predicates, e.g. parent(+, −), which have a role like a function generating a term from others. Predicates without −-arg. are called check predicates, e.g. male(+) and female(+), which have a role describing a property of given terms. An instance of a path/check predicate in DB is called a path/check literal. We do not give mode for target predicate. Using these concepts Mapix extracts basic patterns, called properties, from DB and generalize them to basic patterns, called property items. Definition 3 (property). A property of a target instance e wrt DB R is a minimal set L of ground atoms in R satisfying 1. L includes exactly one check literal, and 2. L can be given a linear order where every term in a +-arg. of a literal in L is occurred in some precedent literals in the order or e. Definition 4 (variablization). For a ground formula α a formula β is a variablization of α when 1. β does not include any ground term, and 2. there exists a substitution θ = {v1 /t1 , · · · , vn /tn} that satisﬁes (a) α = βθ and (b) t1 , . . . , tn in θ are all diﬀerent terms in α. We assume to use new variables never used before when variablizing. Definition 5. For a set L = {l1 , · · · , lm } of ground literals and a target instance e var(e ← L) denotes a variablization of e ← l1 ∧ . . . ∧ lm .

184

Y. Nakano and N. Inuzuka Table 1. Properties and property items of = gf(01)

pr0 = {m(01)} pr1 = {p(01,02),f(02)} pr2 = {p(01,02),p(02,03),f(03)} ({p(01,02),p(02,04),f(04)}) pr3 = {p(01,02),p(02,03),p(03,05),m(05)} pr4 = {p(01,02),p(02,04),p(04,06),f(06)}

it0 = gf(A) ← m(A) it1 = gf(A) ← p(A,B)∧f(B) it2 = gf(A) ← p(A,B)∧p(B,C)∧f(C) it3 = gf(A) ← p(A,B)∧p(B,C)∧p(B,D)∧m(D) it4 = gf(A) ← p(A,B)∧p(B,C)∧p(C,D)∧f(D)

When L is a property of e, var(e ← L) is called a property item of e. Possessing P by e and a query P (e) are deﬁned as in Deﬁnition 1. Example 2. L = {p(01,02),p(02,03),f(03)} is a property of = gf(01). Then it = var(←L)=gf(A)←p(A,B)∧p(B,C)∧f(C) is possessed by , i.e. Rfam |= it(). Then, Mapix algorithm is as follows: 1. It samples an appropriate number of target instances from a target relation. 2. For each sampled instance it extracts property items hold on DB. 3. It executes an Apriori-like level-wise frequent pattern mining algorithm by regarding the satisfaction of a property item as possession of it. As discussed in [5] the size of sampled instances in step 1 can be constant with respect to the size of all examples. Example 3. Table 1 shows property items produced from gf(01). Only these are frequent for min sup 60% even if we sample all instances, when another infrequent property items gf(A) ← p(A, B) ∧ p(B, C) ∧ m(C) is extracted from gf(20). In step 3 Mapix combines property items by a simple conjunction. For example it2 (means having a granddaughter) and it4 (means having a greatgranddaughter) are combined to the following pattern, which we write as it2, it4,

it2, it4 = gf(A)←p(A,B)∧p(B,C)∧f(C)∧p(A,D)∧p(D,E)∧p(E,F )∧f(F ), which means having a granddaughter and a great-granddaughter but neither having a child who has a daughter and a granddaughter nor having a granddaughter who has a daughter. We call such a conjunction a property itemset.

3

Ideas and an Algorithm

We propose an algorithm based on Mapix in order to produce rich combinations of properties. It keeps eﬃciency by seeing only combination appeared in samples. In order to explain our idea, we introduce the shadow of a property item, which is a set of properties that produce the property item. Definition 6. For a database R and a property item it, the set deﬁned below is called the shadow of the property item, shadow(it,R) = {‘e ← L’ ∈ T × 2R | L is a property and var(e ← L)∼it}, where T is the target relation in R, 2X is the power set of a set X, and P ∼Q means P and Q are θ-equivalent, i.e. P θ-subsumes Q and Q θ-subsumes P .

Multi-relational Pattern Mining Based-on Combination

185

Example 4. For Rfam and it2, the shadow of it is shadow(it2, Rfam ) = { gf(01) ← {p(01, 02), p(02, 03), f(03)}, gf(01) ← {p(01, 02), p(02, 04), f(04)}, gf(07) ← {p(07, 08), p(08, 09), f(09)}, gf(12) ← {p(12, 13), p(13, 15), f(15)}, gf(12) ← {p(12, 14), p(14, 16), f(16)}, gf(19) ← {p(19, 20), p(20, 21), f(21)}, gf(19) ← {p(19, 20), p(20, 22), f(22)}, gf(20) ← {p(20, 21), p(21, 24), f(24)} } Definition 7 (combinable property itemset). A property itemset iti1 , . . . , itin is combinable, if there exists a target instance e and

e ← pri1 , . . . , e ← prin ∈ shadow(iti1 , R) × . . . × shadow(itin , R), such that j=1,...,n (terms(prij ) − terms(e)) = ∅, where terms(p) is the set of all terms in p. e ← pri1 , . . . , e ← prin is called a combinable shadow tuple. Definition 8 (combined property item). When a property itemset is =

iti1 , . . . , itin is combinable and e ← pri1 , . . . , e ← prin is a combinable shadow tuple of it, var(e ← j=1,...,n prij ) is called a combined property item produced from is. A property item that is not combined is called atomic. Example 5. A property itemset it2, it4 is combinable, because the shadow of it2 (see the example above) and the shadow of it4 shadow(it4, Rfam ) = { gf(01) ← {p(01, 02), p(02, 04), p(04, 06), f(06)}, gf(07) ← {p(07, 08), p(08, 09), p(09, 11), f(11)}, gf(19) ← {p(19, 20), p(20, 21), p(21, 24), f(24)} } have ﬁve combinable shadow tuples

gf(01) ← {p(01,02), p(02,03), f(03)}, gf(01) ← {p(01,02), p(02,04), p(04,06), f(06)},

gf(01) ← {p(01,02), p(02,04), f(04)}, gf(01) ← {p(01,02), p(02,04), p(04,06), f(06)},

gf(07) ← {p(07,08), p(08,09), f(09)}, gf(07) ← {p(07,08), p(08,09), p(09,11), f(11)},

gf(19) ← {p(19,20), p(20,21), f(21)}, gf(19) ← {p(19,20), p(20,21), p(21,24), f(24)},

gf(19) ← {p(19,20), p(20,22), f(22)}, gf(19) ← {p(19,20), p(20,21), p(21,24), f(24)}

and they produce the following two combined property items. it2-4 = gf(A) ← p(A, B) ∧ p(B, C) ∧ f(C) ∧ p(C, D) ∧ f(D). it2-4’ = gf(A) ← p(A, B) ∧ p(B, C) ∧ f(C) ∧ p(B, D) ∧ p(D, E) ∧ f(E). it2-4 means having a granddaughter who has a daughter and it2-4’ means having a child who has a daughter and a granddaughter. Every tuple produces a combined property item equivalent to one of the above. All frequent combined property items produced from Rfam are shown in Table 2.

186

Y. Nakano and N. Inuzuka

Table 2. All frequent property items and combined property items in Rfam for min sup=60% it0 it1 it2 it3 it4 it1-2 it1-3 it2-3 it2-3’ it2-4 it2-4’ it3-4 it1-2-3 it1-2-3’ it2-3-4 it2-3-4’

= gf(A) ← m(A). = gf(A) ← p(A, B) ∧ f(B). = gf(A) ← p(A, B) ∧ p(B, C) ∧ f(C). = gf(A) ← p(A, B) ∧ p(B, C) ∧ p(C, D) ∧ m(D). = gf(A) ← p(A, B) ∧ p(B, C) ∧ p(C, D), f(D). = gf(A) ← p(A, B) ∧ f(B) ∧ p(B, C) ∧ f(C). = gf(A) ← p(A, B) ∧ f(B) ∧ p(B, C) ∧ p(C, D) ∧ m(D). = gf(A) ← p(A, B) ∧ p(B, C) ∧ f(C) ∧ p(C, D) ∧ m(D). = gf(A) ← p(A, B) ∧ p(B, C) ∧ f(C) ∧ p(B, D) ∧ p(D, E) ∧ m(E). = gf(A) ← p(A, B) ∧ p(B, C) ∧ f(C) ∧ p(C, D) ∧ f(D). = gf(A) ← p(A, B) ∧ p(B, C) ∧ f(C) ∧ p(B, D) ∧ p(D, E) ∧ f(E). = gf(A) ← p(A, B) ∧ p(B, C) ∧ p(C, D) ∧ f(D) ∧ p(B, E) ∧ p(E, F ), m(F ). = gf(A) ← p(A, B) ∧ f(B) ∧ p(B, C) ∧ f(C) ∧ p(C, D) ∧ m(D). = gf(A) ← p(A, B) ∧ f(B) ∧ p(B, C) ∧ f(C) ∧ p(B, D) ∧ p(D, E) ∧ m(E). = gf(A) ← p(A, B)∧p(B, C)∧f(C)∧p(C, D)∧f(D)∧p(B, E)∧p(E, F )∧m(F ). = gf(A) ← p(A, B)∧p(B, C)∧p(C, D)∧f(D)∧p(B, E)∧f(E)∧p(E, F )∧m(F ).

With atomic property items combined property items work to make other patterns by conjunction. For example, it1 and it2-4 make the following pattern,

it1, it2-4 = gf(A) ← p(A, B) ∧ f(B) ∧ p(A, C) ∧ p(C, D) ∧ f(D) ∧ p(D, E) ∧ f(E), which means having a daughter and a granddaughter who has a daughter.

Here we propose a new algorithm for all frequent patterns made from conjunction among atomic and combined property items extracted from samples: 1. It samples target instances from a target relation. 2. For each sampled instance it extracts atomic property items hold on DB. 3. By using an Apriori-like level-wise algorithm it enumerates all frequent conjunctions of the atomic property items. 4. It produces all combined property items from the frequent combinable conjunction. 5. Again by the level-wise algorithm it enumerates all frequent conjunctions of atomic and combined property items. The detail of the algorithm is given in Table 3.

4

Experiments and Concluding Remarks

We have done two experiments. The ﬁrst one was with Rfam , where we aim to see the varieties of patterns extracted. Table 4 shows the numbers of patterns enumerated and runtime for our algorithm as well as Mapix and the algorithm in [4] according as the minimum support threshold is changed. Our algorithm produced more patterns than others. There was no duplication in the patterns enumerated by three algorithms in the sense of θ-equivalence.

Multi-relational Pattern Mining Based-on Combination

187

Table 3. A proposing algorithm input R : a DB; T : target relation; supmin : the min. sup. threshold; output Freq: the set of patterns whose supports are larger than supmin 1. Select an appropriate size of subset T ⊆ T ; 2. Items := ø; P := ø; Freq:= ø; 3. For each e ∈ T do P:=P ∪ {e ← pr | pr is a property of e} 4. For each ‘e ← pr’ ∈ P do 5. If ∃I ∈ Items, I∼var(e ← pr) then S[I]:=S[I] ∪ {e ← pr}; 6. else I = var(e ← pr); S[I ]:={e ← pr} ; Items:=Items ∪ {I }; 7. k:=1; F11 :={ I | I ∈ Items and supp(I) ≥ supmin }; Freq:=F11 ; 8. While Fk1 = ø do 1 :={IS ∈ Ck+1 | supp(IS) ≥ supmin }; 9. Ck+1 :=Candidate(Fk1 , Fk1 ); Fk+1 1 10. Freq:=Freq ∪ Fk+1 ; k:=k+1; 11. Combined := Candicomb(Freq); 12. k:=1; F12 :={ I | I ∈ Combined and supp(I) ≥ supmin }; Freq:=Freq ∪ F12 ; 13. While Fk2 = ø do 2 14. Ck+1 :=Candidate(Fk1 , Fk2 ); Fk+1 :={IS ∈ Ck+1 | supp(IS) ≥ supmin }; 2 15. Freq:=Freq ∪ Fk+1 ; k:=k+1; 16. Return Freq; Candidate(Fk1 ,Fk2 ): input Fk1 , Fk2 : sets of frequent property itemsets of a level; output Ck+1 : the set of candidate property itemsets of the next level where at least a property itemset is used from Fk2 ; 1. Ck+1 := ø 2. For each pair

I1 , . . . , Ik , I1 , . . . , Ik ∈ Fk2 × {Fk1 ∪ Fk2 } where I1 = I1 , . . . , Ik−1 = Ik−1 , and Ik < Ik do 3. Ck+1 := Ck+1 ∪ { I1 , . . . , Ik−1 , Ik , Ik }; 4. For each IS ∈ Ck+1 do 5. If k = 1 and (II or I I), where IS = I, I then remove IS from Ck+1 ; 6. For each I ∈ IS do if IS − {I} ∈ Fk1 ∪ Fk2 then remove IS from Ck+1 ; 7. Return Ck+1 ; Candicomb(Freq): input Freq : the set of frequent property item sets made of atomic items; output Combined : the set of combined property items produced from all property itemsets in Freq; 1. Combined := ø; 2. For each I1 , . . . , In ∈ Freq for n ≥ 2 do 3. For each e1 ← pr1 , . . . , en← prn ∈ S[I1 ] × · · · × S[In ] do 4. If e1 = . . . = en and j=1,...,n (terms(prj ) − terms(ej )) = ø then 5. Combined := Combined ∪ {var(e1 ← j=1,...,n prj )}; 6. For each I ∈ Combined do 7. If ∃I ∈ Combined, I = I ∧ I ∼I then Combined := Combined − {I}; 6. Return Combined;

188

Y. Nakano and N. Inuzuka

The second experiment was with Table 4. Experiment with Rfam . All the data of Bongard. Fig. 2 shows examples were used. the number of patterns and runtime min sup 20% 40% 60% 80% when the number of examples to exMapix #patterns 55 31 23 11 tract properties changes. These are the [5] time (sec) 0.04 0.01 0.01 0.01 average of 10 times execution. We used algo. #patterns 441 153 51 15 all examples to count frequency but in [4] time (sec) 6.23 0.45 0.06 0.03 sampled limited number of examples our #patterns 4601 1063 109 17 to extract properties. By 80 examples algo. time (sec) 9.55 0.54 0.08 0.01 our algorithm produced the same set of patterns (802 patterns) as the case using whole 392 examples. The 802 patterns had no duplication. Fig. 2 also shows the grow of runtime according to the sample size. Our algorithm enumerates larger range of patterns, made of property items and combined property items in which property items are combined as in examples. The algorithm in [4] uses structural combination but it has limitation. It treats property items only in a single example then it composes all examples as an artiﬁcial large example. Instead of our shadow the algorithm keeps the conjunction of all Fig. 2. The number of patterns and equivalent property items because the runtime as the number of sampled exconjunction is equivalent to each prop- amples in Bongard. erty item. By the method patterns becomes larger. Our algorithm overcome these limitation by the shadow and simple algorithm, but has the large time complexity to the size of examples sampled. In fact it took 6556 seconds for Bongard when it samples all examples. The suﬃcient size of examples, however, can be suppressed because it depends only on the minimum support threshold.

References 1. Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules. In: VLDB, pp. 487–499 (1994) 2. Dehaspe, L., De Raedt, L.: Mining association rules with multiple relations. In: Dˇzeroski, S., Lavraˇc, N. (eds.) ILP 1997. LNCS, vol. 1297, pp. 125–132. Springer, Heidelberg (1997)

Multi-relational Pattern Mining Based-on Combination

189

3. Dehaspe, L., Toivonen, H.: Discovery of frequent Datalog patterns. Data Mining and Knowledge Discovery 3(1), 7–36 (1999) 4. Inuzuka, N., Motoyama, J., Urazawa, S., Nakano, T.: Relational pattern mining based on equivalent classes of properties extracted from samples. In: Washio, T., Suzuki, E., Ting, K.M., Inokuchi, A. (eds.) PAKDD 2008. LNCS (LNAI), vol. 5012, pp. 582–591. Springer, Heidelberg (2008) 5. Motoyama, J., Urazawa, S., Nakano, T., Inuzuka, N.: A mining algorithm using property items extracted from sampled examples. In: Muggleton, S.H., Otero, R., Tamaddoni-Nezhad, A. (eds.) ILP 2006. LNCS (LNAI), vol. 4455, pp. 335–350. Springer, Heidelberg (2007)

Learning from Noisy Data Using a Non-covering ILP Algorithm Andrej Oblak and Ivan Bratko Faculty of Computer and Information Science, University of Ljubljana Trˇzaˇska cesta 25, SI-1001 Ljubljana, Slovenia {andrej.oblak,ivan.bratko}@fri.uni-lj.si

Abstract. In this paper we describe the non-covering inductive logic programming program HYPER/N, concentrating mainly on noise handling as well as some other mechanisms that improve learning. We perform some experiments with HYPER/N on synthetic weather data with artificially added noise, and on real weather data to learn to predict the movement of rain from radar rain images and synoptic data.

1

Introduction

In this paper we describe the non-covering ILP program HYPER/N, which is based on HYPER [1], but with added mechanisms for handling noisy data as well as some mechanisms that improve the computational eﬃciency. A noncovering ILP algorithm works with hypotheses as a whole, whereas covering ILP algorithms such as FOIL [6], Progol [5], and Aleph [8] build hypotheses by iteratively adding clauses to the hypothesis using greedy search. Advantages of a non-covering approach are the better ability to learn recursive hypotheses and the ability to learn multiple predicates simultaneously. The main disadvantage is a high combinatorial complexity. Besides that, HYPER’s main disadvantage is lack of mechanisms to enable the learning from noisy data. We addressed this deﬁciency in HYPER/N. The rest of the paper is organized as follows. In Section 2 we provide some related work. In Section 3 HYPER/N’s mechanisms and improvements in comparison with HYPER are described. In Section 4 we perform experiments with HYPER/N and other systems in a weather prediction domain. Experiments were done on both synthetic data and real weather data. Synthetic data enabled controlled experiments with variable degree of noise in data. Section 5 summarizes the results.

2

Related Work

Not much work has been done in the ﬁeld of learning from noisy data using noncovering ILP algorithms. In [4] a non-covering ILP system Lime is presented, which uses a Bayesian heuristic for inducing a hypothesis with the maximum posterior probability. In the experiments in [4] Lime, equipped with this heuristic, P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 190–197, 2011. c Springer-Verlag Berlin Heidelberg 2011

Learning from Noisy Data Using a Non-covering ILP Algorithm

191

handled noise better than both FOIL and Progol. In [3] non-covering ILP system HYPER was used in a simple robotic domain, where an autonomous robot learns about the environment by performing experiments and collecting sensory data. The experiments were done with a real robot using an over-head camera to determine the position. So there was some noise in the measured coordinates. This noise was successfully handled by deﬁning predicates in background knowledge in such a way that they tolerated some inaccuracy in numerical data.

3

HYPER/N

HYPER [1] is a non-covering ILP program. It starts with some overly general hypotheses that are complete also inconsistent, and it builds a reﬁnement graph from them using three basic types of reﬁnements of hypotheses: – by matching two variables of the same type in a clause, e.g. X1 = X2, – by reﬁning a variable in a clause into a background term (list, constant, ...), – by adding a background literal to a clause. Since each reﬁnement is a specialization, a successor of a hypothesis in the reﬁnement graph only covers a subset of cases covered by the hypothesis’ predecessor, it suﬃces that, during search, we only consider complete hypotheses. An incomplete hypothesis can never be reﬁned into a complete one [1]. The main advantages of HYPER in comparison to other ILP programs is the ability to learn recursive and multi-predicate hypotheses well. The main disadvantage of HYPER are the high combinatorial complexity and inability to learn from noisy data. To a certain degree we have solved this in the improved version of HYPER, called HYPER/N. Before we continue let us deﬁne what kind of noise we want HYPER/N to handle. Noise is considered as incorrectly classiﬁed examples, a positive example that is classiﬁed as a negative example and vice versa. 3.1

Handling of Noisy Data in HYPER/N

The ﬁrst thing we had to do, for HYPER/N to handle noisy data, was to relax the conditions for completeness and consistency. Let us assume that in our learning set there are Nnoise noisy examples. We say that a hypothesis is approximately complete if it covers all but Nnoise positive examples, and approximately consistent if it covers Nnoise negative examples. Before the start of learning the user must estimate the number of noisy examples in absolute terms (e.g. 13 noisy examples) or relative terms (e.g. 8% of learning examples are noisy). Too low estimations often result in no learned hypotheses, and too high estimations result in many learned hypotheses, since there are several possible coverings of a positive learning example set with such approximately complete hypotheses. It is up to the user to experiment with the estimations of noise to ﬁnd an appropriate value.

192

A. Oblak and I. Bratko

As mentioned in the previous paragraph, HYPER/N can learn several different hypotheses. HYPER/N stores all the approximately complete and approximately consistent hypotheses found in a list of potentially good hypotheses together with the sets of positive examples, covered by those hypotheses. Let us assume that at one step of learning we have a list of potentially good hypotheses H = {H0 , H1 , ..., Hi } and a list E = {EH0 , EH1 , ..., EHi } of sets of positive examples, covered by those hypotheses. For any new approximately complete and approximately consistent hypothesis Hj , Hj ∈ / H, with a set of covered positive examples EHj , we check: EHj EHi for all EHi ∈ E. If true, hypothesis Hj is added to the list H and set EHj is added to the list E. With this we avoid storing hypotheses that cover same sets or subsets of positive examples as some other hypothesis, that is already stored in the list. In HYPER learning simply stops when a complete and consistent hypothesis is found. But when learning from noisy data with HYPER/N, there is a high possibility that a complete and consistent hypothesis will not be found. Therefore before the learning starts, the user must set a maximum number of reﬁnements. If a complete and consistent hypothesis is found before the number of reﬁnements reaches this limit, such hypothesis is returned as a result. Otherwise an entire list of potentially good hypotheses is returned when HYPER/N reaches the maximum number of reﬁnements. After that it is up to the user to decide what to do with the result – use it as a ﬁnal solution or try diﬀerent parameter values. 3.2

Learning Multiple Clauses from Noisy Data

Described modiﬁcations work ﬁne if we are learning hypotheses consisting of only one clause. But if we want to learn a hypothesis consisting of two or more clauses, a certain problem arises. At each reﬁnement HYPER ﬁrst looks for a clause that alone covers at least one negative example [1]. But if we have a situation as illustrated in Fig. 1, where the ﬁrst clause covers one noisy negative example, it may happen that learning will get stuck at that point. Let us assume that no possible reﬁnement exists that would exclude the noisy negative example from being covered by the ﬁrst clause. HYPER always selects the ﬁrst clause that covers a negative example for reﬁnement. In the case of noise-free data this is sensible, but it is obvious that in the case of noisy data,

Fig. 1. Illustration of a problem that arises when learning hypotheses with more than one clause. HYPER always chooses the first clause for refinement that alone covers a negative example. This may cause the learning to get stuck that point.

Learning from Noisy Data Using a Non-covering ILP Algorithm

193

the second clause is much more promising for reﬁnement than the ﬁrst one. HYPER/N avoids such cases by reﬁning all clauses with highest cost, calculated by (1), where n is the number of negative, and p the number of positive examples covered by the clause alone. clause cost =

n p+n

if n + p > 0 otherwise clause cost = 0 .

(1)

Breaking down the hypotheses into separate clauses and evaluating them separately is against HYPER’s philosophy because HYPER works with hypotheses as a whole. It can also give us some dubious results when evaluating clauses from recursive hypotheses, since a general clause without a base clause usually covers no examples (positive and negative). Because of that we also tested another approach, similar to the ‘gain’ heuristic [2]. We evaluated hypothesis H with and without clause C. We counted that clause C covers all examples that were covered with hypothesis H and are not covered anymore with hypothesis H \ {C}. By counting this way we obtained p and n, and calculated clause cost using (1). While this approach may be more in line with HYPER’s philosophy, HYPER/N had much more trouble learning recursive hypotheses (longer search or even no hypotheses learned at all) than by breaking down hypotheses into separate clauses and then evaluating them. 3.3

Some Additional Improvements

The next issue was to alleviate HYPER’s shortsightedness. For this reason we implemented a lookahead with user-speciﬁed depth. When reﬁning a hypothesis, HYPER/N reﬁnes also all hypothesis’ reﬁnements, ignoring heuristic estimates and repeats this for a speciﬁed number of levels. After that it removes all duplicates, adds all reﬁned hypotheses to the list of “open” hypotheses and repeats this cycle with the next best hypothesis (one with lowest heuristic estimate). A ﬁnal improvement addresses the issue of high complexity. In certain cases, prior to learning the user knows certain constraints regarding the target theory. For example when learning in the weather domain we cannot have two diﬀerent measurements of air pressure from one weather station at the same time. HYPER/N enables the user to provide such constraints as Prolog programs, which further increases HYPER/N’s ﬂexibility while at the same time decreases complexity, since all such hypotheses that do not satisfy the constraints are automatically discarded.

4

Experiments with Weather Data

We tested how HYPER/N performs at learning in a weather domain. In this domain we have a series of radar images (part of which is displayed in Fig.2), taken in 10 minute intervals, indicating the intensity of rain (none, light, medium, heavy and extreme) as well as a database with the synoptic measurements (air temperature, air pressure, wind direction, ...). Synoptic measurements were taken in 1 hour intervals at best. Spacial data was represented on a rectangular grid of

194

A. Oblak and I. Bratko

Fig. 2. Excerpt from a sequence of radar images, used for learning

cells. Besides this data we provided HYPER/N also with neighbor relations between cells and with successor in time relation. Many relations between synoptic measurements also exist and we have some prior knowledge about this domain. Therefore ILP seems appropriate for this domain since as ILP’s strengths lie in relational learning and providing background knowledge in a very natural way. The ﬁrst thing we did was to verify how HYPER/N handles noise in the weather domain. The easiest way to do this was with synthetic data where we could control the amount of noise. We generated 200 learning examples using the following theory: rain(any_type,[X,Y],T1) :succ(T,T1), rain(any_type,[X1,Y1],T), neighbor(north,[X1,Y1],[X,Y]), wind_dir(north,T). rain(light,[X,Y],T1) :succ(T,T1), rain(any_type,[X1,Y1],T), neighbor(east,[X1,Y1],[X,Y]), wind_dir(east,T). where rain(any_type,[X,Y],T) indicates that rain of any type (light, medium, heavy or extreme) is falling in the cell with coordinates [X,Y] at time T, succ(T,T1) indicates that T1 is T’s successor in time, neighbor(north,[X1,Y1],[X,Y]) indicates that the cell with the coordinates [X,Y] is the north neighbor of the cell with the coordinates [X1,Y1] (similar holds for neighbor(east,[X1,Y1],[X,Y])) and wind_dir(north,T) indicates that in the time T the wind is blowing towards the north (similar holds for wind_dir(east,T)). This theory says that rain in a cell will move to its neighbor cell in the wind direction. To simulate noise, we changed the direction of rain movement in n examples. When the expected amount of noise was set to n, HYPER/N always learned the original theory. Under these conditions, HYPER/N managed to learn the correct hypothesis for the values of n up to approximately 50% of the number of positive learning examples. Setting the expected noise level lower than n resulted in no hypotheses learned when HYPER/N reached the number of maximum reﬁnements (usually 1000 reﬁnements). Setting it higher (approximately n + 5 and more) resulted in several diﬀerent hypotheses learned. Neither of those hypotheses was good as a whole.

Learning from Noisy Data Using a Non-covering ILP Algorithm

195

The next step was to run HYPER/N on actual radar images. Since those images have resolution of 300 by 400 pixels, where each pixel represents 1km2 in nature, we had for complexity reasons to reduce the amount of data. We discretized the images in smaller, 5 by 5 pixels cells, to decrease the number of learning examples (from 120.000 to 4.800 – for one radar image). Experimentally we found that in the weather domain HYPER/N could handle up to a few thousand learning examples. Increasing this number considerably resulted in very slow learning. Increasing the cell size was not an option since rain movement was not visible in too large cells, so we focused only on a smaller region around a weather station that produced synoptic measurements most regularly (in 1 hour intervals). So we selected a sequence of images (3.400 learning examples), where the rain mass is ﬁrst moving towards the north, and after 3 hours started moving towards the east. HYPER/N induced the following hypotheses: rain( rain_predicted, [X,Y],T1) :succ( T, T1), rain( rain_observed, [X1,Y1],T), wind_dir( D, T), neighbor( D, [X1,Y1], [X,Y]). and rain(rain_predicted,[X,Y],T1) :succ(T,T1), rain(rain_observed,[X,Y],T). The ﬁrst hypothesis says that the rain moves in the direction in which the wind blows. The second hypothesis says that the rain “stays where it was”. The learning times were in the order of an hour when the maximum number of clauses was “wastefully” set to 2 (1 would suﬃce). We evaluated these hypotheses on 7.400 test data (74 radar images where each contains 100 cells in the observed area) where rain moves in several diﬀerent directions. The ﬁrst hypothesis (the one that says that the rain moves in the direction in which the wind blows) had a classiﬁcation accuracy of 83%. The second one (the one that says that the rain stays where it was) had a classiﬁcation accuracy of 89,8%. For comparison – a hypothesis that always predicts rain has a clasiﬁcation accuracy of 46,3% and hypothesis that always predicts no rain has clasiﬁcation accuracy of 53,7%. For comparison with other ILP systems, we experimented with Aleph [8], Progol [5] and Alchemy [7] on the same reduced set of real weather data. We here present the most successful trials, obtained with Aleph. We ran Aleph with both the “classical” covering algorithm, and a non-covering approach with learning ﬁrst-order decision trees. We did not get any success with the other non-covering algorithm in Aleph, called “theory induction”, which induces a whole theory at once (rather than clause by clause) which would be most relevant for comparison with HYPER. In the covering algorithm, an appropriate setting of parameter “noise” was 400, which resulted in a theory whose ﬁrst clause is: rain( YesNo, Place, Time) :succ_start( Time0, Time),

rain( YesNo, Place, Time0).

196

A. Oblak and I. Bratko

The ﬁrst clause is equivalent to HYPER/N’s second theory. Then followed a large set of empty-body clauses that covered the false positive examples by simple enumeration. Aleph’s theory has test set accuracy 0.888, very similar to HYPER/N’s 0.898. The small diﬀerence is due to the clauses that cover single false positive examples. A user might sensibly remove these spurious clauses, leading to the same result as HYPER/N second theory. We did not succeed in making Aleph with covering induce HYPER/N’s ﬁrst theory as alternative. Inducing class probability trees with parameter lookahead set to 1 just resulted in the unsatisfactory root-only tree. Setting lookahead to 2 or 3 gives tree structured rules: rain( YesNo, Place, Time) :succ_start( Time0, Time), rain( YesNo, Place, Time0), random(YesNo, [0.534425-no, 0.465575-yes]). rain( YesNo, Place, Time) :not (succ_start( Time0, Time), rain( YesNo, Place, Time0) ), random(YesNo, [0.507671-no, 0.492329-yes]). The rules are sensible again (similar to theory 2 by HYPER). The class probability distribution in the ﬁrst rule is confusing - it would best be omitted because when the body of the rule is satisﬁed, YesNo is already instantiated. Setting lookahead = 4 results in a theory that contains the same idea as theory 1 by HYPER/N. In conclusion, Aleph with appropriate settings and used in a “constructive” way induced theories similar to those by HYPER/N. Aleph was much faster than HYPER/N, with learning times in the order of a minute. We were not able to obtain any success with Alchemy. A typical result is the following theory (after notational modiﬁcation) that is hard to understand or use: not neighbor( Dir, [X1,X2], [X1,X1]) v not rain( Type, [X1,Y], Time) v not rain(Type, [X2,Y], Time) It should be admited that we had problems using these systems, specially with searching for good parameter setting. Better settings may exist than those we used.

5

Conclusion

In the paper we presented the mechanisms in HYPER/N that enable learning from noisy data and on larger domains than HYPER. We studied HYPER/N performance by experimnets in a real weather domain. In comparison with other popular ILP programs such as Aleph [8], FOIL [6] and Progol [5] as well as Alchemy [7], HYPER/N’s advantage is its better ability to learn recursive clauses and to learn multiple predicates simultaneously. Experiments in the weather domain show how important it is to correctly assess the degree of noise in the data.

Learning from Noisy Data Using a Non-covering ILP Algorithm

197

The accuracy and appropriate structure of induced theories largely depend on this estimate. Future work will surely include automation of some mechanisms, such as ﬁnding an appropriate value for the expected amount of noise, to make it more robust and user friendly.

Acknowledgment This work was partly done in the X-Media project (www.x-media-project.org) funded by the European Commission, EC grant IST-FP6-026978, and Slovene Agency for Research and Development (ARRS). The Slovene environmental agency ARSO provided the weather data used in this study. We thank our colˇ ˇ leagues Jure Zabkar, Martin Moˇzina, Marko Zerjal and Matic Standeker for discussion and other help in this work.

References 1. Bratko, I.: Inductive Logic Programming, 3rd edn. Prolog Programming for Artificial Intelligence, ch. 19, pp. 484–519. Addison Wesley, Reading (2001) 2. Lavraˇc, N., Dˇzeroski, S., Bratko, I.: Handling Imperfect Data in Inductive Logic Programming. In: De Raedt, L. (ed.) Advances in Inductive Logic Programming, pp. 48–64. IOS Press, Amsterdam (1996) ˇ 3. Leban, G., Zabkar, J., Bratko, I.: An Experiment in Robot Discovery With ILP. LNCS, pp. 77–90. Springer, Heidelberg (2008) 4. McCreath, E., Sharma, A.: ILP with Noise and Fixed Example Size: A Bayesian Approach. In: Fifteenth International Joint Conference on Artificial Intelligence, pp. 1310–1315. Morgan Kaufmann Publishers, San Francisco (1997) 5. Muggleton, S.: Inverse entailment and Progol. New Generation Computing 13, 245– 286 (1995) 6. Quinlan, J.R., Cameron-Jones, R.M.: FOIL: A Midterm Report. In: Brazdil, P.B. (ed.) ECML 1993. LNCS, vol. 667, pp. 3–20. Springer, Heidelberg (1993) 7. Richardson, M., Domingos, P.: Markov Logic Networks. Machine Learning 62, 107– 136 8. Srinivasan, A.: The Aleph Manual. Computing Laboratory, Oxford University (2007)

Can HOLL Outperform FOLL? Niels Pahlavi and Stephen Muggleton Department of Computing, Imperial College London, 180 Queen’s Gate, London SW7 2BZ, UK {niels.pahlavi,s.muggleton}@imperial.ac.uk

Abstract. Learning ﬁrst-order recursive theories remains a diﬃcult learning task in a normal Inductive Logic Programming (ILP) setting, although numerous approaches have addressed it; using Higher-order Logic (HOL) avoids having to learn recursive clauses for such a task. It is one of the areas where Higher-order Logic Learning (HOLL), which uses the power of expressivity of HOL, can be expected to improve the learnability of a problem compared to First-order Logic Learning (FOLL). We present a ﬁrst working implementation of λProgol, a HOLL system adapting the ILP system Progol and the HOL formalism λProlog, which was introduced in a poster last year [15]. We demonstrate that λProgol outperforms standard Progol when learning ﬁrst-order recursive theories, by improving signiﬁcantly the predictive accuracy of several worked examples, especially when the learning examples are small with respect to the size of the data.

1

Introduction and Motivations

[3] describes Higher-order Logic (HOL) as “a natural extension of ﬁrst-order logic (FOL) which is simple, elegant, highly expressive, and practical” recommends its use as an “attractive alternative to ﬁrst-order logic”. HOL allows for quantiﬁcation over predicates and functions and is intrinsically more expressive than FOL. Much of logic-based Machine Learning research is based on FOL and Prolog, including Inductive Logic Programming (ILP). Yet, HOL, and has been seldom used. According to [9], “the logic programming community needs to make greater use of the power of higher-order features and the related type systems. Furthermore, HOL has generally been under-exploited as a knowledge representation language”. In [9], the use of HOL in Computational Logic, which has been “advocated for at least the last 30 years” is illustrated: functional languages, like Haskell98; Higher-order programming introduced with λProlog [11]; integrated functional logic programming languages like Curry or Escher; or the higher-order logic interactive theorem proving environment “HOL”. It is also used in IBAL and for Deep Transfer Learning. We have decided to adapt ILP within a HOL framework, developing Higherorder Logic Learning (HOLL). ILP seems to be rather intuitively adaptable to a FOL formalism. We present a ﬁrst working implementation of λProgol, a HOLL system adapting the ILP system Progol and the HOL formalism λProlog. We decided to choose Higher-order Horn Clauses (HOHC) [13] as a HOL formalism, P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 198–205, 2011. c Springer-Verlag Berlin Heidelberg 2011

Can HOLL Outperform FOLL?

199

since it is one of the logical foundations of λProlog. As a ILP system, we chose to adapt Progol [12], which is a popular and eﬃcient implementation. We want to determine whether HOLL can outperform FOLL and study the trade-oﬀ that there may be between learnability and searching costs (the use of Henkin semantics as in [17], seems to alleviate these and maintain the structure of the search space). There have been attempts to use HOL for logic-based Machine Learning such as by Harao starting in [6], Feng and Muggleton [4] and Furukawa and Goebel [5]. They provide diﬀerent higher-order extensions of least general generalization in order to handle higher-order terms in a normal ILP setting, whereas we use λProlog, a HOL framework, as a logical foundation to extend ﬁrst-order ILP to a higher-order context. The main similar work is [9] by Lloyd and Ng, where higher-order machine learning is also developed. It uses a typed higher-order logic, but, although similar, “a diﬀerent sublogic is used for λProlog programs than the equational theories proposed” in [9]. It details a learning system, called ALKEM Y . A main diﬀerence is that Lloyd’s approach is not based on Logic Programming and therefore on ILP. According to Flach, “it is almost a rational reconstruction of what ILP could have been, had it used Escher-style HOL rather than Prolog”; whereas we intend, through the use of higher-order Horn clauses to keep the Horn clauses foundations of LP and ILP and to extend it. HOLL will be tested and assessed on new problems and applications not learnable by ILP (which includes the learning of higher-order predicates), but also on how well it performs on problems already handled by ILP to compare it with existing ILP systems in order to determine if it can outperform FOLL. It would be therefore of interest to look at learning problems not handled well by ILP. One of these is learning tasks involving recursion. According to [10], “learning ﬁrst-order recursive theories is a diﬃcult learning task” in a normal ILP setting. However, we can expect a higher-order system to learn better than a ﬁrst-order system on such problems, because we could use higher-order predicates as background knowledge to learn recursive theories (a similar approach is already used for some recursive functions in the Haskell prelude); and it will be sounder, more natural and intuitive, hence probably more eﬃcient than meta-logical features which come from functional languages. We can for example use the higher-order predicate trans as background knowledge to learn naturally the recursive predicate ancestor (see Sect. 3). More generally, the expressivity of HOL would make it possible to represent mathematical properties like symmetry, reﬂexivity or transitivity, which would allow to handle equational reasoning and functions within a logic-based framework. We could also represent such properties in the following fashion (in the case of symmetry) : [email protected]@Y

Subseries of Lecture Notes in Computer Science

6489

Paolo Frasconi Francesca A. Lisi (Eds.)

Inductive Logic Programming 20th International Conference, ILP 2010 Florence, Italy, June 27-30, 2010 Revised Papers

13

Series Editors Randy Goebel, University of Alberta, Edmonton, Canada Jörg Siekmann, University of Saarland, Saarbrücken, Germany Wolfgang Wahlster, DFKI and University of Saarland, Saarbrücken, Germany Volume Editors Paolo Frasconi Università degli Studi di Firenze Dipartimento di Sistemi e Informatica Via di Santa Marta, 3, 50139 Firenze, Italy E-mail: [email protected]ﬁ.it Francesca A. Lisi Università degli Studi di Bari "Aldo Moro" Dipartimento di Informatica Campus Universitario "E. Quagliariello" Via E. Orabona, 4, 70125 Bari, Italy E-mail: [email protected]

ISSN 0302-9743 e-ISSN 1611-3349 ISBN 978-3-642-21294-9 e-ISBN 978-3-642-21295-6 DOI 10.1007/978-3-642-21295-6 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: Applied for CR Subject Classiﬁcation (1998): F.4.1, I.2.3, I.2.6, F.1, H.2.8, H.3, F.3 LNCS Sublibrary: SL 7 – Artiﬁcial Intelligence

© Springer-Verlag Berlin Heidelberg 2011 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, speciﬁcally the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microﬁlms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a speciﬁc statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Typesetting: Camera-ready by author, data conversion by Scientiﬁc Publishing Services, Chennai, India Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Preface

This volume contains a selection of revised papers from the 20th International Conference on Inductive Logic Programming (ILP 2010) held in Firenze, Italy, during June 27–30, 2010. The ILP conference series started in 1991 and is the premier international forum on logic-based approaches to machine learning. The conference has recently explored several intersections with statistical learning and other probabilistic approaches, expanding research horizons signiﬁcantly. The 20th edition was structured with invited talks, regular talks, a poster session, a panel session, and featured for the ﬁrst time a tutorial day. The invited speakers were Michael Kifer, Avi Pfeﬀer, and David Poole. Abstracts of their talks can be found in this volume. Gianluigi Greco and Francesco Scarcello presented a tutorial on “Structural Decomposition Methods: Identifying Easy Instances of Hard Problems”; Volker Tresp presented a tutorial on “Multivariate Models for Relational Learning.” Ivan Bratko, Luc De Raedt, Peter Flach, Katsumi Inoue, Stephen Muggleton, David Poole, and Ashwin Srinivasan participated in a panel session highlighting successes and future trends of ILP 20 years after the ﬁrst meeting. The overall program featured 16 oral presentations and 15 poster presentations. The presentations of both kind were selected on the basis of extended abstracts. Following the recent tradition of the conference, a selection of the papers accepted at ILP 2010 are published in this volume of the Lecture Notes in Artiﬁcial Intelligence series and in a special issue of the Machine Learning journal. From the initially submitted 44 extended abstracts (8 pages in LNCS format), 31 were accepted for presentation at the conference. Each submission was refereed by at least three Program Committee members and was accessible for additional comments by the entire Program Committee (except in the cases of conﬂict of interest) thanks to the open reviewing model supported by EasyChair. Out of the accepted contributions 5 were selected for the special issue, 11 were published as a long paper (16 pages), and 15 more as a short paper (8 pages) in the proceedings. These papers were prepared after the conference. Supplementary materials for some of the accepted papers can be retrieved from the conference website (http://ilp2010.dsi.unifi.it/). ILP 2010 would not have taken place without the contribution of many people. We would like to thank the invited and tutorial speakers, the panelists, the Program Committee members, the additional reviewers, the authors of submitted papers, the participants, the local organizers (especially Marco Lippi)

VI

Preface

as well as the sponsors (the Artiﬁcial Intelligence journal, the Machine Learning journal, the Association for Logic Programming, the University of Bari “Aldo Moro,” the PASCAL 2 Network of Excellence, and the Oﬃce of Naval Research Global) for their generous ﬁnancial support. March 2011

Paolo Frasconi Francesca Alessandra Lisi

Organization

Program Chairs Paolo Frasconi Francesca A. Lisi

Universit` a degli Studi di Firenze, Italy Universit`a degli Studi di Bari “Aldo Moro”, Italy

Program Committee Erick Alphonse Annalisa Appice Hendrik Blockeel James Cussens Luc De Raedt Saso Dzeroski Nicola Fanizzi Alan Fern Peter Flach Nuno Fonseca Lise Getoor Pascal Hitzler Tamas Horvath Katsumi Inoue Manfred Jaeger Kristian Kersting Ross King Tolga Konik Stefan Kramer Niels Landwehr Nada Lavrac Sofus Macskassy Donato Malerba Lily Mihalkova Brian Milch Stephen Muggleton Ramon Otero David Page Andrea Passerini Jan Ramon Oliver Ray Chiaki Sakama

Universit´e Paris-Nord, France Universit` a degli Studi di Bari “Aldo Moro”, Italy Katholieke Universiteit Leuven, Belgium University of York, UK Katholieke Universiteit Leuven, Belgium Jozef Stefan Institute, Slovenia Universit`a degli Studi di Bari “Aldo Moro”, Italy Oregon State University, USA University of Bristol, UK CRACS-INESC Porto LA, Portugal University of Maryland, USA Wright State University, USA University of Bonn and Fraunhofer AIS, Germany NII, Japan Aalborg University, Denmark Fraunhofer IAIS and University of Bonn, Germany University of Wales, UK Stanford University, USA TU M¨ unchen, Germany University of Potsdam, Germany Jozef Stefan Institute, Slovenia Fetch Technologies Universit`a degli Studi di Bari “Aldo Moro”, Italy University of Maryland, USA Google, USA Imperial College London, UK University of Corunna, Spain University of Wisconsin, USA Universit`a degli Studi di Trento, Italy Katholieke Universiteit Leuven, Belgium University of Bristol, UK Wakayama University, Japan

VIII

Organization

V´ıtor Santos Costa Taisuke Sato Jude Shavlik Takayoshi Shoudai Ashwin Srinivasan Prasad Tadepalli Volker Tresp Christel Vrain Stefan Wrobel Akihiro Yamamoto Gerson Zaverucha Filip Zelezny

Universidade do Porto, Portugal Tokyo Institute of Technology, Japan University of Wisconsin, USA Kyushu University, Japan IBM India Research Lab, India Oregon State University, USA Siemens AG Munich, Germany LIFO - Universit´e d’Orl´eans, France University of Bonn and Fraunhofer IAIS, Germany Kyoto University, Japan PESC/COPPE - UFRJ, Brazil Czech Technical University, Czech Republic

Additional Reviewers Aleksovski, Darko Camacho, Rui Ceci, Michelangelo Duboc, Ana Lu´ısa Dutra, Inˆes Gonzalez, Jorge Hadiji, Fabian Illobre, Alberto Kameya, Yoshitaka Kimmig, Angelika Lehmann, Jens

Mantadelis, Theofrastos Nickel, Maximilian Paes, Aline Rettinger, Achim Riguzzi, Fabrizio Romero, Javier Slavkov, Ivica Steinke, Florian Stojanova, Daniela Suzuki, Yusuke Tran, Son

Local Arrangements Committee Marco Lippi Arianna Sciarrillo

Universit`a degli Studi di Firenze, Italy Universit`a degli Studi di Firenze, Italy

Sponsors Artiﬁcial Intelligence journal Association for Logic Programming Machine Learning journal Oﬃce of Naval Research Global PASCAL 2 Network of Excellence Universit` a degli Studi di Bari “Aldo Moro”

Table of Contents

Abstracts of Invited Talks Rule Interchange Format: Logic Programming’s Second Wind? . . . . . . . . . Michael Kifer

1

Practical Probabilistic Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Avi Pfeﬀer

2

Probabilistic Relational Learning and Inductive Logic Programming at a Global Scale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . David Poole

4

Research Papers Learning Multi-class Theories in ILP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tarek Abudawood and Peter A. Flach

6

A Numerical Reﬁnement Operator Based on Multi-Instance Learning . . . Erick Alphonse, Tobias Girschick, Fabian Buchwald, and Stefan Kramer

14

Not Far Away from Home: A Relational Distance-Based Approach to Understanding Images of Houses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Laura Antanas, Martijn van Otterlo, Jos´e Oramas M., Tinne Tuytelaars, and Luc De Raedt

22

Approximate Inference for Logic Programs with Annotated Disjunctions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Stefano Bragaglia and Fabrizio Riguzzi

30

Approximate Bayesian Computation for the Parameters of PRISM Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . James Cussens

38

Probabilistic Rule Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Luc De Raedt and Ingo Thon

47

Interactive Discriminative Mining of Chemical Fragments . . . . . . . . . . . . . Nuno A. Fonseca, Max Pereira, V´ıtor Santos Costa, and Rui Camacho

59

MMRF for Proteome Annotation Applied to Human Protein Disease Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Beatriz Garc´ıa-Jim´enez, Agapito Ledezma, and Araceli Sanchis

67

X

Table of Contents

Extending ProbLog with Continuous Distributions . . . . . . . . . . . . . . . . . . . Bernd Gutmann, Manfred Jaeger, and Luc De Raedt

76

Multivariate Prediction for Learning on the Semantic Web . . . . . . . . . . . . Yi Huang, Volker Tresp, Markus Bundschus, Achim Rettinger, and Hans-Peter Kriegel

92

Learning Action Descriptions of Opponent Behaviour in the Robocup 2D Simulation Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alberto Illobre, Jorge Gonzalez, Ramon Otero, and Jose Santos

105

Hypothesizing about Causal Networks with Positive and Negative Eﬀects by Meta-level Abduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Katsumi Inoue, Andrei Doncescu, and Hidetomo Nabeshima

114

BET: An Inductive Logic Programming Workbench . . . . . . . . . . . . . . . . . . Srihari Kalgi, Chirag Gosar, Prasad Gawde, Ganesh Ramakrishnan, Kekin Gada, Chander Iyer, T.V.S. Kiran, and Ashwin Srinivasan Seeing the World through Homomorphism: An Experimental Study on Reducibility of Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ˇ Ondˇrej Kuˇzelka and Filip Zelezn´ y Learning Discriminant Rules as a Minimal Saturation Search . . . . . . . . . . Matthieu Lopez, Lionel Martin, and Christel Vrain Variation of Background Knowledge in an Industrial Application of ILP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Stephen H. Muggleton, Jianzhong Chen, Hiroaki Watanabe, Stuart J. Dunbar, Charles Baxter, Richard Currie, Jos´e Domingo Salazar, Jan Taubert, and Michael J.E. Sternberg Pruning Search Space for Weighted First Order Horn Clause Satisﬁability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Naveen Nair, Anandraj Govindan, Chander Jayaraman, T.V.S. Kiran, and Ganesh Ramakrishnan Multi-relational Pattern Mining Based-on Combination of Properties with Preserving Their Structure in Examples . . . . . . . . . . . . . . . . . . . . . . . . Yusuke Nakano and Nobuhiro Inuzuka

130

138

146

158

171

181

Learning from Noisy Data Using a Non-covering ILP Algorithm. . . . . . . . Andrej Oblak and Ivan Bratko

190

Can HOLL Outperform FOLL? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Niels Pahlavi and Stephen Muggleton

198

Table of Contents

XI

Incremental Learning of Relational Action Models in Noisy Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Christophe Rodrigues, Pierre G´erard, and C´eline Rouveirol

206

When Does It Pay Oﬀ to Use Sophisticated Entailment Engines in ILP? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jos´e Santos and Stephen Muggleton

214

Stochastic Reﬁnement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alireza Tamaddoni-Nezhad and Stephen Muggleton Fire! Firing Inductive Rules from Economic Geography for Fire Risk Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . David Vaz, V´ıtor Santos Costa, and Michel Ferreira Automating the ILP Setup Task: Converting User Advice about Speciﬁc Examples into General Background Knowledge . . . . . . . . . . . . . . . Trevor Walker, Ciaran O’Reilly, Gautam Kunapuli, Sriraam Natarajan, Richard Maclin, David Page, and Jude Shavlik

222

238

253

Speeding Up Planning through Minimal Generalizations of Partially Ordered Plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ˇ ˇ Radom´ır Cernoch and Filip Zelezn´ y

269

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

277

Rule Interchange Format: Logic Programming’s Second Wind? Michael Kifer Department of Computer Science State University of New York at Stony Brook Stony Brook, NY 11794-4400, USA [email protected]

Abstract. Recent years have witnessed a strong upswing in the interest in rule systems technologies—both in their own right and in combination with existing Web standards. In particular, the Semantic Web is now seen as a vast playing ﬁeld for rules within the academia as well as the industry. This renewed interest motivated the development of the Rule Interchange Format (RIF), a recent W3C Web standard for exchanging rules among diﬀerent and dissimilar systems [1–5]. Despite its name, RIF is not merely a format: it is a collection of concrete rule languages, called RIF dialects, and a framework for deﬁning new ones in harmony with each other. This includes formal speciﬁcations of the syntax, semantics, and XML serialization. In this talk we argue that RIF is a major opportunity to re-introduce rule based technologies into the mainstream of knowledge representation and information processing, and to rekindle the interest in logic programming. First, we will introduce the main principles behind RIF and then discuss the application landscape that could emerge if this standard is embraced by the relevant communities: Logic Programming, Semantic Web, and Knowledge Representation. We will also reﬂect on the past of logic programming and speculate on how it could beneﬁt from and contribute to RIF in the future.

References 1. Boley, H., Hallmark, G., Kifer, M., Paschke, A., Polleres, A., Reynolds, D.: RIF Core dialect. Working draft, W3C (July 3, 2009) 2. Boley, H., Kifer, M.: RIF Framework for logic dialects. Working draft, W3C (July 3, 2009) 3. Boley, H., Kifer, M.: RIF basic logic dialect. Working Draft, W3C (July 3, 2009) 4. de Sainte Marie, C., Paschke, A., Hallmark, G.: RIF Production rule dialect (March 2009), http://www.w3.org/2005/rules/wiki/PRD 5. Polleres, A., Boley, H., Kifer, M.: RIF Datatypes and built-ins 1.0 (July 2009), http://www.w3.org/2005/rules/wiki/DTB

P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, p. 1, 2011. © Springer-Verlag Berlin Heidelberg 2011

Practical Probabilistic Programming Avi Pfeffer Charles River Analytics, 625 Mount Auburn Street, Cambridge, MA 02140, USA [email protected]

Abstract. Probabilistic programming promises to make probabilistic modeling easier by making it possible to create models using the power of programming languages, and by applying general-purpose algorithms to reason about models. We present a new probabilistic programming language named Figaro that was designed with practicality and usability in mind. Figaro can represent models naturally that have been difficult to represent in other languages, such as probabilistic relational models and models with undirected relationships with arbitrary constraints. An important feature is that the Figaro language and reasoning algorithms are embedded as a library in Scala. We illustrate the use of Figaro through a case study. Keywords: Probabilistic modeling, representation languages, probabilistic programming.

1 Introduction Probabilistic models are ever growing in richness and diversity. Models may be hierarchical, relational, spatio-temporal, recursive and infinite, among others. Developing the representation, inference, and learning algorithms for new models is a significant task. Probabilistic programming has the potential to make this task much easier by allowing the modeler to represent rich, complex probabilistic models using the full power of programming languages, including data structures, control mechanisms, functions and abstraction. The language provides inference and learning algorithms so the model designer does not need to implement them. Most importantly, a probabilistic programming language (PPL) provides the modeler with the language and tools with which to think of and formulate new models for complex domains. To this point, most of the research on PPLs has focused on improving the power of a language, both in terms of what it can represent and in terms of the algorithms it uses to reason about models written in the language. PPLs today can represent an extremely wide range of models and use increasingly sophisticated algorithms. However, there has been less focus hitherto on usability of the languages. Ultimately, the goal of PPL research is to provide languages that can be used by many people, not just experts in probabilistic programming. We present Figaro, a PPL that is designed to be usable without sacrificing any power. In designing the language for usability, we identified the following four goals: (1) Implement the language as a library that can be used by a wide range of programmers; (2) Naturally represent both directed and undirected models with arbitrary constraints; (3) Naturally represent models with interacting objects; (4) Modular, extensible algorithm specification. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 2–3, 2011. © Springer-Verlag Berlin Heidelberg 2011

Practical Probabilistic Programming

3

An important characteristic of Figaro that distinguishes it from previous probabilistic programming languages is that it is a language not only for representing rich probabilistic models but also for constructing such models. It achieves this property by being embedded in Scala, which is an object-oriented and functional programming language that is interoperable with Java. Figaro inherits the object-oriented and functional nature of Scala. Languages such as IBAL [1] and Church [2] already demonstrated the power of functional probabilistic programming. As a result of its embedding, a Figaro program can be constructed by an arbitrarily complex Scala program. In particular, the Scala program can create data structures that cannot be achieved by an ordinary functional probabilistic program. Thus, the embedding in Scala achieves the first three goals: Figaro is an extensible library that can be used by many programmers; Figaro can represent undirected models with arbitrary constraints, and even directed cyclic models which have been very difficult to represent to this point; and Figaro can naturally capture object-relational models like probabilistic relational models while maintaining their object structure. The fourth goal is also achieved through the embedding in Scala. Figaro programs are Scala data structures that have declarative semantics as probabilistic models that are independent of any specific reasoning algorithm. Therefore, any reasoning algorithm can be written that respects the semantics and applied to the data structures. Figaro provides an extensible class library of such algorithms. We illustrate the use of Figaro through a case study, in which we implemented a system to infer the capabilities and intentions of an adversarial agent. Our system was given a history of past situations involving the agent and its goal was to reason about a new situation. Different situations provide the agent with different objectives and means with which to achieve them, but some objectives and means are shared across situations. In addition, different objectives share the same logical structure with different parameterizations, and the realization of that logical structure in a situation depends on which elements are related in that situation. Figaro was able to capture this rich structure easily, using the language to construct a specific model for each situation while sharing knowledge between situations, and exploiting the sharing of logical structure between objectives while relating each objective to the appropriate related objectives.

References 1. Pfeffer, A.: The Design and Implementation of IBAL: A General-Purpose Probabilistic Language. In: Getoor, L., Taskar, B. (eds.) Statistical Relational Learning. MIT Press, Cambridge (2007) 2. Goodman, N.D., Mansinghka, V.K., Roy, D., Bonawitz, K., Tenenbaum, J.B.: Church: A Language for Generative Models. In: Uncertainty in Artificial Intelligence (UAI) (2008)

Probabilistic Relational Learning and Inductive Logic Programming at a Global Scale David Poole Department of Computer Science, University of British Columbia Vancouver, BC, Canada http://www.cs.ubc.ca/~ poole/

Abstract. Building on advances in statistical-relational AI and the Semantic Web, this talk outlined how to create knowledge, how to evaluate knowledge that has been published, and how to go beyond the sum of human knowledge. If there is some claim of truth, it is reasonable to ask what evidence there is for that claim, and to not believe claims that do not provide evidence. Thus we need to publish data that can provide evidence. Given such data, we can also learn from it. This talk outlines how publishing ontologies, data, and probabilistic hypotheses/theories can let us base beliefs on evidence, and how the resulting world-wide mind can go beyond the aggregation of human knowledge. Much of the world’s data is relational, and we want to make probabilistic predictions in order to make rational decisions. Thus probabilistic relational learning and inductive logic programming need to be a foundation of the semantic web. This talk overviewed the technology behind this vision and the considerable technical and social problem that remain. Keywords: Statistical relational AI, Probabilistic Relational Learning, Semantic Science, Lifted Probabilistic Inference, World-Wide Mind.

To make decisions, we should base them on the best information available; we need to be able to ﬁnd all relevant information and condition on it eﬀectively. We have called the technology to support decisions “semantic science” [7,8], based on the semantic web, which is an endeavor to make all of the world’s knowledge accessible to computers, and using scientiﬁc methodology to make predictions. Figure 1 shows the main components of semantic science. Ontologies are used to deﬁne the vocabulary of data and hypotheses. These are needed to enable us to ﬁnd and use all relevant information. Observational data, which depends on the world and the ontologies, are published. Such data sets can be very heterogenous, at widely varying levels of abstraction and detail. Hypotheses that make probabilistic predictions are also published. Hypotheses are not created in isolation, but depend on some training data. Hypotheses can be judged by their prior plausibility and how well they predict the data. Given a new case, various hypotheses are combined to form models that can be used to make predictions on that case. Given a prediction, users can ask what hypotheses were used to P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 4–5, 2011. c Springer-Verlag Berlin Heidelberg 2011

Probabilistic Relational Learning at a Global Scale

5

make that prediction, and for each hypothesis, users can ﬁnd the relevant data to evaluate the hypothesis. In this way decisions can be based on all of the applicable evidence. Typically data is not just a set of mappings from features into a ﬁxed set of values, as is often assumed by traditional machine learning, but often refers to individuals that are only referred to by name; it is the properties of these individuals and the relationships among these individuals that is important for prediction. Following the publication of what could be argued was the ﬁrst probabilistic relational language [1,2,5], the combiWorld nation of logical and probabilistic reasoning, Ontologies Data and probabilistic programming languages Training [6] has blossomed. There are still many Data Hypotheses/ open fundamental problems for representaTheories New tions, inference and learning. [3] proposed Cases the problem of lifted inference: carrying Models/ Predictions out probabilistic inference reasoning about classes of individuals as a unit, without Fig. 1. Semantic Science reasoning about them individually. Another problem is where models refer to individuals in terms of the roles they ﬁll, but the data does not label the observed individuals with roles [4]. There is still lots of exciting research to be done!

References 1. Poole, D.: Probabilistic Horn abduction and Bayesian networks. Artiﬁcial Intelligence 64(1), 81–129 (1993) 2. Poole, D.: The independent choice logic for modelling multiple agents under uncertainty. Artiﬁcial Intelligence 94, 7–56 (1997); special issue on economic principles of multi-agent systems 3. Poole, D.: First-order probabilistic inference. In: Proc. Eighteenth International Joint Conference on Artiﬁcial Intelligence (IJCAI 2003), Acapulco, Mexico, pp. 985– 991 (2003) 4. Poole, D.: Logical generative models for probabilistic reasoning about existence, roles and identity. In: 22nd AAAI Conference on AI, AAAI 2007 (July 2007) 5. Poole, D.: The independent choice logic and beyond. In: De Raedt, L., Frasconi, P., Kersting, K., Muggleton, S.H. (eds.) Probabilistic Inductive Logic Programming. LNCS (LNAI), vol. 4911, pp. 222–243. Springer, Heidelberg (2008) 6. Poole, D.: Probabilistic programming languages: Independent choices and deterministic systems. In: Dechter, R., Geﬀner, H., Halpern, J. (eds.) Heuristics, Probability and Causality: A Tribute to Judea Pearl, pp. 253–269. College Publications (2010) 7. Poole, D., Smyth, C., Sharma, R.: Semantic science: Ontologies, data and probabilistic theories. In: da Costa, P.C.G., d’Amato, C., Fanizzi, N., Laskey, K.B., Laskey, K.J., Lukasiewicz, T., Nickles, M., Pool, M. (eds.) URSW 2005 - 2007. LNCS (LNAI), vol. 5327, pp. 26–40. Springer, Heidelberg (2008) 8. Poole, D., Smyth, C., Sharma, R.: Ontology design for scientiﬁc theories that make probabilistic predictions. IEEE Intelligent Systems 24(1), 27–36 (2009)

Learning Multi-class Theories in ILP Tarek Abudawood and Peter A. Flach Intelligent Systems Laboratory, University of Bristol, UK [email protected], [email protected]

Abstract. In this paper we investigate the lack of reliability and consistency of those binary rule learners in ILP that employ the one-vs-rest binarisation technique when dealing with multi-class domains. We show that we can learn a simple, consistent and reliable multi-class theory by combining the rules of the multiple one-vs-rest theories into one rule list or set. We experimentally show that our proposed methods produce coherent and accurate rule models from the rules learned by a well known ILP learner Aleph.

1 Introduction Inductive Logic Programming (ILP) is concerned with inducing first-order clausal models from examples and background knowledge. Symbolic rule learning systems in ILP, such as FOIL [1], PROGOL [2] and Aleph [3], learn rules from positive and negative examples. They are known for their ability to learn from complex structured data and build effective classification models in a range of domains. Unfortunately, they struggle in dealing with multi-class problems. In most situations they reduce a multi-class problem into multiple binary problems following the pairwise one-vs-one or one-vs-rest binarisation techniques. Aleph, for example, can learn a multi-class theory in the one-vs-rest paradigm where the outcome of its induction can be seen as a combination of several black-box models. Each model induces rules for one specific (positive) class, and a default rule is added to predict the remaining classes. This one-vs-rest approach is a commonly used machine learning technique due to its simplicity in solving multi-class problems. It has been proven to be powerful when compared to other multi-class approaches [4]. However, we argue in this paper that the one-vs-rest technique is not suitable for first-order rule learners as there is a strong bias toward the negative classes leading to unrealistic estimates of predictive power. In addition, the lack of integrity between the different binary models leads to inconsistent predictions. We investigate the reliability (how much one can rely on the quality of a model) and consistency (how consistent are the predictions of multiple related models) of onevs-rest binary models and illustrate the difference with a proper multi-class model in Sect. 2. In Sect. 3 our goal is to investigate several methods to overcome the problems of the current application of one-vs-rest technique in ILP rule learners. We experimentally demonstrate the performance of our suggested methods in Sect. 4 and compare them with the standard binary method of Aleph. In Sect. 5 we briefly revisit related work before we draw the conclusion in the final section. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 6–13, 2011. c Springer-Verlag Berlin Heidelberg 2011

Learning Multi-class Theories in ILP

7

2 Motivation In machine learning accuracy is commonly used for comparing the classification performance and thus many researchers report their results in terms of accuracy, and compare their results against accuracies of other algorithms. The accuracy of a model can be interpreted as the expectation of correctly classifying a randomly selected example.

Pred. c+ c− c+ T P FN Act. − c FP T N Tot. Eˆ + Eˆ −

c1 c1 T P1 c2 FN2 Act. c3 FN3 ... ... cn FNn Tot. Eˆ i

Tot. E+ E− E

(a)

Pred. c2 c3 FN1 FN1 T P2 FN2 FN3 T P3 ... ... FNn FNn Eˆ 2 Eˆ 3

... ... ... ... ... ... ...

cn FN1 FN2 FN3 ... T Pn Eˆn

Tot. E1 E2 E3 ... En E

(b)

Fig. 1. Contingency tables for a binary model (a) and a multi-class model (b)

Using the notation explained in Fig. 1, we introduce the following definitions. Definition 1 (Recall). The recall of a given class ci , denoted Recalli or Recalli+ , is the proportion of examples of class ci that is correctly classified by a model (Recalli = T Pi /Ei ). The negative recall of class ci , denoted Recalli− , is the proportion of examples of class ci incorrectly classified (Recalli− = 1 − T Pi /Ei ). In case of two classes, positive and negative, we denote the recall of the positive class as Recall + = T P/E + and of the negative class as Recall − = T N/E − . Definition 2 (Accuracy). Given two classes c+ and c− , the binary accuracy of a model is defined as Accuracybin =

TP+TN E+ E− = Recall + + Recall − E E E

That is, binary accuracy is a weighted average of the positive and negative recall, weighted by the class prior. This extends to multiple classes: n

n n T Pi Ei T Pi Ei =∑ = ∑ Recalli+ E E E i i=1 i=1 i=1 E

Accuracy = ∑

For this reason we sometimes refer to accuracy as (weighted) average positive recall. Definition 3 (Multi-Model Accuracy). Given n classes and n one-vs-rest models, one for each class, the multi-model accuracy is defined as the average binary accuracy of the n models: E− 1 n E+ Accuracymm = ∑ ( i Recalli+ + i Recalli− ) n i=1 E E The following simple result is worth noting.

8

T. Abudawood and P.A. Flach

Lemma 1. The accuracy of a single multi-class model is not equivalent to the multimodel accuracy of the one-vs-rest models derived from the multi-class model. Proof. E− 1 n Ei+ ( Recalli+ + i Recalli− ) ∑ n i=1 E E

(1)

=

1 n Ei+ 1 n Ei− + Recall + ∑ E ∑ E Recalli− i n i=1 n i=1

(2)

=

1 1 n E− Accuracy + ∑ i Recalli− n n i=1 E

(3)

Accuracymm =

In going from (2) to (3) we rely on the fact that the one-vs-rest models are derived from a single multi-class model. If this isn’t the case (as in Aleph, for instance), then weighted average positive recall is not the same as accuracy, which compounds the issue. It can be seen from Lemma 1 that the two accuracies are different. Accuracy of a multiclass model relies on the positive recalls weighted by the class priors. On the other hand, the average accuracy of multiple binary models relies on the recalls of both classes where the importance of the positive recalls is decreased n times, hence, there is an increase of the importance of classifying a negative example n times. The following example demonstrates why multi-model accuracy is misleading. Example 1 (A random classifier). Let us consider a 3-class problem comprising 108 examples uniformly distributed among the classes. A random 3-class classifier would result in the uniform contingency table shown in Fig. 2(a). On the other hand, if a random binary classifier is applied to the three one-vs-rest binary problems we obtain the three contingency tables in Figs. 2(b)-2(d). The accuracy of the multi-class model is 0.33, while the multi-model accuracy of the binary models is 0.50. Pred. c1 c2 c3 c1 12 12 12 Act. c2 12 12 12 c3 12 12 12 Tot. 36 36 36

(a)

Tot. 36 36 36 108

Pred. c1 c2,3 c1 18 18 Act. c2,3 36 36 Tot. 54 54

(b)

Tot. 36 72 108

Pred. c2 c1,3 c2 18 18 Act. c1,3 36 36 Tot. 54 54

(c)

Tot. 36 72 108

Pred. c3 c1,2 c3 18 18 Act. c1,2 36 36 Tot. 54 54

Tot. 36 72 108

(d)

Fig. 2. Four contingency tables on a three-class problem showing the predictions of a random multi-class classifier (a) and three random one-vs-rest classifiers (b)-(d)

It is clear that the average accuracy of the binary models is 1.5 times more than the accuracy of the multi-class model because the weight of the negative class is twice the weight of the positive class. When having a proper multi-class model, there are only credits for classifying examples correctly. Averaging the positive and negative recalls for multiple one-vs-one theories could be misleading but it is even more harmful when it comes to one-vs-rest theories as the problem is propagated.

Learning Multi-class Theories in ILP

9

Another problem arising when inducing multiple independent binary theories is the lack of integrity between the predictions of the different binary theories. This may cause an example to have different possible predictions in several contingency tables because each model produces predictions independently of the others. The predictions of the models on each example should be consistent. For instance, by considering n one-vsrest models where each model is trained to predict one class as positive, then the prediction for an example x on the i-th model should be be consistent with its prediction on the j-th model, cˆi (x) = +ve and cˆj (x) = −ve ∀ j = i, where cˆj (x) and cˆj (x) express the prediction of the i-th and the jth binary model respectively for example x. If the predictions are inconsistent then such conflicts need to be solved to ensure the consistency in the predictions for each example in all models. All one-vs-rest models of support vector machines and naive Bayes [5] resolve these collisions by obtaining n scores from each one of the n models and the model with the maximum score wins the prediction [4]. A rule learner such as CN2 [6] learns ordered rule lists in one of its settings to avoid such conflicts. In pairwise techniques voting methods [7, 8, 9, 10] can be considered to integrate the predictions. The discussion about unreliability and inconsistency holds generally when applying one-vs-rest technique in any learning system but we would like to emphasise the importance of this issue particularly in ILP binary rule learning systems such as Aleph. This is because we only induce rules for the positive class in each one-vs-rest model while a default rule that always predicts the negative class is added in case an example can not be classified by any induced rule. The default rules give credits for not classifying negative examples which makes it easy to obtain high negative recalls without inducing any rules for the negatives. For instance, one could obtain 0.67 multi-model accuracy with three empty theories1 on the problem of Example 1. Hence, there is a need to integrate the different binary models of such rule learning systems in order to ensure the reliability and consistency of their predictions.

3 Improved Learning of Multi-class Theories In this section we investigate how one could improve the reliability of the all one-vsrest theories in ILP by combining their binary models into a single rule listor rule set model. Our approach is different from the other first-order rule learning approaches in various respects. First, it does not treat the n various models as independent black-box models, but instead combines the rules of all the models into a single model. Secondly, there is only one default rule and the class of the default rule is determined probabilistically according to the distribution of the uncovered training examples of all the classes. Finally, a single prediction is obtained for each example in one multi-class contingency table. Despite the simplicity of our approaches, their predictions are reliable, consistent and accurate, as we will show in our experiments. In any rule list model, the rules are ordered in the final theory according to a certain criterion. When an unseen example is encountered, the rules are tried one by one in the order of the list and the first rule that fires determines the class of the example. So the 1

An empty theory is a theory where a binary rule learner fails to induce any rule for the positive examples.

10

T. Abudawood and P.A. Flach

key idea is how to order these rules. One needs to evaluate the rules induced by the n models and assign them scores. We adopt Chi2 as our multi-class evaluation measure for the rules and used it to build a Multi-class Rule List (MRL) model. Definition 4 (Chi-Squared [11]). The Chi-squared score of a rule r j of the i-th class is i] defined as Chi2 (r j ) = ∑ni=1 [eeEi E−eE where e is the number of examples covered by r j , i (E−e) ei the number of examples correctly classified by r j , Ei is the total number of examples of the i-th class, and E is the total number of examples. 2

MRL In this method, after learning rules for all classes, the rules are re-ordered on decreasing Chi2 . The ties are broken randomly. If a rule is added to the rule list, then all examples it covers are removed from the training set and the rest of the rules are re-evaluated based on the remaining examples until no further rule is left. At the end, a single default rule is assigned predicting the majority class of the uncovered examples. In a rule set model, the rules are unordered and the class of a new example is determined based on the training statistics of all rules that fire for that particular example. For instance, the CN2 rule learner [6] learns a rule set model and tags the rules with their coverage over all the classes. If a new example is to be classified, CN2 sums up the coverage of all rules that fire over each class and the class with the highest coverage wins. We propose two methods to handle multi-class rule set theories, the Multi-class Rule Set Intersection (MRSI) method and the Multi-class Rule Set Union (MRSU) method. The descriptions of the two methods are discussed below. MRSI In MRSI every rule from the multiple one-vs-rest models is evaluated over the entire training set once, and the identifiers of the examples they cover are stored. A default rule is formed based on the majority class of the uncovered training examples. If a new example is to be classified, all the rules are tried. For those rules that fire, we determine the intersection of their training set coverage using the example identifiers, and their class distribution gives us the empirical probability of each class. The class with the maximum probability is predicted for the example. Again the ties are broken randomly. In the case of an empty intersection, the majority class is assigned to the example. MRSU The MRSU method differs from the MRSI method in that it determines the class of a new example based on the union of the training coverage of all rules that cover the new example, instead of the intersection. The MRSU method is closer in spirit to the CN2 method, which adds up the coverage of all rules that fire. However, by using example identifiers we avoid double-counting of examples that are covered by several rules, which means that we obtain proper empirical probabilities rather than CN2’s estimates.

4 Empirical Evaluation In this section we evaluate and compare our proposed single multi-class theory learning methods (MRL, MRSU and MRSI) over 6 multi-class data sets and 5 binary data sets

Learning Multi-class Theories in ILP

11

Table 1. Data sets used in the experiments. The group to the left are multi-class data sets while the group to the right are binary data sets. Starred data sets are propositional; the rest is relational. Data set no. 1 2 3 4 5 6

Name Car* Diterpene Ecoli* English Protein Scale*

Class dist. 1210, 384, 69, 65 447, 355, 352, 155, 71 143, 77, 52 50, 50, 50 116, 115, 77, 73 288, 288, 49

Data set no. 7 8 9 10 11

Class. dist Mutagenesis Amine (Alzheimer) Choline (Alzheimer) Scopolamine (Alzheimer) Toxic (Alzheimer)

125, 63 1026, 343 1026, 343 1026, 343 1026, 343

(Table 1). We use Aleph as our base-learner, learning rules for each class in turn. We then turn the rules learned by Aleph into coherent multi-class models using the techniques proposed in this paper. We compare against the CN2 rule set method described above. For each data set, cross-validated accuracies (Table 2) and AUCs (Table 3) were recorded. MRL method does not produce class probabilities and hence produces a single point in a ROC plot: in this case, AUC boils down to the (unweighted) average of true positive and true negative rates. MRSU, MRSI and CN2 produce class probabilities and hence AUC evaluates their ranking performance in the usual way. A multi-class AUC is obtained by averaging each one-vs-rest AUC weighted by the class prior. Since averaging performance across data sets has limited meaning as the values may not be commensurate, we report the ranks (1 is best, 4 is worst) of the accuracies and AUCs on each data set. We use the Friedman significance test on these ranks at p = 0.05 with Bonferroni-Dunn post-hoc test on our three proposed methods. In the Friedman test we record wins and losses in the form of ranks and ignore the magnitude of these wins and losses. The use of the Friedman test to evaluate multiple classifiers on multiple data sets is considered to be more appropriate than the conventional tests, see [12] for further details. By looking at the average performance rank, and calculating the posthoc test and Critical Difference (CD = 1.78/2) with CN2 as control, on the multi-class data sets, MRSI is significantly better than CN2 on both accuracy and AUC, while MRSU performs significantly worse on AUC. If we take a look at the binary data sets (CD = 1.95/2) we can see that both MRL and MRSI are significantly superior over CN2 w.r.t. AUC while no statistical significance is reported regarding their accuracies. The conclusion seems warranted that MRSI is preferable for multi-class data sets, while MRL is preferable for binary data sets.

5 Related Work As discussed earlier, many ILP rule learning systems including Aleph, PROGOL and FOIL can only induce binary theories and multi-class theories are obtained by converting a multi-class problem into several binary problems. The rules of the final model are, in practice, a combination of independent multiple binary theories. Inductive Logic Constraint (ICL) [13] upgraded the propositional CN2 to handle multi-class first-order theories. Our CN2 implementation is similar to ICL (learning from and handling multiclass structural domains) but was built over Aleph. The experiments demonstrate that we can improve over the CN2 probability estimation method.

12

T. Abudawood and P.A. Flach

Table 2. Accuracies of our new multi-class methods (MRL, MRSU and MRSI) compared against CN2 accuracy, with average ranks in brackets. The 6th column shows the multi-model accuracy as reported by Aleph, which is particularly optimistic for multi-class problems due to overemphasising the default rules. The right-most column shows the average positive recall, which ignores the default rules but is still not equal to multi-class accuracy as conflicting predictions are not taken into account. MRL 1 2 3 4 5 6 Average 7 8 9 10 11 Average

81.43 (2.00) 83.70 (2.00) 90.43 (1.00) 60.67 (3.00) 80.48 (3.00) 80.64 (2.00) 79.56 (2.17) 77.06 (2.00) 60.18 (4.00) 78.24 (1.00) 76.56 (2.00) 74.95 (3.00) 73.40 (2.40)

MRSU MRSI Multi-class accuracy 81.32 (4.00) 83.98 (1.00) 83.55 (3.50) 84.86 (1.00) 86.77 (4.00) 89.75 (2.00) 58.00 (4.00) 64.00 (1.00) 80.69 (2.00) 79.70 (4.00) 72.51 (4.00) 83.68 (1.00) 77.14 (3.58) 80.99 (1.67) 77.06 (2.00) 76.55 (4.00) 60.91 (3.00) 65.38 (1.00) 76.07 (3.00) 77.14 (2.00) 76.56 (2.00) 76.48 (4.00) 75.02 (2.00) 74.59 (4.00) 73.12 (2.40) 74.03 (3.00)

CN2 81.38 (3.00) 83.55 (3.50) 88.92 (3.00) 62.67 (2.00) 80.94 (1.00) 76.20 (3.00) 78.94 (2.58) 77.06 (2.00) 60.98 (2.00) 75.55 (4.00) 76.56 (2.00) 75.09 (1.00) 73.05 (2.20)

Aleph Standard Multi-model accuracy Average recall 86.90 82.18 91.52 82.91 90.27 86.46 72.44 48.00 89.91 70.82 79.04 71.20 85.01 73.59 73.97 73.97 77.06 77.06 60.11 60.18 76.56 76.56 74.80 74.80 72.50 72.51

Table 3. Average one-vs-rest AUCs of our multi-class methods (MRL, MRSU and MRSI) compared against CN2, with average ranks in brackets. The AUCs reported for Aleph are for reference only, as these arise from over-emphasising the default rules. 1 2 3 4 5 6 Average 7 8 9 10 11 Average

MRL 83.03 (1.00) 88.72 (4.00) 91.97 (3.00) 70.50 (4.00) 87.28 (2.00) 82.05 (1.00) 83.92 (2.50) 64.03 (1.00) 60.77 (1.00) 74.48 (1.00) 55.07 (1.00) 65.46 (1.00) 63.96 (1.00)

MRSU 75.21 (3.00) 89.65 (1.00) 92.63 (2.00) 72.67 (2.00) 86.62 (4.00) 74.03 (3.00) 81.80 (2.50) 57.19 (4.00) 51.70 (3.00) 63.91 (3.00) 52.70 (3.50) 56.15 (3.00) 56.33 (3.30)

MRSI 73.92 (4.00) 88.90 (3.00) 93.38 (1.00) 74.15 (1.00) 89.03 (1.00) 81.41 (2.00) 83.46 (2.00) 57.28 (2.00) 57.10 (2.00) 72.38 (2.00) 52.70 (2.00) 57.06 (2.00) 59.30 (2.00)

CN2 Aleph Standard 75.39 (2.00) 82.80 89.58 (2.00) 88.66 91.43 (4.00) 86.78 72.60 (3.00) 66.33 86.63 (3.00) 83.29 73.27 (4.00) 76.38 81.48 (3.00) 80.71 57.19 (3.00) 63.93 51.39 (4.00) 64.03 60.93 (4.00) 60.90 52.70 (3.50) 55.07 55.53 (4.00) 64.71 55.55 (3.70) 61.73

While most of the ILP systems implement the covering approach (separate-andconquer), TILDE [14] implements a divide-and-conquer approach and induces a single first-order logic multi-class theory that take a form of decision tree. Tree models handle multiple classes naturally. We plan an experimental comparison with TILDE in future work. Several papers suggested different approaches of dealing with multiple binary models [4, 15, 7, 8, 9, 10, 5]. A comparison of many such approaches were made in [4] suggesting a superiority of the one-vs-rest approach in general but they also pointed out that the choice of the binarisation technique makes little difference once we learn good binary models.

6 Concluding Remarks In this paper we investigated the lack of reliability and consistency of the one-vs-rest technique on multi-class domains. We showed that we could learn a simple and single

Learning Multi-class Theories in ILP

13

multi-class rule list (MRLmethod) or rule set (MRSU and MRSI methods) model by combining the rules of all one-vs-rest models and turn them into a coherent multi-class classifier. Our proposed methods generate consistent and reliable multi-class predictions and we experimentally showed that they produce significant results, w.r.t. accuracy and AUC, on both multi-class and binary domains when compared against the CN2 method. When classification is made based on rule intersection, MRSI, the best accuracies and AUCs were achieved taking the multi-class data sets into account. Multi-class rule list, MRL, method seem to be suitable for two-class problems. The origin of this difference is subject of ongoing investigations.

References 1. Quinlan, J.R., Cameron-Jones, R.M.: FOIL: A Midterm Report. In: Proc. European Conf. on Machine Learning, pp. 3–20. Springer, Heidelberg (1993) 2. Muggleton, S.: Inverse Entailment and Progol. In: Proc. 6th International Workshop on Inductive Logic Programming, vol. 13, pp. 245–286. Springer, Heidelberg (1995) 3. Srinivasan, A.: The Aleph Manual. Technical report, University of Oxford (2001) 4. Rifkin, R., Klautau, A.: In Defense of One-Vs-All Classification. Machine Learning Research 5, 101–141 (2004) 5. Zadrozny, B., Elkan, C.: Transforming Classifier Scores Into Accurate Multiclass Probability Estimates. In: Proc. 8th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 694–699. ACM, New York (2002) 6. Clark, P., Niblett, T.: The CN2 Induction Algorithm. Machine Learning 3, 261–283 (1989) 7. Friedman, J.H.: Another approach to polychotomous classification. Technical report, Stanford University, Department of Statistics (1996) 8. Platt, J.C., Cristianini, N.: Large Margin DAGs for Multiclass Classification. In: Advances in Neural Information Processing Systems, vol. 12. MIT Press, Cambridge (2000) 9. Kijsirikul, B., Ussivakul, N., Meknavin, S.: Adaptive Directed Acyclic Graphs for Multiclass Classification. In: Ishizuka, M., Sattar, A. (eds.) PRICAI 2002. LNCS (LNAI), vol. 2417, pp. 158–168. Springer, Heidelberg (2002) 10. Dietterich, T.G., Bakiri, G.: Solving Multiclass Learning Problems via Error-Correcting Output Codes. Artificial Intelligence Research 2, 263–286 (1995) 11. Abudawood, T., Flach, P.: Evaluation Measures for Multi-class Subgroup Discovery. In: Buntine, W., Grobelnik, M., Mladeni´c, D., Shawe-Taylor, J. (eds.) ECML PKDD 2009. LNCS, vol. 5781, pp. 35–50. Springer, Heidelberg (2009) 12. Demˇsar, J.: Statistical Comparisons of Classifiers Over Multiple Data Sets. Machine Learning Research 7, 1–30 (2006) 13. De Raedt, L., Van Laer, W.: Inductive Constraint Logic. In: Zeugmann, T., Shinohara, T., Jantke, K.P. (eds.) ALT 1995. LNCS, vol. 997, pp. 80–94. Springer, Heidelberg (1995) 14. Blockeel, H., De Raedt, L.: Top-down Induction of Logical Decision Trees. Artificial Intelligence 101, 285–297 (1997) 15. Hsu, C.-W., Lin, C.-J.: A Comparison of Methods for Multiclass Support Vector Machines. Neural Networks 13, 415–425 (2002) 16. Fawcett, T.: An Introduction to ROC Analysis. Pattern Recognition Letters 27(8), 861–874 (2006)

A Numerical Refinement Operator Based on Multi-Instance Learning Erick Alphonse1 , Tobias Girschick2 , Fabian Buchwald2 , and Stefan Kramer2 1

Laboratoire d’Informatique de l’universit´e Paris-Nord, 99, Av. Jean-Baptiste Cl´ement, 93430 Villetaneuse, France 2 Technische Universit¨ at M¨ unchen, Institut f¨ ur Informatik I12, Boltzmannstr. 3, 85748 Garching b. M¨ unchen, Germany

Abstract. We present a numerical reﬁnement operator based on multiinstance learning. In the approach, the task of handling numerical variables in a clause is delegated to statistical multi-instance learning schemes. To each clause, there is an associated multi-instance classiﬁcation model with the numerical variables of the clause as input. Clauses are built in a greedy manner, where each reﬁnement adds new numerical variables which are used additionally to the numerical variables already known to the multi-instance model. In our experiments, we tested this approach with multi-instance learners available in the Weka workbench (like MISVMs). These clauses are used in a boosting approach that can take advantage of the margin information, going beyond standard covering procedures or the discrete boosting of rules, like in SLIPPER. The approach is evaluated on the problem of hexose binding site prediction, a pharmacological application and mutagenicity prediction. In two of the three applications, the task is to ﬁnd conﬁgurations of points with certain properties in 3D space that characterize either a binding site or drug activity: the logical part of the clause constitutes the points with their properties, whereas the multi-instance model constrains the distances among the points. In summary, the new numerical reﬁnement operator is interesting both theoretically as a new synthesis of logical and statistical learning and practically as a new method for characterizing binding sites and pharmacophores in biochemical applications.

1

Introduction and Background

It has often been acknowledged that numerical learning in ILP is limited because of the choice of logic programming as representation language [1,2]. Function symbols are not interpreted in logic programming, they simply are seen as functors of Herbrand terms. For instance, the + function symbol being not interpreted, both terms of the following equation cannot be uniﬁed and the equation X +Y = 0 cannot be solved. To solve this problem, the hypothesis representation language has been extended by a Constraint Programming Language (CLP) [3]. A large number of CLP languages have been proposed, some with complete and eﬃcient solvers. In ILP, the interpreted predicate symbols are often the same as P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 14–21, 2011. c Springer-Verlag Berlin Heidelberg 2011

A Numerical Reﬁnement Operator Based on Multi-Instance Learning

15

the ones used in attribute-value learning, like =, ≤, ≥, ∈, but also linear, nonlinear, arithmetic or trigonometric functions have been used [4]. The large family of systems able to learn constraints are all based on the technique introduced in the classical INDUCE system [5] and later popularised and developed in the system REMO [6] and other systems [7,3,1,4,2,8]. This technique separates learning the logical part of the hypothesis from learning its constraint part (usually nominal and numerical constraint variables). If we refer to the covering test deﬁnition, for the positive examples, at least one of the possible matching substitutions between the logical part of the hypothesis and the logical part of the positive example must satisfy the constraint part. Conversely, for the negative examples, for all possible substitutions, none must satisfy the constraint part. The key idea is to ﬁrst compute the set of substitutions matching the hypothesis’ logical part with the learning examples, and then from the induced tabular representation, where constraint variables are attributes, learn the constraint part of the hypothesis. Zucker and Ganascia note that such a tabular representation is a multi-instance representation in the general case (the constraints are satisﬁed by at least one matching substitution to a positive example, and none to a negative example), and that multi-instance learners have to be used to learn the hypothesis’ constraint part. The diﬀerent approaches can be compared with respect to the way they deﬁne the hypothesis’ logical part and when they delegate learning to an attribute-value or a multi-instance learner. INDUCE completely separates the two processes and ﬁrst searches for a good logical part (following an lgg-based approach), which is then specialized by constraints. A subsequent approach [6] sets the single logical part beforehand, either user-speciﬁed or built from the examples. Model selection can then be used to reﬁne increasingly complex hypotheses. Anthony and Frisch [1] limit the constraint part, only allowing a constraint variable to appear in the clause’s head, such that they only deal with a single matching substitution, limiting the interest of delegating numerical learning to attribute-value learners. Other systems [7,4] do not limit the logical part, but also do not use the link between θ-subsumption and multi-instance problems and thus treat all matchings to a positive clausal example as a positive attribute-value example. Recently, Srinivasan et al. [8] independently proposed the same approach as Zucker et al. [6], where the logical part is restricted to one user-deﬁned clause. Finally, an interesting approach, although not too closely related, is MIR-SAYU [9], which learns drug activity from a multi-instance representation of the drugs. The multi-instance representation does not arise from multiple matchings like in INDUCE, but from the multiple conformations that a drug can take in 3D-space: The authors use a rule-based propositionalisation approach to solve the learning problem and obtain a multiinstance representation by applying it to each conformation. In this paper, we present an approach that does not limit the logical part of a hypothesis: we search in the hypothesis space for a good logical part which, when introducing constraint variables (presently limited to numerical ones), delegates constraint learning to a multi-instance learner. This is diﬀerent from the classical INDUCE system and more recent approaches, given that intertwining logical

16

E. Alphonse et al.

and constraint learning should be able to improve search. This also introduces some interesting properties that can be leveraged by a boosting approach (to be explained below). In the following, we present the technical details of the approach.

2

Method

Before we can describe the method in detail, we have to introduce some notation. Let S = {(x1 , y1 ), . . . , (xn , yn )} denote a training set of classiﬁed examples. Each example is described by a set of tuples from several relations over nominal and continuous variables, denoted by xi , and assigned to a class yi . We restrict ourselves to binary classiﬁcation problems in this paper (yi ∈ {+1, −1}). The size of the training set is denoted by |S| = n. We follow standard multi-instance terminology and make a distinction between examples and instances: an example is deﬁned as a bag of instances (to be deﬁned later). As we follow a boosting approach for the outer loop of the algorithm (see below), we have a weight wi associated with each example, which is initialized to n1 . In the following we will deal with negation-free program clauses. Given a set of clauses, we let t denote the index of the t-th clause Ct . Clauses are learned one after the other, using a generalisation of boosting to real-valued weak hypotheses [10]. The weak learner builds a clause Ct as a hypothesis, where t denotes both the index of the clause and the index of the boosting iteration. The boosting procedure constitutes the outer loop of the algorithm (for details we have to refer to the original publication [10]), whereas the construction of clauses constitutes the inner loop. Due to the size of the search space, clauses are built in a greedy manner, with one reﬁnement after the other. A reﬁnement consists of the addition of one or several literals to the body of a clause according to the modes of a language bias declaration. The reﬁnement operator providing all specializations of a clause is denoted by ρ(C). In the following, our starting point is a clause C, which is to be reﬁned in a subsequent step: C = class(X, Y ) : − p1 (X, X1,1 , . . . , X1,n1 ), ..., pk (X, Xk,1 , . . . , Xk,nk ). Upper-case characters X and Y denote, similar to the deﬁnition of the training set S above, the identiﬁer of a clausal example (X) and its class Y (either −1 or +1). Given such a clause, its constraint variables can be obtained by a function vars(C) = {X1,1 , . . . , X1,n1 , . . . , Xk,1 , . . . , Xk,nk }. Additionally, we have functions varsn (C) picking the nominal variables of a clause and varsc (C) picking the continuous variables (vars(C) = varsn (C) ∪ varsc (C)).

A Numerical Reﬁnement Operator Based on Multi-Instance Learning

17

For simplicity and without loss of generality, we assume that exactly one literal is added to clause C in the course of a reﬁnement C ∈ ρ(C): C = class(X, Y ) : − p1 (X, X1,1 , . . . , X1,n1 ), ..., pk (X, Xk,1 , . . . , Xk,nk ), pk+1 (X, Xk+1,1 , . . . , Xk+1,nk+1 ) We also make the assumption that at least one additional continuous variable is available after a reﬁnement. In other words, for each C ∈ ρ(C) we assume there exists an Xk+1,l ∈ varsc (C ). It is clear that due to multiplicities (1 : n and m : n relationships between the head variable X and the body variables) multi-instance problems over the body variables arise. As our goal is to improve the capability of ILP learning systems to handle continuous variables, we let the multi-instance problems range only over those variables of a clause. The structure of a clause and the remaining variables only serve to give us the deﬁnition of a multi-instance problem. To be more precise, we obtain a dataset for multi-instance learning from ﬁrst materializing the relation from the body (ranging over all variables vars(C)) and subsequently projecting it onto the variables {X} ∪ varsc (C). Proceeding in this way, the question is (a) how to guide the search for suitable clauses and (b) how to decide when to stop reﬁning a clause. For the former question, we decided to use the margin of the classiﬁer (in the sense of boosting). Consider the output of the clause together with the multiinstance classiﬁer is given by a function h(.), which tells us not only the class of the prediction (its sign), but also its conﬁdence. Then the mean margin of h(.) can be deﬁned as n

μ ¯h =

1 yi h(xi ) n i=1

(1)

As to decide when to stop reﬁning a clause, we need a criterion that acts as a regularisation parameter for the multi-instance learner. A natural choice is to limit the number of attributes in the datasets that are passed to it. It translates to limiting the number of constraint variables that can be introduced in the logical part, also regularising its complexity. For the outer loop generating one clause including a multi-instance classiﬁer after the other, we employ a generalization of AdaBoost to real-valued weak hypotheses [10]. For each example covered by a clause Ct , the function ht (.) (deﬁned in terms of the clause itself plus its multi-instance classiﬁer ft (.)) will provide a diﬀerent prediction. For the examples not covered by the clause, the weak hypothesis abstains on them and outputs a prediction of 0. In that sense, this is more general than SLIPPER’s rules [11], which either abstain or predict the positive class. The boosting algorithm will focus on those examples in the later stages, forcing the weak learner to search for good logical structures that can discriminate between them:

18

E. Alphonse et al.

h∗t = max |ht (xi )| μt =

1≤i≤n n

1 h∗t

wt,i yi ht (xi ) ∈ [−1, +1]

(2) (3)

i=1

1 − μt yi ht (xi )/h∗t ) 1 − μ2t 1 1 + μt αt = ∗ ln 2ht 1 − μt

wt+1,i ← wt,i × (

(4) (5)

Overall, the model that is learned is a sequence of clauses Ct along with associated multi-instance models ft . Both Ct and ft give ht , the weak classiﬁers that are boosted in the outer loop of the algorithm. Additionally, we have the weights originating from the boosting iterations: ((h1 , α1 ), . . . , (hT , αT )) = (((C1 , f1 ), α1 ), . . . , ((CT , fT ), αT )). In the following we call the described method NuRMI (Numerical Reﬁnement operator based on Multi-Instance learning).

3

Experiments

In this section we give an overview of the datasets we used in this study, describe the experimental setup for our method and the two tested baseline methods. Finally, we compare the results. 3.1

Datasets

First, we describe the datasets that we used in our experimental evaluation of the methods.1 Hexose Binding Site Dataset. This dataset was compiled by Nassif et al. [12]. It is composed of 80 protein-hexose binding sites (positive set/class) and an equal number of non-hexose binding sites and non-binding surface grooves (negative set/class) selected/extracted from Protein Data Bank [13]. For each molecule ◦we have the 3D coordinates of all atoms that have a distance of less than 10 A from the binding site center. Additionally, for each atom its charge, hydrogen bonding and hydrophobic properties are provided. Mutagenicity Dataset. We run our experiments on the (by now classical) regression-friendly mutagenicity dataset introduced by Srinivasan et al. [14]. It consists of 188 aromatic and heteroaromatic nitrocompounds with a discretized mutagenicity endpoint (positive or negative log mutagenicity). In our experiments, we use B2 background knowledge which focuses on numerical learning on the partial charges. 1

We would like to thank David Page for providing the ﬁrst and third dataset of our study.

A Numerical Reﬁnement Operator Based on Multi-Instance Learning

19

Dopamine Agonists Dataset. The dopamine agonists dataset is also provided by Davis et al. [15]. It is composed of 23 dopamine agonists with 5 to 50 conformations for each molecule. The discretized activity levels of the dopamine agonists represent the classes. Finally, we have 18 positively labeled instances and 5 negatives. Available features are hydrogen acceptors/donors, hydrophobes and basic nitrogen groups. 3.2

Experimental Setup

As a ﬁrst comparison, we chose the Aleph (http://www.comlab.ox.ac.uk/ oucl/research/areas/machlearn/Aleph/) system and the relational decision tree induction algorithm Tilde from the ACE Data Mining System (http://www. cs.kuleuven.ac.be/~dtai/ACE/). Both algorithms serve as a baseline for our newly developed algorithm NuRMI. It should be pointed out that neither Aleph nor Tilde was particularly optimized on those datasets. On the other hand, we also did not make any eﬀort to optimize the NuRMI parameters. Therefore, the compared systems should be considered to be at approximately the same level of optimization. The results for the dopamine dataset are obtained using leave-one-out crossvalidation, those for the hexose binding experiments and mutagenicity with tenfold cross-validation. For the Aleph results on dopamine, we used the parameter settings from Davis et al. [15]. The clause length is set to 100, the minimum accuracy of a clause is set to 80 %, and the minimum number of positives examples that a clause must cover is set to ﬁve. For results on the hexose binding problem, the parameter settings from the reference paper by Nassif et al. [12] were used. The maximal clause length is set to eight literals, with only one in the head. The coverage of maximal ﬁve negative training examples is accepted with the objective to cover with a rule as many positive examples as possible and to avoid covering negative examples. Aleph’s heuristic search is used to speed up the calculations. In Tilde, we used gain ratio as evaluation function for candidate tests. The remaining parameters are Tilde’s default parameters. 3.3

Experimental Results

To investigate the performance of our algorithm compared to the reference classiﬁers Aleph and Tilde, we tested them on the above datasets. The predictive accuracies estimated by cross-validation are given in Table 1. JRip, MiSVM and MiSMO are abbreviations of multi-instance learning algorithms implemented in the Weka workbench [16] that were plugged into NuRMI. The results show that on two of the three datasets NuRMI performs favorably. On the dopamine dataset, we observe that both Aleph and Tilde perform worse than a random-guessing classiﬁer. In contrast, NuRMI outperforms the baseline classiﬁers and apparently is the best choice on this dataset with a predictive accuracy of 82.61%. This suggests that the coverage measure used by Aleph and the gain ratio splitting criterion used by Tilde to choose tests ﬁnally

20

E. Alphonse et al.

Table 1. Comparison of NuRMI prediction accuracy (%) with Aleph and Tilde. The result of Progol (*) on the mutagenicity dataset is taken from Srinivasan et al. [14]. NuRMI results are given for one, three and ﬁve rounds of boosting. Program NuRMI JRip 1 NuRMI JRip 3 NuRMI JRip 5 NuRMI MiSVM NuRMI MiSVM NuRMI MiSVM NuRMI MiSMO NuRMI MiSMO NuRMI MiSMO Aleph Tilde Progol

1 3 5 1 3 5

dopamine 78.26 78.26 82.61 65.22 73.91 73.91 78.26 78.26 78.26 48.00 61.29 -

hexose mutagenicity 53.75 80.34 51.25 81.39 51.88 81.46 58.75 66.47 60.63 66.47 61.25 66.47 76.13 81.92 81.82 67.50 65.00 79.00 79.79*

do not result in rules which are able to generalize suﬃciently well on this dataset. On the mutagenicity dataset, only the JRip and MiSMO but not the MiSVM NuRMI approach are able to improve upon the 79.79% reported for Progol. On the hexose binding site data, all three classiﬁers are above the random guessing baseline of 50%. We observe that NuRMI, a combination of a coverage-based and a marginbased method, is the most accurate on two of the three datasets tested. However, this experimental comparison has to be extended to shed more light on the relative advantages and disadvantages and also on the trade-oﬀs involved.

4

Conclusion

We presented a novel approach to handling numerical reﬁnements based on multi-instance learning (NuRMI). It aims to combine the strengths of Inductive Logic Programming (interpretability) and statistical learning (predictive power). NuRMI generates clauses in a style typical for ILP systems, and evaluates them based on multi-instance classiﬁers constructed on the numerical variables of a clause. The conﬁdence of the predictions of multi-instance classiﬁers also guides search and thus drives the reﬁnement steps. In experiments, we have tested the usefulness of NuRMI for biochemical applications, in particular the characterization of binding sites and pharmacophores, and toxicity prediction (including numerical node labels in graph-like representations of molecules). Although the system still has a lot of unused ﬂexibility, e.g., in the choice of (multi-instance) base learners, our preliminary results already hint at the usefulness in the envisaged application domains.

A Numerical Reﬁnement Operator Based on Multi-Instance Learning

21

References 1. Anthony, S., Frisch, A.M.: Generating numerical literals during reﬁnement. In: Lavraˇc, N., Dˇzeroski, S. (eds.) ILP 1997. LNCS, vol. 1297, pp. 61–76. Springer, Heidelberg (1997) 2. Botta, M., Piola, R.: Reﬁning numerical constants in ﬁrst order logic theories. Machine Learning 38(1/2), 109–131 (2000) 3. Sebag, M., Rouveirol, C.: Constraint inductive logic programming. In: Advances In Inductive Logic Programming, pp. 277–294 (1996) 4. Srinivasan, A., Camacho, R.: Numerical reasoning with an ILP system capable of lazy evaluation and customised search. Journal of Logic Programming 40(2-3), 185–213 (1999) 5. Dietterich, T.G., Michalski, R.S.: A comparative review of selected methods for learning from examples. In: Michalski, R.S., Carbonell, J.G., Mitchell, T.M. (eds.) Machine Learning, an Artiﬁcial Intelligence Approach, vol. 1, pp. 41–81 (1983) 6. Zucker, J.-D., Ganascia, J.-G.: Selective reformulation of examples in concept learning. In: Proc. of ICML 1994, pp. 352–360 (1994) 7. Fensel, D., Zickwolﬀ, M., Wiese, M.: Are substitutions the better examples? Learning complete sets of clauses with Frog. In: Proc. of ILP 1995, pp. 453–474 (1995) 8. Srinivasan, A., Page, D., Camacho, R., King, R.D.: Quantitative pharmacophore models with inductive logic programming. Machine Learning 64(1-3), 65–90 (2006) 9. Davis, J., Costa, V.S., Ray, S., Page, D.: An integrated approach to feature invention and model construction for drug activity prediction. In: Proc. of ICML 2007 (2007) 10. Nock, R., Nielsen, F.: A real generalization of discrete adaboost. In: Brewka, G., Coradeschi, S., Perini, A., Traverso, P. (eds.) Proc. of ECAI 2006, vol. 141 (2006) 11. Cohen, W.W., Singer, Y.: A simple, fast, and eﬀective rule learner. In: Proc. of AAAI 1999, pp. 335–342 (1999) 12. Nassif, H., Hassan, A., Sawsan, K., Keirouz, W., Page, D.: An ILP Approach to Model and Classify Hexose Binding Sites. In: Proc. of ILP 2009, vol. 78 (2009) 13. Berman, H.M., Westbrook, J., Feng, Z., Gilliland, G., Bhat, T.N., Weissig, H., Shindyalov, I.N., Bourne, P.E.: The Protein Data Bank. Nucleic Acids Research 28, 235–242 (2000) 14. Srinivasan, A., Muggleton, S., King, R.D., Sternberg, M.J.E.: Mutagenesis: ILP experiments in a non-determinate biological domain. In: Proc. of ILP 1994, vol. 237, pp. 217–232 (1994) 15. Davis, J., Santos Costa, V., Ray, S., Page, D.: Tightly integrating relational learning and multiple-instance regression for real-valued drug activity prediction. In: Proc. of ICML 2007, vol. 287 (2007) 16. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: An update. SIGKDD Explorations 11 (2009)

Not Far Away from Home: A Relational Distance-Based Approach to Understanding Images of Houses Laura Antanas, Martijn van Otterlo, Jos´e Oramas M., Tinne Tuytelaars, and Luc De Raedt Katholieke Universiteit Leuven, Belgium

Abstract. Augmenting vision systems with high-level knowledge and reasoning can improve lower-level vision processes, by using richer and more structured information. In this paper we tackle the problem of delimiting conceptual elements of street views based on spatial relations between lower-level components, e.g. the element ‘house’ is composed of windows and a door in a spatial arrangement. We use structured data: each concept can be seen as a graph representing spatial relations between components, e.g. in terms of right, up, close. We employ a distance-based approach between logical interpretations to match parts of images with known examples and provide an experimental evaluation on real images.

1 Introduction In the context of image interpretation, the field of computer vision has developed many techniques over the past decades for segmenting, classifying and recognizing objects and scenes. Many of these techniques use a plethora of low-to medium-level and local features such as lines, blobs, regions, interest points, and many more [1, 2], which are mostly employed in feature-based, probabilistic classifiers [3–6]. However, many visual scenes can best be described in terms of hierarchical structures, expressing the natural composition of scenes into objects, parts of objects and lower-level substructures [7, 8]. For example, a typical house consists of windows, one or more doors, possibly a chimney; all displayed in a particular configuration. Following the hierarchical aspect, the chimney itself is composed of a specific arrangement of local features (e.g. “brick”-like patterns). As a result, we advocate the use of high-level representations such as graphs, and more generally using logical languages [9]. The use of such formalisms in vision can improve feature-based approaches. Although high-level representations have been considered before, the actual computational use of these languages for representation, inference and learning has been less studied in computer vision (but see [10, 11]). In this paper, we investigate how logical generalization techniques can help to recognize and delineate substructures in an image. In order to do so, we propose a distancebased technique for image interpretation. In a more general framework, our aim is to employ a hierarchical representation of images where each image consists of several layers of information. The base layer is a set of features generated by a vision system, e.g. local patterns. A subsequent layer consists of objects, e.g. windows and doors, and a higher level consists of configurations of objects, e.g. houses. In this paper we focus on the delineation of meaningful substructures at one particular layer – the house level. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 22–29, 2011. c Springer-Verlag Berlin Heidelberg 2011

Not Far Away from Home

23

Fig. 1. (a) Annotated/labeled image (Eindhoven). (b) Annotated image (Eindhoven).

We represent a house as a set of objects and a set of spatial relations defined on them (hence; a relational attribute graph). Each house is annotated with the locations and shapes of windows and doors, such that each image structure is spatially embedded in a 2D plane, and objects are related to each other with respect to this space. Related to our work, several papers have explored structured models for building facades [12, 13], but as far as we know, none of these models is based on distances between logical structures. In [14] a distance measure is employed for images of documents, and similar problems were tackled using inductive rule learning [15]. However, our approach builds on recent general results on distance metrics for structured data [17] to show how easily they can be used for computer vision tasks. In addition, we focus on a new problem; that of delineating houses in street view images. This can be very useful to enhance G OOGLE Street View images, or for home delivery robots to better localize the destination.

2 Setting For our problem setting we work with street view images of houses. In the Netherlands many streets exist along which houses are built in one block so as to minimize heat loss and to keep a uniform architecture (Fig. 1). They exhibit some variation in doors and windows appearance (e.g. windows having different frame colors), however often there is considerable consistency in the way these elements are structured at the house level. A surprisingly limited number of configurations define the concept house. The precise location, shape or size of a composing elements may vary, but the overall configuration remains intact. For example, the door is always on the left or right side of the house and a window is always above a door. In this work we identify such structures from real images. Utilizing this, we solve the delineation problem, where the goal is to distinguish individual houses in images that depict rows of adjacent houses, i.e. of repeated structures. We can use the same setup for other knowledge levels (e.g. from lower-level features to the concept window), but in this paper we stop at the level of houses. Detecting house structures from images assumes access to manually labeled examples of houses. Each house is annotated with the bounding boxes and the labels of its composing elements in the image, i.e windows and doors (Fig. 1(a)). This captures the inherent structure of the concept of a house. The configuration is extracted from these features by defining 2D spatial relations such as right, above, left, below, close and touch on the labeled bounding boxes. In this way, any structure can be expressed in terms of bounding boxes, their labels and spatial relations between them.

24

L. Antanas et al.

In order to map images to logical representations, we introduce some terminology. A logical atom is an expression of the form p(t1 , . . . , tn ) where p/n is a predicate symbol and ti are terms. We assume a functor-free language, hence terms are built from constants and variables. Constants are denoted in lower case and variables in upper case. Ground atoms do not contain variables and will be called facts. A Herbrand interpretation i assigns to each fact in the language a truth-value. We identify i with the set of facts {a1 , . . . , aN } to which it assigns true. A substitution θ = {X1 /t1 , . . . , Xn /tn } is an assignment of terms t1 , . . . , tn to variables X1 , . . . , Xn . Given i1 and i2 interpretations, i1 θ-subsumes i2 iff there is a substitution θ such that i1 ⊆ i2 . Now we can describe an image Z as follows. First, we obtain a set of objects {o1 , o2 , . . . , on }, by assigning to each bounding box1 a constant oi . We derive a ground atom for each object j in the form part(oj , label), forming the set O(Z). Second, we use definitions of spatial relations between bounding boxes in our background knowledge (BK) to derive a set of spatial relations that hold among the objects in O(Z). The resulting set is denoted R(Z). An example of such an atom derived from the spatial relation close right is cRight(oj , ok , distance value), which says that object oj is close2 , on the right of object ok . The term distance value should be within a threshold for the relation to be true. Similarly, cAbove and tRight define close above and touch right, respectively. The BK can easily be extended, and enables to construct a logical representation of visual data: Definition 1. A visual interpretation V of an image Z is the union of a set of object atoms O(Z) and the set of spatial relation atoms R(Z). A visual interpretation can be seen as a graph; object atoms are attributed vertices and relation atoms are directed (attributed) edges between the vertices. New relations can be used to extend each visual interpretation, by defining them in the BK or adding new attributes to the existing ones. The key point about visual interpretations is that they are fully determined by the set of objects and the background knowledge. This implies that for one image, we can construct multiple visual interpretations by considering different subsets of the objects in the image, i.e. considering different subgraphs in the image. These graphs – in the context of our application in vision – will typically be connected. We can now use the visual interpretations as an instance space, and in effect, a concept represents a set of visual interpretations. For example, some visual interpretations will belong to the concept ’house’ whereas many others will not. For a particular image and its corresponding set of objects o, the different possible instances will be the visual interpretations of the subsets o ⊆ o. We denote ζ as the set of all labeled examples of a concept, called prototypes (Fig. 1(a)). Example 1. A visual interpretation of the image in Fig. 1(b) is: Iimg = {part(o1 , window), part(o2 , door), part(o3 , window), part(o4 , window), part(o5 , door), part(o6 , window), part(o7 , window), part(o8 , window), part(o9 , window), part(o10 , window), cRight(o2 , o1 , 60.0), tRight(o3 , o2 , 1.0), cRight(o4 , o3 , 10.0), cAbove(o9 , o3 , 68.0), cAbove(o10 , o1 , 73.0), cRight(o9 , o10 , 70.0), 1 2

Bounding box is a general term; in our experiments we employ polygon-like shapes. In practice we use approximate measures to correct for slight deviations stemming from noise.

Not Far Away from Home

25

... ...

cAbove,70 o4 o12 cRight,60

o2 cRight,61

tRight,1

o11

o13

cAbove,70 o15

o14

prototype

tRight,2

cRight,65

cRight,10 cAbove,70

o1

o6

o8

o3

o10

o5

tRight,3

cAbove,70

cRight,20

cAbove,72 cAbove,68 cRight,70

tRight,1

cAbove,70 cRight,65

cRight,60

...

cRight,70

o7

o9

image

Fig. 2. Graph representations of a prototype and an image interpretation cRight(o8 , o9 , 20.0), cRight(o8 , o4 , 70.0), cRight(o7 , o8 , 60.0), cAbove(o7 , o6 , 70.0), cRight(o6 , o5 , 65.0), tRight(o5 , o4 , 1, 0)}. The prototype house in Fig. 1(a) is: ζi = {part(o11 , window), part(o12 , door), part(o13 , window), part(o14 , window), part(o15 , door), cRight(o12 , o11 , 60.0), tRight(o13 , o12 , 1.0), cAbove(o14 , o13 , 68.0), cRight(o14 , o15 , 70.0), cAbove(o15 , o11 , 68.0)}.

Intuitively our goal is to look for known structures in a new image by trying to embed prototypes as well as possible in the image. In this direction we define the following: Definition 2. A matching between two interpretations i1 and i2 , m(i1 , i2 ), is a mapping such that each atom a1 ∈ i1 corresponds to at most one atom a2 ∈ i2 and vice versa. To each matching we associate a dissimilarity score d(i1 , i2 ), which indicates how different the two interpretations are. A possible matching between two interpretations (depicted as graphs) is shown in Fig. 2. The quality of the matchings is evaluated by the dissimilarity score. In the next section we will express this score in terms of a distance metric between interpretations. We formulate the delineation problem in the following, general, way: Definition 3. The delineation problem is defined as: given a set of prototypes ζ, a visual interpretation V of image Z, a dissimilarity score d, find the set of matchings between parts of V and any of the prototypes in ζ, such that all objects appearing in V are matched once, and the score d over the matchings is minimized. In effect, solving the delineation problem will carve up the visual interpretation of an image into a set of known structures, i.e. individual houses in this paper.

3 Approach We propose a possible scoring function d and show how to match prototypes in a new image Z. We combine structure matching and distances on interpretations. Our method consists of four steps. First, we define spatial BK, and the set of prototypes ζ. Second, we determine all candidate parts of V . Third, we compute distances between all our candidate structures and our prototypes. Fourth, we use the computed distances to find the best delineation. We will now explain the steps. Step 1 Generate visual interpretations. We first extract image features from Z and generate a set of objects that together with BK forms a visual interpretation V . In ad-

26

L. Antanas et al.

dition, we have a set of labeled prototypes ζ generated in the same manner. We try to find groups of elements which are spatially close and we choose our BK relations accordingly, with relations such as cRight (more details in the experimental section). Step 2 Generate matching candidates. Here we investigate parts of a visual interpretation that could be similar to a prototype. We only select sets of objects (and their corresponding relations) that are connected, resulting in the set M . Each element m of M is a possible candidate matching, and m must consist of at least two object atoms and a relation atom and at most all atoms in V . To be able to find the best delineation in case of noisy information, candidates with a small number of atoms are also needed. For example, if the image contains only a part of a (hypothetical) house, containing for example a door or window, they could be grouped with other elements or can be regarded as configurations on their own to best fit the image. Step 3 Compute distances. To compute the quality of a matching we use a distance metric between two visual interpretations. It evaluates how well the two interpretations match structurally. Although other solutions exist ([16]), here we employ a recent result of [17] which shows that one can construct a metric for any partially ordered hypothesis space L (such as a subsumption lattice) under some mild assumptions. That is, d is a metric if it is defined in terms of the generality order on the hypothesis space, |.| an (anti-monotonic) and strict order preserving size function and d(x, y) = |x| + |y| − 2| mgg(x, y)|, ∀x, y ∈ L. Here, mgg denotes the minimally general generalization of two hypotheses x and y. The result allows to derive distance metrics for different types of objects, including graphs, and therefore this result can be used to compute distances between interpretations. For example, one can choose a graph isomorphism as a partially ordered relation which induces a generality order on graphs, where the size function can be the number of vertices (see also [18]). Here the mgg corresponds to the maximal common subgraph. Computing the distance between graphs g1 and g2 is equivalent to calculating the distance between their corresponding visual interpretations using mgg(g1 , g2 ). Compared to the least general generalization (lgg), which is obtained under θsubsumption, the mgg represents computing the lgg under the assumption of object identity (OI) [19]. The lgg could also be used to find a common part between interpretations (resp. graphs) but it allows for different variables in the lgg to unify. This collapse of literals into one would violate the strictly ordering preserving condition for the size function. The mgg on the other hand is not unique (we can find multiple common parts) and is the result of exact structure matching, i.e. each constant in an interpretation (resp. each node in a graph) must be matched against a different constant (resp. node) in the other. Exact structure matching makes also more sense in our setting, since we want to find specific structures and do not want for example to collapse two windows into one. An illustration of mgg under OI-assumption is shown in Example 2. Example 2. Let i1 = {cRight(o1 , o2 , 2)} and i2 = {cRight(o3 , o4 , 2), cRight(o5 , o4 , 2)}. Under θ-subsumption mgg θ = {cRight(X1 , X2 , 2), cRight(X3 , X2 , 2)} with θ1 = {X1 /o1 , X2 /o2 , X3 /o1 }, θ2 = {X1 /o3 , X2 /o4 , X3 /o5 }. Under OI-subsumption there are two possible mggs: mgg0OI = {cRight(X1 , X2 , 2)} with θ10 = {X1 /o1 , X2 /o2 }, θ20 = {X1 /o3 , X2 /o4 } and mgg1OI = {cRight(X1 , X2 , 2)} with θ11 = {X1 /o1 , X2 /o2 }, θ21 = {X1 /o5 , X2 /o4 }.

Not Far Away from Home

27

Algorithm 1. Step 4 Delineate the image Require: prototypes ζ, distance function d, visual interpretation V and matchings M dij 1: compute Di = j |ζ| , ∀mi ∈ M 2: rank mi ∈ M according to Di , select the k-best, forming Mk = {(mi , Di )} 3: let S be all subsets of Mk such that ∀S ∈ S all object atoms in V appear exactly once in S 4: rank all full solutions S ∈ S according to ds = 5: return the n-best solutions Sn∗ = {S }

(mi ,Di )∈S

Di

Given the set mggall = {mgg(i1 , i2 )}, where i1 and i2 are interpretations we now define the distance between them in the sense of structural matching as: d(i1 , i2 ) =

min (|i1 | + |i2 | − 2|m|)

m∈mggall

(1)

where | . | is the number of atoms in the interpretation or in the mgg. In practice, we use a normalized metric d(i1 , i2 ) = min (1 − |m|/max(|i1 |, |i2 |)). Now we can m∈mggall

calculate dij = d(mi , ζj ) which is the distance between matching mi and prototype ζj . Step 4 Delineate the image. We use dij to find the best delineation (see Algorithm 1). Di is the average of the distances from the candidate matching mi to all the prototypes of a same concept3 . Hence, it deals with the situation when among prototypes there are noisy examples4. We select the first k pairs (mi , Di ) with the smallest distance, obtaining the set Mk . In a third step we perform a complete search among all subsets of Mk and select the subsets S satisfying certain constraints. In this work we enforce that the union of all object atoms in a subset S ∈ S is the set of object atoms in the image interpretation V and the union of all relation atoms in S is included or equal to the set of relation atoms in V . A possible variation is to allow more relaxed versions of delineations where only some parts of the image are matched, or where matchings can overlap. The constraints can then enforce that e.g. a tree cannot be part of a house. Finally, we select from S the set Sn∗ = {S }, where S is among the n solutions that best minimize the sum of distances ds . Once the delineation at the house level is obtained we can use this information at a next layer (e.g. streets).

4 Experimental Setup and Results For our experiments we use street view images from Eindhoven. In our dataset there are two possible configurations depending on the position of the door (on the right or left side of the house, see Fig. 1(a)). The image dataset was collected using G OOGLE Street View, and we used the M ATLAB toolbox for the L ABEL M E image database [20] to annotate our images. For each image we annotated the windows and the doors. For the training images we annotated also the houses (Fig. 1(a)). The data is represented in XML format and then translated into P ROLOG format. We use close to the right (cRight), close above (cAbove) and touch to the right (tRight) as spatial relations. Thresholds are used on the distance between house elements for 3 4

In our case the concept of house. This can happen when perfect examples are not available, but variations from prototypes are.

28

L. Antanas et al.

Fig. 3. No complete occlusions: (a) Correct delineation. (b) Delineation obtained.

Fig. 4. Image with 5 occluded elements: (a) Correct delineation. (b) Delineation obtained. Table 1. Delineation results. The accuracy increases as more top ranked solutions are considered. n first solutions Accuracy

1 0.73

2 0.76

3 0.83

4 0.9

5 0.93

6 0.93

7 0.93

8 0.93

9 0.93

10 0.96

close (10 ≤ θ ≤ θmax ) and touch (θ < 10). θmax is defined relatively to the size of the objects in the image. The amount k of best matchings is heuristically set to min(200 + 20% · |M |, 500). Choosing a k too small leads to finding no solution, while a high value can give a large search space, prevented by up-bounding k. However, the best solutions are likely to be found among the first ranked candidates. We use 2 noisefree house structures (Fig. 1(a)), one for each configuration, to delineate 30 new test images of houses with the same characteristics as the prototypes, but also different in appearance, size of house elements and distances between elements. Yet, they keep the same repeated structure of the houses as in the examples and also contain several occluded elements. We are able to delineate the houses for less occluded (Fig. 3) and for noisier images (Fig. 4). For all images we considered the first 1 ≤ n ≤ 10 solutions, based on the distance value ds . Table 1 shows the experimental evaluation in terms of accuracy, i.e. the percentage of images with a correct delineation. A delineation of an image is correct if all individual houses in that image are recognized.

5 Conclusions In this paper we have introduced a simple technique in which logic and distances between relational interpretations are used for the recognition of known structures in images. We have shown that our algorithm can identify substructures that form individual houses, effectively delineating a block of houses. Both the delineation problem, as well as the logical decomposition utilizing distances are relatively novel aspects of our approach. Future work includes incorporating attribute values in the distance function,

Not Far Away from Home

29

richer background knowledge bases, and more complex house structures. The most prominent direction is that of replicating our approach in a hierarchical fashion, thereby performing the interpretation process from low-level to high-level. Another, straightforward direction is to employ first-order kernels [21] as our distance function.

References 1. Forsyth, D.A., Ponce, J.: Computer Vision: A Modern Approach. Prentice-Hall, Englewood Cliffs (2003) 2. Tuytelaars, T., Mikolajczyk, K.: Local invariant feature detectors: A survey. Foundations and Trends in Computer Graphics and Vision 3(3), 177–280 (2007) 3. Li, L.-J., Socher, R., Fei-Fei, L.: Towards total scene understanding: Classification, annotation and segmentation in an automatic framework. In: IEEE Conference on Computer Vision and Pattern Recognition (2009) 4. Wang, G., Zhang, Y., Li, F.: Using dependent regions for object categorization in a generative framework. In: Proceedings of CVPR 2006, pp. 1597–1604 (2006) 5. Sudderth, E.B., Torralba, A., Freeman, W.T., Willsky, A.S.: Describing visual scenes using transformed objects and parts. Int. J. on Computer Vision 77(1-3), 291–330 (2008) 6. Bar-Hillel, A., Weinshall, D.: Efficient learning of relational object class models. IJCV 77(13), 175–198 (2008) 7. Witkin, A., Tenenbaum, J.: On the role of structure in vision. In: Beck, J., Hope, B., Rosenfeld, A. (eds.) Human and Machine Vision. Academic Press, New York (1983) 8. Pinz, A.J., Bischof, H., Kropatsch, W.G., Schweighofer, G., Haxhimusa, Y., Opelt, A., Ion, A.: Representations for cognitive vision: A review of appearance-based, spatio-temporal, and graph-based approaches. Elec. Let. on Comp. Vision and Im. Analysis 7(2) (2008) 9. De Raedt, L.: Logical and Relational Learning. Springer, Heidelberg (2008) 10. Needham, C.J., Santos, P.E., Magee, D.R., Devin, V.E., Hogg, D.C., Cohn, A.G.: Protocols from perceptual observations. AI 167(1-2), 103–136 (2005) 11. Tran, S.D., Davis, L.S.: Event modeling and recognition using markov logic networks. In: Forsyth, D., Torr, P., Zisserman, A. (eds.) ECCV 2008, Part II. LNCS, vol. 5303, pp. 610– 623. Springer, Heidelberg (2008) 12. Hartz, J., Neumann, B.: Learning a knowledge base of ontological concepts for high-level scene interpretation. In: ICMLA 2007, pp. 436–443 (2007) 13. M¨uller, P., Zeng, G., Wonka, P., Van Gool, L.J.: Image-based procedural modeling of facades. ACM Transactions on Graphics 26(3), 85 (2007) 14. Esposito, F., Malerba, D., Semeraro, G.: Classification in noisy environments using a distance measure between structural symbolic descriptions. IEEE TPAMI 14(3), 390–402 (1992) 15. Esposito, F., Ferilli, S., Basile, T.M.A., Mauro, N.D.: Discovering logical structures in digital documents. In: Intelligent Information Systems, pp. 513–521 (2004) 16. Ramon, J., Bruynooghe, M.: A framework for defining distances between first-order logic objects. In: Page, D.L. (ed.) ILP 1998. LNCS, vol. 1446, pp. 271–280. Springer, Heidelberg (1998) 17. De Raedt, L., Ramon, J.: Deriving distance metrics from generality relations. Pattern Recognition Letters 30(3), 187–191 (2009) 18. Bunke, H., Shearer, K.: A graph distance metric based on the maximal common subgraph. Pattern Recognition Letters 19(3-4), 255–259 (1998) 19. Khoshafian, S., Copeland, G.: Object identity. In: 1st ACM OOPSLA, pp. 406–416 (1986) 20. Russell, B.C., Torralba, A., Murphy, K.P., Freeman, W.T.: LabelMe: A database and webbased tool for image annotation. Int. J. of Computer Vision 77(1-3), 157–173 (2008) 21. G¨artner, T.: A survey of kernels for structured data. SIGKDD Explorations 5, 49–58 (2003)

Approximate Inference for Logic Programs with Annotated Disjunctions Stefano Bragaglia and Fabrizio Riguzzi DEIS – University of Bologna, ENDIF – University of Ferrara {stefano.bragaglia,fabrizio.riguzzi}@unibo.it

Abstract. Logic Programs with Annotated Disjunctions (LPADs) are a promising language for Probabilistic Inductive Logic Programming. In order to develop eﬃcient learning systems for LPADs, it is fundamental to have high-performing inference algorithms. The existing approaches take too long or fail for large problems. In this paper we adapt to LPAD the approaches for approximate inference that have been developed for ProbLog, namely k-best and Monte Carlo. k-Best ﬁnds a lower bound of the probability of a query by identifying the k most probable explanations while Monte Carlo estimates the probability by smartly sampling the space of programs. The two techniques have been implemented in the cplint suite and have been tested on real and artiﬁcial datasets representing graphs. The results show that both algorithms are able to solve larger problems often in less time than the exact algorithm. Keywords: Probabilistic Inductive Logic Programming, Logic Programs with Annotated Disjunctions, ProbLog.

1

Introduction

Statistical Relational Learning and Probabilistic Inductive Logic Programming provide successful techniques for learning from real world data. Such techniques usually require the execution of a high number of inferences in probabilistic logics, which are costly tasks. In order to reduce the computational load, we may resort to approximate inference that trades accuracy for speed. In this paper we present two approaches for computing the probability of queries from Logic Programs with Annotated Disjunctions (LPADs) [6] in an approximate way. LPADs are particularly interesting because of their sound semantics, of their intuitive syntax and because they allow to exploit many of the techniques developed in Logic Programming for probabilistic reasoning. We present two approaches inspired by those available for ProbLog [2]: k-best and Monte Carlo. The ﬁrst ﬁnds a lower bound for the probability of a query by considering only the k most probable explanations, while the latter estimates the probability of the query by the fraction of sampled possible worlds where the query is true. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 30–37, 2011. c Springer-Verlag Berlin Heidelberg 2011

Approximate Inference for Logic Programs with Annotated Disjunctions

2

31

Logic Programs with Annotated Disjunctions

A Logic Programs with Annotated Disjunctions T [6] consists of a ﬁnite set of disjunctive clauses of the form (H1 : α1 ) ∨ (H2 : α2 ) ∨ . . . ∨ (Hn : αn ) ← B1 , B2 , . . . Bm called annotated disjunctive clauses. The Hi , Bi and αi that appear in such a clause are respectively logical atoms, logical n literals and real n numbers in the interval [0, 1] such that i=1 αi ≤ 1. If i=1 αi < 1, the head of the annotated disjunctive clause implicitly contains an extra atom null n that does not appear in the body of any clause and whose annotation is 1 − i=1 αi . For an clause C of the form above, we deﬁne head(C) as {(H ni : αi )|1 ≤ i ≤ n} if i=1 αi = 1 and as {(Hi : αi )|1 ≤ i ≤ n} ∪ {(null : 1 − i=1 αi )} otherwise. Moreover, we deﬁne body(C) as {Bi |1 ≤ i ≤ m}, Hi (C) as Hi and αi (C) as αi . In order to deﬁne the semantics of an LPAD T , we need to consider its grounding ground(T ) that must be ﬁnite, so T must not contain function symbols if it contains variables. More speciﬁcally, an atomic choice is a triple (C, θ, i) where C ∈ T , θ is a substitution for the variables of C and i ∈ {1, . . . , |head(C)|} meaning that the head Hi (C)θ : αi (C) was chosen for the clause Cθ. A composite choice κ is a set of atomic choices that are ground (Cθ is ground) and consistent ((C, θ, i) ∈ κ, (C, θ, j) ∈ κ ⇒ i = j, meaning that only one head is selected for a ground clause) whose probability P (κ) is given by P (κ) = (C,θ,i)∈κ αi (C). A selection σ is a composite choice containing an atomic choice (C, θ, i) in σ for each clause Cθ in ground(T ) and identiﬁes a normal logic program wσ called a possible world (or simply world) of T and deﬁned as follows wσ = {(Hi (C)θ ← body(C))θ|(C, θ, i) ∈ σ}. WT denotes the set of all the possible worlds of T . Since selections are composite choices, we can assign a probability to possible worlds: P (wσ ) = P (σ) = (C,θ,i)∈σ αi (C). The probability of a closed formula φ according to an LPAD T is given by the sum of the probabilities of the possible worlds where the formula is true according to the WFS: P (φ) = σ∈WT ,wσ |=φ P (σ). It is easy to see that P satisﬁes the axioms of probability. In order to compute the probability of a query from a probabilistic logic program, [6] proposed to ﬁrst ﬁnd a covering set of explanations for the query and then compute the probability from the set by using Binary Decision Diagrams. An explanation is a composite choice κ such that the query is true in all the possible worlds consistent with κ. A set K of explanations is covering if each possible world where the query is true is consistent with at least one of the explanations in K. The cplint system1 [5] applied this approach to LPADs. cplint ﬁrst computes a covering set of explanations for a query by using a Prolog meta-interpreter that performs resolution and keeps a set of atomic choices that represents a partial explanation. Each time the meta-interpreter resolves the selected goal with a disjunctive clause, it adds a (possibly non-ground) atomic choice to the partial explanation and checks for its consistency. If the program is range-restricted, when the meta-interpreter reaches the empty goal, every atomic choice in the 1

http://www.ing.unife.it/software/cplint/

32

S. Bragaglia and F. Riguzzi

partial explanation becomes ground and an explanation is obtained. By enclosing the meta-interpreter in a findall call, a covering set K of explanations is found. Then cplint converts the following Disjunctive Normal Form K into (DNF) logical formula F = κ∈K (C,θ,i)∈κ (XCθ = i). The probability of the query is then given by the probability of F taking value 1. F is converted to a Decision Diagram that is traversed by using a dynamic programming algorithm to compute the probability. Speciﬁcally, cplint uses Binary Decision Diagram (BDD) because of the availability of highly eﬃcient packages for processing them. Since disjunctive clauses may contain any number of logical heads, multivalued variables are binary encoded by means of boolean variables to be used in BDDs.

3

Approximate Inference

In some domains, computing exactly the probability of a query may be impractical and it may be necessary to resort to some forms of approximations. [2,3] proposed various approaches for approximate inference. With iterative deepening, upper and lower bounds for the probability of the query are computed and their diﬀerence is gradually decreased by increasing the portion of the search tree that is explored. With the k-best algorithm, only the k most probable explanations are considered and a lower bound is found. With Monte Carlo, the possible worlds are sampled and the query is tested in the samples. An estimate of the probability of the query is given by the fraction of sampled worlds where the query succeeds. All three approaches have been adapted to LPADs and included in cplint. In the following we report only on the k-best and Monte Carlo, since iterative deepening was not giving clear advantages with respect to exact inference on the datasets tested. 3.1

k-best Algorithm

According to [3], using a ﬁxed number of proofs to approximate the probability is fundamental when many queries have to be evaluated because it allows to control the overall complexity. The k-best algorithm uses branch and bound to ﬁnd the k most probable explanations, where k is a user-deﬁned parameter. The algorithm records the k best explanations. Given a partial explanation, its probability (obtained by multiplying the probability of each atomic choice it contains) is an upper bound on the probability that a complete explanation extending it can achieve. Therefore, a partial explanation can be pruned if its probability falls below the probability of the k-th best explanation. Our implementation of the k-best algorithm interleaves tree expansion and pruning: a set of partial explanations are kept and are iteratively expanded for some steps. Those whose upper bound is worse than the k-th best explanation are pruned. Once the proof tree has been completely expanded, the k best explanations are translated into a BDD to compute a lower bound of the probability of the query. This solution uses a meta-interpreter while ProbLog uses a form of iterative deepening that builds derivations up to a certain probability threshold and then increases the

Approximate Inference for Logic Programs with Annotated Disjunctions

33

Algorithm 1. Function solve 1: function solve(Goal, Explan) 2: if Goal is empty then 3: return 1 4: else 5: Let Goal = [G|T ail] 6: if G =(\+ Atom) then 7: V alid :=solve([Atom], Explan) 8: if V alid = 0 then 9: return solve(T ail, Explan) 10: else 11: return 0 12: end if 13: else 14: Let L be the list of couples (GL, Step) where GL is obtained by resolving 15: Goal on G with a program clause C on head i with substitution θ 16: and Step = (C, θ, i) 17: return sample cycle(L, Explan) 18: end if 19: end if 20: end function

threshold if k explanations have not been found. The meta-interpreter approach has the advantages of avoiding to repeat resolution steps at the expense of a more complex bookkeeping. 3.2

Monte Carlo Algorithm

In [3] the Monte Carlo algorithm for ProbLog is realized by using a vector with an entry for every probabilistic fact. The entries store whether the facts have been sampled true, sampled false or not yet sampled. The vector is initialized with not yet sampled for all facts. Then a transformed ProbLog program is executed that derives the goal and updates the vector each time a new probabilistic fact is sampled. ProbLog’s algorithm requires all the probabilistic facts to be ground in the input program. While LPADs can be converted to ProbLog programs [1], the result of the conversion may contain non ground probabilistic facts so ProbLog’s Monte Carlo algorithm may not always be used. Our Monte Carlo algorithm for LPADs uses a meta-interpreter that keeps a partial explanation containing atomic choices for the disjunctive clauses sampled up to that point. The meta-interpreter is realized by Function solve in Algorithm 1 and returns 1 if the list of atoms of the goal is derivable in the sample and 0 otherwise. In order to derive the selected literal G of the current goal, solve ﬁnds all the matching clauses and builds a list of couples (new goal, atomic choice) for each matching clause. Then, it calls Function sample cycle in Algorithm 2 whose aim is to perform sampling steps for the matching clauses until the truth of the selected literal is determined and a consistent set of ground

34

S. Bragaglia and F. Riguzzi

Algorithm 2. Function sample cycle 1: function sample cycle(L, Explan) 2: Derivable = 0 3: while Derivable = 0 and L = ∅ do 4: Remove the ﬁrst element (GL, (C, θ, i)) from L 5: repeat 6: if Cθ is ground then 7: if (C, θ) is already present in Explan with head j then 8: h := j 9: else 10: h :=sample(C) 11: end if 12: else 13: h :=sample(C) 14: end if 15: Explan := Explan ∪ {(C, θ, h)} 16: if h = i then 17: Derivable :=solve(GL, Explan) 18: else 19: Derivable := 0 20: end if 21: until consistent(Explan) 22: end while 23: return Derivable 24: end function

atomic choices is obtained. Each matching clause is sampled independently and the resulting atomic choice is added to the partial explanation that is passed by reference to future calls of solve and sample cycle. Since a matching clause may be sampled when it is still not completely ground, further grounding/sampling may lead to inconsistency in the partial explanation. To address this problem, sampling is repeated until a consistent partial explanation is found. The algorithm is guaranteed to terminate because the same head will be eventually sampled for each couple of identical groundings of a clause. Also note that the sampling distribution is not aﬀected since inconsistency arises independently of the success or failure of a query. In Algorithm 2, consistent(Explan) returns true if Explan is consistent while sample(C) samples a head index for clause C. solve is called repeatedly to obtain the samples of truth values for the goal. The fraction of true values is an estimation of the probability of the query of interest. The conﬁdence interval on those samples is computed every m samples and the simulation ends when its value drops below a user-deﬁned δ.

4

Experiments

We considered three datasets: graphs of biological concepts from [2], artiﬁcial graphs and the UWCSE dataset from [4]. All the experiments have been

Approximate Inference for Logic Programs with Annotated Disjunctions 10

10

35

6

9 8

10

4

10

2

10

0

Time (log s)

Answers

7 6 5 4 3 2 1 0

exact k-best monte carlo PL exact PL k-best PL monte carlo 500 1000 1500

10

2000 2500 Edges

3000

3500

6

10

4

10

2

10

10

10

0

−2

−4

50

100

150 200 Size (steps)

exact k-best monte carlo PL exact PL k-best 250 300

(c) Execution times on Lanes graphs.

−4

500

1000

1500

2000 2500 Edges

exact k-best monte carlo PL exact PL k-best PL monte carlo 3000 3500 4000

(b) Execution times on biological graphs.

Time (log s)

Time (log s)

(a) Successes on biological graphs. 10

10

4000

−2

10

3

10

2

10

1

10

0

10

−1

10

−2

10

−3

exact k-best monte carlo PL exact

2

4

6

8

10 12 Size (steps)

14

PL k-best 16 18

20

(d) Execution times on Branches graphs.

3

10

10

2

10

1

10

0

10

−1

10

−2

2

1

10

Time (log s)

Time (log s)

10

0

10

−1

10

−2

10

−3

10

2

4

6

8

10 12 Size (steps)

14

exact k-best monte carlo PL exact PL k-best 16 18 20

(e) Execution times on Parachutes graphs.

5

10

15 Students

exact k-best monte carlo PL exact PL k-best 20 25

(f) Execution times on UWCSE graphs.

Fig. 1. Experimental results

performed on Linux machines with an Intel Core 2 Duo E6550 (2333 MHz) processor and 4 GB of RAM. The algorithms were implemented in YAP Prolog and run on the data for 24 hours or until the program ended for lack of memory. The values used for the parameters are k = 64 as the number of explanations to consider for k-best and δ = 0.01 as the maximum conﬁdence interval width for Monte Carlo algorithm because they represent a good compromise between speed and accuracy. The biological networks represent relationships among biological entities. Each edge is associated with a probability value that expresses the strength of the relationship. Determining the probability of an indirect association among a couple of entities is the same as computing the probability that a path exists

36

S. Bragaglia and F. Riguzzi

between their nodes. The datasets are obtained from a network containing 11530 edges and 5220 nodes built around four genes responsible of Alzheimer’s disease. Ten samples were extracted from the whole network each containing 50 graphs of increasing size (from 200 to 5000 nodes). For our test purposes we queried the probability that the genes HGNC 620 and HGNC 983 are related. Figure 1 presents the results of the experiments: the number of graphs for which the computation succeeded is reported on Figure 1(a), while Figure 1(b) reports the CPU time in seconds averaged over the graphs on which the algorithms succeeded as a function of the number of edges. The experimental results suggest that k-best does not improve with respect to exact because of the cost of keeping partial explanations sorted in sparse graphs, but Monte Carlo can solve twice as much problems than exact (up to 4000 edges). In terms of time, each algorithm performs almost like its ProbLog counterpart. With regard to the average absolute error, both k-best algorithms show a value of about 0.9%. Monte Carlo’s average absolute error, however, is 4.9% for our implementation and 6.7% for ProbLog. The artiﬁcial networks were used to evaluate the eﬀective speedup in speciﬁc scenarios. The datasets contain graphs of increasing size that have diﬀerent complexity with respect to the branching ratio and the length of paths between the terminal nodes. The graphs are built iteratively and are named after their shape: lanes, branches and parachutes. Lanes graphs, for example, gain a new parallel path a node longer than the previous graph. Branches are more complex because every step adds a new set of paths a node longer than before by forking at each node. Parachutes graphs are a trade-oﬀ between the two: they fork but each step introduces only one node (open paths fall back on existing nodes). Each dataset has a probability 0.3 on the edges and the path deﬁnition of lanes and parachutes contain 300 graphs, while branches only 25. Figure 2 shows an example for each dataset.

(a) Lanes.

(b) Branches.

(c) Parachutes.

Fig. 2. Examples of artiﬁcial graphs

Again, we queried the probability that a path exists between the terminal nodes (0 and 1) of the graphs. Figures 1(c), 1(d) and 1(e) show that in almost any case, our algorithms have performed better than their ProbLog equivalent, with Monte Carlo always being the fastest. The average absolute error for k-best and Monte Carlo is 0.001% and 3.170% respectively. ProbLog’s Monte Carlo is not applicable because of the presence of a probability value in rules for path.

Approximate Inference for Logic Programs with Annotated Disjunctions

37

On the UWCSE dataset, Monte Carlo took 3.873 seconds to solve the problem with 20 students, while the algorithm CVE of [4] can solve at most the problem with 7 students and taking around 1000 seconds. For 7 students Monte Carlo takes 1.961 seconds and incurs in a 4.3% absolute error on the problem with 0 students, the only one for which we have the exact result (see Figure 1(f)). ProbLog’s Monte Carlo was not applicable because the problem involves non ground probabilistic facts. ProbLog’s k-best managed to solve the problem with 25 students thus resulting to be the fastest algorithm on this dataset. It incurs into an absolute error of 4.7% on the problem with 0 students. The source code of the algorithms together with more details on the datasets and the experiments are available at the address http://sites.google.com/a /unife.it/ml/acplint.

Acknowledgements This work has been partially supported by the Italian MIUR PRIN 2007 project No. 20077WWCR8.

References 1. De Raedt, L., Demoen, B., Fierens, D., Gutmann, B., Janssens, G., Kimmig, A., Landwehr, N., Mantadelis, T., Meert, W., Rocha, R., Santos Costa, V., Thon, I., Vennekens, J.: Towards digesting the alphabet-soup of statistical relational learning. In: NIPS*2008 Workshop on Probabilistic Programming (2008) 2. De Raedt, L., Kimmig, A., Toivonen, H.: ProbLog: A probabilistic Prolog and its application in link discovery. In: 20th International Joint Conference on Artiﬁcial Intelligence, pp. 2468–2473. AAAI Press, Menlo Park (2007) 3. Kimmig, A., Santos Costa, V., Rocha, R., Demoen, B., De Raedt, L.: On the eﬃcient execution of probLog programs. In: Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. LNCS, vol. 5366, pp. 175–189. Springer, Heidelberg (2008) 4. Meert, W., Struyf, J., Blockeel, H.: CP-logic theory inference with contextual variable elimination and comparison to BDD based inference methods. In: De Raedt, L. (ed.) ILP 2009. LNCS, vol. 5989, pp. 96–109. Springer, Heidelberg (2010) 5. Riguzzi, F.: A top down interpreter for LPAD and CP-logic. In: Basili, R., Pazienza, M.T. (eds.) AI*IA 2007. LNCS (LNAI), vol. 4733, pp. 109–120. Springer, Heidelberg (2007) 6. Vennekens, J., Verbaeten, S., Bruynooghe, M.: Logic programs with annotated disjunctions. In: Demoen, B., Lifschitz, V. (eds.) ICLP 2004. LNCS, vol. 3132, pp. 95–119. Springer, Heidelberg (2004)

Approximate Bayesian Computation for the Parameters of PRISM Programs James Cussens Department of Computer Science & York Centre for Complex Systems Analysis University of York Heslington, York, YO10 5DD, UK [email protected]

Abstract. Probabilistic logic programming formalisms permit the definition of potentially very complex probability distributions. This complexity can often make learning hard, even when structure is ﬁxed and learning reduces to parameter estimation. In this paper an approximate Bayesian computation (ABC) method is presented which computes approximations to the posterior distribution over PRISM parameters. The key to ABC approaches is that the likelihood function need not be computed, instead a ‘distance’ between the observed data and synthetic data generated by candidate parameter values is used to drive the learning. This makes ABC highly appropriate for PRISM programs which can have an intractable likelihood function, but from which synthetic data can be readily generated. The algorithm is experimentally shown to work well on an easy problem but further work is required to produce acceptable results on harder ones.

1

Introduction

In the Bayesian approach to parameter estimation a prior distribution for the parameters is combined with observed data to produce a posterior distribution. A key feature of the Bayesian approach is that the posterior provides a full picture of the information contained in prior and data: with an uninformative prior and little data we are not in a position to make conﬁdent estimates of the parameters and this will be reﬂected in a ﬂat posterior. In contrast when much data is available the posterior will concentrate probability mass in small regions of the parameter space reﬂecting greater conﬁdence in parameter estimates. Despite its attractive features the Bayesian approach is problematic because in many cases computing or even representing the posterior distribution is very diﬃcult. One area in which this is often the case is statistical relational learning (SRL). SRL formalisms combine probabilistic models with rich representation languages (often logical) which allows highly complex probabilistic models to be described. In particular, the likelihood function (the probability of observed data as a function of the model’s parameters) is often intractable. This makes Bayesian and non-Bayesian parameter estimation diﬃcult since the likelihood function plays a key role in both. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 38–46, 2011. c Springer-Verlag Berlin Heidelberg 2011

Approximate Bayesian Computation for the Parameters of PRISM Programs

39

In this paper an approximate Bayesian computation (ABC) method is presented which approximates the posterior distribution over the parameters for a PRISM program with a given structure. The key feature of ABC approaches is that the likelihood function is never calculated. Instead synthetic datasets are generated and compared with the actually observed data. If a candidate parameter set generates synthetic datasets which are mostly ‘close’ to the real data then it will tend to end up with high posterior probability. The rest of the paper is set out as follows. In Section 2 an account of approximate Bayesian computation is given. In Section 3 the essentials of PRISM programs are explained. Section 4 is the core of the paper where it is shown how to apply ABC to PRISM. Section 5 reports on initial experimental results and the paper concludes with Section 6 which includes pointers to future work.

2

Approximate Bayesian Computation

The ABC method applied in this paper is the ABC sequential Monte Carlo (ABC SMC) algorithm devised by Toni et al [1] and so the basic ideas of ABC will be explained using the notation of that paper. ABC approaches are motivated when the likelihood function is intractable but it is straightforward to sample synthetic data using any given candidate parameter set θ ∗ . The simplest ABC algorithm is a rejection sampling approach described by Marjoram et al [2]. Since this is a Bayesian approach there must be a user-deﬁned prior distribution π(θ) over the model parameters. Let x0 be the observed data. If it is possible to readily sample from π(θ) then it is possible to sample from the posterior distribution π(θ|x0 ) as follows: (1) sample θ ∗ from π, (2) sample synthetic data x∗ from the model with its parameters set to θ∗ , (i.e. sample from f (x|θ∗ ) where f is the likelihood function), (3) if x0 = x∗ accept θ∗ . The problem, of course, with this algorithm is that in most real situations the probability of sampling synthetic data which is exactly equal to the observed data will be tiny. A somewhat more realistic option is to deﬁne a distance function d(x0 , x∗ ) which measure ‘how close’ synthetic data x∗ is to the real data x0 . x∗ is now accepted at stage (3) above when d(x0 , x∗ ) ≤ for some user-deﬁned . With this adaptation the rejection sampling approach will produce samples from π(θ|d(x0 , x∗ ) ≤ ) As long as is reasonably small, this will be a good approximation to π(θ|x0 ). Choosing a value for is crucial: too big and the approximation to the posterior will be poor, too small and very few synthetic datasets will be accepted. A way out of this conundrum is to choose not one value for , but a sequence of decreasing values: 1 , . . . T (1 > · · · > T ). This is the key idea behind the ABC sequential Monte Carlo (ABC SMC) algorithm: In ABC SMC, a number of sampled parameter values (called particles) {θ(1) . . . θ(N ) }, sampled from the prior distribution π(θ), is propagated through a sequence of intermediate distributions π(θ|d(x0 , x∗ ) ≤

40

J. Cussens

t ), t = 1, . . . T − 1, until it represents a sample from the target distribution π(θ|d(x0 , x∗ ) ≤ T ). [1] An important problem is how to move from sampling from π(θ|d(x0 , x∗ ) ≤ t ) to sampling from π(θ|d(x0 , x∗ ) ≤ t+1 ). In ABC SMC this is addressed via importance sampling. Samples are, in fact, not sampled from π(θ|d(x0 , x∗ ) ≤ t ) but from a diﬀerent sequence of distributions ηt (θ). Each such sample θt is then ∗ 0 ,x )≤t ) weighted as follows wt (θt ) = π(θt |d(x . η1 , the ﬁrst distribution sampled ηt (θt ) from, is chosen to be the prior π. Subsequent distributions ηt are generated via a user-deﬁned perturbation kernels Kt (θt−1 , θt ) which perform moves around the parameter space. These are the basic ideas of the ABC SMC algorithm; full details are supplied by Toni et al [1] (particularly Appendix A). As a convenience the description of the ABC SMC algorithm supplied in that paper is reproduced (almost verbatim) in Fig. 1. S1

Initialise 1 , . . . T . Set the population indicator t = 0.

S2.0 Set the particle indicator i = 1. S2.1 If t = 0, sample θ∗∗ independently from π(θ). (i) If t > 0, sample θ∗ from the previous population {θt−1 } with weights wt−1 ∗∗ ∗ and perturb the particle to obtain θ ∼ Kt (θ|θ ), where Kt is a perturbation kernel. If π(θ∗∗ ) = 0, return to S2.1 Simulate a candidate dataset x∗(b) ∼ f (x|θ∗∗ ) Bt times (b = 1, . . . , Bt ) and t ∗ calculate bt (θ ∗∗ ) = B b=1 1(d(x0 , x(b) ) ≤ t ). ∗∗ If bt (θ ) = 0, return to S2.1. (i)

(i)

S2.2 Set θt = θ ∗∗ and calculate the weight for particle θt , ⎧ ⎨ bt (θt(i) ), if t = 0 (i) (i) (i) wt = π(θt )bt (θt ) ⎩ N if t > 0 (j) (j) (j) j=1

wt−1 Kt (θt−1 ,θt

)

If i < N set i = i + 1, go to S2.1 S.3 Normalize the weights. If t < T , set t = t + 1, go to S2.0 Fig. 1. ABC SMC algorithm reproduced from Toni et al [1]

Note, from Fig. 1, that rather than generate a single dataset from f (x|θ∗∗ ), Bt datasets are sampled where Bt is set by the user. The quantity bt (θ∗∗ ) is the count of synthetic datasets which are within t . The intuitive idea behind ABC SMC is that a particle θ∗∗ that generates many synthetic datasets ‘close’ to x0 , will get high weight and is thus more likely to be sampled for use at the next iteration.

Approximate Bayesian Computation for the Parameters of PRISM Programs

3

41

PRISM

PRISM (PRogramming In Statistical Modelling) [3] is a well-known SRL formalism which deﬁnes probability distributions over possible worlds (Herbrand models). The probabilistic element of a PRISM program is supplied using switches. A switch is syntactically deﬁned using declarations such as those given in Fig. 2 for switches init, tr(s0), tr(s1), out(s0) and out(s1). The declaration in Fig. 2 for init, for example, deﬁnes an inﬁnite collection of independent and identically distributed binary random variables init1 , init2 , . . . with values s0 and s1 and with distribution P (initi = s0) = 0.9, P (initi = s1) = 0.1 for all i. The rest of a PRISM program is essentially a Prolog program. Switches provide the probabilistic element via the built-in predicate msw/2. Each time a goal such as :- msw(init,S) is called the variable S is instantiated to s0 with probability 0.9 and s1 with probability 0.1. If this were the ith call to this goal then this amounts to sampling from the variable initi . Although later versions of PRISM do not require this, it is convenient to specify a target predicate where queries to the target predicate will lead to calls to msw/2 goals (usually via intermediate predicates). The target predicate is thus a probabilistic predicate: the PRISM program deﬁnes a distribution over instantiations of the variables in target predicate goals. For example, in the PRISM program in Fig. 2 which implements a hidden Markov model, hmm/1 would be the target predicate. A query such as :- hmm(X). will lead to instantiations such as X = [a,a,b,a,a]. values(init,[s0,s1]). values(out(_),[a,b]). values(tr(_),[s0,s1]).

% state initialization % symbol emission % state transition

hmm(L):msw(init,S), hmm(1,5,S,L).

% To observe a string L: % Choose an initial state randomly % Start stochastic transition (loop)

hmm(T,N,_,[]):- T>N,!. hmm(T,N,S,[Ob|Y]) :msw(out(S),Ob), msw(tr(S),Next), T1 is T+1, hmm(T1,N,Next,Y).

% Stop the loop % Loop: current state is S, current time is T % Output Ob at the state S % Transit from S to Next. % Count up time % Go next (recursion)

:- set_sw(init, [0.9,0.1]), set_sw(tr(s0), [0.2,0.8]), set_sw(tr(s1), [0.8,0.2]), set_sw(out(s0),[0.5,0.5]), set_sw(out(s1),[0.6,0.4]).

Fig. 2. PRISM encoding of a simple 2-state hidden Markov model (this example is distributed with the PRISM system)

42

J. Cussens

The switch probabilities are the parameters of a PRISM program and the data used for parameter estimation in PRISM will be a collection of ground instances of the target predicates which are imagined to have been sampled from the unknown ‘true’ PRISM program with the ‘true’ parameters. PRISM contains a built-in EM algorithm for maximum likelihood parameter and maximum a posteriori (MAP) estimation [4]. In both cases a point estimate for each parameter is provided. In contrast here an approximate sample from the posterior distribution over parameters is provided by a population of particles.

4

ABC for PRISM

To apply the ABC SMC algorithm it is necessary to choose: (1) a prior distribution for the parameters, (2) a distance function, (3) a perturbation kernel and (4) also the speciﬁc experimental parameters such as the sequence of t, etc. The ﬁrst of these three are dealt with in the following three sections (4.1–4.3). The choice of experimental parameters is addressed in Section 5. 4.1

Choice of Prior Distribution

The ‘obvious’ prior distribution is chosen. Each switch has a user-deﬁned Dirichlet prior distribution and the full joint prior distribution is just a product of these. This is the same as the prior used for MAP estimation in PRISM [4, §4.7.2]. To sample from this prior it is enough to sample from each Dirichlet independently. Sampling from each Dirichlet is achieved by exploiting the relationship between Dirichlet and Gamma distributions. To produce a sample (p1 , . . . , pk ) from a Dirichlet with parameters (α1 , . . . αk ), values zi are sampled from Gamma(αi , 1) and then pi is set to zi /(z1 + · · · + zk ). The zi are sampled using the algorithm of Cheng and Feast [5] for αi > 1 and the algorithm of Ahrens and Dieter [6] for αi ≤ 1. Both these algorithms are given in [7]. For Dirichlet distributions containing small values of αi , numerical problems sometimes produced samples where pi = 0 for some i which is wrong since the Dirichlet has density 0 for any probability distribution containing a zero value. This problem was solved by the simple expedient of not choosing small values for the αi ! 4.2

Choice of Distance Function

The basic ABC approach leads to a sample drawn from π(θ|d(x0 , x∗ ) ≤ ) rather than π(θ|x0 ). For this to be a good approximation it is enough that f (x∗ |θ) ≈ f (x0 |θ) for all x∗ where d(x0 , x∗ ) ≤ . With this in mind d is deﬁned as follows. Let P (x0 ) be the empirical distribution deﬁned by the real data x0 . P (x0 ) assigns a probability to every possible ground instance of the target predicate. This probability is just the frequency of the ground instance in the data divided by the total number of datapoints. P (x∗ ) is the corresponding empirical distribution

Approximate Bayesian Computation for the Parameters of PRISM Programs

43

for fake data x∗ . Both P (x0 ) and P (x∗ ) can be viewed as (possibly countably inﬁnite) vectors of real numbers. The distance between x and x∗ is then deﬁned to be the squared Euclidean distance between P (x0 ) and P (x∗ ). Formally: (P (x0 )(i) − P (x∗ )(i))2 (1) d(x, x∗ ) = i∈I

where I is just some (possibly countably inﬁnite) index set for the set of all ground instances of the target predicate. In practice most terms in the sum on the RHS of (1) will be zero, since typically most ground instances appear neither in the real data nor in fake datasets. 4.3

Choice of Perturbation Kernel

Recall that each particle θ ∗ deﬁnes a multinomial distribution of the appropriate dimension for each switch of the PRISM program. The perturbation kernel Kt (θ|θ ∗ ) has two stages. Firstly, Dirichlet distributions are derived from θ ∗ by multiplying each probability in θ∗ by a global value αt where αt > 0. Secondly, a new particle is sampled from this product of Dirichlets using exactly the same procedure as was used for sampling from the original prior distribution. Large values of αt will make small moves in the parameter space likely (since the Dirichlet distributions will be concentrated around θ∗ ) and small values of αt will encourage larger moves. An attractive option is to start with small values of αt to encourage exploration of parameter space and to progressively increase αt in the hope of convergence to a stable set of particles giving a good approximation to the posterior.

5

Experimental Results

The ABC SMC algorithm has been implemented as a PRISM program which is supplied in the supplementary materials. PRISM 2.0 beta 4, kindly supplied by the PRISM developers, was used. As an initial test, ABC was done for the simplest possible parameter estimation problem. A PRISM program representing a biassed coin (P (heads) = 0.7, P (tails) = 0.3) was written and data of 100 simulated tosses were produced. This resulted in 67 heads and 33 tails. ABC was run several times with the following (more or less arbitrarily chosen) parameters: prior distribution π(θ) = Dir(1, 1), sequence of thresholds = (0), number of synthetic datasets Bt = 50, perturbation kernel parameter αt = 2, number of particles T = 50 and population size N = 50. As expected the ﬁnal population of (weighted) particles were always concentrated around the maximum likelihood estimate P (heads) = 0.67, P (tails) = 0.33. Here are the 4 most heavily weighted particles with their weights from one particular run: (0.646, 0.3534), (w = 0.051), (0.647, 0.353), (w = 0.044), (0.667, 0.332), (w = 0.044), (0.62, 0.38), (w = 0.037). Estimates of the posterior mean were similar for diﬀerent ABC runs: here are such estimates from 5 runs: (0.663, 0.337),

44

J. Cussens

0.4

0.6

0.8

Density

1.0

1.2

1.4

init

0.0

0.2

0.4 N = 200

0.6

0.8

1.0

0.8

1.0

0.8

1.0

0.8

1.0

Bandwidth = 0.09713

0.8 0.2

0.4

0.6

Density

1.0

1.2

1.4

out(s0)

0.0

0.2

0.4 N = 200

0.6 Bandwidth = 0.08416

Density

0.5

1.0

1.5

out(s1)

0.0

0.2

0.4 N = 200

0.6 Bandwidth = 0.06591

0.8 0.2

0.4

0.6

Density

1.0

1.2

tr(s0)

0.0

0.2

0.4 N = 200

0.6 Bandwidth = 0.08916

0.6

0.8

Density

1.0

1.2

tr(s1)

0.0

0.2

0.4 N = 200

0.6

0.8

1.0

Bandwidth = 0.09311

Fig. 3. Posterior distributions for HMM switch probabilities init, out(s0), out(s1), tr(s0), tr(s1) as estimated by three diﬀerent runs of ABC.

Approximate Bayesian Computation for the Parameters of PRISM Programs

45

(0.655, 0.345), (0.664, 0.336), (0.667, 0.333), (0.677, 0.323). Note that, in this trivial problem, successful parameter estimation was possible by going directly for a zero distance threshold = (0). For a more substantial test, 100 ground hmm/1 atoms were sampled from the PRISM encoded HMM show in Fig. 2. Dir(1, 1) priors were used for all 5 switches. The experimental parameters were αt = 10, Bt = 100, N = 200 and = (0.1, 0.05). Ideally, diﬀerent runs of ABC should generate similar approximations to posterior quantities. To look into this, marginal posterior distributions for the probability of the ﬁrst value of each of the 5 switches were estimated using 3 diﬀerent ABC runs. The results are shown in Fig. 3. These plots were produced using the density function in R with the ﬁnal weighted population of particles as input. There is evident variation between the results of the 3 runs, but similarities also. All 3 densities for init contain two local modes, all 3 for out(s1) put most mass in the middle, all 3 for tr(s0) have a fairly even spread apart from extreme values.

6

Conclusions and Future Work

This paper has described ABC SMC for PRISM programs and has shown some initial results for a working implementation. Evidently, considerably more experimentation and theoretical analysis is required to provide reliable approximations to posterior quantities using ABC SMC. In the experiments reported above the perturbation kernel Kt did not vary with t. It is likely that better results are possible by reducing the probability of big perturbations as t increases. In addition the choice for the sequence t thresholds was fairly arbitrary. Finally, it may be that better results are achievable by throwing more computational resources at the problem: most obviously increasing the number of particles, but also by lengthening the sequence of t thresholds to eﬀect a smoother convergence to the posterior. Another avenue for improvement is the choice of distance function. The function introduced in Section 4.2 is a generic function that is applicable to any PRISM program. It seems likely that domain knowledge could be used to choose domain-speciﬁc distance functions which reﬂect the ‘real’ diﬀerence between different ground atoms. The function used here treats all distinct pairs of ground atoms as equally diﬀerent which will not be appropriate in many cases.

References 1. Toni, T., Welch, D., Strelkowa, N., Ipsen, A., Stumpf, M.P.: Approximate Bayesian computation scheme for parameter inference and model selection in dynamical systems. Journal of the Royal Society Interface 6(31), 187–202 (2009) 2. Marjoram, P., Molitor, J., Plagnol, V., Tavar´e, S.: Markov chain Monte Carlo without likelihoods. Proceedings of the National Academy of Science 100, 15324–15328 (2003) 3. Sato, T., Kameya, Y.: Parameter learning of logic programs for symbolic-statistical modeling. Journal of Artiﬁcial Intelligence Research 15, 391–454 (2001)

46

J. Cussens

4. Sato, T., Zhou, N.F., Kameya, Y., Izumi, Y.: PRISM User’s Manual, Version 1.12.1 (2009) 5. Cheng, B., Feast, G.: Some simple gamma variate generators. Applied Statistics 28, 290–295 (1979) 6. Ahrens, J., Dieter, U.: Computer methods for sampling from gamma, beta, Poisson and binomial distributions. Computing 12, 223–246 (1974) 7. Robert, C.P., Casella, R.: Monte Carlo Statistical Methods, 2nd edn. Springer, New York (2004)

Probabilistic Rule Learning Luc De Raedt and Ingo Thon Department of Computer Science, Katholieke Universiteit Leuven, Belgium

Abstract. Traditionally, rule learners have learned deterministic rules from deterministic data, that is, the rules have been expressed as logical statements and also the examples and their classiﬁcation have been purely logical. We upgrade rule learning to a probabilistic setting, in which both the examples themselves as well as their classiﬁcation can be probabilistic. The setting is incorporated in the probabilistic rule learner ProbFOIL, which combines the principles of the relational rule learner FOIL with the probabilistic Prolog, ProbLog. We report also on some experiments that demonstrate the utility of the approach.

1

Introduction

Rule learners are amongst the most popular and easiest to use machine learning systems. They learn logical rules from deterministic examples but do not really take into account uncertainty. On the other hand, the graphical model and statistical relational learning community are able to reason about uncertainty but have not yet contributed many approaches to learning logical rules. This paper wants to alleviate this situation by introducing a novel probabilistic rule learning setting. In this setting, logical rules are learned from probabilistic data in the sense that both the examples themselves and their classiﬁcations can be probabilistic. As a motivating example that we will use throughout this paper, consider the following windsurﬁng problem. It is inspired by Quinlan’s play-tennis example. The diﬀerence between playing tennis and going windsurﬁng is that windsurfing typically needs to be planned ahead of time, say on the previous day. The eﬀect is that the weather conditions at the next day will still be uncertain at the time of deciding whether to go surﬁng or not. The forecast might state that tomorrow the probability of precipitation (pop) is 20%, the wind will be strong enough with probability 70%, and the sun is expected to shine 60% of the time, which could be represented by the facts 0.2::pop(t). 0.7::windok(t). 0.6::sunshine(t). where the t indicates the identiﬁer for the example. Past experience in this case would consist of such descriptions together with a probability value for the target predicate (e.g., 0.7::surfing(t)), which could indicate, for instance, the percentage of persons in our team that enjoyed the activity, the percentage of time that we enjoyed the surﬁng, etc. This type of data can be represented using P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 47–58, 2011. c Springer-Verlag Berlin Heidelberg 2011

48

L. De Raedt and I. Thon

a traditional attribute-value table, where the attributes are all Boolean and the values are the probabilities with which the attribute is true. The probabilistic rule learning problem, introduced in this paper, is now to induce a set of rules that allows one to predict the probability of the example from its description. For instance, for the surﬁng example, the following rules could be induced: surfing(X) :- not pop(X), windok(X). surfing(X) :- not pop(X), sunshine(X). where the argument X speciﬁes the identiﬁer of the example. The ﬁrst rule states that if the expected precipitation is low and the wind is ok, the surﬁng is likely to be good. There is thus a declarative logical reading of these rules, but also a probabilistic one: the lower the precipitation is and the higher the probability of windok and sunshine the higher the probability that the surﬁng will be enjoyable. Using the description of the example (0.2::pop(t). 0.7::windok(t). 0.6::sunshine(t).), we can compute the probability of surfing(t) under this hypothesis. Assuming all facts in the description are independent, this reduces to P (surfing(t)) = P ((¬pop(t) ∧ windok(t)) ∨ (¬pop(t) ∧ sunshine(t)) = P ((¬pop(t) ∧ windok(t)) ∨(¬pop(t) ∧ sunshine(t) ∧ ¬windok(t))) = 0.8 × 0.7 + 0.8 × 0.6 × 0.3 = 0.704 where the rewriting is needed to make the two rules mutually exclusive. Observe that although the windsurﬁng example is a toy example, this type of probabilistic data arises naturally in many application domains, such as robotics, vision, natural language processing and the life sciences. For instance, in a vision context there might be uncertainty about the identity, features or class of the object just observed; cf. also the experimental section. In the literature this kind of evidence is known as soft evidence, which has been studied in the context of probabilistic graphical models. The goal is there typically to calculate the most likely state for the remaining distributions [1]. One might want to tackle the probabilistic rule learning problem with traditional rule learning techniques. Two approaches come to mind, but turn out to be problematic. First, one might simply ignore the probabilities in the example and take the most likely value instead. Applied to the above example, this would yield the positive example (because 0.7 ≥ 0.5) with the description (not pop(t). windok(t). sunshine(t).). Even though the two rules – in this case – would predict the correct class, this approach necessarily leads to a loss of information as only 0/1 values can be predicted, which also results in a loss of prediction accuracy. Secondly, one might want to turn the probabilistic example into a set of deterministic ones by sampling instances from the example. Indeed, for each fact and the target predicate in the example one could sample possible deterministic facts. Each fact p :: f would be sampled as true with probability p

Probabilistic Rule Learning

49

and as false with probability 1 − p. This causes two problems. First, the generated examples may be inconsistent with one another as generated examples may be identical except for their target class. This will cause problems to many rule learners. Second, it requires one to sample a lot of deterministic instances from a probabilistic one to avoid overﬁtting. If there are n facts and approximating one attribute up to a certain accuracy requires k samples, approximating the entire example with the same accuracy will require k n deterministic examples. Although from these examples one could in principle learn the rules, and one could use the rules to compute the probability of an example by classifying a set of deterministic samples from that example, it should be clear that this approach will lead to combinatorial problems. A further approach that one might try is to consider the learning task as a regression problem. In the inductive logic programming community several techniques have been developed that integrate rule learning with regression, cf. [2,3]. These can also be applied to learn a set of Prolog rules that would compute the probability of an example. However, these rules typically contain a (complicated) equation that allows one to compute the probability or value of the example in terms of the probability of the features. While the performance of such approaches is typically good, the resulting rules are much harder to interpret than the logical ones that we induce. Furthermore, this type of approach is not really integrated in a probabilistic logical or statistical relational learning system. This paper is organized as follows: In Section 2, we review ProbLog and formally introduce the problem; in Section 3, we analyze the problem of probabilistic rule learning and compare it to the deterministic case; in Section 4, we introduce the probabilistic rule learner ProbFOIL which integrates principles of FOIL and ProbLog; in Section 5, we report on some preliminary experiments, and ﬁnally, in Section 6, we conclude.

2

Problem Specification

We ﬁrst introduce ProbLog, a probabilistic Prolog [4,5]. A ProbLog program consists of a set of deﬁnite clauses D and a set of probabilistic facts pi :: ci , which are facts ci labeled with the probability pi that their ground instances ci θ are true. It is also assumed that the probabilities of all ground instances ci θ are mutually independent. Given a ﬁnite set of possible substitutions {θj1 , . . . θjij } for each probabilistic fact pj :: cj , a ProbLog program T = {p1 :: c1 , · · · , pn :: cn } ∪ D deﬁnes a probability distribution P (L | T ) = pi (1 − pi ) ci θj ∈L

ci θj ∈LT \L

over ground subprograms L ⊆ LT = {c1 θ11 , . . . c1 θ1i1 , · · · , cn θn1 , . . . , cn θnin }. ProbLog is then used to compute the success probability Ps (T |= q) = P (q|L ∪ D) · P (L|T ) L⊆LT

50

L. De Raedt and I. Thon

of a query q in a ProbLog program T , where P (q|L ∪ D) = 1 if there exists a θ such that L ∪ D |= qθ, and P (q|L ∪ D) = 0 otherwise. In other words, the success probability of query q corresponds to the probability that the query q is entailed using the background knowledge together with a randomly sampled set of ground probabilistic facts. An example ProbLog program and query is shown above in the surfing example. For more details on ProbLog as well as on its eﬃcient implementation, we refer to [5]. We are now able to formalize the problem of inductive probabilistic logic programming or probabilistic rule learning as follows: Given: 1. E = {(xi , pi )|xi a ground fact for the unknown target predicate t; pi ∈ [0, 1] the target probability of xi }, the set of examples; 2. a background theory B containing information about the examples in the form of a probabilistic ProbLog program; 3. a loss function loss(H, B, E), measuring the loss of a hypothesis H (that is, a set of clauses) w.r.t. B and E; Find: arg minH loss(H, B, E) = arg minH ei ∈E |Ps (B ∪ H |= e) − pi | This loss function aims at minimizing the absolute diﬀerence between the predictions and the observations. The reason for this choice is, on the one hand, that it is the simplest possible choice and, on the other hand, that well-known concepts and notions from rule learning and classiﬁcation carry over to the probabilistic case when this loss function is used as we shall show. There are several interesting observations about this problem setting. First, it generalizes both traditional rule learning and inductive logic programming to a probabilistic setting. The propositional case illustrated in the windsurﬁng example is an example of probabilistic rule learning. Furthermore, when the background theory contains also relations and possibly clauses deﬁning further predicates we obtain an inductive probabilistic logic programming setting. In both cases, the original setting is obtained by assuming that the background theory is purely logical and having as only values for the examples 1 and 0; 1 corresponding to the positive examples and 0 to the negative ones. This is in line with the theory of probabilistic logic learning [6] and the inductive logic programming setting obtained would be that of learning from entailment because examples are facts that are probabilistically entailed by the theory. Second, as in traditional symbolic learning the goal is to ﬁnd a set of logical rules that satisfy certain constraints, while the rules themselves do not possess any parameters. To the best of the authors’ knowledge this problem has not been studied before. It is also interesting to position this problem in the context of the literature on uncertainty in artiﬁcial intelligence. There one typically makes a distinction between parameter learning and structure learning, the latter being an extension of the former in that also in structure learning the parameters have to be estimated. The probabilistic rule learning problem introduced above is in a sense dual to the parameter estimation problem. Indeed, when estimating

Probabilistic Rule Learning

51

parameters, the structure of the model is assumed to be given and ﬁxed, while here the parameters (the probability values) are ﬁxed and the structure, that is, the rules are to be learned. It is of course also possible to extend the problem setting so that induced rules may contain new predicates deﬁned by probabilistic facts with unknown probability values. This can be realized by adding to each clause h :- b1 , ..., bm in a hypothesis a new literal l where l would be deﬁned through a probabilistic predicate that would be unique to the clause. This type of extension would require both rule learning and parameter estimation. Although we are currently exploring this setting, we will – in the present paper – not consider this setting any further and focus instead on the pure probabilistic rule learning problem because it is this setting that directly upgrades the well established rule-learning problem.

3

Analysis

A key diﬀerence between the probabilistic and the deterministic setting is that each example ei now has a target probability pi as opposed to a 1/0 value. Furthermore, while in the deterministic case one obtains a 1/0 error, the probabilistic case is more subtle. To clarify this, we use pi to denote the positive and ni = 1 − pi the negative part of the example ei , while ph,i and nh,i = 1 − ph,i denote the positive and negative prediction w.r.t. the hypothesis h, and introduce the following quantities: 1. 2. 3. 4.

the the the the

true positive part tpi = min(pi , ph,i ), true negative part tni = min(ni , nh,i ), false positive part f pi = max(0, ni − tni ), and false negative part f ni = max(0, pi − tpi ).

These notions are graphically illustrated in Figure 1. If the prediction is perfect, that is, if ph,i = pi , then nh,i = ni , then the true positive and negative parts are maximal and the false positive and negative part are minimal, that is, 0. However, if ph,i > pi the hypothesis h overestimates the positive part of the example, and hence, the true positive part is still pi but the false positive part will be non-zero. Dually, if ph,i < pi , the true negative part is still ni but the false negative part will be non-zero. Furthermore, let us denote by TP = tpi ; T N = tni ; F P = f pi ; F N = f ni i

i

i

i

that is, the sum of the tpi , tni , f pi and f ni , where the sum is taken over all examples in the dataset and by pi ; N = ni M = |E|; P = i

i

These notions can be displayed in a contigency table, cf. Table 1. It should be clear that this probabilistic contingency table and the above introduces notions

52

L. De Raedt and I. Thon

Table 1. A probabilistic contingency table Real True Real False

Predicted True Predictive False TP FN P FP TN N M

Fig. 1. The true and false positive and negative part of a single example

directly generalize the deterministic case. To see this, consider that any positive example classiﬁed as such will contribute a value of tpi = 1 to T P and f ni = 0 to F N , and any positive example classiﬁed as negative will contribute tpi = 0 to T P and f ni = 1 to F N . Thus we have the following property. Property 1. The probabilistic contingency table generalizes the deterministic one. The diﬀerent notions are graphically displayed in Figure 2, in which the x-axis contains the examples and the y-axis their probability and all the examples are ordered according to increasing target probability. The areas then denote the respective rates. The deterministic case is illustrated in the ﬁgure 2 (right), which shows that in this case the examples take on 1/0 values. Because the T P and F P rates form the basis for ROC analysis, traditional ROC analysis, as used in rule learning and classiﬁcation systems can be applied to the probabilistic rule learning setting that we study in this paper. The reason is that any given hypothesis corresponds to a point in ROC space and can be interpreted in a similar way as in traditional rule learning. Therefore, ROC analysis techniques and measures such as AUC essentially carry over to the probabilistic case. Using these notions we also deﬁne precision, recall (true positive rate) and accuracy using the standard formulas. precision = recall =

TP T P +F P

TP T P +F N

m-estimate = accuracy =

P T P +m· N T P +F P

T P +T N T P +T N +F P +F N

Probabilistic Rule Learning

53

Fig. 2. The true and false positive part of an entire dataset for the probabilistic (left) case, and for the deterministic case (right)

4

ProbFOIL: A Probabilistic First Order Rule Learner

We now develop a probabilistic rule learner called ProbFOIL, which is able to induce probabilistic logic programs from examples. The rule learner is simple in that it follows the standard and generally accepted principles of rule learners (as described by [7,8]) but does not yet incorporate advanced pruning strategies. Instead of incorporating very elaborated pruning techniques we restrict ourselves to incremental reduced error pruning which is known to have a good trade-oﬀ between complexity and quality and the m-estimate which is known to give reliable results in the presence of noise. While developing ProbFOIL (Algorithm 1) we started from the generic separate and conquer paradigm (sometimes called the sequential covering algorithm) and modiﬁed it as little as possible. Essentially, the algorithm repeatedly adds clauses to the hypothesis in the outer loop until adding further clauses decreases the quality of the hypothesis. Furthermore, while searching ﬀor the next clause (lines 5-8) it searches greedily according to some local scoring function in which it repeatedly adds literals to the current clause until some local stopping criterion is satisﬁed. To determine the possible literals, a reﬁnement operator ρ is applied to the current clause; cf. [6]. We also employ list notation for the bodies of the rules, where the notation [b, l] denotes the result of appending the literal l to the body b. The post-processing step of the rule in lines 9-11 implements a kind of post-pruning akin to that in IREP [9]. The resulting algorithm is very much like the standard rule-learning algorithm known from the literature; cf. [7,8]. While the algorithm is similar to that of typical rule-learners, it is important to realize that there are also some subtleties. First, adding clauses to the hypothesis for the target predicate is a monotonic operation, that is, it can only increase the probability of an individual example because adding a clause results in extra possibilities for proving that the example is true. More formally: Property 2. For all hypotheses H1 , H2 : H1 ⊆ H2 → T P (H1 ) + F P (H1 ) ≤ T P (H2 ) + F P (H2 ).

54

L. De Raedt and I. Thon

Interpreted using Figure 2, adding clauses to a hypothesis can only increase the FP and TP regions, that is, move them upwards, and at the same time reduce the FN and TP ones. This explains why ProbFOIL stops adding clauses to the hypothesis when adding the rule found last does not result in a better global score. This is akin to the standard stopping criterion employed in many rule learners. As the global scoring function we employ accuracy(H). Secondly, notice that specializing a clause, that is, adding literals to a clause can only decrease the probability of examples (and hence, decrease the TP and FP regions). Property 3. For all hypotheses H and clauses h ← l1 , ..., ln and literals l: T P (H ∪ {h ← l1 , ..., ln })+F P (H∪{h ← l1 , ..., ln }) ≤ T P (H∪{h ← l1 , ..., ln , l})+F P (H∪ {h ← l1 , ..., ln , l}) Thirdly, while traditional deterministic rule learners typically manipulate also the set of examples (e.g. deleting the already covered examples), our probabilistic rule learner takes into account all examples all of the time. In the deterministic case, deleting the already covered examples is warranted because if one rule in the hypothesis covers the example, the overall hypothesis will cover the example. In the probabilistic case, this is more subtle as a given rule may only cover part of the example, and therefore a multi-rule hypothesis may be needed to cover the full positive part of an example. Our algorithm takes this into account in the heuristics used in its inner loop, where it will make decisions based on the extra parts of the examples that become covered by the new rule. In terms of the visualization in Figure 2, this is the diﬀerence between the old and new TP and FP parts. However, because each rule may only cover fractions of the examples, we use the diﬀerence in m-estimate, i.e., localscore(H, c) = m-estimate(H ∪ {c}) − m-estimate(H) The m-estimate, on which the local scoring function is based, is a variant of precision that is more robust against noise in the training data. Finally, ProbFOIL stops reﬁning rules when the current rule does not cover any extra negative part any more, or when it does not cover any extra positive part any more. More formally, localstop(H, c) = (T P (H ∪ {c}) − T P (H) = 0) ∨ (F P ({c}) = 0) It should also be clear that standard extensions of rule-learning, such as those for dealing with multiple classes, using beam-search, and look-ahead, can easily be incorporated in ProbFOIL.

5

Experiments

We demonstrate our approach in two experiments. In the ﬁrst experiment we learned the rules for the surfing example, in the second experiment we learned the underlying rules in the Eulisis game starting from image data. We used the YAP-ProbLog implementation and computed all scores using exact inference. All experiments were performed on a 3GHz Machine with 2GB of Ram.

Probabilistic Rule Learning

55

Algorithm 1. The ProbFOIL algorithm 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14:

5.1

h := t(X1 , . . . , Xn ) where t is the target predicate and the Xi distinct variables; H := ∅; b := []; c := (h ← b); repeat b := []; initially the body of the rule is empty; while ¬localstop(H,h ← b) do Grow rule l := arg maxl∈ρ(h←b) localscore(h ← [b, l]) b := [b, l] let b = [l1 , . . . , ln ] i := arg maxi localscore(H, h ← l1 , ..., li ); c := p(X1 , . . . , Xn ) ← l1 , . . . , li ; if globalscore(H) < globalscore(H ∪ {c}) then H := H ∪ {c} until globalscore(H) > globalscore(H ∪ {c}) return H

Surfing

For the surﬁng example we generated a dataset of 20 training examples starting from the two clauses listed in the introduction. The probabilities of the features were randomly initialized, and we were able to rediscover the original rule set. The runtime was less than 40 seconds. Afterwards we tried to rediscover the original rule-set. The rule-set inferred was 1.) surfing(I):- windok(I),\+ pop(I) 2.) surfing(I):- \+ pop(I),sunshine(I). 3.) % surfing(I):- sunshine(I),\+ windok(I). Please note that when calculating the score of a rule I is ground. This allows to calculate the probability of negated literals. The last rule decreases the total accuracy therefor it is in accordance to the algorithm not added to the ﬁnal rule-set and search is stopped. Runtime was less then 40 seconds. 5.2

Eulisis

For the second experiment we used the game of Eulisis [10]. Eulisis is a game where the dealer has a secret set of rules in mind. For each partial sequence of cards, the rules specify which cards are valid extensions of the sequence and which ones are not. After a card is played, the players are told whether the card is a valid extension or not. Using this information they have to guess the set of secret rules. The concept represented by the rules has to be expressed in terms of the suit, rank, color of the card, and whether it is is even or a face card. We played this game against the computer by taking actual images of the played cards (cf. also Figure 2). First, we presented the computer a sequence of 32 cards in a random order. For each card in the sequence the computer is told whether the card is a positive extension of the present partial sequence or not, and hence, each card played together with the previous card yields one example.

56

L. De Raedt and I. Thon

0.13::sift(26,card(diamonds,’9’)). 0.24::sift(26,card(heart,’9’)). 0.09::sift(26,card(spades,’10’)). 0.40::sift(26,card(spades,’9’)). Fig. 3. SIFT feature matches for spades nine and spades 10 (left). All matches for the 26th card which is a spades 9 bottom (right,bottom). Accuracy of the rule-set after each iteration on the red implies even dataset (right,top).

The cards are classiﬁed using SIFT (sale-invariant feature transforms) features [11] (corresponding to the start/end points of the thin lines in Fig 3). Each SIFT feature identiﬁes points of interest in the images. The main advantage of SIFT features is that they are easy to calculate. While each image contains a large number of features (typically around 1000) normally only a few (∼ 70) will match with a prototype (thin lines in Fig. 3). On the other hand, if a consistent transformation (scaling/rotation/translation) of only a small set of features (∼ 10−20, thick lines in Fig. 3) between the image and the prototype can be calculated, the probability of a miss-classiﬁcation is extremely low. To calculate the transformation we used the RANSAC (random consensus) algorithm [12], which automatically eliminates false matches (like in the hair region in Figure 3). The number of matched features is considered to be proportional to the probability of the card being a match. The output generated by the image analysis is highly interesting in our context because it often results in confusions between similar cards. Typical confusions occur between cards of the same suit (e.g, the 9 versus the 10) as well as between numbered cards belonging to diﬀerent suits. These confusions show that this is a realistic setting for probabilistic rule learning. We used two concepts to test the algorithm. The ﬁrst sequence contains the concept that states that the next card has to be red, that is, trans(PrevPos,Curr) :- red(Curr). Learning this concept took 45 seconds. ProbFOIL found this rule but also discovered an extra rule

Probabilistic Rule Learning

57

trans(PrevPos,Curr) :- black(PrevPos). The last rule is valid but only an artifact as it does not cover any example neither positive nor negative. It disappears, when the m of the m-estimates is set to zero. The second concept to learn was that black cards have to be followed by odd cards and red cards by even cards. The correct rule-set consists therefore of the two rules: trans(PrevPos,Curr) :- black(PrevPos),odd(Curr) and trans(PrevPos,Curr) :- red(PrevPos),even(Curr) Again, ProbFOIL learned some extra rules covering some very small noisy fractions of examples: trans(PrevPos,Curr) :- odd(Curr),even(Curr),red(Curr) and trans(PrevPos,Curr) :- black(Curr),even(Curr),odd(Curr). The last two rules are logically inconsistent as cards cannot be even and odd at the same time, but due to the noise in the observations, they provide some extra accuracy. In any case it is interesting to see how the accuracy evolves as more rules are learned. This is graphically depicted in Figure 2 right. The accuracy of the rule stating that everything is positive is 0.56, the accuracy of the diﬀerent rule-sets learned by ProbFOIL are in order of discovery 0.574, 0.671, 0.673, 0.673. This also implies that the target concept itself has only an accuracy of 0.671, and that the last two rules that are added only account for 0.2% accuracy. Thus the improvement of these last two rules is marginal and they would typically be removed should we employ a kind of post-pruning.

6

Conclusions

We have introduced a novel setting for probabilistic rule learning and developed the ProbFOIL algorithm for solving it using the probabilistic logic programming system ProbLog. The result is a natural probabilistic extension of inductive logic programming and rule learning. There are several remaining open questions that we are currently exploring. First, it would be interesting to experimentally compare the present approach to some alternative approaches (as sketched in the introduction). Secondly, we are developing an approach to probabilistic rule learning in which each rule contains an extra probabilistic predicate.

Acknowledgements The authors thank Manfred Jaeger, Guy Van den Broeck, Peter Flach, and Wannes Meert for helpful discussions. This research was supported by the FWO project: Relational action and activity learning and the GOA/08/008 project Probabilistic Logic Learning.

58

L. De Raedt and I. Thon

References 1. Pan, R., Peng, Y., Ding, Z.: Belief update in bayesian networks using uncertain evidence. In: ICTAI 2006: Proceedings of the 18th IEEE International Conference on Tools with Artiﬁcial Intelligence, pp. 441–444. IEEE Computer Society, Washington, DC, USA (2006) 2. Karalic, A., Bratko, I.: First order regression. Machine Learning 26(2-3), 147–176 (1997) 3. Srinivasan, A., Page, D., Camacho, R., King, R.D.: Quantitative pharmacophore models with inductive logic programming. Machine Learning 64(1-3), 65–90 (2006) 4. De Raedt, L., Kimmig, A., Toivonen, H.: Problog: A probabilistic Prolog and its application in link discovery. In: Veloso, M. (ed.) Proceedings of the 20th International Joint Conference on Artiﬁcial Intelligence, pp. 2462–2467 (2007) 5. Kimmig, A., Santos Costa, V., Rocha, R., Demoen, B., De Raedt, L.: On the eﬃcient execution of probLog programs. In: Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. LNCS, vol. 5366, pp. 175–189. Springer, Heidelberg (2008) 6. De Raedt, L.: Logical and Relational Learning. Springer, Heidelberg (2008) 7. Mitchell, T.M.: Machine Learning. McGraw-Hill, New York (1997) 8. F¨ urnkranz, J., Flach, P.A.: Roc ‘n’ rule learning — towards a better understanding of covering algorithms. Machine Learning 58(1), 39–77 (2005) 9. F¨ urnkranz, J., Widmer, G.: Incremental reduced error pruning. In: Cohen, W., Hirsh, H. (eds.) ICML 1994: Proceedings of the 11th International Conference on Machine Learning, pp. 70–77. Morgan Kaufmann, San Francisco (1994) 10. Dietterich, T., Michalski, R.: Learning to predict sequences. In: Michalski, R., Carbonell, J., Mitchell, T. (eds.) Machine learning: An Artiﬁcial Intelligence Approach, vol. 2. Morgan Kaufmann, San Francisco (1986) 11. Lowe, D.G.: Object recognition from local scale-invariant features. In: ICCV, pp. 1150–1157 (1999) 12. Fischler, M.A., Bolles, R.C.: Random sample consensus: a paradigm for model ﬁtting with applications to image analysis and automated cartography. Communications of the ACM 24(6), 381–395 (1981)

Interactive Discriminative Mining of Chemical Fragments Nuno A. Fonseca1 , Max Pereira1,2 , V´ıtor Santos Costa3 , and Rui Camacho2 1

CRACS-INESC Porto LA, Universidade do Porto, Rua do Campo Alegre 1021/1055, 4169-007 Porto, Portugal 2 LIAAD-INESC Porto LA & DEI-FEUP, Universidade do Porto, Rua Dr Roberto Frias s/n, 4200-465 Porto, Portugal 3 CRACS-INESC Porto LA & DCC-FCUP, Universidade do Porto, Rua do Campo Alegre 1021/1055, 4169-007 Porto, Portugal

Abstract. Structural activity prediction is one of the most important tasks in chemoinformatics. The goal is to predict a property of interest given structural data on a set of small compounds or drugs. Ideally, systems that address this task should not just be accurate, but they should also be able to identify an interpretable discriminative structure which describes the most discriminant structural elements with respect to some target. The application of ILP in an interactive software for discriminative mining of chemical fragments is presented in this paper. In particular, it is described the coupling of an ILP system with a molecular visualisation software that allows a chemist to graphically control the search for interesting patterns in chemical fragments. Furthermore, we show how structural information, such as rings, functional groups such as carboxyls, amines, methyls, and esters, are integrated and exploited in the search. Keywords: Drug design, graphical mining, eﬃciency.

1

Introduction

Structural activity prediction is one of the most important tasks in chemoinformatics. The goal is to predict a property of interest given structural data on a set of small compounds or drugs. This task can be seen as an instance of a more general task, Structure-Activity Relationship (SAR), where one aims at predicting the activity of a compound under certain conditions, given structural data on the compound. Ideally, systems that address this task should not just be accurate, they should be able to identify an interpretable discriminative structure which describes the most discriminant structural elements with respect to some target. In an invited talk to Computational Logic 2000 and ILP’2000 David Page [1] highlighted the importance of interactive ILP systems for SAR problems. The application of Inductive Logic Programming (ILP) in an interactive software P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 59–66, 2011. c Springer-Verlag Berlin Heidelberg 2011

60

N.A. Fonseca et al.

for discriminative mining of chemical fragments is presented in this paper. In particular, it is described a software application, called iLogCHEM , that allows a chemist to graphically control the search for interesting patterns in chemical fragments. iLogCHEM couples an ILP system with a molecular visualisation software, thus leveraging the ﬂexibility of ILP while addressing the SAR task mentioned above. iLogCHEM can input data from chemical representations, such as MDL’s SDF ﬁle format, and display molecules and matching patterns using visualisation tools such as VMD [2]. It has been demonstrated [3] that iLogCHEM can be used to mine eﬀectively large chemoinformatics data sets, such as the DTP AIDS data set [4]. The focus of this paper is on allowing domain expert users to participate in the drug discovery process in a number of ways: 1. We propose the ability to incorporate user-provided abstractions of interest to the chemoinformatics domain, that can be used to aid the discovery process. As a ﬁrst experiment, we have allowed users to specify a common chemical structure, aromatic rings. The user has available in iLogCHEM , apart from the aromatic rings, functional groups such as carboxyl, amine, ester, methyl, phenyl etc. This is supported through a macro mechanism (described in more detail in Section 4) where the user provides a pattern which is used to control rule reﬁnement. 2. We propose an interactive reﬁnement process where the user can interact with the proposed model, adapting it, evaluating it, and using it to guide (constrain) the search. 3. A common procedure in drug design is to introduce small variations in well known molecules. This procedure leads to data bases with groups of molecules that are very similar. When data sets are assembled from these data bases there is a “similarity bias”. To attenuate that eﬀect iLogCHEM allows the user to compute the similarity between the data set molecules and discard the more similar ones, retaining a set of “representative” ones. A more detailed description of this facility is described in Section 3. The rest of the paper is organised as follows. Section 2 provides a brief introduction to the SAR problem and the issue of molecular representations. Section 3 introduces iLogCHEM and describes its main components. Section 4 describes its ability to incorporate user-provided abstractions of interest to the chemoinformatics domain through the use of what we have designated as macros. Section 5 explains the facilities for interactive search and reﬁnement. Finally, conclusions and future work are described in Section 6.

2

Background

Structure activity relationships (SAR) describe empirically derived relationships between a molecule and its activity as a drug. In a typical SAR problem the goal is to construct a predictive theory relating the structure of a molecule to its activity given a set of molecules of known structure and activity.

Interactive Discriminative Mining of Chemical Fragments

61

A problem that one has to address is how to describe molecules. Coordinatebased representations usually operate by generating features from a molecule’s 3D-structure [5]. The number of features of interest can grow very quickly, hence the problem that these systems need to address is how to select the most interesting features and build a classiﬁer from them. Coordinate-free representations can use atom pair descriptors or just the atom-bond structure of the molecule. In the latter case, ﬁnding a discriminative component quite often reduces to the problem of ﬁnding a Maximum Common Substructure (MCS). Exact MCS search in a molecule represented as a set of atoms and bonds can be seen as a graph-mining task. In this case, a molecule is represented as a graph GM = (V, E) where V , the vertices, are atom labels, and E, the edges, are bonds. The search can be improved by adding atom and bond properties. The earliest approaches to search for common substructures or fragments were based on ideas from Inductive Logic Programming (ILP). ILP techniques are very appealing because they are based on a very expressive representation language, ﬁrst order logic, but they have been criticised for exhibiting signiﬁcant eﬃciency problems. As stated by Karwath and De Raedt [6], “their application has been restricted to ﬁnding relatively small fragments in relatively small databases”. Specialised graph miners have therefore become quite popular. Systems such as SUBDUE [7] started from the empty graph and then generate reﬁnements either using beam-search or breadth-ﬁrst search. More recent systems such as MoFa [8], gSpan [9], FFSM [10], Gaston [11], FMiner [12] and SMIREP [6], perform depth-ﬁrst search, and use compact and eﬃcient representations, such as SMILES, for which matching and canonical forms algorithms exist. Arguably, although such systems diﬀer widely, they all use three main principles: (i) only reﬁne fragments that appear in the database; (ii) ﬁlter duplicates; and (iii) perform eﬃcient homomorphism testing.

3

The iLogCHEM System

iLogCHEM is an interactive tool for discriminative mining of chemical fragments. iLogCHEM uses a logic representation of the molecules, where atoms and bonds are facts stored in a database. Although our representation is less compact than a specialised representation such as SMILES, used in MOLFEA [13] and SMIREP [6], it oﬀers a number of important advantages. First, it is possible to store information both on atoms and on their location: this is useful for interfacing with external tools. Second, iLogCHEM can take advantage of the large number of search algorithms implemented in ILP. Third, given that we implement the basic operations eﬃciently, we can now take advantage of the ﬂexibility of our framework to implement structured information. The interaction with the system is made through a graphical user interface. The system requires two input ﬁles: one is in SDF format with atom and bond data on a set of molecules; the other is a ﬁle which labels (discriminates) the compounds. We use SDF because it is highly popular and because it can convey 3D structure information. Other formats, such as SML can be translated to SDF

62

N.A. Fonseca et al.

through tools such as OpenBabel [14]. Also note that some datasets, such as the DSSTox [15] collection of datasets with at most 2000 molecules, include 2D and 3D information in the SDF format. Furthermore, the user may choose from 22 1D descriptors, 300 molecular ﬁngerprints and 242 2D descriptors, predeﬁned by chemists. These descriptors can be analysed with propositional tools, not just ILP. The input ﬁles (in SDF format) are processed and given as input to a rule discovery algorithm, that is implemented as an extension of an ILP system (currently Aleph [16]). We signiﬁcantly improved the ILP search algorithm for this task, as explained in the next section. The ILP engine allows the introduction of extra background knowledge for rule discovery. As an example, we take advantage of this ﬂexibility by allowing the user to introduce well-known molecular structures in the search process. This is supported through a macro mechanism (described in more detail in Section 4) where the user provides a pattern which is used to control rule reﬁnement. The output of the ILP system will be a set of rules, or theory. Most often, chemists will be interested in looking at individual rules. iLogCHEM ﬁrst matches the rules against the database, and then allows the user to navigate through the list of matches and visualise them. iLogCHEM uses VMD [2] to display the molecules and the matching substructures. The key component of iLogCHEM is rule discovery. From a number of ILP algorithms, we chose to base our work on Progol’s greedy cover algorithm with Mode Directed Inverse Entailment algorithm (MDIE) [17], as implemented in the Progol, April [18], and Aleph systems [16]. We rely on MDIE to achieve directed search, and we use greedy cover removal as a natural algorithm for ﬁnding interesting patterns. Figure 1 shows an example pattern for the HIV data set. The pattern is shown as a wider atoms and bonds, and it includes a sulphur atom and part of an aromatic ring. Molecular Filtering. It is a common practise in drug design to take a small molecule that exhibits some activity and introduce small changes to it to improve its activity. This procedure produces a large set of similar molecules. Most of the available data for drug design suﬀer from this “similarity bias”. Using iLogCHEM the similarities between any two pairs of molecules can be computed and retain only the “representative” ones, producing an unbiased data set. iLogCHEM uses Tanimoto distance to assess the similarity of two molecules. The user can specify a threshold value to be used in the ﬁltering procedure. Pattern Enumeration. iLogCHEM enumerates patterns (or sub-graphs) contained in an example molecule, the seed. To do so it uses the LogCHEM algorithm [3], based on the Aleph ILP system [16] to constrain the search space. This algorithm keeps a trie with previously

Fig. 1. HIV Pattern (wider atoms and bonds) discovered by ILP

Interactive Discriminative Mining of Chemical Fragments

63

generated clauses, according to a Morgan normal form, and tries to optimise rule evaluation for the speciﬁc domain of chemical compounds. Pattern Matching. Given a new pattern, we are interested in ﬁnding out how many molecules support the pattern. ILP systems rely on refutation for this purpose. However, this introduces a problem. Consider the clause: active(C) ← atom(C, Id1 , c)∧ atom bond(C, Id1 , Id2 , c, n, 2)∧ atom bond(C, Id1 , Id3 , c, n, 2)

Fig. 2. An Example Pattern from a Small Organic Molecule: Aalpha-C

that represents a N = C = N pattern. Figure 2 matches the molecule A-alpha-C against the pattern. Clearly, there is no match. Unfortunately, Prolog ﬁnds a match by matching the same nitrogen against the pattern twice. This problem, known as Object Identity [19], is addressed by dynamically rewriting the rules so that diﬀerent variables match diﬀerent atoms: active(C) ← atom(C, Id1 , c)∧ atom bond(C, Id1 , Id2 , c, n, 1)∧ Id1 = Id2 ∧ atom bond(C, Id1 , Id3 , c, n, 1)∧ Id1 = Id3 ∧ Id2 = Id3

iLogCHEM includes a number of further optimisations. Namely, we rewrite bond information in such a way as to minimise backtracking. Also, by default, iLogCHEM compiles every pattern, instead of interpreting them, as usual in ILP [3].

4

Integrating Structural Information in the Search

The iLogCHEM system has the ability to integrate complementary information in the pattern search process. Our work was motivated by two observations. First, quite often chemists rely on well-known structures that are typically inﬂuential in the chemical properties of compounds. Second, global properties of the compound may be good indicators of activity. 4.1

Macros

A ﬁrst step forward stems from observing Figure 1: does the pattern include part of the ring because only part of the ring matters or, as it is more natural from the chemists point of view, should we believe that the whole ring is in the pattern? Quite often discriminative miners will only include part of a ring because it is suﬃcient for classiﬁcation purposes. But this may not be suﬃcient to validate the pattern. The logical representation used in iLogCHEM makes it natural to support macro structures, such as rings used in MoFa [8] in a straightforward fashion. The next example shows such a description:

64

N.A. Fonseca et al.

macro(M,(atom(A1,c), bond(A1,A2,_), atom(A2,c), bond(A2,A3,_), atom(A3,c), bond(A3,A4,_), atom(A4,c), bond(A4,A5,_), atom(A4,c), bond(A4,A5,_), atom(A5,c), bond(A5,A6,_), atom(A6,c), bond(A6,A1,_))).

Initial experiments with iLogCHEM show that using such macros results in similar accuracy, but returns easier to interpret rules. iLogCHEM has available a library of functional groups that may be used as macros to speed up search and are very useful to improve understandability of the models. Some of the functional groups available include: aldehyde, amine, methyl, ester, ketone, hydroxyl, cyano, carboxylic acid, etc 4.2

Molecular Properties

One of the major beneﬁts of ILP for SAR is its ability to combine very diverse sources of information. iLogCHEM allows the user to select chemical properties of interest for a compound, and combine them with pattern generation. Properties of interest are obtained through the graphical interface, and then passed on to the miner. In iLogCHEM the user may choose from a wide set of 1D molecular descriptors. As an example, consider this predicate clause for the CPDBAS dataset [15]: active(A) :logp(A,B), B =< -0.73333657, atom(A,C,c), atom_bond(A,C,D,c,c,4), atom_bond(A,D,E,c,o,4).

The constant −0.73333657 is obtained from a seed example by saturation. Experiments with NCTRER dataset show that this feature can be quite useful in complementing graph search.

5

Interactive Search and Refinement

After choosing the data set of molecules and then ﬁltering them out using Tanimoto distance the user may launch the ILP and obtain a ﬁrst model. The user may then choose to visualise each rule of the model and overlap a rule (pattern) on the structure of a molecule covered by that rule (as shown in Figure 1). Once a model is constructed there are two possible interactions the user can take. The user may decide to do a “local and manual” search or he can specify constraints on the visualised pattern and ask the ILP system to produce a new model. In the ﬁrst case the user may incrementally produce changes in the pattern (adding or deleting atoms and/or bonds) and then ask iLogCHEM to immediately evaluate the changed pattern. Whenever an evaluation is done the user can see a list of the “positive and negative” molecules covered. If “local and manual” search does not produce the desired results the user may interactively (again adding/removing atoms and bonds) deﬁne a new pattern. This new pattern can be converted into a clause and used as the starting clause of the search space. That is, the user is commanding the system to ﬁnd useful reﬁnements of the provided pattern.

Interactive Discriminative Mining of Chemical Fragments

6

65

Conclusions

This paper reports on iLogCHEM , an interactive tool to be used in interactive drug design tasks. iLogCHEM is designed to give users who have little knowledge of, or interest in ILP the beneﬁts of this learning mechanism. Thus, it can be seen as step forward in “enhancing human–computer interaction to make ILP systems true collaborators with human experts” [20]. iLogCHEM is founded on previous work to create an eﬀective rule miner for ILP [3]. The system was driven by expert requirements, extending the previous work as follows by introducing i) a library of preexisting common patterns, considered relevant by experts, that are immediately available for discovery; and ii) the ability to deﬁne a new pattern graphically and then translate it to the iLogCHEM internal representation. These new facilities enable the expert to: i) look at the pattern highlighted on the molecule structure; ii) interact with the visualisation tool and specify constraints not satisﬁed by the pattern presented; and iii) rerun the ILP system with the speciﬁed constraints added to the data set. These steps are the centre of the main loop of the interaction where the expert guides the process of pattern discovery. Additionally the tool also allows the expert user to specify a list of chemical structures (rings and functional groups) that are used as macro operators. The use of chemical structures may be very useful to achieve more compact and comprehensible models than the ones described with atoms and bonds.

Acknowledgements This work has been partially supported by the project ILP-Web-Service (PTDC/EIA/70841/2006), HORUS (PTDC/EIA-EIA/100897/2008), and by the Funda¸c˜ao para a Ciˆencia e Tecnologia. Max Pereira is funded by FCT grant SFRH/BPD/37087/2007.

References 1. Page, D.L.: ILP: Just do it. In: Cussens, J., Frisch, A.M. (eds.) ILP 2000. LNCS (LNAI), vol. 1866, pp. 3–18. Springer, Heidelberg (2000) 2. Humphrey, W., Dalke, A., Schulten, K.: VMD – Visual Molecular Dynamics. Journal of Molecular Graphics 14, 33–38 (1996) 3. Costa, V.S., Fonseca, N.A., Camacho, R.: LogCHEM: Interactive Discriminative Mining of Chemical Structure. In: Proceedings of 2008 IEEE International Conference on Bioinformatics and Biomedicine (BIBM 2008), pp. 421–426. IEEE Computer Society, Philadelphia (2008) 4. Collins, J.M.: The DTP AIDS antiviral screen program (1999), http://dtp.nci.nih.gov/docs/aids/aids_data.html 5. Maggiora, G.M., Shanmugasundaram, V., Lajiness, M.J., Doman, T.N., Schultz, M.W.: A practical strategy for directed compound acquisition, pp. 315–332. WileyVCH, Chichester (2004)

66

N.A. Fonseca et al.

6. Karwath, A., De Raedt, L.: Predictive Graph Mining. In: Suzuki, E., Arikawa, S. (eds.) DS 2004. LNCS (LNAI), vol. 3245, pp. 1–15. Springer, Heidelberg (2004) 7. Chittimoori, R.N., Holder, L.B., Cook, D.J.: Holder, and Diane J. Cook. Applying the subdue substructure discovery system to the chemical toxicity domain. In: Kumar, A.N., Russell, I. (eds.) Proceedings of the Twelfth International Florida Artiﬁcial Intelligence Research Society Conference, Orlando, Florida, USA, May 1-5, pp. 90–94. AAAI Press, Menlo Park (1999) 8. Borgelt, C., Berthold, M.R.: Mining molecular fragments: Finding relevant substructures of molecules. In: Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), Japan, pp. 51–58 (2002) 9. Yan, X., Han, J.: gspan: Graph-based substructure pattern mining. In: Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), Maebashi City, Japan, December 9-12 (2002) 10. Huan, J., Wang, W., Prins, J.: Eﬃcient mining of frequent subgraphs in the presence of isomorphism. In: Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), Melbourne, Florida, USA, December 19-22, pp. 549–552. IEEE Computer Society, Los Alamitos (2003) 11. Nijssen, S., Kok, J.N.: Frequent graph mining and its application to molecular databases. In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics, The Hague, Netherlands, October 10-13, pp. 4571–4577. IEEE, Los Alamitos (2004) 12. Maunz, A., Helma, C., Kramer, S.: Large-scale graph mining using backbone reﬁnement classes. In: KDD, pp. 617–626 (2009) 13. Kramer, S., De Raedt, L., Helma, C.: Molecular feature mining in hiv data. In: KDD, NY, USA, pp. 136–143 (2001) 14. Guha, R., Howard, M.T., Hutchison, G.R., Murray-Rust, P., Rzepa, H., Steinbeck, C., Wegner, J.K., Willighagen, E.L.: The Blue Obelisk–Interoperability in Chemical Informatics. Journal of Chemical Information and Modeling 46, 991–998 (2006) 15. Richard, A.M., Williams, C.R.: Distributed structure-searchable toxicity (dsstox) public database network: a proposal. Mutation Research/Fundamental and Molecular Mechanisms of Mutagenesis 499, 27–52(26) (2002) 16. Srinivasan, A.: The Aleph Manual. University of Oxford (2004), http://www.comlab.ox.ac.uk/oucl/research/areas/machlearn/Aleph/ 17. Muggleton, S.: Inverse entailment and Progol. New Generation Computing, Special issue on Inductive Logic Programming 13(3-4), 245–286 (1995) 18. Fonseca, N.A., Silva, F., Camacho, R.: April – An Inductive Logic Programming System. In: Fisher, M., van der Hoek, W., Konev, B., Lisitsa, A. (eds.) JELIA 2006. LNCS (LNAI), vol. 4160, pp. 481–484. Springer, Heidelberg (2006) 19. Lisi, F.A., Ferilli, S., Fanizzi, N.: Object identity as search bias for pattern spaces. In: van Harmelen, F. (ed.) Proceedings of the 15th Eureopean Conference on Artiﬁcial Intelligence, ECAI 2002, pp. 375–379. IOS Press, Amsterdam (2002) 20. Page, D., Srinivasan, A.: ILP: A short look back and a longer look forward. Journal of Machine Learning Research 4, 415–430 (2003)

MMRF for Proteome Annotation Applied to Human Protein Disease Prediction Beatriz Garc´ıa-Jim´enez, Agapito Ledezma, and Araceli Sanchis Universidad Carlos III de Madrid Av.Universidad 30, 28911, Legan´es, Madrid, Spain [email protected]

Abstract. Biological processes where every gene and protein participates is an essential knowledge for designing disease treatments. Nowadays, these annotations are still unknown for many genes and proteins. Since making annotations from in-vivo experiments is costly, computational predictors are needed for diﬀerent kinds of annotation such as metabolic pathway, interaction network, protein family, tissue, disease and so on. Biological data has an intrinsic relational structure, including genes and proteins, which can be grouped by many criteria. This hinders the possibility of ﬁnding good hypotheses when attribute-value representation is used. Hence, we propose the generic Modular Multi-Relational Framework (MMRF) to predict diﬀerent kinds of gene and protein annotation using Relational Data Mining (RDM). The speciﬁc MMRF application to annotate human protein with diseases veriﬁes that group knowledge (mainly protein-protein interaction pairs) improves the prediction, particularly doubling the area under the precision-recall curve. Keywords: Relational Data Mining, Human Disease Annotation, MultiClass Relational Decision Tree, First-Order Logic, Structured Data.

1

Introduction

Functional annotation consists of attaching biological information to gene and genetic product sequences. For instance, identifying whether a gene is involved in a biological process, a regulation network or a molecular function; or assigning to a protein its expression proﬁle or phenotype (tissue or disease association). Knowing the processes in which genes and proteins are involved is an essential knowledge to design disease treatments. Nowadays, a gene/protein appears annotated in multiple distributed repositories. However, many proteins have still few or no annotation in a large number of species, because experimental techniques are costly in resources and time. This process is also overwhelmed by the high amount of data that need to be acquired and managed. Therefore, computational prediction methods have shown an useful alternative in the last years [16], in order to focus the experimental veriﬁcations on the hypotheses (predicted annotations) that are more likely to be true. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 67–75, 2011. c Springer-Verlag Berlin Heidelberg 2011

68

B. Garc´ıa-Jim´enez, A. Ledezma, and A. Sanchis

Many diverse prediction techniques have been proposed to solve the genome1 annotation problem. Each method uses diﬀerent kind and amount of input data, and is focused on a particular prediction goal. This variability in methods makes diﬃcult a comparison among them. The simplest prediction approach is based on sequence similary, as Blast2GO [1], only useful for Gene Ontology (GO) annotation. Others predictors just include sequence and structure features [13]; while more sophisticated methods integrate heterogeneous data sources, such as Fatigo [1] and DAVID [5]. Some techniques simplify the data representation to numerical features, applying subsymbolic machine learning algorithms [10,12]; but others preserve the intrinsic structure of biological data, applying Multi-Relational Data Mining (MRDM). These techniques take advantages of the interpretable symbolic representation, such as [4,7,21] in functional annotation and [19,20] in other related bioinformatic domains. Despite all these eﬀorts, the proteome annotation problem remains open. We do not know functions and tasks for all proteins, and many annotations are neither veriﬁed by experts nor complete in all the biological ﬁelds of interest. Particularly, there are few specialized predictors in disease annotation, being an essential knowledge to design new drugs. Morbid OMIM (Online Mendelian Inheritance in Man) [2] contains information on all known mendelian disorders and associated genes. It is the most complete and updated repository about genetic disorders. This repository is carefully curated and frequently referenced by biological and medical scientists. For these reasons, we decide to use OMIM instead of other less known disease vocabulary such as eVOC pathology [11]. Most annotation methods using OMIM perform search rather than prediction. Some approaches predict new annotation [14], but none applies MRDM. To summarize, genome and proteome annotation prediction is still an open problem with regard to various kind of speciﬁc annotation. Disease annotation is one of special interest. This paper proposes applying MRDM to a relevant annotation domain: human disease prediction. Besides, we want to verify the relevance of biological group relations using data integrated from diﬀerent data sources. This group data is very suitable to be exploited by relational learning. We address this problem adapting a generic and ﬂexible framework, MMRF [6], which can easily predict diﬀerent annotations. Several facts support this proposal. First, MRDM have been succesfully applied to other related bioinformatic domains. Second, we use up to date data from diﬀerent biological databases used in many current science projects. Finally, we have made a special eﬀort in data collection, selecting only experimental data, when it is possible, in order to avoid indirect redundancies coming from internal predictions from other applications, which can bias the results. This paper is organized as follows: Section 2 brieﬂy explains the Modular Multi-Relational Framework. The human protein OMIM disease prediction domain is described in Section 3. Section 4 presents and analyzes the application results. Finally, in Section 5, conclusions and future work are summarized. 1

In annotation context, the terms gene and protein or genome and proteome are indistinctly used.

MMRF for Proteome Annotation Applied

2

69

Modular Multi-Relational Framework

Modular Multi-Relational Framework (MMRF) [6] is a system originally designed for gene Group function prediction domain, facing the problem from a relational and ﬂexible point of view. It has been applied to predict function for S.cerevisiae (i.e.Yeast) genes grouped by complexes [7]. Now, we adapt the framework since we have realized that group annotation problem is very complex to face in a single step [7]. The changes aim to solve gene and protein individual function annotation prediction problem, instead of group annotation. Nevertheless, this MMRF layout can also be considered the ﬁrst phase for the group annotation problem. The complete process could be achieved obtaining ﬁrst annotations for individual group elements using MMRF, and then combining them for group annotations using an alternative method (for example, union or intersection of individual annotations). MMRF preserves the same main properties as the original layout. It is designed by modules for managing the high variability that the functional annotation biological domain entails. This facilitates changing independiently data, criteria and methodology. MMRF uses a multi-relational approach (in representation and learning) for ﬁtting the intrinsic relational structure of gene and protein group data, and for integrating diﬀerent data sources. Figure 1 shows the new MMRF layout oriented to individual protein annotation prediction. Module 2 is now called Selecting annotation where the annotation vocabulary is chosen and assigned to individual gene or protein. The relational knowledge about belonging to speciﬁc biological groups (i.e.metabolic pathways, regulation networks, etc.[6,7]) is handled in module 3.

" #

#

$

% & '

)(

* +

(

!

Fig. 1. A new schema of the Modular Multi-Relational Framework (MMRF). The rectangles represent modules and the ellipses represent data.

70

3

B. Garc´ıa-Jim´enez, A. Ledezma, and A. Sanchis

MMRF Applied to Human Protein Disease Prediction

This section describes the MMRF module instantiations for applying the framework to the Human Protein OMIM Disease Prediction domain. 1.Obtaining individual features. In this application, there are 7 features derived from gene sequence (such as chromosome name and length, or transcript count) and 27 features from protein sequence (including length, positive and negative charge from the sequence, aminoacid composition and whether the protein contains a transmembrane, signal or coiled-coil domain). Also, 5 diﬀerent kinds of protein functional annotations are collected, related with protein family (from Pfam), protein domain (from InterPro), biological process, cellular component and molecular function. The last three come from Gene Ontology (GO), and are only from experimental results, ignoring automated annotation, for avoiding biases induced by overlaps with others annotation sources. The numerical protein sequence features are computed with BioWeka [8] using as input the UniProt aminoacid sequences in FASTA format. Only SwissProt sequences are included, because the remainder (TrEMBL sequences) have not been reviewed by experts. The rest of features are retrieved from Ensembl project, through the BioMart tool [17]. See the module 1 instantiation schema in Supplementary Material. 2.Selecting annotation. The annotation goal is genetic disorders using gene-disease associations from Morbid OMIM [2]. We apply a manual OMIM disorder categorization made by experts [9]. These disease categories have been recently used in other studies [14]. Thus, the 4,927 OMIM disorders 2 are categorized in 23 disease classes based on the aﬀected physiological system. Some of the classes are: neurological, cancer, cardiovascular, inmunological or endocrine disease (see a complete list in Supplementary Material). Therefore, this MMRF application classiﬁes proteins in these general disease categories [9]. However, a simple modiﬁcation in MMRF module 2 could easily build a particular predictor for diseases at lower level, for instance, knowing in which speciﬁc kind of cancer (leukemia, melanoma, breast cancer, etc.) a protein is involved. 3.Retrieving group data. Two sources of group data are included, though it could be easily increased with others, as protein complexes or co-expresion data. The ﬁrst data source consist of protein-protein interaction pairs, retrieved from BioGRID repository (2.0.59 Release) [18], which integrates important interaction databases as MINT, IntAct or HPRD. We select BioGRID pairs from real binary relations identiﬁed by evidences codes Co-crystal structure, Far Western, FRET, PCA and Two-Hybrid. These interactions do not include pairs split oﬀ from N -ary relations. It results in 21,687 proteins with 229,407 interactions among them. The second data source comprises metabolic pathways, which correspond to the 52 top-level human Reactome [15] pathways including 5,128 proteins, on average 159.85 proteins per pathway. See the module 3 instantiation schema in Supplementary Material. 2

From OMIM Morbid Map on November 17th, 2009.

MMRF for Proteome Annotation Applied

71

Data sources collected in modules 1 to 3 use diﬀerent gene or protein identiﬁers. The original identiﬁers are all mapped to Ensembl (gene or protein) IDs using the cross-references from BioMart [17] queries. 4.Transforming to representation language. The knowledge representation language is a subset of ﬁrst-order logic. All the collected data previously described is represented as predicates in Prolog syntax (see Figure 2). Since for humans, we can not assume the simpliﬁcation 1-gene:1-protein, as simpler organism does, the representation language has to handle information level with regard to gene and protein. These levels are related by the 1-gene:N-proteins relation (represented as N binary predicates protein gene/2 per gene). Thus, the diﬀerent features are separately associated to genes (predicates with geneID as key) or to proteins (predicates with protID as key) (see Figure 2). Moreover, the group data has a diﬀerent representation depending on the number of elements in the group. Binary relations are represented as pairs (i.e. ppinteracion pair/2). N-ary relations are represented with one group identiﬁer plus N binary predicates (i.e. protein in pathway/2), where each predicate relates a group element with the group identiﬁer. gene(geneID,name,length,strand,trCount). protein(protID,length,posCharge,negCharge). aa composition(protID,aaID,proportionAA). go annotation bioProcess(protID,goID). ppinteraction pair(protID,protID). protein in pathway(groupID,protID). ...

gene biotype(geneID,bioType). protein class(protID,omimID). protein gene(protID,geneID). transmembrane domain(protID). ncoils domain(protID). pfam domain(protID,pfamID).

Fig. 2. Fragment of the knowledge representation language in proteome disease prediction domain

The instantiation of module 5.Relational Learning consist of applying the algorithm Tilde [3], implemented in the ACE tool, using a multi-class and multi-label learning, inspired by other works [21]. The instantiation of module 6.Interpretation and Analysis consist of evaluating the result with PrecisionRecall curves (PRC). For more details, see a previous MMRF application [7], which shares the same instantiations of modules 5 and 6.

4

Results and Discussion

This section describes the results of predicting human protein diseases with MMRF. The whole data set comprises 6,958 protein-disease annotations, for 5,640 diﬀerent proteins (examples) and 21 diseases (classes). Each protein can be associated with more than one disease, ranged from 1 to 5, in this set. On average, there are 331.3 annotations per disease. There are at least 40 proteins per class (the two classes with less than this minimum have been ignored). On average, there are around 5% positive vs 95% negative examples per class, although the protein class distribution is not equitable (see Supplementary Material). Each of the four majority classes has more than 10% of all annotations.

72

B. Garc´ıa-Jim´enez, A. Ledezma, and A. Sanchis

The background knowledge also includes related proteins without disease associations, but belonging to a metabolic pathway or having an interaction with a disease protein. We compare two conﬁgurations, which diﬀer in module 3 instantiation, it means on group relational data used for learning. The ﬁrst one (a.-Without groups) does not included neither pathway nor protein-protein interaction data. The second conﬁguration (b.-With groups) includes both kind of data from biological groups. In addition, we analize the learning implications of relational knowledge representation for groups. The results shown in Table 1 and Figure 3 come from three folds cross validation experiments. Table 1 shows several quantitative measures and PrecisionRecall curves appear in Figure 3 for the two conﬁgurations. All of them are the average results about overall 21 classes.

Table 1. Quantitative results from human protein disease prediction with MMRF. AU(PRC): Area Under Precision-Recall Curve. MSE: Mean Squared Error. Relational knowledge a) without groups b) with groups AU(PRC): 0.282 0.625 Correlation: 0.290 0.599 MSE: 0.049 0.034

Fig. 3. Precision-Recall curves from human protein disease prediction with MMRF, in diﬀerent conﬁgurations

Table 1 and Figure 3 point out that prediction with group data (conﬁguration “b”, on the right) improves the double upon without groups (conﬁguration “a”, on the left), in both AU(PRC) and correlation. Hence, this comparison asserts that knowledge about proteins belonging to a biological group is very relevant in disease annotation prediction. Figure 4 presents a fragment of a relational decision tree from conﬁguration with group data (b). The ﬁrst tree node (see line 3) determines that ppinteraction pair/2 (a protein-protein interaction relation) is the most discriminative predicate. This fact conﬁrms the relevance of group knowledge to predict annotations. Moreover, in the ﬁrst ’yes’-branch (line 4), the second node includes a typical feature in protein function prediction: the positive charge of protein sequence [12] (variable Y ), partially supporting the model reliability. Besides, in the ﬁrst ’no’-branch (line 11), the most relevant query includes a N:1 relation (predicate protein gene/2 relates a protein with the gene it comes from), emphasizing the high inﬂuence of relational knowledge on the prediction.

MMRF for Proteome Annotation Applied

73

1: class(-A,-B,-C,-D,-E,-F,-G,-H,-I,-J,-K,-L,-M,-N,-O,-P,-Q,-R,-S,-T,-U,-V) 2: [0.011436170212766] 3760.0 3: ppinteraction_pair(A,-W),not(W=A) ? 4: +--yes: [0.0188476036618201] 1857.0 5: | protein(W,-X,-Y,-Z),Y>=0.107506 ? 6: | +--yes: [0.0219123505976096] 1004.0 7: | | ppinteraction_pair(W,W) ? 8: | | +--yes: [0.0569948186528497] 386.0 9: | | | transmembrane_domain(W) ? 10:... 11:+--no: [0.00420388859695218] 1903.0 12: protein_gene(A,-M26),gene(M26,-N26,-O26,-P26,-Q26),O26>=84418 ? 13: +--yes: [0.00981996726677578] 611.0 14: ...

Fig. 4. Fragment of a relation decision tree in conﬁguration with groups

Therefore, the importance of protein-protein interaction and protein-gene relations indicates that Relational Data Mining is essential in this domain. This is because to propositionalize this kind of data would be very complex or resulting in having redundant data. For instance, for protein binary relations, the single attribute-value table should have thousands of Boolean attributes, one per each protein. In addition, it should repeat all the gene features as attributes for all proteins that come from the same gene. Furthermore, attribute-value learning can not represent knowledge or retrieve hypotheses about features of related genes and proteins, as tree fragment in Figure 4 shows.

5

Conclusions and Further Work

This work highlights the relevance of biological group data for annotation prediction, particularly in proteome disease association. Since the most eﬃcient and viable representation of this group knowledge is with relations, relational learning and the Modular Multi-Relational Framework are conﬁrmed as very suitable for solving the proteome annotation problem. This is particularly relevant since the data comes from the integration of multiple up to date biological databases. Besides, the hypotheses learned through Relational Data Mining are mostly unfeasible to achieve in attribute-value learning and it holds the advantage of being readable for biology experts. This work has two main diﬀerences from a previous MMRF application [7]. For the annotation goal, diseases from OMIM morbid are used instead of general functions of GO Slim. Moreover the organism has been changed from yeast to human, which is more complex but more interesting. Thus, the obtained predictor let us select a subset of unknown protein-disease association (the most likely predictions) to be veriﬁed by in-vivo experiments. As further work, many alternatives appear. It would be interesting to make a comparison between this overall classes predictor and 21 independent predictors, one per each disease class. Other possibilities would be related to biological MMRF applications. For instance, including new group data, such as protein

74

B. Garc´ıa-Jim´enez, A. Ledezma, and A. Sanchis

complexes or co-expression data; applying the predictor to annotate unknown proteins; or changing the prediction goal to a diﬀerent annotation ﬁeld, as predicting if a protein belongs to a metabolic pathway. Acknowledgments. This research has been supported by CICYT, TRA 200767374-C02-02 project and by the expert biological knowledge of the Structural Computational Biology Group in Spanish National Cancer Research Centre (CNIO). The authors would like to thank members of Tilde tool developer group in K.U.Leuven for providing their help and many useful suggestions. Supplementary Materials (for online version). They include two schemas about obtaining individual features and retrieving group data, the complete list of 23 disease categories and a ﬁgure showing the protein per disease distribution.

References 1. Al-Shahrour, F., et al.: Babelomics: a systems biology perspective in the functional annotation of genome-scale experiments. Nucl. Acids Res. 34, W472–W476 (2006) 2. Amberger, J., et al.: McKusick’s Online Mendelian Inheritance in Man (OMIM(R)). Nucl. Acids Res. 37, D793–D796 (2009) 3. Blockeel, H., De Raedt, L.: Top-down induction of logical decision trees. Artiﬁcial Intelligence 101(1-2), 285–297 (1998) 4. Clare, A.: Machine learning and data mining for yeast functional genomics. PhD thesis, University of Wales, Aberystwyth (2003) 5. Dennis, G., et al.: DAVID: Database for Annotation, Visualization, and Integrated Discovery. Genome Biology 4(5), P3 (2003) 6. Garc´ıa, B., et al.: Modular Multi-Relational Framework for Gene Group Function Prediction.. In: Online Proceedings ILP (2009) 7. Garc´ıa Jim´enez, B., Ledezma, A., Sanchis, A.: S.cerevisiae complex function prediction with modular multi-relational framework. In: Garc´ıa-Pedrajas, N., Herrera, F., Fyfe, C., Ben´ıtez, J.M., Ali, M. (eds.) IEA/AIE 2010. LNCS, vol. 6098, pp. 82– 91. Springer, Heidelberg (2010) 8. Gewehr, J., et al.: BioWeka extending the Weka framework for bioinformatics. Bioinformatics 23(5), 651–653 (2007) 9. Goh, K., et al.: The human disease network. PNAS 104(21), 8685–8690 (2007) 10. Jensen, J., et al.: Prediction of human protein function according to Gene Ontology categories. Bioinformatics 19(5), 635–642 (2003) 11. Kelso, J., et al.: eVOC: A Controlled Vocabulary for Unifying Gene Expression Data. Genome Research 13(6a), 1222–1230 (2003) 12. Lee, B., et al.: Identiﬁcation of protein functions using a machine-learning approach based on sequence-derived properties. Proteome Science 7(1), 27 (2009) 13. Lee, D., et al.: Predicting protein function from sequence and structure. Nature reviews. Molecular Cell Biology 8(12), 995–1005 (2007) 14. Linghu, B., et al.: Genome-wide prioritization of disease genes and identiﬁcation of disease-disease associations from an integrated human functional linkage network. Genome Biology 10(9), R91 (2009) 15. Matthews, L., et al.: Reactome knowledgebase of human biological pathways and processes. Nucl. Acids Res. 37, D619–D622 (2009)

MMRF for Proteome Annotation Applied

75

16. Pe˜ na-Castillo, L., et al.: A critical assessment of mus musculus gene function prediction using integrated genomic evidence. Genome Biology 9, S2 (2008) 17. Smedley, D., et al.: BioMart-biological queries made easy. BMC Genomics 10 (2009) 18. Stark, C., et al.: BioGRID: a general repository for interaction datasets. Nucl. Acids Res. 34, 535–539 (2006) 19. Trajkovski, I., et al.: Learning relational descriptions of diﬀerentially expressed gene groups. IEEE Transactions on Systems, Man, and Cybernetics 38(1), 16–25 (2008) 20. Tran, T.N., Satou, K., Ho, T.-B.: Using inductive logic programming for predicting protein-protein interactions from multiple genomic data. In: Jorge, A.M., Torgo, L., Brazdil, P.B., Camacho, R., Gama, J. (eds.) PKDD 2005. LNCS (LNAI), vol. 3721, pp. 321–330. Springer, Heidelberg (2005), http://dx.doi.org/10.1007/11564126_33 21. Vens, C., et al.: Decision trees for hierarchical multi-label classiﬁcation. Machine Learning 73(2), 185–214 (2008)

Extending ProbLog with Continuous Distributions Bernd Gutmann1 , Manfred Jaeger2, and Luc De Raedt1 1

Department of Computer Science, Katholieke Universiteit Leuven, Belgium {bernd.gutmann,luc.deraedt}@cs.kuleuven.be 2 Department of Computer Science, Aalborg University, Denmark [email protected]

Abstract. ProbLog is a recently introduced probabilistic extension of Prolog. The key contribution of this paper is that we extend ProbLog with abilities to specify continuous distributions and that we show how ProbLog’s exact inference mechanism can be modiﬁed to cope with such distributions. The resulting inference engine combines an interval calculus with a dynamic discretization algorithm into an eﬀective solver.

1

Introduction

Continuous distributions are needed in many applications for building a natural model. Probabilistic logic programming languages, such as ProbLog and CPLogic [1], have, so far, largely focused on modeling discrete distributions and typically perform exact inference. The PRISM [2] system provides primitives for Gaussian distributions but requires the exclusive explanation property which complicates modeling. On the other hand, many of the functional probabilistic programming languages, such as BLOG [3] and Church [4], can cope with continuous distributions but only perform approximate inference by a Markov Chain Monte Carlo approach. Typical statistical relational learning systems such as Markov Logic and Bayesian Logic Programs have also been extended with continuous distributions. The key contribution of this paper is a simple probabilistic extension of Prolog based on the distribution semantics with both discrete and continuous distributions. This is realized by introducing a novel type of probabilistic fact where arguments of the fact can be distributed according to a continuous distribution. Queries can then be posed about the probability that the resulting arguments fall into speciﬁc intervals. We introduce the semantics of using continuous distributions in combination with comparison operations and show how ProbLog’s inference mechanism, based on Binary Decision Diagrams (BDDs) [5], can be extended to cope with these distributions. The resulting language is called Hybrid ProbLog. Similarly to Hybrid ProbLog, Hybrid Markov Logic Networks (HMLNs) [6] aim at integrating Boolean and numerical random variables in a probabilisticlogic modeling framework. The kind of modeling supported by HMLNs is quite diﬀerent in nature from the kind of modeling for which Hybrid ProbLog is designed. In an HMLN, one deﬁnes equations that function as soft constraints for P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 76–91, 2011. c Springer-Verlag Berlin Heidelberg 2011

Extending ProbLog with Continuous Distributions

77

relationships among numerical and logical variables. For example, one could express that the temperature on day d is typically around 20◦ Celsius using the weighted equality w temperature(d) = 20, where larger weights w lead to a larger penalty for deviations of temperature(d) from 20. All weighted formulae containing temperature(d), together, implicitly deﬁne a probability distribution for the random variable temperature(d) due to HMLN semantics. However, one cannot directly specify this distribution to be Gaussian with, for example, mean 20 and standard deviation 5. No exact inference methods have been developed for HMLNs. It is also instructive to compare Hybrid ProbLog with Hybrid Bayesian Networks [7]. Apart from one being a logical-relational, and the other a purely propositional framework, there is also a key diﬀerence in the interaction between continuous and discrete random variables permitted. In Hybrid Bayesian Networks, the distributions of continuous variables (usually Gaussian) are typically conditioned on discrete variables, but continuous variables cannot be parents of discrete ones. In Hybrid ProbLog this order is reversed: continuous variables are at the roots of the directed model, and the discrete (Boolean) variables are conditioned on the continuous ones. Thus, Hybrid ProbLog provides modeling capabilities and exact inference procedures that, for the propositional case, are in some sense complementary to Hybrid Bayesian networks. This paper has three main contributions. (1) An extension of ProbLog with continuous distributions, (2) formal study of its semantics, and (3) an eﬃcient inference algorithm based on dynamic discretization. The rest of this paper is organized as follows. Section 2 reviews basic concepts from ProbLog. Section 3 introduces the syntax and semantics of Hybrid ProbLog. Section 4 describes our exact inference algorithm. Before concluding, we evaluate the algorithm in Section 5.

2

ProbLog

ProbLog [8] is a recent probabilistic extension of Prolog. A ProbLog theory T = F ∪ BK consists of a set of labeled facts F = {p1 :: f1 , · · · , pn :: fn } and a set of deﬁnite clauses BK that express the background knowledge. The facts pj :: fj in F are annotated with a probability pj stating that fj θ is true with probability pj for all substitutions θ grounding fj . The resulting facts fj θ are called atomic choices and represent random variables; they are assumed to be mutually independent. It is not allowed to use a probabilistic fact in the heads of clauses in BK. Let Θ = {θj1 , . . . θjij |j = 1, . . . n} be a ﬁnite1 set of possible substitutions for the variables in the probabilistic facts where ij is the number of substitutions for fact j, then a ProbLog theory describes a probability distribution over Prolog programs L ⊆ LF where LF = F Θ and F Θ denotes the set of all possible ground instances of facts in F : PP (L|F ) := pj (1 − pj ) . (1) fj θjk ∈L 1

fj θjk ∈LF \L

Throughout the paper, we assume that F Θ is ﬁnite, but see [2] for the inﬁnite case.

78

B. Gutmann, M. Jaeger, and L. De Raedt

The success probability of a query q then is Ps (q|T ) := P (L|F ) .

(2)

L⊆LF : L∪BK|=q

ProbLog also deﬁnes a probability distribution Pw over possible worlds, that is Herbrand interpretations. Each total choice L ⊆ LF can be extended to a possible world by computing the least Herbrand model of L. This possible world is assigned the probability Pw = P (L|F ). Thus a set of total choices represents an assignment of truth-values to all atomic choices.

3

Hybrid ProbLog

A Hybrid ProbLog theory T = F ∪ F c ∪ BK is a ProbLog theory extended by a set of continuous probabilistic facts2 of the form c F c = {(X1 , φ1 ) :: f1c , · · · , (Xm , φm ) :: fm }

where Xi is a Prolog variable, appearing in the atom fic and φi is a density function. The fact (X, gaussian(2, 8)) :: temp(D, X), for example, states that the temperature for day D is Gaussian-distributed with mean 2 and standard deviation 8. The syntax allows one to specify multivariate distributions, i.e., ((X, Y), gaussian([1, 0], [[1, 0.5], [0.5, 1]]) :: f(X, Y) . In this paper, however, we restrict ourselves to the univariate case. From a user’s perspective, continuous facts are queried like normal Prolog facts, and the value of the continuous variable is instantiated with a value drawn from the underlying distribution. Hybrid ProbLog adds the following predicates to the background knowledge of the theory to process values stemming from continuous facts: – below(X,c) succeeds if X is a value from a continuous fact, c is a number constant, and X < c – above(X,c) succeeds if X is a value from a continuous fact, c is a number constant, and X > c – ininterval(X,c1 ,c2 ) succeeds if X is a value from a continuous fact, c1 and c2 are number constants, and X ∈ [c1 , c2 ] Uniﬁcation with number constants is not supported for the values of continuous facts, i.e. the call temp(d, 0) fails. But one can express the same using temp(d, T), ininterval(T, 0, 0) . Similarly, standard Prolog comparison operators are not supported and one has to use the corresponding comparison predicate from the background knowledge: temp(d1, T), T > 5 2

We denote facts, values, and substitutions related to the continuous part of T by the superscript c .

Extending ProbLog with Continuous Distributions

79

has to be written as temp(d1, T), above(T, 5) . Arithmetic expressions are not supported, i.e the query temp(d1, T), Fahrenheit is 9/5 ∗ X + 32, Fahrenheit > 41 is illegal. There is no equivalent predicate for that in the background knowledge. Also, the comparison of two continuous facts is not supported, i.e. the query temp(d1, T1), temp(d2, T2), above(T1, T2) is illegal. The latter restriction, in particular, prevents two or more continuous variables getting “coupled”, i.e. there is a dependency that requires one to always consider the values of both variables simultaneously. Furthermore, disallowing arithmetic expressions ensures that one can partition the underlying Rn space into simple intervals rather than into complex-shaped continuous sets. Despite being fairly restrictive, our framework allows for non-trivial programs. Example 1 (Gaussian Mixture Model). The following theory encodes a Gaussian mixture model. The atom mix(X) can be used later on as if it were a simple continuous fact, which means the variable X can be processed using above/2, below/2 and ininterval/3. 0.6::heads. (X, gaussian(0, 1))::g(X).

tails :- problog not(heads). mix(X) :- heads, g(X).

(X, gaussian(5, 2))::h(X).

mix(X) :- tails, h(X).

The predicate problog not/1 is provided by the ProbLog inference engine. It allows one to negate an atom, similar to Prolog’s \+, but can only be applied on ground probabilistic facts. The following theory shall be used as running example throughout the paper to deﬁne the semantics of Hybrid Problog and to explain the inference algorithm. Example 2 (Weather). This theory models weather during winter time. The background knowledge states that a person catches a cold when the temperature is below 0◦ Celsius or when it is colder than 5◦ Celsius while it rains. 0.8::rain. (T, gaussian(2, 8))::temp(T).

catchcold :- rain, temp(T), below(T, 5). catchcold :- temp(T), below(T, 0).

The semantics of Hybrid ProbLog theory T = F ∪F c ∪BK is given by probability distributions over subsets of the facts fi (called subprograms), and over sample values for the numeric variables in the continuous facts fic (called continuous subprograms). The subprograms L ⊆ LF are distributed as in ProbLog (cf. Equation (1)), and the continuous subprograms are distributed as described in Section 3.1. Combining both gives one the success probability of queries in a Hybrid ProbLog theory as described in Section 3.2.

80

3.1

B. Gutmann, M. Jaeger, and L. De Raedt

Distribution Over Continuous Subprograms

c c , . . . θji Let Θc = {θj1 |j = 1, . . . , m} be a ﬁnite set of possible substitutions j for the non-numeric variables in the continuous facts (Xj , φj ) :: fjc where ij c is the number of substitutions for fact j. Each substitution instance fjc θjk is associated with a random variable Xjk with probability distribution φj . The Xjk are assumed to be independent. Let X denote the |Θc |-dimensional vector of the random variables, and f (x) their joint density function. A sample value c x for X deﬁnes the continuous subprogram Lx := {fjc θjk {Xjk ← xjk } | j = 1, . . . , m; k = 1, . . . ij } where {Xjk ← xjk } is the substitution of Xjk by xjk .

Example 3 (Continuous Subprogram). Consider the following set of continuous facts where the second fact is non-ground. That is, one can obtain several ground instances where each instance has a continuous value drawn independently from the same distribution. (X, gaussian(1, 2)) :: h(X).

(X, gaussian(4, 3)) :: f(X, Y).

c c c = ∅, θ2,1 = {Y ← a}, θ2,2 = {Y ← b} When one applies the substitutions θ1,1 together with the point x1,1 = 0.9, x2,1 = 2.3, x2,2 = 4.2, one obtains the continuous subprogram Lx = {h(0.9), f(2.3, a), f(4.2, b)}.

The joint distribution of X thus deﬁnes a distribution over continuous subc , bθ c ] × . . . × programs. Speciﬁcally, for a |Θ c |-dimensional interval I = [aθ11 11 c c [aθmi , b ] (which may also be open or half-open in every dimension), one θmi m m obtains the probability of the set of continuous subprograms with continuous parameters in I: bθc

bθc

PP (X ∈ I|F c ) :=

11

mim

··· aθc

11

f (x) dx

(3)

aθ c

mim

Example 4 (Joint Density). In Example 3, the joint density function is f (x) = f (x1,1 , x2,1 , x2,2 ) = ϕ1,2 (x1,1 ) × ϕ4,3 (x1,2 ) × ϕ4,3 (x2,2 ) where ϕμ;σ is the density of a normal distribution N (μ, σ). 3.2

Success Probabilities of Queries

The success probability Ps (q) of a query q is the probability that q is provable in L ∪ Lx ∪ BK, where L is distributed according to (1), and x according to f (x) respectively. The key to computing success probabilities is the consideration of admissible intervals, as introduced in the following deﬁnition. c

Definition 1. An interval I ⊆ R|Θ | is called admissible for a query q and a theory T = F ∪ F c ∪ BK iﬀ (4) ∀x, y ∈ I, ∀L ⊆ LF : L ∪ Lx ∪ BK |= q ⇔ L ∪ Ly ∪ BK |= q

Extending ProbLog with Continuous Distributions

81

If (4) holds, we can also write L ∪ LI ∪ BK |= q. c A partition A = I1 , I2 , . . . , Ik of R|Θ | is called admissible for a query q and a theory T iﬀ all Ii are admissible intervals for q and T . In other words, an admissible interval I is “small enough” such that the values of the continuous variables, as long as they are in I, do not inﬂuence the provability of q. Within an admissible interval, the query either always fails or always succeeds for any sampled subset L ⊆ LF of probabilistic facts. Example 5 (Admissible Intervals). Consider the Hybrid ProbLog theory consisting out of a single continuous fact: (X, gaussian(1, 2)) :: h(X) For the query h(X), ininterval(X, 5, 10), the interval [0, 10] is not admissible in this theory. The reason is, that for x = 4 ∈ [0, 10] the query fails but for x = 6 ∈ [0, 10] it succeeds. The intervals [6, 9), [5, 10], or (−∞, 5), for example, are all admissible. Note, that the inference engine allows one to evaluate conjunctive queries and that the predicate ininterval/3 is automatically added to the background knowledge. Definition 2 (Discretized Theory). Let T = F ∪F c ∪BK be a Hybrid ProbLog theory, then the discretized theory TD is deﬁned as F ∪ {f c {X ← f c } | (X, φ) :: f c ∈ F c } ∪ BK ∪ {below(X, C), above(X, C), ininterval(X, C1, C2)} where f c {X ← f c } is the atom resulting from substituting the variable X by the term f c . The substitutions simplify the inference process. Whenever a continuous variable is used in a comparison predicate, the variable will be bound to the original continuous fact. Therefore, one can use a standard proof algorithm without keeping track of continuous variables. The discretized theory still contains probabilistic facts if F is not empty, thus it is a ProbLog theory. Deﬁnition 2 allows one to merge the inﬁnite number of proofs, which every Hybrid ProbLog theory has, into a potentially ﬁnite number of proofs. This property is needed to compute the admissible intervals eﬃciently. Example 6 (Proofs in the discretized theory). The discretized theory TD for Example 2 is 0.8::rain. temp(temp(T)).

catchcold :- rain, temp(T), below(T, 5). catchcold:- temp(T), below(T, 0).

below(X, C).

above(X, C).

ininterval(X, C1, C2).

The discretized theory contains two proofs for the query catchcold. For each proof, one can extract

82

B. Gutmann, M. Jaeger, and L. De Raedt

– fi the probabilistic facts used in the proof – ci the continuous facts used in the proof – di the comparison operators used in the proof The proofs of catchcold can be characterized by: f1 = {rain}

c1 = {temp(temp(T))}

d1 = {below(temp(T), 5)}

f2 = ∅

c2 = {temp(temp(T))}

d2 = {below(temp(T), 0)}

It is possible, though not in Example 6, that the same continuous fact is used by several comparison operators within one proof, i.e. fi = {below(f(X), 10), above(f(X), 0)}. In such cases, one has to build the intersection of all intervals to determine the interval in which all comparison operators succeed, i.e. fi = {ininterval(f(X), 0, 10)}. If that intersection is empty, the proof will fail in the original non-discretized theory. Building the intersections can also be interleaved with proving the goal. The following theorem guarantees that an admissible partition exists for each query which has ﬁnitely many proofs in the discretized theory. Theorem 1. For every theory T , every query q that has only ﬁnitely many proofs in TD , and all ﬁnite sets of possible substitutions for the probabilistic c facts and the continuous facts Θ, Θc , there exists a ﬁnite partition of R|Θ |that is admissible for T and q. Proof. This follows from the fact that conditions deﬁned by below/2, above/2, and ininterval/3 are satisﬁed by intervals of sample values, and ﬁnite combinations of such conditions, which may appear in a proof, still deﬁne intervals.

Algorithm 2 can be used to ﬁnd admissible partitions. The algorithm has to be modiﬁed as described in Section 4 to respect interval endpoints. Given an admissible partition A one obtains the success probability of a query q as follows: PP (L|F ) · PP (X ∈ I|F c ) (5) Ps,A (q|T ) := L⊆LF

I∈A: L∪LI ∪BK|=q

The following theorem shows that the values of Ps are independent of the partition A and therefore we can write Ps (q|T ) instead of Ps,A (q|T ). Theorem 2. Let A and B be admissible partitions for the query q and the theory T then Ps,A (q|T ) = Ps,B (q|T ). Proof. Proven directly, by showing that for two admissible partitions one can construct a third partition that returns the same success probability. Using the deﬁnition for the success probability (5) we get: PP (L|F ) · PP (X ∈ I|F c ) (6) Ps,A (q|T ) := L⊆LF

Ps,B (q|T ) :=

L⊆LF

I∈A: L∪LI ∪BK|=q

I∈B: L∪LI ∪BK|=q

PP (L|F ) · PP (X ∈ I|F c )

(7)

Extending ProbLog with Continuous Distributions

83

Since A and B are both ﬁnite, one can construct a partition C such that it subsumes both A and B, that is ∀I ∈ A : ∃I1 , . . . , In ∈ C : I = I1 ∪ . . . ∪ In and ∀I ∈ B : ∃I1 , . . . , In ∈ C : I = I1 ∪ . . . ∪ In Because A is admissible and by construction of C, we can represent any summand in (6) as a sum over intervals in C. That is, for each L ⊆ LF and each I ∈ A there exist I1 , . . . , In ∈ C such that PP (L|F ) · PP (X ∈ I|F c ) =

n

PP (L|F ) · PP (X ∈ Ii |F c ) .

(8)

i=1

Because A is a partition and by construction of C, the intervals needed to cover I ∈ A are disjoint from the intervals needed to cover I ∈ A if I = I . Therefore PP (L|F )·PP (X ∈ I|F c ) = PP (L|F )·PP (X ∈ I|F c ) (9) I∈A: L∪LI ∪BK|=q

I∈C: L∪LI ∪BK|=q

for any subprogram L ⊆ LF . From (9) and the deﬁnition of the success probability (5) follows Ps,A (q|T ) = Ps,C (q|T ) . Similarly, one can show that Ps,B (q|T ) = Ps,C (q|T ) .

Theorem 1 and 2 guarantee that the semantics of Hybrid ProbLog, i.e. the fragment that restricts the usage of continuous values, is well-deﬁned. The imposed restrictions provide a balance between expressivity and tractability. They allow one to discretize the space Rn of possible assignments to the continuous facts in multidimensional intervals such that the actual values within one interval do not matter. In turn, this makes eﬃcient inference algorithms possible. Comparing two continuous values against each other would couple them. This would require a more complicated discretization of Rn in the form of polyhedra which are harder to represent and to integrate over. Allowing arbitrary functions to be applied on continuous values, eventually, leads to a fragmentation of the space in arbitrary sets. This makes exact inference virtually intractable.

4

Exact Inference

In this section we present an exact inference algorithm for Hybrid ProbLog. Our approach generalizes De Raedt et al.’s BDD algorithm [8] and generates a BDD [5] that is evaluated by a slight modiﬁcation of the original algorithm. The pseudocode is shown in Algorithm 1, 2 and 3. In the remainder of this section, we explain the inference steps on Example 2 and calculate the success probability of the query catchcold.

84

B. Gutmann, M. Jaeger, and L. De Raedt

Algorithm 1. The inference algorithm collects all possible proofs and partitions the Rn space according to the constraints imposed by each proof. The intermediate variables fu and cu are superﬂuous and have been added to simplify the explanations in this section. 1: function SuccessProb(query q, theory T ) 2: {(fi , ci , di )}1≤i≤m ← FindAllProofs(T, q) Backtracking in Prolog 3: for cθ ∈ ∪1≤i≤m ci do Iterate over used ground continuous facts 4: Acθ ←CreatePartition({d1 , . . . , dm }) 5: {bcθ,I }I∈Acθ ←CreateAUXBodies(Acθ ) 6: end for 7: u←0 # disjoint proofs 8: for i = 1, 2, . . . , m do Go over all proofs 9: (ˆ c1 θˆ1 , . . . , cˆt θˆt ) ← ci All cont. facts of proof i (this simpliﬁes notation) 10: (dˆ1 , . . . , dˆt ) ← di Intervals in proof i (this simpliﬁes notation) 11: for (I1 , . . . , It ) ∈ Acˆ1 θˆ1 × · · · × Acˆt θˆt do Go over all possible intervals 12: if (d1 ∩ I1 = ∅) ∧ . . . ∧ (dt ∩ It = ∅) then 13: u←u+1 Add one more disjoint proof 14: fu ← fi Probabilistic facts stay the same 15: cu ← ci Continuous facts stay the same 16: du ← {dom(ˆ c1 θˆ1 ) = I1 , . . . , dom(ˆ ct θˆt ) = It } Domains are adapted 17: fu ← fi ∪ {bcθ,I |cθ ∈ cu , I ∈ du } Add aux. bodies to the facts 18: end if 19: end for 20: end for 21: BDD ←GenerateBDD( 1≤i≤u f ∈f f ) cf. [9] i 22: return Prob(root(BDD)) cf. [8] 23: end function

1. All proofs for catchcold are collected by SLD resolution (Line 2 in Algorithm 1). f1 = {rain} f2 = ∅

c1 = {temp(T)} c2 = {temp(T)}

d1 = {T ∈ (−∞, 5)} d2 = {T ∈ (−∞, 0)}

Each proof is described by a set of probabilistic facts fi , a set of continuous facts ci , and an interval for each continuous variable in ci . When a continuous fact is used within a proof, it is added to ci and the corresponding variable X is added to di with X ∈ (−∞, ∞). When later on above(X,c1 ) is used in the same proof, the interval I stored in di is replaced by I ∩ (c1 , ∞), similarly for below(X,c2 ) it is replaced by I ∩ (−∞, c2 ), and for ininterval(X, c1, c2 ) it is replaced by I ∩ [c1 , c2 ], 2. We partition R1 because one continuous fact is used. The loop in Line 3 of Algorithm 1 iterates over (∪1≤i≤m ci ) = {temp(T)}. When calling the function CreatePartition({d1 , d2 }) (cf. Algorithm 2) we obtain the admissible partition {(−∞, 0), [0, 5), [5, ∞)} which is used to disjoin the proofs with respect to the continuous facts (Line 8-20 in Algorithm 1):

Extending ProbLog with Continuous Distributions

85

Algorithm 2. This function returns a partition of R by creating intervals touching the given intervals. Partitions of Rn can be obtain by building the cartesian product over the partitions for each dimension. This is possible due to the restrictions imposed in Section 3. 1: function CreatePartition(Set of intervals D = {d1 , . . . dm }) 2: C← m lowi and highi are interval endpoints of di i=1 {lowi , highi } 3: C ← C ∪ {−∞, ∞} add upper and lower limit of R 4: (c1 , . . . , ck ) ←SortAndIgnoreDuplicates(c) 5: Result ← { (−∞, c2 ], (ck−1 , ∞) } c1 = −∞ and ck = ∞ 6: for i = 2, . . . , k − 1 do 7: Result ← Result ∪ { (ci−1 , ci ] } 8: end for 9: return Result 10: end function

f1 = {rain} f2 = {rain}

c1 = {temp(T)} c2 = {temp(T)}

d1 = {T ∈ (−∞, 0)} d2 = {T ∈ [0, 5)}

f3 = ∅

c3 = {temp(T)}

d3 = {T ∈ (−∞, 0)}

3. We create one auxiliary fact per continuous fact and interval. They are dependent, i.e. temp(T)[−∞,0) and temp(T)[0,5) cannot be true at the same time. We have to make the dependencies explicit by adding, conceptually, the following clauses to the theory and replacing calls to continuous facts and background predicates by the bodies bcθ,I : call temp(T)(−∞,0) :- temp(T)(−∞,0) call temp(T)[0,5) :- ¬temp(T)(−∞,0) , temp(T)[0,5) call temp(T)[5,∞) :- ¬temp(T)(−∞,0) , ¬temp(T)[0,5) , temp(T)[5,∞) Only one of the clauses can be true at the same time. The bodies encode a linear chain of decisions. The probability attached to an auxiliary fact temp(T)[l,h) is the conditional probability that the sampled value of T is in the interval [l, h) given it is not in (−∞, l) ⎡ h ⎤ ⎡ ⎤−1 l P temp(T)[l,h] := ⎣ N (2, 8, x) dx⎦ · ⎣1 − N (2, 8, x) dx⎦ l

(10)

−∞

where N is the density of the Gaussian speciﬁed for temp/1 in the program. This encodes a switch (cf. [11]) such that the success probability of h call temp(T)[l,h] is exactly l N (2, 8, x) dx. To evaluate the cumulative density function, we use the function Phi as described in [10]. If we want to use any other distribution, we have to only replace the evaluation function of the

86

B. Gutmann, M. Jaeger, and L. De Raedt

Algorithm 3. To evaluate the BDD we run a modiﬁed version of De Raedt et al.’s algorithm that takes the conditional probabilities for each continuous node into account. For Gaussian-distributed continuous facts we use the function h Phi [10] to evaluate li i N (x, μi , σi ) dx which performs a Taylor approximation of the cumulative density function (CDF). If the program uses distributions other than Gaussians, the user has to provide the corresponding CDF. 1: function Prob(node n) 2: if n is the 1-terminal then return 1 3: if n is the 0-terminal then return 0 4: Let h and l be the high and low children of n 5: ph ← Prob(h) 6: pl ← Prob(l) 7: if n is a continuous node with attached interval [a, b] and density φn then −1 ln h 8: p ← lnn φn (x) dx · 1 − −∞ φn (x) dx 9: else 10: p ← pn the probability attached to the fact in the ProbLog program 11: end if 12: return p · ph + (1 − p) · pl 13: end function

density, as all the rest of the algorithm does not depend on the particular distribution. Adding the bodies of the auxiliary clauses to fi yields the ﬁnal set of proofs (Line 17 in Algorithm 1): f1 = {rain, temp(T)(−∞,0) } f2 = {rain, ¬temp(T)(−∞,0) , temp(T)[0,5) } f3 = {temp(T)(−∞,0) } The proofs are now disjoint with respect to the continuous facts. That is, either the intervals for continuous facts are disjoint or identical. With respect to the probabilistic facts, they are not disjoint and summing up the probabilities of all proofs would yield a wrong result. One would count the probability mass of the overlapping parts multiple times [8]. 4. To account for that, we translate the proofs into a Boolean expression in disjunctive normal form (cf. Line 21 in Algorithm 1) and represent it as BDD (cf. Figure 1). This step is similar to ProbLog’s inference mechanism rain ∧ temp(T)(−∞,0) ∨ rain ∧ ¬temp(T)(−∞,0) ∧ temp(T)[0,5) ∨ temp(T)(−∞,0) 5. We evaluate the BDD with Algorithm 3 and get the success probability of catchcold. This is a slight modiﬁcation of De Raedt et al.’s algorithm (cf. [8,9] for the details) that takes into account the continuous nodes.

Extending ProbLog with Continuous Distributions

⎛ p =⎝

temp(T)(−∞,0)

87

⎞⎛

⎞ −1 −∞ N (x, 2, 8) dx⎠ ⎝1 − N (x, 2, 8) dx)⎠

0

−∞

−∞

≈0.401 1

Prob =1 · 0.401 + 0.327 · (1 − 0.401) ≈ 0.597

0

rain

p =0.8 Prob =0.409 · 0.8 + 0 · (1 − 0.8) ≈ 0.327

1

0 ⎛ p =⎝

temp(T)[0,5) 1

1

⎞⎛ N (x, 2, 8) dx⎠ ⎝1 −

0

0

⎞−1 N (x, 2, 8) dx)⎠

−∞

≈0.409

0

Prob = 1

5

Prob =1 · 0.409 + 0 · (1 − 0.409) ≈ 0.409 0

Prob = 0

Fig. 1. This BDD [5] encodes all proofs of catchcold in the theory from Example 2. The dashed boxes show the intermediate results while traversing the BDD with Algorithm 3. The success probability of the query is returned at the root and is 0.597.

The function CreatePartition (cf. Algorithm 2) does not necessarily return an admissible partition as it ignores the interval endpoints by creating right-open intervals. For instance, if one obtains two proofs which impose as constraint the intervals [1, 2] and [2, 3), the minimal admissible partition is {(−∞, 1), [1, 2), [2, 2], (2, 3), [3, ∞)} . The function CreatePartition, however, returns the inadmissible partition {(−∞, 1), [1, 2), [2, 3), [3, ∞)} . With respect to the interval [2, 3), the ﬁrst proof succeeds for x = 2 but fails for any other value in [2, 3) – which is not allowed for admissible intervals (cf. Deﬁnition 1). Though, when calculating the success probability, one can ignore interval h endpoints. Since the calculation involves integrals of the form li i φ(x) dx, it is irrelevant whether intervals are open or closed (cf. Equation (10)). Also, an integral over a single point interval has value 0. However, when one wants to know whether there is a proof with speciﬁc values for some or all continuous facts, one has to be precise about the interval endpoints

88

B. Gutmann, M. Jaeger, and L. De Raedt

f(Val2, 2) 1

1 2 1 4

1 3 1 5

0

0

11 1 54 3

1 2

1 f(Val1, 1)

Fig. 2. The query s(5, 2) succeeds, if both values f(Val1, 1) and f(Val2, 2) lie in one of the intervals [0, 11 ], [0, 12 ], . . ., [0, 15 ]. These areas correspond to the thick-lined squares starting at (0, 0). Since they overlap, one has to partition the space R2 in order to disjoin the proofs. Due to the restrictions of Hybrid ProbLog program, i.e., continuous variables cannot be compared against each other, one can obtain an admissible partition for each dimension independently. Algorithm 2 returns the partitions shown by the dotted lines. The horizontal lines partition the space of f(Val2, 2) and the vertical the space of f(Val1, 1).

and use a modiﬁed algorithm. Admissibility can be ensured, for instance, by creating for each pair of constants the open interval (li , hi ) and the single point interval [li , hi ]. For the former example this is {(−∞, 1), [1, 1], (1, 2), [2, 2], (2, 3), [3, 3], (3, ∞)} .

5

Experiments

We implemented Hybrid ProbLog in YAP 6.0.7 and set up experiments to answer the question How does the inference algorithm (cf. Algorithm 1) scale in the size of the partitions and in the number of ground continuous facts? In domains where exact inference is feasible, the number of continuous facts and comparison operations is typically small compared to the rest of the theory. Our algorithm is an intermediate step between SLD resolution and BDD generation. Therefore, it is useful to know how much the disjoining operations cost compared to the other inference steps. We tested our algorithm on the following theory: (Val, gaussian(0, 1)) :: f(Val, ID). s(Consts, Facts) :- between(1, Facts, ID), between(1, Consts, Top), High is Top/Consts, f(Val, ID), ininterval(Val, 0, High).

Extending ProbLog with Continuous Distributions

89

1200 SLD Resolution Disjoin BDD Script BDD total

1000

time [ms]

800 600

400

200

0 0

10

20

30

40

50

60

70

80

90

100

number of constants Fig. 3. Runtimes for calculating the success probability of s(Consts, Facts) for varying the number of constants s(1, 1), · · · s(100, 1). As the graphs show, most of the time is spent on disjoining the proofs, that is partitioning the domains. The BDD time stays more or less constant, this is due to the fact that the resulting Boolean expression, i.e. ¬s(Val, 1)(−∞,0) ∧ s(Val, 1)[0, 1 ) ∨ s(Val, 1)[ 1 , 1 ) ∨ . . . ∨ s(Val, 1)[ 1 ,1) , is rather n n n−1 2 simple. This can be detected and exploited by the BDD package.

The query s(Consts, Facts) has Consts × Facts many proofs where both arguments have to be positive integers. The ﬁrst argument determines the number of partitions needed to disjoin the proofs with respect to the continuous facts and the second argument determines how many continuous facts are used. The query s(5, 2), for instance, uses two continuous facts, f(Val1, 1) and f(Val2, 1), and compares them to the intervals [0, 1], [0, 12 ], · · · [0, 15 ]. Figure 2 shows the resulting partitioning when proving the query s(5, 2). In general, one obtains (Consts + 1)Facts many partitions of the space RFacts . The success probability of s(Consts, Facts) is independent of Consts. That is, for ﬁxed Facts and any c1 , c2 ∈ N Ps (s(c1 , Facts)|T ) = Ps (s(c2 , Facts)|T ) We ran two series of queries3 . First, we used one continuous fact and varied the number of constants from 1 to 100. As the graph in Figure 3 shows, the disjoin 3

The experiments were performed on an Intel Core 2 Quad machine with 2.83GHz and 8GB of memory. We used the CUDD package for BDD operations and set the reordering heuristics to CUDD REORDER GROUP SIFT. Each query has been evaluated 20 times and the runtimes were averaged.

90

B. Gutmann, M. Jaeger, and L. De Raedt 100000 10000

time [ms]

1000 100 10 SLD Resolution Disjoin BDD Script BDD total

1 0.1 0.01 0

10

20

30

40

50

60

70

80

90

100

number of ground continuous facts Fig. 4. Runtimes for calculating the success probability of s(Consts, Facts) for varying the number of dimensions s(5, 1), . . . , s(5, 100). In this setting, most of the time is spent in the BDD package, that is building the BDD based on the script and traversing it. The runtime for our disjoin operation grows only linearly. This is due to the fact that the partitions of Rn can be factorized into each dimensions because we do not allow comparisons between two continuous variables.

operation – that is ﬁnding all partitions, generating the auxiliary bodies and rewriting the proofs – runs in O(Consts2 ) when everything else stays constant. In this case, due to compression and pruning operations during the BDD script generation [9] (the input for the BDD package), building and evaluating the BDD runs in quasi-linear time. In the second run, we varied the number of continuous facts by evaluating the queries s(5, 1), · · · , s(5, 100). As Figure 4 shows, our algorithm (depicted by the Disjoin graph) runs in linear time. The runtime for the BDD operations grows exponentially due to the reordering heuristics used by the BDD package.

6

Conclusions and Future Work

We extended ProbLog with continuous distributions and introduced an exact inference algorithm. The expressivity has been restricted to make inference tractable. Possible directions for future work include comparisons between two continuous facts and applying functions on continuous values. We are working on upgrading existing ProbLog parameter learning methods to continuous facts. ProbLog is available for download at http://dtai.cs.kuleuven.be/problog.

Extending ProbLog with Continuous Distributions

91

Acknowledgments Bernd Gutmann is supported by the Research Foundation-Flanders (FWOVlaanderen). This work is supported by the GOA/08/008 project “Probabilistic Logic Learning”.

References 1. Vennekens, J., Denecker, M., Bruynooghe, M.: Representing causal information about a probabilistic process. In: Fisher, M., van der Hoek, W., Konev, B., Lisitsa, A. (eds.) JELIA 2006. LNCS (LNAI), vol. 4160, pp. 452–464. Springer, Heidelberg (2006) 2. Sato, T.: A statistical learning method for logic programs with distribution semantics. In: Sterling, L. (ed.) Proceedings of the Twelfth International Conference on Logic Programming (ICLP 1995), pp. 715–729. MIT Press, Cambridge (1995) 3. Milch, B., Marthi, B., Russell, S.J., Sontag, D., Ong, D.L., Kolobov, A.: Blog: Probabilistic models with unknown objects. In: Kaelbling, L.P., Saﬃotti, A. (eds.) IJCAI 2005: Proceedings of the Nineteenth International Joint Conference on Artiﬁcial Intelligence, Edinburgh, Scotland, UK, July 30-August 5, pp. 1352–1359. Professional Book Center (2005) 4. Goodman, N., Mansinghka, V.K., Roy, D.M., Bonawitz, K., Tenenbaum, J.B.: Church: a language for generative models. In: McAllester, D.A., Myllym¨ aki, P. (eds.) UAI 2008: Proceedings of the 24th Conference in Uncertainty in Artiﬁcial Intelligence, July 9-12, pp. 220–229. AUAI Press, Helsinki (2008) 5. Bryant, R.E.: Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers 35(8), 677–691 (1986) 6. Wang, J., Domingos, P.: Hybrid markov logic networks. In: Fox, D., Gomes, C.P. (eds.) Proceedings of the Twenty-Third AAAI Conference on Artiﬁcial Intelligence, AAAI 2008, July 13-17, pp. 1106–1111. AAAI Press, Menlo Park (2008) 7. Murphy, K.: Inference and learning in hybrid bayesian networks. Technical Report UCB/CSD-98-990, University of Berkeley (1998) 8. De Raedt, L., Kimmig, A., Toivonen, H.: ProbLog: A probabilistic Prolog and its application in link discovery. In: Veloso, M.M. (ed.) IJCAI 2007: Proceedings of the 20th International Joint Conference on Artiﬁcial Intelligence, Hyderabad, India, pp. 2462–2467 (2007) 9. Kimmig, A., Santos Costa, V., Rocha, R., Demoen, B., De Raedt, L.: On the eﬃcient execution of probLog programs. In: Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. LNCS, vol. 5366, pp. 175–189. Springer, Heidelberg (2008) 10. Marsaglia, G.: Evaluating the normal distribution. Journal of Statistical Software 11(5), 1–11 (2004) 11. De Raedt, L., Demoen, B., Fierens, D., Gutmann, B., Janssens, G., Kimmig, A., Landwehr, N., Mantadelis, T., Meert, W., Rocha, R., Santos Costa, V., Thon, I., Vennekens, J.: Towards digesting the alphabet-soup of statistical relational learning. In: Roy, D., Winn, J., McAllester, D., Mansinghka, V., Tenenbaum, J. (eds.) Proceedings of the 1st Workshop on Probabilistic Programming: Universal Languages, Systems and Applications, Whistler, Canada (December 2008)

Multivariate Prediction for Learning on the Semantic Web Yi Huang1, Volker Tresp1 , Markus Bundschus2, Achim Rettinger3 , and Hans-Peter Kriegel2 1

2

Siemens AG, Corporate Technology, Munich, Germany Ludwig-Maximilians-Universit¨at M¨unchen, Munich, Germany 3 Karlsruhe Institute of Technology, Karlsruhe, Germany

Abstract. One of the main characteristics of Semantic Web (SW) data is that it is notoriously incomplete: in the same domain a great deal might be known for some entities and almost nothing might be known for others. A popular example is the well known friend-of-a-friend data set where some members document exhaustive private and social information whereas, for privacy concerns and other reasons, almost nothing is known for other members. Although deductive reasoning can be used to complement factual knowledge based on the ontological background, still a tremendous number of potentially true statements remain to be uncovered. The paper is focused on the prediction of potential relationships and attributes by exploiting regularities in the data using statistical relational learning algorithms. We argue that multivariate prediction approaches are most suitable for dealing with the resulting high-dimensional sparse data matrix. Within the statistical framework, the approach scales up to large domains and is able to deal with highly sparse relationship data. A major goal of the presented work is to formulate an inductive learning approach that can be used by people with little machine learning background. We present experimental results using a friend-ofa-friend data set.

1 Introduction The Semantic Web (SW) is becoming a reality. Most notably is the development around the Linked Open Data (LOD) initiative, where the term Linked Data is used to describe a method of exposing, sharing, and connecting data via dereferenceable Unique Resource Identifiers (URIs) on the Web. Typically, existing data sources are published in the Semantic Web’s Resource Description Framework (RDF), where statements are expressed as simple subject-property-object (s, p, o) triples and are graphically displayed as a directed labeled link between a node representing the subject and a node representing the object (Figure 1). Data sources are interlinked with other data sources in the LOD cloud. In some efforts, subsets of the LOD cloud are retrieved in repositories and some form of logical reasoning is applied to materialize implicit triples. The number of inferred triples is typically on the order of the number of explicit triples. One can certainly assume that there are a huge number of additional true triples which are neither known as facts nor can be derived from reasoning. This might concern both P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 92–104, 2011. c Springer-Verlag Berlin Heidelberg 2011

Multivariate Prediction for Learning on the Semantic Web

93

triples within one of the contributing data sources such as DBpedia1 (intralinks), and triples describing interlinks between the contributing data sources. The goal of the work presented here is to estimate the truth values of triples exploiting patterns in the data. Here we need to take into account the nature of the SW. LOD data is currently dynamically evolving and quite noisy. Thus flexibility and ease of use are preferred properties if compared to highly sophisticated approaches that can only be applied by machine learning experts. Reasonable requirements are as follows: – Machine learning should be “push-button” requiring a minimum of user intervention. – The learning algorithm should scale well with the size of the SW. – The triples and their probabilities, which are predicted using machine learning, should easily be integrated into SPARQL-type querying.2 – Machine learning should be suitable to the data situation on the SW with sparse data (e.g., only a small number of persons are friends) and missing information (e.g., some people don’t reveal private information). Looking at the data situation, there are typically many possible triples associated with an entity (these triples are sometimes called entity molecules or, in our work, statistical unit node set) of which only a small part is known to be true. Due to this large degree of sparsity of the relationship data in the SW, multivariate prediction is appropriate for SW learning. The rows, i.e., data points in the learning matrix are defined by the key entities or statistical units in the sample. The columns are formed by nodes that represent the truth values of triples that involve the statistical units. Nodes representing aggregated information form the inputs. The size of the training data set is under the control of the user by means of sampling. Thereby the data matrix size, and thus also training time, can be made independent or only weakly dependent on the overall size of the SW. For the experiments in this paper we use the friend-of-a-friend (FOAF) data set, which is a distributed social domain describing persons and their relationships in SW-format. Our approach is embedded in a statistical framework requiring the definition of a statistical unit and a population. In our experiments we compare different sampling approaches and analyze generalization on a test set. The paper is organized as follows. In the next section we discuss related work, In Section 3 we discuss how machine learning can be applied to derive probabilistic weights for triples whose truth values are unknown and introduce our approach. In Section 4 we present experimental results using a friend-of-a-friend (FOAF) data set. Finally, Section 5 contains conclusions and outlines further work.

2 Related Work The work on inductive databases [1] pursues similar goals but is focussed on the lessproblematic data situation in relational databases. In [2] the authors describe SPARQLML, a framework for adding data mining support to SPARQL. SPARQL-ML was 1 2

http://dbpedia.org/ SPARQL is a new standard for querying RDF-specific information and for displaying querying results.

94

Y. Huang et al.

Fig. 1. Example of an RDF graph displaying a social friendship network in which the income of a person is an attribute. Resources are represented by circular nodes and triples are represented by labeled directed links from subject node to object node. The diamond-shaped nodes stand for random variables which are in state one if the corresponding triples exist. Nodes representing statistical units (here: Persons) have a darker rim.

inspired by Microsoft’s Data Mining Extension (DMX). A particular ontology for specifying the machine learning experiment is developed. The SRL methods in [2] are ILP-type approaches based on a closed-world assumption (Relational Bayes Classifier (RBC) and Relational Probabilistic Trees (RPT)). This is in difference to the work presented here, which maintains more of an open-world assumption that is more appropriate in the context of the SW. Another difference is that in our work, both model training and statement prediction can be performed off-line, if desired. In this case inferred triples with their associated certainty values can be stored , e.g., in a triple store, enabling fast query execution. Unsupervised approaches (examples that are suitable for the relational SW domain are [3–6]) are quite flexible and interpretable and provide a probability distribution over a relational domain. Although unsupervised approaches are quite attractive, we fear that the sheer size of the SW and the huge number of potentially true statements make these approaches inappropriate for Web-scale applications. Supervised learning, where a model is trained to make a prediction concerning a single random variable typically shows better predictive performance and better scalability. Typical examples are many ILP approaches [7, 8] and propositionalized ILP approaches [9, 10]. Multivariate prediction generalizes supervised learning to predict several variables jointly, conditioned on some inputs. The improved predictive performance in multivariate prediction, if compared to simple supervised learning, has been attributed to the sharing of statistical strength between the multiple tasks, i.e., data is used more efficiently see [11] and citations therein for a review). Due to the large degree of sparsity of the relationship data in the SW, we expect that multivariate prediction is quite interesting for SW learning and we will apply it in the following.

Multivariate Prediction for Learning on the Semantic Web

95

3 Statistical Modeling 3.1 Defining the Sample We must be careful in defining the statistical unit, the population, the sampling procedure and the features. A statistical unit is an object of a certain type, e.g., a person. The population is the set of statistical units under consideration. In our framework, a population might be defined as the set of persons that attend a particular university. For learning we use a subset of the population. In the experimental section we will explore various sampling strategies. Based on the sample, a data matrix is generated where the statistical units in the sample define the rows. 3.2 The Random Variables in the Data Matrix We now introduce for each potential triple a triple node drawn as a diamond-shaped node in Figure 1. A triple node is in state one (true) if the triple is known to exist and is in state zero (false) if the triple is known not to exist. Graphically, one only draws the triple nodes in state one, i.e., the existing triples. We now associate some triples with statistical units. The idea is to assign a triple to a statistical unit if the statistical unit appears in the triple. Let’s consider the statistical unit Jane. Based on the triples she is participating in, we obtain (?personA, typeOf, Person), (Joe, knows, ?personA), and (?personA, hasIncome, High) where ?personA is a variable that represents a statistical unit. The expressions form the random variables (outputs) and define columns in the data matrix.3 By considering the remaining statistical units Jack and Joe we generate the expressions (columns), (?personA, knows, Jane) and (Jack, knows, ?personA). We will not add (Jane, knows, ?personA) since Jane considers no one in the data base to be her friend. We iterate this procedure for all statistical units in the sample and add new expressions (i.e., columns in the data matrix), if necessary. Note that expressions that are not represented in the sample will not be considered. Also, expressions that are rarely true (i.e., for few statistical units) will be removed since no meaningful statistics can be derived from few occurrences. In [12] the triples associated with a statistical unit were denoted as statistical unit node set (SUNS). The matrix formed with the N statistical units as rows and the random variables as columns is denoted as Y . 3.3 Non-random Covariates in the Data Matrix The columns we have derived so far represent truth values of actual or potential triples. Those triples are treated as random variables in the analysis. If the machine learning algorithm predicts that a triple is very likely, we can enter this triple in the data store. We now add columns that provide additional information for the learning algorithm but which we treat as covariates or fixed inputs. First, we derive simplified relations from the data store. More precisely, we consider the expressions derived in the last subsection and replace constants by variables. For 3

Don’t confuse a random variable representing the truth value of a statement with a variable in a triple, representing an object.

96

Y. Huang et al.

example, from (?personA, knows, Jane) we derive (?personA, knows, ?personB) and count how often this expression is true for a statistical unit ?personA, i.e., we count the number of friends of person ?personA. Second, we consider a simple type of aggregated features from outside a SUNS. Consider first a binary triple (?personA, knows, Jane) . If Jane is part of another binary triple, in the example, (?personA, hasIncome, High) then we form the expression (?personA, knows, ?personB) ∧ (?personB, hasIncome, High) and count how many rich friends a person has. A large number of additional features are possible but so far we restricted ourselves to these two types. The matrix formed with the N statistical units as rows and the additional features as columns is denoted as X. After construction of the data matrix we prune away columns in X and in Y which have ones in fewer than percent of all rows, where is usually a very small number. This is because for those features no meaningful statistical analysis is possible. Note that by applying this pruning procedure we reduce the exponential number of random variables to typically a much smaller set. 3.4 Algorithms for Learning with Statistical Units Node Sets In a statistical setting as described above, the statistical unit node set (SUNS) is defined mostly based on local neighborhoods of statistical units. By adding aggregated information derived from the neighborhood, homophily can also be modeled. For instance, the income of a person can be predicted by the average income of this person’s friends. As we will see in the experiments, the resulting data matrices are typically highdimensional and sparse. In this situation, multivariate prediction approaches have been most successful [11]. In multivariate prediction all outputs are jointly predicted such that statistical strength can be shared between outputs. The reason is that some or all model parameters are sensitive to all outputs, improving the estimates of those parameters.4 We apply four different multivariate prediction approaches. First, we utilize a reduced rank penalized regression (RRPP) algorithm to obtain an estimated matrix via the formula dk ˆ Y = Ur diagr UrT Y dk + λ where dk and Ur are derived from a r-rank eigen decomposition of the kernel matrix k K ≈ Ur Dr UrT . Ur is a N × r matrix with r orthonormal columns, diagr dkd+λ is a diagonal matrix containing the r largest eigen values and λ is a regularization parameter. The kernel matrix K can be defined application specifically. Typically, as in the following application, one works with a linear kernel defined by K = ZZ T , where Z = [αX, Y ] is formed by concatenating X and Y and where α is a positive weighting factor.5 4

5

Although the completion is applied to the entire matrix, only zeros —representing triples with unknown truth values— are overwritten. Alternatively, we can define a linear kernel solely based on the input attributes K = XX T , when α → ∞, or solely based on the output attributes K = Y Y T , when α = 0.

Multivariate Prediction for Learning on the Semantic Web

97

Fig. 2. Entity-relationship diagram of the LJ-FOAF domain

Besides RRPP we investigate three other multivariate prediction approaches based on matrix completion, i.e., singular value decomposition (SVD), non-negative matrix factorization (NNMF) [13] and latent Dirichlet allocation (LDA) [14]. All approaches estimate unknown matrix entries via a low-rank matrix approximation. NNMF is a decomposition under the constraints that all terms in the factoring matrices are nonnegative. LDA is based on a Bayesian treatment of a generative topic model. After matrix completion of the zero entries in the data matrix, the entries are interpreted as certainty values that the corresponding triples are true. After training, the models can also be applied to statistical units in the population outside the sample.

4 Experiments 4.1 Data Set and Experimental Setup Data Set. The experiments are based on friend-of-a-friend (FOAF) data. The purpose of the FOAF project [15] is to create a web of machine-readable pages describing people, their relationships, and people’s activities and interests, using W3C’s RDF technology. The FOAF ontology is based on RDFS/OWL and is formally specified in the FOAF Vocabulary Specification 0.916. We gathered our FOAF data set from user profiles of the community website LiveJournal.com7. All extracted entities and relations are shown in Figure 2. In total we collected 32,062 persons and all related attributes. An initial pruning step removed little connected persons and rare attributes. Table 1 lists the number of different individuals (top rows) and their known instantiated relations (bottom rows) in the full triple set, in the pruned triple set and in triples sets in different experiment settings (explained below). The resulting data matrix, after pruning, has 14,425 rows (persons) and 15,206 columns. Among those columns 14,425 ones (friendship attributes) refer to the property knows. The remaining 781 columns (general attributes) refer to general information about age, location, number of blog posts, attended school, online chat account and interest. 6 7

http://xmlns.com/foaf/spec/ http://www.livejournal.com/bots/

98

Y. Huang et al.

setting 1

setting 2

setting 3

setting 4

Fig. 3. Evaluated sampling strategies

Data Retrieval and Sampling Strategies. In our experiments we evaluated the generalization capabilities of the learning algorithms given eight different settings. The first four settings are illustrated in Figure 3. A cloud symbolizes the part of the Web that can effectively be accessed (in our case the data set given in Table 1). Crosses represent persons that are known during the training phase (training set) and circles represent persons with knows relations that need to be predicted. Setting 1 describes the situation where the depicted part of the SW is randomly accessible, meaning that all instances can be queried directly from triple stores. Statistical units in the sample for training are randomly sampled and statements for other randomly selected statistical units are predicted for testing (inductive setting). In this setting, persons are rarely connected by the knows relations. The knows relation in the training and test set is very sparse (0.18%). Setting 2 also shows the situation where statistical units in the sample are randomly selected, but this time the truth values of statements concerning the statistical units in the training sample are predicted (transductive setting). Some instances of the knows relation of the selected statistical units are withheld from training and used for prediction. Prediction should be easier here since the statistics for training and prediction match perfectly. Setting 3 assumes that the Web address of one user (i.e., one statistical unit) is known. Starting from this random user, users connected by the knows relation are gathered by breadth-first crawling and are then added as rows in the training set. The test set is gathered by continued crawling (inductive setting). In this way all profiles are (not necessarily directly) connected and training profiles show a higher connectivity (1.02%) compared to test profiles (0.44%). In this situation generalization can be expected to be easier than in setting 1 and 2 since local properties are more consistent than global ones. Setting 4 is the combination of settings 2 and 3. The truth values of statements concerning the statistical units in the training sample are predicted (transductive setting). Instances of the knows relation are withheld from training and used for prediction. Settings 5-8 use the same set of statistical units as settings 1-4 respectively. The difference is that in settings 1-4 the data matrix only contains friendship relations to persons in the sample whereas in settings 5-8, the data matrix contains friendship relations any persons in the population. In settings 5-8 we remove those users (friendship attributes) who are known by less than ten users (statistical units),

Multivariate Prediction for Learning on the Semantic Web

99

i.e., = 10. We ended up with a large number of ones in the data matrix when compared to settings 1-4. The concrete numbers of the statistical units and the friendship attributes are shown in Person (row) and Person (col) respectively in Table 1. Evaluation Procedure and Evaluation Measure. The task is to predict potential friends of a person, i.e., knows statements. For each person in the data set, we randomly selected one knows friendship statement and set the corresponding matrix entry to zero, to be treated as unknown (test statement). In the test phase we then predicted all unknown friendship entries, including the entry for the test statement. The test statement should obtain a high likelihood value, if compared to the other unknown friendship entries. Here we use the normalized discounted cumulative gain (NDCG) [16] (described in the Appendix) to evaluate a predicted ranking. Benchmark methods. Baseline: Here, we create a random ranking for all unknown triples, i.e., every unknown triple gets a random probability assigned. Friends of friends in second depth (FOF, d=2): We assume that friends of friends of a particular person might be friends of that person too. From the RDF graph point of view the knows relation propagates one step further alongside the existing knows linkages. 4.2 Results In settings 1 and 2 we randomly sampled 2,000 persons for the training set. In addition, in setting 1 we further randomly sampled 2,000 persons for the test set. In setting 3, 4,000 persons were sampled, where the first half was used for training and the second half for testing. Setting 4 only required the 2,000 persons in the training set. In settings 5-8 we followed the same sampling strategies as in settings 1-4 respectively and extracted all users known by the sampled users to form the friendship attributes. In each case, sampling was repeated 5 times such that error bars could be derived. Table 1 reports details of the samples (training set and, if applicable, test set). The two benchmark methods and the four multivariate prediction approaches proposed in Section 3.4 were then applied to the training set. For each sample we repeated the evaluation procedure as described above 10 times. Since NNMF is only applicable in a transductive setting, it was only applied in setting 1, 3, 5 and 7. Moreover, the FOF, d=2 is not applicable in settings 5-8, since it is impossible for many statistical units to access the friends of their friends. Figures 4 and 5 show the experimental results for our FOAF data set. The error bars show the 95% confidence intervals based on the standard error of the mean over the samples. The figures plot the NDCG all score of the algorithms against the number of latent variables in settings 1, 2, 5, 6 in Figure 4 and in settings 3, 4, 7, 8 in Figure 5. The best NDCG all scores of all algorithms in different settings are shown in Table 2, where r indicates the number of latent variables achieving the best scores. First, we observe that the experimental results in settings 5-8 are much better than those in settings 1-4. This can be attributed to the fact that in settings 5-8 columns were pruned more drastically and a more dense friendship pattern was achieved. Another observation is that all four multivariate prediction approaches clearly outperform the benchmark algorithms in all settings, although in settings 1 and 2 NNMF and SVD are only slightly better than FOF, d=2.

2,000 2,000 2,000 2,000 2,000 2,000 320 320 320 329 329 329 118 118 118 5 5 5 4 4 4 5 5 5 7,339 40,786 17,613 0.18% 1.02% 0.44% 1,106 1,172 1,217 747 718 749 246 216 208 1,087 1,168 1,075 715 779 784 1,992 1,994 1,991

setting 1 setting 2 setting 3 training test training test

32,062 14,425 2,000 2,000 - 2,000 2,000 5,673 320 320 320 15,744 329 329 329 4,695 118 118 118 5 5 5 5 4 4 4 4 5 5 5 5 530,831 386,327 7,311 7,339 0.05% 0.19% 0.18% 0.18% 24,368 7,964 1,122 1,106 31,507 5,088 676 747 9,616 1,659 206 246 19,021 8,319 1,134 1,087 10,040 5,287 777 715 31,959 14,369 1,993 1,992

pruned

setting 5 training test

2,000 2,000 2,000 2,000 1,122 1,122 320 320 320 329 329 329 118 118 118 5 5 5 4 4 4 5 5 5 40,786 14,909 16,869 1.02% 0.66% 0.75% 1,172 1,122 1,106 718 676 747 216 206 246 1,168 1,134 1,087 779 777 715 1,994 1,993 1,992

setting 4

setting 7 training test

2,000 2,000 2,000 1,122 1,297 1,297 320 320 320 329 329 329 118 118 118 5 5 5 4 4 4 5 5 5 16,869 41,705 18,595 0.75% 1.61% 0.72% 1,106 1,172 1,217 747 718 749 246 216 208 1,087 1,168 1,075 715 779 784 1,992 1,994 1,991

setting 6 2,000 1,297 320 329 118 5 4 5 41,705 1.61% 1,172 718 216 1,168 779 1,994

setting 8

setting 1

setting 2

Baseline 0.1092 ± 0.0003 0.1092 ± 0.0003 F OF, d = 2 0.2146 ± 0.0095 0.2146 ± 0.0095 NNMF NaN 0.2021 ± 0.0058 r=100 SV D 0.2174 ± 0.0061 0.2325 ± 0.0074 r=150 r=100 LDA 0.2514 ± 0.0049 0.2988 ± 0.0057 r=200 r=200 RRP P 0.2483 ± 0.0018 0.2749 ± 0.0037 r=400 r=400

Method

setting 4

0.1094 ± 0.0001 0.1094 ± 0.0001 0.1495 ± 0.0077 0.1495 ± 0.0077 NaN 0.2983 ± 0.0197 r=150 0.2085 ± 0.0147 0.3027 ± 0.0179 r=200 r=100 0.2288 ± 0.0123 0.3374 ± 0.0117 r=200 r=200 0.2252 ± 0.0049 0.3315 ± 0.0109 r=400 r=400

setting 3

setting 6

0.1213 ± 0.0005 0.1213 ± 0.0005 NaN NaN NaN 0.2864 ± 0.0067 r=150 0.2688 ± 0.0044 0.3176 ± 0.0092 r=150 r=150 0.2640 ± 0.0022 0.3359 ± 0.0079 r=150 r=200 0.2956 ± 0.0019 0.3582 ± 0.0049 r=400 r=400

setting 5

setting 8 0.1216 ± 0.0042 0.1216 ± 0.0042 NaN NaN NaN 0.3217 ± 0.0403 r=100 0.2407 ± 0.0413 0.3411 ± 0.0179 r=100 r=50 0.2331 ± 0.0143 0.3470 ± 0.0372 r=150 r=200 0.2607 ± 0.0088 0.3591 ± 0.0237 r=400 r=400

setting 7

Table 2. Best NDCG all averaged over samples with 95% confidence interval where r stands for the number of latent variables

Concept P erson (row) #Indivi. P erson (col) Location School Interest On.ChatAcc. Date #BlogP osts Role knows #Inst. (sparsity) residence attends has holds dateOf Birth posted

full

Table 1. Number of individuals and number of instantiated relations in the full triple set, in the pruned triple set (see text) and statistics for the different experimental settings

100 Y. Huang et al.

Multivariate Prediction for Learning on the Semantic Web

(a)

(c)

(b)

(d)

101

Fig. 4. Comparison between different algorithms. NDCG all is plotted against the number of latent variables: (a)-(d) for settings 1, 2, 5, 6 respectively.

Furthermore, we observe that LDA and RRPP outperform NNMF and SVD in each setting, and that LDA and RRPP are not sensitive to the number of latent variables as long as the chosen number is reasonably high. LDA reaches its maximum NDCG score, for instance, with r = 150 latent variables in setting 4 and the performance does not deteriorate when the number of latent factors is increased. The score of RRPP keeps increasing and does not drop down in the observed range of the number of latent variables. In contrast, NNMF and SVD are sensitive with respect to the predefined number of latent variables. Comparing the results over different settings we can observe that for the multivariate prediction approaches one obtains best performance in setting 4, next best performance in setting 2, then follows setting 1 and 3 is the most difficult setting. The corresponding order can be seen in settings 5-8. The baseline method, random guess, is independent to the settings and achieves almost the same score in all settings. The fact that the scores in settings 4 and 8 are the best indicates that a link-following sampling strategy in general gives better performance than random sampling. Similar results in statistical comparisons between random and link-following sampling have been obtained in other works, e.g., [17].

102

Y. Huang et al.

(a)

(c)

(b)

(d)

Fig. 5. Continue Figure 4: (a)-(d) for settings 3, 4, 7, 8 respectively

Finally, we observe that the prediction performance in setting 1 is only slightly worse than the prediction performance in setting 2, while the prediction performance in setting 4 is much better than in setting 3. This phenomenon occurs in settings 5-8 too. We attribute this to the general statistics in the training and the test set which are very different both in setting 3 and setting 7. In Table 1 it is apparent that for instance, in setting 3 the knows relation in the training data set (1.02%) is significantly more dense than in the test data set (0.44%). Intuitively speaking, the people in the training know each other quite well, but the people in the test do not know the people in the training as much.

5 Conclusions and Outlook The paper describes extensions to the SUNS approach introduced in [12]. The SUNS approach is based on multivariate prediction which is quite suitable for the typical SW data situation. In our experiments based on the FOAF data set, LDA and RRPP showed best performance, and the performance is insensitive to the rank of the approximation, resp. to the number of latent variables. This can be explained by the fact that LDA, in

Multivariate Prediction for Learning on the Semantic Web

103

contrast to NNMF, is a Bayesian approach and by the fact that the RRPP, in contrast to SVD, is regularized. Thus LDA or RRPP can be default methods being insensitive to exact parameter tuning. All four approaches exploited the benefits of multivariate prediction since approaches based on single predictions (not reported here) did not even reach the performance of the benchmark approaches. The proposed approach can be extended in many ways. One might want to allow the user to specify additional parameters in the learning process, if desired, along the line of the extensions described in [2]. Another extension concerns ontological background knowledge. So far, ontological background knowledge was considered by including logically inferred statements into learning. Ongoing work explores additional ways of exploiting ontological background information, e.g., for structuring the learning matrix. Finally we want to demonstrate how learned probabilistic statements can be queried. The following SPARQL query illustrates a query for LiveJournal users who live in Munich and might want to be Trelena’s friend: 1 2 3 4 5 6 7 8 9 10 11

PREFIX ya: http://blogs.yandex.ru/schema/foaf/ PREFIX foaf: http://xmlns.com/foaf/0.1/ PREFIX dc: http://purl.org/dc/elements/1.1/ SELECT DISTINCT ?person WHERE {?person ya:located ?city . ?person foaf:knows WITH PROB ?prob . FILTER REGEX(?city, "Munich") . } ORDER BY DESC(?prob)

The query includes the predicted knows triples for Trelena and rates them by predicted probability. Acknowledgements. We acknowledge funding by the German Federal Ministry of Economy and Technology (BMWi) under the THESEUS project and by the EU FP 7 Large-Scale Integrating Project LarKC.

References 1. Raedt, L.D., Jaeger, M., Lee, S.D., Mannila, H.: A theory of inductive query answering. In: ICDM (2002) 2. Kiefer, C., Bernstein, A., Locher, A.: Adding data mining support to SPARQL via statistical relational learning methods. In: Bechhofer, S., Hauswirth, M., Hoffmann, J., Koubarakis, M. (eds.) ESWC 2008. LNCS, vol. 5021, pp. 478–492. Springer, Heidelberg (2008) 3. Getoor, L., Friedman, N., Koller, D., Pferrer, A., Taskar, B.: Probabilistic relational models. In: Getoor, L., Taskar, B. (eds.) Introduction to Statistical Relational Learning. MIT Press, Cambridge (2007) 4. Domingos, P., Richardson, M.: Markov logic: A unifying framework for statistical relational learning. In: Getoor, L., Taskar, B. (eds.) Introduction to Statistical Relational Learning. MIT Press, Cambridge (2007) 5. Xu, Z., Tresp, V., Yu, K., Kriegel, H.P.: Infinite hidden relational models. In: Uncertainty in Artificial Intelligence (UAI) (2006)

104

Y. Huang et al.

6. Kemp, C., Tenenbaum, J.B., Griffiths, T.L., Yamada, T., Ueda, N.: Learning systems of concepts with an infinite relational model. In: Poceedings of the National Conference on Artificial Intelligence, AAAI (2006) 7. Quinlan, J.R.: Learning logical definitions from relations. Machine Learning 5(3) (1990) 8. Muggleton, S., Feng, C.: Efficient induction of logic programs. In: Proceedings of the 1st Conference on Algorithmic Learning Theory, Ohmsma, Tokyo (1990) 9. De Raedt, L.: Attribute-value learning versus inductive logic programming: The missing links (extended abstract). In: Page, D.L. (ed.) ILP 1998. LNCS, vol. 1446, Springer, Heidelberg (1998) 10. Lavraˇc, N., Dˇzeroski, S., Grobelnik, M.: Learning nonrecursive definitions of relations with LINUS. In: EWSL 1991: Proceedings of the European Working Session on Learning on Machine Learning (1991) 11. Tresp, V., Yu, K.: Learning with dependencies between several response variables. In: Tutorial at ICML (2009) 12. Tresp, V., Huang, Y., Bundschus, M., Rettinger, A.: Materializing and querying learned knowledge. In: Proceedings of the First ESWC Workshop on Inductive Reasoning and Machine Learning on the Semantic Web (2009) 13. Lee, D.D., Seung, H.S.: Learning the parts of objects by non-negative matrix factorization. Nature (1999) 14. Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. 3 (2003) 15. Brickley, D., Miller, L.: The Friend of a Friend (FOAF) project, http://www.foaf-project.org/ 16. Jarvelin, K., Kekalainen, J.: IR evaluation methods for retrieving highly relevant documents. In: SIGIR 2000 (2000) 17. Neville, J., Gallagher, B., Eliassi-Rad, T.: Evaluating statistical tests for within-network classifiers of relational data. In: ICDM 2009 (2009)

Appendix Details on the NDCG Score We use the normalized discounted cumulative gain (NDCG) to evaluate a predicted ranking. NDCG is calculated by summing over all the gains in the rank list R with a log discount factor as 1 2r(k) − 1 NDCG(R) = , Z log(1 + k) k

where r(k) denotes the target label for the k-th ranked item in R, and r is chosen such that a perfect ranking obtains value 1. To focus more on the top-ranked items, we also consider the [email protected] which only counts the top n items in the rank list. These scores are averaged over all ranking lists for comparison.

Learning Action Descriptions of Opponent Behaviour in the Robocup 2D Simulation Environment A. Illobre, J. Gonzalez, R. Otero, and J. Santos Computer Science Department, University of Corunna, Spain {infjdi00,jgonzalezi,otero,santos}@udc.es

Abstract. The Robocup 2D simulation competition [13] proposes a dynamic environment where two opponent teams are confronted in a simpliﬁed soccer game. All major teams use a ﬁxed algorithm to control its players. An unexpected opponent strategy, not previously considered by the developers, might result in winning all matches. To improve this we use ILP to learn action descriptions of opponent players; for learning on dynamic domains, we have to deal with the frame problem. The induced descriptions can be used to plan for desired ﬁeld states. To show this we start with a simpliﬁed scenario where we learn the behaviour of a goalkeeper based on the actions of a shooter player. This description is used to plan for states where a goal can be scored. This result can directly be extended to a multiplayer environment. Keywords: ILP, Action Descriptions, Answer Sets, Nonmonotonic Reasoning, Robocup Simulation Environment.

1

Introduction

RoboCup [13] is an international joint project created to promote AI and robotics research, by providing a standard problem (a simpliﬁed soccer game) where different technologies can be integrated and examined. The RoboCup competition includes real robot competitions and a software agent competition. In this last case, the soccer players must interact with a simulated environment based on incomplete and partially incorrect data1 . The RoboCup simulated league is based on rcssserver, a soccer simulation environment. In rcssserver, a match is carried out in a client/server style: the server provides a virtual ﬁeld and simulates all movements of a ball and players, while each client controls the movements of one player from a partial perception of its environment (referee messages, player body status, etc.). Time is discretized in simulation cycles. The server introduces noise in the visual sensor data as well as in the movement of objects and parameters of commands. 1

This paper has been funded by the Ministry of Science and Education of Spain through project TIN2007-64330. http://sserver.sourceforge.net/wiki/index.php/Main_Page

P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 105–113, 2011. c Springer-Verlag Berlin Heidelberg 2011

106

A. Illobre et al.

Currently teams use ﬁxed strategies to control its players. If an opponent uses an unexpected strategy, then the controlled team might show a low performance. To overcome this limitation, we propose a technique to learn action descriptions for opponent players, based on the actions performed by the team. This allows for planning for desired ﬁeld states (for instance, a state where a goal can be scored). This means that an optimal, speciﬁc strategy will be available for each opponent team. To test the proposed method, we solve the problem of placing a shooter player in a ﬁeld position where a goal can be scored, in an environment with an opponent goalkeeper. This is achieved in two steps. First, a model to decide if a goal can be scored from a given ﬁeld state is proposed, based on the position of the shooter player and the opponent goalkeeper. Then, an action description for the movement of the opponent goalkeeper is learned. The resulting model can be used to plan for optimal shooting situations. This requires to learn in a dynamic domain, so it is suitable to solve the frame problem. We do so by applying the method proposed on [11], using the system IAction [12]. The paper is organized as follows. Section 2 introduces the concept of action description, and brieﬂy describes the method [11] for learning on dynamic domains. Section 3 proposes a solution to automatically model the behaviour of opponent players, exemplifying it on the award-winning team CMUnited99 [14] goalkeeper. Finally, section 4 brieﬂy reviews previous work and presents the conclusions.

2

Action Descriptions for Dynamic Domains

We follow the method on [11] that represents dynamic domains using action descriptions. An action description represents the properties of a dynamic domain as fluents. These properties will change depending on performed actions. For example, shooting the ball in the correct direction will increase the score count. Both, actions and ﬂuents, will be represented as predicates. Each step on the evolution of the dynamic domain is represented by a situation. A narrative represents a particular example of the evolution of the domain from an initial situation s0 to a ﬁnal situation sn . Diﬀerent narratives represent diﬀerent examples of the evolution of the environment, depending on the initial state of the environment and the actions performed. An action description can be represented using several kinds of rules. Action laws take the following form: e ( S , N) :− a ( S ,N) , p r e v ( S , PS ) , PRECOND( PS ,N ) .

where e(S, N ) is a ﬂuent and a(S, N ) is an action. S and P S are situation variables, N represents a narrative. prev(S, P S) deﬁnes situation S as the successor of the situation P S. P RECON D(P S, N ) represents a conjunction of ﬂuents f1 (P S, N ), ..., fn (P S, N ) and might be missing.

Learning Action Descriptions of Opponent Behaviour

107

Intuitively, these rules state that when action a is performed on situation S and ﬂuents f1 , ..., fn are true on the previous situation P S, then the eﬀect ﬂuent e will be true on the situation S. Frame axioms take the following form: e ( S ,N) :− a ( S , N) , p r e v ( S , PS ) , e ( PS , N) , PRECOND( PS ,N ) .

Frame axioms are needed to explain the target ﬂuent e when it persists from the previous situations. Both type of rules are needed to cover the examples. We need a frame axiom for each combination of ﬂuent and action. When a domain is described with frame axioms it is said that we have the frame problem. To solve the frame problem we need a compact description of the persistence of the ﬂuents. This is solved on Stable Models [6] using inertia axioms instead of frame axioms. Two single inertia axioms for a ﬂuent replace all frame axioms with such ﬂuent in the head. Inertia axioms take the following form: e ( S , N) :− p r e v ( S , PS ) , e ( PS ,N) , n o t ne ( S ,N ) . ne ( S ,N) :− p r e v ( S , PS ) , e ( PS , N) , n o t e ( S ,N ) .

Where ne(S, N ) is the literal complementary to e and not represents negation as failure (N AF ). The ﬁrst rule should be read as: the ﬂuent e will be true on S if e is true on the previous situation P S and we cannot prove that e is false on S. 2.1

Eﬃcient Induction of Action Laws with IAction

We use the method [11] to eﬃciency learn on dynamic domains. This method uses causality to get solutions to the frame and ramiﬁcation problems in induction. Causality allows to translate the nonmonotonic induction problem to a form where monotonic methods of ILP can be used to provide a complete method for induction of action descriptions without the frame problem. Without this the methods deﬁned on monotonic formalisms will have the frame problem. A possible alternative solution would be to apply some existing restricted nonmonotonic induction methods, but it is not known how to use these methods for learning without the frame problem. A nonmonotonic induction method would include the inertia axioms in the background to provide solutions free from the frame problem. On monotonic ILP methods the frame axioms are induced to cover the ﬂuents on the examples that persist. Nevertheless we could avoid the induction of the ﬂuents that persist by not providing those persistent examples and selecting, as a target, the caused ﬂuents only. Consider a simpliﬁed Robocup domain with one player. There are two ﬂuents in this domain: goal (resp. ngoal ) represents that a goal has been scored and hasball (resp. nhasball ) represents that the player has the ball. Three actions are considered: shoot, wait (do nothing), getball. We want to learn how to score a goal. Table 2.1 shows a possible narrative for this domain. Note that the target is missing for situation 3. This is called a missing segment. A missing segment

108

A. Illobre et al. Table 1. Transformation of an input narrative by method [11] situation 0

1

2

3

4

goal

ngoal

ngoal

ngoal

?

goal

hasball

nhasball nhasball

actions

nhasball hasball

causedE + causedE − npgoal

hasball

shoot(1, 1) wait(2, 2) getball(m34, 3) shoot(m34, 4) pgoal(m34) npgoal

npgoal

represents that there is a positive example on causality on some situation inside it, similar cases have already been considered in machine learning under Multiple Instance (MI) learning. Missing example instances in the target predicate are common in learning. It is precisely because of these missing instances that alternative solutions to induction provide diﬀerent generalizations; in this sense, more missing instances allow more generalization in the solution. Induction in action seems to behave the other way around, missing examples instead of facilitating induction turn it more complex. Note also that there is no problem with missing examples when induction is directly applied on a monotonic ILP method. But recall also that all these solutions have the frame problem. This points out the close relationship between dealing with missing examples and solving the frame problem in induction. To be able to eﬃciently learn action rules without the frame problem a transformation on the input is deﬁned. Step 1: For every ﬂuent f on the domain, add the constraint : −f (S), nf (S). This representation avoids the CWA of LP for ﬂuents and allows the reference to the negative ﬂuent without using NAF, thus inside deﬁnite LP. The CWA for ﬂuents is not interesting, because when some ﬂuent instance cannot be proved it is better to assume it persisted than to assume it is false. Step 2: Deﬁne an extra argument for every action, e.g. shoot(ES,S), being ES the new argument and S the argument deﬁning the situation. Deﬁne a new constant (e.g. m34 ) for every action on the missing segment and the immediate situation after the missing segment. For any other action the ES argument is that of the situation, e.g. wait(2,2). Step 3: For every missing segment with complementary target instances at the situations immediately before and after the segment, a caused instance is deﬁned as follows: If the situation inmediately after the segment has a ﬂuent f (resp. nf ), deﬁne pf(es) (resp. pnf(es)), where es is the constant name of the missing segment. A single instance of causality is extracted from a missing segment, and the instance is at the segment es as a whole. Step 4: For the target ﬂuent f(S) deﬁne the ﬂuent npf(S) (also npnf(S) for nf(S)). Step 5: Apply a complete monotonic induction method of ILP, e.g. IE, with target ﬂuent pf(S) instead of the original target f(S), e.g. pgoal instead of goal.

Learning Action Descriptions of Opponent Behaviour

109

The causality of the target ﬂuent will be induced in the form of action laws. In our example this action law will be induced: pgoal(ES) : −shoot(ES, S), prev(S, P S), getball(P S). A simple transformation provides descriptions of actions in Stable Models [6]. For every induced causal action law put the head directly on the original target f(S), instead of the causal ﬂuent pf(S): f (S) : −prev(S, P S), f (P S), not nf (S). Complete the solution adding the inertia axioms for f(S) and nf(S).

3

Modeling Opponent Behaviour

To solve the problem of adapting to speciﬁc opponent strategies, we propose to learn an action description on opponent behaviour. This action description can then be used as input to a suitable non-monotonic formalism (e.g. Stable Models [4]) to solve planning and prediction problems on the domain. To exemplify this approach, a simpliﬁed scenario with an opponent goalkeeper and a shooter player is proposed. The objective is to model the behaviour of the goalkeeper based on the behaviour of the player. This is, we want to learn action rules for modeling how the goalkeeper is going to move, depending on the actions of the player. This action description is then combined with a generic action description describing the eﬀects of the shooter actions on the possibility of scoring a goal. The resulting theory can be used plan for states where a goal can be scored. 3.1

Discretization of the Environment

The values of the properties of the ﬁeld in rcssserver are represented as real numbers. We discretize the positions and angles with a precision of 10−1 : the ﬁeld is divided in approximately 420000 squares. Because we do not know the internal state of the oponent player it is possible, from the point of view of the shooter agent, that there are two diﬀerent situations si and sj where the ﬁeld state S and the action taken a are the same but the eﬀects of the action are diﬀerent. So we cannot learn an action rule for one of the situations without being inconsistent with the other. For dealing with these non-deterministic eﬀects we remove from the evidence all conﬂicting situations but that with the highest probability, estimated from the available examples. This preprocessing will remove only a 2% of the evidence that will be used in this work. 3.2

Representation

In the movement model used by rcssserver, a player moves by performing a dash action that results in an acceleration. The player speed is only modiﬁed by a small decay on each simulation cycle or or by another dash action. If the objective of a player is to move to a certain point, then it will apply dash actions periodically

110

A. Illobre et al.

to maintain its speed. Thus, we represent the movement of an opponent player as the distance covered after applying a certain action. By default, an opponent player will maintain its speed and direction. To explain changes on the player speed, a simpliﬁed set of possible shooter actions, based on that required by rcssserver, will be used. The selected ﬂuents encode the position and direction of the players in the ﬁeld. Every predicate representing a ﬂuent or an action will have at least a term S (situation) and a term N (narrative). For example, the action move(s3, n4) represents that the shooter will perform the action move on the situation 3 of the narrative 4. The background used for the learning task is deﬁned using the set of actions and ﬂuents described below. Actions: – move(S, N ): The shooter moves on its current direction at maximum speed. – turn(S, N, right/lef t): The shooter rotates clockwise/counterclockwise 45o . – wait(S, N ) : The shooter stays still. Fluents: – at(P, S, N, X, Y ): player P is at position (X, Y ). [0,0] represents the center of the field. Positions left or down the center take negative values. – angle(P, S, N, A): angle of player P is A. – speedx(P, S, N, Vx ): horizontal speed of the player X is Vx . Positive values represent movements to the right, negative values represents movements to the left. Speed range is [-1.1,1.1], currently discretized in 23 values. – speedy(P, S, N, Vy ): vertical speed of the player X is Vy . Positive values represent upward movements, negative values represent downward movements.

Given a simpliﬁed environment with one goalkeeper (team 1) and a player (team 2), we want to learn how the goalkeeper will move (direction and speed) depending on the movements of the player on the ﬁeld. The target predicates will be the speed and direction of the goalkeeper on the x-axis (speedx) and on the y-axis (speedy). The constant goalie represents the goalkeeper of the opposite team and the constant shooter represents the shooter player. Negative examples represent that a goalkeeper can only move on the current direction with a speed classiﬁed in the same discretization value. Evidence on goalkeeper behaviour has been extracted by developing a custom shooter player. A test set of 2000 narratives has been generated. 3.3

Learning Results

The following is an example of the learned rules. s p e e d x ( g o a l i e , S , N, − 0 . 9 ) :− t u r n ( S , N, l e f t ) , p r e v ( S , PS ) , a t ( s h o o t e r , S , N, X, Y) , l e s s e q u a l (X, 3 0 . 0 ) , l e s s e q u a l (Y, 1 0 . 0 ) , g r e a t e r e q u a l (Y, − 1 0 . 0 ) , a t ( g o a l i e , S , N, X2 , Y2 ) , l e s e q u a l ( X2 , 4 4 . 5 ) , a n g l e ( s h o o t e r , S , N, A) , g r e a t e r e q u a l (A, − 4 5 ) , l e s s e q u a l (A, 4 5 ) .

The intuitive meaning of this rule is that the goalkeeper moves forward if the player turns his back against the goal, on a certain distance. The learning process also produces the required inertia axioms for the learning target. For example: sp e e d x (P , S , N,V) :− p r e v ( S , PS ) , s p e e d ( P , PS , N, V) , n o t −s p e e d (P , S , N, V ) .

Meaning that the horizontal speed is assumed to persist unless an action causes it to change.

Learning Action Descriptions of Opponent Behaviour

111

1 0,9 0,8 0,7 0,6 0,5

ACC CREC

0,4 0,3 0,2 0,1 0 0

10

20

30 40 50 Number of narratives (t)

60

70

Fig. 1. Performance of goalie speed prediction

Validation. To assess the performance of this proposal, the following metrics have been deﬁned: (1) Accuracy (ACC): proportion of cases where, given an state and action, the speed of the opponent player is predicted correctly, (2) Change recall (CREC): proportion of cases where, given an state and action for which the speed is expected to change, the new speed value is predicted correctly. Metric values are calculated as follows. A set of narratives of size t is randomly generated, and an action description learned from it. Then, this description is tested again the test set. Figure 1 shows the results of this validation. Standard error is within ±0.02 for all cases. The results show that the method achieves high levels of accuracy with restricted evidence and time. This performance is achieved because of the chosen default assumption on the goalkeeper speed: the speed will be the same unless an action causes it to change. The accuracy on predicting speed change, however, is lower. This indicates the need for more evidence and learning time for the method to make more signiﬁcant predictions on the changes of the goalkeeper speed. An enhanced representation for the background information (for instance, considering distances between players and key points of the ﬁeld, such as the goal) could allow for a more compact description and more general rules, thus achieving higher accuracy values under the same restrictions on input evi- dence size and learning time. This is proposed as future work. Also, the movement of the opponent goalkeeper might depend on the position of other opponent players. The method can be directly extended to this multiplayer environment, by encoding the position of other players using the representation explained above. Preliminary results with the CMUnited99 goalkeeper in presence of two other opponent players, show that rules using the new information can be found.

4

Previous Work and Conclusions

There are several works for inducing the eﬀects of actions on dynamic domains. Moyle and Muggleton [9] study the induction of Event Calculus programs, a particular action formalism. The methods proposed there are diﬀerent to [11] and rely on working with negation as failure in the background (for inertia) during induction. Benson [1] describes the system TRAIL. Given an action and

112

A. Illobre et al.

a possible eﬀect on the domain (called Teleo-Operator), TRAIL tries to ﬁnd a set of preconditions under which that actions causes that eﬀect. Later, it uses this information to build a Teleo-Reactive tree to decide which actions should be applied to achieve a certain goal. There are also several proposals for learning action strategies in dynamic domains, some of which have been applied to the Robocup Simulation Environment. Driessens and De Raedt [3] learn clauses with actions in the head to describe the behaviour of a preexisting team in order to validate its implementation. Torrey and Maclin [15] use ILP to learn clauses with actions in the head as a step for transferring knowledge between reinforcement learning tasks. Khardon [5] proposes to learn production rules representing action strategies. In other line of work, Matsui et al. [7] use ILP to learn rules to decide if a certain action will be successful for a certain ﬁeld state. In this paper we have used the method on [11] to learn action descriptions on the behaviour of opponent players in the Robocup Simulation Environment, studying the case of predicting the movement of a goalkeeper based on the actions of a shooter player. With these descriptions, a suitable non-monotonic formalism, like Stable Models [4], can be used to plan for desired states. Current ILP methods are not suitable for learning in dynamic domains: most of the solutions have the frame problem. Results show that the proposed method has the potential to reach high accuracy values.

References 1. Benson, S.: Learning action models for reactive autonomous agents. Tech. rep. CS-TR-97-1589, Ph. The., Department of Computer Science, Stanford University (1997) 2. Chen, M., et al.: RoboCup Soccer Server, Users Manual (2002) 3. Driessens, K., Jacobs, N., Cossement, N., Monsieurs, P., De Raedt, L.: Inductive veriﬁcation and validation of the kULRoT roboCup team. In: Asada, M., Kitano, H. (eds.) RoboCup 1998. LNCS (LNAI), vol. 1604, pp. 193–206. Springer, Heidelberg (1999) 4. Gelfond, M., Lifschitz, V.: The Stable Model Semantics for Logic Programming. In: Proceedings of the Fifth International Conference on Logic Programming, ICLP (1988) 5. Khardon, R.: Learning to take Actions. Machine Learning 35(1) (1999) 6. Lifschitz, V.: Action languages, answer sets and planning. In: The Logic Programming Paradigm: a 25-Year Perspective. Springer, Heidelberg (1999) 7. Matsui, T., Inuzuka, N., Seki, H.: Adapting behaviour by inductive prediction in soccer agents. In: Mizoguchi, R., Slaney, J.K. (eds.) PRICAI 2000. LNCS, vol. 1886, p. 807. Springer, Heidelberg (2000) 8. McCarthy, J., Hayes, P.J.: Some philosophical problems from the standpoint of artiﬁcial intelligence. Machine Intelligence 4, 463–502 (1969) 9. Moyle, S., Muggleton, S.H.: Learning programs in the event calculus. In: Dˇzeroski, S., Lavraˇc, N. (eds.) ILP 1997. LNCS, vol. 1297. Springer, Heidelberg (1997) 10. Muggleton, S.H.: Inverse entailment and Progol. New Generation Computing 13, 245–286 (1995)

Learning Action Descriptions of Opponent Behaviour

113

11. Otero, R.: Embracing Causality in Inducing the Eﬀects of Actions. In: Conejo, R., Urretavizcaya, M., P´erez-de-la-Cruz, J.-L. (eds.) CAEPIA/TTIA 2003. LNCS (LNAI), vol. 3040, pp. 291–301. Springer, Heidelberg (2004) 12. Otero, R., Varela, M.: IAction, a System for Learning Action Descriptions for Planning. In: ILP (2006) 13. RoboCup Oﬃcial Site, http://www.robocup.org 14. Stone, P., Riley, P., Veloso, M.: The CMUnited-99 champion simulator team. AI Magazine 21(3), 33–40 (2000) 15. Torrey, L., Shavlik, J., Walker, T., Maclin, R.: Skill acquisition via transfer learning and advice taking. In: F¨ urnkranz, J., Scheﬀer, T., Spiliopoulou, M. (eds.) ECML 2006. LNCS (LNAI), vol. 4212, pp. 425–436. Springer, Heidelberg (2006)

Hypothesizing about Causal Networks with Positive and Negative Effects by Meta-level Abduction Katsumi Inoue1, Andrei Doncescu2 , and Hidetomo Nabeshima3 1

3

National Institute of Informatics 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430, Japan 2 LAAS-CNRS UPR 8001 Avenue du Colonel Roche, 31007 Toulouse, France Division of Medicine and Engineering Science, University of Yamanashi 4-3-11 Takeda, Kofu, Yamanashi 400-8511, Japan

Abstract. Meta-level abduction discovers missing links and unknown nodes from incomplete networks to complete paths for observations. In this work, we extend applicability of meta-level abduction to deal with networks containing both positive and negative causal effects. Such networks appear in many domains including biology, in which inhibitory effects are important in signaling and metabolic pathways. Reasoning in networks with inhibition is inevitably nonmonotonic, and involves default assumptions in abduction. We show that meta-level abduction can consistently produce both positive and negative causal relations as well as invented nodes. Case studies of meta-level abduction are presented in p53 signaling networks, in which causal rules are abduced to suppress a tumor with a new protein and to stop DNA synthesis when damage is occurred.

1 Introduction Abduction and induction are both ampliative reasoning, and play essential roles in knowledge discovery and development in science and technology. The use of prior or background knowledge in scientific applications has directed our attention to theory completion [12] rather than classical learning tasks such as concept learning and classification. There, abduction is used to complete proofs of observations from incomplete background knowledge. In theory completion, the larger the knowledge base becomes, the more inference steps are required. In scientific domains, background knowledge is often structured in a network form. In biology, a sequence of signalings or biochemical reactions constitutes a network called a pathway, which specifies a mechanism to explain how genes or cells carry out their functions. However, information of biological networks in public-domain databases is generally incomplete in that some details of reactions, intermediary genes/proteins or kinetic information are either omitted or undiscovered. To deal with incompleteness of pathways, we need to predict the status of relations which is consistent with the status of nodes [27,29,8,21], or insert missing arcs between nodes to explain observations

This research is supported in part by the 2008-2011 JSPS Grant-in-Aid for Scientific Research (A) No. 20240016.

P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 114–129, 2011. c Springer-Verlag Berlin Heidelberg 2011

Hypothesizing about Causal Networks with Positive and Negative Effects

115

[30,10,28,1]. These goals are characterized by abduction as theory completion, in which status of nodes or missing arcs are added to account for observations. A method to discover unknown relations from incomplete networks has been introduced in [6] based on meta-level abduction. Given a network representing causal relations, called a causal network, missing links and nodes are abduced in the network to account for observations. The method can be implemented in SOLAR [14,15], an automated deduction system for consequence finding, using a first-order representation for algebraic properties of causality and the full-clausal form of network information and constraints. Meta-level abduction by SOLAR is powerful enough to infer missing rules, missing facts, and unknown causes that involve predicate invention [13] in the form of existentially quantified hypotheses. In [6], meta-level abduction has been applied to discover physical skills in cello playing examples. and a thorough experimental analysis with a variety of problem instances has been presented in [15, Table 3]. However, all those examples of meta-level abduction in [6,15] contain only one kind of causal effects, which are positive, and it was left open how to deal with both positive and negative effects. Then, in this work, we extend applicability of meta-level abduction to deal with networks expressing both positive and negative causal effects. Such networks are often used in biological domains, where inhibitory effects are essential in gene regulatory, signaling and metabolic networks. We will present axioms for meta-level abduction to produce both positive and negative causal relations as well as newly invented nodes. Reasoning in networks with inhibition is inevitably nonmonotonic, and involves default assumptions in abduction. Then, applications to p53 signal networks [19,28] are presented as case studies of our framework, in which meta-level abduction discovers theories explaining how tumor suppressors work and how DNA synthesis stops. Such abstract signaling networks, although simple, provide one of the most fundamental inference problems in Systems Biology: Given an incomplete causal network, infer possible connections and functions of the target gene/protein. Meta-level abduction in this paper is crucial for this task: First, suggestion of possible additions to prior networks enables scientists to conduct hypothesis-driven experiments with those focused cases. Second, it is quite hard to observe activity levels or quantities of proteins in living organisms [1]. The rest of this paper is organized as follows. Section 2 offers the essential and new perspectives of meta-level abduction and its use for rule abduction. Section 3 then extends meta-level abduction to allow for two types of causal effects, in which positive and negative rules are called triggers and inhibitors, respectively. Section 4 presents case studies of meta-level abduction applied to completion of sub-networks in p53 signal networks. Section 5 discusses related work, and Section 6 gives a summary and future work.

2 Meta-level Abduction This section revisits the framework for meta-level abduction [6]. We suppose a background theory represented in a network structure called a causal graph or a causal network. A causal graph is a directed graph representing causal

116

K. Inoue, A. Doncescu, and H. Nabeshima

relations, which consists of a set of nodes and (directed) arcs (or links).1 Each node in a causal graph represents some event, fact or proposition. A direct causal relation corresponds to a directed arc, and a causal chain is represented by the reachability between two nodes. The interpretation of a “cause” here is kept rather informal, and just represents the connectivity, which may refer to a mathematical, physical, chemical, conceptual, epidemiological, structural, or statistical dependency [17]. Similarly, a “direct cause” here simply represents the adjacent connectivity, while its effect is direct only relative to a certain level of abstraction. We then consider a first-order language to express causal networks. Each node is represented as a proposition or a (ground) atom in the language. When there is a direct causal relation from a node s to a node g, we define that connected(g, s) is true. Note that connected(g, s) only shows that s is one of possible causes of g, and thus the existence of connected(g, t) (s = t) means that s and t are alternative causes for g. The fact that a direct causal link cannot exist from s to g is represented in an (integrity) constraint of the form ← connected(g, s), which is equivalent to the formula ¬connected(g, s). If a direct causal relation from s has nondeterministic effects g and h, it is represented in a disjunction of the form (1). On the other hand, the relation that “g is jointly caused by s and t”, written intuitively as (g ← s ∧ t) in the object level, is expressed in a disjunction of the form (2) at the meta level, cf., (g ← s ∧ t) ≡ (g ← s) ∨ (g ← t). gi h) g

OR

) i AND

s

connected(g, s) ∨ connected(h, s) (1)

s connected(g, s) ∨ connected(g, t) t

(2)

A complex relation of the form (g ∨ h ← s ∧ t) can be decomposed into two relations, (s-t ← s ∧ t) and (g ∨ h ← s-t), where s-t represents the intermediate complex. Any other direct causal relation in a causal network can be represented in this way using intermediate complexes and combinations of positive and negative connected literals and disjunctions of the form (1) and (2). Expression of causal networks is thus done at the meta level using the meta-predicate connected. In this way, (i) each literal in the object level is represented as a term in the meta level, and (ii) each rule in the object level is represented as a (disjunctive) fact in the meta level. The point (ii) can not only hold for rules given in the axioms, but can also be applied to express inferred rules at the meta level. Now, to express inferred rules, we introduce another meta-predicate caused. For object-level propositions g and s, we define that caused(g, s) is true if there is a causal chain from s to g. Then, the causal chains are defined transitively in terms of connected as: caused(X, Y ) ← connected(X, Y ). caused(X, Y ) ← connected(X, Z) ∧ caused(Z, Y ). 1

(3) (4)

Precisely speaking, our causal networks bring us more information than directed graphs since negation, disjunctive effects and joint causes are all represented in a network.

Hypothesizing about Causal Networks with Positive and Negative Effects

117

Other algebraic properties as well as some particular constraints (e.g., ¬caused(a, b)) can also be defined if necessary. Variables in object-level expressions like g(T ) and s(T ) can be allowed in the meta-level expression like connected(g(T ), s(T )). Reasoning about causal networks is realized by deduction and abduction from the meta-level expression of causal networks together with the axioms for causal relations including (3) and (4). In deduction, if a meta-level expression of the form caused(g, s) for some facts g and s can be derived, it means that the rule (g ← s) can be derived at the object level [6, Section 3.3]. In abduction, if an observation O is given as a causal chain caused(g, s), which corresponds to the object-level rule (g ← s), we want to explain why or how it is caused. Here, g and s are called the goal fact and the source fact, respectively. O can be given as either a real observation (called an empirical rule) or a virtual goal to be achieved. An abductive task is then to discover hidden rules that establish a connection from s to g by filling the gaps in causal networks. Logically speaking, a background theory B consists of the meta-level expression of a causal network and the axioms for causal relations in the meta-level containing (3) and (4). When B is incomplete, there may be no path between g and s in B, that is, caused(g, s) cannot be derived from B. Then, abduction infers an explanation (or hypothesis) H consisting of missing relations (links) and missing facts (nodes). This is realized by setting the abducibles Γ , the set of candidate literals to be assumed, as the atoms with the predicate connected: Γ = {connected( , )}. A set H of instances of elements of Γ is an explanation of O if B ∪ H |= O and B ∪ H is consistent. An explanation H of O is minimal if it does not imply any explanation of O that is not logically equivalent to H. Minimality of explanations in meta-level abduction corresponds to minimal additions in causal graphs, and are reasonable according to the principle of Occam’s razor. For example, suppose the observation O = caused(g, s)∧caused(h, s), that is, the multiple causal chains between two goal facts g, h and the source fact s. Examples of minimal explanations of O containing one intermediate node are as follows. H1 : ∃X(connected(g, X) ∧ connected(h, X) ∧ connected(X, s)), H2 : ∃X(connected(g, X) ∧ connected(X, h) ∧ connected(h, s)). Here, H1 corresponds to the three rules {(g ← χ), (h ← χ), (χ ← s)}, hence rule abduction is realized here. Moreover, these hypotheses contain existentially quantified variables, where χ can be regarded as either some existing node or a new unknown node. In this way, predicate invention [13] is partially realized in meta-level abduction. As H1 and H2 represent different connectivities, we can enumerate different types of network structures that are missing in the original causal network. A hypothesis of the form (2) can be obtained by adding a meta-level axiom: connected(X, Y ) ∨ connected(X, Z) ← jointly connected(X, Y, Z).

(5)

to B and the atoms with the predicate jointly connected( , , ) to Γ . Besides the use in rule abduction, meta-level abduction can also be applied to fact abduction [6], which has been focused on almost exclusively in AI literature.2 2

In [25], fact abduction and rule abduction are classified as factual abduction and lawabduction, respectively. Our meta-level abduction also gives a realization of 2nd order existential abduction, which is most important to produce new theories with new concepts [25].

118

K. Inoue, A. Doncescu, and H. Nabeshima

Abduction of facts in the object level can be formalized as query answering in the meta level. Suppose that each abducible a in the object level is declared as abd(a). Given a query of the form ← caused(g, X), answer extraction for X can be realized by giving the clause of the form: ans(X) ← caused(g, X) ∧ abd(X). Here, ans is the answer predicate [9] and the variable X is used to collect abducibles which cause the g. Furthermore, by combining rule abduction and fact abduction in the form of conditional query answering [9], which extracts answers in a query with additional abduced conditions, meta-level abduction enables us to abduce both rules and facts. All types of meta-level inferences in this section, including generation of existentially quantified hypotheses in meta-level abduction as well as conditional query answering to abduce rules and facts, can be realized by SOLAR [14,15]. SOLAR is a consequence-finding system based on SOL resolution [3] and the connection tableaux. In SOLAR, the notion of production fields [3] is used to represent language biases for hypotheses. A production field P is a pair L, Cond , where L is a set of literals and Cond is a certain condition. A clause C belongs to P = L, Cond if every literal in C is an instance of a literal in L and C satisfies Cond. The set of subsumptionminimal clauses derived from a clausal theory Σ and a production field P is called the characteristic clauses of Σ with respect to P, and is denoted as Carc(Σ, P). The new characteristic clauses of a clause C with respect to Σ and P are defined as N ewcarc(Σ, C, P) = Carc(Σ ∪ {C}, P) \ Carc(Σ, P). Given the background clausal theory B and the observations O, each abductive explanation H of O can be computed by inverse entailment [3]: B ∪ {¬O} |= ¬H, where ¬O = L∈O ¬L and ¬H = L∈H ¬L are clauses because O and H are sets of literals. Similarly, the condition that B ∪ H is consistent is equivalent to B |= ¬H. Given the abducibles Γ , any literal in ¬H is an instance of a literal in Γ = {¬L | L ∈ Γ }. Hence, the set of minimal explanations of O with respect to B and Γ is characterized as { H | ¬H ∈ N ewcarc(B, ¬O, Γ ) }.

3 Reasoning about Positive and Negative Causal Effects So far, links in a causal network have been of one kind, and connected(g, s) in the meta level, i.e., (g ← s) in the object level, just represents that g directly depends on s somehow. However, mixing different types of causalities in one type of links often makes analysis of actual causes complicated [17]. Here, we solve one of the most important problems of this kind: diagrams with two types of causalities, i.e., positive and negative causal effects. With this regard, from now on we can understand that each arc of the form connected(g, s) in Section 2 only represents positive effects. We extend applicability of meta-level abduction to deal with networks expressing both positive and negative causal effects. Such networks are seen in biological domains, where inhibition effects negatively in gene regulatory, signaling and metabolic pathways. Now we consider two types of direct causal relations: triggered and inhibited . For two nodes g and t, the relation triggered (g, t) represents a positive cause such that

Hypothesizing about Causal Networks with Positive and Negative Effects

119

t is a trigger of g, written as g ←− t in a causal network, whose meaning is (g ⇐ t) in the object level, where ⇐ represents that the causation ← appears if it is not prevented and its precise meaning will be defined later in Section 3.2. On the other hand, the relation inhibited (g, s) represents a negative cause such that s is an inhibitor of g, written as g |—– s in a causal network, whose meaning is (¬g ⇐ s) in the object level. As in Section 2, negation, disjunctive effects and conjunctive causes can be defined for triggered and inhibited , cf., (1) and (2), and complex causal relations can be represented using those combinations and intermediate complexes. For instance, g is jointly triggered by t1 and t2 can be expressed as triggered (g, t1 ) ∨ triggered(g, t2 ). The notion of causal chains is also divided into two types: the positive one (written promoted ) and the negative one (written suppressed ), respectively corresponding to triggered and inhibited . Now our task is to design the axioms for these two meta-predicates. 3.1 Alternating Axioms for Causality Suppose first that there is no inhibitor in a causal network, that is, all links are positive. In this case, the axioms for promoted should coincide with (3) and (4): promoted (X, Y ) ← triggered (X, Y ). promoted (X, Y ) ← triggered (X, Z) ∧ promoted (Z, Y ).

(6) (7)

Next, let us interpret the meaning of an inhibitor as a toggle switch of signals flowed in the inhibitor, just as an inverter in a logic circuit [26]. Then, in the presence of inhibitors, we need one more axiom which blocks an adjacent inhibitor for X in order to promote X: promoted (X, Y ) ← inhibited (X, Z) ∧ suppressed (Z, Y ). (8) As for the axioms of the negative causal chain suppressed , we can consider the following axioms, which are the counterpart of positive ones (6), (7) and (8): suppressed (X, Y ) ← inhibited (X, Y ). suppressed (X, Y ) ← inhibited (X, Z) ∧ promoted (Z, Y ). suppressed (X, Y ) ← triggered (X, Z) ∧ suppressed (Z, Y ).

(9) (10) (11)

That is, a negative causal chain to X can be established if negative influence is propagated to X either directly by an adjacent inhibitor (9–10) or indirectly by (11). One nice property with the axiomatization by (6–11) is that all possible paths from a source to a goal, which is either positive or negative, can be obtained by meta-level abduction. Meta-level abduction on causal networks with positive and negative links can now be defined by letting the abducibles Γ be those atoms with the predicates triggered and/or inhibited : Γ = {triggered( , ), inhibited ( , )}, and observations or goals are given as literals either of the form promoted (g, s) or of the form suppressed (g, s). Hence, given positive and negative observations, we can abduce both positive and negative causes, and new nodes are produced whenever necessary. Proposition 3.1. (Completeness) If there is a negative (resp. positive) causal chain from a source s to a goal g (g = s) in a causal network N , then there is an explanation E of suppressed (s, g) (resp. promoted (s, g)) from N ∪{(6–11)} and Γ such that there exist an odd (resp. even) number of direct inhibitors in E.

120

K. Inoue, A. Doncescu, and H. Nabeshima

Conversely, it can be shown that the axiomatization (6–11) is sound: if there is an explanation of suppressed (s, g) (resp. promoted (s, g)) from N ∪ {(6–11)}, then there is a negative (resp. positive) causal chain from a source s to a goal g in the causal network N . However, this axiomatization can be inconsistent in the sense that both promoted (g, s) and suppressed (g, s) can be explained at the same time. This inconsistency is, however, inevitable in this monotonic representation since we can answer to any virtual query supposing a source s and a goal g. Then, to prevent derivations of promotion and suppression simultaneously for the same s and g, the following integrity constraint can be placed at the meta level. ← promoted (X, Y ) ∧ suppressed (X, Y ).

(12)

The role of (12) is to derive nogoods, i.e., minimal incompatible combinations of instances of abducibles. Unfortunately, introduction of (12) can make those axioms inconsistent. For instance, it is easy to see that, for N0 = {triggered (g, t), triggered (s, t), inhibited (g, s)},

(13)

N0 ∪ {(6–11), (12)} is inconsistent. Also, the p53 network (23) given in Section 4 becomes inconsistent if it is combined with this axiomatization. The problem arises when two antagonistic direct causal relations appear simultaneously for the same node g as follows. t triggered (g, t) ) g / inhibited (g, s) s (14) Our intuition on the diagram (14) is as follows. (1) If the trigger t is present and the inhibitor s is not present, then g is triggered by t; (2) Else if s is present and t is not present, then g is inhibited by s. These two cases are rather clear, but what happens for g if both t and s are somehow caused? The biological literature in this case indicates that: (3) If both t and s are present, then g is inhibited by s. Namely, an inhibitor is preferred to a trigger. The last inference is nonmonotonic: a trigger of g works if there is no inhibitor for g, but if an inhibitor is added then the trigger stops. We next show another axiomatization which reflects this principle of inhibitor preference. 3.2 Axiomatization with Default Assumptions We now depart from the monotonic axiomatization of causal chains (6–11) to make reasoning about networks that are nonmonotonic. In the following new definitions of promoted and suppressed , we will associate an extra condition for each trigger to work. promoted (X, Y ) ← triggered(X, Y ) ∧ no inhibitor (X).

(15)

promoted (X, Y ) ← triggered(X, Z) ∧ no inhibitor (X) ∧ promoted (Z, Y ). (16) promoted (X, Y ) ← inhibited (X, Z) ∧ suppressed (Z, Y ). (17) suppressed (X, Y ) ← inhibited (X, Y ). suppressed (X, Y ) ← inhibited (X, Z) ∧ promoted(Z, Y ).

(18) (19)

suppressed (X, Y ) ← triggered (X, Z)∧no inhibitor (X)∧suppressed (Z, Y ). (20) ← promoted (X, Y ) ∧ suppressed (X, Y ).

(21)

Hypothesizing about Causal Networks with Positive and Negative Effects

121

The new axiom set for positive and negative causal chains (15–20) are the same as the monotonic version (6–11), except that each trigger to X (triggered (X, )) must not be inhibited (no inhibitor (X)) to give the positive effect to X in (15), (16) and (20). Here, inclusion of no inhibitor (χ) in association with triggered (χ, ψ) makes those three axioms default rules: the meaning (χ ⇐ ψ) in the object level is now given that the causation γ = (χ ← ψ) is true if γ is consistent with the union of the background theory B and a constructing hypothesis H. The literal of the form no inhibitor ( ) is thus treated as a default, which can be assumed during inference unless contradiction occurs, and constraints can also be added to reject inconsistent cases with these assumptions. Finally, the integrity constraint (21) is the same as (12) and prohibits the presence of both positive and negative causes between any pair of nodes X and Y . Meta-level abduction is now defined in the same way as in Section 3.1. Abduction of joint triggers or joint inhibitors can also be realized in the same way as jointly connected in (5) by adding the meta-level axioms triggered(X, Y ) ∨ triggered (X, Z) ← jointly triggered (X, Y, Z). inhibited (X, Y ) ∨ inhibited (X, Z) ← jointly inhibited (X, Y, Z). to the background theory B and the literals of the form jointly triggered ( , , ) and of the form jointly inhibited ( , , )) to the abducibles Γ . However, we do not need both of them if an intermediate complex is created; abduction of jointly inhibited (g, s, t) can be simulated by abduction of jointly triggered(s-t, s, t) ∧ inhibited (g, s-t). As for default assumptions of the form no inhibitor ( ), default reasoning can be implemented by assuming those literals whenever necessary during inference, and consistency of such assumptions are checked each time they are added to the current set of abduced literals. This is a simple yet powerful method for default reasoning in the case of so-called normal defaults [23,18]. Hence, the abducibles Γ now also contain the literals of the form no inhibitor ( ), and are defined as Γ = { triggered ( , ), inhibited ( , ), jointly triggered ( , , ), no inhibitor ( )}. When we are sure that there is no inhibitor for a node t, we can include the fact no inhibitor (t) in the background theory B. For instance, no inhibitor (s) can be declared as a fact in B if s is a terminal source node. Moreover, we can add a meta-level constraint ← no inhibitor (X) ∧ inhibited (X, Y ). (22) This constraint (22) blocks to assume a default no inhibitor (g) for any node g to which an inhibitor is connected. Consistency of the background theory in the meta level containing a causal network, the new axioms (15–20) and constraint (21) is now always guaranteed. This is because, unlike the axioms (6–11), the new axioms contain additional defaults of the form no inhibitor ( ). For the causal network N0 (13), B0 = N0 ∪ {(15–20), (21)} is now consistent. Still, both promoted (g, t) and suppressed (g, t) can be explained from B0 and Γ , but their explanations are not the same: {no inhibitor (g)} explains the former, while {no inhibitor (s)} explains the latter. Again, the role of (21) is

122

K. Inoue, A. Doncescu, and H. Nabeshima

Table 1. Correspondence between object-level inference and meta-level consequence finding object-level inference rule verification fact abduction fact prediction rule prediction rule abduction

top clause in SOLAR ← caused(g, s). ans(X) ← caused(g, X). ans(X) ← caused(X, s). none ← caused(g, s).

production field in SOLAR ∅ {ans( )} {ans( )} {promoted ( , ), suppressed ( , )} {¬triggered ( , ), ¬inhibited ( , )} {¬triggered ( , ), ¬inhibited ( , ), abducing rules and facts ans(X) ← caused(g, X). ans( )} {¬triggered ( , ), ¬inhibited ( , ), fact prediction + rule abduction ans(X) ← caused(X, s). ans( )} {¬triggered ( , ), ¬inhibited ( , ), rule prediction + rule abduction none promoted ( , ), suppressed ( , )}

to identify each nogood to prune all incompatible combinations of defaults and abducibles. That is, abducing literals with the predicates triggered and inhibited involves default assumptions of the form no inhibitor ( ), and any inconsistent set of abducibles can be detected by subsumption checking with nogoods. In the network N0 , the set {no inhibitor (g), no inhibitor (s)} is a nogood. In abduction, completeness is guaranteed as in Proposition 3.1. This is easily proved as each explanation obtained with the monotonic axioms (6–11) can be extended by incorporating defaults of the form no inhibitor (t) in the corresponding explanation from the axioms (15–20). Soundness of abductive explanations is similarly guaranteed. Abduction with default assumptions has been implemented in SOLAR [7]. Membership of a clause C in an extension of a default theory [23,18] is guaranteed for each consequence C ← no inhibitor (t1 ) ∧ · · · ∧ no inhibitor (tm ) if {no inhibitor (t1 ), . . . , no inhibitor (tm )} is not a nogood. Abduction of rules with positive and negative effects can be further combined with fact abduction to allow mixed forms of inferences. Table 1 summarizes the correspondence between object-level and meta-level inferences. All types of meta-level inferences, involving generation of existentially quantified hypotheses, can be realized by SOLAR. Recall that, in the context of inverse entailment, the negation of an observation is set to a top clause, and the negation of each abducible is given in a production field in SOLAR. In Table 1, “ ← caused( , )” in a “top clause” column is instantiated by either “ ← promoted ( , )” or “ ← suppressed ( , )”, and “ans( )” is an answer predicate to collect answer substitutions. In abducing object-level facts, a top clause can be further conditioned with an abducible literal “abd(X)” if the list of abducibles is given in the background theory B. In Table 1, “Rule verification” is to prove if a given causal chain can be derived or not. “Fact prediction” is to compute ramification of a source s, i.e., to derive facts that can be caused by s. “Rule prediction” is to enumerate possible causal chains from the given causal network, so a top clause is not provided in this case and characteristic clauses are computed by SOLAR.

Hypothesizing about Causal Networks with Positive and Negative Effects

123

4 Case Study: p53 Signal Networks In this section, we see that meta-level abduction can be well applied to completion of signaling networks. The importance of network completion in signaling networks has been recognized since it is hard to observe activity levels and quantities of proteins in living organisms [1]. Moreover, reporter proteins/genes are usually employed in signaling pathways, but designing and introducing reporter proteins are hard tasks. This is contrasted to the case of genetic networks, in which expression levels of most genes can be observed using DNA microarray/chip technologies. As case studies of meta-level abduction, we use two signaling networks, both of which contain the p53 protein [19] but use it for different purposes. Although these networks are rather simple, they illustrate one of the most fundamental inference problems in Systems Biology: Given an incomplete causal network, infer possible connections to promote or suppress some functions of biological systems. Those target functions are suppression of tumors in cancer and switching DNA synthesis on and off. 4.1 Enumerating Tumor Suppressors This subsection examines the p53 signal network presented in [28] by meta-level abduction. The p53 protein plays a central role as a tumor suppressor and is subjected to tight control through a complex mechanism involving several proteins [19]. The p53 protein has the transactivator domain, which bounds to the promoters of target genes, then leads to protect the cell from cancer. The level and activity of p53 in the cell is influenced by its interactions with other proteins. Tumor suppression is enabled if the interacting partners of p53 do not inhibit the functionality of the transactivator domain. Mdm2 binds to the transactivator domain of p53, thus inhibiting the p53 from tumor suppression. UV (ultraviolet light) causes stress, which may induce the upregulation of p53. However, stress can also influence the growth of tumors. These relations can be represented in solid lines of the causal network in Fig. 1. The corresponding formulas in the meta level can be simply represented by the clauses: triggered (cancer, uv), inhibited (cancer, a), inhibited (a, b),

triggered(p53, uv), triggered(a, p53),

(23)

triggered (b, p53) ∨ triggered (b, mdm2),

where a (“A” in Fig. 1) is the inhibitory domain of p53, and b (“B” in Fig. 1) is the complex p53-mdm2. Now, we consider a tumor suppressor gene X such that mutants of X are highly susceptible to cancer. Suppose in some experiments that exposure of the cell to high level UV does not lead to cancer, given that the initial concentration of Mdm2 is high. A high level of gene expression of the X protein is also observed. Those initial conditions are represented as two facts, source(uv) and source(mdm2), that is, both UV and Mdm2 can be abduced whenever necessary. The meta-predicate source thus behaves like the abducible predicate abd. Some meta-level axioms can be introduced, e.g., no inhibitor (X) ← source(X). Our objective is to hypothesize about the various possible influences of X on the p53 pathway thereby explaining how the cell can avoid cancer.

124

K. Inoue, A. Doncescu, and H. Nabeshima

UV p53 Mdm2 A

X

B

cancer

C

Fig. 1. Causal network of the p53 pathway

The observation is now expressed as ∃S(suppressed (cancer, S) ∧ source(S)). Let Γ = { triggered ( , ), inhibited ( , ), jointly triggered( , , x) }, be the abducibles, expecting that a mutant of X bound to some Z is produced in suppressing the cancer from some source. The background theory B is defined as the set consisting of the rules above, the causal axioms (15–20) and constraints (21,22), and domain constraints for pruning such as ¬inhibited (uv, Z) and ¬inhibited (mdm2, Z). In SOLAR, as in Table 1, the top clause is given as: ans(S) ← suppressed (cancer, S) ∧ source(S). The production field P is set as: P = Γ ∪ {ans( ), no inhibitor ( )}, Cond , where Cond is the length conditions such that each number of literals of the form ¬triggered ( , ), ¬inhibited ( , ) and ¬jointly triggered( , , x) must not respectively exceed 1 in each produced clause. Then, SOLAR produces the 24 new characteristic clauses in 8 seconds using a PC with Core 2 Duo 3GHz and 4GB RAM. In these 24 consequences of SOLAR, the following two clauses are included: ans(uv) ← triggered (x, uv) ∧ jointly triggered (Y, p53, x) ∧ inhibited (b, Y ) ∧ no inhibitor (Y ) (24) ans(uv) ∨ ans(mdm2) ← triggered (x, uv) ∧ jointly triggered (Y, mdm2, x) ∧ inhibited (b, Y ) ∧ no inhibitor (Y ) (25) Both (24) and (25) give conditional answers. The consequence (24) represents a definite answer indicating that the p53-X complex has the unique source UV since both p53 and X are caused by the same source UV. On the other hand, (25) represents a disjunctive answer: X is activated by UV but Mdm2 itself is assumed to be a source, hence the Mdm2-X complex has two sources. In fact, it takes more time to find the consequence (25) than to find (24) in SOLAR. Those two formulas respectively correspond to the following hypotheses: (I) triggered(x, uv) ∧ ∃Y (jointly triggered (Y, p53, x) ∧ inhibited (b, Y )), (II) triggered(x, uv) ∧ ∃Y (jointly triggered (Y, mdm2, x) ∧ inhibited (b, Y )).

Hypothesizing about Causal Networks with Positive and Negative Effects

125

The variable Y in (I) or (II) represents a new complex synthesized from X and either p53 or Mdm2, respectively. Those two hypotheses are actually suggested in [28]: (I) X directly influences p53 protein stability: Stress caused by UV induces high expression of X, which then binds to p53, so p53 is stabilized and formation of Mdm2-p53 complex is prevented; (II) X is a negative regulator of Mdm2: Stress induces high expression of X, which then binds to Mdm2, which competes against inhibiting the Mdm2-p53 interaction (depicted in dashed lines in Fig. 1). In both cases, p53 (or “A”) can be functional as a tumor suppressor. In the biological viewpoint, however, the hypothesis (I) seems preferred because p53 has more chances to be bound to other proteins. The new node Y in (I) and (II) is automatically invented in our method, while all ground candidate nodes and links to be added must be prepared as abducibles in [28]. The p53 regulatory network includes a complex array of upstream regulators and downstream effectors. The results obtained in this section are important in the sense that the activation/inhibition mechanism of p53 is linked to some proteins that might not have been found out yet. Meta-level abduction is thus crucial for this discovery task, and inferred hypotheses can suggest scientists necessary experiments with gene knockout mice as minimally as possible. 4.2 Recovering Links in CDK Networks The next case study is completion in the switch network of cyclin-dependent kinases (CDKs) [26]. CDKs are kinase enzymes that modify other proteins by chemically adding phosphate groups to them (phosphorylation), and are involved in the regulation of the cell cycle. A CDK is activated by association with a cyclin, forming a cyclin-CDK complex (Fig. 2). The Cdk2/cyclin E complex inactivates the retinoblastoma (Rb) protein, which then releases cells into the synthesis phase. Cdk2/cyclin E is regulated by both the positive switch called CAK (cdk activating kinase) and the negative switch p21/WAF1. p21/WAF1 is activated by p53, but p53 can also inhibit cyclin H, which is a source of the positive regulator of cdk2/cyclin E. The negative regulation from p53 works as a defensive system in the cells: when DNA damage occurs, it triggers p53, which then turns on the negative regulation to stop DNA synthesis, so that the damage should be repaired before DNA replication to prevent passing damaged genetic materials onto the next generation. For the CDK network in Fig. 2, we have used meta-level abduction to infer missing links. Experimental problems are designed by removing some links from Fig. 2, and then verifying if those links can be recovered or not in explaining the observation suppressed (dna synthesis, dna damage). The objective of this experiment is to show how meta-level abduction can be well applied to complete missing links. Recovery of removed links is a good testbed for this purpose because the existing natural system can be considered as an ideal solution. Yet, looking at other hypotheses, we can notice that the same functions can be realized in different ways. Table 2 shows experimental results. All experiments are done in the environment on a Mac Mini with Core 2 Duo 1.83GHz and 2GB RAM. The table shows 6 problems, each of which is given a network obtained by removing the links shown in the table. The “#H” columns shows the number of new characteristic clauses (minimal hypotheses) by SOLAR. The unit of “Time” is second. “Depth” is the maximal search depth

126

K. Inoue, A. Doncescu, and H. Nabeshima

DNA damage

(5)

p53 (4)

(6)

cyclin H p21/WAF1 cdk7

CAK

cdk2

(3)

cyclin E cyclin E/ cdk2 DNA synthesis

Rb

(2)

(1)

Fig. 2. Causal network of the CDK pathway

of SOLAR, and computation stops when no new consequences are derived at the minimum three successive depths k, k + 1 and k + 2, then we assume that all consequences have (probably) been found at depth k. The running time to obtain the set of new characteristic clauses is measured after the set of characteristic clauses (minimal nogoods) is computed. It takes 4 to 12 seconds to get all characteristic clauses. The results of recovering removed links are shown in the bottom row. Here, the result indicates a hypothesis consisting of the links that are closest to the original links. For instance, when the links {(2), (4)} are removed, then there exists the hypothesis containing exactly the same links as the removed ones in the 12 hypotheses. For a link (N), the recovered link (Ng) means that a more general hypothesis than (N) is obtained. For example, when {(1), (2)}, i.e., inhibited (dna synthesis, rb) ∧ inhibited (rb, cyclin e/cdk2) is removed, a more general hypothesis {(1g), (2g)}, which is ∃X(inhibited (dna synthesis, X) ∧ inhibited (X, cyclin e/cdk2)), is recovered. We can observe that two consecutive links are replaced by general ones with existentially quantified variables at recovery, but links that are not connected are recovered as they are. Notice that only (4) is recovered when {(4), (6)} is removed. This is because SOLAR outputs only minimal hypotheses, and only (4) is enough to explain the observation. Actually, the negative regulation by p53 has the two paths to suppress cdk2/cyclin E via (4) and (6). Although this is a biologically robust system, our result indicates that only (4) is logically sufficient to realize this function.

5 Discussion and Related Work This paper extends the method of rule abduction in [6] to deal with positive and negative causal links. Although few works on rule abduction exist previously, they focus on positive effects only unlike this paper. Poole [18] firstly considers abducible rules, which specify predefined patterns of rules for use in abduction. This is a very strong bias, and it is generally impossible to prepare all patterns of rules in advance and to perform

Hypothesizing about Causal Networks with Positive and Negative Effects

127

Table 2. Results of recovering links in the CDK pathway Removed (1) (1), (2) (1), (3) (2), (4) (4), (6) links Depth #H Time #H Time #H Time #H Time #H Time 3 1 0.6 1 0.6 1 0.7 1 0.7 1 0.7 4 2 0.6 3 0.6 3 0.7 4 0.7 5 0.8 5 3 0.7 4 1.3 5 1.2 8 1.3 6 1.2 6 3 1.3 4 1.7 6 1.6 11 1.9 8 1.8 7 4 1.7 5 2.3 7 2.3 12 2.9 8 2.9 8 4 2.2 5 3.2 7 3.5 12 3.9 8 5.0 9 4 2.5 5 3.8 7 4.2 12 6.0 8 5.5 Recovered (1) (1g), (2g) (1), (3) (2), (4) (4) links

(1), (2), (3) (4), (5) #H Time 1 1.1 4 1.5 12 1.9 25 2.8 37 3.5 37 5.7 37 6.9 (1g), (2g), (3g) (4), (5)

predicate invention. Work on Robot Scientist [10] adopts abduction to complete biochemical pathways without inhibition, and reaction edges in pathways are represented in a more complex manner [22]. Applications of SOLAR to complete metabolic pathways are also discussed in [20], but joint causes are not considered. CF-induction [4] can both abduce and induce rules, and its applications to complete causal rules as well as network status in metabolic pathways are shown in [29], but hypothesis enumeration and predicate invention are not easy tasks for CF-induction. In ILP, some previous attempts contribute to induction of causal rules [11,16,5]. Moyle [11] requires the complete initial state as input and needs to compute a complete set of narrative facts in advance, and thus cannot account for observations handled in this paper. Otero [16] considers the case of incomplete narratives, but assumes that the truth value of a goal fluent changes only once in an incomplete narrative. Our algorithm, on the other hand, can induce any case in which the fluent value has changed more than once in intermediate situations. These previous works in ILP need either frame axioms or inertia rules in logic programs. The former causes the frame problem and the latter requires induction in nonmonotonic logic programs. Inoue et al. [5] uses an action language, but requires regular inference that searches the space of possible hypotheses. There are several work on completing biological networks. Metabolic pathways are completed in [24] and are revised in [21] using answer set programming, although they do not invent new nodes. The work [24] does not consider inhibition. For revision [21], real deletion is generally impossible in biological networks unless they are subject to change. Hence, we only add new links and nodes by abduction, yet nonmonotonic features of inhibition are controlled by our method due to the axiomatization (15–20). Abduction in metabolic pathways with inhibition is considered in [27], although the problem in [27] is different from network completion and no new links/nodes are abduced. For gene regulatory networks, Gat-Viks and Shamir [2] determine a class of regulation functions, by which regulators determine transcription, and analyze their complexity. Zupan et al. [30] construct networks from mutant data using abduction, but use experts’ heuristic rules for construction. Finally, completion of signaling networks is analyzed by Akutsu et al. [1], in which unknown Boolean functions are guessed in a Boolean network whose topology is known. This contrasts with our setting that a network is incomplete and its topology is not fixed. Tran and Baral [28] use an action language

128

K. Inoue, A. Doncescu, and H. Nabeshima

which formalizes notions such as causal rules, trigger rules and inhibition rules to model cell biochemistry, and apply it to hypothesize about signaling networks. As discussed in Section 4, all ground candidate nodes and links to be added are prepared as those abducible causal/trigger/inhibition rules in advance in [28].

6 Conclusion The method of meta-level abduction [6] has been greatly extended in this paper to allow representation of positive and negative causal effects. With this extension, nonmonotonic reasoning in causal networks and abduction of positive and negative links are now possible. We have also shown an application to signaling pathways, and expect that the proposed method can be applied to abduction in other types of biological networks [2,27,29,21]. It is important to evaluate logically possible hypotheses, and some statistical methods can be applied. For example, hypotheses can be ranked according to frequencies of literals appearing in them and corresponding paths [8], and can be given their scores according to their fitness with observed data [2]. Problem solving with meta-level abduction consists of (i) design of meta-level axioms, (ii) representation of domain knowledge at the meta level, and (iii) restriction of the search space to treat large knowledge. This work supposes an incomplete network for the point (ii), whose representation is rather tractable. In fact, we have made great effort on the point (i), yet another axiomatization is possible for controlling inference in a different way. Possible extensions include introduction of time for causal chains and application of majority logic for determining values in competing cases. The point (iii) is achieved by introducing more constraints, and it is a future work to explore useful methods for inducing such constraints.

References 1. Akutsu, T., Tamura, T., Horimoto, K.: Completing Networks Using Observed Data. In: Gavald`a, R., Lugosi, G., Zeugmann, T., Zilles, S. (eds.) ALT 2009. LNCS, vol. 5809, pp. 126–140. Springer, Heidelberg (2009) 2. Gat-Viks, I., Shamir, R.: Chain functions and scoring functions in genetic networks. Bioinformatics 19(suppl.1), i108–i117 (2003) 3. Inoue, K.: Linear resolution for consequence finding. Artificial Intelligence 56, 301–353 (1992) 4. Inoue, K.: Induction as consequence finding. Machine Learning 55, 109–135 (2004) 5. Inoue, K., Bando, H., Nabeshima, H.: Inducing Causal Laws by Regular Inference. In: Kramer, S., Pfahringer, B. (eds.) ILP 2005. LNCS (LNAI), vol. 3625, pp. 154–171. Springer, Heidelberg (2005) 6. Inoue, K., Furukawa, K., Kobayashi, I., Nabeshima, H.: Discovering Rules by Meta-level Abduction. In: De Raedt, L. (ed.) ILP 2009. LNCS, vol. 5989, pp. 49–64. Springer, Heidelberg (2010) 7. Inoue, K., Iwanuma, K., Nabeshima, H.: Consequence finding and computing answers with defaults. Journal of Intelligent Information Systems 26, 41–58 (2006) 8. Inoue, K., Sato, T., Ishihata, M., Kameya, Y., Nabeshima, H.: Evaluating abductive hypotheses using an EM algorithm on BDDs. In: Proceedings of IJCAI 2009, pp. 810–815 (2009) 9. Iwanuma, K., Inoue, K.: Minimal Answer Computation and SOL. In: Flesca, S., Greco, S., Leone, N., Ianni, G. (eds.) JELIA 2002. LNCS (LNAI), vol. 2424, pp. 245–257. Springer, Heidelberg (2002)

Hypothesizing about Causal Networks with Positive and Negative Effects

129

10. King, R.D., Whelan, K.E., Jones, F.M., Reiser, P.G.K., Bryant, C.H., Muggleton, S.H., Kell, D.B., Oliver, S.G.: Functional genomic hypothesis generation and experimentation by a robot scientist. Nature 427, 247–252 (2004) 11. Moyle, S.: Using Theory Completion to Learn a Robot Navigation Control Program. In: Matwin, S., Sammut, C. (eds.) ILP 2002. LNCS (LNAI), vol. 2583, pp. 182–197. Springer, Heidelberg (2003) 12. Muggleton, S.H., Bryant, C.H.: Theory Completion Using Inverse Entailment. In: Cussens, J., Frisch, A.M. (eds.) ILP 2000. LNCS (LNAI), vol. 1866, pp. 130–146. Springer, Heidelberg (2000) 13. Muggleton, S., Buntine, W.: Machine invention of first-order predicate by inverting resolution. In: Proceedings of the 5th International Workshop on Machine Learning, pp. 339–351. Morgan Kaufmann, San Francisco (1988) 14. Nabeshima, H., Iwanuma, K., Inoue, K.: SOLAR: A consequence finding system for advanced reasoning. In: Cialdea Mayer, M., Pirri, F. (eds.) TABLEAUX 2003. LNCS, vol. 2796, pp. 257–263. Springer, Heidelberg (2003) 15. Nabeshima, H., Iwanuma, K., Inoue, K., Ray, O.: SOLAR: An automated deduction system for consequence finding. AI Communications 23(2–3), 183–203 (2010) 16. Otero, R.P.: Induction of the Indirect Effects of Actions by Monotonic Methods. In: Kramer, S., Pfahringer, B. (eds.) ILP 2005. LNCS (LNAI), vol. 3625, pp. 279–294. Springer, Heidelberg (2005) 17. Pearl, J.: Causality: Models, Reasoning, and Inference, 2nd edn., Cambridge (2009) 18. Poole, D.: A logical framework for default reasoning. Artificial Intelligence 36, 27–47 (1988) 19. Prives, C., Hall, P.A.: The p53 pathway. Journal of Pathology 187, 112–126 (1999) 20. Ray, O., Inoue, K.: A Consequence Finding Approach for Full Clausal Abduction. In: Corruble, V., Takeda, M., Suzuki, E. (eds.) DS 2007. LNCS (LNAI), vol. 4755, pp. 173–184. Springer, Heidelberg (2007) 21. Ray, O., Whelan, K., King, R.: Logic-based steady-state analysis and revision of metabolic networks with inhibition. In: Proceedings of the 3rd International Workshop on Intelligent Informatics in Biology and Medicine, pp. 661–666 (2010) 22. Reiser, P.G.K., King, R.D., Kell, D.B., Muggleton, S.H., Bryant, C.H., Oliver, S.G.: Developing a logical model of yeast metabolism. Electronic Transactions in Artificial Intelligence 5B2(024), 223–244 (2001) 23. Reiter, R.: A logic for default reasoning. Artificial Intelligence 13, 81–132 (1980) 24. Schaub, T., Thiele, S.: Metabolic Network Expansion with Answer Set Programming. In: Hill, P.M., Warren, D.S. (eds.) ICLP 2009. LNCS, vol. 5649, pp. 312–326. Springer, Heidelberg (2009) 25. Schurz, G.: Patterns of abduction. Synthese 164(2), 201–234 (2008) 26. Shmulevich, I., Dougherty, E.R., Kim, S., Zhang, W.: Probabilistic Boolean networks: A rule-based uncertainty model for gene regulatory networks. Bioinformatics 18(2), 261–274 (2002) 27. Tamaddoni-Nezhad, A., Chaleil, R., Kakas, A., Muggleton, S.: Application of abductive ILP to learning metabolic network inhibition from temporal data. Machine Learning 65, 209–230 (2006) 28. Tran, N., Baral, C.: Hypothesizing about signaling networks. Journal of Applied Logic 7(3), 253–274 (2009) 29. Yamamoto, Y., Inoue, K., Doncescu, A.: Integrating abduction and induction in biological inference using CF-Induction. In: Lodhi, H., Muggleton, S. (eds.) Elements of Computational Systems Biology, pp. 213–234. John Wiley & Sons, Chichester (2010) 30. Zupan, B., Demsar, J., Bratko, I., Juvan, P., Halter, J.A., Kuspa, A., Shaulsky, G.: GenePath: A system for automated construction of genetic networks from mutant data. Bioinformatics 19(3), 383–389 (2003)

BET : An Inductive Logic Programming Workbench Srihari Kalgi, Chirag Gosar, Prasad Gawde, Ganesh Ramakrishnan, Kekin Gada, Chander Iyer, Kiran T.V.S, and Ashwin Srinivasan Department of Computer Science and Engineering IIT Bombay, India {cgosar,ganesh}@cse.iitb.ac.in {chanderjayaraman,kekin.gada,prasg41,srihari.kalgi,t.kiran05}@gmail.com [email protected] http://www.cse.iitb.ac.in/~bet

Abstract. Existing ILP (Inductive Logic Programming) systems are implemented in diﬀerent languages namely C, Progol, etc. Also, each system has its customized format for the input data. This makes it very tedious and time consuming on the part of a user to utilize such a system for experimental purposes as it demands a thorough understanding of that system and its input speciﬁcation. In the spirit of Weka [1], we present a relational learning workbench called BET(Background + Examples = Theories), implemented in Java. The objective of BET is to shorten the learning curve of users (including novices) and to facilitate speedy development of new relational learning systems as well as quick integration of existing ILP systems. The standardized input format makes it easier to experiment with diﬀerent relational learning algorithms on a common dataset. Keywords: BET, ILP systems, Golem, Progol, FOIL, PRISM, TILDE.

1

Introduction

There have been several Inductive Logic Programming (ILP) system implementations. Each system has its own speciﬁcations for input data. Diﬀerent systems do not necessarily agree on their inputs. This often makes comparisons across diﬀerent implementations tricky, owing to either a diﬀerence in names or semantics of parameters and/or a diﬀerence in the choice of the programming language. Very often, the primitives and core components employed, such as theorem provers, SAT solvers, inference engines, etc., are also diﬀerent across diﬀerent implementations, rendering the computation and accuracy comparisons less reliable. This paper discusses a Workbench for ILP called BET. BET is developed in Java and it standardizes the speciﬁcation of input using XML (eXtensible Markup Language). It provides a common framework for “building” as well as “integrating” diﬀerent ILP systems. The provision for implementing P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 130–137, 2011. c Springer-Verlag Berlin Heidelberg 2011

BET : An ILP Workbench

131

algorithms in a common language (Java) improves the feasibility of comparing algorithms on their computational speeds. Whereas, the input standardization enables sound comparison of accuracies (or related measures) and also allows for experimenting with multiple ILP systems on the same dataset without any input conversion required to the system speciﬁc format. BET includes several evaluation functions and operator primitives such as Least General Generalization (LGG) [9], Upward cover, Downward cover, etc. These features facilitate the rapid development of new relational learning systems and also ease out the integration of existing relational systems into BET. BET also allows a user to choose from multiple theorem provers as plug and play components. Presently, YAP (Yet Another Prolog) [12] and SWI-Prolog [13] are included in the basic package. The initial version of BET has three relational systems implemented namely FOIL [4], Golem [3] and TILDE [2][10] and four relational systems integrated namely Progol [11], FOIL, Golem and PRISM [5][6] (Though PRISM is not a standard ILP system, it has been integrated with the speciﬁc intension of learning probabilities in order to associate uncertainity with theories learnt using ILP systems). We proceed with an overview of BET and the motivation to develop such a system in Section 2. Section 3 focuses on the design of the BET system. Section 4 explains how new relational learning systems can be integrated/implemented in BET. Section 5 compares BET with existing workbenches and highlights the advantages of BET. We summarize BET in Section 6.

2

Overview

A principal motivation for developing a system like BET is the reduction of the learning curve for both expert-users and novices as well as programmers in the area of relational learning, particularly ILP. For example, with BET, the enduser will need to understand only the standardized input parameters for BET. This reduces the time overheads involved in comparing diﬀerent algorithmic implementations as well as in experimenting with individual implementations. More speciﬁcally, a user need not convert datasets from one format to another while switching between ILP systems. Further, the standardized APIs in BET make development of algorithms within BET much easier. Figure 1 shows the block diagram of BET. Any ILP system in BET takes four ﬁles as its input namely positive examples, negative examples, background knowledge and language restriction ﬁles, and it outputs in the form of theories. There are primarily two important components of BET namely the BET GUI and the BET Engine. The BET Engine is the back-end engine at the core of BET and the BET GUI communicates with the BET engine through the medium of a properties ﬁle. BET users can experiment with the system using the GUI whereas programmers can use the APIs provided and extend BET with new ILP or relational learning systems. Section 5 explains how BET could be extended.

132

S. Kalgi et al.

Fig. 1. Block diagram of BET

3

Design of BET

Almost all ILP algorithms as well as systems require following ﬁve inputs: positive examples, negative examples, background knowledge, mode declarations and hyper-parameters for tuning the system. The clauses learnt may be customized by means of the mode declarations, though some algorithms/systems may not allow for the speciﬁcation of mode declarations (example is Conﬁdence-based Concept Discovery system [7]). In this Section, we discuss the need for having a standard for the input, and eventually specify the BET standard input ﬁle formats. 3.1

Need for Standard Format

There is little or no consensus between the input speciﬁcations of ILP systems. For example, FOIL has its standard input speciﬁcation which is completely diﬀerent from that of Golem or Progol. FOIL accepts the positive examples, negative examples and background knowledge in a single ﬁle. On the other hand, Golem takes three ﬁles as input viz. positive example ﬁle (.f ), negative example ﬁle (.n) and the background knowledge ﬁle (.b) which includes the mode declarations. Another ILP system Progol has an input format that is slightly similar to Golem, but has many more setting parameters. Clearly any end user, desiring to experiment with a new ILP system, is required to understand its input format thoroughly, convert the data in hand to that format and only then can he/she use it. BET assists the end user with a standardized input speciﬁcation that is generic enough and can be converted to the speciﬁcation of any existing ILP system. Section 3.2 will discuss about BET standard formats. 3.2

BET Standard Format

As already stated, BET’s inputs are comprised of four XML ﬁles namely positive examples, negative examples, background knowledge and language restriction ﬁle. Sample positive example, negative example, background knowledge and language restriction ﬁles for learning the ancestor relation are shown in Table 1, Table 2, and Table 3 respectively in the document available at [15]. The hyperparameters can be speciﬁed in Language Restriction ﬁle. The format for each ﬁle is as follows:

BET : An ILP Workbench

133

Positive Example File: The ﬁle consists of clauses which represents positive examples for the relation (predicate) for which the theory needs to be learned. Negative Example File: This ﬁle consists of clauses which represents negative examples of the predicate (relation) for which the theory needs to be learned. There may be some ILP systems which do not consider any negative examples during construction of theory, but may utilize negative examples for pruning the theories that have been learned. Background knowledge File: The background knowledge (BGK) ﬁle contains all the domain specific information which is required by the ILP system in order to learn the target predicate. All this information should be in the form of clauses. It can also contain rules instead of just facts. Language Restriction File: The structured search space (lattice or simply a partial order) of clauses which needs to be searched in order to arrive at a reasonably good hypothesis is almost inﬁnite. Language Restrictions endow an ILP system with the ﬂexibility of reducing the search space. There are three generic parts to the Language Restriction viz. Mode declaration, Type and Determination. Also we can specify the system-speciﬁc hyper-parameters like stopping threshold, minimum accuracy, etc. in this ﬁle only. Each of them, is explained below. Type: Type deﬁnes the type of constants. For example, the constant john is of type person, constant 1 is of type integer. Type speciﬁcation can be done in the language restriction ﬁle. Mode Declarations: Mode declarations declare the mode of the predicates that can be present in any of clausal theories. The mode declaration takes the form mode(RecallNumber,PredicateMode), where RecallNumber: bounds the non-determinacy of a form of predicate call. PredicateMode: has the following syntax predicate(ModeType,ModeType,...) predicate(Type,Type,...) +Type : the term must be an input variable of type Type. -Type : the term must be an output variable of type Type. #Type : the term must be a ground constant of type Type. Determination: This component of mode declarations provides information regarding which predicates need to be learned in terms of which other predicates. Hyper-parameters: Hyper-parameters are very much system speciﬁc and we can ﬁnd the diﬀerent parameters for a system by doing system-name –help or through the graphical interface for that particular system.

134

4

S. Kalgi et al.

Class Diagram and Components of BET

The class diagram of BET is shown in Figure 1 in the document available at [15]. The major components of BET are explained in subsequent sections. ClauseSet: ClauseSet refers to a set of clauses, which is often referred to in the description of ILP algorithms. The ClauseSet interface deﬁnes the signature of the methods used to access the ClauseSet object. LanguageRestriction: LanguageRestriction is an interface for mode declarations, determinations and types. InputEncoder: InputEncoder is mainly used for integrating legacy systems (i.e. ILP systems written in native code) into BET. Any wrapper around an integrated legacy system will require conversion of the BET standard data format to the format accepted by the legacy system. Any legacy system which requires to be integrated into BET has to implement InputEncoder interface and provide a method of converting the standard BET ﬁle format to the format accepted by the legacy system. TheoryLearner: TheoryLearner is an important component of BET. It is responsible for learning the theory (hypothesis) from the input. TheoryLearner has objects of type InputEncoder and EvalMetric (explained next) as its data members. In case the ILP system is completely implemented in Java (i.e., if it is not a legacy system), it can use a dummy implementation of the InputEncoder interface and pass the object to the TheoryLearner class. The dummy implementation of InputEncoder interface is mainly used to access the BET input ﬁles. EvalMetric (Evaluation Metric): Any ILP algorithm will try to explore the structured space (subsumption lattice or partial order) of clauses, by traversing the graph using reﬁnement operators. At every point in the space, the algorithm has to decide whether a clause in the space is good enough to be present in the hypothesis. For this purpose, the covers relation is employed. If the covers relation is deﬁned by Entailment (|=), then the ILP system is said to learn from entailment [9]. Some other ILP systems learn from proof traces [9], while few others learn from interpretations [9], etc. Any implementation of EvalMetric will specify the covers relation, i.e., definition of an example being covered by background knowledge (with candidate hypothesis). TheoremProver: The theorem prover is the backbone of most ILP systems. BET has two diﬀerent theorem provers namely YAP and SWI-Prolog. YAP is perhaps the fastest theorem prover as of today. YAP is built in C and doesn’t have any JNI (Java Native Interface), so the YAP process is run by spawning a process through a BET program. SWI-Prolog is also built in C, but it does support JNI (Java Native Interface). SWI-Prolog has a standard interface called JPL which comes bundled with SWI-Prolog itself.

BET : An ILP Workbench

5

135

Support for Building ILP Systems in BET

It is very easy to integrate1 an existing system into BET. Also the implementation2 of a new system within BET is faster than implementing it from scratch. The following section briefs on how to integrate and implement a system in BET. 5.1

Integrating a Legacy System in BET

Legacy systems can be integrated into BET as follows: – Implement the interface InputEncoder, which should provide a functionality to convert ﬁles from BET standard format to the format accepted by the legacy system. – Extend the TheoryLearner class and override the method learnTheory. 5.2

Implementing a New ILP System in BET

– A dummy implementation of the interface InputEncoder is required for this purpose, since the TheoryLearner class expects an object of InputEncoder while creating its object. – Extend the TheoryLearner class and override the method learnTheory. – Diﬀerent types of Evaluation Metric, Theorem provers (YAP, SWI-Prolog) can be used in implementing the ILP system.

6

Related Work

Aleph and GILPS (Generic Inductive Logic Programming System) are two earlier eﬀorts put in to develop a workbench like BET for Inductive Logic Programming. Aleph [8] is developed by Ashwin Srinivasan, whereas the GILPS [14] workbench is developed by Jose Santos. 6.1

Aleph

Aleph is written in Prolog principally for use with Prolog compilers like Yap and SWI-Prolog compiler. Aleph oﬀers a number of parameters to experiment with its basic algorithm. These parameters can be used to choose from diﬀerent search strategies, various evaluation functions, user-deﬁned constraints and cost speciﬁcations. Aleph also allows user-deﬁned reﬁnement operators. 6.2

GILPS

GILPS implements three relational systems namely TopLog, FuncLog and ProGolem. GILPS requires at least YAP 6.0 for its execution. Many of its user predicates and settings are shared with Aleph. 1 2

The authors of this paper took two weeks to integrate PRISM in BET and one week individually for integrating Golem and FOIL. The authors of this paper implemented TILDE, FOIL and Golem in BET within a week for each algorithm.

136

6.3

S. Kalgi et al.

Advantages of BET over Existing Systems

BET oﬀers following advantages over existing systems (Aleph, GILPS ,etc.): – BET is more likely to ﬁnd use in the larger applied machine learning and Mining communities who are less familiar with prolog and where it is important to interface learning tools in Java (such as BET) with applications largely written in procedural languages (very often Java). This can also make diagnosis and debugging easy. As against this, GILPS and Aleph assume familiarity with Prolog and cannot be easily invoked from applications written in Java. – In the spirit of Weka, BET provides a nice framework for the integration of legacy systems as well as for the implementation of new systems. In fact, while the basic BET framework was provided by the ﬁrst two co-authors, the remaining co-authors used that framework to implement several ILP algorithms. This is something that Aleph and GILPS do not cater to as well. – BET allows saving the learned models as serialized ﬁles which can later be used for ﬁnding models for new problems. – BET provides a choice of theorem prover where as GILPS can work only with YAP. – BET comes with a YAP installer and all the “integrated” systems. – BET has classes to convert the background knowledge, positive examples and negative examples ﬁles into XML format. Language restriction ﬁle needs little human intervention for this purpose. – BET provides a standard input/output format which enables end-user to experiment with multiple relational systems with the same datasets. Aleph uses three diﬀerent ﬁles namely (.f), (.n) and (.b) whereas GILPS takes input as prolog ﬁles (.pl).

7

Summing Up BET

The standardized input format of BET makes it more convenient for user to have only one input format for all relational systems. The ability of BET to write learned classiﬁcation/regression models as serialized ﬁles allows for saving the model and reusing the model at a later stage for classiﬁcation or regression on new problems. The BET graphical user interface makes experimentation with implemented algorithms and integrated systems much more easier. Use of JAVA as an implementation language makes BET extensible and platform independent. The only visible disadvantage of BET is that the JAVA implementation of relational systems are slower as compared to their C/C++/Progol counterparts, but we chose Java over C++ owing to ease of extending and platform independence of the former over the latter.

BET : An ILP Workbench

137

References 1. Frank, E., Hall, M.A., Holmes, G., Kirkby, R., Pfahringer, B., Witten, I.H.: WekaA machine learning workbench for data mining. In: Data Mining and Knowledge Discovery Handbook- A Complete Guide for Practitioners and Researchers, pp. 1305–1314. Springer, Berlin (2005) 2. Blockeel, H., De Raedt, L.: Top-down induction of ﬁrst-order logical decision trees. Artiﬁcial Intelligence Journal, 285–297 (1998) 3. Muggleton, S.H., Feng, C.: Eﬃcient induction of logic programs. In: Proceedings of the First Conference on Algorithmic Learning Theory, Ohmsha, Tokyo, pp. 368– 381 (1990) 4. Ross Quinlan, J., Mike Cameron-Jones, R.: FOIL: A Midterm Report. In: Brazdil, P.B. (ed.) ECML 1993. LNCS, vol. 667, pp. 3–20. Springer, Heidelberg (1993) 5. Sato, T., Kameya, Y., Zhou, N.-F.: Generative Modeling with Failure in PRISM. In: IJCAI, pp. 847–852 (2005) 6. Sato, T., Kameya, Y.: PRISM: A Language for Symbolic-Statistical Modeling. In: IJCAI, pp. 1330–1339 (1997) 7. Kavurucu, Y., Senkul, P., Toroslu, I.H.: ILP-based concept discovery in multirelational data mining. Expert Systems with Applications 36, 11418–11428 (2009) 8. Aleph Manual, http://www.comlab.ox.ac.uk/activities/machinelearning/ Aleph/aleph.html 9. Statistical Relational Learning Notes, http://www.cse.iitb.ac.in/~cs717/notes/ 10. TILDE: Top-down Induction of Logical Decision Trees, http://www-ai.ijs.si/ ~ilpnet2/systems/tilde.html 11. Progol, http://www.doc.ic.ac.uk/~shm/progol.html 12. YAP Manual, http://www.dcc.fc.up.pt/~vsc/Yap/ 13. SWI-Prolog, http://www.swi-prolog.org/ 14. General Inductive Logic Programming System, http://www.doc.ic.ac.uk/~jcs06/GILPS/ 15. ILP Systems Integrated Implemented in BET and Sample Examples, http://www. cse.iitb.ac.in/~bet/appendix.pdf

Seeing the World through Homomorphism: An Experimental Study on Reducibility of Examples ˇ Ondˇrej Kuˇzelka and Filip Zelezn´ y Intelligent Data Analysis Research Group Dept. of Cybernetics, Czech Technical University in Prague http://ida.felk.cvut.cz {kuzelo1,zelezny}@fel.cvut.cz Abstract. We study reducibility of examples in several typical inductive logic programming benchmarks. The notion of reducibility that we use is related to theta-reduction, commonly used to reduce hypotheses in ILP. Whereas examples are usually not reducible on their own, they often become implicitly reducible when language for constructing hypotheses is ﬁxed. We show that number of ground facts in a dataset can be almost halved for some real-world molecular datasets. Furthermore, we study the impact this has on a popular ILP system Aleph.

1

Introduction

In this paper, we are interested in identiﬁcation of learning examples which are not distinguishable given a ﬁxed hypothesis language. We propose a notion of safe reduction and show how it can be exploited in order to obtain smaller examples equivalent to the original ones.

2

Preliminaries

Let us ﬁrst state some notational conventions used in this paper. The set of literals in a clause C is written as lits(C), |C| = |lits(C)| is the size of C. The set of variables in a clause C is written as vars(C) and the set of all terms by terms(C). A substitution θ is a mapping from variables of a clause C to terms of a clause D. Let us now deﬁne θ-reduction [4], which will be later utilized for reduction of training examples. In order to deﬁne θ-reduction, we need the notion of θsubsumption [5]. Let us denote the set of variables contained in a clause C by vars(C). We say that a clause C θ-subsumes clause D (denoted by C θ D) if and only if there is a substitution θ : vars(C) → vars(D) such that Cθ ⊆ D. It holds that θ-subsumption implies entailment, but not vice-versa, i.e. if C θ D then C |= D, but if C |= D then C θ D may or may not be true. Definition 1 (θ-Reduction). Let C and D be clauses. We say that C and D are θ-equivalent (denoted by C ≈θ D) if and only if C θ D and D θ C. If there is a clause E such that C ≈θ E and |E| < |C| then C is said to be θ-reducible. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 138–145, 2011. c Springer-Verlag Berlin Heidelberg 2011

Seeing the World through Homomorphism: An Experimental Study

139

For example, C = east(T ) ← hasCar(T, C)∧hasLoad(C, L1)∧hasLoad(C, L2)∧ box(L2) is θ-reducible because C ≈θ E where E = east(T ) ← hasCar(T, C) ∧ hasLoad(C, L) ∧ box(L). In this short paper, we will work within the learning from entailment setting [1]. Definition 2 (Learning from Entailment). Let H and e be clausal theories. Then we say that H covers e under entailment (denoted by H E e) if and only if H |= e. For example, let e = east(t1) ← hasCar(t1, c1) ∧ hasLoad(c1, l1) ∧ box(l1) and let H = ∀T ∀C : east(T ) ← hasCar(T, C). Then we may easily check that H covers e under entailment (i.e. H E e). In what follows we will refrain from writing the universal quantiﬁers in clauses.

3

Reducing the Examples

The learning task that we study in this paper is fairly standard. We are given a set of positive and negative examples encoded as ﬁrst-order clauses and we would like to ﬁnd a classiﬁer separating the positive examples from the negative examples. This task could be solved by numerous ILP systems. We aim at ﬁnding a reduction procedure that would allow us to reduce the number of atoms in the examples while guaranteeing that the coverage of individual hypotheses would not be changed. This is formalized by the next deﬁnition which introduces the concept of safe reduction under intepretations. Definition 3 (Safe Reduction under Entailment). Let e and eˆ be two interpretations and let L be a language specifying all possible hypotheses. Then eˆ is said to be a safe reduction of e under entailment if and only if ∀H ∈ L : (H E e) ⇔ (H E eˆ) and |ˆ e| < |e|. Clearly, any hypothesis H which splits the positive examples from the negative examples correctly will also split the respective safely reduced examples correctly. Also, when predicting classes of test-set examples, any deterministic classiﬁer that bases its decisions on the queries using solely the covering relation E will return the same classiﬁcation even if we replace some of the examples by their safe reductions1 . On the other hand, even the classiﬁers constructed by a deterministic learner on reduced and non-reduced examples may be diﬀerent. For example, ILP systems that restrict their search space by bottom clauses may return diﬀerent hypotheses for reduced and non-reduced examples. However, if the search is performed exhaustively, every hypothesis discovered for the reduced data will have to cover the same set of examples as some corresponding hypothesis discovered for the non-reduced data. Let us now look at possible candidates for safe reduction. For example, θreduction eˆ of a ground example e is a safe reduction because trivially eˆ = e. 1

This is also true for propositionalization approaches that use the E relation to construct boolean vectors which are then processed by attribute-value-learners.

140

ˇ O. Kuˇzelka and F. Zelezn´ y

Assuming that in practical learning tasks, examples are very often ground, θreduction alone does not seem to help us very much. It turns out that we need some additional assumptions in order to be able to reduce even ground examples. Before we present the (admittedly very simple) kind of safe reduction that will be in the center of our interest in this paper, we go through the next simple motivating example. Example 1. Suppose that we have one positive example e+ 1 = east(t1) ← hasCar(t1, c1) ∧ hasLoad(c1, l1) ∧ hasCar(t1, c2) and one negative example e− 2 = east(t2) ← hasCar(t2, c3). Our task is to learn a non-recursive deﬁnition of predicate east/1. Let the language L contain all non-recursive Horn clauses free of functions and constants and containing only predicate east/1 in the head and predicates hasCar/2 and hasLoad/2 in the body. Because of the non-recursivity and function-freeness assumptions we can check whether H E e is true by testing θ-subsumption between the hypothesis and the example. Let e be a clause obtained by variabilizing the clause e. Since constants are not allowed in the hypothesis language L, it holds that H θ e ⇔ H θ e . Next, let eˆ be θ-reduction of e . It also holds H θ e ⇔ H θ eˆ . Clearly, if H θ e, there is a substitution θ such that Hθ ⊆ e. If we replace the constants in θ by the respective variables used when variabilizing e and obtain a substitution θ , it will also hold Hθ ⊆ e . Finally, since there is a substitution θR1 such that e θR1 ⊆ eˆ (because e ≈ eˆ ), it must also hold H θ eˆ because Hθ θR1 ⊆ eˆ . Similarly, we could justify the implication in the other direction, i.e. H θ e ⇐ H θ eˆ . Applied to the example e+ ˆ+ 1 , we have that e 1 = east(T 1) ← hasCar(T 1, C1) ∧ + hasLoad(C1, L1) is a safe reduction of e1 w.r.t. the language L. Notice that it is important to have a ﬁxed hypothesis language to perform this kind of reductions. For example, if we allowed the constants c1, c2 and c3, eˆ+ 1 would no longer be a safe reduction of e+ 1 because the hypothesis H = east(T ) ← hasCar(T, c1) ∧ hasCar(T, c2) would cover e+ ˆ+ 1 but not e 1. We are now ready to describe the reduction method. The method expects the examples encoded as ﬁrst-order clauses and a description of the hypothesis language on its input. The hypothesis language speciﬁcation should provide information about which predicates and constants can be used to build the hypotheses. It starts by variabilizing the constants which are not in the hypothesis language but appear in the examples. After that, examples are reduced using θ-reduction and these reductions are output by the algorithm. In order to justify correctness of this procedure, we need the next almost trivial proposition. Proposition 1. Let L be a hypothesis language and let e be a clause. (i) Let e˜ be a clause obtained from e by variabilizing the constants which are not contained in the hypothesis language. Then (H E e) ⇔ (H E e˜) for any H ∈ L (ii) Let eˆ be θ-reduction of e˜. Then (H E e) ⇔ (H E eˆ) for any H ∈ L. The ﬁrst part of Proposition 1 justiﬁes the step of the reduction, in which some constants are replaced by variables, and the second part justiﬁes the step, in

Seeing the World through Homomorphism: An Experimental Study

141

which the examples are reduced using θ-reduction. Optionally, we may perform also a third step in which the variables introduced in the ﬁrst step are converted back to constants. Example 2. Let us have a hypothesis language for the task of predicting mutagenicity of molecules L. Let us have one example e = pos(m) ← bond(a1, a2, 2) ∧ bond(a2, a1, 2) ∧ a(m, a1, c) ∧ a(m, a2, c) ∧bond(a1, a3, 1) ∧ bond(a3, a1, 1) ∧ a(m, a3, h) ∧ a(m, a4, h) ∧ bond(a2, a5, 1) ∧bond(a5, a2, 1) ∧ a(m, a5, h) ∧ bond(a2, a6, 1) ∧ bond(a6, a2, 1) ∧ a(m, a6, h). In the hypothesis language L we do not consider the names of atoms (i.e. constants a1, a2 etc). We start by performing the ﬁrst step of the reduction procedure, i.e. by variabilizing the constants that do not appear in the hypothesis language L. We replace constant a1 by variable A1, a2 by A2 and so on and obtain a clause e˜. After this step, we compute the θ-reduction of e˜, which is eˆ = pos(m) ← bond(A1, A2, 2) ∧ bond(A2, A1, 2) ∧ atm(m, A1, c)∧ ∧a(m, A2, c) ∧ bond(A1, A3, 1) ∧ bond(A3, A1, 1) ∧ ∧a(m, A3, h)∧ . bond(A2, A5, 1) ∧ bond(A5, A2, 1) ∧ a(m, A5, h), The θ-reduction of eˆ is witnessed by the substitution θ = {A4/A3, A6/A5}. It is easy to check that eθ ⊆ eˆ. Clause eˆ is a safe reduction of e.

4

Experiments

In this section, we discuss reducibility of examples from real-life datasets using typical hypothesis languages. We show that, in the most extreme case, some examples are reduced to one tenth of their original length. Then we study the eﬀect example reductions have on Aleph. The θ-reduction is performed by an algorithm built upon the θ-subsumption system ReSumEr2 [3]. Reduction runtimes were in all cases under 30 seconds, which is a negligible amount of time compared to time consumed by Aleph as we will see. In all of the experiments we deal only with ground examples and non-recursive clauses. Therefore, for these experiments, we do not need the whole logical formalism. It would suﬃce to consider only θ-subsumption (homomorphism). 4.1

Mutagenesis

The ﬁrst set of experiments which we performed was done with the well-known Mutagenesis dataset [6]. In the encoding which we used and which is also usually used in the experiments with most ILP systems, every molecule is described using predicates atm(M, A, T, T 2) and bond(A, B, BT ). For example, let us have a literal atm(mol, atom1, c, 22). Here, mol is an identiﬁer of the molecule, atom1 is an identiﬁer of the atom, the third argument denotes the atomic type, here c means carbon, and the constant 22 in the fourth argument means that atom1 is an aromatic atom. Similarly, bond(atom1, atom2, 1) denotes a single bond

142

ˇ O. Kuˇzelka and F. Zelezn´ y 1 0.9 0.8

Compression

0.7 0.6 0.5 0.4 0.3 0.2 0.1 0

Muta

Muta with f. g. PTC (FM) Dataset

CAD

Fig. 1. Compression rates (number of facts in reduced example / number of facts in original example) obtained for three real-life datasets (Mutagenesis [6], Mutagenesis with function groups, PTC [2] and CAD [7]). The bars show maximum, average and minimum obtained compression.

between atoms atom1 and atom2. Each atomic bond is represented by two such bond/3 literals. In this case, when testing H E e with a single non-recursive clause H, the covering relation E corresponds to homomorphism testing (or θsubsumption testing2 ). We let the hypothesis language L contain only constants corresponding to atomic types and numbers. After applying the safe reduction procedure, the number of literals in the examples decreased to 86% on average. The most succesful reduction decreased the number of literals in an example to 40% of the original count. Next, we enriched the examples and the hypothesis language L by description of function groups such as benzene, phenathrene etc. This corresponds to another frequently used setting. Interestingly, the reduction rates diﬀered only by a very small number from the previous case. The number of literals decreased to 87% on average and, for the most succesful reduction, the number of literals in one example decreased to 42% of the original count of literals. 4.2

Predictive Toxicology Challenge

The next experiment was performed with the Predictive Toxicology Challenge dataset (PTC). PTC dataset consists of molecules marked according to their carcinogenicity for female mice, male mice, female rats and male rats. Since the examples are almost the same for all of the four cases (with the exception of a few molecules contained in only some of the four datasets), we performed our experiments only for female mice. The atoms in this dataset are described at a cruder level compared to the Mutagenesis dataset. Only the basic types 2

Checking homomorphism of labeled hypergraphs, checking θ-subsumption of clauses and solving constraint satisfaction problems is essentially the same thing.

Seeing the World through Homomorphism: An Experimental Study H(3)

H(3)

C(22)

C(22)

H(3)

H(3)

C(22)

C(22) O(40)

O(40) H(3)

C(22)

C(22)

143

C(22)

N(38)

N(38)

O(40) C(22)

N(38)

O(40)

C(22)

H(3)

O(40)

A) The original example

B) The reduced example

Fig. 2. The example from the Mutagenesis dataset which was compressed most by the reduction procedure. Left: The original example. Right: The reduced example. Note that every bond is represented by a pair of bond/3 literals.

like carbon and not aromatic carbon are used. A consequence of this is that higher reduction rates are possible. After applying the safe reduction procedure, the number of literals in the examples decreased to 62% on average. The most succesful reduction decreased the number of literals in an example to just 8% of the original count. 4.3

CAD

The last experiment was performed with the CAD dataset [7]. This dataset contains 96 class-labeled product-structures desings. After applying the safe reduction procedure to the examples from the CAD dataset, the number of literals in them decreased to 77% on average. The most succesful reduction decreased the number of literals in an example to 56% of the original count. The reason for smaller diﬀerence between average and maximum reduction rates as compared to the previous two datasets was that the designs contain next/2 literals which express a sort of ordering of the elements, which limits applicability of the θ-reduction. 4.4

Aleph with Reduced and Non-reduced Data

Finally, we decided to compare performance of Aleph on reduced and nonreduced versions of the datasets. We set the maximum number of explored nodes to 100000 and the noise parameter to ﬁve percent of the number of examples in the respective dataset. For both versions of the Mutagenesis dataset (without function groups and with function groups), it took Aleph longer to produce a theory for the reduced data, however, the predictive accuracy was higher for the reduced data. In fact, the Mutagenesis dataset was the only dataset where Aleph obtained statistically signiﬁcant improvement in predictive accuracy (two-sided paired t-test with α = 0.05). For PTC dataset, reduction caused a speedup of factor 2.63. For the CAD dataset, Aleph obtained a reasonable speed-up and slightly higher predictive accuracy than for the non-reduced dataset. The reason

144

ˇ O. Kuˇzelka and F. Zelezn´ y

Table 1. Accuracy of Aleph (estimated by 10-fold cross-validation) on the reduced and non-reduced datasets. Muta is non-reduced Mutagenesis, Muta-R is reduced Mutagenesis, Muta-FG is Mutagenesis with function groups, Muta-FG-R is reduced Mutagenesis with function groups etc. Muta Muta-R Muta-FG Muta-FG-R PTC PTC-R CAD CAD-R Accu. 68.8 ± 6.6 71.6 ± 7.5 73.3 ± 11.3 73.8 ± 10.7 63.3 ± 6.7 63.6 ± 4.7 85.4 ± 9.7 88.7 ± 9.9 Run. [s] 356 378 298 339 17108 6522 244 168

why not only runtimes but also accuracies were aﬀected by the safe reduction is that through the reduction of examples we also reduce bottom clauses, which, in turn, means smaller search space for Aleph. Not only can we use the techniques introduced in this paper to reduce the examples, we may also use them to obtain an upper bound on the training set accuracy. Clearly, if we variabilize the constants that do not appear in the hypothesis language L in two examples e1 and e2 and obtain examples eˆ1 and eˆ2 and if it holds eˆ1 E eˆ2 and eˆ2 E eˆ1 then these two examples are indistinguishable using the hypotheses from L. If they have diﬀerent classiﬁcation then we have an unremovable term added to the training set error. For example, on the PTC dataset, the calculated upper bound was 98.5%. A more complicated calculation may be used to obtain a much tighter upper bound for the particular case of hypotheses in the form of clausal theories. The bound used in this subsection applies also to propositionalization approaches.

5

Conclusions

We have shown that when a hypothesis language is ﬁxed, even ground examples may become reducible. In other words, we have shown that, in many experiments commonly performed with ILP systems, there is a lot of redundant information in the examples. We have also shown how the underlying principles of the reduction procedure can be used to compute an upper bound on the training-set accuracy.

Acknowledgement The authors would like to thank the anonymous reviewers of ILP’10 for their valuable comments. The authors have been supported by the Czech Grant Agency through project 103/10/1875 (Learning from Theories).

References 1. De Raedt, L.: Logical settings for concept-learning. Artif. Intell. 95(1), 187–201 (1997) 2. Helma, C., King, R.D., Kramer, S., Srinivasan, A.: The predictive toxicology challenge 2000-2001. Bioinformatics 17(1), 107–108 (2001) ˇ 3. Kuˇzelka, O., Zelezn´ y, F.: A restarted strategy for eﬃcient subsumption testing. Fundam. Inf. 89(1), 95–109 (2009)

Seeing the World through Homomorphism: An Experimental Study

145

4. Maloberti, J., Suzuki, E.: An eﬃcient algorithm for reducing clauses based on constraint satisfaction techniques. In: Camacho, R., King, R., Srinivasan, A. (eds.) ILP 2004. LNCS (LNAI), vol. 3194, pp. 234–251. Springer, Heidelberg (2004) 5. Plotkin, G.D.: A note on inductive generalization. Machine Intelligence 5, 153–163 (1970) 6. Srinivasan, A., Muggleton, S.H.: Mutagenesis: ILP experiments in a non-determinate biological domain. In: ILP 1994 (1994) ˇ akov´ ˇ 7. Z´ a, M., Zelezn´ y, F., Garcia-Sedano, J., Tissot, C.M., Lavraˇc, N., Kˇremen, P., Molina, J.: Relational data mining applied to virtual engineering of product designs. In: International Conference on Inductive Logic Programming (ILP 2007). Springer, Heidelberg (2007)

Appendix Lemma 1 (Plotkin [5]). Let A and B be clauses. If A θ B then A |= B. Proposition 1. Let L be a hypothesis language and let e be a clause. (i) Let e˜ be a clause obtained from e by variabilizing the constants which are not contained in the hypothesis language. Then (H E e) ⇔ (H E e˜) for any H ∈ L (ii) Let eˆ be θ-reduction of e˜. Then (H E e) ⇔ (H E eˆ) for any H ∈ L. Proof. We will start by showing validity of the implication (H |= e) ⇒ (H |= e˜). For contradiction, let us assume that there is a model M of the clausal theory H such that M |= e and H |= e˜. Then there must be a substitution θ grounding all variables in e˜ such that3 M |= eθ and M |= e˜θ. Now, we will construct another model M of H in which e will not be satisﬁed. We take each constant c in e that has been replaced by a variable V in e˜ and update the assignment φ of the constants c to objects from the domain of discourse so that φ(c) = φ(V θ). Clearly, we can do this for every constant c since every constant in e has been replaced by exactly one variable. Now, we clearly see that M |= e. However, we are not done yet as it might happen that the new model with the modiﬁed φ would no longer be a model of H. However, this is clearly not the case since none of the constants c appears in H and therefore the change of φ has no eﬀect whatsoever on whether or not H is true in M . So, we have arrived at a contradiction. We have a model M such that M |= H and M |= e which contradicts the assumption H |= e. The implication (H |= e) ⇐ (H |= e˜) follows directly from Lemma 1. We have e˜ θ e therefore also e˜ |= e and ﬁnally H |= e˜ |= e. (ii) In order to show (H E e) ⇒ (H E eˆ), it suﬃces to notice that H E e and e θ eˆ imply H E eˆ. The implication (H E e) ⇒ (H E eˆ) may be shown similarly as follows: H E eˆ and eˆ θ e imply H E e.

3

We are applying θ also to e because e need not be ground.

Learning Discriminant Rules as a Minimal Saturation Search Matthieu Lopez, Lionel Martin, and Christel Vrain LIFO, University of Orl´eans Orl´eans, France [email protected]

Abstract. It is well known that for certain relational learning problems, traditional top-down search falls into blind search. Recent works in Inductive Logic Programming about phase transition and crossing plateau show that no general solution can face to all these diﬃculties. In this context, we introduce the notion of “minimal saturation” to build non-blind reﬁnements of hypotheses in a bidirectional approach. We present experimental results of this approach on some benchmarks inspired by constraint satisfaction problems. These problems can be speciﬁed in ﬁrst order logic but most existing ILP systems fail to learn a correct deﬁnition, especially because they fall into blind search.

1

Introduction

The main characteristics of an ILP system are given by the deﬁnition of a search space, a reﬁnement operator and a heuristic function able to choose, at any step, the best candidate among possible reﬁnements. In this context, the reﬁnement operator plays a central role and approaches are usually divided into two main strategies: on one hand top-down searches start with a general clause and build specializations, on the other hand bottom-up searches start with a speciﬁc clause and generalize it. Then, in most cases, the reﬁnement operator allows to organize the search space as a lattice, starting either from a general clause called top () or a speciﬁc one called bottom (⊥). The most common top clause is deﬁned by a clause having a literal built with the target predicate as head and an empty body; usual bottom clauses are built from a seed example and are obtained by a “saturation-like” operation [13]. In this paper, we propose a bidirectional search where the main process consists in reducing the search space. At any step, our search space is deﬁned by a pair (i , ⊥i ) bounding the space, and our reﬁnement operator produces new bounds (i+1 , ⊥i+1 ) where i+1 is more speciﬁc than i and ⊥i+1 is more general than ⊥i . The search stops when i = ⊥i which corresponds to the learned rule. In our approach, at any step the clause i can be deduced from ⊥i and conversely ⊥i can be deduced from i . For this reason, our main process can be viewed either as searching for i+1 from i (top-down) or searching for ⊥i+1 from ⊥i (bottom-up). P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 146–157, 2011. c Springer-Verlag Berlin Heidelberg 2011

Learning Discriminant Rules as a Minimal Saturation Search

147

This work has been motivated by a family of problems hard to solve for most existing ILP approaches: learning constraint problems (CP) that consists in ﬁnding a characterization of solutions (or non-solutions) of constraint problems. The goal is to generate a Constraint Satisfaction Problem (CSP) adapted to the problem to solve. We have shown in [8] that this problem can be transformed into a learning problem speciﬁed by positive and negative examples which are respectively non-solutions and solutions of the constraint problem, thus, learning the negation of the constraint problem. This point is detailed in Section 5. These examples are deﬁned as interpretations in a subset of FOL, and additional background knowledge is provided (also described in FOL). The goal is then to learn discriminant rules, and in theory any ILP system could be used. For example, let us consider the classical graph coloring problem expressing that a graph is well colored when two adjacent nodes have two diﬀerent colors: negative (resp. positive) examples are well-colored graphs (resp. bad colored graphs), expressed in FOL, with predicates node, edge, col. Then a discriminative rule deﬁning a bad-colored graph could be: badcol(G) ← node(G, X), node(G, Y ), col(X, C), col(Y, C), edge(X, Y ). This rule indicates that a graph is not well-colored if there exists two adjacent nodes with the same color. From a learning point of view, we can notice that this rule has a particularity. It is a discriminative one but, if we remove any literal from its body, the obtained rule has no longer a discriminative power. The main motivation of this work is that, in practice, we observe that most systems fail on this task or ﬁnd a solution after an exhaustive search. This failure can be explained since the considered problems contain speciﬁc diﬃculties that are well known in the ILP community, called blind search. Recent works on phase transition problems in ILP [6,7,14] and blind search or crossing “plateau” [1,3,2] indicate that searching a solution may have to cope with hard problems. These analysis show that there is no general solution to ILP learning problems, and some eﬀorts must be done to both propose solutions and analyze their conditions of success and limitations. In this paper, we propose a new approach for learning ﬁrst order clauses, and we characterize the situations where it can be successfully used. The approach we present in this paper is based on a special saturation called “minimal saturation”. The main drawback of standard saturation is that it helps deﬁning a search space which may be very large and redundant. Our work relies on the fact that the saturation produces a clause naturally structured in layers. We propose to consider the layers one by one: at each step we search for a minimal subpart of a layer such that the associated saturation is discriminant. In doing so, the method tries to ﬁnd a discriminating rule with a reduced size. The paper is organized as follows. Section 2 introduces some basic notions whereas the formalization of the saturation used in our algorithm described in Section 3. In Section 4, we discuss the cases that seem adapted to our method and the cases that do not beneﬁt to our search strategies. Section 5 presents the benchmarks and experiments we have made.

148

2

M. Lopez, L. Martin, and C. Vrain

Preliminaries, Notations and Saturation

The language used to deﬁne concepts is composed of a set of terms (constants and variables) and a set of predicates. Predicates have mode declaration describing for each argument, its domain specifying what type of constants can be used: by the symbol +, if it is an input, or, by the symbol − for an output. For example, the predicate sum with arity 3 and the semantic of which is X+Y=Z where X,Y and Z denote its arguments could have the mode sum(+, +, −). An atom is an expression of the form p(t1 , t2 , . . . , tk ) where p is a k-arity predicate and t1 , t2 , . . . , tk are terms. A literal is an atom or the negation of an atom. We denote by input(l) and output(l), the sets of terms containing respectively the inputs and outputs of a literal l. We use the same notation for a formula f : input(f ) = l∈f input(l) and output(f ) = l∈f output(l). Moreover, the set of terms composing a literal is denoted by terms(l). The “variabilization” of a formula f , denoted vars(f ), is the operation consisting in substituting all the constants of f with variables such that each constant is replaced by a distinct variable. As said in the introduction, the saturation is a structure organized in several layers where each layer contains literals. layer(l) gives the number of the layer in which the literal l appears. Finally, considering sets of positive and negative examples, p(f ), resp. n(f ), denote the number of positive and negative examples covered by a formula f . 2.1

Saturation of an Example

In this section, we present and formalize the saturation operator consisting in ﬁnding all ground literals describing an example. It has been ﬁrst introduced in [13]. We present a simpliﬁed version where recall numbers[10], limiting the number of times a predicate is used are not considered. We propose to illustrate the construction with the following toy example, close to Michalski’s trains: Example In this example, each train is composed of cars. Each car has diﬀerent features as its number of wheels and its size. A car carries geometrical objects, described by their shape and their quantities. For instance, two examples corresponding to a positive and a negative example of a target concept are described as follows: + + + t+ 1 : {has car(t1 , c1 ), has car(t1 , c2 ), has car(t1 , c3 ), wheels(c1 , 2), wheels(c2 , 3), wheels(c3 , 5), long(c1 ), long(c2 ), long(c3 ), load(c1 , circle, 3), load(c2 , circle, 6), load(c3 , triangle, 10)} − − − t− 2 : {has car(t2 , c1 ), has car(t2 , c2 ), has car(t2 , c3 ), wheels(c1 , 1), wheels(c2 , 4), wheels(c3 , 3), long(c1 ), long(c2 ), short(c3 ), load(c1 , circle, 4), load(c1 , rectangle, 2), load(c2, triangle, 5) load(c2 , circle, 3), load(c3 , circle, 2)}

Let us suppose that the modes are deﬁned by: has car(+, −), long(+), short(+), wheels(+, −) and load(+, −, −). Let us assume that the target deﬁnition corresponds to trains having at least two cars containing objects with the same shape

Learning Discriminant Rules as a Minimal Saturation Search

149

and such that one of the two has a greater number of objects and a greater number of wheels than the other: An example is represented with the predicate goodtrain with a single argument which is the ID of train, as for instances : goodtrain(t+ 1 ). Literals describing the train are then given as ground facts in the background knowledge as it is the case in several systems like Aleph. The background knowledge also contains intensional predicates described by of Horn clauses. goodtrain(T ) : −has car(T, C1 ), has car(T, C2 ), C1 = C2 , wheels(C1 , W1 ), wheels(C2 , W2 ), load(C1 , O, L1 ), load(C2 , O, L2 ), W1 < W2 , L1 < L2 The saturation of an example is based on information given by domains and modes of predicates. It is obtained by adding as many literals as possible w.r.t. the background knowledge such that all literals form a connected formula. The set of literals, composing the saturation, is organized in ordered layers: a literal is in a layer k if all the input terms needed to its introduction have already been introduced in previous layers, and at least one of them has been introduced in the layer k − 1. The saturation could be large and in the state-of-the-art, it is often parameterized by a maximal depth: the building steps when this depth is reached. This maximal depth is denoted by i. Before deﬁning the saturation, we introduce following notation: litsOf Layer(S, k) denotes the set of literals of a sets belonging to a layer k. It is deﬁned by: litsOf Layer(k) = {l | layer(l) = k} To deﬁne the saturation, we ﬁrst deﬁne a layer k, called satk (Sl ), where Sl is a set of literals describing previous layers (all layers j < k): satk (Sl ) = {l | input(l) ⊆ terms(Sl ) ∧ l ∈ Sl ∧ input(l) ∩ output(litsOf Layer(Sl, k − 1)) = ∅} Then, we can formalize, given a set Sl of literals introduced in layers before k, the set of literals belonging to layers k, k + 1, . . . , i: sat(Sl , k, i) = satk (Sl ) ∪ sat(Sl , k + 1, i) sat(Sl , k, i) = ∅

1≤k≤i k>i

Finally, the saturation of an example e of a target concept p with the maximal layer i can be written: sat(p(e), i) = {p(e)} ∪ sat({p(e)}, 1, i) Let us remark that the predicate p has the mode: p(−). Example (cont.) We consider that we have in the background knowledge, along the description of the examples, the predicate = comparing cars and geometrical forms with mode = (+, +), and the predicate < comparing either numbers of wheels or numbers of object with the mode < (+, +).

150

M. Lopez, L. Martin, and C. Vrain

The saturation of the example t+ 1 with the maximal depth equal to 3 is: Layer Literals 0 goodtrain(t+ 1) + + 1 has car(t+ , 1 c1 ), has car(t1 , c2 ), has car(t1 , c3 ) 2 wheels(c1 , 2), wheels(c2 , 3), wheels(c3 , 4), long(c1 ), long(c2 ), long(c3 ), load(c1 , circle, 3), load(c2 , circle, 5), load(c3 , triangle, 10), c1 = c2 , c1 = c3 , c2 = c3 3 2 < 3, 2 < 4, 3 < 4, triangle = circle, 3 < 5, 3 < 10, 5 < 10

3

Minimal Saturation to Search

In this section, we present our rule learning algorithm. A search state is a set of literals corresponding to a clause. The states are organized as a lattice with two bounds and ⊥, and a partial order to compare the generality of search states. For the partial order, we say that a state s1 is more general than an other s2 if s1 is a subset of s2 (with possible renaming of variables). The search is biased using a positive example s, called a seed. Considering the target concept p, we set to {p(s)} and ⊥ to sat(p(s), i) where i is the maximal layer of the saturation. This search space is often used in the state-of-the-art algorithms. With the assumption that ⊥ = sat(, i) rejects all negative examples, the search space contains at least one rule discriminating negative examples. It covers at least one positive example, the seed. The goal is to discover a better rule than ⊥, i.e. a rule that covers more positive examples and always no negative ones. Given a step k in the learning algorithm, we aim to set the layer k such that this layer would be shorter as possible. When the assumption is not satisﬁed, the reﬁnement algorithm throws an exception to specify the insolubility of the learning problem. Our learning algorithm is a bidirectional search where we progressively reﬁne two hypothesis H and H⊥ keeping the relation H⊥ = sat(H , i) always correct. This section is divided into two parts: ﬁrst we present our reﬁnement operator and then, the algorithm, iterating the reﬁnement steps. 3.1

Refinement Operator

Let us ﬁrst recall that we have two hypothesis H and H⊥ with the relation H⊥ = sat(H , i) where i denotes the maximal depth of the saturation. For the kth application of the reﬁnement operator, it aims at building a new couple of hypothesis (H , H⊥ ) such that H⊥ = sat(H⊥ , i) and such that the layer k is a minimal subset of literals from the layer k of H⊥ . This operator searches for a subset of literals of the layer k, such that the corresponding H⊥ discriminates some positive examples from all the negative examples, this subset will be added to H .

Learning Discriminant Rules as a Minimal Saturation Search

151

To formalize the reﬁnement operator, we start by deﬁning the set of candi date couples (H , H⊥ ) that are correct reﬁnements of a current pair of hypotheses (H , H⊥ ). Let ρ(H , H⊥ , k, i) denote this set, where k represents the layer wherein the reﬁnement searches for a subset and i the maximal depth: ρ(H , H⊥ , k, i) = {(H , H⊥ ) | H = H ∪ Sk ∧ Sk ⊂ litsOf Layer(H⊥, k) ∧ H⊥ = sat(H , k + 1, i) ∧ n(H⊥ ) = 0} Let us notice that when Sk = ∅, H = H⊥ (H have no literals in layer k and therefore subsequent layers are empty). This set contains only couples (H , H⊥ ) where H is more speciﬁc than H , H⊥ is more general than H⊥ and H⊥ rejects all negative examples. To determine the subset of literals, we search the smallest one with a greedy breadth ﬁrst search as explained in Section 3.2.

3.2

Refinements Selection

In this section, we described how we choose among all the reﬁnements in ρ. Our strategy is to select the smallest one in term of Sk , i.e. a hypothesis H with the smallest number of literals of layer k. If there are several ones, we return the one covering the maximum number of positive examples. The number of candidates is exponential comparing to the size of litsOf Layer(H⊥ , k). To avoid to generate all of them, we search the smallest one with a breadth-ﬁrst search. The reﬁnement algorithm can be written as follows: Algorithm : ref ine(H , H⊥ , k, i) 1. for j from 0 to |litsOf Layer(H⊥ , k)| 2. Sρ = ∅ 3. for each subset Sk of litsOf Layer(H⊥ , k) s.t. |Sk | = j 4. H = H ∪ Sk 5. H⊥ = H ∪ sat(H , k + 1, i) 6. if n(H⊥ ) = 0 then 7. Sρ = Sρ ∪ {(H , H⊥ )} 8. if Sρ = ∅ then )∈Sρ p(H ) 9. return argmax(H ,H⊥ ⊥ 10. throw inconsistent bottom clause We can notice that the algorithm starts with the empty subset (for j = 0). In this case, H = H = H⊥ , and if this rule is correct then the rule learning algorithm will stop since there are no literals in layers up to k (See section 3.3). Example (cont.) To illustrate the reﬁnement operator, let us consider as the current couple of + hypotheses : (H , H⊥ ) = (vars({goodtrain(t+ 1 )}), vars(sat({goodtrain(t1 )}, 3)) and then the reﬁnement produced with ref ine(H , H⊥ , 1, 3). H⊥ corresponds to the “ variabilized” version of the saturation computed in the previous example in section 2.1.

152

M. Lopez, L. Martin, and C. Vrain

The algorithm begins with subset of the ﬁrst layer of size 1. All subsets produce the same couple with a correct substitution and we obtain for ρ(H , H⊥ , 1, 3) such that |Sk | = 1, the unique couple: Layer Literals 0 goodtrain(V1 ) 1 has car(V1 , V2 ) 2 wheels(V2 , V3 ), load(V2 , V4 , V5 ), long(V2 ) 3 where H is in bold characters and H⊥ contains the saturation of H (layers 0 to 3 in the array). This couple is not correct because H⊥ covers the negative example t− 2. With subsets of size 2 ( i.e. |Sk | = 2), ρ(H , H⊥ , 1, 3) produces:

Layer Literals 0 goodtrain(V1 ) 1 has car(V1 , V2 ), has car(V1 , V6 ) 2 wheels(V2 , V3 ), wheels(V6 , V7 ), load(V2 , V4 , V5 ), load(V6 , V4 , V8 ), long(V2 ), long(V6 ), V2 = V6 3 V3 < V7 , V5 < V8 Layer Literals 0 goodtrain(V1 ) 1 has car(V1 , V2 ), has car(V1 , V9 ) 2 wheels(V2 , V3 ), wheels(V9 , V1 0), long(V2 ), long(V9 ), load(V2 , V4 , V5 ), load(V9 , V1 1, V1 2), V2 = V9 3 V3 < V1 0, V1 1 = V4 , V5 < V1 2 Just the ﬁrst one rejects the negative example and the corresponding couple of hypotheses will be returned by the reﬁning algorithm. 3.3

Learning a Rule

An interesting rule is a rule rejecting all negative examples (consistency) and covering a maximum number of positive examples. With our approach, the rule we compute could not be the better one in terms of the number of covered positive examples, because we search for minimal layers to limit the complexity of our reﬁnement algorithm. During the bidirectional search, we intend to progressively reﬁne the couple of hypotheses (H , H⊥ ), until the two hypotheses converge (H = H⊥ ). In order to obtain it, we progressively reﬁne each

Learning Discriminant Rules as a Minimal Saturation Search

153

layer starting from k = 1 to k = i where i is the maximal layer. We initialize the search with a couple corresponding to a seed example s and its saturation, where constants are replaced by variables. The following algorithm describes the search for a rule for the target concept p, where the search space is biased by the seed s: Algorithm : learnrule(p, s, i) 1. H = {vars(p(s))} 2. H⊥ = vars(sat(p(s), i)) 3. for each layer k from 1 to i 4. (H , H⊥ ) = ref ine(H , H⊥ , k, i) 5. return H

4

Advantages and Limitations

Our algorithm has been motivated by speciﬁc applications of Machine Learning to Constraints Modelling. To compute a reﬁnement, it searches among the subsets of literals contained in a layer the smallest one that corresponds to a bottom hypothesis rejecting all negative examples. To be eﬃcient our algorithm must stop before enumerating all the subsets. This means that it is dedicated to problems characterized by the following properties: the saturations of the examples can be structured into several layers and there exists discriminating rules involving few literals in each layer. For instance, it is not adapted to the classical mutagenesis benchmark [9]: the saturation of an example is composed of only two layers, most of the literals of the discriminating rules occurring in the ﬁrst layer. The learning problems we are interested in are diﬃcult for top-down approaches because search is blind: a choice must be made between reﬁnements with the same heuristic values. In some cases, this can be avoided by considering bottom-up approaches. However, the complexity of the coverage test for examples depends on the size of the saturation, becoming too expensive when the saturation is large. Our method intends to avoid the “plateau” phenomenon for top-down approaches evaluating a rule in a bottom-up way (by means of its saturation) but limiting the size of hypotheses in a top-down way. Preferring a bidirectional search, our aim is to build a minimal saturation, which can be easily tested on examples while guiding the search.

5

Application to Constraint Satisfaction Problem and Experiments

Constraint Programming (CP) is a very successful formalism to model and to solve a wide range of decision problems, from arithmetic puzzles to timetabling and industrial scheduling problems. One of our motivations for this work is to learn CSP models described in a ﬁrst order language, deﬁning the solutions of a

154

M. Lopez, L. Martin, and C. Vrain Graph coloring problem n(X), n(Y ), col(X, A) ∧ col(Y, B) → A = B ∨ ¬adj(X, Y ) Simplified school timetable timetable(L1 , T1 , R1 , S1 ) ∧ timetable(L2, T2 , R2 , S2 ) → L1 = L2 ∨ R 1 = R2 ∨ S1 = S2 timetable(L1 , T1 , R1 , S1 ) ∧ timetable(L2, T2 , R2 , S2 ) → T1 = T2 ∨ L1 = L2 ∨ S1 = S2 Simplified jobshop schedule(J, T, B,E, M ) → B < E schedule(J1 , T1 , B1 , E1 , M1 ) ∧ schedule(J2 , T2 , B2 , E2 , M2 ) → J1 = J2 ∨ M1 = M2∨ B1 > E2 ∨ E1 < B2 schedule(J1 , T1 , B1 , E1 , M1 ) ∧ schedule(J2 , T2 , B2 , E2 , M2 ) → J1 = J2 ∨ E1 < B2 ∨ prev(T1 , T2 ) N-queens problem position(Q1 , L1 , C1 ) ∧ position(Q 2 , L2 , C2 ) → Q1 = Q2 ∨ L1 = L2 position(Q1 , L1 , C1 ) ∧ position(Q 2 , L2 , C2 ) → Q1 = Q2 ∨ C1 = C2 position(Q1 , L1 , C1 ) ∧ position(Q2 , L2 , C2 ) ∧ gap(L1 , L2 , I1 ) ∧ gap(C1, C2 , I2 ) → Q1 = Q2 ∨ I1 = I2 Fig. 1. Some examples: all variables are universally quantiﬁed

CSP[8]. We have shown that this can be transformed into the problem of learning a logic program of the negative concept, composed of the non-solutions of the CSP. The process is detailed in[8], but let us illustrate it by our graph coloring problem. Finding a color for each vertex such that two adjacent vertices do not have the same color can be described by the rule: node(X) ∧ node(Y ) ∧ col(X, A) ∧ col(Y, B) → A = B ∨ ¬adj(X, Y ) Considering the negative concept of bad-colored graphs, adding a target concept badcol(G), where G is the ID of a graph and adding G also to the extensional predicates, we obtain the following datalog rule: badcol(G) ← node(G, X) ∧ node(G, Y ) ∧col(G, X, A) ∧ col(G, Y, B) ∧A = B ∧ adj(F, X, Y )

Learning Discriminant Rules as a Minimal Saturation Search Propal benchmark # learned rules time (s) Graph coloring 1 0 School timetable 3 11 Job-shop 6 103 N-queens Aleph1 Graph coloring 1 0.24 School timetable 1 1.24 Job-shop 3 1051.03 N-queens 3 489.49

Our algorithm acc. # learned rules time (s) 100% 1 0.17 98,33% 2 0.69 87,78% 5 7.37 3 29.11 Aleph2 100% 1 0.14 100% 1 0.31 100% 6 1130.88 100% 3 4583.84

155

acc. 100% 100% 100% 100% 100% 100% 96% 61.67%

Fig. 2. Experiments with CSP benchmarks

This explains why we focus on the negative concept of the constraint problem. Figure 1 presents classical CSP problems and the models we aim at learning. Let us notice that these models are independent of the size of the CSP (number of queens for instance). We have built random benchmarks for these problems. In doing so, we have generated a set of solutions and non-solutions. To produce solutions, we have chosen a random size for each problem (e.g. for the graph coloring problem, the number of vertices and colors), and then solved the CSP. For negative ones, we have proceeded in a similar way but constraints have been relaxed and we have checked that there is at least one unsatisﬁed constraint. The examples have been produced using a random heuristic when solving the CSP. We have tested diﬀerent state-of-the-art ILP systems on these benchmarks: Foil[11], Beth[16], Aleph[15], ICL[12], Propal[5]. Foil performs a Top-down search starting from the most general hypothesis and progressively specializing by adding new literals w.r.t. the θ-subsumption. As in our work, Beth keeps a kind of bottom clause in addition to a hypothesis, but it is used to avoid a complete computation of the saturation whereas ours attends to bound the search space and is used to evaluate reﬁnements. Aleph is a large ILP system allowing the use of various top-down or bottom-up strategies. ICL searches for a theory in a disjunctive normal form with a beam search. Propal uses a data driven strategy, i.e. the reﬁnement operator uses a negative example that must be rejected in the possible reﬁnements. Only Propal (the version described in [4], faster than the version given in [5]) and Aleph with certain conﬁgurations have succeeded. The ﬁrst conﬁguration of Aleph, called Aleph1, corresponds to a breadth-ﬁrst search with a maximum of 200 000 visited search nodes and an inﬁnite open list. The second one, called Aleph2, only diﬀers from the search strategy which is a heuristic search. We use the default heuristic of Aleph, called coverage, and consisting in the diﬀerence between positive examples and negative ones1 . We have implemented a prototype for our learning algorithm and Figure 2 presents the results obtained with these systems. The more complicated 1

We have tested all the heuristics implemented in Aleph with similar results

156

M. Lopez, L. Martin, and C. Vrain

the target concept, the more Propal and Aleph2 ﬁnd incorrect theory. For the n-queens problems, Propal has been stopped after ten hours. This illustrates the diﬃculty of top-down approaches when search is blind. Moreover, Propal has to face combinatorial explosion when searching for near-misses. Aleph1 succeeds with all the benchmarks. However, signiﬁcant computation times is required for complicated benchmarks. Our method has succeeded on all the benchmarks: it ﬁnds accurate theories in a short amount of times. These good results can be explained by the structure of the target concepts as described in Section 4. Our prototype, as well as the benchmarks, can be obtained by sending a mail to the authors.

6

Conclusion

In this paper, we have presented a new learning algorithm to build logic programs. Our method aims at ﬁnding a minimal saturation. It consisting in ﬁnding, for each layer of the saturation of a seed, a minimal subset of literals such that the obtained rule discriminates some positive examples from negative ones. This approach is not always eﬃcient, but in certain cases where other state-of-the-art algorithms fail, it can succeed avoiding the blindness faced by top-down strategies and the consuming coverage tests with bottom-up strategies. Our approach is eﬃcient when the saturation of seed examples produces a bottom clause structured in several layers and when there exists a discriminating rule involving few literals of each layer. We experiment our algorithm on learning problems inspired by constraint programming. These problems present aforesaid features and our algorithm succeeds when other systems fail. These results are encouraging and we aim at testing on other benchmarks. In future works, we wish to improve the reﬁnement operator by replacing the greedy breadth-ﬁrst search for layer subsets. This part of our algorithm is the principal limitation of our approach. For example, we could guide the search for subsets with classical heuristics or using a beam search. Another improvement would be to handle numeric variables. So, we could test our learning algorithm with a large range of acknowledged learning problems.

References ´ Osmani, A.: A model to study phase transition and plateaus in 1. Alphonse, E., ˇ relational learning. In: Zelezn´ y, F., Lavraˇc, N. (eds.) ILP 2008. LNCS (LNAI), vol. 5194, pp. 6–23. Springer, Heidelberg (2008) ´ Osmani, A.: On the connection between the phase transition of the 2. Alphonse, E., covering test and the learning success rate in ilp. Machine Learning 70(2-3), 135– 150 (2008) 3. Alphonse, E., Osmani, A.: Empirical study of relational learning algorithms in the phase transition framework. In: Buntine, W., Grobelnik, M., Mladeni´c, D., Shawe-Taylor, J. (eds.) ECML PKDD 2009. LNCS, vol. 5781, pp. 51–66. Springer, Heidelberg (2009)

Learning Discriminant Rules as a Minimal Saturation Search

157

´ Rouveirol, C.: Lazy propositionalisation for relational learning. In: 4. Alphonse, E., Horn, W. (ed.) ECAI, pp. 256–260. IOS Press, Amsterdam (2000) ´ Rouveirol, C.: Extension of the top-down data-driven strategy to 5. Alphonse, E., ILP. In: Muggleton, S.H., Otero, R.P., Tamaddoni-Nezhad, A. (eds.) ILP 2006. LNCS (LNAI), vol. 4455, pp. 49–63. Springer, Heidelberg (2007) 6. Botta, M., Giordana, A., Saitta, L., Sebag, M.: Relational learning: Hard problems and phase transitions. In: Lamma, E., Mello, P. (eds.) AI*IA 1999. LNCS (LNAI), vol. 1792, pp. 178–189. Springer, Heidelberg (2000) 7. Botta, M., Giordana, A., Saitta, L., Sebag, M.: Relational learning as search in a critical region. Journal of Machine Learning Research 4, 431–463 (2003) 8. Lallouet, A., Lopez, M., Martin, L., Vrain, C.: On learning constraint problems. In: 22th IEEE International Conference on Tools with Artiﬁcial Intelligence, ICTAI 2010 (2010) 9. Lodhi, H., Muggleton, S.: Is mutagenesis still challenging. In: ILP - Late-Breaking Papers (2005) 10. Muggleton, S.: Inverse entailment and progol. New Generation Computing, Special issue on Inductive Logic Programming 13(3-4), 245–286 (1995) 11. Ross Quinlan, J., Mike Cameron-Jones, R.: Foil: A midterm report. In: Brazdil, P.B. (ed.) ECML 1993. LNCS, vol. 667, Springer, Heidelberg (1993) 12. De Raedt, L., Van Laer, W.: Inductive constraint logic. In: ALT, pp. 80–94 (1995) 13. Rouveirol, C.: Extensions of inversion of resolution applied to theory completion. In: Muggleton, S. (ed.) ILP, pp. 63–92. AP (1992) 14. Serra, A., Giordana, A., Saitta, L.: Learning on the phase transition edge. In: IJCAI, pp. 921–926 (2001) 15. Srinivasan, A.: A learning engine for proposing hypotheses (Aleph), http://www.comlab.ox.ac.uk/activities/machinelearning/Aleph/aleph.html 16. Tang, L.P.R.: Integrating top-down and bottom-up approaches in inductive logic programming: applications in natural language processing and relational data mining. PhD thesis, University of Texas, Supervisor-Mooney (2003)

Variation of Background Knowledge in an Industrial Application of ILP Stephen H. Muggleton1 , Jianzhong Chen1 , Hiroaki Watanabe1 , Stuart J. Dunbar2 , Charles Baxter2 , Richard Currie2 , Jos´e Domingo Salazar2, Jan Taubert3 , and Michael J.E. Sternberg3 1

3

Imperial College London 2 Syngenta Ltd BBSRC Rothamsted Research

Abstract. In several recent papers ILP has been applied to Systems Biology problems, in which it has been used to ﬁll gaps in the descriptions of biological networks. In the present paper we describe two new applications of this type in the area of plant biology. These applications are of particular interest to the agrochemical industry in which improvements in plant strains can have beneﬁts for modelling crop development. The background knowledge in these applications is extensive and is derived from public databases in a Prolog format using a new system called Ondex (developers BBSRC Rothamsted). In this paper we explore the question of how much of this background knowledge it is beneﬁcial to include, taking into account accuracy increases versus increases in learning time. The results indicate that relatively shallow background knowledge is needed to achieve maximum accuracy.

1

Introduction

Systems Biology is a rapidly evolving discipline that seeks to determine how complex biological systems function [6]. It works by integrating experimentally derived information with mathematical and computational models. Through an iterative process of experimentation and modelling, Systems Biology aims to understand how individual components interact to govern the functioning of the system as a whole. In several recent papers [13,3], Inductive Logic Programing (ILP) has been applied to Systems Biology problems, in which it has been used to ﬁll gaps in the descriptions of biological networks. Two new industrial applications of this type in the area of plant biology are being explored within the Syngenta University Innovation Centre (see Section 2). This centre of excellence in Systems Biology aims to address biological research questions related to the improvement of plant strains involved in crops. The centre uses mathematical and computational modelling techniques developed at Imperial College London [2]. The background knowledge in these applications is generated by a system called Ondex [7]. Ondex is unique in its ability to generate large amounts of Prolog background knowledge on cell biochemistry by parsing, ﬁltering and combining various publicly-available databases. P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 158–170, 2011. c Springer-Verlag Berlin Heidelberg 2011

Variation of Background Knowledge in an Industrial Application of ILP

159

In this paper we use Ondex to explore the performance eﬀects of varying the amount of background knowledge available to an ILP learning engine. This is done by generating variations of background knowledge using the Relation Neighbours Filter in Ondex together with a tehnique for sampling Relations. The eﬀects of varying the background knowledge are measured on both learning time and predictive accuracy. The experimental results indicate that while learning time increases monotonically with the amount of background knowledge, relatively shallow degree of background knowledge is required to achieve maximum accuracy. The paper is arranged as follows. In Section 2 we introduce the applications on which the experiments were conducted. We then describe the Ondex system for generating the background knowledge in Section 3. The experiments are then described in Section 4. Finally we conclude and describe further work in Section 5.

2 2.1

Application Descriptions University Innovation Centre (UIC) Overview

Agricultural research relies on understanding interactions of genes and chemicals in a biological context. The search for a new biological trait to use in a conventional or genetic modiﬁcation breeding programme is complex. It can take up to ten years and millions of dollars to bring such a development to market. The same is true for the search for new agrochemicals. Part of this development process is an assessment of the safety of the gene or chemical to the environment and its potential toxicity to both mammals and beneﬁcial organisms. Systems Biology takes a new, integrated, approach to address these important challenges. Syngenta [1] is a leading Agrichemical company with a number one position in chemicals and is number three in high value seeds. Syngenta has established a “University Innovation Centre” (UIC) on Systems Biology at Imperial College London [2] to implement a “systems approach” to agricultural research. The centre has begun with two pioneer projects, tomato ripening and predictive toxicology. 2.2

Tomato Application

The characteristics of the tomato fruit that reaches the consumer are deﬁned by the combination of its biochemical and textural properties. Metabolic components (volatiles, pigments, sugars and amino acids) deﬁne the appearance and ﬂavour whilst structural properties (cell adhesion, cell size, cuticle thickness, water content) deﬁne mouth-feel and texture perception. Together these components determine fruit quality and are crucial in inﬂuencing the success of commercial varieties. At the genetic and biochemical level the regulation of fruit development and ripening remains poorly understood. In this project we are applying ILP to

160

S.H. Muggleton et al.

deepen our understanding of the metabolic processes controlling tomato fruit development. By applying machine learning techniques to transcript and metabolite proﬁling data we are developing metabolic networks and building a predictive model of tomato ripening and fruit quality. Through the coordinated analysis of gene expression and metabolite changes across fruit development we aim to identify new genetic targets that play a role in controlling the ripening process. Such knowledge will allow us to focus on these genetic control points in breeding new tomato varieties, thus producing the most favourable combination of fruit quality characters in the ripe fruit. 2.3

Predictive Toxicology

An assessment of the potential to cause cancer is a key component of the risk assessment on a new Crop Protection Active Ingredient. The two year and 80 week bioassays in rats and mice, respectively, provide the Hazard Information to evaluate this risk. If tumours are observed in these trials, an assessment of their relevance for human risk may then be required. This typically makes use of the IPCS/HESI Human Relevance Framework, where the ﬁrst step is the development of a mode-of-action case to describe the series of causal key events that lead to rodent tumours. The second step is to examine the plausibility of these key events occurring in humans and so guide an assessment of the relevance of the rodent ﬁndings. This project aims to build a model that integrates the metabolic and gene expression regulatory networks that underlie initial key events in liver tumour promotion induced by model non-genotoxic carcinogens. It is envisaged that cycles of hypothesis generation informed by model building and experimental testing will allow the identiﬁcation of those regulatory components that are key components in liver tumour promoting modes of action. Ultimately this will allow us to improve mechanistic understanding and so provide key data to explain the basis of the thresholds in dose and species speciﬁcity in response, thereby allowing more informed human health risk assessments.

3

Ondex: A Biological Background Knowledge Generator

Data integration in the life sciences still remains a signiﬁcant challenge for bioinformatics [5]. Rather than developing a bespoke data integration solution for assembling the background knowledge for the machine learning task, the open source data integration framework Ondex [7] was selected as a general solution to bringing all the required data together. Ondex uses a graph-based approach with a data warehouse for integrating biological data. The nodes in the graph represent biological concepts, e.g. enzymes and metabolites. Edges in the graph represent relations between biological concepts, e.g. a set of enzymes catalyses a biochemical reaction. Both nodes and edges in the graph can have additional attributes, e.g. an enzyme name or an amino acid sequence. One of the reasons

Variation of Background Knowledge in an Industrial Application of ILP

161

for choosing the Ondex system as a background knowledge generator is the natural correspondence between its graph representation and the requirement of generating background knowledge as Prolog clauses for ILP learning. Data from key biological pathway and gene function information resources including KEGG [11], LycoCyc [4] were transformed into a semantically consistent graph representation using Ondex. In order to create a non-redundant and coherent knowledge base, mapping methods were used to identify equivalent and similar entities among the diﬀerent data sources. Once the databases were integrated, the resulting knowledge base was available for further analysis and visualization using the graph-based methods built in Ondex. A key feature of the Ondex user client is that it allows the extraction of subgraphs based on certain criteria. For example, it is simple to extract sub-graphs selected on by the class of biological concepts or relations, or where concepts posses a particular attribute, or from a graph-neighbourhood around particular nodes of interest. Such criteria can be combined in a workﬂow to manipulate the information to be included into the background knowledge. In order to support ILP learning, a general background knowledge generating utility was built that respected an agreed Prolog syntax, with Ondex concept class names and relation type names becoming predicate symbols and attributes becoming Prolog term structures. Every concept and relation was given a unique ID as the ﬁrst argument in each predicate, which was used by other predicates to associate attributes with concepts and relations. The translation of attributes of concepts and relations were deﬁned using the Ondex-generated Prolog code export utility. By following agreed conventions it was also possible to translate Prolog format back into an Ondex graph, thus enabling the results of the machine learning process to be imported back into Ondex where they could be visualised in the context of the original knowledge base.

4

Experiments

Two independent experiments were conducted in the study to empirically investigate the null hypothesis: variations of background knowledge (BK) do not lead to increased predictive accuracy. 4.1

Materials and Methods

Tomato Application. An initial ground background knowledge base was derived from LycoCyc database [4,9] and exported as Prolog format using the Ondex system. The knowledge base depicts the relational structure of tomato biological network (shown in Fig. 1), including the fundamental components, e.g. compounds, reactions, enzymes, and their relations, e.g. consumed by, produced by, catalysed by, etc. Two types of raw data were provided by the domain experts in the experiments using gene mutants to study altered tomato ripening - concentration changes of metabolites and gene transcripts for four genotypes during 13 time slices. The data were expressed in terms of binary

S.H. Muggleton et al.

{Enzyme}/EC

···

r

Substrate1 ···

···

···

P roduct1

inhibition/activation?

···

162

Substratem

···

P roductn

Fig. 1. Illustration of the relational background knowledge, where a set of compounds {Substrate}m 1 are consumed by a reaction r, which produce a set of compounds {P roduct}n 1 ; r is catalysed by a set of enzymes with an EC number {Enzyme}/EC which is aggregated from a set of gene transcripts; the ILP learning is to abduce inhibition/activation occured in r. {E }

{E

r

{S}m

{E}

r

| |

···

{E}

r

{S}1

{E

r

}

{

{E}

r

{E}

r

r

C | distance = 1 | | distance cpd:C05841’). % ’14366’ for the reaction ’cpd:C05841 => cpd:C05841’ part_of_catalyzing_class(’4400’,’4401’,’IMPD’). % ’4401’ is classified into EC ’4401’ concept_name(’4401’,’2.7.1.-’). % ’2.7.1.-’ is an EC catalyzed_by(’14366’,’4400’,’IMPD’). % ’14366’ is catalyzed by ’4400’ relation_day14_1500mg(is_related_to,’28501’,’22436’,’1.1385442’). % ’28501’ is an Ondex ID % ’22436’ is an Ondex ID % ’1.1385442’ is an expression level probe(’28501’,’UC’,’IMPD’). % ’28501’ is for a probe concept_name(’28501’,’1396933_s_at’). % ’1396933_s_at’ is a probe name gene(’22436’,’UC’,’IMPD’). % ’22436’ is for a gene concept_name(’22436’,’RNO:191574_GE’). % ’RNO:191574_GE’ is a gene name Appendix 3: Sample of Ondex Models

170

S.H. Muggleton et al.

Fig. 9. Visualised concepts in the Predictive Toxicology domain by Ondex (neighbour distance k = 1). Each node represents a concept and a directed edge represents a binary relation between two concepts. Users can edit the constructed model by (1) clicking the object in the view and (2) applying Ondex utilities such as ﬁlters and relation collapsers.

Fig. 10. Meta View of the Ondex model in Figure 9. Users can edit models also at this meta level.

Pruning Search Space for Weighted First Order Horn Clause Satisfiability Naveen Nair1,2,3 , Anandraj Govindan2 , Chander Jayaraman2, Kiran TVS2 , and Ganesh Ramakrishnan2,1 1 2

IITB-Monash Research Academy, Old CSE Building, IIT Bombay Department of Computer Science and Engineering, IIT Bombay 3 Faculty of Information Technology, Monash University {naveennair,ganesh}@cse.iitb.ac.in {anand.itsme,chanderjayaraman,t.kiran05}@gmail.com

Abstract. Many SRL models pose logical inference as weighted satisﬁability solving. Performing logical inference after completely grounding clauses with all possible constants is computationally expensive and approaches such as LazySAT [8] utilize the sparseness of the domain to deal with this. Here, we investigate the eﬃciency of restricting the Knowledge Base (Σ) to the set of ﬁrst order horn clauses. We propose an algorithm that prunes the search space for satisﬁability in horn clauses and prove that the optimal solution is guaranteed to exist in the pruned space. The approach ﬁnds a model, if it exists, in polynomial time; otherwise it ﬁnds an interpretation that is most likely given the weights. We provide experimental evidence that our approach reduces the size of search space substantially. Keywords: First Order Logic, Horn Clauses, MaxSAT, Satisﬁability.

1

Introduction

Representing sets of objects and their relationships in a compact form has been the focus of researchers for more than a decade. Weighted ﬁrst order formulas proved to be one such representation which also allows inference and learning in a structured way. Inference in these sets of formulas are mostly done by Satisﬁability testing. We summarize some of the works that addressed the problem of satisﬁability in the next paragraph. Traditional SAT solvers in propositional logic try to ﬁnd an assignment for all the literals that makes all the clauses true. They return a model if it exists or return unsatisﬁable. SAT solvers such as DPLL [6] give exact solutions but employ backtracking and take exponential time in the worst case. Local search methods for satisfying the maximum number of clauses (Max-SAT) has been implemented in GSAT [1], WalkSAT [2] etc. Weighted Max-SAT problems assign weights to the clauses and aim to minimize the sum of the weights of unsatisﬁed clauses. Teresa et. al. proposed a Lazy approach [9] which uses some bound computation and variable selection heuristic for satisﬁability. MiniMaxSAT [4] uses a P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 171–180, 2011. c Springer-Verlag Berlin Heidelberg 2011

172

N. Nair et al.

depth-ﬁrst branch-and-bound search approach for satisﬁability. Satisﬁability of ﬁrst order logic (universally quantiﬁed Conjunctive Normal Form (CNF)) can be done by grounding all the clauses (exponential memory cost) and then running satisﬁability as in propositional case. Since, many learning techniques require the repeated use of inference and satisﬁability, complete grounding of the clauses becomes a bottle neck. Lifted inference [5] techniques used ﬁrst order variable elimination for probabilistic inference but have not proved their applicability in large domains. As there could be many contradictions in real world, it is better to perform weighted satisﬁability. Weighted satisﬁability solvers are used for MPE/MAP inference in relational domains [7]. But the complete grounding issue remained unsolved. A LazySAT approach [8] that doesn’t ground all clauses was proposed for satisﬁability in domains where majority of ground atoms are false. Their approach, a variation of WalkSAT, keeps track of all the clauses that can be aﬀected when a literal in an unsatisﬁed clause is ﬂipped. Recently in [10], the ground clauses that are satisﬁed by the evidence are excluded. The approach, which is depended only on the evidence set, processes each clause independently and does not ﬁnd the dependent clauses transitively. Mihalkova et. al. cluster query literals and perform inference for cluster representatives [12]. Queries are clustered by computing signatures using a recursive procedure based on adjacent nodes. Inference is performed for each cluster representative by running MaxWalkSAT on corresponding Markov Network constructed recursively. Alen Fern mentions about the applicability of Forward Chaining in horn clauses [11] but has not given any algorithm or proof for doing so. In the case of contradicting clauses, it is not straight forward to do forward chaining. The objective of our work is stated in the next paragraphs. We address the issue of complete grounding by restricting our domain to ﬁrst order horn clauses and pruning the search space for satisﬁability. Our approach caters to several real world applications that use the horn clausal language. If a set of horn clauses are fully satisﬁable, then a minimal model can be found using TΣ operator (referred to as the immediate consequence operator TP in [3]) in polynomial time. However weighted unsatisﬁable problems require to ﬁnd the most likely state based on the weights. We propose an extension to the minimal model approach wherein we ﬁnd (i) the relevant set of ground horn clauses which has a potential to be part of a contradiction and (ii) an interpretation near to the result. MaxSAT algorithm can be used on this subset of clauses, (optionally) starting from the interpretation returned, to get the most likely state. We also prove that local search for optimality in the pruned space cannot aﬀect the satisﬁability of the rest of the clauses. Our experiments show that the approach reduces search space substantially and helps maxSAT to converge in short time. The paper is organized as follows. Section 2 explains the conventional TΣ operator and the proposed M odif ied TΣ operator. In section 3, we give an overall procedure for satisﬁability and also state and prove our claims. Results are discussed in section 4. We conclude our work in section 5.

Pruning Search Space for Weighted First Order Horn Clause Satisﬁability

2

173

Satisfiability in Horn Clauses

If any of the atoms in the body part of a horn clause is false, then the clause is satisﬁed because of its inherent structure of having atmost one positive atom and all others negative. The groundings of a set of ﬁrst order horn clauses (Σ) with all the constants give a large set in which majority of the atoms are false in real world. This makes a large subset of these clauses satisﬁed by default. We can neglect these clauses and restrict our attention to the clauses that have a potential to be part of a contradiction. We call this set, the relevant set (RS). We propose an algorithm, M odif ied TΣ , to identify the relevant set along with the truth assignments that are almost near to the result. Local search for optimality can be done on this set, starting with the interpretation returned, rather than considering the huge set of clauses and arbitrary truth assignments. Next we explain TΣ before going to the Modiﬁed version. 2.1

TΣ Operator

TΣ Operator provides a procedure to generate an interpretation from another. It builds on the concept that for satisﬁability in horn clauses, all the unit clauses should be True and if the body of a clause is True, then the head should also be True. Let Ik be the interpretation at the k th step of the operation. Then, Ik+1 = Ik ∪ TΣ (Ik ) where,

TΣ (I) = {a : a ← body ∈ Σ

(1) and body ⊆ I}

(2)

If we start with I = ∅, and iteratively apply the above function assignment (with respect to the set of clauses), we will eventually converge at an interpretation that is the minimal model of the formulae if one exists. If there is no model for this set, the operation will reach a contradiction and will return Unsatisﬁable. In weighted satisﬁability problems, if the given set is unsatisﬁable, we need to get a most likely state based on the weights. MaxSAT algorithms can do this optimization. Since applying MaxSAT to the complete groundings is expensive, we improve the above method to prune the search space for MaxSAT. M odif ied TΣ Step described in the next section helps us to prune the search space. 2.2

M odif ied TΣ Step

M odif ied TΣ operation returns a model if one exists; Otherwise returns the set of clauses to be used by a local search algorithm and an initial interpretation for the local search. The method is given in Algorithm 1 and is explained below. Start with applying TΣ to the set of ground clauses until it converges in a model or some contradiction is attained. In the former case, we can stop and return the current interpretation as the solution. If we land up in a contradiction, we get an atom whose truth value determines the set of clauses satisﬁed. We assign true to the atom and proceed further till no more clauses can be visited. All the clauses discovered by M odif ied TΣ irrespective of whether satisﬁed or

174

N. Nair et al.

Algorithm 1. M odif ied TΣ (Σ, DB) Input: Σ, the set of ﬁrst order clauses with weights; DB, evidence set given. Output: RS, the set of clauses to be considered for optimization; T S, truth assignments of all atoms in RS except those in DB. 1. T S := ∅ 2. RS := ∅ 3. for each unit clause c in Σ do 4. for each grounding c of c do 5. if c ∈ / RS then 6. Add c to RS 7. end if 8. if c .head ∈ / {T S ∪ DB} then 9. Add c .head to T S 10. end if 11. end for 12. end for 13. repeat 14. for each non unit clause c in Σ do 15. for each grounding c of c where c .body ⊆ {T S ∪ DB} do 16. if c ∈ / RS then 17. Add c to RS 18. end if 19. if c .head ∈ / {T S ∪ DB} then 20. Add c .head to T S 21. end if 22. end for 23. end for 24. Until no new clauses are added to the set RS 25. Return {RS, T S} not form the relevant set. The interpretation got at the end of the algorithm can optionally be used as initial truth assignment for the optimization step. Note that the truth values for evidences given are always true and cannot be changed. Any weighted satisﬁability algorithm can be applied on the Relevant Set of clauses and the (optional) initial truth values to get a minimum cost interpretation. We now discuss weighted satisﬁability approach using M odif ied TΣ .

3

Modified Weighted SAT

In the new approach, M odif ied TΣ operation is used to ﬁnd relevant subset as well as initial truth assignment. Then weighted MaxSAT version given in Algorithm 2 is used. Algorithm 3 gives the overall algorithm.

Pruning Search Space for Weighted First Order Horn Clause Satisﬁability

175

Claim 1. All the unsatisﬁed clauses will be in RS. Proof. A horn clause c is unsatisﬁed if c .body ⊆ {T S∪DB} and c .head ∈ / {T S∪ DB}. Step 6 in M odif ied TΣ adds all clauses c of the form (c .head ∨ ¬T rue) to RS irrespective of whether it is satisﬁed or not. Step 17 in M odif ied TΣ adds all clauses c where c .body ⊆ {T S ∪ DB}. This covers both the cases of c .head is T rue and c .head is F alse. All other clauses c where c .body {T S ∪ DB} are satisﬁed by default. So set of unsatisﬁed clauses is a subset of RS. Claim 2. Any ﬂip done in any maxSAT step to make an unsatisﬁed clause satisﬁable only aﬀects the satisﬁability of clauses in RS. Proof. Let us prove this by contradiction. Suppose a clause, c = (l1 ∨ ¬l2 ∨ ¬l3 ∨ . . . ∨ ¬ln ) is not satisﬁed by the current assignments in {T S ∪ DB}. This happens only when l1 ∈ / {T S ∪ DB} and ∀i = 2 . . . n li ∈ {T S ∪ DB}. To make c satisﬁed, there are two cases. case 1: ﬂip l1 , case 2: ﬂip any of l2 , l3 , . . . , ln . case 1: Flip l1 (F alse to T rue). Assume that ﬂipping l1 will aﬀect the state of a clause c ∈ / RS. Since c ∈ / RS, c .body {T S ∪ DB}. Otherwise step 17 in M odif ied TΣ would have covered c and it would have been in RS. Also all the unit clauses are covered by step 6 in M odif ied TΣ . Now let c .head = l1 . Since ﬂipping c .head to T rue changes the state of c , c .body ⊆ {T S ∪ DB}. If this is the case, c should have been covered by step 17 in M odif ied TΣ and would have been in RS. Hence the assumption that c ∈ / RS is wrong. Now let l1 ∈ c .body and ﬂipping it to T rue changes the state of c . Then c .body \l1 ⊆ {T S ∪DB}. But applying our approach to c would have made l1 ∈ T S and transitively c .body ⊆ {T S ∪ DB} and c ∈ RS. Hence the assumption that c ∈ / RS is wrong. case 2: Flip any li ∈ {l2 , l3 , . . . , ln } (T rue to F alse). Assume that ﬂipping li will aﬀect the state of a clause c ∈ / RS. Since c ∈ / RS, c .body {T S ∪ DB}. Otherwise step 17 in M odif ied TΣ would have covered c and it would have been in RS. Also all the unit clauses are covered by step 6 in M odif ied TΣ . Now let c .head = li . Since ﬂipping c .head to F alse changes the state of c , c .body ⊆ {T S ∪ DB}. If this is the case, c should have been covered by step 17 in M odif ied TΣ and would have been in RS. Hence the assumption that c ∈ / RS is wrong. Now let li ∈ c .body and ﬂipping it to F alse changes the sate of c . Then before ﬂipping, c .body ⊆ {T S ∪ DB} which must have been covered by step 17 in M odif ied TΣ and c ∈ RS. Hence the assumption that c ∈ / RS is wrong. Claim 3. If α is the cost of an optimal solution to RS, then α is the cost of an optimal solution to Σ Proof. let β and γ be the cost of optimal solutions to Σ and RS respectively. That is β should be the sum of costs of RS and Σ \ RS. Increase in cost occurs only because of contradictions and this is in the set RS (proved in claim 1). The

176

N. Nair et al.

best possible solution to the non contradicting part is zero. We get a minimum cost solution for RS part using MaxSAT and any modiﬁcation to that can result (proved in claim 2 that this doesn’t aﬀect Σ \ RS) an increase in cost only in RS. Therefore β = 0 + γ and thus β = γ Algorithm 2. Modiﬁed Weighted MaxSAT(Σg , T S, DB, target) Input: Σg , all grounded clauses with weights; TS, initial truth assignment; DB, the evidence given; target, the upper bound of cost. Output: T S, An interpretation that is the best solution found. 1. atms := atoms in Σg 2. repeat 3. cost := sum of weights of unsatisﬁed clauses 4. if cost ≤ target 5. Return Success, T S 6. end if 7. c := a randomly chosen unsatisﬁed clause 8. for each atom a ∈ c and a ∈ / DB do 9. compute DeltaCost(a), the cost incurred if a is ﬂipped 10. end for 11. af := a with lowest DeltaCost(a) 12. T S := T S with af ﬂipped 13. cost := cost + DeltaCost(af ) 14.until the cost is no more decreasing 15.Return Failure, T S Algorithm 3. Weighted HornSAT(Σ, DB, target) Input: Σ, the set of ﬁrst order clauses with weights; DB, evidence set given; target, maximum cost expected for the optimization step if required. Output: T S, An interpretation when combined with DB gives the (local) optimum solution. 1. {RS, T S} := M odif ied TΣ (Σ, DB) 2. if {T S ∪ DB} is a model for Σ then 3. Return T S 4. else 5. T S := Modiﬁed Weighted MaxSAT(RS, T S, DB, target ) 6. end if 7. Return T S

4

Results

We implemented new HornSAT algorithm with M odif ied TΣ in java. We have done our experiments in AMD Athlon 64 bit dual core machine (2.90 GHz) with 2.8 GB RAM and running Ubuntu 8.04. Our results show that, for satisﬁablility, the M odif ied TΣ method gives a fewer number of groundings to optimize and that the optimization step converges in a short time when the search space is pruned.

Pruning Search Space for Weighted First Order Horn Clause Satisﬁability

177

Table 1. Results with uwcse KB and diﬀerent evidence sets

HornSAT

Pruned + MaxWalkSAT

Complete grounding + MaxWalkSAT

Time taken (ms) HornSAT

Pruned + MaxWalkSAT

Converged Cost Complete grounding + MaxWalkSAT

Pruned

Complete

Evidence set

No. of groundings

language 508788 181 atoms

6908

90.452

70.265

70.265 2475736 1823778 6896

language 87 atoms

177738

3205

81.463

37.892

37.892 2329459 1098285 2351

AI 766 atoms

Memory 182690 Error

NA

344.584 344.584 NA

7507578 7462967

Fig. 1. Comparison of the approaches when applied to uwcse KB. a. All 181 atoms from language dataset are given. b. 87 atoms from language dataset are given. c. All 766 atoms from AI dataset are given. In this experiment, complete grounding approach failed and didnot give any result.

We used the uwcse knowledge base and dataset provided by alchemy [13] for our experiments after making small modiﬁcations to make the clause set horn. The constants given as the evidence set is considered as the complete domain for each variables. We have run three experiments on each dataset. First experiment does the complete groundings and runs MaxWalkSAT. Second grounds the clauses with pruning and runs traditional MaxWalkSAT with random truth assignments. The third experiment runs MaxWalkSAT on the pruned clauses set with the initial truth assignment returned by M odif ied TΣ . Evidence set of different sizes are used and the comparison is given in Table 1. Figures 1.a, 1.b, 1.c portrays the results when 181 atoms of uwcse language dataset, 87 atoms of uwcse language dataset and 766 atoms of uwcse AI dataset are used respectively as evidence set. Experimental results show that the proposed method outperforms the traditional approach in terms of memory and speed. Implementation and other details are available at www.cse.iitb.ac.in/~naveennair/HornSatisﬁability/

178

5

N. Nair et al.

Conclusion and Future Work

Several ground clauses formed as a result of propositionalization of ﬁrst order horn formulae are satisﬁed by default and it is a wastage of resources to consider them for optimization. We presented an algorithm that prunes the search space and proved that the optimal solution must lie in the pruned space. Experiments indicate the scope for eﬃcient inference using MaxSAT for the set of horn clauses. The algorithm can be extended for general clauses by assigning true value artiﬁcially to all non-negated atoms if all the negated atoms are true and proceeding like in Algorithm 1. Acknowledgments. We would like to thank Dr. Ashwin Srinivasan, IBM India Research Laboratory for his helpful comments.

References 1. Selman, B., Levesque, H., Mitchell, D.: A New Method for Solving Hard Satisﬁability Problems. In: AAAI 1992, San Jose, CA, pp. 440–446 (1992) 2. Selman, B., Kautz, H., Cohen, B.: Local Search Strategies for Satisﬁability Testing. In: Second DIMACS Implementation Challenge on Cliques, Coloring and Satisﬁability (1993) 3. Hogger, C.J.: Essentials of logic programming. Oxford University Press, New York (1990) 4. Heras, F., Larrosa, J., Oliveras, A.: MINIMAXSAT: an eﬃcient weighted max-SAT solver. Journal of Artiﬁcial Intelligence Research 31(1), 1–32 (2008) 5. Kisynski, J., Poole, D.: Lifted aggregation in directed ﬁrst-order probabilistic models. In: Proceedings of the 21st International Joint Conference on Artiﬁcal Intelligence, California, USA, pp. 1922–1929 (2009) 6. Davis, M., Putnam, H., Logemann, G., Loveland, D.W.: A Machine Program for Theorem Proving. Communications of the ACM 5(7), 394–397 (1962) 7. Singla, P., Domingos, P.: Discriminative training of Markov Logic Networks. In: AAAI 2005, pp. 868–873 (2005) 8. Singla, P., Domingos, P.: Memory-Eﬃcient Inference in Relational Domains. In: Proceedings of the Twenty-First National Conference on Artiﬁcial Intelligence, pp. 488–493. AAAI Press, Boston (2006) 9. Alsinet, T., Many, F., Planes, J.: An eﬃcient solver for weighted Max-SAT. Journal of Global Optimization, 61–73 (2008) 10. Shavlik, J., Natarajan, S.: Speeding up inference in Markov logic networks by preprocessing to reduce the size of the resulting grounded network. In: Proceedings of the 21st International JCAI (2009) 11. Fern, A.: A Penalty-Logic Simple-Transition Model for Structured Sequences. In: Computational Intelligence, pp. 302–334 (2009) 12. Mihalkova, L., Richardson, M.: Speeding up inference in statistical relational learning by clustering similar query literals. In: De Raedt, L. (ed.) ILP 2009. LNCS, vol. 5989, pp. 110–122. Springer, Heidelberg (2010) 13. http://alchemy.cs.washington.edu/

Pruning Search Space for Weighted First Order Horn Clause Satisﬁability

179

Glossary Atoms: They are predicates in pure form, for eg: parent(ann,mary), female(X). Body: Right side of (:-) (if) is called body of the clause. Clause: Disjunction of literals for eg: (parent(ann,mary) ∨ ¬ female(ann)) ≡ (parent(ann,mary) :- female(ann)). Clause Representation: Any clause can be written in the form of Comma separated positive literals :- Comma separated negated literals, where (:-) is pronounced as if. For example in propositional logic the clause a ∨ b ∨ ¬ c ≡ a,b :- c. Conjunctive Normal Form (CN F ): Every formulae in propositional logic or ﬁrst-order logic is equivalent to a formula that can be written as a conjunction of disjunctions i.e, something like (a (X) ∨ b (X)) ∧ (c (X) ∨ d (X)) ∧ · · ·. When written in this way the formula is said to be in conjunctive normal form or CNF. Constants: A constant symbol represents an individual in the world. In ﬁrst order logic it is represented by small letter eg: jane, 1, a etc. Definite Clause: Clauses with exactly one positive literal eg: p(X) :- c(X),d(Y). Facts: Body less horn clauses, for eg: female(ann); daughter(mary). Functions: Take input as tuple of objects and return another object eg: motherOf(ann), parentOf(mary). Ground Clause: Clauses formed as a result of replacing each variable by all possible constants in each predicate of a clause. Head: Left side of (:-) (if ) is called head of the clause. Herbrand Interpretation: A (Herbrand) interpretation is a truth assignment to all the atoms formed as a result of replacing the variables in a predicate by all the possible constants (objects). Herbrand Model: a Herbrand model is simply a Herbrand interpretation that makes a wellformed formula true. Horn Clause: Clause with atmost one positive literal for eg: (:- parent(ann,joan), female(joan).) , (parent(ann,kan) :- female(mary).)

180

N. Nair et al.

In a horn clause in CNF, all the atoms preceeded by a ¬ form the body part and the atom not preceded by a ¬ is the head. Here ¬A means (not)A. Knowledge Base: A Knowledge Base is a set of clauses which represents a theory. Literals: They are predicates in either pure form or negated form, for eg: ¬parent(ann,mary). MaxSAT: It is a local search method used for satisfying the maximum number of clauses, which starts with random truth assignments to all ground atoms and improve the solution step by step by ﬂipping one literal at a time which makes some clauses satisﬁed and some others unsatisﬁed. Model: An interpretation which makes the clause true. For eg: P : −Q, R, the models are M = φ, {P, Q, R}. Statistical Relational Learning (SRL): Statistical relational learning deals with machine learning and data mining in relational domains where observations may be missing, partially observed, and/or noisy. Variables: Starts with the capital letters for eg: X,Abs, etc. Weighted MaxSAT: Given a ﬁrst order Knowledge Base (σ), ﬁnd a Herbrand Interpretation that maximizes (or minimizes) the sum of weights of satisﬁed (unsatisﬁed) clauses.

Multi-relational Pattern Mining Based-on Combination of Properties with Preserving Their Structure in Examples Yusuke Nakano and Nobuhiro Inuzuka Nagoya Institute of Technology, Gokiso-cho, Showa, Nagoya 466-8555, Japan Tel.: +81-52-735-5050, Fax: +81-52-735-5473 [email protected], [email protected] Abstract. We propose an algorithm for multi-relational pattern mining through the problem established in WARMR. In order to overcome the combinatorial problem of large pattern space, another algorithm MAPIX restricts patterns into combination of basic patterns, called properties. A property is deﬁned as a set of literals appeared in examples and is of an extended attribute-value form. Advantage of MAPIX is to make patterns from pattern fragments occurred in examples. Many patterns which are not appeared in examples are not tested. Although the range of patterns is clear and MAPIX enumerates them eﬃciently, a large part of patterns are out of the range. The proposing algorithm keeps the advantage and extends the way of combination of properties. The algorithm combines properties as they appeared in examples, we call it structure preserving combination.

1

Introduction

This paper studies multi-relational pattern mining obeying the line of Warmr [2, 3]. Warmr generates and tests candidate patterns with a pruning technique similar to Apriori [1]. In spite of the cut-down procedure it has the exponentially growing space of hypothesis with respect to the length of patterns and the number of relations. Another algorithm Mapix restricts patterns into conjunctions of basic patterns, called properties. A property is an extended attribute-value form consisting of literals that refer to parts of objects and a literal that describes a property of or a relation among the parts. For example for a person (or his/her family) a basic pattern consists of referential literals (or an extended attribute), for example “one of his/her grandchildren”, and a descriptive literal (or an extended attribute value), for examples “it is male” and then it describes a basic property, for example “this person has a grandson”. Mapix ﬁnds patterns made of properties appeared in samples relying on type and mode information of relations. The search can be seen as a combination of bottom-up and top-down search, it constructs properties from samples in a bottom-up way and tests patterns combining the properties in a top-down way. The properties of Mapix and their conjunctions are natural but the range in which Mapix generates patterns is still narrow. There seems another natural P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 181–189, 2011. c Springer-Verlag Berlin Heidelberg 2011

182

Y. Nakano and N. Inuzuka

range of patterns to be generated. We propose another way to combine properties. For example, for a person of a family, “having a son” and “having a granddaughter” are properties and by combining them we may have “having a son and a granddaughter”. But it may not represent a real situation of the family precisely, in which it may happen that “having a son who has a daughter”. We propose an algorithm by using a structural combination [4] of basic patterns. We propose to use preserved structure in a sample and give a simple algorithm. Our algorithm generates patterns in a larger pattern space.

2

Patterns and Mapix Algorithm

Datalog is used to represent data and patterns. Datalog clauses are of the form ∀(h ← b1 ∧ . . . ∧ bn ) without functors, where ∀F means all variables in F are universally quantiﬁed and ∀ is omitted when understood. For c = h ← b1 ∧. . .∧bn , head(c) denotes the head atom h and body(c) denotes the body conjunction b1 ∧ . . . ∧ bn . A fact is a clause without body. A substitution is described by θ = {v1 /t1 , . . . , vn /tn } for variables vi and terms ti . P θ for a formula P means replacing every variable vi with ti . For our mining task a Datalog DB R is given and one of extensional relations is speciﬁed for a target (It corresponds to the concept key of Warmr). A fact of the target relation is called a target instance. A query is a clause without head ← b1 ∧ . . . ∧ bn , equivalently an existentially quantiﬁed conjunction ∃(b1 ∧ . . . ∧ bn ), where ∃Q means all variables in Q are existentially quantiﬁed. When a formula is clearly meant to be a query ∃ is dropped. A query q is said to succeed wrt R when R |= ∃q. The following gives patterns, among which we are interested in frequent ones. Definition 1 (pattern). A pattern is a Datalog clause whose head is of the target predicate. For a target instance e and a pattern P , P (e) denotes a query ∃(body(P )θ) where θ is the mgu (most general uniﬁer) of e and head(P ). When P (e) succeeds we say that e possesses P . Definition 2 (frequent pattern). The frequency of P is the number of target instances which possess P . P is frequent if its frequency exceeds supmin ·N , where supmin is a given minimal support and N is the number of all target instances. Example 1 (running example). Let us consider a DB Rfam on families (Fig. 1). It includes four relations, parent(x, y) meaning x is a parent of y, female(x) for a female x, male(x) for a male x, and grandfather(x) meaning x is someone’s grandfather. We use gf, p, m, f for the relations for short. We also abbreviate person01 as 01. Let gf be a target. Then, for example the following formula is a pattern. P = gf(A) ← m(A) ∧ p(A, B) ∧ f(B) For a target instance = gf(01), P () denotes a query, P () = ∃((m(A) ∧ p(A, B) ∧ f(B))θ) = ∃(m(01) ∧ p(01, B) ∧ f(B)).

Multi-relational Pattern Mining Based-on Combination

grandfather person01 person07 person12 person19 person20

parent person01 person02 person02 person03 ...

person02 person03 person04 person05 ...

male person01 person05 person07 person10 ...

183

female person02 person03 person04 person06 ...

Fig. 1. The family DB Rfam , including grandfather, parent, male and female, of which grandfather is a target. The persons with ∗ are female and others are male.

where θ is the mgu of and head(P ). The query P () succeeds by an assignment {B → 02} then e possesses P . Many ILP algorithms assume modes for predicates to restrict patterns. Some arguments of a predicate have a role as input (denoted by +) and some as output (−). We give parent(+, −), male(+), and female(+) to the predicates in Rfam . We distinguish between two classes of predicates. Predicates with at least one

−-arg. are called path predicates, e.g. parent(+, −), which have a role like a function generating a term from others. Predicates without −-arg. are called check predicates, e.g. male(+) and female(+), which have a role describing a property of given terms. An instance of a path/check predicate in DB is called a path/check literal. We do not give mode for target predicate. Using these concepts Mapix extracts basic patterns, called properties, from DB and generalize them to basic patterns, called property items. Definition 3 (property). A property of a target instance e wrt DB R is a minimal set L of ground atoms in R satisfying 1. L includes exactly one check literal, and 2. L can be given a linear order where every term in a +-arg. of a literal in L is occurred in some precedent literals in the order or e. Definition 4 (variablization). For a ground formula α a formula β is a variablization of α when 1. β does not include any ground term, and 2. there exists a substitution θ = {v1 /t1 , · · · , vn /tn} that satisﬁes (a) α = βθ and (b) t1 , . . . , tn in θ are all diﬀerent terms in α. We assume to use new variables never used before when variablizing. Definition 5. For a set L = {l1 , · · · , lm } of ground literals and a target instance e var(e ← L) denotes a variablization of e ← l1 ∧ . . . ∧ lm .

184

Y. Nakano and N. Inuzuka Table 1. Properties and property items of = gf(01)

pr0 = {m(01)} pr1 = {p(01,02),f(02)} pr2 = {p(01,02),p(02,03),f(03)} ({p(01,02),p(02,04),f(04)}) pr3 = {p(01,02),p(02,03),p(03,05),m(05)} pr4 = {p(01,02),p(02,04),p(04,06),f(06)}

it0 = gf(A) ← m(A) it1 = gf(A) ← p(A,B)∧f(B) it2 = gf(A) ← p(A,B)∧p(B,C)∧f(C) it3 = gf(A) ← p(A,B)∧p(B,C)∧p(B,D)∧m(D) it4 = gf(A) ← p(A,B)∧p(B,C)∧p(C,D)∧f(D)

When L is a property of e, var(e ← L) is called a property item of e. Possessing P by e and a query P (e) are deﬁned as in Deﬁnition 1. Example 2. L = {p(01,02),p(02,03),f(03)} is a property of = gf(01). Then it = var(←L)=gf(A)←p(A,B)∧p(B,C)∧f(C) is possessed by , i.e. Rfam |= it(). Then, Mapix algorithm is as follows: 1. It samples an appropriate number of target instances from a target relation. 2. For each sampled instance it extracts property items hold on DB. 3. It executes an Apriori-like level-wise frequent pattern mining algorithm by regarding the satisfaction of a property item as possession of it. As discussed in [5] the size of sampled instances in step 1 can be constant with respect to the size of all examples. Example 3. Table 1 shows property items produced from gf(01). Only these are frequent for min sup 60% even if we sample all instances, when another infrequent property items gf(A) ← p(A, B) ∧ p(B, C) ∧ m(C) is extracted from gf(20). In step 3 Mapix combines property items by a simple conjunction. For example it2 (means having a granddaughter) and it4 (means having a greatgranddaughter) are combined to the following pattern, which we write as it2, it4,

it2, it4 = gf(A)←p(A,B)∧p(B,C)∧f(C)∧p(A,D)∧p(D,E)∧p(E,F )∧f(F ), which means having a granddaughter and a great-granddaughter but neither having a child who has a daughter and a granddaughter nor having a granddaughter who has a daughter. We call such a conjunction a property itemset.

3

Ideas and an Algorithm

We propose an algorithm based on Mapix in order to produce rich combinations of properties. It keeps eﬃciency by seeing only combination appeared in samples. In order to explain our idea, we introduce the shadow of a property item, which is a set of properties that produce the property item. Definition 6. For a database R and a property item it, the set deﬁned below is called the shadow of the property item, shadow(it,R) = {‘e ← L’ ∈ T × 2R | L is a property and var(e ← L)∼it}, where T is the target relation in R, 2X is the power set of a set X, and P ∼Q means P and Q are θ-equivalent, i.e. P θ-subsumes Q and Q θ-subsumes P .

Multi-relational Pattern Mining Based-on Combination

185

Example 4. For Rfam and it2, the shadow of it is shadow(it2, Rfam ) = { gf(01) ← {p(01, 02), p(02, 03), f(03)}, gf(01) ← {p(01, 02), p(02, 04), f(04)}, gf(07) ← {p(07, 08), p(08, 09), f(09)}, gf(12) ← {p(12, 13), p(13, 15), f(15)}, gf(12) ← {p(12, 14), p(14, 16), f(16)}, gf(19) ← {p(19, 20), p(20, 21), f(21)}, gf(19) ← {p(19, 20), p(20, 22), f(22)}, gf(20) ← {p(20, 21), p(21, 24), f(24)} } Definition 7 (combinable property itemset). A property itemset iti1 , . . . , itin is combinable, if there exists a target instance e and

e ← pri1 , . . . , e ← prin ∈ shadow(iti1 , R) × . . . × shadow(itin , R), such that j=1,...,n (terms(prij ) − terms(e)) = ∅, where terms(p) is the set of all terms in p. e ← pri1 , . . . , e ← prin is called a combinable shadow tuple. Definition 8 (combined property item). When a property itemset is =

iti1 , . . . , itin is combinable and e ← pri1 , . . . , e ← prin is a combinable shadow tuple of it, var(e ← j=1,...,n prij ) is called a combined property item produced from is. A property item that is not combined is called atomic. Example 5. A property itemset it2, it4 is combinable, because the shadow of it2 (see the example above) and the shadow of it4 shadow(it4, Rfam ) = { gf(01) ← {p(01, 02), p(02, 04), p(04, 06), f(06)}, gf(07) ← {p(07, 08), p(08, 09), p(09, 11), f(11)}, gf(19) ← {p(19, 20), p(20, 21), p(21, 24), f(24)} } have ﬁve combinable shadow tuples

gf(01) ← {p(01,02), p(02,03), f(03)}, gf(01) ← {p(01,02), p(02,04), p(04,06), f(06)},

gf(01) ← {p(01,02), p(02,04), f(04)}, gf(01) ← {p(01,02), p(02,04), p(04,06), f(06)},

gf(07) ← {p(07,08), p(08,09), f(09)}, gf(07) ← {p(07,08), p(08,09), p(09,11), f(11)},

gf(19) ← {p(19,20), p(20,21), f(21)}, gf(19) ← {p(19,20), p(20,21), p(21,24), f(24)},

gf(19) ← {p(19,20), p(20,22), f(22)}, gf(19) ← {p(19,20), p(20,21), p(21,24), f(24)}

and they produce the following two combined property items. it2-4 = gf(A) ← p(A, B) ∧ p(B, C) ∧ f(C) ∧ p(C, D) ∧ f(D). it2-4’ = gf(A) ← p(A, B) ∧ p(B, C) ∧ f(C) ∧ p(B, D) ∧ p(D, E) ∧ f(E). it2-4 means having a granddaughter who has a daughter and it2-4’ means having a child who has a daughter and a granddaughter. Every tuple produces a combined property item equivalent to one of the above. All frequent combined property items produced from Rfam are shown in Table 2.

186

Y. Nakano and N. Inuzuka

Table 2. All frequent property items and combined property items in Rfam for min sup=60% it0 it1 it2 it3 it4 it1-2 it1-3 it2-3 it2-3’ it2-4 it2-4’ it3-4 it1-2-3 it1-2-3’ it2-3-4 it2-3-4’

= gf(A) ← m(A). = gf(A) ← p(A, B) ∧ f(B). = gf(A) ← p(A, B) ∧ p(B, C) ∧ f(C). = gf(A) ← p(A, B) ∧ p(B, C) ∧ p(C, D) ∧ m(D). = gf(A) ← p(A, B) ∧ p(B, C) ∧ p(C, D), f(D). = gf(A) ← p(A, B) ∧ f(B) ∧ p(B, C) ∧ f(C). = gf(A) ← p(A, B) ∧ f(B) ∧ p(B, C) ∧ p(C, D) ∧ m(D). = gf(A) ← p(A, B) ∧ p(B, C) ∧ f(C) ∧ p(C, D) ∧ m(D). = gf(A) ← p(A, B) ∧ p(B, C) ∧ f(C) ∧ p(B, D) ∧ p(D, E) ∧ m(E). = gf(A) ← p(A, B) ∧ p(B, C) ∧ f(C) ∧ p(C, D) ∧ f(D). = gf(A) ← p(A, B) ∧ p(B, C) ∧ f(C) ∧ p(B, D) ∧ p(D, E) ∧ f(E). = gf(A) ← p(A, B) ∧ p(B, C) ∧ p(C, D) ∧ f(D) ∧ p(B, E) ∧ p(E, F ), m(F ). = gf(A) ← p(A, B) ∧ f(B) ∧ p(B, C) ∧ f(C) ∧ p(C, D) ∧ m(D). = gf(A) ← p(A, B) ∧ f(B) ∧ p(B, C) ∧ f(C) ∧ p(B, D) ∧ p(D, E) ∧ m(E). = gf(A) ← p(A, B)∧p(B, C)∧f(C)∧p(C, D)∧f(D)∧p(B, E)∧p(E, F )∧m(F ). = gf(A) ← p(A, B)∧p(B, C)∧p(C, D)∧f(D)∧p(B, E)∧f(E)∧p(E, F )∧m(F ).

With atomic property items combined property items work to make other patterns by conjunction. For example, it1 and it2-4 make the following pattern,

it1, it2-4 = gf(A) ← p(A, B) ∧ f(B) ∧ p(A, C) ∧ p(C, D) ∧ f(D) ∧ p(D, E) ∧ f(E), which means having a daughter and a granddaughter who has a daughter.

Here we propose a new algorithm for all frequent patterns made from conjunction among atomic and combined property items extracted from samples: 1. It samples target instances from a target relation. 2. For each sampled instance it extracts atomic property items hold on DB. 3. By using an Apriori-like level-wise algorithm it enumerates all frequent conjunctions of the atomic property items. 4. It produces all combined property items from the frequent combinable conjunction. 5. Again by the level-wise algorithm it enumerates all frequent conjunctions of atomic and combined property items. The detail of the algorithm is given in Table 3.

4

Experiments and Concluding Remarks

We have done two experiments. The ﬁrst one was with Rfam , where we aim to see the varieties of patterns extracted. Table 4 shows the numbers of patterns enumerated and runtime for our algorithm as well as Mapix and the algorithm in [4] according as the minimum support threshold is changed. Our algorithm produced more patterns than others. There was no duplication in the patterns enumerated by three algorithms in the sense of θ-equivalence.

Multi-relational Pattern Mining Based-on Combination

187

Table 3. A proposing algorithm input R : a DB; T : target relation; supmin : the min. sup. threshold; output Freq: the set of patterns whose supports are larger than supmin 1. Select an appropriate size of subset T ⊆ T ; 2. Items := ø; P := ø; Freq:= ø; 3. For each e ∈ T do P:=P ∪ {e ← pr | pr is a property of e} 4. For each ‘e ← pr’ ∈ P do 5. If ∃I ∈ Items, I∼var(e ← pr) then S[I]:=S[I] ∪ {e ← pr}; 6. else I = var(e ← pr); S[I ]:={e ← pr} ; Items:=Items ∪ {I }; 7. k:=1; F11 :={ I | I ∈ Items and supp(I) ≥ supmin }; Freq:=F11 ; 8. While Fk1 = ø do 1 :={IS ∈ Ck+1 | supp(IS) ≥ supmin }; 9. Ck+1 :=Candidate(Fk1 , Fk1 ); Fk+1 1 10. Freq:=Freq ∪ Fk+1 ; k:=k+1; 11. Combined := Candicomb(Freq); 12. k:=1; F12 :={ I | I ∈ Combined and supp(I) ≥ supmin }; Freq:=Freq ∪ F12 ; 13. While Fk2 = ø do 2 14. Ck+1 :=Candidate(Fk1 , Fk2 ); Fk+1 :={IS ∈ Ck+1 | supp(IS) ≥ supmin }; 2 15. Freq:=Freq ∪ Fk+1 ; k:=k+1; 16. Return Freq; Candidate(Fk1 ,Fk2 ): input Fk1 , Fk2 : sets of frequent property itemsets of a level; output Ck+1 : the set of candidate property itemsets of the next level where at least a property itemset is used from Fk2 ; 1. Ck+1 := ø 2. For each pair

I1 , . . . , Ik , I1 , . . . , Ik ∈ Fk2 × {Fk1 ∪ Fk2 } where I1 = I1 , . . . , Ik−1 = Ik−1 , and Ik < Ik do 3. Ck+1 := Ck+1 ∪ { I1 , . . . , Ik−1 , Ik , Ik }; 4. For each IS ∈ Ck+1 do 5. If k = 1 and (II or I I), where IS = I, I then remove IS from Ck+1 ; 6. For each I ∈ IS do if IS − {I} ∈ Fk1 ∪ Fk2 then remove IS from Ck+1 ; 7. Return Ck+1 ; Candicomb(Freq): input Freq : the set of frequent property item sets made of atomic items; output Combined : the set of combined property items produced from all property itemsets in Freq; 1. Combined := ø; 2. For each I1 , . . . , In ∈ Freq for n ≥ 2 do 3. For each e1 ← pr1 , . . . , en← prn ∈ S[I1 ] × · · · × S[In ] do 4. If e1 = . . . = en and j=1,...,n (terms(prj ) − terms(ej )) = ø then 5. Combined := Combined ∪ {var(e1 ← j=1,...,n prj )}; 6. For each I ∈ Combined do 7. If ∃I ∈ Combined, I = I ∧ I ∼I then Combined := Combined − {I}; 6. Return Combined;

188

Y. Nakano and N. Inuzuka

The second experiment was with Table 4. Experiment with Rfam . All the data of Bongard. Fig. 2 shows examples were used. the number of patterns and runtime min sup 20% 40% 60% 80% when the number of examples to exMapix #patterns 55 31 23 11 tract properties changes. These are the [5] time (sec) 0.04 0.01 0.01 0.01 average of 10 times execution. We used algo. #patterns 441 153 51 15 all examples to count frequency but in [4] time (sec) 6.23 0.45 0.06 0.03 sampled limited number of examples our #patterns 4601 1063 109 17 to extract properties. By 80 examples algo. time (sec) 9.55 0.54 0.08 0.01 our algorithm produced the same set of patterns (802 patterns) as the case using whole 392 examples. The 802 patterns had no duplication. Fig. 2 also shows the grow of runtime according to the sample size. Our algorithm enumerates larger range of patterns, made of property items and combined property items in which property items are combined as in examples. The algorithm in [4] uses structural combination but it has limitation. It treats property items only in a single example then it composes all examples as an artiﬁcial large example. Instead of our shadow the algorithm keeps the conjunction of all Fig. 2. The number of patterns and equivalent property items because the runtime as the number of sampled exconjunction is equivalent to each prop- amples in Bongard. erty item. By the method patterns becomes larger. Our algorithm overcome these limitation by the shadow and simple algorithm, but has the large time complexity to the size of examples sampled. In fact it took 6556 seconds for Bongard when it samples all examples. The suﬃcient size of examples, however, can be suppressed because it depends only on the minimum support threshold.

References 1. Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules. In: VLDB, pp. 487–499 (1994) 2. Dehaspe, L., De Raedt, L.: Mining association rules with multiple relations. In: Dˇzeroski, S., Lavraˇc, N. (eds.) ILP 1997. LNCS, vol. 1297, pp. 125–132. Springer, Heidelberg (1997)

Multi-relational Pattern Mining Based-on Combination

189

3. Dehaspe, L., Toivonen, H.: Discovery of frequent Datalog patterns. Data Mining and Knowledge Discovery 3(1), 7–36 (1999) 4. Inuzuka, N., Motoyama, J., Urazawa, S., Nakano, T.: Relational pattern mining based on equivalent classes of properties extracted from samples. In: Washio, T., Suzuki, E., Ting, K.M., Inokuchi, A. (eds.) PAKDD 2008. LNCS (LNAI), vol. 5012, pp. 582–591. Springer, Heidelberg (2008) 5. Motoyama, J., Urazawa, S., Nakano, T., Inuzuka, N.: A mining algorithm using property items extracted from sampled examples. In: Muggleton, S.H., Otero, R., Tamaddoni-Nezhad, A. (eds.) ILP 2006. LNCS (LNAI), vol. 4455, pp. 335–350. Springer, Heidelberg (2007)

Learning from Noisy Data Using a Non-covering ILP Algorithm Andrej Oblak and Ivan Bratko Faculty of Computer and Information Science, University of Ljubljana Trˇzaˇska cesta 25, SI-1001 Ljubljana, Slovenia {andrej.oblak,ivan.bratko}@fri.uni-lj.si

Abstract. In this paper we describe the non-covering inductive logic programming program HYPER/N, concentrating mainly on noise handling as well as some other mechanisms that improve learning. We perform some experiments with HYPER/N on synthetic weather data with artificially added noise, and on real weather data to learn to predict the movement of rain from radar rain images and synoptic data.

1

Introduction

In this paper we describe the non-covering ILP program HYPER/N, which is based on HYPER [1], but with added mechanisms for handling noisy data as well as some mechanisms that improve the computational eﬃciency. A noncovering ILP algorithm works with hypotheses as a whole, whereas covering ILP algorithms such as FOIL [6], Progol [5], and Aleph [8] build hypotheses by iteratively adding clauses to the hypothesis using greedy search. Advantages of a non-covering approach are the better ability to learn recursive hypotheses and the ability to learn multiple predicates simultaneously. The main disadvantage is a high combinatorial complexity. Besides that, HYPER’s main disadvantage is lack of mechanisms to enable the learning from noisy data. We addressed this deﬁciency in HYPER/N. The rest of the paper is organized as follows. In Section 2 we provide some related work. In Section 3 HYPER/N’s mechanisms and improvements in comparison with HYPER are described. In Section 4 we perform experiments with HYPER/N and other systems in a weather prediction domain. Experiments were done on both synthetic data and real weather data. Synthetic data enabled controlled experiments with variable degree of noise in data. Section 5 summarizes the results.

2

Related Work

Not much work has been done in the ﬁeld of learning from noisy data using noncovering ILP algorithms. In [4] a non-covering ILP system Lime is presented, which uses a Bayesian heuristic for inducing a hypothesis with the maximum posterior probability. In the experiments in [4] Lime, equipped with this heuristic, P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 190–197, 2011. c Springer-Verlag Berlin Heidelberg 2011

Learning from Noisy Data Using a Non-covering ILP Algorithm

191

handled noise better than both FOIL and Progol. In [3] non-covering ILP system HYPER was used in a simple robotic domain, where an autonomous robot learns about the environment by performing experiments and collecting sensory data. The experiments were done with a real robot using an over-head camera to determine the position. So there was some noise in the measured coordinates. This noise was successfully handled by deﬁning predicates in background knowledge in such a way that they tolerated some inaccuracy in numerical data.

3

HYPER/N

HYPER [1] is a non-covering ILP program. It starts with some overly general hypotheses that are complete also inconsistent, and it builds a reﬁnement graph from them using three basic types of reﬁnements of hypotheses: – by matching two variables of the same type in a clause, e.g. X1 = X2, – by reﬁning a variable in a clause into a background term (list, constant, ...), – by adding a background literal to a clause. Since each reﬁnement is a specialization, a successor of a hypothesis in the reﬁnement graph only covers a subset of cases covered by the hypothesis’ predecessor, it suﬃces that, during search, we only consider complete hypotheses. An incomplete hypothesis can never be reﬁned into a complete one [1]. The main advantages of HYPER in comparison to other ILP programs is the ability to learn recursive and multi-predicate hypotheses well. The main disadvantage of HYPER are the high combinatorial complexity and inability to learn from noisy data. To a certain degree we have solved this in the improved version of HYPER, called HYPER/N. Before we continue let us deﬁne what kind of noise we want HYPER/N to handle. Noise is considered as incorrectly classiﬁed examples, a positive example that is classiﬁed as a negative example and vice versa. 3.1

Handling of Noisy Data in HYPER/N

The ﬁrst thing we had to do, for HYPER/N to handle noisy data, was to relax the conditions for completeness and consistency. Let us assume that in our learning set there are Nnoise noisy examples. We say that a hypothesis is approximately complete if it covers all but Nnoise positive examples, and approximately consistent if it covers Nnoise negative examples. Before the start of learning the user must estimate the number of noisy examples in absolute terms (e.g. 13 noisy examples) or relative terms (e.g. 8% of learning examples are noisy). Too low estimations often result in no learned hypotheses, and too high estimations result in many learned hypotheses, since there are several possible coverings of a positive learning example set with such approximately complete hypotheses. It is up to the user to experiment with the estimations of noise to ﬁnd an appropriate value.

192

A. Oblak and I. Bratko

As mentioned in the previous paragraph, HYPER/N can learn several different hypotheses. HYPER/N stores all the approximately complete and approximately consistent hypotheses found in a list of potentially good hypotheses together with the sets of positive examples, covered by those hypotheses. Let us assume that at one step of learning we have a list of potentially good hypotheses H = {H0 , H1 , ..., Hi } and a list E = {EH0 , EH1 , ..., EHi } of sets of positive examples, covered by those hypotheses. For any new approximately complete and approximately consistent hypothesis Hj , Hj ∈ / H, with a set of covered positive examples EHj , we check: EHj EHi for all EHi ∈ E. If true, hypothesis Hj is added to the list H and set EHj is added to the list E. With this we avoid storing hypotheses that cover same sets or subsets of positive examples as some other hypothesis, that is already stored in the list. In HYPER learning simply stops when a complete and consistent hypothesis is found. But when learning from noisy data with HYPER/N, there is a high possibility that a complete and consistent hypothesis will not be found. Therefore before the learning starts, the user must set a maximum number of reﬁnements. If a complete and consistent hypothesis is found before the number of reﬁnements reaches this limit, such hypothesis is returned as a result. Otherwise an entire list of potentially good hypotheses is returned when HYPER/N reaches the maximum number of reﬁnements. After that it is up to the user to decide what to do with the result – use it as a ﬁnal solution or try diﬀerent parameter values. 3.2

Learning Multiple Clauses from Noisy Data

Described modiﬁcations work ﬁne if we are learning hypotheses consisting of only one clause. But if we want to learn a hypothesis consisting of two or more clauses, a certain problem arises. At each reﬁnement HYPER ﬁrst looks for a clause that alone covers at least one negative example [1]. But if we have a situation as illustrated in Fig. 1, where the ﬁrst clause covers one noisy negative example, it may happen that learning will get stuck at that point. Let us assume that no possible reﬁnement exists that would exclude the noisy negative example from being covered by the ﬁrst clause. HYPER always selects the ﬁrst clause that covers a negative example for reﬁnement. In the case of noise-free data this is sensible, but it is obvious that in the case of noisy data,

Fig. 1. Illustration of a problem that arises when learning hypotheses with more than one clause. HYPER always chooses the first clause for refinement that alone covers a negative example. This may cause the learning to get stuck that point.

Learning from Noisy Data Using a Non-covering ILP Algorithm

193

the second clause is much more promising for reﬁnement than the ﬁrst one. HYPER/N avoids such cases by reﬁning all clauses with highest cost, calculated by (1), where n is the number of negative, and p the number of positive examples covered by the clause alone. clause cost =

n p+n

if n + p > 0 otherwise clause cost = 0 .

(1)

Breaking down the hypotheses into separate clauses and evaluating them separately is against HYPER’s philosophy because HYPER works with hypotheses as a whole. It can also give us some dubious results when evaluating clauses from recursive hypotheses, since a general clause without a base clause usually covers no examples (positive and negative). Because of that we also tested another approach, similar to the ‘gain’ heuristic [2]. We evaluated hypothesis H with and without clause C. We counted that clause C covers all examples that were covered with hypothesis H and are not covered anymore with hypothesis H \ {C}. By counting this way we obtained p and n, and calculated clause cost using (1). While this approach may be more in line with HYPER’s philosophy, HYPER/N had much more trouble learning recursive hypotheses (longer search or even no hypotheses learned at all) than by breaking down hypotheses into separate clauses and then evaluating them. 3.3

Some Additional Improvements

The next issue was to alleviate HYPER’s shortsightedness. For this reason we implemented a lookahead with user-speciﬁed depth. When reﬁning a hypothesis, HYPER/N reﬁnes also all hypothesis’ reﬁnements, ignoring heuristic estimates and repeats this for a speciﬁed number of levels. After that it removes all duplicates, adds all reﬁned hypotheses to the list of “open” hypotheses and repeats this cycle with the next best hypothesis (one with lowest heuristic estimate). A ﬁnal improvement addresses the issue of high complexity. In certain cases, prior to learning the user knows certain constraints regarding the target theory. For example when learning in the weather domain we cannot have two diﬀerent measurements of air pressure from one weather station at the same time. HYPER/N enables the user to provide such constraints as Prolog programs, which further increases HYPER/N’s ﬂexibility while at the same time decreases complexity, since all such hypotheses that do not satisfy the constraints are automatically discarded.

4

Experiments with Weather Data

We tested how HYPER/N performs at learning in a weather domain. In this domain we have a series of radar images (part of which is displayed in Fig.2), taken in 10 minute intervals, indicating the intensity of rain (none, light, medium, heavy and extreme) as well as a database with the synoptic measurements (air temperature, air pressure, wind direction, ...). Synoptic measurements were taken in 1 hour intervals at best. Spacial data was represented on a rectangular grid of

194

A. Oblak and I. Bratko

Fig. 2. Excerpt from a sequence of radar images, used for learning

cells. Besides this data we provided HYPER/N also with neighbor relations between cells and with successor in time relation. Many relations between synoptic measurements also exist and we have some prior knowledge about this domain. Therefore ILP seems appropriate for this domain since as ILP’s strengths lie in relational learning and providing background knowledge in a very natural way. The ﬁrst thing we did was to verify how HYPER/N handles noise in the weather domain. The easiest way to do this was with synthetic data where we could control the amount of noise. We generated 200 learning examples using the following theory: rain(any_type,[X,Y],T1) :succ(T,T1), rain(any_type,[X1,Y1],T), neighbor(north,[X1,Y1],[X,Y]), wind_dir(north,T). rain(light,[X,Y],T1) :succ(T,T1), rain(any_type,[X1,Y1],T), neighbor(east,[X1,Y1],[X,Y]), wind_dir(east,T). where rain(any_type,[X,Y],T) indicates that rain of any type (light, medium, heavy or extreme) is falling in the cell with coordinates [X,Y] at time T, succ(T,T1) indicates that T1 is T’s successor in time, neighbor(north,[X1,Y1],[X,Y]) indicates that the cell with the coordinates [X,Y] is the north neighbor of the cell with the coordinates [X1,Y1] (similar holds for neighbor(east,[X1,Y1],[X,Y])) and wind_dir(north,T) indicates that in the time T the wind is blowing towards the north (similar holds for wind_dir(east,T)). This theory says that rain in a cell will move to its neighbor cell in the wind direction. To simulate noise, we changed the direction of rain movement in n examples. When the expected amount of noise was set to n, HYPER/N always learned the original theory. Under these conditions, HYPER/N managed to learn the correct hypothesis for the values of n up to approximately 50% of the number of positive learning examples. Setting the expected noise level lower than n resulted in no hypotheses learned when HYPER/N reached the number of maximum reﬁnements (usually 1000 reﬁnements). Setting it higher (approximately n + 5 and more) resulted in several diﬀerent hypotheses learned. Neither of those hypotheses was good as a whole.

Learning from Noisy Data Using a Non-covering ILP Algorithm

195

The next step was to run HYPER/N on actual radar images. Since those images have resolution of 300 by 400 pixels, where each pixel represents 1km2 in nature, we had for complexity reasons to reduce the amount of data. We discretized the images in smaller, 5 by 5 pixels cells, to decrease the number of learning examples (from 120.000 to 4.800 – for one radar image). Experimentally we found that in the weather domain HYPER/N could handle up to a few thousand learning examples. Increasing this number considerably resulted in very slow learning. Increasing the cell size was not an option since rain movement was not visible in too large cells, so we focused only on a smaller region around a weather station that produced synoptic measurements most regularly (in 1 hour intervals). So we selected a sequence of images (3.400 learning examples), where the rain mass is ﬁrst moving towards the north, and after 3 hours started moving towards the east. HYPER/N induced the following hypotheses: rain( rain_predicted, [X,Y],T1) :succ( T, T1), rain( rain_observed, [X1,Y1],T), wind_dir( D, T), neighbor( D, [X1,Y1], [X,Y]). and rain(rain_predicted,[X,Y],T1) :succ(T,T1), rain(rain_observed,[X,Y],T). The ﬁrst hypothesis says that the rain moves in the direction in which the wind blows. The second hypothesis says that the rain “stays where it was”. The learning times were in the order of an hour when the maximum number of clauses was “wastefully” set to 2 (1 would suﬃce). We evaluated these hypotheses on 7.400 test data (74 radar images where each contains 100 cells in the observed area) where rain moves in several diﬀerent directions. The ﬁrst hypothesis (the one that says that the rain moves in the direction in which the wind blows) had a classiﬁcation accuracy of 83%. The second one (the one that says that the rain stays where it was) had a classiﬁcation accuracy of 89,8%. For comparison – a hypothesis that always predicts rain has a clasiﬁcation accuracy of 46,3% and hypothesis that always predicts no rain has clasiﬁcation accuracy of 53,7%. For comparison with other ILP systems, we experimented with Aleph [8], Progol [5] and Alchemy [7] on the same reduced set of real weather data. We here present the most successful trials, obtained with Aleph. We ran Aleph with both the “classical” covering algorithm, and a non-covering approach with learning ﬁrst-order decision trees. We did not get any success with the other non-covering algorithm in Aleph, called “theory induction”, which induces a whole theory at once (rather than clause by clause) which would be most relevant for comparison with HYPER. In the covering algorithm, an appropriate setting of parameter “noise” was 400, which resulted in a theory whose ﬁrst clause is: rain( YesNo, Place, Time) :succ_start( Time0, Time),

rain( YesNo, Place, Time0).

196

A. Oblak and I. Bratko

The ﬁrst clause is equivalent to HYPER/N’s second theory. Then followed a large set of empty-body clauses that covered the false positive examples by simple enumeration. Aleph’s theory has test set accuracy 0.888, very similar to HYPER/N’s 0.898. The small diﬀerence is due to the clauses that cover single false positive examples. A user might sensibly remove these spurious clauses, leading to the same result as HYPER/N second theory. We did not succeed in making Aleph with covering induce HYPER/N’s ﬁrst theory as alternative. Inducing class probability trees with parameter lookahead set to 1 just resulted in the unsatisfactory root-only tree. Setting lookahead to 2 or 3 gives tree structured rules: rain( YesNo, Place, Time) :succ_start( Time0, Time), rain( YesNo, Place, Time0), random(YesNo, [0.534425-no, 0.465575-yes]). rain( YesNo, Place, Time) :not (succ_start( Time0, Time), rain( YesNo, Place, Time0) ), random(YesNo, [0.507671-no, 0.492329-yes]). The rules are sensible again (similar to theory 2 by HYPER). The class probability distribution in the ﬁrst rule is confusing - it would best be omitted because when the body of the rule is satisﬁed, YesNo is already instantiated. Setting lookahead = 4 results in a theory that contains the same idea as theory 1 by HYPER/N. In conclusion, Aleph with appropriate settings and used in a “constructive” way induced theories similar to those by HYPER/N. Aleph was much faster than HYPER/N, with learning times in the order of a minute. We were not able to obtain any success with Alchemy. A typical result is the following theory (after notational modiﬁcation) that is hard to understand or use: not neighbor( Dir, [X1,X2], [X1,X1]) v not rain( Type, [X1,Y], Time) v not rain(Type, [X2,Y], Time) It should be admited that we had problems using these systems, specially with searching for good parameter setting. Better settings may exist than those we used.

5

Conclusion

In the paper we presented the mechanisms in HYPER/N that enable learning from noisy data and on larger domains than HYPER. We studied HYPER/N performance by experimnets in a real weather domain. In comparison with other popular ILP programs such as Aleph [8], FOIL [6] and Progol [5] as well as Alchemy [7], HYPER/N’s advantage is its better ability to learn recursive clauses and to learn multiple predicates simultaneously. Experiments in the weather domain show how important it is to correctly assess the degree of noise in the data.

Learning from Noisy Data Using a Non-covering ILP Algorithm

197

The accuracy and appropriate structure of induced theories largely depend on this estimate. Future work will surely include automation of some mechanisms, such as ﬁnding an appropriate value for the expected amount of noise, to make it more robust and user friendly.

Acknowledgment This work was partly done in the X-Media project (www.x-media-project.org) funded by the European Commission, EC grant IST-FP6-026978, and Slovene Agency for Research and Development (ARRS). The Slovene environmental agency ARSO provided the weather data used in this study. We thank our colˇ ˇ leagues Jure Zabkar, Martin Moˇzina, Marko Zerjal and Matic Standeker for discussion and other help in this work.

References 1. Bratko, I.: Inductive Logic Programming, 3rd edn. Prolog Programming for Artificial Intelligence, ch. 19, pp. 484–519. Addison Wesley, Reading (2001) 2. Lavraˇc, N., Dˇzeroski, S., Bratko, I.: Handling Imperfect Data in Inductive Logic Programming. In: De Raedt, L. (ed.) Advances in Inductive Logic Programming, pp. 48–64. IOS Press, Amsterdam (1996) ˇ 3. Leban, G., Zabkar, J., Bratko, I.: An Experiment in Robot Discovery With ILP. LNCS, pp. 77–90. Springer, Heidelberg (2008) 4. McCreath, E., Sharma, A.: ILP with Noise and Fixed Example Size: A Bayesian Approach. In: Fifteenth International Joint Conference on Artificial Intelligence, pp. 1310–1315. Morgan Kaufmann Publishers, San Francisco (1997) 5. Muggleton, S.: Inverse entailment and Progol. New Generation Computing 13, 245– 286 (1995) 6. Quinlan, J.R., Cameron-Jones, R.M.: FOIL: A Midterm Report. In: Brazdil, P.B. (ed.) ECML 1993. LNCS, vol. 667, pp. 3–20. Springer, Heidelberg (1993) 7. Richardson, M., Domingos, P.: Markov Logic Networks. Machine Learning 62, 107– 136 8. Srinivasan, A.: The Aleph Manual. Computing Laboratory, Oxford University (2007)

Can HOLL Outperform FOLL? Niels Pahlavi and Stephen Muggleton Department of Computing, Imperial College London, 180 Queen’s Gate, London SW7 2BZ, UK {niels.pahlavi,s.muggleton}@imperial.ac.uk

Abstract. Learning ﬁrst-order recursive theories remains a diﬃcult learning task in a normal Inductive Logic Programming (ILP) setting, although numerous approaches have addressed it; using Higher-order Logic (HOL) avoids having to learn recursive clauses for such a task. It is one of the areas where Higher-order Logic Learning (HOLL), which uses the power of expressivity of HOL, can be expected to improve the learnability of a problem compared to First-order Logic Learning (FOLL). We present a ﬁrst working implementation of λProgol, a HOLL system adapting the ILP system Progol and the HOL formalism λProlog, which was introduced in a poster last year [15]. We demonstrate that λProgol outperforms standard Progol when learning ﬁrst-order recursive theories, by improving signiﬁcantly the predictive accuracy of several worked examples, especially when the learning examples are small with respect to the size of the data.

1

Introduction and Motivations

[3] describes Higher-order Logic (HOL) as “a natural extension of ﬁrst-order logic (FOL) which is simple, elegant, highly expressive, and practical” recommends its use as an “attractive alternative to ﬁrst-order logic”. HOL allows for quantiﬁcation over predicates and functions and is intrinsically more expressive than FOL. Much of logic-based Machine Learning research is based on FOL and Prolog, including Inductive Logic Programming (ILP). Yet, HOL, and has been seldom used. According to [9], “the logic programming community needs to make greater use of the power of higher-order features and the related type systems. Furthermore, HOL has generally been under-exploited as a knowledge representation language”. In [9], the use of HOL in Computational Logic, which has been “advocated for at least the last 30 years” is illustrated: functional languages, like Haskell98; Higher-order programming introduced with λProlog [11]; integrated functional logic programming languages like Curry or Escher; or the higher-order logic interactive theorem proving environment “HOL”. It is also used in IBAL and for Deep Transfer Learning. We have decided to adapt ILP within a HOL framework, developing Higherorder Logic Learning (HOLL). ILP seems to be rather intuitively adaptable to a FOL formalism. We present a ﬁrst working implementation of λProgol, a HOLL system adapting the ILP system Progol and the HOL formalism λProlog. We decided to choose Higher-order Horn Clauses (HOHC) [13] as a HOL formalism, P. Frasconi and F.A. Lisi (Eds.): ILP 2010, LNAI 6489, pp. 198–205, 2011. c Springer-Verlag Berlin Heidelberg 2011

Can HOLL Outperform FOLL?

199

since it is one of the logical foundations of λProlog. As a ILP system, we chose to adapt Progol [12], which is a popular and eﬃcient implementation. We want to determine whether HOLL can outperform FOLL and study the trade-oﬀ that there may be between learnability and searching costs (the use of Henkin semantics as in [17], seems to alleviate these and maintain the structure of the search space). There have been attempts to use HOL for logic-based Machine Learning such as by Harao starting in [6], Feng and Muggleton [4] and Furukawa and Goebel [5]. They provide diﬀerent higher-order extensions of least general generalization in order to handle higher-order terms in a normal ILP setting, whereas we use λProlog, a HOL framework, as a logical foundation to extend ﬁrst-order ILP to a higher-order context. The main similar work is [9] by Lloyd and Ng, where higher-order machine learning is also developed. It uses a typed higher-order logic, but, although similar, “a diﬀerent sublogic is used for λProlog programs than the equational theories proposed” in [9]. It details a learning system, called ALKEM Y . A main diﬀerence is that Lloyd’s approach is not based on Logic Programming and therefore on ILP. According to Flach, “it is almost a rational reconstruction of what ILP could have been, had it used Escher-style HOL rather than Prolog”; whereas we intend, through the use of higher-order Horn clauses to keep the Horn clauses foundations of LP and ILP and to extend it. HOLL will be tested and assessed on new problems and applications not learnable by ILP (which includes the learning of higher-order predicates), but also on how well it performs on problems already handled by ILP to compare it with existing ILP systems in order to determine if it can outperform FOLL. It would be therefore of interest to look at learning problems not handled well by ILP. One of these is learning tasks involving recursion. According to [10], “learning ﬁrst-order recursive theories is a diﬃcult learning task” in a normal ILP setting. However, we can expect a higher-order system to learn better than a ﬁrst-order system on such problems, because we could use higher-order predicates as background knowledge to learn recursive theories (a similar approach is already used for some recursive functions in the Haskell prelude); and it will be sounder, more natural and intuitive, hence probably more eﬃcient than meta-logical features which come from functional languages. We can for example use the higher-order predicate trans as background knowledge to learn naturally the recursive predicate ancestor (see Sect. 3). More generally, the expressivity of HOL would make it possible to represent mathematical properties like symmetry, reﬂexivity or transitivity, which would allow to handle equational reasoning and functions within a logic-based framework. We could also represent such properties in the following fashion (in the case of symmetry) : [email protected]@Y

Our partners will collect data and use cookies for ad personalization and measurement. Learn how we and our ad partner Google, collect and use data. Agree & close