Skip to main content

Value of Information: Quantification and Application to Coalition Machine Learning

  • Chapter
  • First Online:
Policy-Based Autonomic Data Governance

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11550))

Abstract

The creation of good machine learning models relies on the availability of good training data. In coalition settings, this training data may be obtained from many different coalition partners. However, due to the difference in the trust level of the coalition partners, the value of the information provided by the coalition partners could be questionable. In this paper, we examine the concept of Value of Information, provide a quantitative measure for it, and show how this can be used to determine the policies for information fusion in the training of machine learning models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ministry of Defence, United Kingdom: UK defence doctrine, 5th edn. MoD Concepts and Doctrine Centre Joint Doctrine Publication, U.K. (2014)

    Google Scholar 

  2. Pearson, G., Lemon, J.: Vision and critical challenges in exploiting distributed data for distributed decision making. In: Proceedings of the International Society for Optics and Photonics Conference on Defense Transformation and Net-Centric Systems 2011, Orlando, FL, USA (2011)

    Google Scholar 

  3. Steinberg, A., Bowman, C.: Rethinking the JDL data fusion levels. In: National Symposium on Sensor and Data Fusion (NSSDF) (2004)

    Google Scholar 

  4. Pham, T., Cirincione, G., Swami, A., Pearson, G., Williams, C.: Distributed analytics and information science. In: IEEE 8th International Conference on Information Fusion (2015)

    Google Scholar 

  5. Roberts, D., Lock, G., Verma, D.: Holistan: a futuristic scenario for international coalition operations. In: IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (2007)

    Google Scholar 

  6. Stenbit, J., Wells, L., Alberts, D.: NATO code of best practice for C2 assessment. Office of the Assistant Secretary of Defense (OASD), Command and Control Research Program (CCRP), Washington, DC 20301 (2002)

    Google Scholar 

  7. Bisdikian, C., Kaplan, L., Srivastava, M., Thornley, M., Verma, D., Young, R.: Building principles for a quality of information specification for sensor information. In: IEEE International Conference on Information Fusion, pp. 1370–1377 (2009)

    Google Scholar 

  8. Bar-Noy, A., et al.: Quality of information aware networking for tactical military networks. In: IEEE International Conference on Pervasive Computing and Communications (2011)

    Google Scholar 

  9. Sachidananda, V., Khelil, A., Suri, N.: Quality of information in wireless sensor networks: a survey. In: Proceeding of the International Conference on Information Quality (2010)

    Google Scholar 

  10. Jin, H., Su, L., Nahrstedt, D.C.K., Xu, J.: Quality of information aware incentive mechanisms for mobile crowd sensing systems. In: Proceedings of the ACM International Symposium on Mobile Ad-Hoc Networking and Computing, pp. 167–176 (2015)

    Google Scholar 

  11. Rissanen, J.: Fisher information and stochastic complexity. IEEE Trans. Inf. Theory 42(1), 40–47 (1996)

    Article  MathSciNet  Google Scholar 

  12. DeDeo, S.: Information theory for intelligent people. May simon/it.pdf (2018). http://tuvalu.santafe.edu/

  13. Olivier, C., Courtellemont, P., Colot, O., de Brucq, D., Matouat, A.E.: Comparison of histograms: a tool for detection. Eur. J. Diagn. Saf. Autom. 4(3), 335–355 (1994)

    Google Scholar 

  14. Calo, S., Chakraborty, S., Verma, D., Bertino, E., Lupu, E., Cirincione, G.: Self generation of access control policies. In: Proceedings of ACM SACMAT (2018)

    Google Scholar 

  15. Yann, L., Corinna, C., Christopher, J.: The MNIST database of handwritten digits (1998). http://yann.lecun.com/exdb/mnist/

  16. Verma, D., Chakraborty, S., Calo, S., Julier, S., Pasteris, S.: An algorithm for model fusion for distributed learning. In: SPIE Defense and Commerical Sensing Symposium, Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR (2018)

    Google Scholar 

  17. LeCun, Y., Bengio, Y.: Convolutional networks for images, speech, and time series. Handb. Brain Theory Neural Netw. 3361, 10 (1995)

    Google Scholar 

  18. Abadi, M., et al.: Tensorflow: a system for large-scale machine learning. In: Proceedings of OSDI, vol. 16, pp. 265–283 (2016)

    Google Scholar 

  19. Moffat, J., Medhurst, J.: Modelling of human decision making in simulation models of conflict using experimental gaming. Eur. J. Oper. Res. 196, 1147–1156 (2009)

    Article  MathSciNet  Google Scholar 

  20. Medhurst, J., Stanton, I., Bird, H., Berry, M.: The value of infomration to decision makers: an experimental approach using card based decision gaming. J. Oper. Res. Soc. 60, 747–757 (2009)

    Article  Google Scholar 

  21. Medhurst, J., Stanton, I., Bird, H., Berry, M.: Risk taking by decision makers - using card-based decision gaming to develop models of behavior. J. Oper. Res. Soc. 61, 1561–1571 (2010)

    Article  Google Scholar 

  22. Braines, D., Preece, A., de Mel, G., Pham, T.: Enabling CoIST users: D2D at the network edge. In: IEEE International Conference on Information Fusion (FUSION) (2014)

    Google Scholar 

Download references

Acknowledgments

This research was sponsored by the U.S. Army Research Laboratory and the U.K. Ministry of Defence under Agreement Number W911NF-16-3-0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. Army Research Laboratory, the U.S. Government, the U.K. Ministry of Defence or the U.K. Government. The U.S. and U.K. Governments are authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation hereon.

Dstl/CP107670. Content includes material subject to \(\copyright \) Crown copyright (2018), Dstl. This information is licensed under the terms of the Open Government Licence except where otherwise stated. To view this licence, visit http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3 or write to the Information Policy Team, The National Archives, Kew, London TW9 4DU, or email: psi@nationalarchives.gsi.gov.uk.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dinesh Verma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pearson, G., Verma, D., de Mel, G. (2019). Value of Information: Quantification and Application to Coalition Machine Learning. In: Calo, S., Bertino, E., Verma, D. (eds) Policy-Based Autonomic Data Governance. Lecture Notes in Computer Science(), vol 11550. Springer, Cham. https://doi.org/10.1007/978-3-030-17277-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-17277-0_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-17276-3

  • Online ISBN: 978-3-030-17277-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics