Abstract
The creation of good machine learning models relies on the availability of good training data. In coalition settings, this training data may be obtained from many different coalition partners. However, due to the difference in the trust level of the coalition partners, the value of the information provided by the coalition partners could be questionable. In this paper, we examine the concept of Value of Information, provide a quantitative measure for it, and show how this can be used to determine the policies for information fusion in the training of machine learning models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ministry of Defence, United Kingdom: UK defence doctrine, 5th edn. MoD Concepts and Doctrine Centre Joint Doctrine Publication, U.K. (2014)
Pearson, G., Lemon, J.: Vision and critical challenges in exploiting distributed data for distributed decision making. In: Proceedings of the International Society for Optics and Photonics Conference on Defense Transformation and Net-Centric Systems 2011, Orlando, FL, USA (2011)
Steinberg, A., Bowman, C.: Rethinking the JDL data fusion levels. In: National Symposium on Sensor and Data Fusion (NSSDF) (2004)
Pham, T., Cirincione, G., Swami, A., Pearson, G., Williams, C.: Distributed analytics and information science. In: IEEE 8th International Conference on Information Fusion (2015)
Roberts, D., Lock, G., Verma, D.: Holistan: a futuristic scenario for international coalition operations. In: IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (2007)
Stenbit, J., Wells, L., Alberts, D.: NATO code of best practice for C2 assessment. Office of the Assistant Secretary of Defense (OASD), Command and Control Research Program (CCRP), Washington, DC 20301 (2002)
Bisdikian, C., Kaplan, L., Srivastava, M., Thornley, M., Verma, D., Young, R.: Building principles for a quality of information specification for sensor information. In: IEEE International Conference on Information Fusion, pp. 1370–1377 (2009)
Bar-Noy, A., et al.: Quality of information aware networking for tactical military networks. In: IEEE International Conference on Pervasive Computing and Communications (2011)
Sachidananda, V., Khelil, A., Suri, N.: Quality of information in wireless sensor networks: a survey. In: Proceeding of the International Conference on Information Quality (2010)
Jin, H., Su, L., Nahrstedt, D.C.K., Xu, J.: Quality of information aware incentive mechanisms for mobile crowd sensing systems. In: Proceedings of the ACM International Symposium on Mobile Ad-Hoc Networking and Computing, pp. 167–176 (2015)
Rissanen, J.: Fisher information and stochastic complexity. IEEE Trans. Inf. Theory 42(1), 40–47 (1996)
DeDeo, S.: Information theory for intelligent people. May simon/it.pdf (2018). http://tuvalu.santafe.edu/
Olivier, C., Courtellemont, P., Colot, O., de Brucq, D., Matouat, A.E.: Comparison of histograms: a tool for detection. Eur. J. Diagn. Saf. Autom. 4(3), 335–355 (1994)
Calo, S., Chakraborty, S., Verma, D., Bertino, E., Lupu, E., Cirincione, G.: Self generation of access control policies. In: Proceedings of ACM SACMAT (2018)
Yann, L., Corinna, C., Christopher, J.: The MNIST database of handwritten digits (1998). http://yann.lecun.com/exdb/mnist/
Verma, D., Chakraborty, S., Calo, S., Julier, S., Pasteris, S.: An algorithm for model fusion for distributed learning. In: SPIE Defense and Commerical Sensing Symposium, Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR (2018)
LeCun, Y., Bengio, Y.: Convolutional networks for images, speech, and time series. Handb. Brain Theory Neural Netw. 3361, 10 (1995)
Abadi, M., et al.: Tensorflow: a system for large-scale machine learning. In: Proceedings of OSDI, vol. 16, pp. 265–283 (2016)
Moffat, J., Medhurst, J.: Modelling of human decision making in simulation models of conflict using experimental gaming. Eur. J. Oper. Res. 196, 1147–1156 (2009)
Medhurst, J., Stanton, I., Bird, H., Berry, M.: The value of infomration to decision makers: an experimental approach using card based decision gaming. J. Oper. Res. Soc. 60, 747–757 (2009)
Medhurst, J., Stanton, I., Bird, H., Berry, M.: Risk taking by decision makers - using card-based decision gaming to develop models of behavior. J. Oper. Res. Soc. 61, 1561–1571 (2010)
Braines, D., Preece, A., de Mel, G., Pham, T.: Enabling CoIST users: D2D at the network edge. In: IEEE International Conference on Information Fusion (FUSION) (2014)
Acknowledgments
This research was sponsored by the U.S. Army Research Laboratory and the U.K. Ministry of Defence under Agreement Number W911NF-16-3-0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. Army Research Laboratory, the U.S. Government, the U.K. Ministry of Defence or the U.K. Government. The U.S. and U.K. Governments are authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation hereon.
Dstl/CP107670. Content includes material subject to \(\copyright \) Crown copyright (2018), Dstl. This information is licensed under the terms of the Open Government Licence except where otherwise stated. To view this licence, visit http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3 or write to the Information Policy Team, The National Archives, Kew, London TW9 4DU, or email: psi@nationalarchives.gsi.gov.uk.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Pearson, G., Verma, D., de Mel, G. (2019). Value of Information: Quantification and Application to Coalition Machine Learning. In: Calo, S., Bertino, E., Verma, D. (eds) Policy-Based Autonomic Data Governance. Lecture Notes in Computer Science(), vol 11550. Springer, Cham. https://doi.org/10.1007/978-3-030-17277-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-17277-0_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-17276-3
Online ISBN: 978-3-030-17277-0
eBook Packages: Computer ScienceComputer Science (R0)