Computational Intelligence - May 2013 - 75

CtxPrf ({U bt, U al, U 17}, ag) - 0.820
As we have shown (see Section Vii-B), wishful thinking
CtxPrf ({U bt, U al, JU 17, U cr }, ag) - 0.856
CtxPrf ({U bt, U 17, U cr }, ag) - 0.833
in WTR is not merely a bias in the resolution of
CtxPrf ({JU bt, U al, U 17}, ag) - 1.804
conflicts among inconsistent data (passive effects); it
CtxPrf ({JU bt, U al, JU 17, U cr }, ag) - 1.846
can sometimes be the sole cause for having a belief,
CtxPrf ({JU bt, U 17, U cr }, ag) - 1.819.
Consequently, the believed context is
or for evoking belief revision when certain beliefs are
c
b = {JU bt, U al, JU 17, U cr }, and the resulting
undesirable (active effects).
belief space is BS ( b c, ag) = {JU bt, U al,
JU 17, U cr ,} .
Both DBR and WTR are approaches to belief dynamics,
Susan's communication was "just what the agent wanted to
for autonomous agents. They both produce non-prioritized
hear" to be able to deny, once again, her mother's death. The
belief revision that is biased by the likeability of beliefs. Also,
new hypothesis is that the agent's mother did not board flight
both models measure this likeability according to the satisfac17 (JU 17), so U 17 becomes, once again, easy to reject.
tion of goals; Affective states are not modeled explicitly, but
This result illustrates an important aspect of WTR. Notice
rather implicitly, through the preference conveyed by likeability.
that the fact that the agent's mother boarded flight 17 is supOne of the main differences between the two models is
ported by communications from David and Bruno, and:
that DBR is belief-oriented while WTR is context oriented,
❏ Without wishful thinking, the agent would never reject this
and this difference is specially important in the determination
belief because it is the word of both David and Bruno against
of likeability.
the word of Susan, and even Bruno, alone, is considered
As explained in Section I, a context-oriented approach is
more credible than Susan (the causal strength of U 17 is 0.9
more adequate, since the preference of a belief may be depenwhile the causal strength of JU 17, is 0.6).
dent on certain other beliefs being kept or abandoned. This is
❏ Wishful thinking alone (in this situation) is also not enough
mostly obvious when it comes to the preference conveyed by
to allow the agent to reject such a strong belief ( U 17 ), as can
likeability because, for instance, a belief may be desired/undebe concluded from the results of Scenario 4.
sired only due to the presence of another belief.
Therefore, the denial that occurs in this scenario was only
Another important difference, between the two approaches,
possible because of a combination of rational and affective facis that, in WTR, we model active effects of wishful thinking, an
tors (i.e., the support from Susan's communication combined
aspect that is not modeled in DBR. More concretely, in DBR
with the agent's desire to believe that her mother is alive). This
beliefs originate from data which, in turn, comes from the outcombined effect captures, in WTR, the passive effects of wishside world. The only internally generated beliefs are those that
ful thinking, explained in Section III.
originate from other beliefs, through inference. In WTR, howWTR is guided by an order (or orders) among contexts
ever, beliefs can also originate from goals, by means of wishful
that does not necessarily have a correspondence to some order
thinking supports. Any inconsistencies, between these wishful
(or orders) among hypotheses. For instance, suppose that,
thoughts and collected data, trigger belief revision, the same
because JU 17 is in the believed context and U 17 is not (in
way inconsistencies among collected data do.
this scenario), we assume an order among hypotheses where
In [7], Jonathan Gratch and Stacy Marsella start by presentJU 17 is preferred to U 17 . Notice that this preference is a coning a framework that describes appraisal and coping as two
sequence of the agent's belief in U cr (that makes U 17
strongly related operations. As the authors put it, "Appraisal
"unwanted," given her goals). If, for some reason, the agent
characterizes the relationship between a person and their physirejects the belief in U cr the resulting order, between JU 17 and
cal and social environment (...) and coping recruits resources to
U 17 , is reversed.
repair or maintain this relationship" [7].
This view is based on Smith and Lazarus' cognitive motivaViii. Comparison with Related Work
tional-emotive system [21]. Gratch and Marsella describe this
In the previous sections we have presented the WTR framesystem's architecture, highlighting that the consequence of
work, and shown how it can be used to manage an agent's
appraisal (the action tendencies, the affect and the physiological
beliefs according to the aims discussed in Section I. In this secresponses) triggers coping which, in turn, acts on the antecedtion we compare WTR with two other approaches that are
ents of appraisal. These antecedents may be the environment, in
related to some extent.
the case of problem-focused coping, or the evaluation of the
In [17] and [18], Fabio Paglieri presents an approach to belief
situation, in the case of emotion-focused coping. Following the
revision in the context of cognitive agents: Dataoriented Belief
guidelines of this framework, the authors implement a specific
Revision (in short, DBR). More precisely, DBR is a model of cogcomputational model: EMA [7], [13] (named after Lazarus'
nitive agents' epistemic dynamics (of which belief revision is a
book "Emotion and Adaptation" [10]).
part). The model builds upon the distinction between data (inforNote that coping commonly refers to how the individual
mation stored in the agent's mind) and beliefs (information the
deals with strong negative emotions. Although the authors
agent considers reliable for further reasoning and direct action).
❏
❏
❏
❏
❏
❏

May 2013 | IEEE CoMputatIonal IntEllIgEnCE MagazInE

75



Table of Contents for the Digital Edition of Computational Intelligence - May 2013

Computational Intelligence - May 2013 - Cover1
Computational Intelligence - May 2013 - Cover2
Computational Intelligence - May 2013 - 1
Computational Intelligence - May 2013 - 2
Computational Intelligence - May 2013 - 3
Computational Intelligence - May 2013 - 4
Computational Intelligence - May 2013 - 5
Computational Intelligence - May 2013 - 6
Computational Intelligence - May 2013 - 7
Computational Intelligence - May 2013 - 8
Computational Intelligence - May 2013 - 9
Computational Intelligence - May 2013 - 10
Computational Intelligence - May 2013 - 11
Computational Intelligence - May 2013 - 12
Computational Intelligence - May 2013 - 13
Computational Intelligence - May 2013 - 14
Computational Intelligence - May 2013 - 15
Computational Intelligence - May 2013 - 16
Computational Intelligence - May 2013 - 17
Computational Intelligence - May 2013 - 18
Computational Intelligence - May 2013 - 19
Computational Intelligence - May 2013 - 20
Computational Intelligence - May 2013 - 21
Computational Intelligence - May 2013 - 22
Computational Intelligence - May 2013 - 23
Computational Intelligence - May 2013 - 24
Computational Intelligence - May 2013 - 25
Computational Intelligence - May 2013 - 26
Computational Intelligence - May 2013 - 27
Computational Intelligence - May 2013 - 28
Computational Intelligence - May 2013 - 29
Computational Intelligence - May 2013 - 30
Computational Intelligence - May 2013 - 31
Computational Intelligence - May 2013 - 32
Computational Intelligence - May 2013 - 33
Computational Intelligence - May 2013 - 34
Computational Intelligence - May 2013 - 35
Computational Intelligence - May 2013 - 36
Computational Intelligence - May 2013 - 37
Computational Intelligence - May 2013 - 38
Computational Intelligence - May 2013 - 39
Computational Intelligence - May 2013 - 40
Computational Intelligence - May 2013 - 41
Computational Intelligence - May 2013 - 42
Computational Intelligence - May 2013 - 43
Computational Intelligence - May 2013 - 44
Computational Intelligence - May 2013 - 45
Computational Intelligence - May 2013 - 46
Computational Intelligence - May 2013 - 47
Computational Intelligence - May 2013 - 48
Computational Intelligence - May 2013 - 49
Computational Intelligence - May 2013 - 50
Computational Intelligence - May 2013 - 51
Computational Intelligence - May 2013 - 52
Computational Intelligence - May 2013 - 53
Computational Intelligence - May 2013 - 54
Computational Intelligence - May 2013 - 55
Computational Intelligence - May 2013 - 56
Computational Intelligence - May 2013 - 57
Computational Intelligence - May 2013 - 58
Computational Intelligence - May 2013 - 59
Computational Intelligence - May 2013 - 60
Computational Intelligence - May 2013 - 61
Computational Intelligence - May 2013 - 62
Computational Intelligence - May 2013 - 63
Computational Intelligence - May 2013 - 64
Computational Intelligence - May 2013 - 65
Computational Intelligence - May 2013 - 66
Computational Intelligence - May 2013 - 67
Computational Intelligence - May 2013 - 68
Computational Intelligence - May 2013 - 69
Computational Intelligence - May 2013 - 70
Computational Intelligence - May 2013 - 71
Computational Intelligence - May 2013 - 72
Computational Intelligence - May 2013 - 73
Computational Intelligence - May 2013 - 74
Computational Intelligence - May 2013 - 75
Computational Intelligence - May 2013 - 76
Computational Intelligence - May 2013 - 77
Computational Intelligence - May 2013 - 78
Computational Intelligence - May 2013 - 79
Computational Intelligence - May 2013 - 80
Computational Intelligence - May 2013 - Cover3
Computational Intelligence - May 2013 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com