Sciweavers

88 search results - page 5 / 18
» Detecting model inconsistency through operation-based model ...
Sort
View
AAAI
2007
13 years 9 months ago
Detecting Execution Failures Using Learned Action Models
reason with abstracted models of the behaviours they use to construct plans. When plans are turned into the instructions that drive an executive, the real behaviours interacting w...
Maria Fox, Jonathan Gough, Derek Long
ATAL
2006
Springer
13 years 11 months ago
Accident or intention: that is the question (in the Noisy Iterated Prisoner's Dilemma)
This paper focuses on the Noisy Iterated Prisoner's Dilemma, a version of the Iterated Prisoner's Dilemma (IPD) in which there is a nonzero probability that a "coop...
Tsz-Chiu Au, Dana S. Nau
TIFS
2008
136views more  TIFS 2008»
13 years 7 months ago
Distributed Detection of Information Flows
Abstract--Distributed detection of information flows is considered in which traffic sensors at different locations of a network observe transmission epochs. The traffic sensors com...
Ting He, Lang Tong
ACSAC
2004
IEEE
13 years 11 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
TASE
2009
IEEE
14 years 2 months ago
Semantics of Metamodels in UML
A modelling language can be defined by a metamodel in UML class diagram. This paper defines the semantics of such metamodels through two mappings: a signature mapping from metamod...
Lijun Shan, Hong Zhu