Sciweavers

2006 search results - page 338 / 402
» Heuristic Security-Testing Methods
Sort
View
AIPS
2000
13 years 10 months ago
Planning with Conflicting Advice
The paradigm of advisable planning, in which a user provides guidance to influence the content of solutions produced by an underlying planning system, holds much promise for impro...
Karen L. Myers
IJCAI
1997
13 years 10 months ago
Toward Structured Retrieval in Semi-structured Information Spaces
A semi-structured information space consists of multiple collections of textual documents containing fielded or tagged sections. The space can be highly heterogeneous, because eac...
Scott B. Huffman, Catherine Baudin
IJCAI
1989
13 years 10 months ago
Selective Learning of Macro-operators with Perfect Causality
A macro-operator is an integrated operator consisting of plural primitive operators and enables a problem solver to solve more efficiently. However, if a learning system generates...
Seiji Yamada, Sabinro Tsuji
UAI
1990
13 years 10 months ago
Ideal reformulation of belief networks
The intelligent reformulation or restructuring of a belief network can greatly increase the efficiency of inference. However, time expended for reformulation is not available for ...
Jack S. Breese, Eric Horvitz
DAIS
2009
13 years 10 months ago
Foraging for Better Deployment of Replicated Service Components
Abstract. Our work focuses on distributed software services and their requirements in terms of system performance and dependability. We target the problem of finding optimal deploy...
Máté J. Csorba, Hein Meling, Poul E....