Sciweavers

114 search results - page 14 / 23
» Maintaining Consistency in Hierarchical Reasoning
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Spam mitigation using spatio-temporal reputations from blacklist history
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally maintained and well regarded, blacklists can filter 80+% of spam without having to...
Andrew G. West, Adam J. Aviv, Jian Chang, Insup Le...
EWCBR
1998
Springer
13 years 11 months ago
Categorizing Case-Base Maintenance: Dimensions and Directions
Abstract. Experience with the growing number of large-scale CBR systems has led to increasing recognition of the importance of case-base maintenance. Multiple researchers have addr...
David B. Leake, David C. Wilson
SIS
2008
13 years 8 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
AI
2005
Springer
13 years 7 months ago
A logic-based model of intention formation and action for multi-agent subcontracting
We present a formalism for representing the formation of intentions by agents engaged in cooperative activity. We use a syntactic approach presenting a formal logical calculus tha...
John Grant, Sarit Kraus, Donald Perlis
ATAL
2006
Springer
13 years 11 months ago
Continuous refinement of agent resource estimates
The challenge we address is to reason about projected resource usage within a hierarchical task execution framework in order to improve agent effectiveness. Specifically, we seek ...
David N. Morley, Karen L. Myers, Neil Yorke-Smith