Sciweavers

336 search results - page 48 / 68
» Monitoring modulo theories
Sort
View
GECCO
2006
Springer
178views Optimization» more  GECCO 2006»
14 years 1 months ago
A dynamic approach to artificial immune systems utilizing neural networks
The purpose of this work is to propose an immune-inspired setup to use a self-organizing map as a computational model for the interaction of antigens and antibodies. The proposed ...
Stefan Schadwinkel, Werner Dilger
IJCAI
1989
13 years 11 months ago
Using and Refining Simplifications: Explanation-Based Learning of Plans in Intractable Domains
This paper describes an explanation-based approach lo learning plans despite a computationally intractable domain theory. In this approach, the system learns an initial plan using...
Steve A. Chien
FUIN
2008
91views more  FUIN 2008»
13 years 10 months ago
A Deductive Proof System for Multithreaded Java with Exceptions
Abstract. Besides the features of a class-based object-oriented language, Java integrates concurrency via its thread-classes, allowing for a multithreaded flow of control. Besides ...
Erika Ábrahám, Frank S. de Boer, Wil...
SIAMDM
2008
113views more  SIAMDM 2008»
13 years 9 months ago
Power Domination in Product Graphs
The power system monitoring problem asks for as few as possible measurement devices to be put in an electric power system. The problem has a graph theory model involving power dom...
Paul Dorbec, Michel Mollard, Sandi Klavzar, Simon ...
COMPSEC
2004
91views more  COMPSEC 2004»
13 years 9 months ago
Predicting the intrusion intentions by observing system call sequences
Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...