Sciweavers

2043 search results - page 397 / 409
» Reasoning About Security Models
Sort
View
JIRS
2000
144views more  JIRS 2000»
13 years 9 months ago
An Integrated Approach of Learning, Planning, and Execution
Agents (hardware or software) that act autonomously in an environment have to be able to integrate three basic behaviors: planning, execution, and learning. This integration is man...
Ramón García-Martínez, Daniel...
IOR
2010
75views more  IOR 2010»
13 years 8 months ago
Confronting Entrenched Insurgents
During counterinsurgency operations, government forces with superior …repower confront weaker lowsignature insurgents. Under what conditions should government (Blue) forces atta...
Edward H. Kaplan, Moshe Kress, Roberto Szechtman
ICWSM
2009
13 years 7 months ago
From Generating to Mining: Automatically Scripting Conversations Using Existing Online Sources
Hearing people argue opposing sides of an issue can be a useful way to understand the topic; however, these debates or conversations often don't exist. Unfortunately, generat...
Nathan D. Nichols, Lisa M. Gandy, Kristian J. Hamm...
TASE
2011
IEEE
13 years 4 months ago
KnitSketch: A Sketch Pad for Conceptual Design of 2D Garment Patterns
—In this paper, we present a new sketch-based system — KnitSketch, to improve the efficiency of process planning for knitting garments at an early design stage. The KnitSketch...
Cui-Xia Ma, Yong-Jin Liu, Hai-Yan Yang, Dong-Xing ...
WWW
2011
ACM
13 years 4 months ago
Improving recommendation for long-tail queries via templates
The ability to aggregate huge volumes of queries over a large population of users allows search engines to build precise models for a variety of query-assistance features such as ...
Idan Szpektor, Aristides Gionis, Yoelle Maarek