Sciweavers

1246 search results - page 192 / 250
» Recursive Timed Automata
Sort
View
126
Voted
AAAI
2011
14 years 2 months ago
Recognizing Plans with Loops Represented in a Lexicalized Grammar
This paper extends existing plan recognition research to handle plans containing loops. We supply an encoding of plans with loops for recognition, based on techniques used to pars...
Christopher W. Geib, Robert P. Goldman
116
Voted
ICECCS
2009
IEEE
119views Hardware» more  ICECCS 2009»
15 years 9 months ago
REMES: A Resource Model for Embedded Systems
In this paper, we introduce the model REMES for formal modeling and analysis of embedded resources such as storage, energy, communication, and computation. The model is a state-ma...
Cristina Cerschi Seceleanu, Aneta Vulgarakis, Paul...
IWSOS
2009
Springer
15 years 9 months ago
Self-organized Evacuation Based on LifeBelt
Abstract. In this paper, we have investigated the feasibility of a selforganized evacuation process when compared with a centralized control. The evacuation strategy is based on â€...
Kashif Zia, Alois Ferscha
114
Voted
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 8 months ago
A Deterministic Cost-effective String Matching Algorithm for Network Intrusion Detection System
—Network Intrusion Detection Systems (NIDS) are more and more important in today’s network security for identifying and preventing malicious attacks over the network. This pape...
Nen-Fu Huang, Yen-Ming Chu, Chen-Ying Hsieh, Chi-H...
131
Voted
IEEESCC
2005
IEEE
15 years 8 months ago
Web Service Discovery Based on Behavior Signatures
Web service discovery is a key problem as the number of services is expected to increase dramatically. Service discovery at the present time is based primarily on keywords, or int...
Zhongnan Shen, Jianwen Su