As no plan can cover all possible contingencies, the ability to detect failures during plan execution is crucial to the robustness of any autonomous system operating in a dynamic ...
Type-2 fuzzy sets, which are characterized by membership functions (MFs) that are themselves fuzzy, have been attracting interest. This paper focuses on advancing the understandin...
Abstract. Usage of combinatorial testing is wide spreading as an effective technique to reveal unintended feature interaction inside a given system. To this aim, test cases are con...
This paper addresses the problem of learning to map sentences to logical form, given training data consisting of natural language sentences paired with logical representations of ...
Tom Kwiatkowksi, Luke S. Zettlemoyer, Sharon Goldw...
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...