Many software applications consist of a number of interdependent steps and are executed under the supervision of a human administrator or operator. The administrator responds to e...
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
—This paper presents technology for performing autonomous commanding of a planetary rover. Through the use of AI planning, scheduling and execution techniques, the OASIS autonomo...
Tara A. Estlin, Daniel M. Gaines, Caroline Chouina...
The provision of embedding neural networks into software applications can enable variety of Artificial Intelligence systems for individual users as well as organizations. Previous...
This paper recapitulates the results of a long research on a family of artificial intelligence (AI) methods—relying on, e.g., artificial neural networks and search techniques...