Abstract. The textual description of video sequences exploits conceptual knowledge about the behavior of depicted agents. An explicit representation of such behavioral knowledge fa...
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
We present a novel geometric model for robot mapping suited for robots equipped with a laser range finder. The geometric representation is based on shape. Cyclic ordered sets of p...
Diedrich Wolter, Longin Jan Latecki, Rolf Lakä...
Abstract. We aim to demonstrate that automated deduction techniques, in particular those following the model computation paradigm, are very well suited for database schema/query re...
Peter Baumgartner, Ulrich Furbach, Margret Gro&szl...
Abstract. DTGolog was proposed by Boutilier et al. as an integration of decision-theoretic (DT) planning and the programming language Golog. Advantages include the ability to handl...
Alexander Ferrein, Christian Fritz, Gerhard Lakeme...