Sciweavers

ABIALS
2008
Springer
14 years 2 months ago
Multiscale Anticipatory Behavior by Hierarchical Reinforcement Learning
Abstract. In order to establish autonomous behavior for technical systems, the well known trade-off between reactive control and deliberative planning has to be considered. Within ...
Matthias Rungger, Hao Ding, Olaf Stursberg
WSC
2008
14 years 2 months ago
Modeling and simulation of integrated intelligent systems
Complex systems consist of a large number of entities with their independent local rules and goals, along with their interactions. The effect of these properties tends to produce ...
Yongchang Li, Michael Balchanos, Bassem Nairouz, N...
LISA
2007
14 years 2 months ago
NetADHICT: A Tool for Understanding Network Traffic
Computer and network administrators are often confused or uncertain about the behavior of their networks. Traditional analysis using IP ports, addresses, and protocols are insuffi...
Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, An...
AIIDE
2008
14 years 2 months ago
An Intelligent IDE for Behavior Authoring in Real-Time Strategy Games
Behavior authoring for computer games involves writing behaviors in a programming language and then iteratively refining them by detecting issues with them. The main bottlenecks a...
Suhas Virmani, Yatin Kanetkar, Manish Mehta, Santi...
AIIDE
2008
14 years 2 months ago
Constructing Complex NPC Behavior via Multi-Objective Neuroevolution
It is difficult to discover effective behavior for NPCs automatically. For instance, evolutionary methods can learn sophisticated behaviors based on a single objective, but realis...
Jacob Schrum, Risto Miikkulainen
AIIDE
2007
14 years 2 months ago
A Demonstration of ScriptEase Motivational Ambient and Latent Behaviors for Computer RPGs
This demonstration describes the generation of ambient and latent NPC behavior scripts using generative behavior patterns with ScriptEase. Our behavior model supports behavior rol...
Maria Cutumisu, Duane Szafron, Jonathan Schaeffer,...
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
14 years 3 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
SPAA
1998
ACM
14 years 3 months ago
Analyses of Load Stealing Models Based on Differential Equations
In this paper we develop models for and analyze several randomized work stealing algorithms in a dynamic setting. Our models represent the limiting behavior of systems as the numb...
Michael Mitzenmacher
CAV
2006
Springer
101views Hardware» more  CAV 2006»
14 years 4 months ago
Ticc: A Tool for Interface Compatibility and Composition
Abstract. We present a brief overview of the tool Ticc (Tool for Interface Compatibility and Composition). In Ticc, a component interface describes both the behavior of a component...
B. Thomas Adler, Luca de Alfaro, Leandro Dias da S...
ATAL
2006
Springer
14 years 4 months ago
Learning executable agent behaviors from observation
We present a method for learning a human understandable, executable model of an agent's behavior using observations of its interaction with the environment. By executable we ...
Andrew Guillory, Hai Nguyen, Tucker R. Balch, Char...