A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Planning for security management
2001
IEEE Intelligent Systems
In this paper, we discuss the design and implementation of a constraint-based planner that acts as a reacting module in an IDS. ...
An alternative approach relies on a planner that dynamically computes the action chain (plan) for reconfiguring/repairing an attacked system. ...
We would like to thank M.Boari, E.Lamma and P.Mello for useful comments and discussion. ...
doi:10.1109/5254.912387
fatcat:yyzuppsr2fhnpluq4rfqppwjzm
Review of Health Prognostics and Condition Monitoring of Electronic Components
2020
IEEE Access
A critical analysis of reliability studies to identify their relative merits and usefulness of the outcome of these studies' vis-a-vis green manufacturing is presented. ...
It is vital to find flaws at an early stage in design, components, material, or manufacturing during the initial phase. ...
They assessed cost and time taken by the end of life products by graph-based linear programming with a decision-making approach. ...
doi:10.1109/access.2020.2989410
fatcat:ercxzerrazgg7c55cahl2ndi3a
Theory-Based Inductive Learning: An Integration of Symbolic and Quantitative Methods
[article]
2013
arXiv
pre-print
The objective of this paper is to propose a method that will generate a causal explanation of observed events in an uncertain world and then make decisions based on that explanation. ...
T-BIL uses these inputs to construct a probabilistic explanation of why the training example is an instance of a solution to one stage of the sequential decision problem. ...
The problem that these programs have in dealing with stochastic influences probably is related to the ongins of the approach in a tradit10n that em phasizes the use of deductive logic. ...
arXiv:1304.2738v1
fatcat:35drr7b3nzgmfhlhgi3aqzp35u
On the Role of Possibility in Action Execution and Knowledge in the Situation Calculus
[chapter]
2017
Lecture Notes in Computer Science
We develop a more generalized form for Successor Sate Axioms based on the new account of the solution to the Frame Problem and show how this solves the problems related to involvement of unexecutable actions ...
We then provide a generalized framework that addresses these problems by tracing back source of the problem to the answer provided to the Frame Problem in the Situation Calculus. ...
Acknowledgements We wish to thank Jim Delgrande for his academic and financial support, and Dave Mitchell and Aaron Hunter for their helpful discussions. iv Acknowledgements iv ...
doi:10.1007/978-3-319-57351-9_20
fatcat:5ttbwhwxmjbmrnvlp3duqn6zeu
FPA-FL: Incorporating static fault-proneness analysis into statistical fault localization
2018
Journal of Systems and Software
To resolve the difficulty, in this article a new fault-proneness-aware statistical approach based on Elastic-Net regression, namely FPA-FL is proposed. ...
The main idea behind FPA-FL is to consider the static structure and the fault-proneness of the program statements in addition to their dynamic correlations with the program termination state. ...
., combinatorial effect) of correlated program statements on the program termination state could be estimated by using a regression-based statistical approach. ...
doi:10.1016/j.jss.2017.11.002
fatcat:2i2ury6wq5h5fdp7mhospbatqi
Deliberation for autonomous robots: A survey
2017
Artificial Intelligence
The ambition of this survey is to present a global overview of deliberation functions in robotics and to discuss the state of the art in this area. ...
Autonomous robots facing a diversity of open environments and performing a variety of tasks and interactions need explicit deliberation in order to fulfill their missions. ...
Acknowledgments We are very grateful to the anonymous reviewers and to the editors of this special issue for their thorough reading and insightful comments, which contributed to improving this paper. ...
doi:10.1016/j.artint.2014.11.003
fatcat:e3b5lxppsje6pndmudxqtnzedy
Data mining of Bayesian networks using cooperative coevolution
2004
Decision Support Systems
We apply the algorithm to a large real-world data set and compare the performance of the discovered Bayesian networks with that of the backpropagation neural networks and the logistic regression models ...
Thus, we propose a novel algorithm that combines the characteristics of these approaches to improve learning effectiveness and efficiency. ...
This states the trade off involved in choosing a large belief factor. ...
doi:10.1016/s0167-9236(03)00115-5
fatcat:orr6ocuewrck3igp5jemeggacq
A Review of Data Cleaning Methods for Web Information System
2019
Computers Materials & Continua
Data cleaning plays an essential role in various WIS scenarios to improve the quality of data service. In this paper, we present a review of the state-of-the-art methods for data cleaning in WIS. ...
According to the characteristics of data cleaning, we extract the critical elements of WIS, such as interactive objects, application scenarios, and core technology, to classify the existing works. ...
. (2015) ] (1) A knowledgebase and crowd-powered data cleaning system (2) Generate top-k possible repairs for incorrect data Katara usually achieves higher precision due to its use of knowledge bases and ...
doi:10.32604/cmc.2020.08675
fatcat:jusi6zu7rzg65po5sowrpxlwxm
Can Countries Buy Their Way Out of Insurgencies? Evidence from Iraq
2013
Social Science Research Network
The academic community has yet to settle on the manner and mechanisms by which economics-based counterinsurgency initiatives affect violence levels. ...
of dollars were committed to local commodity and service purchases. ...
From the perspective of an occupying force, as the United States has been in Iraq and Afghanistan, there is certain truth to such logic. ...
doi:10.2139/ssrn.2304983
fatcat:usa22u2w4ndfhjuumwulmunf64
Randomized Decision Rule
[chapter]
2017
Encyclopedia of Machine Learning and Data Mining
to the approaches used in relational learning and inductive logic programming. ...
Inductive Logic Programming In inductive logic programming (ILP), the input and output knowledge of a learner are described in (variants of) first-order predicate logic. ...
FINDBESTRULE maintains Rules, a sorted list of candidate rules, which is initialized by the procedure INITIAL-IZERULE. ...
doi:10.1007/978-1-4899-7687-1_100393
fatcat:wys64niz3rcdxmei376insgmsq
Recommender Systems
[chapter]
2017
Encyclopedia of Machine Learning and Data Mining
to the approaches used in relational learning and inductive logic programming. ...
Inductive Logic Programming In inductive logic programming (ILP), the input and output knowledge of a learner are described in (variants of) first-order predicate logic. ...
FINDBESTRULE maintains Rules, a sorted list of candidate rules, which is initialized by the procedure INITIAL-IZERULE. ...
doi:10.1007/978-1-4899-7687-1_964
fatcat:3voghk7xz5cindlgj4pwek7r6u
As-If Behavioral Economics: Neoclassical Economics in Disguise?
2010
Social Science Research Network
Behavioral economics confronts a problem when it argues for its scientific relevance based on claims of superior empirical realism while defending models that are almost surely wrong as descriptions of ...
We argue for an alternative methodological approach focused on veridical descriptions of decision process and a non-axiomatic normative framework: ecological rationality, which analyzes the match between ...
to prospect theory-as a -repair program‖ aimed at resuscitating the mathematical operation of weighted integration, based on the definition of mathematical expectation, as a theory of mind. ...
doi:10.2139/ssrn.1677168
fatcat:3j4rrvbys5gw7j6dsmu5jxnypq
A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques
2020
Security and Communication Networks
vulnerability detection, automated program repair, and automated defect prediction. ...
In this paper, these automation technologies are evaluated and analysed in detail from three aspects: software vulnerability detection, software program repair, and software defect prediction. ...
. e state-of-the-art method [43] leverages Deep Belief Network in learning semantic features of token vectors extracted from programs' ASTs, which outperforms traditional feature-based approaches in ...
doi:10.1155/2020/8858010
fatcat:obeiw4p7afan5m24ydmdkmyhbm
Answer Set Planning: A Survey
[article]
2022
arXiv
pre-print
Answer Set Planning refers to the use of Answer Set Programming (ASP) to compute plans, i.e., solutions to planning problems, that transform a given state of the world to another state. ...
The development of efficient and scalable answer set solvers has provided a significant boost to the development of ASP-based planning systems. ...
Tran Son's and Marcello Balduccini's contribution was made possible in part through the help and support of NIST via cooperative agreement 70NANB21H167. ...
arXiv:2202.05793v1
fatcat:ccygquzaazfljduncfjykduwne
Scalable statistical bug isolation
2005
Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation - PLDI '05
We present a statistical debugging algorithm that isolates bugs in programs containing multiple undiagnosed bugs. ...
These predictors reveal both the circumstances under which bugs occur as well as the frequencies of failure modes, making it easier to prioritize debugging efforts. ...
The experimental results are presented in Section 4, including the advantages over our previous approach based on regularized logistic regression. ...
doi:10.1145/1065010.1065014
dblp:conf/pldi/LiblitNZAJ05
fatcat:elfp3hd6ezapri6wshy4qtnjs4
« Previous
Showing results 1 — 15 out of 2,895 results