2,895 Hits in 8.6 sec

Planning for security management

R. Barruffi, M. Milano, R. Montanari
2001 IEEE Intelligent Systems  
In this paper, we discuss the design and implementation of a constraint-based planner that acts as a reacting module in an IDS.  ...  An alternative approach relies on a planner that dynamically computes the action chain (plan) for reconfiguring/repairing an attacked system.  ...  We would like to thank M.Boari, E.Lamma and P.Mello for useful comments and discussion.  ... 
doi:10.1109/5254.912387 fatcat:yyzuppsr2fhnpluq4rfqppwjzm

Review of Health Prognostics and Condition Monitoring of Electronic Components

Cherry Bhargava, Pardeep Kumar Sharma, Senthilkumar Mohan, P. Sanjeevikumar, Vigna K. Ramachandaramurthy, Zbigniew Leonowicz, Frede Blaabjerg, Massimo Mitolo
2020 IEEE Access  
A critical analysis of reliability studies to identify their relative merits and usefulness of the outcome of these studies' vis-a-vis green manufacturing is presented.  ...  It is vital to find flaws at an early stage in design, components, material, or manufacturing during the initial phase.  ...  They assessed cost and time taken by the end of life products by graph-based linear programming with a decision-making approach.  ... 
doi:10.1109/access.2020.2989410 fatcat:ercxzerrazgg7c55cahl2ndi3a

Theory-Based Inductive Learning: An Integration of Symbolic and Quantitative Methods [article]

Spencer Star
2013 arXiv   pre-print
The objective of this paper is to propose a method that will generate a causal explanation of observed events in an uncertain world and then make decisions based on that explanation.  ...  T-BIL uses these inputs to construct a probabilistic explanation of why the training example is an instance of a solution to one stage of the sequential decision problem.  ...  The problem that these programs have in dealing with stochastic influences probably is related to the ongins of the approach in a tradit10n that em phasizes the use of deductive logic.  ... 
arXiv:1304.2738v1 fatcat:35drr7b3nzgmfhlhgi3aqzp35u

On the Role of Possibility in Action Execution and Knowledge in the Situation Calculus [chapter]

Vahid Vaezian, James P. Delgrande
2017 Lecture Notes in Computer Science  
We develop a more generalized form for Successor Sate Axioms based on the new account of the solution to the Frame Problem and show how this solves the problems related to involvement of unexecutable actions  ...  We then provide a generalized framework that addresses these problems by tracing back source of the problem to the answer provided to the Frame Problem in the Situation Calculus.  ...  Acknowledgements We wish to thank Jim Delgrande for his academic and financial support, and Dave Mitchell and Aaron Hunter for their helpful discussions. iv Acknowledgements iv  ... 
doi:10.1007/978-3-319-57351-9_20 fatcat:5ttbwhwxmjbmrnvlp3duqn6zeu

FPA-FL: Incorporating static fault-proneness analysis into statistical fault localization

Farid Feyzi, Saeed Parsa
2018 Journal of Systems and Software  
To resolve the difficulty, in this article a new fault-proneness-aware statistical approach based on Elastic-Net regression, namely FPA-FL is proposed.  ...  The main idea behind FPA-FL is to consider the static structure and the fault-proneness of the program statements in addition to their dynamic correlations with the program termination state.  ...  ., combinatorial effect) of correlated program statements on the program termination state could be estimated by using a regression-based statistical approach.  ... 
doi:10.1016/j.jss.2017.11.002 fatcat:2i2ury6wq5h5fdp7mhospbatqi

Deliberation for autonomous robots: A survey

Félix Ingrand, Malik Ghallab
2017 Artificial Intelligence  
The ambition of this survey is to present a global overview of deliberation functions in robotics and to discuss the state of the art in this area.  ...  Autonomous robots facing a diversity of open environments and performing a variety of tasks and interactions need explicit deliberation in order to fulfill their missions.  ...  Acknowledgments We are very grateful to the anonymous reviewers and to the editors of this special issue for their thorough reading and insightful comments, which contributed to improving this paper.  ... 
doi:10.1016/j.artint.2014.11.003 fatcat:e3b5lxppsje6pndmudxqtnzedy

Data mining of Bayesian networks using cooperative coevolution

Man Leung Wong, Shing Yan Lee, Kwong Sak Leung
2004 Decision Support Systems  
We apply the algorithm to a large real-world data set and compare the performance of the discovered Bayesian networks with that of the backpropagation neural networks and the logistic regression models  ...  Thus, we propose a novel algorithm that combines the characteristics of these approaches to improve learning effectiveness and efficiency.  ...  This states the trade off involved in choosing a large belief factor.  ... 
doi:10.1016/s0167-9236(03)00115-5 fatcat:orr6ocuewrck3igp5jemeggacq

A Review of Data Cleaning Methods for Web Information System

Jinlin Wang, Xing Wang, Yuchen Yang, Hongli Zhang, Binxing Fang
2019 Computers Materials & Continua  
Data cleaning plays an essential role in various WIS scenarios to improve the quality of data service. In this paper, we present a review of the state-of-the-art methods for data cleaning in WIS.  ...  According to the characteristics of data cleaning, we extract the critical elements of WIS, such as interactive objects, application scenarios, and core technology, to classify the existing works.  ...  . (2015) ] (1) A knowledgebase and crowd-powered data cleaning system (2) Generate top-k possible repairs for incorrect data Katara usually achieves higher precision due to its use of knowledge bases and  ... 
doi:10.32604/cmc.2020.08675 fatcat:jusi6zu7rzg65po5sowrpxlwxm

Can Countries Buy Their Way Out of Insurgencies? Evidence from Iraq

Andrew Shaver
2013 Social Science Research Network  
The academic community has yet to settle on the manner and mechanisms by which economics-based counterinsurgency initiatives affect violence levels.  ...  of dollars were committed to local commodity and service purchases.  ...  From the perspective of an occupying force, as the United States has been in Iraq and Afghanistan, there is certain truth to such logic.  ... 
doi:10.2139/ssrn.2304983 fatcat:usa22u2w4ndfhjuumwulmunf64

Randomized Decision Rule [chapter]

2017 Encyclopedia of Machine Learning and Data Mining  
to the approaches used in relational learning and inductive logic programming.  ...  Inductive Logic Programming In inductive logic programming (ILP), the input and output knowledge of a learner are described in (variants of) first-order predicate logic.  ...  FINDBESTRULE maintains Rules, a sorted list of candidate rules, which is initialized by the procedure INITIAL-IZERULE.  ... 
doi:10.1007/978-1-4899-7687-1_100393 fatcat:wys64niz3rcdxmei376insgmsq

Recommender Systems [chapter]

Prem Melville, Vikas Sindhwani
2017 Encyclopedia of Machine Learning and Data Mining  
to the approaches used in relational learning and inductive logic programming.  ...  Inductive Logic Programming In inductive logic programming (ILP), the input and output knowledge of a learner are described in (variants of) first-order predicate logic.  ...  FINDBESTRULE maintains Rules, a sorted list of candidate rules, which is initialized by the procedure INITIAL-IZERULE.  ... 
doi:10.1007/978-1-4899-7687-1_964 fatcat:3voghk7xz5cindlgj4pwek7r6u

As-If Behavioral Economics: Neoclassical Economics in Disguise?

Nathan Berg, Gerd Gigerenzer
2010 Social Science Research Network  
Behavioral economics confronts a problem when it argues for its scientific relevance based on claims of superior empirical realism while defending models that are almost surely wrong as descriptions of  ...  We argue for an alternative methodological approach focused on veridical descriptions of decision process and a non-axiomatic normative framework: ecological rationality, which analyzes the match between  ...  to prospect theory-as a -repair program‖ aimed at resuscitating the mathematical operation of weighted integration, based on the definition of mathematical expectation, as a theory of mind.  ... 
doi:10.2139/ssrn.1677168 fatcat:3j4rrvbys5gw7j6dsmu5jxnypq

A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques

Zhidong Shen, Si Chen, Luigi Coppolino
2020 Security and Communication Networks  
vulnerability detection, automated program repair, and automated defect prediction.  ...  In this paper, these automation technologies are evaluated and analysed in detail from three aspects: software vulnerability detection, software program repair, and software defect prediction.  ...  . e state-of-the-art method [43] leverages Deep Belief Network in learning semantic features of token vectors extracted from programs' ASTs, which outperforms traditional feature-based approaches in  ... 
doi:10.1155/2020/8858010 fatcat:obeiw4p7afan5m24ydmdkmyhbm

Answer Set Planning: A Survey [article]

Tran Cao Son and Enrico Pontelli and Marcello Balduccini and Torsten Schaub
2022 arXiv   pre-print
Answer Set Planning refers to the use of Answer Set Programming (ASP) to compute plans, i.e., solutions to planning problems, that transform a given state of the world to another state.  ...  The development of efficient and scalable answer set solvers has provided a significant boost to the development of ASP-based planning systems.  ...  Tran Son's and Marcello Balduccini's contribution was made possible in part through the help and support of NIST via cooperative agreement 70NANB21H167.  ... 
arXiv:2202.05793v1 fatcat:ccygquzaazfljduncfjykduwne

Scalable statistical bug isolation

Ben Liblit, Mayur Naik, Alice X. Zheng, Alex Aiken, Michael I. Jordan
2005 Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation - PLDI '05  
We present a statistical debugging algorithm that isolates bugs in programs containing multiple undiagnosed bugs.  ...  These predictors reveal both the circumstances under which bugs occur as well as the frequencies of failure modes, making it easier to prioritize debugging efforts.  ...  The experimental results are presented in Section 4, including the advantages over our previous approach based on regularized logistic regression.  ... 
doi:10.1145/1065010.1065014 dblp:conf/pldi/LiblitNZAJ05 fatcat:elfp3hd6ezapri6wshy4qtnjs4
« Previous Showing results 1 — 15 out of 2,895 results