Sciweavers

3446 search results - page 581 / 690
» A Reasoning Algorithm for pD*
Sort
View
IWSEC
2010
Springer
15 years 5 hour ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo
JAIR
2010
111views more  JAIR 2010»
15 years 4 hour ago
Training a Multilingual Sportscaster: Using Perceptual Context to Learn Language
We present a novel framework for learning to interpret and generate language using only perceptual context as supervision. We demonstrate its capabilities by developing a system t...
David L. Chen, Joohyun Kim, Raymond J. Mooney
MATES
2010
Springer
14 years 12 months ago
Do You Get It? User-Evaluated Explainable BDI Agents
Abstract. In this paper we focus on explaining to humans the behavior of autonomous agents, i.e., explainable agents. Explainable agents are useful for many reasons including scena...
Joost Broekens, Maaike Harbers, Koen V. Hindriks, ...
SAS
2010
Springer
159views Formal Methods» more  SAS 2010»
14 years 12 months ago
Automatic Abstraction for Intervals Using Boolean Formulae
c Abstraction for Intervals Using Boolean Formulae J¨org Brauer1 and Andy King2 1 Embedded Software Laboratory, RWTH Aachen University, Germany 2 Portcullis Computer Security, Pin...
Jörg Brauer, Andy King
129
Voted
SCP
2010
172views more  SCP 2010»
14 years 12 months ago
Alternating-time stream logic for multi-agent systems
Constraint automata have been introduced to provide a compositional, operational semantics for the exogenous coordination language Reo, but they can also serve interface specifica...
Sascha Klüppelholz, Christel Baier