Sciweavers

10907 search results - page 111 / 2182
» Constraint Based Strategies
Sort
View
CCS
2003
ACM
15 years 3 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
FCSC
2007
192views more  FCSC 2007»
14 years 10 months ago
An optimal replication strategy for data grid systems
Data access latency is an important metric of system performance in data grid. By means of efficient replication strategy, the amount of data transferred in wide area network will ...
Jianjin Jiang, Guangwen Yang
CORR
2000
Springer
132views Education» more  CORR 2000»
14 years 9 months ago
Declarative Representation of Revision Strategies
Abstract. We introduce a nonmonotonic framework for belief revision in which reasoning about the reliability of different pieces of information based on meta-knowledge about the in...
Gerhard Brewka
ICTAI
1999
IEEE
15 years 2 months ago
Search Strategies for Hybrid Search Spaces
Recently, there has been much interest in enhancing purely combinatorial formalisms with numerical information. For example, planning formalisms can be enriched by taking resource...
Carla P. Gomes, Bart Selman
ICRA
2006
IEEE
93views Robotics» more  ICRA 2006»
15 years 4 months ago
A SVM-based Method for Engine Maintenance Strategy Optimization
— Due to the abundant application background, the optimization of maintenance problem has been extensively studied in the past decades. Besides the well-known difficulty of larg...
Qing-Shan Jia, Qianchuan Zhao