Sciweavers

2006 search results - page 75 / 402
» Heuristic Security-Testing Methods
Sort
View
108
Voted
AIPS
2009
15 years 1 months ago
A Semantics for HTN Methods
Despite the extensive development of first-principles planning in recent years, planning applications are still primarily developed using knowledge-based planners which can exploi...
Robert P. Goldman
89
Voted
SIGIR
2008
ACM
15 years 15 days ago
A study of methods for negative relevance feedback
Negative relevance feedback is a special case of relevance feedback where we do not have any positive example; this often happens when the topic is difficult and the search result...
Xuanhui Wang, Hui Fang, ChengXiang Zhai
CIMCA
2005
IEEE
15 years 6 months ago
Ant Colony System for Optimizing Vehicle Routing Problem with Time Windows
Research on the optimization of Vehicle Routing Problem with Time Windows (VRPTW) is a significant investigation area of ant colony system (ACS). This paper proposes an enhanced AC...
Xuan Tan, Xuyao Luo, W. N. Chen, Jun Zhang
67
Voted
ECAI
2004
Springer
15 years 6 months ago
A Troubleshooting Approach with Dependent Actions
Abstract. The basic decision-theoretic troubleshooting task is described in this paper. Dependency sets are defined for a better understanding of dependent actions. It is shown th...
Eylem Koca, Taner Bilgiç
93
Voted
AAAI
2000
15 years 1 months ago
Towards Feasible Approach to Plan Checking under Probabilistic Uncertainty: Interval Methods
The main problem of planning is to find a sequence of actions that an agent must perform to achieve a given objective. An important part of planning is checking whether a given pl...
Raul Trejo, Vladik Kreinovich, Chitta Baral