Sciweavers

114 search results - page 14 / 23
» Maintaining Consistency in Hierarchical Reasoning
Sort
View
94
Voted
ACSAC
2010
IEEE
14 years 10 months ago
Spam mitigation using spatio-temporal reputations from blacklist history
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally maintained and well regarded, blacklists can filter 80+% of spam without having to...
Andrew G. West, Adam J. Aviv, Jian Chang, Insup Le...
87
Voted
EWCBR
1998
Springer
15 years 4 months ago
Categorizing Case-Base Maintenance: Dimensions and Directions
Abstract. Experience with the growing number of large-scale CBR systems has led to increasing recognition of the importance of case-base maintenance. Multiple researchers have addr...
David B. Leake, David C. Wilson
SIS
2008
15 years 1 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
81
Voted
AI
2005
Springer
15 years 8 days ago
A logic-based model of intention formation and action for multi-agent subcontracting
We present a formalism for representing the formation of intentions by agents engaged in cooperative activity. We use a syntactic approach presenting a formal logical calculus tha...
John Grant, Sarit Kraus, Donald Perlis
ATAL
2006
Springer
15 years 4 months ago
Continuous refinement of agent resource estimates
The challenge we address is to reason about projected resource usage within a hierarchical task execution framework in order to improve agent effectiveness. Specifically, we seek ...
David N. Morley, Karen L. Myers, Neil Yorke-Smith