We address two issues which arise in the task of detecting anomalous behavior in complex systems with numerous sensor channels: how to adjust alarm thresholds dynamically, within ...
Richard J. Doyle, Suzanne M. Sellers, David Atkins...
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Flooding is a growing problem, which affects more than 10% of the UK population. The cost of damage caused by flooding correlates closely with the warning time given before a floo...
Danny Hughes, Phil Greenwood, Gordon S. Blair, Geo...
In discrete event systems, a given task can start executing when all the required input data are available. The required input data for a given task may change along the evolution...
By learning a range of possible times over which the effect of an action can take place, a robot can reason more effectively about causal and contingent relationships in the world...