Sciweavers

940 search results - page 125 / 188
» Rules and Strategies in Java
Sort
View
108
Voted
EPIA
2003
Springer
15 years 5 months ago
Using CLIPS to Detect Network Intrusions
We describe how to build a network intrusion detection sensor by slightly modifying NASA’s CLIPS source code introducing some new features. An overview of the system is presente...
Pedro Alípio, Paulo Carvalho, José N...
WISE
2000
Springer
15 years 4 months ago
Object-Oriented Mediator Queries to XML Data
The mediator/wrapper approach is used to integrate data from different databases and other data sources by introducing a middleware virtual database that provides high level abstr...
Hui Lin, Tore Risch, Timour Katchaounov
104
Voted
ATAL
2000
Springer
15 years 4 months ago
Determining the Envelope of Emergent Agent Behaviour via Architectural Transformation
In this paper we propose a methodology to help analyse tendencies in MAS to complement those of simple inspection, Monte Carlo and syntactic proof. We suggest an architecture that ...
Oswaldo Terán, Bruce Edmonds, Steve Wallis
124
Voted
CA
1999
IEEE
15 years 4 months ago
Fast Synthetic Vision, Memory, and Learning Models for Virtual Humans
This paper presents a simple and efficient method of modeling synthetic vision, memory, and learning for autonomous animated characters in real-time virtual environments. The mode...
James J. Kuffner Jr., Jean-Claude Latombe
ITS
1998
Springer
133views Multimedia» more  ITS 1998»
15 years 4 months ago
The Foundations and Architecture of Autotutor
The Tutoring Research Group at the University of Memphis is developing an intelligent tutoring system which takes advantages of recent technological advances in the areas of semant...
Peter M. Wiemer-Hastings, Arthur C. Graesser, Dere...