-
1
-
-
0043027543
-
MBP: A model based planner
-
P. Bertoli, A. Cimatti, M. Pistore, M. Roveri, and P. Traverso. MBP: a model based planner. In JCAI'01 Workshop on Planning under Uncertainty, pages 71-78, 2001.
-
(2001)
JCAI'01 Workshop on Planning under Uncertainty
, pp. 71-78
-
-
Bertoli, P.1
Cimatti, A.2
Pistore, M.3
Roveri, M.4
Traverso, P.5
-
3
-
-
0013580273
-
Planning under uncertainty: Structural assumptions and computational leverage
-
M. Ghallab and A. Milani, editors, IOS Press (Amsterdam)
-
C. Boutilier, T. Dean, and S. Hanks. Planning under uncertainty: Structural assumptions and computational leverage. In M. Ghallab and A. Milani, editors, New Directions in AI Planning, pages 157-172. IOS Press (Amsterdam), 1996.
-
(1996)
New Directions in AI Planning
, pp. 157-172
-
-
Boutilier, C.1
Dean, T.2
Hanks, S.3
-
6
-
-
2642545776
-
Opponent modeling in multi-agent systems
-
G. Weiß and S. Sen, editors, Springer-Verlag: Heidelberg, Germany
-
D. Carmel and S. Markovitch. Opponent modeling in multi-agent systems. In G. Weiß and S. Sen, editors, Adaptation and Learning in Multi-Agent Systems, pages 40-52. Springer-Verlag: Heidelberg, Germany, 1996.
-
(1996)
Adaptation and Learning in Multi-agent Systems
, pp. 40-52
-
-
Carmel, D.1
Markovitch, S.2
-
10
-
-
85180527583
-
Traps and pitfalls: Practical problems in in system call interposition based security tools
-
February
-
T. Garfinkel. Traps and pitfalls: Practical problems in in system call interposition based security tools. In Proc. Network and Distributed Systems Security Symposium, February 2003.
-
(2003)
Proc. Network and Distributed Systems Security Symposium
-
-
Garfinkel, T.1
-
14
-
-
0000235433
-
Obdd-based universal planning for synchronized agents in non-deterministic domains
-
R. Jensen and M. Veloso. Obdd-based universal planning for synchronized agents in non-deterministic domains. Journal of Artificial Intelligence Research, 13:189-226, 2000.
-
(2000)
Journal of Artificial Intelligence Research
, vol.13
, pp. 189-226
-
-
Jensen, R.1
Veloso, M.2
-
16
-
-
84948760464
-
Two formal analyses of attack graphs
-
Nova Scotia, Canada
-
S. Jha, O. Sheyner, and J. Wing. Two formal analyses of attack graphs. In Computer Security Foundations Workshop (CSFW), pages 49-63, Nova Scotia, Canada, 2002.
-
(2002)
Computer Security Foundations Workshop (CSFW)
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
18
-
-
0001973006
-
20 States and Beyond
-
Washington, D.C.. IEEE Computer Society Press
-
20 States and Beyond. In Proceedings of the Fifth Annual IEEE Symposium on Logic in Computer Science, pages 1-33, Washington, D.C., 1990. IEEE Computer Society Press.
-
(1990)
Proceedings of the Fifth Annual IEEE Symposium on Logic in Computer Science
, pp. 1-33
-
-
Burch, J.R.1
Clarke, E.M.2
McMillan, K.L.3
Dill, D.L.4
Hwang, L.J.5
-
19
-
-
0028566295
-
An algorithm for probabilistic least-commitment planning
-
Seattle, Washington, USA. AAAI Press/MIT Press
-
N. Kushmerick, S. Hanks, and D. Weld. An algorithm for probabilistic least-commitment planning. In Proceedings of the Twelfth National Conference on Artificial Intelligence (AAAI-94), volume 2, pages 1073-1078, Seattle, Washington, USA, 1994. AAAI Press/MIT Press.
-
(1994)
Proceedings of the Twelfth National Conference on Artificial Intelligence (AAAI-94)
, vol.2
, pp. 1073-1078
-
-
Kushmerick, N.1
Hanks, S.2
Weld, D.3
-
21
-
-
0032630098
-
Detecting computer and network misuse through the production-based expert system toolset (p-best)
-
Oakland, California
-
U. Lindqvist and P. Porras. Detecting computer and network misuse through the production-based expert system toolset (p-best). In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 146-161, Oakland, California, 1999.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.2
-
23
-
-
0002670359
-
Attack trees: Modeling security threats
-
December
-
B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal, December, 1999.
-
(1999)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
24
-
-
84964504906
-
Computer-attack graph generation tool
-
Anaheim, California
-
L. Swiler, C. Phillips, D. Ellis, and S. Chakerian. Computer-attack graph generation tool. In DARPA Information Survivability Conference and Exposition, pages 146-161, Anaheim, California, 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition
, pp. 146-161
-
-
Swiler, L.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
|