-
2
-
-
0004027897
-
Pddl2.1: An extension to pddl for expressing temporal planning domains
-
Fox, M. and Long, D. 2002. Pddl2.1: An extension to pddl for expressing temporal planning domains. Technical report, University of Durham.
-
(2002)
Technical Report, University of Durham
-
-
Fox, M.1
Long, D.2
-
4
-
-
0032050560
-
State-variable planning under structural restrictions: Algorithms and complexity
-
Jonsson, P. and Backstrom, C. 1998. State-variable planning under structural restrictions: Algorithms and complexity. Artificial Intelligence 100(1-2): 125-176.
-
(1998)
Artificial Intelligence
, vol.100
, Issue.1-2
, pp. 125-176
-
-
Jonsson, P.1
Backstrom, C.2
-
5
-
-
9444221204
-
Compiling causal theories to successor state axioms and strips-like systems
-
Lin, F. 2003. Compiling causal theories to successor state axioms and strips-like systems. Journal of Artificial Intelligence Research 19:279-314.
-
(2003)
Journal of Artificial Intelligence Research
, vol.19
, pp. 279-314
-
-
Lin, F.1
-
6
-
-
84944727025
-
Efficient minimum-cost network hardening via exploit dependency graphs
-
IEEE Computer Society
-
Noel, S.; Jajodia, S.; O'Berry, B. and Jacobs, M. 2003. Efficient minimum-cost network hardening via exploit dependency graphs. In Proceedings of 19th Annual Computer Security Applications Conference, 86-95. IEEE Computer Society.
-
(2003)
Proceedings of 19th Annual Computer Security Applications Conference
, pp. 86-95
-
-
Noel, S.1
Jajodia, S.2
O'Berry, B.3
Jacobs, M.4
-
8
-
-
0012252111
-
On the extraction, ordering, and usage of landmarks in planning
-
Porteous, J.; Sebastia, L. and Hoffmann, J. 2001. On the extraction, ordering, and usage of landmarks in planning. In Proceedings of the 6th European Conference on Planning (ECP01).
-
(2001)
Proceedings of the 6th European Conference on Planning (ECP01)
-
-
Porteous, J.1
Sebastia, L.2
Hoffmann, J.3
-
11
-
-
0036083194
-
Automated generati on and analysis of attack graphs
-
Washington - Brussels - Tokyo: IEEE
-
Sheyner, O.; Haines, J.; Jha, S.; Lippmann, R.; and Wing, J. M. 2002. Automated generati on and analysis of attack graphs. In 2002 IEEE Symposium on Security and Privacy ISSP '02, 273-284. Washington - Brussels - Tokyo: IEEE.
-
(2002)
2002 IEEE Symposium on Security and Privacy ISSP '02
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
12
-
-
17744373483
-
-
Pittsburgh, PA Ph.D. Dissertation, Computer Science Department
-
Sheyner, O. 2004. Scenario Graphs and Attack Graphs. Ph.D. Dissertation, Computer Science Department, Pittsburgh, PA.
-
(2004)
Scenario Graphs and Attack Graphs
-
-
Sheyner, O.1
|