Ic Censors
نویسندگان
چکیده
We introduce an adaptive search technique that speeds up state space search by learning heuristic censors while searching. The censors speed up search by pruning away moTe and more of the space until a solution is found in the pruned space. Censors are learned by explaining dead ends and other search failures. To learn quickly, the technique over-generalizes by assuming that certain constraints aTe preservable, i.e., remain true on at least one solution path. A recovery mechanism detects violations of this assumption and selectively relaxes learned censors. The technique, implemented in an adaptive problem solver named FAILSAFE-g, learns useful heuristics that cannot be learned by other reported methods. Its effectiveness is indicated by a preliminary complexity analysis and by experimental results in three domains, including one in which PRODIGY failed to learn eflective search control rules.
منابع مشابه
A Combined EIS - NVSS Survey Of Radio Sources ( CENSORS ) III : Spectroscopic observations
The Combined EIS-NVSS Survey Of Radio Sources (CENSORS) is a 1.4 GHz radio survey selected from the NRAO VLA Sky Survey (NVSS) and complete to a flux-density of 7.2 mJy. It targets the ESO Imaging Survey (EIS) Patch D, which is a 3 by 2 square degree field centred on 09 51 36.0 −21 00 00 (J2000). This paper presents the results of spectroscopic observations of 143 of the 150 CENSORS sources. Th...
متن کاملA Combined EIS-NVSS Survey Of Radio Sources II: Infrared imaging and the K–z relation
The Combined EIS-NVSS Survey Of Radio Sources (CENSORS) is a 1.4 GHz radio survey selected from the NRAO VLA Sky Survey (NVSS) and complete to a fluxdensity of 7.2mJy. It targets the ESO Imaging Survey (EIS) Patch D, which is a 3 by 2 square degree field centred on 09 51 36.0 -21 00 00 (J2000). This paper presents K–band imaging of 142 of the 150 CENSORS sources. The primary motivation for begi...
متن کاملPoster: Games Without Frontiers: Investigating Video Games as a Covert Channel
Censorship circumvention tools face an arms race as they work to evade increasingly motivated censors. Tools which have distinctive features can be detected and blocked by censors (e.g., Tor is actively targeted by censors around the world). As a result, there is increasing interest in disguising censorship circumvention traffic as benign protocols. SkypeMorph [1] and StegoTorus [2] are two plu...
متن کاملDetecting Censor Detection
Our goal is to empirically discover how censors react to the introduction of new proxy servers that can be used to circumvent their information controls. We examine a specific case, that of obfuscated Tor bridges, and conduct experiments designed to discover how long it takes censors to block them (if they do block at all). Through a year’s worth of active measurements from China, Iran, Kazakhs...
متن کاملthe International Machine Learning Workshop June 22
This paper is a synthesis of several sets of ideas: ideas about learning from precedents and exercises. ideas about learning using near misses, ideas about generalizing if-then rules. and ideas about using censors to prevent procedure misapplication. The extensions are as follows: (1) If-then rules are augmented by unless conditions. creating augmented iftllen rules. An augmented if-then rule i...
متن کامل