نتایج جستجو برای: plan recognition
تعداد نتایج: 349504 فیلتر نتایج به سال:
Adversarial plan recognition is the use of plan recognition in settings where the observed agent is an adversary, having plans or goals that oppose those of the observer. It is one of the key application areas of plan recognition techniques. There are two approaches to adversarial plan recognition. The first is suspicious activity recognition, i.e., directly recognizing plans, activities and be...
Viewing intrusion detection as a problem of plan recognition presents unique problems. Real world security domains are highly ambiguous and this creates significant problems for plan recognition. This paper distinguishes three sources of ambiguity: action ambiguity, syntactic ambiguity and attachment ambiguity. Previous work in plan recognition has often conflated these different sources of amb...
To be effective, current intrusion detection systems (IDSs) must incorporate artificial intelligence methods for plan recognition. Plan recognition is critical both to predicting the future actions of attackers and planning appropriate responses to their actions. However network security places a new set of requirements on plan recognition. In this paper we present an argument for including pla...
Plan recognition is the task of inferring the plan of an agent, based on an incomplete sequence of its observed actions. Previous formulations of plan recognition commit early to discretizations of the environment and the observed agent’s actions. This leads to reduced recognition accuracy. To address this, we first provide a formalization of recognition problems which admits continuous environ...
Plan recognition is the task of inferring the plan of an agent, based on an incomplete sequence of its observed actions. Previous formulations of plan recognition commit early to discretizations of the environment and the observed agent’s actions. This leads to reduced recognition accuracy. To address this, we first provide a formalization of recognition problems which admits continuous environ...
Computer network security systems need to incorporate arti cial intelligence methods for plan recognition Plan recognition is critical both to predicting the future actions of attackers and planning appro priate responses to their actions This paper presents an argument for including plan recognition in such systems and discusses the problems network computer security presents to plan recogniti...
This paper is concerned with making precise the notion that recognizing plans is much like parsing text. To this end, it establishes a correspondence between Kautz’ plan recognition formalism and existing grammatical frameworks. This mapping helps isolate subsets of Kautz’ formalism in which plan recognition can be efficiently performed by parsing. In recent years, plan recognition has emerged ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید