[图书][B] Plan, activity, and intent recognition: Theory and practice

G Sukthankar, C Geib, HH Bui, D Pynadath… - 2014 - books.google.com
Plan recognition, activity recognition, and intent recognition together combine and unify
techniques from user modeling, machine vision, intelligent user interfaces, human/computer …

On the integration of symbolic and sub-symbolic techniques for XAI: A survey

R Calegari, G Ciatto, A Omicini - Intelligenza Artificiale, 2020 - content.iospress.com
The more intelligent systems based on sub-symbolic techniques pervade our everyday lives,
the less human can understand them. This is why symbolic approaches are getting more …

Survey on models and techniques for root-cause analysis

M Solé, V Muntés-Mulero, AI Rana… - arXiv preprint arXiv …, 2017 - arxiv.org
Automation and computer intelligence to support complex human decisions becomes
essential to manage large and distributed systems in the Cloud and IoT era. Understanding …

Abductive markov logic for plan recognition

P Singla, R Mooney - Proceedings of the AAAI Conference on Artificial …, 2011 - ojs.aaai.org
Plan recognition is a form of abductive reasoning that involves inferring plans that best
explain sets of observed actions. Most existing approaches to plan recognition and other …

Goal recognition with Markov logic networks for player-adaptive games

E Ha, J Rowe, B Mott, J Lester - … of the AAAI Conference on Artificial …, 2011 - ojs.aaai.org
Goal recognition is the task of inferring users' goals from sequences of observed actions. By
enabling player-adaptive digital games to dynamically adjust their behavior in concert with …

Abduction with probabilistic logic programming under the distribution semantics

D Azzolini, E Bellodi, S Ferilli, F Riguzzi… - International Journal of …, 2022 - Elsevier
Abstract In Probabilistic Abductive Logic Programming we are given a probabilistic logic
program, a set of abducible facts, and a set of constraints. Inference in probabilistic …

Extending signature-based intrusion detection systems withbayesian abductive reasoning

A Ganesan, P Parameshwarappa, A Peshave… - arXiv preprint arXiv …, 2019 - arxiv.org
Evolving cybersecurity threats are a persistent challenge for systemadministrators and
security experts as new malwares are continu-ally released. Attackers may look for …

Targeted risk communication for computer security

J Blythe, J Camp, V Garg - … of the 16th international conference on …, 2011 - dl.acm.org
Attacks on computer systems are rapidly becoming more numerous and more sophisticated,
and current preventive techniques do not seem able to keep pace. Many successful attacks …

[PDF][PDF] Bayesian abductive logic programs

SV Raghavan, RJ Mooney - Workshops at the Twenty-Fourth AAAI …, 2010 - cdn.aaai.org
In this paper, we introduce Bayesian Abductive Logic Programs (BALPs), a new formalism
that integrates Bayesian Logic Programs (BLPs) and Abductive Logic Programming (ALP) …

Root cause analysis in IT infrastructures using ontologies and abduction in Markov Logic Networks

J Schoenfisch, C Meilicke, J von Stülpnagel… - Information Systems, 2018 - Elsevier
Abstract Information systems play a crucial role in most of today's business operations. High
availability and reliability of services and hardware, and, in the case of outages, short …