[HTML][HTML] A modern Blackboard Architecture implementation with external command execution capability
J Straub - Software Impacts, 2022 - Elsevier
A modern implementation of a simplified version of the Blackboard Architecture is presented
herein. It uses a rule-fact-action network and a round-robin rule processing engine. It also …
herein. It uses a rule-fact-action network and a round-robin rule processing engine. It also …
[HTML][HTML] Comparing the effect of pruning on a best path and a naïve-approach blackboard solver
J Straub - International Journal of Automation and Computing, 2015 - Springer
A naïve solver is one approach that can be used to identify prospective solutions based on
data on (or projected to be on) a Blackboard Architecture's blackboard. The naïve solver …
data on (or projected to be on) a Blackboard Architecture's blackboard. The naïve solver …
[HTML][HTML] Distributed attack deployment capability for modern automated penetration testing
J Hance, J Milbrath, N Ross, J Straub - Computers, 2022 - mdpi.com
Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict
and even harder to prepare for. This paper presents work designed to prepare for the …
and even harder to prepare for. This paper presents work designed to prepare for the …
Extension of the Blackboard Architecture with Common Properties and Generic Rules
J Rivard, J Straub - arXiv preprint arXiv:2306.04287, 2023 - arxiv.org
The Blackboard Architecture provides a mechanism for embodying data, decision making
and actuation. Its versatility has been demonstrated across a wide number of application …
and actuation. Its versatility has been demonstrated across a wide number of application …
A Blackboard-style decision-making system for multi-tier craft control and its evaluation
This article presents an approach for decision-making in support of the control of an
autonomous system of multiple tiers of robots (eg, satellite, aerial and ground) based on the …
autonomous system of multiple tiers of robots (eg, satellite, aerial and ground) based on the …
[PDF][PDF] An agent-based approach to table recognition and interpretation
V Long - 2010 - science.mq.edu.au
The goal of this research is to improve methods for extracting and interpreting tabular data
embedded in printed documents. In pursuing this goal, this dissertation makes two main …
embedded in printed documents. In pursuing this goal, this dissertation makes two main …
Implementation and Evaluation of a Gradient Descent-Trained Defensible Blackboard Architecture System
J Milbrath, J Rivard, J Straub - arXiv preprint arXiv:2404.11714, 2024 - arxiv.org
A variety of forms of artificial intelligence systems have been developed. Two well-known
techniques are neural networks and rule-fact expert systems. The former can be trained from …
techniques are neural networks and rule-fact expert systems. The former can be trained from …
Development of an AI Anti-Bullying System Using Large Language Model Key Topic Detection
M Tassava, C Kolodjski, J Milbrath, A Bishop… - arXiv preprint arXiv …, 2024 - arxiv.org
This paper presents and evaluates work on the development of an artificial intelligence (AI)
anti-bullying system. The system is designed to identify coordinated bullying attacks via …
anti-bullying system. The system is designed to identify coordinated bullying attacks via …
Automating maintenance for a one‐way transmitting blackboard system used for autonomous multi‐tier control
J Straub - Expert Systems, 2016 - Wiley Online Library
The blackboard architecture has particular utility in applications where conclusions must be
drawn in the absence of human involvement. Through properly crafted rules, this approach …
drawn in the absence of human involvement. Through properly crafted rules, this approach …
Application of Robotic Exploration Principles to the Challenge of Cybersecurity Penetration Testing
J Straub - 2024 IEEE International Conference on Cyber …, 2024 - ieeexplore.ieee.org
An extensive body of work exists related to robots conducting search operations of an
operating region. Penetration testing can be presented as a region-constrained search for …
operating region. Penetration testing can be presented as a region-constrained search for …