Agilely assigning sensing assets to mission tasks in a coalition context
When managing intelligence, surveillance, and reconnaissance (ISR) operations in a
coalition context, assigning available sensing assets to mission tasks can be challenging …
coalition context, assigning available sensing assets to mission tasks can be challenging …
Cascading verification: an integrated method for domain-specific model checking
F Zervoudakis, DS Rosenblum, S Elbaum… - Proceedings of the …, 2013 - dl.acm.org
Model checking is an established method for verifying behavioral properties of system
models. But model checkers tend to support low-level modeling languages that require …
models. But model checkers tend to support low-level modeling languages that require …
[PDF][PDF] Commitment-based privacy management in online social networks
N Kökciyan, P Yolum - … foundations of social computing at AAMAS, 2014 - researchgate.net
Systems need to preserve their users' privacy. In social software, such as online social
networks, preserving privacy is especially difficult since content is managed by more than …
networks, preserving privacy is especially difficult since content is managed by more than …
[PDF][PDF] 一种两阶段多平台对地观测资源匹配方法
江建清, 伍国华, 朱晓敏 - 科学技术与工程, 2012 - stae.com.cn
式规则方法[+], 多A601D 方法[,], 合同网方法[)] 等等. 在资源能力评估方面, 如神经网络方法['],
基于效用函数方法[$] 等. 234F8C 采用值函数的线性凸组合来评估卫星和无人机资源对任务的 …
基于效用函数方法[$] 等. 234F8C 采用值函数的线性凸组合来评估卫星和无人机资源对任务的 …
[PDF][PDF] Obfuscation of Semantic Data: Restricting the Spread of Sensitive Information.
This paper investigates how to restrict the spread of sensitive information. This work is
situated in a military context, and provides a tractable method to decide what semantic …
situated in a military context, and provides a tractable method to decide what semantic …
Intent-based resource deployment in wireless sensor networks
Information derived from sensor networks plays a crucial role in the success of many critical
tasks such as surveillance, and border monitoring. In order to derive the correct information …
tasks such as surveillance, and border monitoring. In order to derive the correct information …
Service-oriented reasoning architecture for resource-task assignment in sensor networks
The net-centric ISR/ISTAR networks are expected to play a crucial role in the success of
critical tasks such as base perimeter protection, border patrol and so on. To accomplish …
critical tasks such as base perimeter protection, border patrol and so on. To accomplish …
A generic platform for ontological query answering
BPL da Silva, JF Baget, M Croitoru - International Conference on …, 2012 - Springer
The paper presents ALASKA, a multi-layered platform enabling to perform ontological
conjunctive query answering (OCQA) over heterogeneously-stored knowledge bases in a …
conjunctive query answering (OCQA) over heterogeneously-stored knowledge bases in a …
A hybrid reasoning mechanism for effective sensor selection for tasks
In this paper, we present Ontological Logic Programming (OLP), a novel approach that
combines logic programming with ontological reasoning. OLP enables the use of ontological …
combines logic programming with ontological reasoning. OLP enables the use of ontological …
Principles of organizing the semantic ontology of programming
VN Kuchuganov, DR Kasimov… - 2017 Second Russia …, 2017 - ieeexplore.ieee.org
A promising way to improve the programming process is increasing the declarativeness of
programming, approximation to natural language on the base of accumulating and actively …
programming, approximation to natural language on the base of accumulating and actively …