Author of the publication

A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment.

, , , , , , , , , , , and . AAAI, page 1563-1568. AAAI Press / The MIT Press, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting anonymous entity mentions for named entity linking., , , , , and . Knowl. Inf. Syst., 65 (3): 1221-1242 (March 2023)Disentanglement of Latent Representations via Sparse Causal Interventions., , and . CoRR, (2023)Relating Blindsight and AI: A Review., , , , and . J. Artif. Intell. Conscious., 9 (1): 111-125 (2022)An Implementation of Back-Propagation Learning on GF11, a Large SIMD Parallel Computer., and . CoRR, (2018)SRI-Sarnoff AURORA System at TRECVID 2014 Multimedia Event Detection and Recounting., , , , , , , , , and 5 other author(s). TRECVID, National Institute of Standards and Technology (NIST), (2014)Multi-Step Deductive Reasoning Over Natural Language: An Empirical Study on Out-of-Distribution Generalisation., , , , , , and . NeSy, volume 3212 of CEUR Workshop Proceedings, page 202-217. CEUR-WS.org, (2022)Graph Enhanced Cross-Domain Text-to-SQL Generation., , , , , and . TextGraphs@EMNLP, page 159-163. Association for Computational Linguistics, (2019)Disentanglement of Latent Representations via Causal Interventions., , and . IJCAI, page 3239-3247. ijcai.org, (2023)A Deep Reinforcement Learning Approach to First-Order Logic Theorem Proving., , , , , , , , , and . AAAI, page 6279-6287. AAAI Press, (2021)Towards LarKC: a Platform for Web-scale Reasoning, , , , , , , , , and 5 other author(s). IEEE Computer Society Press Los Alamitos, CA, USA, (August 2008)to appear.