Plan execution monitoring with distributed intelligent agents for battle command

2004 ◽  
Author(s):  
James P. Allen ◽  
Kevin P. Barry ◽  
John M. McCormick ◽  
Ross A. Paul
1996 ◽  
Vol 05 (01n02) ◽  
pp. 143-153
Author(s):  
ROBERT ST. AMANT ◽  
PAUL R. COHEN ◽  
YOSHITAKA KUWATA

Envelopes are a form of decision rule for monitoring plan execution. We describe one type, the DP envelope, that draws its decisions from a look-up table computed off-line by dynamic programming. Based on an abstract model of agent progress, DP envelopes let a developer approach execution monitoring as a problem independent of issues in agent design. We discuss the application of DP envelopes to a small transportation planning simulation, and discuss the issues that arise in an empirical analysis of the results.


2016 ◽  
Vol 43 ◽  
pp. 66-81 ◽  
Author(s):  
Andrei Soeanu ◽  
Mourad Debbabi ◽  
Mohamad Allouche ◽  
Micheline Bélanger ◽  
Nicholas Léchevin

Author(s):  
Sebastian Rockel ◽  
Stefan Konecny ◽  
Sebastian Stock ◽  
Joachim Hertzberg ◽  
Federico Pecora ◽  
...  

2013 ◽  
Vol 19 ◽  
pp. 1034-1039 ◽  
Author(s):  
Yosr Jarraya ◽  
Sujoy Ray ◽  
Andrei Soeanu ◽  
Mourad Debbabi ◽  
Mohamad Allouche ◽  
...  

Author(s):  
Amit Sharma

Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.


Sign in / Sign up

Export Citation Format

Share Document