Fast Detection of Unsolvable Planning Instances Using Local Consistency
暂无分享,去创建一个
[1] Patrik Haslum,et al. Domain-Independent Construction of Pattern Database Heuristics for Cost-Optimal Planning , 2007, AAAI.
[2] Christer Bäckström,et al. Algorithms and Limits for Compact Plan Representations , 2012, J. Artif. Intell. Res..
[3] Bernhard Nebel,et al. The FF Planning System: Fast Plan Generation Through Heuristic Search , 2011, J. Artif. Intell. Res..
[4] Patrik Haslum,et al. Admissible Heuristics for Optimal Planning , 2000, AIPS.
[5] David E. Smith. Choosing Objectives in Over-Subscription Planning , 2004, ICAPS.
[6] R. Goldman,et al. Using Classical Planners for Plan Verification and Counterexample Generation , 2012 .
[7] Stefan Edelkamp,et al. Summary of Dagstuhl Seminar 06172 on Directed Model Checking , 2007 .
[8] Michael R. Fellows,et al. Parameterized Complexity , 1998 .
[9] Malte Helmert,et al. The Fast Downward Planning System , 2006, J. Artif. Intell. Res..
[10] Stefan Edelkamp,et al. 06172 Executive Summary -- Directed Model Checking , 2006, Directed Model Checking.
[11] David E. Smith. Choosing Objectives in OverSubscription Planning , 2004 .
[12] Malte Helmert,et al. New Complexity Results for Classical Planning Benchmarks , 2006, ICAPS.
[13] Endre Szemerédi,et al. Many hard examples for resolution , 1988, JACM.
[14] Mark S. Boddy,et al. Course of Action Generation for Cyber Security Using Classical Planning , 2005, ICAPS.
[15] Jonathan Schaeffer,et al. Pattern Databases , 1998, Comput. Intell..
[16] Carmel Domshlak,et al. Landmarks, Critical Paths and Abstractions: What's the Difference Anyway? , 2009, ICAPS.
[17] Jörg Flum,et al. Parameterized Complexity Theory (Texts in Theoretical Computer Science. An EATCS Series) , 2006 .
[18] Patrik Haslum,et al. New Admissible Heuristics for Domain-Independent Planning , 2005, AAAI.
[19] Mark S. Boddy,et al. Automated Vulnerability Analysis Using AI Planning , 2005, AAAI Spring Symposium: AI Technologies for Homeland Security.
[20] Malte Helmert,et al. A Planning Heuristic Based on Causal Graph Analysis , 2004, ICAPS.
[21] Jendrik Seipp,et al. Counterexample-Guided Cartesian Abstraction Refinement , 2013, ICAPS.
[22] Carmel Domshlak,et al. Implicit Abstraction Heuristics , 2010, J. Artif. Intell. Res..
[23] Olivier Buffet,et al. POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing , 2012, AAAI.
[24] Jörg Flum,et al. Parameterized Complexity Theory , 2006, Texts in Theoretical Computer Science. An EATCS Series.
[25] Sandra Zilles,et al. The computational complexity of avoiding spurious states in state space abstraction , 2010, Artif. Intell..
[26] Ilkka Niemelä,et al. Planning as satisfiability: parallel plans and algorithms for plan search , 2006, Artif. Intell..
[27] E. Friedgut,et al. Sharp thresholds of graph properties, and the -sat problem , 1999 .
[28] Carlos Sarraute,et al. Building Computer Network Attacks , 2010, ArXiv.
[29] Silvia Richter,et al. The LAMA Planner: Guiding Cost-Based Anytime Planning with Landmarks , 2010, J. Artif. Intell. Res..