Author image not provided
 Fusun Yaman

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article15.56
Citation Count280
Publication count18
Publication years2002-2017
Available for download4
Average downloads per article161.75
Downloads (cumulative)647
Downloads (12 Months)73
Downloads (6 Weeks)18
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


18 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 18 of 18
Sort by:

1 published by ACM
November 2017 SafeConfig '17: Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 15,   Downloads (12 Months): 31,   Downloads (Overall): 31

Full text available: PDFPDF
Validating security properties of complex distributed systems is a challenging problem by itself, let alone when the work needs to be performed under tight budget and time constraints on prototype systems with components at various maturity levels. This paper described a tailored approach to security evaluations involving a strategic combination ...
Keywords: security analysis, security control evaluation, experimentation

2
July 2013 AAAI'13: Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence
Publisher: AAAI Press
Bibliometrics:
Citation Count: 0

The complexity and tight integration of electromechanical systems often makes them "brittle" and hard to modify in response to changing requirements. We aim to remedy this by capturing expert knowledge as functional blueprints, an idea inspired by regulatory processes that occur in natural morphogenesis. We then apply this knowledge in ...

3
July 2013 AAAI'13: Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence
Publisher: AAAI Press
Bibliometrics:
Citation Count: 2

We present temporal milestones for hierarchical task networks to enable the complex synchronization of tasks. A temporal milestone of a task is an intermediate event that occurs during the execution of a complex task, e.g., the start time, the end time or a milestone of any of its subtasks. Unlike ...

4 published by ACM
July 2011 ACM Transactions on Intelligent Systems and Technology (TIST): Volume 2 Issue 4, July 2011
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 19,   Downloads (Overall): 358

Full text available: PDFPDF
A workflow is a model of a process that systematically describes patterns of activity. Workflows capture a sequence of operations, their enablement conditions, and data flow dependencies among them. It is hard to design a complete and correct workflow from scratch, while it is much easier for humans to demonstrate ...
Keywords: Hierarchical Task Network learning, learning from demonstration, workflow learning, learning from traces, process mining

5
May 2011 Artificial Intelligence: Volume 175 Issue 7-8, May, 2011
Publisher: Elsevier Science Publishers Ltd.
Bibliometrics:
Citation Count: 3

Lexicographic preference models (LPMs) are an intuitive representation that corresponds to many real-world preferences exhibited by human decision makers. Previous algorithms for learning LPMs produce a ''best guess'' LPM that is consistent with the observations. Our approach is more democratic: we do not commit to a single LPM. Instead, we ...
Keywords: Preference learning, Bayesian methods, Lexicographic models

6 published by ACM
September 2009 K-CAP '09: Proceedings of the fifth international conference on Knowledge capture
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 12,   Downloads (Overall): 147

Full text available: PDFPDF
The POIROT project is a four-year effort to develop an architecture that integrates the products of a number of targeted reasoning and learning components to produce executable representations of demonstrated web service workflow processes. To do this it combines contributions from multiple trace analysis (interpretation) and learning methods guided by ...
Keywords: multi-strategy learning, integration, meta-control

7
July 2009 IJCAI'09: Proceedings of the 21st international jont conference on Artifical intelligence
Publisher: Morgan Kaufmann Publishers Inc.
Bibliometrics:
Citation Count: 6

Existing work on workflow mining ignores the dataflow aspect of the problem. This is not acceptable for service-oriented applications that use Web services with typed inputs and outputs. We propose a novel algorithm WIT (Workflow Inference from Traces) which identifies the context similarities of the observed actions based on the ...

8 published by ACM
July 2008 ICML '08: Proceedings of the 25th international conference on Machine learning
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 0,   Downloads (12 Months): 11,   Downloads (Overall): 111

Full text available: PDFPDF
Previous algorithms for learning lexicographic preference models (LPMs) produce a "best guess" LPM that is consistent with the observations. Our approach is more democratic: we do not commit to a single LPM. Instead, we approximate the target using the votes of a collection of consistent LPMs. We present two variations ...

9
July 2007 UAI'07: Proceedings of the Twenty-Third Conference on Uncertainty in Artificial Intelligence
Publisher: AUAI Press
Bibliometrics:
Citation Count: 0

Preferences play an important role in our everyday lives. CP-networks, or CP-nets in short, are graphical models for representing conditional qualitative preferences under ceteris paribus ("all else being equal") assumptions. Despite their intuitive nature and rich representation, dominance testing with CP-nets is computationally complex, even when the CP-nets are restricted ...

10
January 2007 IJCAI'07: Proceedings of the 20th international joint conference on Artifical intelligence
Publisher: Morgan Kaufmann Publishers Inc.
Bibliometrics:
Citation Count: 4

There are numerous cases where we need to reason about vehicles whose intentions and itineraries are not known in advance to us. For example, Coast Guard agents tracking boats don't always know where they are headed. Likewise, in drug enforcement applications, it is not always clear where drug-carrying airplanes (which ...

11
July 2005 IJCAI'05: Proceedings of the 19th international joint conference on Artificial intelligence
Publisher: Morgan Kaufmann Publishers Inc.
Bibliometrics:
Citation Count: 5

There are numerous applications where we need to ensure that multiple moving objects are sufficiently far apart. Furthermore, in many moving object domains, there is positional indeterminacy--we are not 100% sure exactly when a given moving object will be at a given location. [Yaman et al., 2004] provided a logic ...

12
July 2005 IJCAI'05: Proceedings of the 19th international joint conference on Artificial intelligence
Publisher: Morgan Kaufmann Publishers Inc.
Bibliometrics:
Citation Count: 4

Yaman et. al. [Yaman et al., 2004] introduce "go theories" to reason about moving objects. In this paper, we show that this logic often does not allow us to infer that an object is not present at a given place or region, even though common sense would dictate that this ...

13
March 2005 IEEE Intelligent Systems: Volume 20 Issue 2, March 2005
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 37

SHOP and SHOP2 are hierarchical task network (HTN) planning systems that were designed with two goals in mind: to investigate some research issues in automated planning, and to provide some simple, practical planning tools. They are available as open-source software and have an active base of users in government, industry, ...
Keywords: HTN planning, hierarchical task networks, HTN planning, open source, open source, hierarchical task networks

14
June 2004 KR'04: Proceedings of the Ninth International Conference on Principles of Knowledge Representation and Reasoning
Publisher: AAAI Press
Bibliometrics:
Citation Count: 0

There are numerous applications such as air traffic management, cellular phone location tracking, and vehicle protection systems where there is a critical need to reason about moving objects. In this paper, we propose a formal logic of motion (LOM for short). We provide a formal syntax for LOM, as well ...

15
December 2003 Journal of Artificial Intelligence Research: Volume 20 Issue 1, December 2003
Publisher: AI Access Foundation
Bibliometrics:
Citation Count: 197

The SHOP2 planning system received one of the awards for distinguished performance in the 2002 International Planning Competition. This paper describes the features of SHOP2 which enabled it to excel in the competition, especially those aspects of SHOP2 that deal with temporal and metric planning domains.

16
November 2002 LCN '02: Proceedings of the 27th Annual IEEE Conference on Local Computer Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

We present SADSR (Security-Aware Adaptive DSR), a securerouting protocol for mobile ad hoc networks. SADSRauthenticates the routing protocol messages using digitalsignatures based on asymmetric cryptography. The basicidea behind SADSR is to have multiple routes to each destinationand store a local trust value for each node in thenetwork. A trust value ...

17
November 2002 LCN '02: Proceedings of the 27th Annual IEEE Conference on Local Computer Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 7


18
April 2002 PTD'02: Proceedings of the 2002 International Conference on Planning for Temporal Domains
Publisher: AAAI Press
Bibliometrics:
Citation Count: 1




The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us