Search citation statements

Paper Sections

Select...

2

Citation Types

0

2

0

Year Published

2010

2010

Publication Types

Select...

1

Relationship

1

0

Authors

Journals

0

2

0

“…It executes Planner at the lowlevel by performing automatic modification of fact.pddl. In [26], the authors have defined various data structures used in these algorithms. A brief description of the algorithms has Host3) 3)))) also been given.…”

confidence: 99%

“…It executes Planner at the lowlevel by performing automatic modification of fact.pddl. In [26], the authors have defined various data structures used in these algorithms. A brief description of the algorithms has Host3) 3)))) also been given.…”

confidence: 99%

“…Since each solution is an attack path, a set of all acyclic paths may be obtained. A customized attack path enumeration algorithm (refer to Algorithm 1) given in [26] is used in this paper. It executes Planner at the lowlevel by performing automatic modification of fact.pddl.…”

confidence: 99%