[1]谷文祥,李 丽,李丹丹.规划识别的研究及其应用[J].智能系统学报,2007,2(1):1-15.
 GU Wen-xiang,LI Li,LI Dan-dan.Research and application of plan recognition[J].CAAI Transactions on Intelligent Systems,2007,2(1):1-15.
点击复制

规划识别的研究及其应用

参考文献/References:
[1]GOLDMAN R P, GEIB C W, MILLER C A. A new model of plan rec ognition [ A]. Proceedings of the Conference on Uncertainty in Artificial Intelligence 199 9[C].[s.l.],1999.
[2]SCHMIDT C F, SRIDHARAN N S, GOODSON J L. The plan recognition problem: an intersection of psychology and artificial intelligence[J]. Artificial Intellig ence, 1978,11(1,2):45-83.
[3]CHARNIAK E, MCDERMOTT D. Introduction to artificial intelligence[M]. Rea ding, MA: Addison Wesley,1985.
[4]KAUTZ H, ALLEN J F. Generalized plan recognition[A]. Proceedings of the Fifth National Conference on Artificial Intelligence[C]. Philadelphia, PA, 19 86.
[5]VILAIN M. Getting serious about parsing plans: A grammatical analysis of p lan recognition[A]. Proceedings of the Eighth National Conference on Artificia l Intelligence[C]. Cambridge, MA: MIT Press, 1990.
[6]CARBERRY S. Incorporating default inferences into plan recognition[A]. P roceedigns of the Eighth National Conference on Artificial Intelligence[C]. Bo ston, Massachusetts, 1990.
[7]CHARNIAK E, GOLDMAN R P. A probabilistic model of plan recognition[A]. P roceedings of the Ninth National Conference on Artificial Intelligence[C]. Ana heim, California, 1991.
[8]CHARNIAK E, GOLDMAN R P. A Bayesian model of plan recognition[J]. Artifi cial Intelligence, 1993,64(1):53-79.
[9]HENRY A. Kautz. plan recognition[EB/OL]. www.cs.washington.edu/homes/ ka utz/talks/PlanRecognition.ppt, ISAT, March 4-5, 2003.
[10]刘日仙, 谷文祥, 殷明浩. 智能规划识别及其应用的研究[J]. 计算机工程 , 2005, 31(15):169-171.
 LIU Rixian, GU Wenxiang, YIN Minghao. On the intelligent plan recognition and it s application[J]. Computer Engineering, 2005, 31(15):169-171.
[11]COHEN P R, PERRAULT C R, ALLEN J F. Beyond question answering[A]. Strategies for Natural Language Processi ng[C]. Hillsdale, NJ: Lawrence Erlbaum Associates,1982.
[12]GEIB C W, GOLDMAN R P. Plan recognition in intrusion detection sy stems[A]. DARPA Information Survivability Conference and Exposition(DISCEX-200 1)[C]. Anaheim, California, 2001.
[13]HONG J. Graph construction and analysis as a paradigm for plan recognitio n [A]. Proceedings of the Seventeenth National Conference on Artificial Intell igence(AAAI-2000)[C]. Austin, Texas, USA, 2000.
[14]HONG J. Goal recognition through goal graph analysis [J]. Artificial In telligence Research, 2001(15):1-30.
[15]YIN M H, GU W X, LIU R X, LIU X X. Using regressive graph as a novel para digm in plan recognition[A]. International Conference on Machine Learning and Cybernetics (ICMLC-2003)[C].[s.l.],2003.
[16] ALLEN J F, KAUTZ H A, PELAVIN R N, et al. Reasoning about plans[M].Sa n Mateo, CA: Morgan Kaufmann, 1991.
[17] KAUTZ H A. A formal theory of plan recognition[D]. Rochester:University of Rochester, 1987. 
[18] 蔡自兴, 徐光佑. 人工智能及其应用:3版[M].北京:清华大学出版社,2004.
[19] MCCARTHY J. Circumscriptiona form of nonmonotonic reasoning[J]. Artificial Intelligence, 1986(13):27-39.
[20]姜云飞, 马宁. 基于限定的规划识别问题求解[J]. 计算机学报, 2002 ,25(12):1411-1416. JIANG Yunfei, MA Ning. Solution to plan recognition problem Based on Circumscr iption[J]. Chinese J Computers, 2002,25(12):1411-1416.
[21]姜云飞,马宁. 一种基于规划知识图的规划识别算法[J]. 软件学报, 200 2,13(4):686-692. JIANG Yunfei, MA Ning. A plan recognition algorithm based on plan knowledge gr aph[J]. Journal of Software, 2002,13(4): 686-692.
[22]谷文祥,李 杨, 殷明浩. 带标记的反向搜索的规划识别算法[J]. 计算机科学,2004(增刊):243-245.
GU Wenxiang, LI Yang, YIN Minghao. A Plan Recognition Algorithm of backward search with flag[J]. Computer Science,2004(suppl):243-245.
[23]PYNADATH D V WELLMAN M P. Probabilistic statedepe ndent grammars for plan recognition[A]. Proceedings of the 16th Conference on Uncertainty in Artificial Intelligence(UAI2000)[C].Stanford, CA,2000. 
[24]MOORE D, ESSA I. Recognizing multitasked activities from video using stochastic contextfree grammar [A]. Eighteenth National Conferen ce on Artificial intelligence(AAAI2002)[C].Edmonton, Alberta, Cana da,2002.
[25]GEIB C W, GOLDMAN P R Probabilistic plan recognit ion for hostile agents[A]. Proceedings of the Fourteenth International Florida Artificial Intelligence Research Society Conference (FLAIRS01)[C]. KeyWes t, USA, 2001.
[26]GEIB W C, GOLDMAN R P. Partial observability and probabilistic pl an/goal recognition[A]. IJCAI05 Workshop on Modeling Others f rom Oberservations[C]. Edinburgh, Scotland.2005.
[27]GEIB W C. Assessing the complexity of plan recognition[ A]. The Nineteenth National Conference on Artificial Intelligence(AAAI04)[C ]. San Jose,CA,2004
[28]BLUM A L, FURST M L. Fast planning through planning gr aph analysis[J]. Artificial Intelligence, 1997(90):281-300.
[29]LESH N, ETZIONI O. Scaling up goal recognition[A]. Proceedi ngs of the 5th International Conference on Principles of Knowledge Representatio n and Reasoning[C].Cambridge,MA, 1996.
[30]ALBRECHT D W, ZUKERMAN I, NICHOLSON A E, et al.Towards a bayesian model for keyhole plan recognition in large domains[A]. Proceeding s of the 6th International Conference on User Modeling[C].Sardinia, Italy, 1997
[31]HORVITZ E, BREESE J, HECKERMAN D, et al.The lumiere pro ject: bayesian user modeling for inferring the goals and needs of software user s[A]. Proceedings of the Fourteenth Conference on Uncertainty in Artificial In telligence[C].Madison, WI: Morgan Kaufmann Publishers,1998.
[32]RUSSELL S,NORVING P.人工智能——一种现代方法第2版:[M].北京:人民邮电出版社,2004.
[33]MAO W,JONATHAN G. Decisiontheoretic approach to plan recognition[R]. ICT Technical Report ICTTR012004, 2004.
[34]FRIEDMAN N, GETOOR L, KOLLER D,PFEFFER A. Learning Pro babilistic Relational Models[A]. Proceedings of the Sixteenth International Jo int Conference on Artificial Intelligence(IJCAI-99)[C]. San Francisco, CA, USA , 1999.
[35]SUMIT S, DOMINGOS,P WELD D. Dynamic probabilistic relational models[A]. Proceedings of the Eighteenth International Joint Confer ence on Artificial Intelligence (IJCAI-03) [C].Acapulco, Mexico , 2003.
[36]LAU T, WOLFMAN S A, DOMINGOS,P WELD D S. Programming b demonstratio n using version space algebra[J]. Machine Learning, 2003(53):111-156.
[37]RABINER L R, A tutorial on hidden markov models and select ed applications in speech recognition[J].Proceedings of the IEEE,1989,77(2): 257-285
[38]OLIVER N, HORVITZ E,GARG A. Layered representations fo r recognizing office activity[A]. Proceedings of the Fourth IEEE International Conference on Multimodal Interaction (ICMI 2002)[C]. [s.l.],2002.
[39]MURPHY K. Hidden semiMarkov models (segment models)[EB/O L].http://www.cs.ubc.ca/murphyk/Papers/segment.pdf,20021125.
[40]BUI H H, VENKATESH S,WEST G. On the recognition of abst ract Markov policies[A]. Seventeenth National Conference on Artificial Intelli gence (AAAI2000)[C]. Austin, Texas, 2000.
[41]SUTTON R S, PRECUP D,SINGH S. Between MDP and semi MDPs:a framework for temporal abstraction in reinforcement learning [J]. Arti ficial Intelligence, 1999,112:181-211.
[42]HUNG H B,VENKATESH S,WEST.Tracking and surveillance i n widearea spatial environments using the hidden markov model [J]. Internati onal Journal of Pattern Recognition and Artificial Intelligent, 2001, 65(1): l77 -106
[43]QIN X,LEE W. Attack plan recognition and prediction using causal networks[A]. Proceedings of The 20th Annual Computer Security Ap plications Conference (ACSAC 2004)[C]. Tucson, Arizona,2004.
[44]SCHNEIER B. Secrets and lies: digital security in a networked world [M]. New York,2000.
[45]SHEYNER O, HAINES J, JHA S, et al.. Automated generation a nd ana lysis of attack graphs[A]. Proceeding of the 2002 IEEE Symposium on Security a nd Privacy[C]. Oakland, CA,2002.
[46]LIN D, GOEBEL R. A message passing algorithm for plan recognit ion[A]. Proceedings of the Twelfth International Conference on Artificial Inte lligence (IJCAI91)[C].San Mateo, CA: Morgan Kaufmann, 1991.
[47]KERKEZ B, MICHAEL T.Incremental casebased plan recogn ition using state indices [A]. CaseBased Reasoning Research and Development: P roceedings of the 4th International Conference on CaseBased Reasoning (ICCBR 2001)[C].SpringerVerlag, 2001.
[48]BLAYLOCK N,JAMES A. Corpusbased, statistical goal recognition[A ]. Georg Gottlob and Toby Walsh, editors, Proceedings of the Eighteenth Interna tional Joint Conference on Artificial Intelligence[C].Acapulco, Mexico,2003.
[49]BLAYLOCK N JAMES A. Recognizing instantiated goals us ing statistical methods[A]. Gal Kaminda, editor, Workshop on Modeling Others f rom Observations (MOO-2005)[C].Edinburgh,2005.
[50]诸葛建伟, 韩心慧, 叶志远,等. 基于扩展目标规划图的网络攻击规划识别算法[J]. 计算机学报, 2006, 29(8): 1356-1366. ZHUGE Jianwei, HAN Xinhui, YE Zhiyuan, et al. A network attack plan recogni tion algorithm based on the extended goal graph[J]. Chinese J Computers, 20 06, 29(8): 1356-1366.
[51]AZAREWICZ J, FALA G,FINK R, et al,Plan recognit ion for airborne tactical decision making[A]. Proceedings of the Fifth National C onference on Artificial Intelligence[C].Philadelphia, 1986.
[52]AZAREWICZ J, FALA G.,HEITHECKER C. Templatebased m ultiag ent plan recognition for tactical situation assessment[A]. Proceedings of the Sixth Conference on Artificial Intelligence Applications[C].Miami, 1989.
[53]MULDER F W. A generic task model of tactical plan recognition [A ]. Proceedings of the 15th World Computer Congress, Vienna/Budapest, Internatio nal Federation of Information Processing(IFIPS)[C].[s.l.],1998
[54]FRANK M, FRANS V. A formal description of tactical plan recogn ition [J]. Information Fusion, 2003, 4(1): 47-61.
【55】[A]. Proceedings of the NATO RTO Symposium on M ilitary Data and Information Fusion[C]. Prague, Czech Republic,2003.
[56]SUZIE R. A generic model of tactical plan recognition for threat as sessment[A]. Proceedings of SPIE[C].[s.l.],2005.
[57]WILMOTT S, RICHARDSON J, BUNDY A, et al. An adversarial planning approach to Go[A]. Computers and Games: Proceedings Lecture Notes in Computer Science[C].Springer Verlag,Tsukuba, Japan, 19 99
[58】GU Wenxiang, YIN Jili. The recognition and opposition to multiag ent planning[A]. In Proceedings of the Fifth International Conference on Machi ne Learning and Cybernetics[C]. Dalian, China, 2006.
[59]JIANG Hua, DONG Yiqun,ZHAO Qiushi. A counterplanning approac h based on goal metric in the adversarial Planning[A]. In Proceedings of the F ifth International Conference on Machine Learning and Cybernetics[C]. Dalian, China,2006.
[60】GU Wenxiang, CAO Chunjing, GUA Weizhou. Hostile plan recognition and opposition[A].Proceeding of 2005 International Conference on Machine Lear ning and Cybernetics[C].[s.l.],4420-4426.
[61]GU Wenxiang,WANG Lei, LI Yongli. Research for adversarial planning recog nition and reply in the complex domains and the more agents conditions[A]. Pr oceeding of 2005 International Conference on Machine Learning and Cybernetics[C ].[s.l.],2005.
[62]GU Wenxiang, LIU Yan, JIN Xizi. Stress Calculate: Stress Reaction System Model[A]. In Proceeding of 2005 International Conference on Machine Learning and Cybernetics[C].[s.l.],2005.
【63]GU Wenxiang, REN Hongmei, LI Bingbing, et al. Adversarial plan recogni tion and opposition based tactical plan recognition[A], In Proceedings of the Fifth International Conference on Machine Learning and Cybernetics[C].Dalian, Chin a, 2006.
[64]CONATI C, GERTNER A, VANLEHN K. Using bayesian networks to manage un certai nty in student modeling[J]. Journal of User Modeling and UserAdapted Interaction, 2002,12(4): 371-417.
[65]HUVER M J,DURFEE H E,WELLMAN M P. The automated mapp ing of plans for plan recognition[A]. Proceedings of the 10th Conference on Un certainty in Artificial Intelligence (UAI)[C].San Francisco, USA: Morgan Kaufm a nn, 1994
相似文献/References:
[1]李德毅.网络时代人工智能研究与发展[J].智能系统学报,2009,4(1):1.
 LI De-yi.AI research and development in the network age[J].CAAI Transactions on Intelligent Systems,2009,4():1.
[2]赵克勤.二元联系数A+Bi的理论基础与基本算法及在人工智能中的应用[J].智能系统学报,2008,3(6):476.
 ZHAO Ke-qin.The theoretical basis and basic algorithm of binary connection A+Bi and its application in AI[J].CAAI Transactions on Intelligent Systems,2008,3():476.
[3]徐玉如,庞永杰,甘 永,等.智能水下机器人技术展望[J].智能系统学报,2006,1(1):9.
 XU Yu-ru,PANG Yong-jie,GAN Yong,et al.AUV—state-of-the-art and prospect[J].CAAI Transactions on Intelligent Systems,2006,1():9.
[4]王志良.人工心理与人工情感[J].智能系统学报,2006,1(1):38.
 WANG Zhi-liang.Artificial psychology and artificial emotion[J].CAAI Transactions on Intelligent Systems,2006,1():38.
[5]赵克勤.集对分析的不确定性系统理论在AI中的应用[J].智能系统学报,2006,1(2):16.
 ZHAO Ke-qin.The application of uncertainty systems theory of set pair analysis (SPU)in the artificial intelligence[J].CAAI Transactions on Intelligent Systems,2006,1():16.
[6]秦裕林,朱新民,朱 丹.Herbert Simon在最后几年里的两个研究方向[J].智能系统学报,2006,1(2):11.
 QIN Yu-lin,ZHU Xin-min,ZHU Dan.Herbert Simons two research directions in his lost years[J].CAAI Transactions on Intelligent Systems,2006,1():11.
[7]杨春燕,蔡 文.可拓信息-知识-智能形式化体系研究[J].智能系统学报,2007,2(3):8.
 YANG Chun-yan,CAI Wen.A formalized system of extension information-knowledge-intelligence[J].CAAI Transactions on Intelligent Systems,2007,2():8.
[8]赵克勤.SPA的同异反系统理论在人工智能研究中的应用[J].智能系统学报,2007,2(5):20.
 ZHAO Ke-qin.The application of SPAbased identicaldiscrepancycontrary system theory in artificial intelligence research[J].CAAI Transactions on Intelligent Systems,2007,2():20.
[9]王志良,杨 溢,杨 扬,等.一种周期时变马尔可夫室内位置预测模型[J].智能系统学报,2009,4(6):521.[doi:10.3969/j.issn.1673-4785.2009.06.009]
 WANG Zhi-liang,YANG Yi,YANG Yang,et al.A periodic time-varying Markov model for indoor location prediction[J].CAAI Transactions on Intelligent Systems,2009,4():521.[doi:10.3969/j.issn.1673-4785.2009.06.009]
[10]谷文祥,朱磊,黄平,等.可满足问题中的模型计数[J].智能系统学报,2012,7(1):33.
 GU Wenxiang,ZHU Lei,HUANG Ping,et al.The model counting of a satisfiability problem[J].CAAI Transactions on Intelligent Systems,2012,7():33.

备注/Memo

收稿日期:2006-07-22.
基金项目:国家自然科学基金资助项目(60573067,60473042)
作者简介:
谷文祥,男,1947年生,教授,博士生导师,主要研究方向为智能规划与规划识别、形式语言与自动机理论、模粗数学及其应用,发表论文百篇以上. E-mail:gwx@nenu.edu.cn .
李 丽,女,1982年生,硕士研究生,主要研究方向为智能规划与规划识别. Email:lil027@nenu.edu.cn.
李丹丹,女,1982年生,硕士研究生,主要研究方向为智能规划与规划识别. Email:lidd985@nenu.deu.cn. 

更新日期/Last Update: 2009-05-05
Copyright @ 《 智能系统学报》 编辑部
地址:(150001)黑龙江省哈尔滨市南岗区南通大街145-1号楼 电话:0451- 82534001、82518134