<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://www.sift.net/</loc><changefreq>daily</changefreq><priority>1.0</priority></url>
<url><loc>https://www.sift.net/research/playbook</loc><lastmod>2017-05-15T18:53Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/applying-intent-sensitive-policy-automated-resource-allocation-command-communication</loc><lastmod>2016-02-27T02:03Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/tasking-interface-manager-affording-pilot-control-adaptive-automation-and-aiding</loc><lastmod>2015-07-28T18:29Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/adaptive-automation-and-decision-aiding-military-fast-jet-domain</loc><lastmod>2015-08-26T20:09Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/adaptive-automation-theory-practice</loc><lastmod>2015-07-28T18:40Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/comparison-display-requirements-generated-hierarchical-task-and-abstraction</loc><lastmod>2016-02-27T02:02Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/independent-lifestyle-assistant</loc><lastmod>2016-02-27T02:01Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/verification-through-user-value-or-‘how-avoid-drinking-your-own-bathwater-ubicomp</loc><lastmod>2015-07-28T19:16Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/user-acceptance-and-plan-recognition-why-even-perfect-intent-inferencing-might-not-be</loc><lastmod>2015-08-26T20:09Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/issues-user-acceptance-and-humanmachine-performance-lessons-learned-fielding</loc><lastmod>2015-08-26T20:09Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/associates-etiquette-meta-communication-make-human-automation-interaction-more-natural</loc><lastmod>2016-02-27T02:00Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/small-business-research-and-development-oxymoron-or-golden-opportunity</loc><lastmod>2016-02-27T01:53Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/automation-caregiver-role-advanced-technologies-elder-care</loc><lastmod>2016-02-27T01:59Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/getting-intelligence-intelligent-user-interface-intent-based-policy-automated-resource</loc><lastmod>2015-07-28T19:46Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/user-acceptance-and-plan-recognition-why-even-perfect-intent-inferencing-might-not-be-0</loc><lastmod>2016-02-27T01:52Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/location-modeling-ubiquitous-computing-any-better</loc><lastmod>2015-07-28T20:09Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/policy-new-interaction-method-decision-support-systems</loc><lastmod>2015-07-28T20:28Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/tagging-knowledge-acquisition-sessions-improve-knowledge-transition</loc><lastmod>2015-07-29T17:54Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/providing-appropriate-situation-awareness-within-mixed-initiative-control-system</loc><lastmod>2015-07-29T17:56Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/cognitive-cockpit-engineering-coupling-functional-state-assessment-task-knowledge</loc><lastmod>2015-07-29T17:59Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/etiquette-perspective-human-automation-relations</loc><lastmod>2016-02-27T01:52Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/first-cause-no-harm-issues-building-safe-reliable-and-trustworthy-elder-care-systems</loc><lastmod>2015-07-29T18:02Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/delegation-model-human-automation-interaction</loc><lastmod>2015-07-29T18:04Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/playbook-interface-mixed-initiative-control-multiple-unmanned-vehicle-teams</loc><lastmod>2016-02-27T01:51Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/agents-recognizing-and-responding-behavior-elder</loc><lastmod>2015-08-19T22:00Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/collaboration-conducted-intentional-declarations</loc><lastmod>2015-07-29T18:10Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/dogma-diversion-management-decision-support-system-airline-operations</loc><lastmod>2015-07-29T18:13Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/human-control-multiple-robots-roboflag-simulation-environment</loc><lastmod>2015-07-29T18:15Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/etiquette-and-effectiveness-how-should-smart-home-interact</loc><lastmod>2015-07-29T18:17Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/design-philosophies-applied-elder-home-monitoring-system</loc><lastmod>2015-07-29T18:19Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/etiquette-perspective-human-automation-relationships-applications-models-and-results</loc><lastmod>2016-02-27T01:48Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/who’s-charge-intermediate-levels-control-robots-we-can-live</loc><lastmod>2015-07-29T18:26Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/beyond-levels-automation-architecture-more-flexible-human-automation-collaboration</loc><lastmod>2015-07-29T18:27Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/“playbook”-variable-autonomy-control-multiple-heterogeneous-unmanned-air-vehicles</loc><lastmod>2016-02-27T01:51Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/delegation-systems-staying-charge-highly-flexible-automation</loc><lastmod>2015-07-29T18:33Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/markov-decision-process-approach-humanmachine-function-allocation-optionally-piloted</loc><lastmod>2015-07-29T18:35Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/etiquette-perspective-human-computer-interaction</loc><lastmod>2016-02-27T01:50Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/etiquette-and-associates-creating-well-behaved-intelligent-subordinate</loc><lastmod>2015-07-29T18:37Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/delegation-architectures-playbooks-and-policy-keeping-operators-charge</loc><lastmod>2015-07-29T18:38Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/identification-cognitive-requirements-new-systems</loc><lastmod>2015-07-29T18:39Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/human-machine-integration-concepts-fro-unmanned-combat-armed-rotorcraft</loc><lastmod>2015-07-29T18:40Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/tagging-knowledge-acquisition-sessions-facilitate-knowledge-traceability</loc><lastmod>2015-07-29T18:43Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/trust-and-etiquette-high-criticality-automated-systems</loc><lastmod>2015-07-29T18:44Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/automated-elder-home-carelong-term-adaptive-aiding-and-support-we-can-live</loc><lastmod>2016-02-27T01:47Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/playbook-approach-variable-autonomy-control-application-control-multiple-heterogeneous</loc><lastmod>2016-02-27T01:45Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/“playbook”-variable-autonomy-control-multiple-heterogeneous-unmanned-air-vehicles-0</loc><lastmod>2016-02-27T01:48Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/delegation-approaches-multiple-unmanned-vehicle-control</loc><lastmod>2015-07-29T18:54Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/human-computer-etiquette-managing-expectations-intelligent-agents</loc><lastmod>2015-07-29T18:55Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/role-“etiquette”-automated-medication-reminder</loc><lastmod>2016-02-27T01:45Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/managing-knowledge-throughout-software-development-cycle-using-cognitive-decision-aid</loc><lastmod>2016-02-27T01:44Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/using-delegation-architecture-adaptive-automation</loc><lastmod>2016-02-27T01:34Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/christopher-miller</loc><lastmod>2020-10-19T18:59Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/results-field-study-need-emotional-relationship-between-elderly-and-their-assistive</loc><lastmod>2016-02-27T01:42Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/addressing-cultural-challenges-eldercare-training</loc><lastmod>2015-07-29T19:19Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/flexible-delegation-type-interface-enhances-system-performance-human-supervision</loc><lastmod>2016-02-27T01:40Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/playbook-approach-adaptive-automation</loc><lastmod>2016-02-27T02:06Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/implications-adaptive-vs-adaptable-uis-decision-making-why-“automated-adaptiveness”-not</loc><lastmod>2016-02-27T01:37Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/etiquette-quotient-approach-believable-social-interaction-behaviors</loc><lastmod>2016-08-22T18:30Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/trust-adaptive-automation-role-etiquette-tuning-trust-analogic-and-affective-method</loc><lastmod>2016-02-27T01:39Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/delegation-architectures-playbooks-and-policy-keeping-operators-charge-0</loc><lastmod>2016-02-27T01:41Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/optimizing-satisfice-using-optimization-guide-users</loc><lastmod>2016-02-27T02:06Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/playbook™-real-time-closed-loop-control</loc><lastmod>2016-02-27T01:44Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/computational-approach-etiquette-and-politeness</loc><lastmod>2016-08-22T18:32Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/designing-flexible-interaction-between-humans-and-automation-delegation-interfaces</loc><lastmod>2016-02-27T01:33Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/computational-approach-etiquette-and-politeness-validation-experiments</loc><lastmod>2016-02-27T01:32Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/computational-apporach-etiqeutte-and-politeness-etiquette-engine™-cultural-interaction</loc><lastmod>2016-08-22T18:37Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/can-elderly-stereotype-prime-degrade-performance-simulated-surgical-task</loc><lastmod>2015-07-31T20:00Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/delegation-loa3-space</loc><lastmod>2016-02-27T01:29Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/new-probabilistic-plan-recognition-algorithm-based-string-rewriting</loc><lastmod>2015-08-19T21:55Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/interactive-phrasebook-language-and-culture-training</loc><lastmod>2016-02-27T01:31Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/computational-approach-etiquette-operationalizing-brown-and-levinsons-politeness-model</loc><lastmod>2016-02-27T01:49Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/using-classical-planners-solve-nondeterministic-planning-problems</loc><lastmod>2016-02-27T01:29Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/culture-politeness-and-directive-compliance-does-saying-please-make-difference</loc><lastmod>2016-02-27T01:31Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/trapping-malicious-insiders-spdr-web</loc><lastmod>2016-02-27T01:28Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/evaluating-effects-culture-and-etiquette-human-computer-interaction-and-human</loc><lastmod>2015-08-02T17:39Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/computational-models-etiquette-implementations-and-challenges</loc><lastmod>2015-08-02T17:43Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/model-based-intrusion-assessment-common-lisp</loc><lastmod>2016-02-27T01:26Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/shopper-interpreter-high-level-web-services-language</loc><lastmod>2016-02-27T01:27Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/multi-model-aid-interface-design-maid-helping-designers-reason-about-information-match</loc><lastmod>2016-02-27T01:25Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/utilizing-human-computer-etiquette-encourage-human-machine-therapeutic-alliance</loc><lastmod>2015-08-02T19:29Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/human-computer-etiquette-socio-linguistic-perspective</loc><lastmod>2016-02-27T01:21Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/ltml-language-representation-semantic-web-service-workflow-procedures</loc><lastmod>2016-02-27T01:22Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/interactive-phrasebook™-conveying-culture-through-etiquette</loc><lastmod>2016-08-22T18:37Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/current-bottleneck-computer-based-culture-training-who-cares-about-etiquette</loc><lastmod>2015-08-02T19:42Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/can-polite-computers-produce-better-human-performance</loc><lastmod>2016-02-27T01:18Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/interactive-phrasebook-embeddding-human-social-dynamics-language-training</loc><lastmod>2016-02-27T01:20Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/shopper-system-executing-and-simulating-expressive-plans</loc><lastmod>2015-08-19T21:55Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/politeness-and-etiquette-modeling-beyond-perception-behavior</loc><lastmod>2015-08-19T22:00Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/evolving-asdf-more-cooperation-less-coordination</loc><lastmod>2016-02-27T01:19Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/nst-unit-testing-system-common-lisp</loc><lastmod>2015-08-19T21:54Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/fuzzbuster-towards-adaptive-immunity-cyber-threats</loc><lastmod>2016-02-27T00:39Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/learning-event-models-explain-anomolies</loc><lastmod>2015-08-02T22:23Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/mark-burstein</loc><lastmod>2020-10-19T16:58Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/what-just-happened-explaining-past-planning-and-execution</loc><lastmod>2015-08-02T22:27Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/recognizing-plans-loops-represented-lexicalized-grammar</loc><lastmod>2015-08-02T22:26Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/conserve-client-side-intelligent-power-scheduling</loc><lastmod>2016-02-27T00:39Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/better-parameter-free-anytime-search-minimizing-time-between-solutions</loc><lastmod>2016-02-01T23:22Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/delegation-control-control-unmanned-aerial-systems-uas</loc><lastmod>2015-08-04T19:11Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/hierarchical-goal-based-formalism-and-algorithm-single-agent-plannin</loc><lastmod>2016-02-27T00:36Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/generating-strategies-multi-agent-pursuit-evasion-games-partially-observable-euclidean</loc><lastmod>2015-08-04T19:17Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/using-concolic-testing-refine-vulnerability-profiles-fuzzbuster</loc><lastmod>2016-02-27T00:30Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/identifying-culprits-when-probabilistic-verification-fails</loc><lastmod>2015-08-19T21:54Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/fuzzbuster-system-self-adaptive-immunity-cyber-threats</loc><lastmod>2016-02-27T00:38Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/human-performance-and-ux-innovations</loc><lastmod>2022-02-11T16:31Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/robert-goldman</loc><lastmod>2020-10-14T14:51Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/discoverhistory-understanding-past-planning-and-execution-aamas-12-proceedings-11th</loc><lastmod>2015-08-04T19:38Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/power-and-politeness-interactions-admire-tool-deriving-former-latter</loc><lastmod>2016-02-27T00:29Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/politeness-effects-professional-and-nonprofessional-teams-implications-directive</loc><lastmod>2016-02-27T00:31Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/playbook-vs-swarms-how-should-we-coordinate-uv-teams</loc><lastmod>2015-08-04T19:45Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/frameworks-supervisory-control-characterizing-relationships-unmanned-vehicles-press</loc><lastmod>2016-02-27T00:32Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/adaptable-operator-automation-interface-future-unmanned-aerial-systems-control</loc><lastmod>2015-08-04T19:49Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/massively-collaborative-problem-solving-new-security-solutions-and-new-security-risks</loc><lastmod>2015-08-04T19:54Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/using-classical-planners-plan-verification-and-counterexample-generation</loc><lastmod>2015-08-04T20:01Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/revising-domain-knowledge-cross-domain-analogy</loc><lastmod>2015-08-05T01:33Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/david-musliner</loc><lastmod>2021-03-25T17:41Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/future-unmanned-aerial-systems-control-feedback-highly-flexible-operator-automation</loc><lastmod>2015-08-05T01:42Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/anticipatory-line-planning-icaps-12-international-conference-automated-planning-and</loc><lastmod>2016-02-01T23:22Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/temporal-planning-preferences-and-time-dependent-continuous-costs</loc><lastmod>2016-02-01T23:22Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/htn-problem-spaces-structure-algorithms-termination</loc><lastmod>2015-08-05T01:50Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/non-intrusive-detection-psycho-social-dimensions-using-sociolinguistics</loc><lastmod>2016-02-27T00:28Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/linguistic-interactions-analysis-and-generation-multi-crew-environments</loc><lastmod>2015-08-05T01:58Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/human-machine-etiquette-how-we-do-and-don’t-treat-machines-social-actors</loc><lastmod>2015-08-05T01:59Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/open-world-planning-robots-hindsight-optimization</loc><lastmod>2016-02-01T23:19Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/social-maintenance-and-psychological-support-using-virtual-worlds</loc><lastmod>2022-02-11T16:31Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/brain-mechanisms-social-threat-effects-working-memory</loc><lastmod>2015-08-05T02:12Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/eric-engstrom</loc><lastmod>2025-07-29T18:38Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.sift.net/publications/neural-and-genetic-markers-vulnerability-posttraumatic-stress-symptoms-among-survivors</loc><lastmod>2015-08-05T02:27Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/measuring-plan-diversity-pathologies-existing-approaches-and-new-plan-distance-metric</loc><lastmod>2018-04-25T17:20Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2009-12-11</loc><lastmod>2015-08-20T19:47Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2015-07-21</loc><lastmod>2015-08-20T19:47Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2015-06-30</loc><lastmod>2015-08-20T19:46Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2015-06-25</loc><lastmod>2015-08-20T19:46Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2015-02-24</loc><lastmod>2015-08-20T19:46Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2015-02-19</loc><lastmod>2015-08-20T19:45Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2015-01-30</loc><lastmod>2015-08-20T19:46Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/publications/improving-automated-cybersecurity-generalizing-faults-and-quantifying-patch-performance</loc><lastmod>2016-02-27T00:19Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/michael-pelican</loc><lastmod>2022-10-17T01:25Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2015-01-08</loc><lastmod>2015-08-20T19:46Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-12-16</loc><lastmod>2015-08-20T19:46Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-11-17</loc><lastmod>2015-08-20T19:46Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-11-11</loc><lastmod>2016-02-01T23:32Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-11-11-b</loc><lastmod>2015-08-20T19:45Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-10-09</loc><lastmod>2015-08-20T19:45Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-05-13-d</loc><lastmod>2015-08-20T19:45Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-08-11</loc><lastmod>2015-08-20T19:45Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-05-13-c</loc><lastmod>2015-08-20T19:45Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-05-13-b</loc><lastmod>2015-08-20T19:45Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/staff/dan-thomsen</loc><lastmod>2019-12-22T13:42Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2014-05-13</loc><lastmod>2015-08-20T19:44Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/contact</loc><lastmod>2020-06-01T18:53Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/contact/sift-minneapolis</loc><lastmod>2025-04-22T19:13Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.sift.net/contact/sift-boston</loc><lastmod>2016-03-16T19:18Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2014-03-01</loc><lastmod>2015-08-20T19:44Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-05-05</loc><lastmod>2015-08-20T19:44Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-06-08-b</loc><lastmod>2015-08-20T19:43Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-03-02-b</loc><lastmod>2015-08-20T19:43Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-02-17-b</loc><lastmod>2015-08-20T19:42Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-02-17</loc><lastmod>2015-08-20T19:42Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-01-31</loc><lastmod>2015-08-20T19:42Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-01-16</loc><lastmod>2015-08-20T19:42Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2014-01-08</loc><lastmod>2015-08-20T19:42Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-12-23</loc><lastmod>2015-08-20T19:42Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-10-01</loc><lastmod>2015-08-20T19:41Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-12-12</loc><lastmod>2015-08-20T19:41Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-08-18-0</loc><lastmod>2015-08-20T19:41Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-08-18</loc><lastmod>2015-08-20T19:41Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-07-09-b</loc><lastmod>2016-02-01T23:32Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-07-09</loc><lastmod>2015-08-20T19:40Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/staff/dan-bryce</loc><lastmod>2022-03-29T14:43Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2013-05-23-c</loc><lastmod>2015-08-20T19:40Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-05-23-b</loc><lastmod>2015-08-20T19:40Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-08-16</loc><lastmod>2015-08-20T19:40Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2012-07-26</loc><lastmod>2015-08-20T19:39Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-05-23</loc><lastmod>2015-08-20T19:39Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-05-14</loc><lastmod>2015-08-20T19:39Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-04-05</loc><lastmod>2015-08-20T19:23Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-04-05-c</loc><lastmod>2015-08-20T19:39Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-04-05-b</loc><lastmod>2015-08-20T19:39Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-03-11-b</loc><lastmod>2015-08-20T19:39Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/staff/josh-hamell</loc><lastmod>2022-03-29T14:45Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2013-03-11</loc><lastmod>2015-08-20T19:39Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-02-07</loc><lastmod>2015-08-20T19:38Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-01-25</loc><lastmod>2015-08-20T19:38Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2013-01-16</loc><lastmod>2015-08-20T19:37Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-04-23</loc><lastmod>2015-08-20T19:37Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2012-12-17</loc><lastmod>2015-08-20T19:36Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-09-10</loc><lastmod>2015-08-20T19:23Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-12-15-b</loc><lastmod>2015-08-20T19:36Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-10-13</loc><lastmod>2015-08-20T19:36Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-08-31-b</loc><lastmod>2015-08-20T19:36Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/staff/ugur-kuter</loc><lastmod>2022-03-29T14:46Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2011-09-08</loc><lastmod>2015-08-20T19:36Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-10-28</loc><lastmod>2015-08-20T19:36Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-08-26</loc><lastmod>2015-08-20T19:36Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2012-04-13</loc><lastmod>2015-08-20T19:35Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-02-24</loc><lastmod>2015-08-20T19:35Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2012-08-09</loc><lastmod>2015-08-20T19:23Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-06-09</loc><lastmod>2015-08-20T19:35Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2012-10-23</loc><lastmod>2015-08-20T19:35Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2012-10-22</loc><lastmod>2015-08-20T19:35Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2012-08-23</loc><lastmod>2016-02-01T23:33Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/staff/david-mcdonald</loc><lastmod>2020-10-19T16:58Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2012-08-27</loc><lastmod>2016-02-01T23:32Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2012-05-07</loc><lastmod>2015-08-20T19:35Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2012-06-24</loc><lastmod>2015-08-20T19:35Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-03-02</loc><lastmod>2015-08-20T19:23Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-04-07-b</loc><lastmod>2015-08-20T19:34Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-12-15</loc><lastmod>2015-08-20T19:34Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-12-19</loc><lastmod>2015-08-20T19:34Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2012-02-23</loc><lastmod>2015-08-20T19:34Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2012-04-26</loc><lastmod>2015-08-20T19:34Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2012-02-26</loc><lastmod>2015-08-20T19:34Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/research/cybersecurity</loc><lastmod>2025-04-15T07:32Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2011-10-06</loc><lastmod>2015-08-20T19:34Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-12-01</loc><lastmod>2015-08-20T19:33Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-09-09</loc><lastmod>2015-08-20T19:33Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-08-31</loc><lastmod>2015-08-20T19:33Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-06-08</loc><lastmod>2015-08-20T19:33Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-04-28</loc><lastmod>2015-08-20T19:33Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2011-04-07</loc><lastmod>2015-08-20T19:33Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-12-27</loc><lastmod>2015-08-20T19:32Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-12-02</loc><lastmod>2015-08-20T19:32Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-10-07</loc><lastmod>2015-08-20T19:32Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/staff/jeffrey-rye</loc><lastmod>2022-03-29T14:47Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2010-12-30</loc><lastmod>2015-08-20T19:32Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-10-06</loc><lastmod>2015-08-20T19:32Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-10-21</loc><lastmod>2015-08-20T19:31Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-11-11</loc><lastmod>2015-08-20T19:31Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-09-10-c</loc><lastmod>2015-08-20T19:31Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-09-10-b</loc><lastmod>2015-08-20T19:31Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-07-14-b</loc><lastmod>2015-08-20T19:28Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-07-14</loc><lastmod>2015-08-20T19:28Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-06-19</loc><lastmod>2015-08-20T19:28Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-05-27</loc><lastmod>2015-08-20T19:28Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-04-27</loc><lastmod>2015-08-20T19:28Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-04-22</loc><lastmod>2015-08-20T19:24Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2010-04-21</loc><lastmod>2015-08-20T19:24Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2009-07-24</loc><lastmod>2016-02-17T00:04Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2009-07-29</loc><lastmod>2015-08-20T19:24Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/research/health-and-telemedicine/ad-astra</loc><lastmod>2016-04-26T12:30Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/cybersecurity/hackar</loc><lastmod>2016-02-01T23:28Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/scott-friedman</loc><lastmod>2022-03-29T14:44Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2015-08-31</loc><lastmod>2015-08-31T18:34Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2015-08-31-0</loc><lastmod>2016-05-31T15:11Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2015-08-31-c</loc><lastmod>2015-08-31T18:51Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/publications/addressing-sensory-and-social-monotony-long-duration-missions-using-ansible-virtual</loc><lastmod>2022-02-11T16:31Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/grounded-theory-approach-individual-and-team-performance-using-quantitative-analysis</loc><lastmod>2015-11-19T16:46Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/jeremy-gottlieb</loc><lastmod>2023-03-16T13:32Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2015-09-10</loc><lastmod>2015-09-10T14:48Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/r3</loc><lastmod>2020-10-19T16:58Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence-1</loc><lastmod>2015-09-11T13:35Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/fuzzbomb</loc><lastmod>2016-02-01T23:27Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/exploiting-graph-structure-summarize-and-compress-relational-knowledge</loc><lastmod>2015-09-10T17:30Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/toward-automatic-ontology-curation-similarity-based-reasoning</loc><lastmod>2016-02-01T23:23Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/repairing-qualitative-domain-knowledge-cross-domain-analogy</loc><lastmod>2015-09-10T17:31Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/pete-keller</loc><lastmod>2022-03-29T14:46Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/constructing-and-revising-commonsense-science-explanations-metareasoning-approach</loc><lastmod>2015-09-10T17:31Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/learning-qualitative-causal-models-generalization-quantity-analysis</loc><lastmod>2015-09-10T17:32Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/classifying-paintings-artistic-genre-analysis-features-classifiers</loc><lastmod>2015-09-10T17:32Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/learning-naive-physics-models-analogical-generalization</loc><lastmod>2015-09-10T17:33Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/extending-analogical-generalization-near-misses</loc><lastmod>2015-09-10T17:33Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/revising-domain-knowledge-cross-domain-analogy-0</loc><lastmod>2015-09-10T17:33Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/repairing-incorrect-knowledge-model-formulation-and-metareasoning</loc><lastmod>2015-09-10T17:34Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/modeling-structural-priming-sentence-production-analogical-processes</loc><lastmod>2015-09-10T17:34Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/integrated-systems-approach-explanation-based-conceptual-change</loc><lastmod>2015-09-10T17:35Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/extracting-and-improving-microarchitecture-performance-reconfigurable-architectures</loc><lastmod>2015-09-10T17:35Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/chronomorphic-programs-using-runtime-diversity-prevent-code-reuse-attacks</loc><lastmod>2016-02-27T00:16Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/improving-automated-cybersecurity-generalizing-faults-and-quantifying-patch-performan-0</loc><lastmod>2016-02-27T00:17Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/automated-fault-analysis-and-filter-generation-adaptive-cybersecurity</loc><lastmod>2016-02-27T00:21Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/meta-control-adaptative-cybersecurity-fuzzbuster</loc><lastmod>2016-02-27T00:24Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/self-adaptation-metrics-active-cybersecurity</loc><lastmod>2016-02-27T00:25Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/automatically-repairing-stripped-executables-cfg-microsurgery</loc><lastmod>2016-02-27T00:10Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/strider</loc><lastmod>2020-09-22T22:49Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/offline-monte-carlo-tree-search-statistical-model-checking-markov-decision-processes</loc><lastmod>2015-10-05T22:52Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/heuristic-search-bounded-model-checking-probabilistic-automata</loc><lastmod>2015-10-05T22:52Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2015-10-01</loc><lastmod>2016-05-31T15:12Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/publications/hierarchical-abstraction-learning-task-and-event-regression</loc><lastmod>2015-11-20T20:15Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/hierarchical-goal-networks-and-goal-directed-autonomy-going-where-ai-planning-meets</loc><lastmod>2015-11-20T20:17Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/smt-based-nonlinear-pddl-planning</loc><lastmod>2015-11-20T21:33Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/hackar-helpful-advice-code-knowledge-and-attack-resilience</loc><lastmod>2016-02-27T00:17Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/coordinating-highly-contingent-plans-b-iasing-distributed-mdps-towards-cooperative</loc><lastmod>2015-11-20T21:52Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/verifying-equivalence-procedures-different-languages-preliminary-results</loc><lastmod>2015-11-20T21:54Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/priority-based-meta-control-within-hierarchical-task-network-planning</loc><lastmod>2016-02-27T01:23Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/embedding-planning-technology-satellite-systems</loc><lastmod>2020-09-22T22:41Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/priority-based-playbook-tasking-unmanned-system-teams</loc><lastmod>2015-11-20T22:28Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/fuzzbuster-towards-adaptive-immunity-cyber-threats-0</loc><lastmod>2016-02-27T00:46Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/model-based-systems-engineering-design-and-development-complex-aerospace-systems</loc><lastmod>2015-11-20T22:37Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/loop-acceleration-technique-speed-verification-automatically-generated-plans</loc><lastmod>2015-11-20T22:40Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/delegation-automation-performance-and-implications-non-optimal-situations</loc><lastmod>2015-11-20T22:48Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/improving-decision-support-systems-through-development-modular-autonomy-architecture</loc><lastmod>2015-11-20T23:04Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/improving-trust-estimates-planning-domains-rare-failure-events</loc><lastmod>2015-11-20T23:11Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/automated-self-adaptation-cyber-defense-pushing-adaptive-perimeter-protection-inward</loc><lastmod>2016-02-27T00:26Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/formal-methods-comparing-behavior-procedures-different-languages</loc><lastmod>2016-02-27T00:21Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/employing-ai-techniques-probabilistic-model-checking</loc><lastmod>2015-11-20T23:28Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/certification-considerations-adaptive-systems</loc><lastmod>2015-11-20T23:34Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/linguistic-analysis</loc><lastmod>2021-02-15T15:36Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/extending-biology-models-deep-nlp-over-scientific-articles</loc><lastmod>2020-10-19T16:58Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/active-perception-cyber-intrusion-detection-and-defense</loc><lastmod>2020-10-13T21:04Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2015-12-11</loc><lastmod>2016-02-01T23:31Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2015-12-18</loc><lastmod>2016-03-17T03:43Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/demos/ad-astra</loc><lastmod>2022-07-18T23:34Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/chronomorphic-programs-runtime-diversity-prevents-exploits-and-reconnaissance</loc><lastmod>2016-06-03T13:51Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2016-02-04</loc><lastmod>2016-02-04T17:25Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/publications/saga-choices-gamification-therapy-ptsd</loc><lastmod>2016-11-21T17:54Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/careers</loc><lastmod>2022-12-23T19:40Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2016-03-18</loc><lastmod>2016-03-18T19:48Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2016-05-12</loc><lastmod>2016-05-13T14:52Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/publications/choices-gamification-therapy-ptsd</loc><lastmod>2016-10-25T17:42Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2016-05-13</loc><lastmod>2016-05-31T15:10Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2016-05-16</loc><lastmod>2016-05-25T15:06Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2016-05-16-0</loc><lastmod>2016-05-25T15:06Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/publications/maintaining-evolving-domain-models</loc><lastmod>2016-08-22T19:33Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/marshal</loc><lastmod>2016-05-31T15:09Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2016-06-16</loc><lastmod>2016-06-22T18:12Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/content/saga-comics</loc><lastmod>2024-12-02T19:23Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.sift.net/news/2016-11-17</loc><lastmod>2016-11-22T13:59Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2016-11-21</loc><lastmod>2016-11-22T14:01Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2016-11-21-0</loc><lastmod>2016-11-22T14:01Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2017-01-10</loc><lastmod>2017-01-10T06:55Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/demos/aphasia-testbed</loc><lastmod>2017-03-30T17:04Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/human-system-interface-contingency-planning-collaborative-operations-unmanned-aerial</loc><lastmod>2017-05-15T18:53Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2017-09-04</loc><lastmod>2017-09-04T15:25Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/staff/kara-stegeman</loc><lastmod>2023-07-26T14:59Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2017-09-11</loc><lastmod>2017-09-11T19:56Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2017-09-18</loc><lastmod>2017-09-18T20:07Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2017-12-13</loc><lastmod>2018-05-04T13:31Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/publications/architecture-hybrid-planning-and-execution</loc><lastmod>2020-10-13T21:03Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2018-06-02</loc><lastmod>2018-06-02T16:14Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2018-06-25</loc><lastmod>2018-06-25T17:08Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/publications/network-policy-enforcement-using-transactions-neutron-approach</loc><lastmod>2020-10-13T20:57Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/richard-freedman</loc><lastmod>2024-02-23T11:27Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/ruta-wheelock</loc><lastmod>2022-06-09T22:52Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2019-01-17</loc><lastmod>2019-01-17T18:57Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/research/computational-social-science</loc><lastmod>2023-04-06T18:10Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/computational-social-science/margaret</loc><lastmod>2019-05-07T19:46Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/computational-social-science/medulla</loc><lastmod>2023-03-16T13:32Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/computational-social-science/tybalt</loc><lastmod>2019-05-07T19:49Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/computational-social-science/vanessa</loc><lastmod>2019-05-07T19:50Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/automated-interface-evaluation-tools/maid</loc><lastmod>2015-08-13T18:41Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2019-02-04</loc><lastmod>2019-02-04T17:29Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/staff/steven-johnston</loc><lastmod>2022-06-09T22:52Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/creative-problem-solving-through-automated-planning-and-analogy</loc><lastmod>2020-10-14T14:53Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/phillip-walker</loc><lastmod>2023-07-26T15:03Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/mark-valovage</loc><lastmod>2022-03-27T14:43Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2020-04-03</loc><lastmod>2020-04-03T13:54Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2020-04-03-0</loc><lastmod>2020-04-03T13:54Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/research/automated-interface-evaluation-tools/rpa</loc><lastmod>2015-08-26T20:09Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/noam-benkler</loc><lastmod>2023-07-26T15:02Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/field-report-exploring-fronts-multiple-robots</loc><lastmod>2020-10-14T14:52Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/acumen</loc><lastmod>2020-10-14T15:04Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/clic</loc><lastmod>2020-10-14T14:49Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/a-team</loc><lastmod>2020-10-14T14:50Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/distro</loc><lastmod>2020-10-14T14:50Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/m-primus</loc><lastmod>2020-10-14T14:50Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/score</loc><lastmod>2020-10-14T15:28Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/automated-interface-evaluation-tools/image</loc><lastmod>2015-08-13T18:41Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/sd2</loc><lastmod>2020-10-14T14:51Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/computational-social-science/schneider</loc><lastmod>2021-07-22T18:01Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/repair-0</loc><lastmod>2020-10-14T15:02Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/human-performance-and-ux-innovations/offset</loc><lastmod>2020-10-19T18:59Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/asist</loc><lastmod>2020-10-19T16:20Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2020-10-19</loc><lastmod>2020-10-19T16:28Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/cps</loc><lastmod>2020-10-27T20:57Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/helen-wauck</loc><lastmod>2022-06-09T22:52Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/demos/maid</loc><lastmod>2015-08-21T22:25Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/matt-mclure</loc><lastmod>2025-07-11T01:07Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.sift.net/staff/pavan-kantharaju-0</loc><lastmod>2020-12-23T18:16Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/combinatory-categorial-grammar-learning-plan-recognition-domains-type-trees</loc><lastmod>2021-02-15T15:34Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/discovering-meaningful-labelings-rts-game-replays-replay-embeddings</loc><lastmod>2021-02-15T15:36Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2021-09-20</loc><lastmod>2021-09-21T04:49Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/research/health-and-telemedicine</loc><lastmod>2022-02-11T16:31Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/automated-interface-evaluation-tools/copv</loc><lastmod>2015-08-13T18:42Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2021-10-27</loc><lastmod>2021-10-27T17:17Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2021-11-09</loc><lastmod>2021-11-10T16:31Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/publications/solving-pomdps-online-through-htn-planning-and-monte-carlo-tree-search</loc><lastmod>2021-11-10T15:35Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2022-01-03</loc><lastmod>2022-01-05T17:32Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2022-01-12</loc><lastmod>2022-01-31T18:01Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2022-01-24</loc><lastmod>2022-01-24T16:39Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/publications/openmind-planning-and-adapting-domains-novelty</loc><lastmod>2022-06-09T22:50Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/cybersecurity/adept</loc><lastmod>2015-08-31T20:17Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/changepoint-method-open-world-novelty-detection</loc><lastmod>2022-06-02T13:58Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2022-05-15</loc><lastmod>2022-06-02T13:57Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/cha-cha</loc><lastmod>2022-06-09T22:52Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/exploiting-time-series-data-task-prediction-and-diagnosis-intelligent-guidance-system</loc><lastmod>2022-06-09T22:56Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/spotter-extending-symbolic-planning-operators-through-targeted-reinforcement-learning</loc><lastmod>2022-06-20T21:22Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/novelty-centric-agent-architecture-changing-worlds</loc><lastmod>2022-06-20T21:25Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/unstructured-text-causal-knowledge</loc><lastmod>2022-06-20T21:24Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/rapid-learn-framework-learning-recover-handling-novelties-open-world-environments</loc><lastmod>2022-07-12T15:19Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/biplex-creative-problem-solving-planning-experimentation</loc><lastmod>2022-07-12T15:20Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/cybersecurity/doodlebug</loc><lastmod>2015-08-19T20:07Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/drisana-iverson</loc><lastmod>2024-03-28T17:19Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/demos/medulla-cubecrusher</loc><lastmod>2022-07-18T23:43Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/olena-brugen</loc><lastmod>2022-10-03T16:24Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2022-10-18</loc><lastmod>2023-04-07T17:12Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2022-10-20</loc><lastmod>2022-10-20T23:30Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/publications/highly-automated-high-throughput-replication-yeast-based-logic-circuit-design</loc><lastmod>2022-10-21T20:40Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/nathan-ringo</loc><lastmod>2023-07-26T15:01Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/cybersecurity/grasp</loc><lastmod>2015-08-19T20:06Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/aron-smith-donovan</loc><lastmod>2022-10-24T21:06Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/staff/mark-berman</loc><lastmod>2022-11-28T18:46Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/extracting-associations-intersectional-identities-discourse-about-institution-nigeria</loc><lastmod>2023-04-06T18:10Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2023-08-28</loc><lastmod>2023-08-28T19:41Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2024-03-11</loc><lastmod>2024-03-12T18:30Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2024-03-20</loc><lastmod>2024-03-20T15:48Z</lastmod><changefreq>never</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2025-02-18</loc><lastmod>2025-02-21T20:37Z</lastmod><changefreq>yearly</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/news/2025-02-18-0</loc><lastmod>2025-02-21T20:39Z</lastmod><changefreq>yearly</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/research/cybersecurity/smite</loc><lastmod>2015-08-31T19:55Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/news/2025-02-21</loc><lastmod>2025-02-21T20:39Z</lastmod><changefreq>yearly</changefreq><priority>0.4</priority></url>
<url><loc>https://www.sift.net/publications/collective-ai-lifelong-learning-and-sharing-edge</loc><lastmod>2025-04-14T14:26Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/neo-fuzz</loc><lastmod>2025-04-14T14:28Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.sift.net/publications/sift-formal-methods-poster-darpa-resilient-software-systems-symposium</loc><lastmod>2025-07-30T13:58Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.sift.net/staff/autumn-kenyon</loc><lastmod>2026-04-01T21:17Z</lastmod><changefreq>daily</changefreq></url>
<url><loc>https://www.sift.net/research/linguistics-and-computational-etiquette/etiquette-quotient</loc><lastmod>2016-04-05T12:34Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/demos/etiquette-quotient</loc><lastmod>2015-08-21T22:25Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/linguistics-and-computational-etiquette/etiquette-avatars</loc><lastmod>2015-09-11T17:50Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/linguistics-and-computational-etiquette/e4d2</loc><lastmod>2016-01-12T16:53Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/linguistics-and-computational-etiquette/admire</loc><lastmod>2015-09-11T17:48Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/health-and-telemedicine/support</loc><lastmod>2015-08-31T20:21Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/human-performance-and-ux-innovations/ilsa</loc><lastmod>2015-09-11T17:51Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/linguistics-and-computational-etiquette/interactive-phrasebook</loc><lastmod>2015-09-11T17:49Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/demos/interactive-phrasebook</loc><lastmod>2015-08-21T22:24Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/linguistics-and-computational-etiquette/eyoda</loc><lastmod>2015-09-11T17:49Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/health-and-telemedicine/ansible</loc><lastmod>2022-02-11T16:31Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/demos/ansible</loc><lastmod>2015-08-21T22:24Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/health-and-telemedicine/calm</loc><lastmod>2015-08-31T20:23Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/health-and-telemedicine/napp</loc><lastmod>2015-09-16T16:56Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/demos/napp</loc><lastmod>2015-08-21T22:24Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/automated-planning-and-intent-recognition</loc><lastmod>2022-10-21T20:40Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/health-and-telemedicine/saga</loc><lastmod>2016-10-25T17:42Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/human-performance-and-ux-innovations/eladis</loc><lastmod>2015-08-28T18:55Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/il</loc><lastmod>2015-08-31T19:52Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/yappr</loc><lastmod>2020-09-22T22:38Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/human-performance-and-ux-innovations/conceive</loc><lastmod>2015-08-31T20:25Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/human-performance-and-ux-innovations/abiocor-console-evaluation</loc><lastmod>2015-08-26T18:54Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence/kulit</loc><lastmod>2015-08-31T18:05Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/human-performance-and-ux-innovations/cdakat</loc><lastmod>2015-08-26T18:55Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/planning/safe-p</loc><lastmod>2015-08-31T18:03Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/planning/hammer</loc><lastmod>2020-09-22T22:41Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/planning/deep-green</loc><lastmod>2020-09-22T22:44Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/playbook/loa3</loc><lastmod>2015-08-13T18:57Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/playbook/pvacs</loc><lastmod>2015-08-13T18:58Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/playbook/mica</loc><lastmod>2015-08-13T18:58Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/playbook/pup</loc><lastmod>2022-01-03T17:30Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/demos/playbook</loc><lastmod>2015-08-21T22:25Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/demos/saga</loc><lastmod>2015-08-21T22:24Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/playbook/puma</loc><lastmod>2015-08-13T18:57Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/playbook/tusc</loc><lastmod>2015-08-13T18:58Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/maintaining-psycho-social-health-way-mars-and-back</loc><lastmod>2022-02-11T16:31Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/research/artificial-intelligence</loc><lastmod>2025-04-15T14:23Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/high-level-‘tasking-interfaces’-uninhabited-combat-air-vehicles</loc><lastmod>2016-02-27T02:05Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/rotorcraft-pilot’s-associate-design-and-evaluation-intelligent-user-interface-cockpit</loc><lastmod>2015-08-26T20:09Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/tasking-interfaces-associate-systems-know-who’s-boss</loc><lastmod>2016-02-27T02:05Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/bridging-information-transfer-gap-measuring-goodness-information-“fit”</loc><lastmod>2015-07-28T16:37Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/“tasking”-interfaces-flexible-interaction-automation-keeping-operator-control</loc><lastmod>2016-02-27T02:03Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/rules-etiquette-or-how-mannerly-aui-should-comport-itself-gain-social-acceptance-and-be</loc><lastmod>2016-02-27T02:03Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/intelligent-user-interfaces-correspondence-domains-moving-iuis-‘-desktop’</loc><lastmod>2015-07-28T17:56Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/human-factor-complexity</loc><lastmod>2015-07-28T18:05Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/microsoft-paperclip-rotorcraft-pilots-associate-lessons-learned-fielding-adaptive</loc><lastmod>2015-08-26T20:09Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.sift.net/publications/exploring-culture-procedures</loc><lastmod>2015-07-28T18:18Z</lastmod><changefreq>never</changefreq></url>
</urlset>
