Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Vehicle production audit tests, warranty claims and car control unit data are stored in a central data warehouse for data mining analysis. Neural network based part failure rate es...
Matthias Grabert, Markus Prechtel, Tomas Hrycej, W...
A system that applies a method of knowledge-intensive case-based reasoning, for repair and prevention of unwanted events in the domain of offshore oil well drilling, has been deve...
Automatic case elicitation (ACE) is a learning technique in which a case-based reasoning system acquires knowledge automatically from scratch through repeated real-time trial and e...
Abstract. In this paper, we investigate two novel indexing schemes called DHS and D-HS+PSR(II) designed for use in case-based reasoning systems. D-HS is based on a matrix of cases ...