Sciweavers

227 search results - page 28 / 46
» Representing Incomplete Knowledge about Fuzzy Sets
Sort
View
ACSAC
2002
IEEE
14 years 14 days ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
ISMIR
2001
Springer
121views Music» more  ISMIR 2001»
13 years 12 months ago
Musical Works as Information Retrieval Entities: Epistemological Perspectives
Musical works form a key entity for music information retrieval. Explicit linkage of relationships among entities is critical for document-based information retrieval. Works conta...
Richard P. Smiraglia
APN
2005
Springer
14 years 1 months ago
Genetic Process Mining
The topic of process mining has attracted the attention of both researchers and tool vendors in the Business Process Management (BPM) space. The goal of process mining is to discov...
Wil M. P. van der Aalst, Ana Karla A. de Medeiros,...
EACL
1989
ACL Anthology
13 years 8 months ago
Dialog Control in a Natural Language System
In this paper a method for controlling the dialog in a natural language (NL) system is presented. It provides a deep modeling of information processing based on time dependent pro...
Michael Gerlach, Helmut Horacek
CORR
2010
Springer
113views Education» more  CORR 2010»
13 years 7 months ago
A two-step fusion process for multi-criteria decision applied to natural hazards in mountains
Abstract--Mountain river torrents and snow avalanches generate human and material damages with dramatic consequences. Knowledge about natural phenomenona is often lacking and exper...
Jean-Marc Tacnet, Mireille Batton-Hubert, Jean Dez...