Sciweavers

3706 search results - page 43 / 742
» System Description: E-KRHyper
Sort
View
ACSW
2006
13 years 9 months ago
Description of bad-signatures for network intrusion detection
Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems...
Michael Hilker, Christoph Schommer
TABLEAUX
2007
Springer
14 years 1 months ago
Bounded Model Checking with Description Logic Reasoning
Abstract. Model checking is a technique for verifying that a finite-state concurrent system is correct with respect to its specification. In bounded model checking (BMC), the sys...
Shoham Ben-David, Richard J. Trefler, Grant E. Wed...
ISDA
2009
IEEE
14 years 2 months ago
Extending Datatype Restrictions in Fuzzy Description Logics
Fuzzy Description Logics (DLs) are a family of logics which allow the representation of (and the reasoning within) structured knowledge affected by vagueness. Although a relativel...
Fernando Bobillo, Umberto Straccia
WI
1989
13 years 12 months ago
Incremental Natural Language Description of Dynamic Imagery
Although image understanding and natural language processing constitute two major areas of AI, they have mostly been studied independentlyof each other. Only a few attempts have b...
Gerd Herzog, C.-K. Sung, Elisabeth André, W...
KRDB
2003
184views Database» more  KRDB 2003»
13 years 9 months ago
Some Practical Issues in Building a Hybrid Deductive Geographic Information System with a DL Component
We report about some preliminary issues from the DFG project “Description Logics and Spatial Reasoning” (“DLS”, DFG Grant NE 279/8-1), one of whose goals is to develop a p...
Michael Wessel