Sciweavers

481 search results - page 27 / 97
» Validity of First-Order Knowledge Bases
Sort
View
PROVSEC
2010
Springer
13 years 5 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
FLAIRS
2000
13 years 9 months ago
Graph-Based Hierarchical Conceptual Clustering
Hierarchical conceptual clustering has been proven to be a useful data mining technique. Graph-based representation of structural information has been shown to be successful in kn...
Istvan Jonyer, Lawrence B. Holder, Diane J. Cook
IJMMS
1998
75views more  IJMMS 1998»
13 years 7 months ago
Knowledge modeling directed by situation-specific models
Clancey (1992) proposed the model-construction framework as a way to explain the reasoning of knowledge-based systems (KBSs), based on his realization that all KBSs construct impl...
Michel Benaroch
BMCBI
2007
151views more  BMCBI 2007»
13 years 7 months ago
A statistical method to incorporate biological knowledge for generating testable novel gene regulatory interactions from microar
Background: The incorporation of prior biological knowledge in the analysis of microarray data has become important in the reconstruction of transcription regulatory networks in a...
Peter Larsen, Eyad Almasri, Guanrao Chen, Yang Dai
AAAI
2006
13 years 9 months ago
Using an Ontology for Knowledge Acquisition
We describe an approach to distributed knowledge acquisition using an ontology. The ontology is used to represent and reason about soldier performance. These methods are embedded ...
Stacy Lovell, Webb Stacy