Sciweavers

411 search results - page 10 / 83
» Evaluation and exploitation of knowledge robustness in knowl...
Sort
View
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 4 months ago
A Preliminary Model for Generating Experience Knowledge Based Artifacts
Inspections provide an effective way of acquiring and reusing experience knowledge. Several details, in both the inspection processes and the inspection event itself, can be found...
Jouni Kokkoniemi
ESWA
2006
243views more  ESWA 2006»
14 years 10 months ago
Knowledge based crime scenario modelling
A crucial concern in the evaluation of evidence related to a major crime is the formulation of sufficient alternative plausible scenarios that can explain the available evidence. ...
Jeroen Keppens, Burkhard Schafer
IPPS
2007
IEEE
15 years 4 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
KCAP
2003
ACM
15 years 3 months ago
Building large knowledge bases by mass collaboration
Acquiring knowledge has long been the major bottleneck preventing the rapid spread of AI systems. Manual approaches are slow and costly. Machine-learning approaches have limitatio...
Matthew Richardson, Pedro Domingos
DLOG
2007
15 years 7 days ago
Exploiting Description Logic Reasoners in Inductive Logic
In spite of the increasing effort spent on building ontologies for the Semantic Web, little attention has been paid to the impact of these ontologies on knowledge-based intelligen...
Francesca A. Lisi