Abstract. The paper refutes the general phenomenological argument that knowledge cannot be completely represented by symbols and, hence, symbolic AI does not work. Moreover, the vi...
— In this paper, we propose a new security metric for measuring resilience of a symmetric key distribution scheme in wireless sensor network. A polynomial-based and a novel compl...
: A method for discovering multi-head attributional rules in large databases is presented and illustrated by results from an implemented program. Attributional rules (a.k.a. attrib...
Abstract- This paper presents the results from a multiplecase study of knowledge management systems (KM -systems) in practical use. A set of general problem areas concerning the in...
11 A classical theorem by Ritt states that all the complete decomposition chains of a univariate polynomial satisfying a certain tameness condition have the same length. In this p...