Sciweavers

164 search results - page 18 / 33
» How to Model Operational Risk If You Must
Sort
View
88
Voted
WCRE
2003
IEEE
15 years 3 months ago
Fuzzy Extensions for Reverse Engineering Repository Models
Reverse Engineering is a process fraught with imperfections. The importance of dealing with non-precise, possibly inconsistent data explicitly when interacting with the reverse en...
Ulrike Kölsch, René Witte
72
Voted
ICWS
2009
IEEE
15 years 7 months ago
Composing Services for Third-party Service Delivery
This paper proposes a model-based technique for lowering the entrance barrier for service providers to register services with a marketplace broker, such that the service is rapidl...
Ingo Weber, Alistair Barros, Norman May, Jörg...
69
Voted
DEON
2004
Springer
15 years 3 months ago
On Obligations and Abilities
Abstract. In this paper, we combine deontic logic with Alternatingtime Temporal Logic (ATL) into a framework that makes it possible to model and reason about obligations and abilit...
Wojciech Jamroga, Wiebe van der Hoek, Michael Wool...
TDP
2010
124views more  TDP 2010»
14 years 8 months ago
Random Forests for Generating Partially Synthetic, Categorical Data
Abstract. Several national statistical agencies are now releasing partially synthetic, public use microdata. These comprise the units in the original database with sensitive or ide...
Gregory Caiola, Jerome P. Reiter
74
Voted
IJCAI
1989
14 years 11 months ago
Integrating Knowledge-Based System and Neural Network Techniques for Robotic Skill Acquisition
This paper describes an approach to robotic control that is patterned after models of human skill acquisition. The intent is to develop robots capable of learning how to accomplis...
David Handelman, Stephen Lane, Jack Gelfand