Sciweavers

2176 search results - page 71 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
RR
2010
Springer
15 years 1 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
CCS
2008
ACM
15 years 5 months ago
Verifiable functional purity in java
Proving that particular methods within a code base are functionally pure--deterministic and side-effect free--would aid verification of security properties including function inve...
Matthew Finifter, Adrian Mettler, Naveen Sastry, D...
EKNOW
2009
15 years 1 months ago
Towards a Context-Based Dialog Management Layer for Expert Systems
Knowledge engineering relies on a unified effort of two components for success: 1) a strong expert knowledge back-end, and 2) an effective user interface. We address the latter is...
Victor Chou Hung, Avelino J. Gonzalez, Ronald F. D...
EUSFLAT
2001
115views Fuzzy Logic» more  EUSFLAT 2001»
15 years 4 months ago
A cooperative coevolutionary algorithm for jointly learning fuzzy rule bases and membership functions
When a whole knowledge base must be derived for a fuzzy rule-based system, learning methods usually address this task with two or more sequential stages by separately designing ea...
Jorge Casillas, Oscar Cordón, Francisco Her...
DLOG
2007
15 years 5 months ago
Induction of Optimal Semi-distances for Individuals based on Feature Sets
Abstract. Many activities related to semantically annotated resources can be enabled by a notion of similarity among them. We propose a method for defining a family of semi-distan...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito