Sciweavers

2176 search results - page 71 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
RR
2010
Springer
14 years 8 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
CCS
2008
ACM
14 years 12 months ago
Verifiable functional purity in java
Proving that particular methods within a code base are functionally pure--deterministic and side-effect free--would aid verification of security properties including function inve...
Matthew Finifter, Adrian Mettler, Naveen Sastry, D...
EKNOW
2009
14 years 7 months ago
Towards a Context-Based Dialog Management Layer for Expert Systems
Knowledge engineering relies on a unified effort of two components for success: 1) a strong expert knowledge back-end, and 2) an effective user interface. We address the latter is...
Victor Chou Hung, Avelino J. Gonzalez, Ronald F. D...
EUSFLAT
2001
115views Fuzzy Logic» more  EUSFLAT 2001»
14 years 11 months ago
A cooperative coevolutionary algorithm for jointly learning fuzzy rule bases and membership functions
When a whole knowledge base must be derived for a fuzzy rule-based system, learning methods usually address this task with two or more sequential stages by separately designing ea...
Jorge Casillas, Oscar Cordón, Francisco Her...
DLOG
2007
15 years 5 days ago
Induction of Optimal Semi-distances for Individuals based on Feature Sets
Abstract. Many activities related to semantically annotated resources can be enabled by a notion of similarity among them. We propose a method for defining a family of semi-distan...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito