Sciweavers

468 search results - page 22 / 94
» Symmetric majority rules
Sort
View
DKE
2008
208views more  DKE 2008»
14 years 10 months ago
Deploying defeasible logic rule bases for the semantic web
Logic is currently the target of the majority of the upcoming efforts towards the realization of the Semantic Web vision, namely making the content of the Web accessible not only t...
Efstratios Kontopoulos, Nick Bassiliades, Grigoris...
KDD
2003
ACM
156views Data Mining» more  KDD 2003»
15 years 10 months ago
Mining distance-based outliers in near linear time with randomization and a simple pruning rule
Defining outliers by their distance to neighboring examples is a popular approach to finding unusual examples in a data set. Recently, much work has been conducted with the goal o...
Stephen D. Bay, Mark Schwabacher
SIGSAND
2008
14 years 11 months ago
Advanced Reduction Rules for the Verification of EPC Business Process Models
: Conceptual business process models such as Event-driven Process Chains (EPCs) play an important role in the business process management life cycle. The problem in this context is...
Jan Mendling, Wil M. P. van der Aalst
IEAAIE
1995
Springer
15 years 1 months ago
Modelling Hybrid Rule/Frame-Based Expert Systems Using Coloured Petri Nets
High level Petri Nets have recently been used for many AI applications, particularly for modelling traditional rule-based expert systems. The major effect is to facilitate the ana...
Simon C. K. Shiu, James N. K. Liu, Daniel S. Yeung
ESWA
2006
78views more  ESWA 2006»
14 years 10 months ago
Subscription fraud prevention in telecommunications using fuzzy rules and neural networks
A system to prevent subscription fraud in fixed telecommunications with high impact on long-distance carriers is proposed. The system consists of a classification module and a pre...
Pablo A. Estévez, Claudio M. Held, Claudio ...