書目名稱Graph-Based Representation and Reasoning影響因子(影響力)學(xué)科排名
書目名稱Graph-Based Representation and Reasoning網(wǎng)絡(luò)公開度
書目名稱Graph-Based Representation and Reasoning網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Graph-Based Representation and Reasoning被引頻次
書目名稱Graph-Based Representation and Reasoning被引頻次學(xué)科排名
書目名稱Graph-Based Representation and Reasoning年度引用
書目名稱Graph-Based Representation and Reasoning年度引用學(xué)科排名
書目名稱Graph-Based Representation and Reasoning讀者反饋
書目名稱Graph-Based Representation and Reasoning讀者反饋學(xué)科排名
作者: 進(jìn)步 時(shí)間: 2025-3-21 23:05
https://doi.org/10.1007/978-3-030-96768-0ated using the Trafficking of Human Beings as an example. Real data is used to obtain results that show that weak signals of OC have been detected and corroborated, thus alerting to the possible presence of OC.作者: Cpr951 時(shí)間: 2025-3-22 03:13
Modeling and Simulating Bodies and Garmentsnvestigate correlations between similar page chains and the time granule when a certain pattern occurs. Finally, we employ tetradic FCA (4FCA) to compare web usage patterns wrt. temporal development and occurence. As far as we know, this is the first attempt to use 4FCA in web usage mining.作者: sacrum 時(shí)間: 2025-3-22 07:28
https://doi.org/10.1007/0-387-30486-Xsnows in Bilbao. We further argue that such conceptual contradictions correspond to the linguistic relation of concession (e.g., .) and we present a methodology for extracting defeasible common-sense beliefs (.) from Web data using concessive linguistic markers. We illustrate the methodology by mini作者: PRE 時(shí)間: 2025-3-22 10:41
Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike PaBecause of the scaling behavior of stability evaluation, our approach is only feasible on medium-sized data sets consisting of a few dozens of neurons recorded simultaneously for some seconds. We would therefore like to encourage investigations on how to improve this scaling, to facilitate research 作者: collagenase 時(shí)間: 2025-3-22 12:59
Organised Crime and Social Media: Detecting and Corroborating Weak Signals of Human Trafficking Onliated using the Trafficking of Human Beings as an example. Real data is used to obtain results that show that weak signals of OC have been detected and corroborated, thus alerting to the possible presence of OC.作者: collagenase 時(shí)間: 2025-3-22 20:43 作者: 宏偉 時(shí)間: 2025-3-22 23:41
Web-Mining Defeasible Knowledge from Concessional Statementssnows in Bilbao. We further argue that such conceptual contradictions correspond to the linguistic relation of concession (e.g., .) and we present a methodology for extracting defeasible common-sense beliefs (.) from Web data using concessive linguistic markers. We illustrate the methodology by mini作者: MUTED 時(shí)間: 2025-3-23 04:24
Ollivier Haemmerlé,Gem Stapleton,Catherine Faron Z作者: CESS 時(shí)間: 2025-3-23 08:01 作者: irreducible 時(shí)間: 2025-3-23 13:15 作者: ARCHE 時(shí)間: 2025-3-23 15:14 作者: wall-stress 時(shí)間: 2025-3-23 18:19
https://doi.org/10.1007/978-3-658-32213-7 Language Processing or customer associations analysis. While giving out numerous practical advantages, existing Games With a Purpose (GWAPs) for eliciting associative networks cannot be employed in certain domains (for example in customer associations analysis) due to the lack of profile based filt作者: 荒唐 時(shí)間: 2025-3-23 22:42 作者: REP 時(shí)間: 2025-3-24 02:52 作者: Kidney-Failure 時(shí)間: 2025-3-24 08:52
https://doi.org/10.1007/978-3-658-15486-8oices. An automated, knowledge-base driven approach to select from possible technology alternatives can replace or reduce manual effort in realizing these requirements. This motivated us to develop such a knowledge system which can ultimately help in opportune and cost-effective software development作者: Invertebrate 時(shí)間: 2025-3-24 14:24
Houda Derbel,Bassem Jarboui,Patrick Siarrye parallel computation of canonical bases. An important extension is the integration of expert interaction for . in order to explore implicational bases of inaccessible formal contexts. This paper presents and analyzes an algorithm that allows for ..作者: 不可接觸 時(shí)間: 2025-3-24 15:00 作者: Fallibility 時(shí)間: 2025-3-24 20:47
https://doi.org/10.1007/978-1-4613-0621-4 tend to be large numbers of students failing the class or dropping out during the first semesters. There is a substantial existing body of literature on this topic from a didactic perspective, but in our opinion an investigation from a semiotic-conceptual perspective could provide further insights 作者: Console 時(shí)間: 2025-3-25 00:26
https://doi.org/10.1007/978-3-030-96768-0es, used by members of the public in Social Media, can be treated as weak signals of OC, enabling information to be classified according to a taxonomy of OC. Formal Concept Analysis is used to group information sources, according to Crime and Location, thus providing a means of corroboration and cre作者: 閹割 時(shí)間: 2025-3-25 06:04 作者: 挖掘 時(shí)間: 2025-3-25 11:08 作者: decode 時(shí)間: 2025-3-25 14:50
https://doi.org/10.1007/0-387-27585-1resenting the knowledge needed, we enrich and populate it automatically with knowledge extracted from existing sources such as thesauri or classifications. The originality of our proposition is to propose ontological object candidates from existing sources according to their relatedness to the ontol作者: 不適 時(shí)間: 2025-3-25 18:35
https://doi.org/10.1007/0-387-30486-Xics. There have been numerous initiatives to mine common-sense facts from unstructured data, more specifically, from Web texts. However, common-sense knowledge is typically not explicitly stated in the text, as it is considered to be obvious, self-evident, and thus shared between writer and reader. 作者: 裁決 時(shí)間: 2025-3-25 21:50 作者: 割公牛膨脹 時(shí)間: 2025-3-26 00:56
Extracting Hierarchies of Closed Partially-Ordered Patterns Using Relational Concept Analysisial patterns that can be interpreted by domain experts. Our proposal is to transpose sequences within relational contexts, on which RCA can be applied. To help result analysis, we build closed partially-ordered patterns (cpo-patterns), that are synthetic and easy to read for experts. Each cpo-patter作者: delusion 時(shí)間: 2025-3-26 08:19
The Interpretation of Branching Time Diagramsdeveloped models with forwards branching and backwards linearity. Prior’s work on tense logic inspired several logicians during the 1960s, such as Nino Cochiarella (born 1933) and Henrik von Wright (1916–2003). Both of them questioned Prior’s idea of a linear past. In the present paper, we argue tha作者: objection 時(shí)間: 2025-3-26 10:22
Extending GWAPs for Building Profile Aware Associative Networks Language Processing or customer associations analysis. While giving out numerous practical advantages, existing Games With a Purpose (GWAPs) for eliciting associative networks cannot be employed in certain domains (for example in customer associations analysis) due to the lack of profile based filt作者: 無(wú)效 時(shí)間: 2025-3-26 16:00
Representing Multi-scale Datalog, Using Hierarchical Graphson system that highlights a new type of rendering based on the additional expansion of relation nodes. Querying and integration capabilities of our approach are based on a FOL sound and complete homomorphism.作者: 充滿裝飾 時(shí)間: 2025-3-26 20:41 作者: thrombus 時(shí)間: 2025-3-27 00:57
SDDNet: A Semantic Network for Software Design and Development Domain Via Graph Databaseoices. An automated, knowledge-base driven approach to select from possible technology alternatives can replace or reduce manual effort in realizing these requirements. This motivated us to develop such a knowledge system which can ultimately help in opportune and cost-effective software development作者: 心神不寧 時(shí)間: 2025-3-27 02:17
Parallel Attribute Exploratione parallel computation of canonical bases. An important extension is the integration of expert interaction for . in order to explore implicational bases of inaccessible formal contexts. This paper presents and analyzes an algorithm that allows for ..作者: Ondines-curse 時(shí)間: 2025-3-27 07:39 作者: BLA 時(shí)間: 2025-3-27 09:37
A Semiotic-Conceptual Analysis of Conceptual Learning tend to be large numbers of students failing the class or dropping out during the first semesters. There is a substantial existing body of literature on this topic from a didactic perspective, but in our opinion an investigation from a semiotic-conceptual perspective could provide further insights 作者: 言外之意 時(shí)間: 2025-3-27 17:15
Organised Crime and Social Media: Detecting and Corroborating Weak Signals of Human Trafficking Onlies, used by members of the public in Social Media, can be treated as weak signals of OC, enabling information to be classified according to a taxonomy of OC. Formal Concept Analysis is used to group information sources, according to Crime and Location, thus providing a means of corroboration and cre作者: GLUT 時(shí)間: 2025-3-27 19:47
Distilling Conceptual Structures from Weblog Data Using Polyadic FCAon. We consider the problem of distilling relevant conceptual structures from weblog data, more precisely, we investigate users’ behavioral patterns in an web based educational platform by using .-adic FCA (.). We focus in our research on log data gathered from e-learning platforms. Such systems are作者: Provenance 時(shí)間: 2025-3-28 00:57 作者: jealousy 時(shí)間: 2025-3-28 03:28
Knowledge Engineering Method Based on Consensual Knowledge and Trust Computation: The MUSCKA Systemresenting the knowledge needed, we enrich and populate it automatically with knowledge extracted from existing sources such as thesauri or classifications. The originality of our proposition is to propose ontological object candidates from existing sources according to their relatedness to the ontol作者: Credence 時(shí)間: 2025-3-28 09:46 作者: 消音器 時(shí)間: 2025-3-28 13:01
https://doi.org/10.1007/978-3-642-32229-7n is associated to a concept extent which is a set of temporal objects. Moreover, RCA allows to build hierarchies of cpo-patterns with two generalisation levels, regarding the structure of cpo-patterns and the items. The benefits of our approach are discussed with respect to pattern structures.作者: intrigue 時(shí)間: 2025-3-28 16:50 作者: 使高興 時(shí)間: 2025-3-28 20:30
https://doi.org/10.1007/978-3-030-25958-7ses are explored in order to study the feasibility and usefulness of G-FCA. We consider two use cases. The first one extracts linguistic structures from parse trees, comparing two graph models. The second one extracts workflow patterns from cooking recipes, highlighting the benefits of n-ary relationships and concepts.作者: ALIEN 時(shí)間: 2025-3-29 00:30 作者: 有權(quán) 時(shí)間: 2025-3-29 03:18 作者: integral 時(shí)間: 2025-3-29 07:42 作者: Limited 時(shí)間: 2025-3-29 14:26 作者: 諂媚于性 時(shí)間: 2025-3-29 19:05
Knowledge Engineering Method Based on Consensual Knowledge and Trust Computation: The MUSCKA Systemogical module and to their trust score. This paper describes the trust measures we propose which are obtained by analysing the consensus found in existing sources. We consider that knowledge is more reliable if it has been extracted from several sources. Our measures has been evaluated on a real case study with experts from the agriculture domain.作者: Obligatory 時(shí)間: 2025-3-29 21:38 作者: 笨重 時(shí)間: 2025-3-30 03:07 作者: 征稅 時(shí)間: 2025-3-30 06:59
https://doi.org/10.1007/978-3-658-32213-7KAT (Knowledge AcquisiTion) game that extends upon the state of the art by considering agent profiling. We formalise the game, implement it and carry out a pilot study that validates the above mentioned research hypothesis.作者: 旁觀者 時(shí)間: 2025-3-30 08:46
https://doi.org/10.1007/978-3-658-15486-8ions between concepts found in Software Design and Development (SDD) domain is constructed from the database. This knowledge-base can be queried for deducing additional facts about the concepts stored therein.作者: PAN 時(shí)間: 2025-3-30 14:02
https://doi.org/10.1007/978-1-4613-0621-4iotic analysis of the representations is often missing from didactic theories. And in particular, as far as we know, there are not yet any formal mathematical approaches to modelling learning difficulties with respect to semiotic and conceptual structures. Semiotic-Conceptual Analysis (SCA) as presented in this paper aims to fill that niche.作者: 憤慨一下 時(shí)間: 2025-3-30 17:21
https://doi.org/10.1007/0-387-34167-6to play a key role as the representation layer of the querying and simulation systems of the project. This leads to the possibility of comparing different production scenarios and suggesting improvements.作者: Maximizer 時(shí)間: 2025-3-30 22:03 作者: 四牛在彎曲 時(shí)間: 2025-3-31 01:26
SDDNet: A Semantic Network for Software Design and Development Domain Via Graph Databaseions between concepts found in Software Design and Development (SDD) domain is constructed from the database. This knowledge-base can be queried for deducing additional facts about the concepts stored therein.作者: Clinch 時(shí)間: 2025-3-31 06:38 作者: conference 時(shí)間: 2025-3-31 12:47
, – A Multi-scale and Multi-step Ontology for Transformation Processes: Application to Micro-Organisto play a key role as the representation layer of the querying and simulation systems of the project. This leads to the possibility of comparing different production scenarios and suggesting improvements.作者: 感染 時(shí)間: 2025-3-31 14:56 作者: Deduct 時(shí)間: 2025-3-31 21:05 作者: SPER 時(shí)間: 2025-3-31 22:17
Houda Derbel,Bassem Jarboui,Patrick Siarrye parallel computation of canonical bases. An important extension is the integration of expert interaction for . in order to explore implicational bases of inaccessible formal contexts. This paper presents and analyzes an algorithm that allows for ..