While considerable research effort has been put in the identification of technical vulnerabilities, such as buffer overflows or SQL injections, business logic vulnerabilities have drawn limited attention. logic vulner...
详细信息
Supply chain coordination (SCC) is nowadays one of the active research topic in Production and Operations Management (POM). this paper deals withthe development of a Fuzzy Consensus based Multi-Criteria approach dedi...
详细信息
Answer Set programming (ASP) is a powerful language for knowledge representation and reasoning. ASP is exploited in real-world applications and is also attracting the interest of industry thanks to the availability of...
详细信息
the Object Constraint Language (OCL) is becoming more and more popular for model-based engineering, in particular for the development of models and model transformations. OCL is supported by a variety of analysis tool...
详细信息
the fragment of propositional logic known as Horn theories plays a central role in automatedreasoning. the problem of enumerating the maximal models of a Horn theory (MAXMOD) has been proved to be computationally har...
详细信息
the object-oriented programming paradigm is a process of implementing a program by means of 'Objects' into which separate concerns are grouped. However, it does not map some types of concerns such as security,...
详细信息
the proceedings contain 51 papers. the special focus in this conference is on Aggregation Operators. the topics include: R Package to Handle Archimax or Any User-Defined Continuous Copula Construction: acopula;how to ...
ISBN:
(纸本)9783642391644
the proceedings contain 51 papers. the special focus in this conference is on Aggregation Operators. the topics include: R Package to Handle Archimax or Any User-Defined Continuous Copula Construction: acopula;how to Prove Sklar’s theorem;OM3: Ordered Maxitive, Minitive, and Modular Aggregation Operators: Axiomatic Analysis under Arity-Dependence (I);OM3: Ordered Maxitive, Minitive, and Modular Aggregation Operators. A Simulation Study (II);Duplication in OWA-Generated Positional Aggregation Rules;Application of OWA Operators in the L-Fuzzy Concept Analysis;Norm Aggregations and OWA Operators;migrativity of Uninorms over T-norms and T-conorms;additive Generators of Overlap Functions;aggregation Operators and Observable Properties of Human reasoning;continuous T-norms and T-conorms Satisfying the Principle of Inclusion and Exclusion;on Mulholland Inequality and Dominance of Strict Triangular Norms;distributivity Equation in the Class of Noncommutative T-Operators;on Some Classes of Discrete Additive Generators;the Consensus Functional Equation in Agreement theory;a Discriminative Dynamic Index Based on Bipolar Aggregation Operators for Supporting Dynamic Multi-criteria Decision Making;social Choice Voting with Linguistic Preferences and Difference in Support;calibration of Utility Function;uncertain Choices: A Comparison of Fuzzy and Probabilistic Approaches;bayes theorem, Uninorms and Aggregating Expert Opinions;copulas, Tail Dependence and Applications to the Analysis of Financial Time Series;on the Induction of New Fuzzy Relations, New Fuzzy Operators and their Aggregation;comparison of Different Algorithms of Approximation by Extensional Fuzzy Subsets;on the Symmetrization of Quasi-metrics: An Aggregation Perspective;aggregation Operators and Quadric Hypersurfaces;an Analysis of Bilevel Linear programming Solving Parameters Based on Factoraggregation Approach;compatible Group Decisions.
Declarative techniques such as Constraint programming are very useful in modeling complex requirements. they have the added benefit of being executable specifications and, when properly tuned, high-performance ones. I...
详细信息
ISBN:
(纸本)9781467329125
Declarative techniques such as Constraint programming are very useful in modeling complex requirements. they have the added benefit of being executable specifications and, when properly tuned, high-performance ones. In this paper we argue that Information Systems ought to include constraint-based techniques in their design and implementation. We support this claim by introducing tools based on constraint programming, which we apply to an actual use-case: the academic timetable construction and maintenance problem, as developed at the University of Evora. the system we built was implemented using the GNU Prolog language. Moreover, Constraints have the potential to describe global properties that a model must observe, which makes them a semantically very interesting extension to the capabilities of present model-driven techniques and tools.
the main contribution of the paper is a PTIME decision procedure for the satisfiability problem in a class of first-order Horn clauses. Our result is an extension of the tractable classes of Horn clauses of Basin &...
详细信息
A new approach for the botnet detection based on multi-agent system is proposed. For increasing of the efficiency of botnet detection the multi-agent system was involved that allowed to make botnet detection via agent...
详细信息
A new approach for the botnet detection based on multi-agent system is proposed. For increasing of the efficiency of botnet detection the multi-agent system was involved that allowed to make botnet detection via agents' communication within corporate network. A new technique withthe usage of fuzzy and neural-fuzzy systems that makes the conclusion about botnet presence degree in computer systems is developed. the analysis of the botnets' actions demonstrations in the situation of the intentionally computer system reconnection is performed. It takes into account the botnet demonstrations in the several computer systems which are available in the network.
暂无评论