th This volume contains the papers presented at the 13 International Conference on Knowledge Engineering and Knowledge Management (EKAW 2002) held in Sig enza, Spain, October 1-4, 2002. Papers were invited on topics r...
详细信息
ISBN:
(数字)9783540458104
ISBN:
(纸本)9783540442684
th This volume contains the papers presented at the 13 International Conference on Knowledge Engineering and Knowledge Management (EKAW 2002) held in Sig enza, Spain, October 1-4, 2002. Papers were invited on topics related to Knowledge Acquisition, Knowledge Management, Ontologies, and the Semantic Web. A total of 110 papers were submitted. Each submission was evaluated by at least two reviewers. The selection process has resulted in the acceptance of 20 long and 14 short papers for publication and presentation at the conference; an acceptance rate of about 30%. In addition, one invited paper by a keynote speaker is included. This volume contains 8 papers on Knowledge Acquisition, 4 about Knowledge Management, 16 on Ontologies, and 6 papers about the Semantic Web. This was the second time (EKAW 2000 being the first) that the event was organized as a conference rather than as the usual workshop (hence the acronym: European Knowledge Acquisition Workshop). The large number of submissions (110 versus the usual 40-60) is an indication that the scientific community values EKAW as an important event to share experiences in the Knowledge Technology area, worthy of being organized as a prestigious international conference. Knowledge is the fuel of the upcoming Knowledge Economy. Therefore, we believe that conferences such as EKAW, that focus on Knowledge Technologies, will continue to play a major role as a platform for sharing and exchanging experiences and knowledge between key players in the area.
This book constitutes the refereed proceedings of the 13th International Conference on Engineering appl.cations of Neural Networks, EANN 2012, held in London, UK, in September 2012. The 49 revised full papers presente...
详细信息
ISBN:
(数字)9783642329098
ISBN:
(纸本)9783642329081
This book constitutes the refereed proceedings of the 13th International Conference on Engineering appl.cations of Neural Networks, EANN 2012, held in London, UK, in September 2012. The 49 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers describe the appl.cations of neural networks and other computational intelligence approaches to intelligent transport, environmental engineering, computer security, civil engineering, financial forecasting, virtual learning environments, language interpretation, bioinformatics and general engineering.
This book constitutes the refereed proceedings of the 11th International Conference on Scalable Uncertainty Management, SUM 2017, which was held in Granada, Spain, in October 2017.
ISBN:
(数字)9783319675824
ISBN:
(纸本)9783319675817
This book constitutes the refereed proceedings of the 11th International Conference on Scalable Uncertainty Management, SUM 2017, which was held in Granada, Spain, in October 2017.
This book contains the revised and extended versions of selected papers from the 9th International Conference, ICAART 2017, held in Porto, Portugal, in February 24-26, *** 11 full papers were carefully reviewed and se...
详细信息
ISBN:
(数字)9783319935812
ISBN:
(纸本)9783319935805
This book contains the revised and extended versions of selected papers from the 9th International Conference, ICAART 2017, held in Porto, Portugal, in February 24-26, *** 11 full papers were carefully reviewed and selected from 158 initial submissions. The papers are organized in two tracks. The first focuses on agents, multi-agent systems, software platforms, distributed problem solving and distributed AI in general. The second track focuses mainly on artificial intelligence, knowledge representation, planning, learning, scheduling, perception, reactive AI systems, evolutionary computing, and other topics related to intelligent systems and computer intelligence.
Classifier systems are an intriguing approach to a broad range of machine learning problems, based on automated generation and evaluation of condi tion/action rules. Inreinforcement learning tasks they simultane...
详细信息
ISBN:
(数字)9780857294166
ISBN:
(纸本)9781852337704;9781447110583
Classifier systems are an intriguing approach to a broad range of machine learning problems, based on automated generation and evaluation of condi tion/action rules. Inreinforcement learning tasks they simultaneously address the two major problems of learning a policy and generalising over it (and re lated objects, such as value functions). Despite over 20 years of research, however, classifier systems have met with mixed success, for reasons which were often unclear. Finally, in 1995 Stewart Wilson claimed a long-awaited breakthrough with his XCS system, which differs from earlier classifier sys tems in a number of respects, the most significant of which is the way in which it calculates the value of rules for use by the rule generation system. Specifically, XCS (like most classifiersystems) employs a genetic algorithm for rule generation, and the way in whichit calculates rule fitness differsfrom earlier systems. Wilson described XCS as an accuracy-based classifiersystem and earlier systems as strength-based. The two differin that in strength-based systems the fitness of a rule is proportional to the return (reward/payoff) it receives, whereas in XCS it is a function of the accuracy with which return is predicted. The difference is thus one of credit assignment, that is, of how a rule's contribution to the system's performance is estimated. XCS is a Q learning system; in fact, it is a proper generalisation of tabular Q-learning, in which rules aggregate states and actions. In XCS, as in other Q-learners, Q-valuesare used to weightaction selection.
This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and appl.ed solutions for protecting major emerging threats in Critical Infrast...
详细信息
ISBN:
(数字)9783030000240
ISBN:
(纸本)9783030000233
This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and appl.ed solutions for protecting major emerging threats in Critical Infrastructures and their underlying networks. It presents a number of emerging endeavors, from newly adopted technical expertise in industrial security to efficient modeling and implementation of attacks and relevant security measures in industrial control systems; including advancements in hardware and services security, interdependency networks, risk analysis, and control systems security along with their underlying protocols.;Novel attacks against Critical Infrastructures (CI) demand novel security solutions. Simply adding more of what is done already (e.g. more thorough risk assessments, more expensive Intrusion Prevention/Detection Systems, more efficient firewalls, etc.) is simply not enough against threats and attacks that seem to have evolved beyond modern analyses and protection methods.;The knowledge presented here will help Critical Infrastructure authorities, security officers, Industrial Control Systems (ICS) personnel and relevant researchers to (i) get acquainted with advancements in the field, (ii) integrate security research into their industrial or research work, (iii) evolve current practices in modeling and analyzing Critical Infrastructures, and (iv) moderate potential crises and emergencies influencing or emerging from Critical Infrastructures.
The 7th International Conference on Product Focused Software Process Improvement (PROFES 2006) brought together researchers and industrial practitioners for reporting new research results and exchanging experiences an...
详细信息
ISBN:
(数字)9783540346838
ISBN:
(纸本)9783540346821
The 7th International Conference on Product Focused Software Process Improvement (PROFES 2006) brought together researchers and industrial practitioners for reporting new research results and exchanging experiences and findings in the area of process and product improvement. The focus of the conference was on understanding, evaluating, controlling, and improving the relationship between process improvement activities (such as the deployment of innovative defect detection processes) and their effects on products (such as improved product reliability and safety). Consequently, major topics of the conference included the evaluation of existing software process improvement (SPI) approaches in different contexts, the presentation of new or modified SPI approaches, and the relation between SPI and new development techniques or emerging appl.cation domains. The need for SPI is being widely recognized. Current trends in software intensive systems such as increased distribution of software development and growing dependability on software-intensive systems in everyday life emphasize this need. This implies the establishment of advanced process improvement capabilities and an adequate understanding of the impact of the processes on the generated products, services, and business value in different situations. Recent trends enforce the establishment of such capabilities: more and more products are being developed in distributed, global environments with many customer-supplier relations in the development chain. Outsourcing, off-shoring, near-shoring, and in-sourcing aggravate this trend. In addition, systems are being built from multiple disciplines (such as electronics, mechanics, and software). Supporting such distributed and multi-disciplinary development requires well-understood and accurately implemented development process interfaces, process synchronization, and process evolution.
暂无评论