Feature ranking and selection is a widely used approach in various applications of supervised dimensionality reduction in discriminative machine learning. Nevertheless there exists significant evidence on feature rank...
详细信息
Personalized applications are a two-edged sword. They are convenient and assist users by keeping the focus on relevant topics, but they are often black boxes and users typically do not know why certain entries appear ...
详细信息
This paper attempts to take a comprehensive look at the challenges of representing the spatio-temporal structures and dynamic processes that define a city’s overall characteristics. For the task of urban planning and...
详细信息
With growing popularity of ontologies as semantics-aware integration solutions, various ontology merging methods have been proposed. Each of them uses their own set of criteria to determine a desirable merge result. I...
详细信息
Ontologies are the prime way of organizing data in the Semantic Web. Often, it is necessary to combine several, independently developed ontologies to obtain a knowledge graph fully representing a domain of interest. T...
详细信息
Due to the mobility and frequent disconnections, the correctness of mobile interaction systems, such as mobile robot systems and mobile payment systems, are often difficult to analyze. This paper introduces three crit...
详细信息
Ontologies encode a community's understanding of a domain and are thus subjective. Different communities may create different models of overlapping domains. If they need to be integrated, this may cause problems: ...
详细信息
The Jaro-Winkler similarity is a widely used measure for the similarity of strings. We propose an efficient algorithm for the bounded search of similar strings in a large set of strings. We compared our approach to th...
详细信息
This paper makes two contributions to the verification of communication protocols by transition systems. Firstly, the paper presents a modeling of a cyclic communication protocol using a synchronized network of transi...
详细信息
ISBN:
(纸本)9781665426060
This paper makes two contributions to the verification of communication protocols by transition systems. Firstly, the paper presents a modeling of a cyclic communication protocol using a synchronized network of transition systems. This protocol enables seamless cryptographic rekeying embedded into cyclic messages. Secondly, we test the protocol using the model checking verification technique.
The XSD binary floating point datatypes are regularly used for precise numeric values in RDF. However, the use of these datatypes for knowledge representation can systematically impair the quality of data and, compare...
详细信息
暂无评论