Filters








2,459 Hits in 4.0 sec

An Evidential Path Logic for Multi-Relational Networks [article]

Marko A. Rodriguez, Joe Geldart
2008 arXiv   pre-print
This article presents a non-bivalent, non-monotonic, evidential logic and reasoner that is an algebraic ring over a multi-relational network equipped with two binary operations that can be composed to  ...  Multi-relational networks are used extensively to structure knowledge.  ...  The primary contribution of this article is the application of evidential logics to multi-relational networks and the formulation of an algebraic evidential reasoner.  ... 
arXiv:0810.1481v2 fatcat:rjpf7h3jjvc2fjzydkruq7zcdu

Page 7122 of Mathematical Reviews Vol. , Issue 97K [page]

1997 Mathematical Reviews  
Summary: “An artificial social system is a set of restrictions on agents’ behaviors in a multi-agent environment.  ...  It is shown that an evidential structure has a natural representation as a two- column data table, and that from a given data table and any two attributes an evidential structure can be extracted.  ... 

Sharing end-user negative symptoms for improving overlay network dependability

Yongning Tang, Ehab Al-Shaer
2009 2009 IEEE/IFIP International Conference on Dependable Systems & Networks  
In this paper, we develop an evidential overlay fault diagnosis framework (called DigOver) to tackle these challenges.  ...  , and multi-layer complexity.  ...  In an overlay network, each enduser observation can be associated with a related overlay path (e.g., o 3 in Fig. 1 ), and thus can be represented as a set of components along the overlay path.  ... 
doi:10.1109/dsn.2009.5270328 dblp:conf/dsn/TangA09 fatcat:vpy4755uevbcbfixwligjhdjuy

Dynamic Anticipation and Completion for Multi-Hop Reasoning over Sparse Knowledge Graph [article]

Xin Lv, Xu Han, Lei Hou, Juanzi Li, Zhiyuan Liu, Wei Zhang, Yichi Zhang, Hao Kong, Suhui Wu
2020 arXiv   pre-print
Multi-hop reasoning has been widely studied in recent years to seek an effective and interpretable method for knowledge graph (KG) completion.  ...  On the other hand, the lack of evidential paths to target entities also makes the reasoning process difficult.  ...  Acknowledgments This work is supported by NSFC Key Projects (U1736204, 61533018), a grant from Institute for Guo Qiang, Tsinghua University (2019GQB0003), Alibaba and THUNUS NExT Co-Lab.  ... 
arXiv:2010.01899v1 fatcat:74sb43gf2rgghjx37fdvcgndva

Evidential Occupancy Grid Map Augmentation using Deep Learning [article]

Sascha Wirges, Felix Hartenbach, Christoph Stiller
2018 arXiv   pre-print
As input for our neural networks, we use a multi-layer grid map consisting of the three features detections, transmissions and intensity, each for ground and non-ground measurements.  ...  To accomplish this, we estimate motion between subsequent range sensor measurements and create an evidential 3D voxel map in an extensive post-processing step.  ...  Thus, a network with Depth D has 2D+1 Stacks. The maximum number of convolutions CL of a network path is greater or equal (2D+1)S.  ... 
arXiv:1801.05297v2 fatcat:z4u5tsl37fedlk3rcmpzg2cqgy

Inference in directed evidential networks based on the transferable belief model

Boutheina Ben Yaghlane, Khaled Mellouli
2008 International Journal of Approximate Reasoning  
In this paper, new algorithms based on these two rules are proposed for the propagation of belief functions in singly and multiply directed evidential networks.  ...  These rules make possible the use of conditional belief functions for reasoning in directed evidential networks, avoiding the computations of joint belief function on the product space.  ...  Special thanks to Mohsen Antit for his help.  ... 
doi:10.1016/j.ijar.2008.01.002 fatcat:scu6oswvfnapllzt7ig3yezp4i

A Model Towards Using Evidence from Security Events for Network Attack Analysis
english

Changwei Liu, Anoop Singhal, Duminda Wijesekera
2014 Proceedings of the 11th International Workshop on Security in Information Systems  
Constructing an efficient and accurate model from security events to determine an attack scenario for an enterprise network is challenging.  ...  In this paper, we discuss how to use the information obtained from security events to construct an attack scenario and build an evidence graph.  ...  However, even with this model, a logical attack graph is still too large even for a small network, since this reasoning engine traverses all possible derivation paths.  ... 
doi:10.5220/0004980300830095 dblp:conf/sis/LiuSW14 fatcat:ufwhjmgivfgj7fdehejrakslvy

Formal Modeling Techniques for Ambient Assisted Living

Guido Parente, Christopher D. Nugent, Xin Hong, Mark P. Donnelly, Liming Chen, Enrico Vicario
2010 Ageing International  
We consider the following formal modeling tools and techniques: fault trees, evidential reasoning, evidential ontology networks, temporal logic, hidden Markov models and partially observable Markov models  ...  This process may take a major role in the profiling of the patient (Atallah and Yang 2009), which in turn provides a basis for supporting decisions needed for effective Ageing Int  ...  Acknowledgements This work has been supported in part by the Centre for Intelligent Point of Care Sensors, funded by the Department for Education and Learning within Northern Ireland.  ... 
doi:10.1007/s12126-010-9086-8 fatcat:4wiolhbmuvd63grtfrec5klmbu

Intensional Cyberforensics [article]

Serguei A. Mokhov
2014 arXiv   pre-print
for the distributed evaluation of cyberforensic expressions.  ...  cyberforensics investigation process with backtracing of event reconstruction, in which evidence is modeled by multidimensional hierarchical contexts, and proofs or disproofs of claims are undertaken in an  ...  This includes configuring the multi-tier DMS (e.g., picking Jini or JMS middleware and their settings) to evaluate large evidential data collections, configuration of the DST, an the overall GIPSY network  ... 
arXiv:1312.0466v2 fatcat:q5ovtsdzt5hqbn7rxpiobhjgzi

Mobile Agent Based Trust Management Framework using Fuzzy Logic in B2C E-Business Environment

E. Sathiyamoorthy, N.Ch.S.N Iyengar, V. Ramachandran
2010 Journal of clean energy technologies  
The need for trust is no longer an option but a necessity when it comes to e-business environment since there are no direct person to person interactions.  ...  Trust is a major factor for the success of any business.  ...  Trust value for a node and risk propagation paths and calculated and using fuzzy logic a trusted decision is made regarding a node. A.  ... 
doi:10.7763/ijcte.2010.v2.157 fatcat:tkcjst7c6vfjdi3nbnko2p5g6u

Evidential Networks for Reliability Analysis and Performance Evaluation of Systems With Imprecise Knowledge

C. Simon, P. Weber
2009 IEEE Transactions on Reliability  
This paper deals with evidential networks to manage imprecise probabilities. We also extend utility functions to evidential networks.  ...  We apply evidential networks in reliability analysis with imprecise parameters and evaluate system performance with imprecise probabilities and utility functions.  ...  By enumerating the minimal cuts or the minimal success paths, the evidential network shown on figure 11 is obtained to evaluate the reliability of the bridge system.  ... 
doi:10.1109/tr.2008.2011868 fatcat:y2nlrwd3yje5pnqbpznlhnekhi

Explicit Reasoning over End-to-End Neural Architectures for Visual Question Answering [article]

Somak Aditya, Yezhou Yang, Chitta Baral
2018 arXiv   pre-print
In this paper, we present an explicit reasoning layer on top of a set of penultimate neural network based systems.  ...  Specifically, the reasoning layer adopts a Probabilistic Soft Logic (PSL) based engine to reason over a basket of inputs: visual relations, the semantic parse of the question, and background ontological  ...  For VQA, primarily a Convolutional Neural Network for images and a Recurrent Neural Network for text is used to embed into the same space and this combined representation is used to learn the mapping between  ... 
arXiv:1803.08896v1 fatcat:rgsih45c2rbthn6tw4ffwjth4q

Data- and knowledge-driven mineral prospectivity maps for Canada's North

J.R. Harris, E. Grunsky, P. Behnia, D. Corrigan
2015 Ore Geology Reviews  
Mineral Prospectivity Mapping (MPM) is a multi-step process that ranks a promising target area for more exploration.  ...  Motivated by the recent successful results of using GIS modeling in a variety of problems related to the geosciences, some knowledge-based methods were applied to a regional scale mapping of the mineral  ...  A scene of Landsat Enhanced Thematic Mapper plus (ETM + data, path 159, row 36, date 2000) and advanced space-borne thermal emission and reflection radiometer (ASTER, 2001) are used for an enhancing alteration  ... 
doi:10.1016/j.oregeorev.2015.01.004 fatcat:oulgon2r6fgmbmsv6cbtywnzau

Using Dempster-Shafer Theory of Evidence for Situation Inference [chapter]

Susan McKeever, Juan Ye, Lorcan Coyle, Simon Dobson
2009 Lecture Notes in Computer Science  
We also describe a set of evidential operations for sensor mass functions using context quality and evidence accumulation for temporal situation detection.  ...  Given the uncertain nature of sensor information and inference rules, reasoning techniques that cater for uncertainty hold promise for enabling the inference process.  ...  We can use compatibility relations to dene paths for transferring belief from one layer of the situation hierarchy to the next.  ... 
doi:10.1007/978-3-642-04471-7_12 fatcat:3dadl4d5vbhfdgwhoydz6mhqua

A Prototypical System for Soft Evidential Update

Young-Gyun Kim, Marco Valtorta, Jiří Vomlel
2004 Applied intelligence (Boston)  
Autonomous agents that communicate using probabilistic information and use Bayesian networks for knowledge representation need an update mechanism that goes beyond conditioning on the basis of evidence  ...  In a related paper describe this mechanism, which we call soft evidential update, its properties, and algorithms to realize it.  ...  In this paper, we describe BC-Hugin, 1 a program that implements soft evidential update (for Bayesian networks).  ... 
doi:10.1023/b:apin.0000027768.02013.54 fatcat:wkau7s57kjgcbnlo4iualwyfhm
« Previous Showing results 1 — 15 out of 2,459 results