The Internet Archive has a preservation copy of this work in our general collections.
The file type is application/pdf
.
Filters
An Evidential Path Logic for Multi-Relational Networks
[article]
2008
arXiv
pre-print
This article presents a non-bivalent, non-monotonic, evidential logic and reasoner that is an algebraic ring over a multi-relational network equipped with two binary operations that can be composed to ...
Multi-relational networks are used extensively to structure knowledge. ...
The primary contribution of this article is the application of evidential logics to multi-relational networks and the formulation of an algebraic evidential reasoner. ...
arXiv:0810.1481v2
fatcat:rjpf7h3jjvc2fjzydkruq7zcdu
Page 7122 of Mathematical Reviews Vol. , Issue 97K
[page]
1997
Mathematical Reviews
Summary: “An artificial social system is a set of restrictions on agents’ behaviors in a multi-agent environment. ...
It is shown that an evidential structure has a natural representation as a two- column data table, and that from a given data table and any two attributes an evidential structure can be extracted. ...
Sharing end-user negative symptoms for improving overlay network dependability
2009
2009 IEEE/IFIP International Conference on Dependable Systems & Networks
In this paper, we develop an evidential overlay fault diagnosis framework (called DigOver) to tackle these challenges. ...
, and multi-layer complexity. ...
In an overlay network, each enduser observation can be associated with a related overlay path (e.g., o 3 in Fig. 1 ), and thus can be represented as a set of components along the overlay path. ...
doi:10.1109/dsn.2009.5270328
dblp:conf/dsn/TangA09
fatcat:vpy4755uevbcbfixwligjhdjuy
Dynamic Anticipation and Completion for Multi-Hop Reasoning over Sparse Knowledge Graph
[article]
2020
arXiv
pre-print
Multi-hop reasoning has been widely studied in recent years to seek an effective and interpretable method for knowledge graph (KG) completion. ...
On the other hand, the lack of evidential paths to target entities also makes the reasoning process difficult. ...
Acknowledgments This work is supported by NSFC Key Projects (U1736204, 61533018), a grant from Institute for Guo Qiang, Tsinghua University (2019GQB0003), Alibaba and THUNUS NExT Co-Lab. ...
arXiv:2010.01899v1
fatcat:74sb43gf2rgghjx37fdvcgndva
Evidential Occupancy Grid Map Augmentation using Deep Learning
[article]
2018
arXiv
pre-print
As input for our neural networks, we use a multi-layer grid map consisting of the three features detections, transmissions and intensity, each for ground and non-ground measurements. ...
To accomplish this, we estimate motion between subsequent range sensor measurements and create an evidential 3D voxel map in an extensive post-processing step. ...
Thus, a network with Depth D has 2D+1 Stacks. The maximum number of convolutions CL of a network path is greater or equal (2D+1)S. ...
arXiv:1801.05297v2
fatcat:z4u5tsl37fedlk3rcmpzg2cqgy
Inference in directed evidential networks based on the transferable belief model
2008
International Journal of Approximate Reasoning
In this paper, new algorithms based on these two rules are proposed for the propagation of belief functions in singly and multiply directed evidential networks. ...
These rules make possible the use of conditional belief functions for reasoning in directed evidential networks, avoiding the computations of joint belief function on the product space. ...
Special thanks to Mohsen Antit for his help. ...
doi:10.1016/j.ijar.2008.01.002
fatcat:scu6oswvfnapllzt7ig3yezp4i
A Model Towards Using Evidence from Security Events for Network Attack Analysis
english
2014
Proceedings of the 11th International Workshop on Security in Information Systems
english
Constructing an efficient and accurate model from security events to determine an attack scenario for an enterprise network is challenging. ...
In this paper, we discuss how to use the information obtained from security events to construct an attack scenario and build an evidence graph. ...
However, even with this model, a logical attack graph is still too large even for a small network, since this reasoning engine traverses all possible derivation paths. ...
doi:10.5220/0004980300830095
dblp:conf/sis/LiuSW14
fatcat:ufwhjmgivfgj7fdehejrakslvy
Formal Modeling Techniques for Ambient Assisted Living
2010
Ageing International
We consider the following formal modeling tools and techniques: fault trees, evidential reasoning, evidential ontology networks, temporal logic, hidden Markov models and partially observable Markov models ...
This process may take a major role in the profiling of the patient (Atallah and Yang 2009), which in turn provides a basis for supporting decisions needed for effective Ageing Int ...
Acknowledgements This work has been supported in part by the Centre for Intelligent Point of Care Sensors, funded by the Department for Education and Learning within Northern Ireland. ...
doi:10.1007/s12126-010-9086-8
fatcat:4wiolhbmuvd63grtfrec5klmbu
Intensional Cyberforensics
[article]
2014
arXiv
pre-print
for the distributed evaluation of cyberforensic expressions. ...
cyberforensics investigation process with backtracing of event reconstruction, in which evidence is modeled by multidimensional hierarchical contexts, and proofs or disproofs of claims are undertaken in an ...
This includes configuring the multi-tier DMS (e.g., picking Jini or JMS middleware and their settings) to evaluate large evidential data collections, configuration of the DST, an the overall GIPSY network ...
arXiv:1312.0466v2
fatcat:q5ovtsdzt5hqbn7rxpiobhjgzi
Mobile Agent Based Trust Management Framework using Fuzzy Logic in B2C E-Business Environment
2010
Journal of clean energy technologies
The need for trust is no longer an option but a necessity when it comes to e-business environment since there are no direct person to person interactions. ...
Trust is a major factor for the success of any business. ...
Trust value for a node and risk propagation paths and calculated and using fuzzy logic a trusted decision is made regarding a node. A. ...
doi:10.7763/ijcte.2010.v2.157
fatcat:tkcjst7c6vfjdi3nbnko2p5g6u
Evidential Networks for Reliability Analysis and Performance Evaluation of Systems With Imprecise Knowledge
2009
IEEE Transactions on Reliability
This paper deals with evidential networks to manage imprecise probabilities. We also extend utility functions to evidential networks. ...
We apply evidential networks in reliability analysis with imprecise parameters and evaluate system performance with imprecise probabilities and utility functions. ...
By enumerating the minimal cuts or the minimal success paths, the evidential network shown on figure 11 is obtained to evaluate the reliability of the bridge system. ...
doi:10.1109/tr.2008.2011868
fatcat:y2nlrwd3yje5pnqbpznlhnekhi
Explicit Reasoning over End-to-End Neural Architectures for Visual Question Answering
[article]
2018
arXiv
pre-print
In this paper, we present an explicit reasoning layer on top of a set of penultimate neural network based systems. ...
Specifically, the reasoning layer adopts a Probabilistic Soft Logic (PSL) based engine to reason over a basket of inputs: visual relations, the semantic parse of the question, and background ontological ...
For VQA, primarily a Convolutional Neural Network for images and a Recurrent Neural Network for text is used to embed into the same space and this combined representation is used to learn the mapping between ...
arXiv:1803.08896v1
fatcat:rgsih45c2rbthn6tw4ffwjth4q
Data- and knowledge-driven mineral prospectivity maps for Canada's North
2015
Ore Geology Reviews
Mineral Prospectivity Mapping (MPM) is a multi-step process that ranks a promising target area for more exploration. ...
Motivated by the recent successful results of using GIS modeling in a variety of problems related to the geosciences, some knowledge-based methods were applied to a regional scale mapping of the mineral ...
A scene of Landsat Enhanced Thematic Mapper plus (ETM + data, path 159, row 36, date 2000) and advanced space-borne thermal emission and reflection radiometer (ASTER, 2001) are used for an enhancing alteration ...
doi:10.1016/j.oregeorev.2015.01.004
fatcat:oulgon2r6fgmbmsv6cbtywnzau
Using Dempster-Shafer Theory of Evidence for Situation Inference
[chapter]
2009
Lecture Notes in Computer Science
We also describe a set of evidential operations for sensor mass functions using context quality and evidence accumulation for temporal situation detection. ...
Given the uncertain nature of sensor information and inference rules, reasoning techniques that cater for uncertainty hold promise for enabling the inference process. ...
We can use compatibility relations to dene paths for transferring belief from one layer of the situation hierarchy to the next. ...
doi:10.1007/978-3-642-04471-7_12
fatcat:3dadl4d5vbhfdgwhoydz6mhqua
A Prototypical System for Soft Evidential Update
2004
Applied intelligence (Boston)
Autonomous agents that communicate using probabilistic information and use Bayesian networks for knowledge representation need an update mechanism that goes beyond conditioning on the basis of evidence ...
In a related paper describe this mechanism, which we call soft evidential update, its properties, and algorithms to realize it. ...
In this paper, we describe BC-Hugin, 1 a program that implements soft evidential update (for Bayesian networks). ...
doi:10.1023/b:apin.0000027768.02013.54
fatcat:wkau7s57kjgcbnlo4iualwyfhm
« Previous
Showing results 1 — 15 out of 2,459 results