360 Hits in 10.6 sec

Page 814 of Psychological Abstracts Vol. 89, Issue 2 [page]

2002 Psychological Abstracts  
(U Maryland, Dept of Computer Science, College Park, MD) Case-base maintenance by integrating case-in- dex revision and case-retention policies in a derivational replay framework.  ...  -Discusses case-base maintenance (CBM) policies for case index revision and case retention.  ... 

Retrieval, reuse, revision and retention in case-based reasoning

2005 Knowledge engineering review (Print)  
We then review a representative selection of CBR research in the past few decades on aspects of retrieval, reuse, revision, and retention.  ...  Case-based reasoning (CBR) is an approach to problem solving that emphasizes the role of prior experience during future problem solving (i.e., new problems are solved by reusing and if necessary adapting  ...  Muñoz-Avila (2001) looks at index revision (and case retention) policies in the context of a derivational replay framework.  ... 
doi:10.1017/s0269888906000646 fatcat:cqmqlatosrazvo7zo65xbpreye

Maintaining Case-Based Reasoners: Dimensions and Directions

David C. Wilson, David B. Leake
2001 Computational intelligence  
A set of dimensions for case-base maintenance, proposed by Leake and Wilson, provides a framework for understanding and expanding CBM research.  ...  This article presents such a framework by (1) refining and updating the earlier framework of dimensions for case-base maintenance, (2) applying the refined dimensions to the entire range of knowledge containers  ...  ACKNOWLEDGMENTS This research was supported in part by NASA under Award No. NCC 2-1035.  ... 
doi:10.1111/0824-7935.00140 fatcat:vec4tkw4sffx7ltg3nlbqtfbcq

Case-Base Maintenance [chapter]

2004 Foundations of Soft Case-Based Reasoning  
Muñoz-Avila 1999 presents a case retention policy based on retrieval bene ts to case-based planning.  ...  Additional policies aimed at case retention:.  ... 
doi:10.1002/0471644676.ch5 fatcat:wfgsccjlq5b6lhmmajwcvpuv7a

LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation

Frank Hessel, Lars Almon, Matthias Hollick
2022 ACM transactions on sensor networks  
We survey LoRaWAN security and follow a systematic and evolvable approach that can be dynamically updated.  ...  With this, we provide a tool to hardware manufacturers, software developers and providers, and network operators to achieve sustainable security for IoT deployments.  ...  All views on the security of LoRaWAN in our survey are generated based on a linked dataset.  ... 
doi:10.1145/3561973 fatcat:zpuopghu7zge3c5cgqtxcsgrd4

What Learning Systems do Intelligent Agents Need? Complementary Learning Systems Theory Updated

Dharshan Kumaran, Demis Hassabis, James L. McClelland
2016 Trends in Cognitive Sciences  
A causal role for replay in systems-level consolidation is supported by the finding that optogenetic blockage of CA3 output in transgenic mouse after learning in a contextual fear paradigm specifically  ...  of the Theory CLS theory [1] provided a framework within which to characterize the organization of learning in the brain (Figure 1, Key Figure) .  ...  Acknowledgments We are very grateful to Adam Cain for help with creating the figures and Greg Wayne and Nikolaus Kriegeskorte for comments on an earlier version of the paper.  ... 
doi:10.1016/j.tics.2016.05.004 pmid:27315762 fatcat:322rl7plsjhsnkwjx7cclyafoe

Light-Weight Composite Environmental Performance Indicators (LWC-EPI)

Naoum Jamous
2013 International Journal of Information Technologies and Systems Approach  
Acknowledgment Part of this research has been funded under the EC 7th Framework Program, in the context of the OEPI project (748735). The author is thankful for the support.  ...  The presented prototype has been developed together with a group of students in "Wissenschaftlicher Teamprojekt" at the Business Informatics chair, Faculty of Computer Science at the Otto-von-Guericke-Universität  ...  In the EMIS case, money is mainly invested for installing the tools, customization, training and maintenance.  ... 
doi:10.4018/jitsa.2013010102 fatcat:65bpkda5vzcrnfi5z3ix6z73re

Transforming African Education Systems in Science, Technology, Engineering, and Mathematics (STEM) Using ICTs: Challenges and Opportunities

Alcardo Alex Barakabitze, Anangisye William-Andey Lazaro, Neterindwa Ainea, Michael Hamza Mkwizu, Hellen Maziku, Alex Xavery Matofali, Aziza Iddi, Camillius Sanga
2019 Education Research International  
We first provide some of the challenges of integrating ICTs in education followed by a description of key past and current ICT initiatives supporting the adoption of ICTs in schools using a number of case  ...  We further present various ICT-based models for education, as a transformational approach towards integrating ICTs in AES.  ...  While that is the case, beyond the rhetoric and of great importance to policy makers in Africa, are basic questions related to the usage of ICTs in education and student outcomes, including retention and  ... 
doi:10.1155/2019/6946809 fatcat:ni4qe6dtebaynmqdlcii57ccie

D2.1 Dare Architecture and Technical Positioning

Malcolm Atkinson, Emanuele Casarotti, Malin Ewering, Rosa Filgueira, André Gemünd, Iraklis Klampanos, Antonis Koukourikos, Amrey Krause, Federica Magnoni, Andrea Pagani, Christian Pagé, Andreas Rietbrock (+2 others)
2018 Zenodo  
This includes a knowledge base, a workflows-as-a- sevice and a protected, persistent, pervasive provenance system.  ...  The deliverable summarises the reequirements, outlines an architecture and framework, reports progress with prototyping the platform and identifies the form of future implementations.  ...  This Collection pattern is manifest in individual entities in DARE. But it is also represented by indexes, by catalogues and in graph data bases.  ... 
doi:10.5281/zenodo.2613550 fatcat:s32p3orrerev5einzlmils34mu

Webinos Project Deliverable: Phase 2 Security Framework

Webinos Consortium
2012 Zenodo  
The webinos project defines and delivers an open source web application runtime compatible with a wide range of smart devices, including smartphones, tablets, PCs, in-car systems and set-top boxes.  ...  This document describes the security and privacy rational, threat model and architectural risk analysis used by the project.  ...  The integrity of photos and gallery must be assured as well, to avoid possible cases of vilification (e.g. by changing a photo with a modified one).  ... 
doi:10.5281/zenodo.1147031 fatcat:x53nqshe7jfqrnbq6urpvsj2ra

Architectural modifications to deployed software

A.S. Klusener, R. Lämmel, C. Verhoef
2005 Science of Computer Programming  
We share the lessons that we learned in this and other architectural modification projects.  ...  We illustrate these concerns by way of a real-world example where a deployed management information system required an invasive modification to make the system fit for future use.  ...  We are also grateful for the opportunity to discuss a real-world project that we carried out for an anonymous customer.  ... 
doi:10.1016/j.scico.2004.03.012 fatcat:kopjzqcmirdsljfwtgyhrf44n4

Ecosystem Modeling for Evaluation of Adaptive Management Policies in the Grand Canyon

Carl J. Walters, Josh Korman, Lawrence E. Stevens, Barry Gold
2000 Conservation ecology  
indicators Policy Predictions and Uncertainties Sustainability of policies for beach/habitat rebuilding Risks in assuming that physical habitat restoration will result in ecosystem restoration for native  ...  Introduction Approach to Modeling Multiscale Policy and Ecosystem Dynamics Key Submodels and Comparisons of Model Predictions to Data Physical Submodel Hydrology Sediment budget Camping beaches Temperature  ...  Acknowledgments Literature Cited Acknowledgments: We gratefully acknowledge the many scientists and managers who shared their ideas and opinions, data, and models in the development of the Grand Canyon  ... 
doi:10.5751/es-00222-040201 fatcat:f3ohiiuyanfqfcoq26exa6ze2q

The management of individuals with enduring moderate to severe mental health needs: a participatory evaluation of client journeys and the interface of mental health services with the criminal justice system in Cornwall

Susan Lea, Lynne Callaghan, Susan Eick, Margaret Heslin, John Morgan, Mark Bolt, Andrew Healey, Barbara Barrett, Diana Rose, Anita Patel, Graham Thornicroft
2015 Health Services and Delivery Research  
Stage 1: policy review and clinical audit to identify a sample of mental health service users who were in contact with the police.  ...  of Cornwall Partnership NHS Foundation Trust and Devon & Cornwall Police.SampleProportionate stratified random sampling identified a sample of 80 cases examined in the case-linkage study from the 538  ...  Service user involvement in this project was greatly enhanced by recruitment provided by Cornwall Health for Homeless and Coastline Housing, to whom we are very grateful.  ... 
doi:10.3310/hsdr03150 fatcat:jd2oflbzzvd7nkrscvckqdjyui

The Invisible Handshake: The Reemergence of the State in the Digital Environment

Michael D. Birnhack, Niva Elkin-Koren
2003 Social Science Research Network  
We argue that while assuming the role of a regulator, the State allowed private nodes of control to emerge and develop in the information environment.  ...  The article examines shifts in the role of the State in the information environment, and focuses on the recent, innovative, cooperation between the State and private parties.  ...  called for "a partnership between the Federal Government and private industry in combating the 'cyber menace' [and] a revised legal framework for the prosecution of 'hackers' and 'cyberterrorists'… ."  ... 
doi:10.2139/ssrn.381020 fatcat:j4ifdrgfgneqholpdytgdnvpr4

A Wholistic View of Continual Learning with Deep Neural Networks: Forgotten Lessons and the Bridge to Active and Open World Learning [article]

Martin Mundt, Yong Won Hong, Iuliia Pliushch, Visvanathan Ramesh
2020 arXiv   pre-print
Based on these forgotten lessons, we propose a consolidated view to bridge continual learning, active learning and open set recognition in deep neural networks.  ...  Our results show that this not only benefits each individual paradigm, but highlights the natural synergies in a common framework.  ...  In the ideal case, we would encourage future works to adopt our framework or take a similarly wholistic approach.  ... 
arXiv:2009.01797v2 fatcat:nxsj7utiqjehlkecknpadryd2i
« Previous Showing results 1 — 15 out of 360 results