A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
Filters
Fuzzy Logic Applications for Knowledge Discovery: a Survey
2011
International Journal of Advancements in Computing Technology
In this paper, we present a survey on Fuzzy Logic (FL) applications for Knowledge Discovery (KD), focusing on Information Retrieval (IR) and Information Extraction (IE). ...
We introduce a huge variety of FL applications, using the two main existing approaches: the applications based on the Vector Space Model (VSM); and the applications based on ontologies. ...
Table 1 . 1 Vector Space Model applications for queries Fuzzy Logic Applications for Knowledge Discovery: a Survey Jorge Ropero, Carlos León, Alejandro Carrasco, Ariel Gómez, Octavio Rivera International ...
doi:10.4156/ijact.vol3.issue6.22
fatcat:j2d7fl6irzgvbn2qualdgshuqq
Integration of FCA with Fuzzy logic : A survey
2021
Multidiszciplináris Tudományok
In this paper, we will introduce a survey of the research papers on integrating FCA with fuzzy logic. ...
papers on employing FCA with fuzzy logic in knowledge discovery in databases and data mining, information retrieval and ontology engineering. ...
Applications area In this part, we will introduce a survey of the papers on using formal concept analysis with fuzzy logic in several domains like information retrieval, knowledge discovery in databases ...
doi:10.35925/j.multi.2021.5.41
fatcat:jedvhkulkfgg5d4bp6dw6yiwsu
A tutorial on default logics
1999
ACM Computing Surveys
This paper provides a tutorial-style introduction to some important approaches of Default Logic. ...
Default Logic is one of the most prominent approaches to nonmonotonic reasoning, and allows one to make plausible conjectures when faced with incomplete information about the problem at hand. ...
Default Logic can be used either to model reasoning with incomplete information, which was the original motivation, or as a formalism which enables compact representation of information [Cadoli et al. ...
doi:10.1145/344588.344602
fatcat:u7c4nzh6obduboul4hywtbr5ta
Logic and Databases: A Deductive Approach
1984
ACM Computing Surveys
The purpose of this paper is to show that logic provides a convenient formalism for studying classical database problems. ...
The second part deals mainly with the representation and manipulation of deduced facts and incomplete information. ...
Support for the work on this paper was received by Herv~ Gallaire from Compagnie G~n~rale d'l~lectricit~ ...
doi:10.1145/356924.356929
fatcat:ecummytddreebcif2pnfzp4td4
Forgetting in Answer Set Programming – A Survey
2021
Theory and Practice of Logic Programming
Each such approach was developed to address some particular view on forgetting, aimed at obeying a specific set of properties deemed desirable in such view, but a comprehensive and uniform overview of ...
Forgetting – or variable elimination – is an operation that allows the removal, from a knowledge base, of middle variables no longer deemed relevant. ...
This work was partially supported by FCT project FORGET (PTDC/CCI-INF/32219/2017) and by FCT project NOVA LINCS (UIDB/04516/2020). ...
doi:10.1017/s1471068421000570
fatcat:lov3susm6nbz3pu7jkzbiwv6dm
Solving Relational and First-Order Logical Markov Decision Processes: A Survey
[chapter]
2012
Adaptation, Learning, and Optimization
The field was recently surveyed completely in (van Otterlo, 2009b) , and here we describe a large portion of the main approaches. ...
In this chapter we survey representations and techniques for Markov decision processes, reinforcement learning, and dynamic programming in worlds explicitly modeled in terms of objects and relations. ...
Exact Model-Based Algorithms Exact model-based algorithms for RMDPs implement the four components of DTR in a specific logical formalism. ...
doi:10.1007/978-3-642-27645-3_8
fatcat:6yt5v5gbj5gsjab74lu6jypcxu
Survey on JavaScript security policies and their enforcement mechanisms in a web browser
2013
The Journal of Logic and Algebraic Programming
The dynamism of web applications is provided by the use of web scripts, and in particular JavaScript, that accesses this information through a browserprovided set of APIs. ...
Among all the works on web browser security, we survey dynamic techniques based on runtime monitoring as well as secure information flow techniques. ...
The first formal model of runtime monitor was proposed by Schneider [55] and is called security automaton. ...
doi:10.1016/j.jlap.2013.05.001
fatcat:5pntdqk5fnasnpmjvfgsgkk5za
A Survey of Contributions to Fuzzy Logic and Its Applications to Artificial Intelligence at the IIIA
[chapter]
2015
Studies in Fuzziness and Soft Computing
In this article, we survey some of the most relevant results related to Fuzzy Logic and Fuzzy AI Systems that we have obtained since the initiation of our research activities in 1985. ...
In this article, we survey some of the most relevant 6 results related to Fuzzy Logic and Fuzzy AI Systems that we have obtained since the 7 initiation of our research activities in 1985. 8 Keywords Artificial ...
A Survey of Contributions to Fuzzy Logic and Its Applications …
9
capabilities provided by CBR allow the system to retrieve those notes in the case base
292
of expressive examples (human performances ...
doi:10.1007/978-3-319-16235-5_6
fatcat:yx5v6dfyp5gupeewfbkjh5kke4
Parallelism, concurrency and distribution in constraint handling rules: A survey
2018
Theory and Practice of Logic Programming
AbstractConstraint Handling Rules (CHR) is both an effective concurrent declarative programming language and a versatile computational logic formalism. ...
They are related by formal soundness results. Their correctness is proven as a correspondence between parallel and sequential computations. ...
Acknowledgements We thank the anonymous referees for their helpful, detailed and demanding suggestions on how to improve this survey. ...
doi:10.1017/s1471068418000078
fatcat:ze2r4fx3wjc5zfwlxlhkxiusta
A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols
2017
Journal of Logical and Algebraic Methods in Programming
Another example of a security notion is privacy. Formal symbolic models have proved their usefulness for analysing the security of protocols. ...
A secure communication has a different meaning depending on the underlying application. It ranges from the confidentiality of a data to e.g. verifiability in electronic voting systems. ...
This work has been partially supported by the ANR project Sequoia ANR-14-CE28-0030-01. ...
doi:10.1016/j.jlamp.2016.10.005
fatcat:cnsarg3ay5cr5begdjp7emmjx4
A Survey in Mathematical Language Processing
[article]
2022
arXiv
pre-print
Informal mathematical text underpins real-world quantitative reasoning and communication. ...
Developing sophisticated methods of retrieval and abstraction from this dual modality is crucial in the pursuit of the vision of automating discovery in quantitative science and mathematics. ...
However, proficient models may be somewhat logical by proxy through the very nature of selecting premises for mathematical reasoning chains. ...
arXiv:2205.15231v1
fatcat:vgozdvvqr5f6pihi2xewft6vcu
Biomedical question answering: A survey
2010
Computer Methods and Programs in Biomedicine
for the future research development in this critical area of intersection between Artificial Intelligence, Information Retrieval, and Biomedical Informatics. ...
Athenikos). cise answers to their questions, by employing Information Extraction (IE) and Natural Language Processing (NLP) techniques, instead of providing a large number of documents that are potentially ...
Approach Logic formalism/reasoning mechanism used Harabagiu et al. [38] FOL theorem prover using Q/A LFs Moldovan et al. ...
doi:10.1016/j.cmpb.2009.10.003
pmid:19913938
fatcat:tv4sel4llbcnjppnn7g2tygqze
From Cryptography to Logic Locking: A Survey on The Architecture Evolution of Secure Scan Chains
2021
IEEE Access
It is then followed by newer and more advanced methods introduced when logic obfuscation is in place and the adversary threat model is much stronger. ...
In this paper, we first show why a secure scan chain architecture is required when security primitives, like logic obfuscation, are in place. ...
Citation information: DOI 10.1109/ACCESS.2021.3080257, IEEE Access K. Z. Azar et al.: From Cryptography to Logic Obfuscation: A Survey on ... ...
doi:10.1109/access.2021.3080257
fatcat:tg7fcofqenb6dakqiwlt3q3kd4
Automated fact‐checking: A survey
2021
Language and Linguistics Compass
As online false information continues to grow, automated fact-checking has gained an increasing amount of attention in recent years. ...
Researchers in the field of Natural Language Processing (NLP) have contributed to the task by building fact-checking datasets, devising automated fact-checking pipelines and proposing NLP methods to further ...
Abumansour holds a scholarship from Taif University, Saudi Arabia. ...
doi:10.1111/lnc3.12438
fatcat:63crsybycvbkjgkmzeuxqitpay
Formal Concept Analysis and Information Retrieval – A Survey
[chapter]
2015
Lecture Notes in Computer Science
One of the first models to be proposed as a document index for retrieval purposes was a lattice structure, decades before the introduction of Formal Concept Analysis. ...
We think that this survey can help future endeavours of establishing FCA as a valuable alternative for modern IR systems. ...
Introduction Surveying the intersection of Formal Concept Analysis (FCA) [33] and Information Retrieval [3] is not an easy task. ...
doi:10.1007/978-3-319-19545-2_4
fatcat:ibbabj5khbecrj3zgvmalpb6ja
« Previous
Showing results 1 — 15 out of 61,127 results