Filters








17,082 Hits in 7.8 sec

On Mathematical Proving

Petros Stefaneas, Ioannis M. Vandoulakis
2015 Journal of Artificial General Intelligence  
This paper outlines a logical representation of certain aspects of the process of mathematical proving that are important from the point of view of Artificial Intelligence.  ...  Further, we suggest a "loose" semantics for the proof-events, by means of Kolmogorov's calculus of problems.  ...  Acknowledgements The authors are also grateful to Dr Harry Foundalis and Prof Maricarmen Martinez Baldares (Universidad de los Andes, Colombia) for their constructive readings and valuable comments on  ... 
doi:10.1515/jagi-2015-0007 fatcat:yy5hetvknzgkbok5txg2xq4zwy

Efficient Construction of Behavior Graphs for Uncertain Event Data [article]

Marco Pegoraro and Merih Seran Uysal and Wil M.P. van der Aalst
2020 arXiv   pre-print
In this paper we present a novel approach to efficiently compute a graph representation of the behavior contained in an uncertain process trace.  ...  The discipline of process mining deals with analyzing execution data of operational processes, extracting models from event data, checking the conformance between event data and normative models, and enhancing  ...  Conclusions The construction of the behavior graph -a fundamental structure for the analysis of uncertain data in process mining -plays a key role as processing step for both process discovery and conformance  ... 
arXiv:2002.08225v5 fatcat:vtckcniikvbk5bo7aqchkps6ui

Efficient Time and Space Representation of Uncertain Event Data [article]

Marco Pegoraro, Merih Seran Uysal, Wil M.P. van der Aalst
2020 arXiv   pre-print
Process mining is a discipline which concerns the analysis of execution data of operational processes, the extraction of models from event data, the measurement of the conformance between event data and  ...  In this paper, we introduce a new approach to efficiently calculate a graph representation of the behavior contained in an uncertain process trace.  ...  In a previous paper [25] we introduced the concept of behavior graph for the representation of uncertain event data, together with a method to obtain such graphs.  ... 
arXiv:2010.00334v2 fatcat:d2b2ltavhzbh3krq2cfncew47m

Efficient Time and Space Representation of Uncertain Event Data

Marco Pegoraro, Merih Seran Uysal, Wil M. P. van der Aalst
2020 Algorithms  
Process mining is a discipline which concerns the analysis of execution data of operational processes, the extraction of models from event data, the measurement of the conformance between event data and  ...  In this paper, we introduce a new approach to efficiently calculate a graph representation of the behavior contained in an uncertain process trace.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/a13110285 fatcat:jhc7nlyo6rgfnnjrdm3s3bwoqy

PARADIS: Analysis of Transaction-Based Applications in Distributed Environments [chapter]

Christian Glasner, Edith Spiegl, Jens Volkert
2005 Lecture Notes in Computer Science  
The analysis of long running and distributed applications poses a great challenge to software developers. PARADIS is a novel tool that helps the programmer with accomplishing this task.  ...  It reconstructs the corresponding event graph from events collected during a program run and provides techniques to address the problems arising from large traces.  ...  The Institute of Graphics and Parallel Processing, at the Joh. Kepler University Linz/Austria was taking part as a consulting member.  ... 
doi:10.1007/11428848_16 fatcat:36xomwfidzgyfb3qaekyhxbymu

Using Song to Identify Cassin's Vireo Individuals. A Comparative Study of Pattern Recognition Algorithms [chapter]

Julio G. Arriaga, Hector Sanchez, Richard Hedley, Edgar E. Vallejo, Charles E. Taylor
2014 Lecture Notes in Computer Science  
In this paper, we present a comparative study on the application of pattern recognition algorithms to the identification of bird individuals from their song.  ...  A collection of experiments on the supervised classification of Cassin's Vireo individuals were conducted to identify the algorithm that produced the highest classification accuracy.  ...  This work was supported by the US National Science Foundation under Award Number 1125423 and by Consejo Nacional de Ciencia y Tecnología under Award Number I010/214/2012.  ... 
doi:10.1007/978-3-319-07491-7_30 fatcat:5l2augdiiffl5cddosxvtq2dhe

Network Pattern Analysis based Vulnerability Measurement using Attack Graph Hierarchical Visualization Approach

Abhishek Pipliya, Sachin Chirgaiya
2014 International Journal of Computer Applications  
This paper proposes a novel model NPA-VM approach for network vulnerability assessment using attack graphs and network metrics. The approach is capable of achieving its goal in real time.  ...  Most of the times these changes are performing the desired action but sometime the action or event is uncertain which let the systems performance down.  ...  Representation of component for this network pattern analysis based vulnerability measurement is given by attack graph.  ... 
doi:10.5120/17421-8218 fatcat:nmko5swiy5dr5iafateli4hvae

Time indeterminacy and spatio-temporal building transformations: an approach for architectural heritage understanding

Chiara Stefani, Livio De Luca, Philippe Véron, Michel Florenzano
2009 International Journal on Interactive Design and Manufacturing  
as a whole of static and unchangeable entities.  ...  Various aspects condition the analysis and the interpretation of cultural heritage.  ...  discussed: evolutions over time and varieties of sources. Moreover, it should envisage considering both different temporal granularities and lacks of information management.  ... 
doi:10.1007/s12008-009-0085-5 fatcat:wkanil6aovb5zgb5wziblcp75a

An Event Based Approach To Situational Representation [article]

Naveen Ashish, Dmitri Kalashnikov, Sharad Mehrotra, Nalini Venkatasubramanian
2009 arXiv   pre-print
Such a situation representation can then be used to support a multitude of applications including situation monitoring, analysis, and planning.  ...  In this paper, we make a case for an event based representation of situations where events are defined to be domain-specific significant occurrences in space and time.  ...  Both nodes and edges could have associated types that determine the associated attributes. Given a graph view, a graph-based query language can be used for querying and analysis for events.  ... 
arXiv:0906.4096v2 fatcat:5rp3yjpa5jbvrkelknq6qk2vom

Animated analysis of geoscientific datasets: An interactive graphical application

Peter Morse, Anya Reading, Christopher Lueg
2017 Computers & Geosciences  
Events characterised in this way are compared with conventional analysis, noting advantages and limitations of data analysis using animation and human interaction.  ...  It is also necessary to identify significant subsets of the data for more detailed analysis.  ...  Cape Sorell Waverider Buoy data are recorded and made available through a joint initiative Australian Bureau of Meterology/CSIRO Marine and Atmospheric Research initiative.  ... 
doi:10.1016/j.cageo.2017.07.006 fatcat:7deaq7l66nhu5dozexiymb6huu

The Valuation History of Danish Wind Power [article]

Henrik Bach Mortensen
2018 PhD series, Technical Faculty of IT and Design, ˜Aalborg=ålborgœ University  
Data Collection Tools A central component of this research is a qualitative content analysis of how the value of wind power has been framed through devices such as calculations and statements.  ...  Although I covered events prior to 1979 in this chapter, I use this year is the starting point for the x-axis, as it is the first year for which data on employees and exports is available 48 .  ...  Below is a table of the estimates for each of the costs for the early, middle and late period of the 39 years. The table that follows has the estimate for each of the individual years.  ... 
doi:10.5278/vbn.phd.tech.00040 fatcat:7p2rcenwzffltlvtcmjilm6x3a

Bayesian Learning of Causal Relationships for System Reliability [article]

Xuewen Yu, Jim Q. Smith, Linda Nichols
2020 arXiv   pre-print
In this paper, we will demonstrate how some aspects of established causal methodology can be translated via trees, and more specifically chain event graphs, into domain of reliability theory to help the  ...  This paper is informed by a detailed analysis of maintenance records associated with a large electrical distribution company.  ...  Acknowledgement This project is funded by the Engineering and Physical Sciences Research Council (EPSRC) and the statistics department of the University of Warwick. Professor Jim Q.  ... 
arXiv:2002.06084v1 fatcat:ampkai2uzja3phe3co476sf6dm

Conformance Checking over Uncertain Event Data [article]

Marco Pegoraro, Merih Seran Uysal, Wil M.P. van der Aalst
2020 arXiv   pre-print
Process mining techniques enable the process-centric analysis of data, including automatically discovering process models and checking if event data conform to a given model.  ...  Finally, we show how upper and lower bounds for conformance can be obtained by aligning an uncertain trace onto a regular process model.  ...  We thank the Alexander von Humboldt (AvH) Stiftung for supporting our research interactions. We acknowledge Elisabetta Benevento for the valuable input.  ... 
arXiv:2009.14452v2 fatcat:dx3lw76ju5bw5dfhux7kx7lh7m

Improving Curated Web-Data Quality with Structured Harvesting and Assessment

Kevin Chekov Feeney, Declan O'Sullivan, Wei Tai, Rob Brennan
2014 International Journal on Semantic Web and Information Systems (IJSWIS)  
This paper describes a semi-automated process, framework and tools for harvesting, assessing, improving and maintaining high-quality linked-data.  ...  An analysis of the framework against these dimensions demonstrates that it addresses a broad range of real-world data quality concerns.  ...  renderings of the underlying graph data, for example see figure 4 .  ... 
doi:10.4018/ijswis.2014040103 fatcat:opkyzxp5cbdz3gkdm77heaavoi

Research on Multi-Target Network Security Assessment with Attack Graph Expert System Model

Yunpeng Li, Xi Li, Yi-Zhang Jiang
2021 Scientific Programming  
, and the research status of qualitative and quantitative analysis technology of attack graph in network security assessment.  ...  Searching for practical security risk assessment methods is a research hotspot in the field of network security. Network attack graph model is an active detection technology for the attack path.  ...  is obtained, only the key nodes in the attack graph are used for quantitative analysis and security analysis, and the results are uncertain.  ... 
doi:10.1155/2021/9921731 fatcat:o2jcewlhnnaktfk4pv7vplaoaa
« Previous Showing results 1 — 15 out of 17,082 results