Filters








439 Hits in 5.9 sec

The Use of Explanations in Knowledge-Based Systems: Cognitive Perspectives and a Process-Tracing Analysis

2000 Journal of Management Information Systems  
THE USE OF EXPLANATIONS IN KNOWLEDGE-BASED SYSTEMS _ 169 Table 4.  ...  to that THE USE OF EXPLANATIONS IN KNOWLEDGE-BASED SYSTEMS _ 167 Table 2.  ... 
doi:10.1080/07421222.2000.11045646 fatcat:3vf3s3oe7bbnfjzidrymg4cxne

Operationalization SECI Model of Knowledge Management by Enterprise Ontology

Jan Andreasik
2019 Barometr Regionalny. Analizy i Prognozy  
The paper contains the proposition of solving the problem of operationalization of the SECI model of knowledge creation in a new scope -i.e., in relation to knowledge about managing an SME enterprise in  ...  Keywords: operationalization of the SECI model, A-E-AE enterprise ontology, CBR system, semantic knowledge management model JEL: M15, O32  ...  "The Knowledge Generation about an Enterprise in the KBS-AE (Knowledge-Based System -Acts of Explanation) . " New Challenges in Computational Collective Intelligence 244: 85-94 .  ... 
doi:10.35480/braip-2019.17.1-723 fatcat:h4ck32khcbaivco62hkwkabus4

Stochastic analysis of the interplay between object maintenance and churn

Di Wu, Ye Tian, Kam-Wing Ng, Anwitaman Datta
2008 Computer Communications  
In this paper, we develop a simple model based on stochastic differential equations, with which we can analytically study the time-evolution of peer-to-peer storage systems under churn, and the interplay  ...  Due to the prevalence of peer dynamics (i.e., churn), object maintenance becomes a fundamental issue in peer-to-peer storage systems.  ...  Acknowledgment We thank Stefan Saroiu for kindly sharing the Gnutella lifetime traces.  ... 
doi:10.1016/j.comcom.2007.08.008 fatcat:3zlek2gcsbcstemokxwt2ebv2u

TPA Auditing to Enhance the Privacy and Security in Cloud Systems

Sunil Kumar, Dilip Kumar, Hemraj Shobharam Lamkuche
2021 Journal of Cyber Security and Mobility  
Over the last decade, many enterprises around the world migrating from traditional infrastructure to cloud resources in order to cut down operational and capital expenditure.  ...  The time complexity of our proposed system is less as compared with other TPA model.  ...  Confidence in the information society is based on a broad range of mathematics, intelligence and social explanations [12] . In particular, the cloud system degrades perimeter security awareness.  ... 
doi:10.13052/jcsm2245-1439.1033 fatcat:4wxp2zfs4fdoleg3riyh7vpmda

Leadership, levels of analysis, and déjà vu: Modest proposals for taxonomy and cladistics coupled with replication and visualization

Steven E. Markham
2010 Leadership Quarterly  
Their eighth proposition has to do with an alternative explanation based on a possible level of analysis effect.  ...  to be an effect based on whole companies.  ... 
doi:10.1016/j.leaqua.2010.10.011 fatcat:wqn2wxscy5b4zcb7uuak2mw3ku

Front Matter: Volume 9474

2015 Signal Processing, Sensor/Information Fusion, and Target Recognition XXIV  
The last two digits indicate publication order within the volume using a Base 36 numbering system employing both numerals and letters.  ...  SPIE uses a six-digit CID article numbering system in which: The first four digits correspond to the SPIE volume number.  ...  In fact, the simulation framework can generate attacks based on different combinations of the context models.  ... 
doi:10.1117/12.2202240 fatcat:h6ezdn7gkbgyxi732iaig3dfxa

On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions [article]

Sabah Suhail, Rasheed Hussain, Abid Khan, Choong Seon Hong
2020 arXiv   pre-print
In this paper, we investigate applications of one of the post-quantum signatures called Hash-Based Signature (HBS) schemes for the security of IoT devices in the quantum era.  ...  Consequently, trustworthy data act as fuel for applications that rely on the data generated by these things, for critical decision-making processes, data debugging, risk assessment, forensic analysis,  ...  or even hoard knowledge, resulting in limited access to quantum computing knowledge.  ... 
arXiv:2004.10435v1 fatcat:bx6g5lidlbatpdgd3omwfk22i4

Natural Language Processing methods and systems for biomedical ontology learning

Kaihong Liu, William R. Hogan, Rebecca S. Crowley
2011 Journal of Biomedical Informatics  
Limited resources result in missing concepts and relationships as well as difficulty in updating the ontology as knowledge changes.  ...  Methodologies developed in the fields of Natural Language Processing, information extraction, information retrieval and machine learning provide techniques for automating the enrichment of an ontology  ...  We thank the two anonymous reviewers of this whose insightful critiques and suggestions have helped us improve the quality and completeness of this review.  ... 
doi:10.1016/j.jbi.2010.07.006 pmid:20647054 pmcid:PMC2990796 fatcat:hnyc5k4iobdzpatclwihaiw4wu

S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES

Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2015 2015 IEEE Symposium on Security and Privacy  
We demonstrate the viability of the attack by targeting an OpenSSL1.0.1f implementation of AES.  ...  In contrast, our attack works in the spirit of the flush and reload attack targeting the shared L3 cache instead.  ...  ACKNOWLEDGEMENTS This work is supported by the National Science Foundation, under grant CNS-1318919. We would like to thank the anonymous reviewers of S&P 2015 for their helpful comments.  ... 
doi:10.1109/sp.2015.42 dblp:conf/sp/ApececheaES15 fatcat:yvu2nrgolfbcnb6hdjzl2ksteu

Upgrading of Symbolic and Synthetic Knowledge Bases: Analysis of the Architecture, Engineering and Construction Industry and the Automotive Industry in China

Jan van der Borg, Erwin van Tuijl
2011 Social Science Research Network  
W e su p p o r t o u r a r g u m e n t b y a n a ly s in g t h e p r o c e s s o f u p g r a d i n g in t w o in d u st r ie s in C h i n a : t h e AE C i n d u st r y ( in B e i j in g a n d S h a n g  ...  W it h in t h e se in d u s t r ie s w e f o c u s o n u p g r a d in g o n t w o le ve ls: w it h in f ir m s a n d w it h in p r o j e c t s.  ...  Moreover, and as an explanation for differences in upgrading between industries, we argue that the way of upgrading is dependent on the knowledge base used.  ... 
doi:10.2139/ssrn.1983882 fatcat:kzni42fmkzfirk2666zbulknpu

Extracting Multiple Viewpoint Models from Relational Databases [article]

Alessandro Berti, Wil van der Aalst
2020 arXiv   pre-print
Much time in process mining projects is spent on finding and understanding data sources and extracting the event data needed.  ...  MVP models provide a holistic view on the process, but also allow for the extraction of classical event logs using different viewpoints.  ...  ERP (Enterprise Resources Planning) system.  ... 
arXiv:2001.02562v1 fatcat:vw6lvflng5ezrjdvu45hbtzcgm

A Roadmap for Big Model [article]

Sha Yuan, Hanyu Zhao, Shuai Zhao, Jiahong Leng, Yangxiao Liang, Xiaozhi Wang, Jifan Yu, Xin Lv, Zhou Shao, Jiaao He, Yankai Lin, Xu Han (+88 others)
2022 arXiv   pre-print
In each topic, we summarize clearly the current studies and propose some future research directions. At the end of this paper, we conclude the further development of BMs in a more general view.  ...  We introduce 16 specific BM-related topics in those four parts, they are Data, Knowledge, Computing System, Parallel Training System, Language Model, Vision Model, Multi-modal Model, Theory&Interpretability  ...  There are 5 commonsense resources in the form of knowledge bases (KBs): -ConceptNet5.5 [174] : ConceptNet5.5 is one of the most widely used commonsense KBs focusing on taxonomic and lexical knowledge  ... 
arXiv:2203.14101v4 fatcat:rdikzudoezak5b36cf6hhne5u4

Development and validation of a safe communication protocol compliant to railway standards

Duccio Bertieri, Andrea Ceccarelli, Tommaso Zoppi, Innocenzo Mungiello, Mario Barbareschi, Andrea Bondavalli
2021 Journal of the Brazilian Computer Society  
This paper reports our experience in the design, implementation, verification, and validation of the Protocollo Vitale Standard in compliance with the European safety standards for railway systems.  ...  Therefore, Rete Ferroviaria Italiana, the company who is in charge of managing the Italian railway network, coordinated the definition of the Protocollo Vitale Standard (Standard Vital Protocol).  ...  We asked a colleague, with no knowledge on the project, to act as auditor.  ... 
doi:10.1186/s13173-021-00106-w doaj:6e5f10d3eaf5444fb7f3980482509234 fatcat:4f67yqik3raehdrgawu5ohlr2i

Secure Deduplication of Encrypted Data without Additional Independent Servers

Jian Liu, N. Asokan, Benny Pinkas
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
We show both the effectiveness and the efficiency of our scheme, via simulations using realistic datasets and an implementation.  ...  However client-side encryption is at odds with the standard practice of deduplication. Reconciling client-side encryption with cross-user deduplication is an active research topic.  ...  Acknowledgments This work was supported in part by the "Cloud Security Services" project funded by the Academy of Finland (283135), the EU 7th Framework Program (FP7/2007-2013) under grant agreement n.  ... 
doi:10.1145/2810103.2813623 dblp:conf/ccs/LiuAP15 fatcat:df5ozdvhzjbnzoy4zayb47v6ci

Quality of Protection Evaluation of Security Mechanisms

Bogdan Ksiezopolski, Tomasz Zurek, Michail Mokkas
2014 The Scientific World Journal  
Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security.  ...  In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency.  ...  Acknowledgment The research is partially supported by the Grant "Reconcile: Robust Online Credibility Evaluation of Web Content" from Switzerland through the Swiss Contribution to the enlarged European  ... 
doi:10.1155/2014/725279 pmid:25136683 pmcid:PMC4127209 fatcat:g3mnpioecbg6phuiasagvquu7y
« Previous Showing results 1 — 15 out of 439 results