• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 22,326
Next 10 →

Table 1 Summary of the Knowledge Toolbox

in European Management Journal Vol. 17, No. 4, pp. 391--402, 1999 1999 Elsevier Science Ltd. All rights reserved Pergamon
by Printed In Great
"... In PAGE 11: ... We also tried to high- light the shortcomings of each tool, to avoid creating undue expectations. Table1 summarises our reflec- tions on the various tools, and highlights the differ- ences between them. Hopefully managers will be in a better position now to choose how to manage their intangible resources using their knowledge toolbox.... ..."

Table 2. Results of profile-based methods for gene symbol disambigua- tion when different knowledge sources are used

in BIOINFORMATICS ORIGINAL PAPER doi:10.1093/bioinformatics/btm056 Data and text mining Gene symbol disambiguation using knowledge-based profiles
by Hua Xu, Jung-wei Fan, George Hripcsak, Eneida A. Mendonça, Marianthi Markatou, Carol Friedman
"... In PAGE 5: ...2, we generated a pool of 7844 testing samples for mouse, 1320 for fly and 269 for yeast. Table2 shows the results of the profile-based methods for gene symbol disambiguation when different knowledge sources are used. The first number in the cell is the mean of precisions of 200 randomly selected testing sets using the knowledge source(s) given in column one.... ..."

Table 1. The relation RABC stating prior knowledge about the possible combina- tions of attribute values

in Probabilistic and Possibilistic Networks and How To Learn Them from Data
by Christian Borgelt, Rudolf Kruse
"... In PAGE 3: ... Thus the underlying domain of our example is the Cartesian product dom(A) dom(B) dom(C) or, as we will write as an abbreviation, the three-dimensional space fA; B; Cg. Table1 states prior knowledge about the possible combinations of at- tribute values in the form of a relation RABC: only the value combinations contained in RABC are possible. (This relation is to be interpreted under the closed world assumption, i.... ..."

Table 1. The history of status, venue, PC chairs, publisher and cooperation.

in A Statistic Study for the ADBIS Period 1994-2006
by Yannis Manolopoulos
"... In PAGE 3: ... Table1 gives a summary of ADBIS conferences in terms of status, venue, PC Co-chairs, type of proceedings and international cooperation. Basically, from this table we observe two rather distinct periods.... In PAGE 9: ... Frequent countries of origin of accepted papers. In Table1 0, we proceed in finer granularity with respect to the countries of the East Europe. Except the top-2 countries, four countries (Czech Republic, Slovakia, Hungary and Lithuania) show a consistent presence, whereas the remaining countries appear less often.... In PAGE 13: ...Narrowing down into the East European countries, we reach Table1 5, where we remark roughly the same results as in the case of the LNCS proceedings (e.g.... In PAGE 14: ...les along the spirit of Tables 11 and 12, i.e. to evaluate the international collabora- tion in-between countries of East Europe on one hand, and countries of East Europe and the rest of the world on the other hand. From Table 17 we count 15 joint papers in a total of 160 papers, which gives an average 9,4% per year, a figure smaller than the respective figure (12% from Table1 1) calculated for the case of LNCS proceedings. 1999 2000 2001 2002 2003 2004 2005 2006 BosErz- Ire Austri- Pol Arm- Rus Austra- UK Ger- Spa Can- Leb Ita- Swi Net-Yug Ire-UK Chi-Ger Fin-Ger Fin- Slove Cze- Slova Chin- UK Rus-Sin Table 17.... In PAGE 14: ...able 18. Distribution of countries in joint papers in local proceedings. When comparing the Tables 11-12 vs. Tables 17-18 and study closer the coun- tries that have joint papers only in LNCS, only in local, and in both kinds of proceed- ings, we come to other interesting outcomes about the competitive qualifications of the communities of these countries (see for example Table1 9). Only in LNCS Belgium, Cyprus, France, Greece, Hungary, India, Israel, Japan, New Zealand, Saudi Arabia, Ukraine, USA Only in local Armenia, Bosnia/Herzegovina, Canada, China, Lebanon, Slovenia, Yugoslavia In both Australia, Austria, Czech, Finland, Germany, Ireland, Italy, Nether- lands, Poland, Russia, Singapore, Slovakia, Spain, Yugoslavia, UK ... In PAGE 17: ...ion. From this table we remark that (a) during the Russian period, e.g. until 1997 inclusively, there is an increasing trend as the ADBIS event was gradually more visi- ble to the global scientific community, (b) along the results of Table1 5, the Prague case corresponds to a local peak, and (b) it seems that during the last three years (2003-2006) more established researchers publish their work in the LNCS proceed- ings. Therefore, it is anticipated that the impact of the papers of these years will be shown in the future.... ..."

Table 5: Syntactical systems of knowledge and belief and Strong S1 connection axiomatisa- tion.

in Reasoning about Knowledge and Belief: A Syntactical Treatment
by Maria Fasli 2003
Cited by 2

Table 6: Syntactical systems of knowledge and belief and Strong S2 connection axiomatisa- tion.

in Reasoning about Knowledge and Belief: A Syntactical Treatment
by Maria Fasli 2003
Cited by 2

Table 2: Initial knowledge used by the IDS

in A Security Management Architecture
by For Access Control, G. Prem Kumar, P. Venkataram 1997
"... In PAGE 22: ...Table 2: Initial knowledge used by the IDS Table2 describes 16 events and 10 intrusions of the IDS with the initial knowledge (in the form of 12 rules) in a public network. The commands that fall in the cooperating user intrusion are the events 4-6.... In PAGE 22: ...onsider S. No. 6. of Table2 . The events 4,5,6 i:e:; (cp /bin/sh usr/root), (chmod 4755 usr/root) and (usr/root) are set to `1 apos; and the other events are set to `0 apos;.... In PAGE 23: ... A neural network model with a few spare input and output neurons can accommodate new events/intrusions. As shown in Table2 , though there are 12 events and 10 intrusion, we have chosen a neural network with 16 input neurons, 15 output neurons and 6 hidden neurons. To illustrate the inclusion of a new rule, consider the rule given Table 3.... ..."
Cited by 3

Table 1. Excerpt from the formalized knowledge.

in Preface
by Patrik Boart, Patrik Boart, Patrik Boart, Patrik Boart 2005
"... In PAGE 17: ....2.2 Capturing life cycle intent A wish to allow modification and iteration until all product life-cycle specifications are fully satisfied has been addressed in the area of capturing life cycle intent, Figure 1. Numerous efforts have been done to support different disciplines where many knowledge-modelling techniques have been developed, Table1 . The main idea has been to show how these methods can reduce the lead-time of the product development process and increase the quality of the processes.... In PAGE 17: ... [21], 2004 Agents and case based reasoning (CBR) Induction motors Product Support Diagnostics Yang et al. [22], 2004 Table1 . Knowledge Modelling Techniques.... In PAGE 18: ... Support is needed to help participating teams cooperate and achieve a balanced view before design decisions. With the help of modelling techniques presented in Table1 , different support system are developed to assist engineers perform their tasks. A number of Knowledge Based System (KBS) definitions exist; see Table 2.... In PAGE 23: ...as the knowledge exists in a number of disciplines from business to maintenance activities. A number of modelling techniques, Table1 , have been used to capture, support or automate different engineering activities. No technique will capture all aspects within the engineering domain.... In PAGE 39: ... [19], 2004 Agents and case based reasoning (CBR) Induction motors Product Support Diagnostics Yang et al. [20], 2004 Table1 . Some Knowledge Modeling Techniques.... In PAGE 39: ... Some Knowledge Modeling Techniques. All the knowledge modeling techniques presented in Table1 have different advantages depending on what knowledge is of interest to capture. Design Rationale, for example, captures decisions made during design so as to not lose the knowledge behind how and why certain decisions were made.... In PAGE 40: ... Definitions on Knowledge Based Systems. 4 Knowledge Enabled Engineering Approach Methods exist to capture and model knowledge, all with their advantages and disadvantages as seen in Table1 . Regardless what system/method is chosen, none will be the best in solving all problems.... In PAGE 60: ...3 Knowledge formalization The acquired knowledge was formalized through a company format used for building object oriented product models. Table1 shows an example from the formalized knowledge corresponding to the acquired knowledge in section 3.2.... ..."

Table 1: Comparison based on Knowledge Acquisition

in A Study of Semi-Automated Program Construction
by H. Dayani-fard, J.I. Glasgow, D. A. Lamb
"... In PAGE 26: ... The importance of the knowledge, in turn, raises the issue of the knowledge capture. Table1 shows a comparison of approaches studied in Section 2 in terms of the type of knowledge that they represent, the type of representation, and how this knowledge is captured. Rule-based systems rely heavily on reusing production rules with the excep- tion of the Programmer apos;s Apprentice.... ..."

Table 1: Comparison based on Knowledge Acquisition

in A Study of Semi-Automated Program Construction
by H. Dayani-Fard, J. I. Glasgow, D. A. Lamb 1998
"... In PAGE 26: ... The importance of the knowledge, in turn, raises the issue of the knowledge capture. Table1 shows a comparison of approaches studied in Section 2 in terms of the type of knowledge that they represent, the type of representation, and how this knowledge is captured. Rule-based systems rely heavily on reusing production rules with the excep- tion of the Programmer apos;s Apprentice.... ..."
Next 10 →
Results 11 - 20 of 22,326
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University