Date


People

Download Available

161 results

FCA interpretation of relation algebra.

Conference Proceeding
Priss, U. (2006)
FCA interpretation of relation algebra. https://doi.org/10.1007/11671404_17
This paper discusses an interpretation of relation algebra and fork algebra with respect to FCA contexts. In this case, "relation algebra" refers to the DeMorgan-Peirce-Schroe...

Integrated many-to-many multicast addressing and access control method

Conference Proceeding
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...

Interoperable Services for Federations of Database System

Conference Proceeding
Roantree, M., Kennedy, J., & Barclay, P. J. (2002)
Interoperable Services for Federations of Database System. In A. Caplinskas, & J. Eder (Eds.), Advances in Databases and Information Systems: Fifth East-European Conference ADBIS' 2001
The problems associated with defining interoperable protocols for heterogenous information systems has been the subject of researchers for many years. While numerous solutions...

Multi-Objective genetic algorithms for the design of pipe networks.

Journal Article
Tumula, P., & Park, N. (2004)
Multi-Objective genetic algorithms for the design of pipe networks. Journal of Water Resources Planning and Management, 130, 73-84. https://doi.org/10.1061/%28ASCE%290733-9496%282004%29130%3A1%2873%29
This paper presents a multiobjective genetic algorithm approach to the design of a water distribution network. The objectives considered are minimization of the network cost a...

A new data, document and geospatial repository: knowledge base and project support for a major international railway project.

Presentation / Conference
Wigan, M., Kukla, R., Benjamins, M., & Grashoff, P. (2008, April)
A new data, document and geospatial repository: knowledge base and project support for a major international railway project. Poster presented at Third International Conference on Open Repositories, Southampton, United Kingdom
The simplicity of the basic design has proved to be robust to the changing and varied needs of different ?clients?, but the complexity of the intellectual property issues enge...

An assessment of data leakage in Firefox under different conditions.

Presentation / Conference
Findlay, C., & Leimich, P. (2014, July)
An assessment of data leakage in Firefox under different conditions. Paper presented at CFET 2014: 7th International Conference on Cybercrime Forensics Education & Training, Christ Church,
Data leakage is a serious issue and can result in the loss of sensitive data, compromising user accounts and details, potentially affecting millions of internet users. This pa...

NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification

Journal Article
Yazdania, S., Tan, Z., Kakavand, M., & Lau, S. (2022)
NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification. Wireless Networks, 28, 1251-1261. https://doi.org/10.1007/s11276-018-01909-0
Research in financial domain has shown that sentiment aspects of stock news have a profound impact on volume trades, volatility, stock prices and firm earnings. With the ever ...

Combining dimensional analysis and heuristics for causal ordering.

Book
Shen, Q., & Peng, T. (2006)
Combining dimensional analysis and heuristics for causal ordering. In A. Bundy, & S. Wilson (Eds.), Rob Milne: A Tribute to a Pioneering AI Scientist, Entrepreneur and Mountaineer, 39-53. IOS Press
This paper is a refined version of the work that the authors presented at the 13th International Workshop on Qualitative Reasoning, jointly with the late Dr Rob Milne. It is d...

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

Applying semantic technologies to multi-agent models in the context of business simulations.

Thesis
Farrenkopf, T. Applying semantic technologies to multi-agent models in the context of business simulations. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/1033149
Agent-based simulations are an effective simulation technique that can flexibly be applied to real-world business problems. By integrating such simulations into business games...