標(biāo)題: Titlebook: Case-Based Reasoning Research and Development; 26th International C Michael T. Cox,Peter Funk,Shahina Begum Conference proceedings 2018 Spr [打印本頁] 作者: 決絕 時間: 2025-3-21 16:15
書目名稱Case-Based Reasoning Research and Development影響因子(影響力)
書目名稱Case-Based Reasoning Research and Development影響因子(影響力)學(xué)科排名
書目名稱Case-Based Reasoning Research and Development網(wǎng)絡(luò)公開度
書目名稱Case-Based Reasoning Research and Development網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Case-Based Reasoning Research and Development被引頻次
書目名稱Case-Based Reasoning Research and Development被引頻次學(xué)科排名
書目名稱Case-Based Reasoning Research and Development年度引用
書目名稱Case-Based Reasoning Research and Development年度引用學(xué)科排名
書目名稱Case-Based Reasoning Research and Development讀者反饋
書目名稱Case-Based Reasoning Research and Development讀者反饋學(xué)科排名
作者: 審問,審訊 時間: 2025-3-21 20:51 作者: 精確 時間: 2025-3-22 04:13
AI-VT: An Example of CBR that Generates a Variety of Solutions to the Same Problems, even if the generation of training sessions is based on analogy and must integrate the repetition of some exercises, it also must introduce some diversity and AI-VT must deal with this diversity. In this paper, we have highlighted the fact that the retaining (or capitalisation) phase of CBR is of作者: transient-pain 時間: 2025-3-22 08:11
Harnessing Hundreds of Millions of Cases: Case-Based Prediction at Industrial Scaleion. Handling this application required addressing how to keep LSH practical for skewed data; the resulting efficiency gains in turn enabled applying an adaptation generation strategy that previously was computationally infeasible. Experimental results show that our CBR approach achieves accuracy co作者: excrete 時間: 2025-3-22 08:51 作者: 不要嚴(yán)酷 時間: 2025-3-22 16:24
Dynamic Detection of Radical Profiles in Social Networks Using Image Feature Descriptors and a Case-ion with confirmed radical profiles. These techniques are combined in the context of a Case-Based Reasoning framework which, together with the feedback provided by the end-user, enables a continuous monitoring of the activity of radical users and eases the discovery of new profiles with a radicaliza作者: 不要嚴(yán)酷 時間: 2025-3-22 17:38 作者: Individual 時間: 2025-3-22 23:24 作者: 狗舍 時間: 2025-3-23 01:23 作者: 啟發(fā) 時間: 2025-3-23 06:01
I. Shibuya,K. Uchida,M. Mochizukis, even if the generation of training sessions is based on analogy and must integrate the repetition of some exercises, it also must introduce some diversity and AI-VT must deal with this diversity. In this paper, we have highlighted the fact that the retaining (or capitalisation) phase of CBR is of作者: Cabinet 時間: 2025-3-23 12:43 作者: 委托 時間: 2025-3-23 17:02
H. Baumg?rtl,W. Zimelka,D. W. Lübbers cases” and exploits them to broaden the range of cases available for competence-based deletion. Experimental results support that this method increases competence and quality retention for less representative case bases. They also reveal the unexpected result that ECC can improve retention of compe作者: fluoroscopy 時間: 2025-3-23 20:36 作者: 脫離 時間: 2025-3-24 00:47 作者: 內(nèi)部 時間: 2025-3-24 03:10 作者: installment 時間: 2025-3-24 10:10 作者: concubine 時間: 2025-3-24 10:40
A History of Infant Intelligence Testing,in classification and prediction tasks in particular. We propose a larger understanding, beyond instance-based learning, of case based learning as analogical learning that would promote it as a major contributor of the analogizer approach of machine learning.作者: 使虛弱 時間: 2025-3-24 18:01
Optical Switching in Low-Dimensional Systemsvestigation. Here we evaluate an algorithm called Tangent Recognition Anomaly Pruning to eliminate false starts that arise in interactive dialogues created within our case-based reasoning system called Ronin. Results show that Tangent Recognition Anomaly Pruning is an effective algorithm for processing mistakes when reusin case reuse.作者: faddish 時間: 2025-3-24 20:13
CEC-Model: A New Competence Model for CBR Systems Based on the Belief Function Theorysituations. Therefore, this paper presents a new competence model called . which manages uncertainty during both of cases clustering and similarity measurement using a powerful tool called the belief function theory.作者: 臨時抱佛腳 時間: 2025-3-25 02:39 作者: Grasping 時間: 2025-3-25 05:01 作者: 樂器演奏者 時間: 2025-3-25 11:27
Answering with Cases: A CBR Approach to Deep Learningme. We describe how appropriate cases can be generated to assist engineers and how our solution can scale over time to produce domain-specific reusable cases for similar problems. Our work is evaluated using data from 5000 cases from the automotive industry.作者: 否決 時間: 2025-3-25 12:02 作者: Hiatus 時間: 2025-3-25 17:15
0302-9743 themes related to the theory and application of case-based reasoning and its future direction. Topics included multiple papers on textual CBR and a number of cognitive and human oriented papers as well as hybrid research between CBR and machine learning..978-3-030-01080-5978-3-030-01081-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 委屈 時間: 2025-3-25 22:04 作者: 課程 時間: 2025-3-26 00:55
A Textual Recommender System for Clinical Dataons with physicians’ similarity judgments of letter pairs in a psychological experiment. The results show that the recommender system captures expert intuitions about letter similarity well and is usable for practical applications.作者: Cholesterol 時間: 2025-3-26 04:59
Conference proceedings 2018d in Stockholm, Sweden, in July 2018...The 39 full papers presented in this book were carefully reviewed and selected from 77 submissions. The theme of ICCBR-2017, "The Future of CBR", was highlighted by several activities..These papers, which are included in the proceedings, address many themes rel作者: 低位的人或事 時間: 2025-3-26 10:00 作者: 隱藏 時間: 2025-3-26 15:16 作者: EVADE 時間: 2025-3-26 17:38
H. Baumg?rtl,W. Zimelka,D. W. Lübbersrieval and generation of security concept templates based on reliable examples. We use ontologies for the conceptualization of textual security concepts, and we employ case-based reasoning for the retrieval and generation of new security concepts.作者: SOBER 時間: 2025-3-27 00:17 作者: sulcus 時間: 2025-3-27 04:49
The SECCO Ontology for the Retrieval and Generation of Security Conceptsrieval and generation of security concept templates based on reliable examples. We use ontologies for the conceptualization of textual security concepts, and we employ case-based reasoning for the retrieval and generation of new security concepts.作者: Talkative 時間: 2025-3-27 06:05
https://doi.org/10.1007/978-1-4684-6345-3me. We describe how appropriate cases can be generated to assist engineers and how our solution can scale over time to produce domain-specific reusable cases for similar problems. Our work is evaluated using data from 5000 cases from the automotive industry.作者: 金哥占卜者 時間: 2025-3-27 09:50 作者: 頭盔 時間: 2025-3-27 17:15
Answering with Cases: A CBR Approach to Deep Learningst every customer support expert will turn his/her attention to a prioritization strategy, to achieve the best possible result. To assist with this, in this paper we describe a novel case-based reasoning application to address the tasks of: high solution accuracy and shorter prediction resolution ti作者: GRILL 時間: 2025-3-27 18:05 作者: 轎車 時間: 2025-3-27 23:18
The Case for Case Based Learningle we review the concept of case based learning and define it as the use of case based reasoning for machine learning. We present some of its characteristics and situate it in the context of the major machine learning tasks and machine learning approaches. In doing so, we review the particular manne作者: Ordeal 時間: 2025-3-28 03:46 作者: 規(guī)范要多 時間: 2025-3-28 07:59
Explainable Distributed Case-Based Support Systems: Patterns for Enhancement and Validation of Desigehensive cases and domain models. We show how explanation patterns and contextually enriched explanations of retrieval results can provide human-understandable insights on the system behavior, justify the shown results, and recommend the best cases to be considered for further use. We applied and im作者: plasma 時間: 2025-3-28 12:51 作者: 漂白 時間: 2025-3-28 15:21 作者: Classify 時間: 2025-3-28 21:45 作者: 轉(zhuǎn)折點 時間: 2025-3-29 01:28
A Textual Recommender System for Clinical Dataevant cases, however, is a hard and time-consuming task: Hospital databases of free-text physician letters provide a rich resource of information but are usually only searchable with string-matching methods. Here, we present a recommender system that automatically finds physician letters similar to 作者: Mawkish 時間: 2025-3-29 06:17 作者: 王得到 時間: 2025-3-29 08:47
Case Base Elicitation for a Context-Aware Recommender Systemoblems it must be provided with an initial case base covering the problem space with a sufficient number of representative seed cases with solutions that are known to be correct. We use a CBR module to recommend leisure plans in Madrid based on user preferences and contextual information. This paper作者: 發(fā)展 時間: 2025-3-29 13:15
The SECCO Ontology for the Retrieval and Generation of Security Conceptsents. The definition and writing of a security concept demands domain knowledge and experience. This paper describes an approach for the automated retrieval and generation of security concept templates based on reliable examples. We use ontologies for the conceptualization of textual security concep作者: epinephrine 時間: 2025-3-29 17:59 作者: 把…比做 時間: 2025-3-29 20:30 作者: PHIL 時間: 2025-3-30 03:09 作者: 微不足道 時間: 2025-3-30 06:24
Adaptive Goal Driven Autonomyf increasing interest due in part to the need to ensure that autonomous agents behave as intended. However, to perform well, comprehensive GDA agents require substantial domain knowledge. In this paper I focus on our work to automatically learn knowledge used by GDA agents. I also discuss future research directions.作者: conservative 時間: 2025-3-30 09:57 作者: 半圓鑿 時間: 2025-3-30 14:41 作者: fibula 時間: 2025-3-30 18:19 作者: heirloom 時間: 2025-3-30 22:15
https://doi.org/10.1007/978-1-4684-6345-3. The competence of a case base (CB), which presents the range of problems that it can successfully solve, depends on various factors such as the CB size and density. Besides, it is not obvious to specify the exactly relationship between the individual and the overall cases competence. Hence, numero作者: patella 時間: 2025-3-31 01:30 作者: 郊外 時間: 2025-3-31 06:33 作者: NUL 時間: 2025-3-31 10:50 作者: 文件夾 時間: 2025-3-31 16:34
Optical Switching in Low-Dimensional Systemstion. Multiple possible lines of inquiry appear that the users must choose between. A choice of any one would delay the user’s ability to choose another, if the chosen path proves to be irrelevant and happens to yield only useless information. With limited knowledge or experience, a user must make a作者: 能得到 時間: 2025-3-31 17:33
D. Hulin,M. Joffre,A. Migus,A. Antonetti We show that this combination has a high potential to improve existing classification methods by enriching the stream processing techniques in CEP with the capability of historic case reuse in CBR by continuously analysing the application layer data of network communication.作者: Abutment 時間: 2025-4-1 00:11
I. Shibuya,K. Uchida,M. Mochizukiand consistent training sessions for learners. The AI-VT training sessions propose different exercises in regard to a capacity associated with sub-capacities. For example, in the field of training for algorithms, a capacity could be “Use a control structure alternative” and an associated sub-capacit作者: Inoperable 時間: 2025-4-1 05:23 作者: Aspirin 時間: 2025-4-1 08:33
Numerical Modelling of Ilfracombe Seawall,ive is bypassing model building by applying case-based prediction to reason directly from data. However, to our knowledge case-based prediction still has not been applied at true industrial scale. In previous work we introduced a knowledge-light/data intensive approach to case-based prediction, usin作者: 精確 時間: 2025-4-1 11:24
A Model for Surface Wave Growth,oblems it must be provided with an initial case base covering the problem space with a sufficient number of representative seed cases with solutions that are known to be correct. We use a CBR module to recommend leisure plans in Madrid based on user preferences and contextual information. This paper作者: 吞沒 時間: 2025-4-1 17:01
H. Baumg?rtl,W. Zimelka,D. W. Lübbersents. The definition and writing of a security concept demands domain knowledge and experience. This paper describes an approach for the automated retrieval and generation of security concept templates based on reliable examples. We use ontologies for the conceptualization of textual security concep