標(biāo)題: Titlebook: Computer Aided Systems Theory - EUROCAST 2003; 9th International Wo Roberto Moreno-Díaz,Franz Pichler Conference proceedings 2003 Springer- [打印本頁] 作者: 適婚女孩 時(shí)間: 2025-3-21 16:35
書目名稱Computer Aided Systems Theory - EUROCAST 2003影響因子(影響力)
書目名稱Computer Aided Systems Theory - EUROCAST 2003影響因子(影響力)學(xué)科排名
書目名稱Computer Aided Systems Theory - EUROCAST 2003網(wǎng)絡(luò)公開度
書目名稱Computer Aided Systems Theory - EUROCAST 2003網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Aided Systems Theory - EUROCAST 2003被引頻次
書目名稱Computer Aided Systems Theory - EUROCAST 2003被引頻次學(xué)科排名
書目名稱Computer Aided Systems Theory - EUROCAST 2003年度引用
書目名稱Computer Aided Systems Theory - EUROCAST 2003年度引用學(xué)科排名
書目名稱Computer Aided Systems Theory - EUROCAST 2003讀者反饋
書目名稱Computer Aided Systems Theory - EUROCAST 2003讀者反饋學(xué)科排名
作者: 擺動 時(shí)間: 2025-3-21 20:20
0302-9743 y two years. Thus, the following EUROCAST meetings took place in Krems (1991), Las Palmas (1993), Innsbruck (1995), Las Palmas (1997), Vienna (1999) and Las Palmas(2001), in addition to an extr978-3-540-20221-9978-3-540-45210-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Atheroma 時(shí)間: 2025-3-22 03:50 作者: Clumsy 時(shí)間: 2025-3-22 06:41
Representation and Processing of Complex Knowledgeheuristic outline of human knowledge, its aquisition and its processing is given to motivate the following mathematical representation. The basic mathematical concepts are hierarchies of generalized relations and operations on these, corresponding to knowledge and knowledge processing. Included are 作者: 起波瀾 時(shí)間: 2025-3-22 12:15
How Many Rounds to KO?, or Complexity Increase by Cryptographic Map Iterationnstructions is a critical parameter. In this paper, the number of rounds needed to reach a certain minimum complexity bound is proposed as a valid measure to assess the cryptographic significance of certain boolean functions. The most remarkable facts arising from this approach are the dependency of作者: 串通 時(shí)間: 2025-3-22 16:46
A Non-standard Genetic Algorithm Approach to Solve Constrained School Timetabling Problemsnd university. The basic scheme of Genetic Algorithms has been used, but some operators have been adapted to the characteristics of the problem under consideration, improving its resolution capability. Although the design requires more effort, it helps to reduce the search space. Feasible timetables作者: 串通 時(shí)間: 2025-3-22 21:04
Application of Uncertain Variables to Task and Resource Distribution in Complex Computer Systemsrs (in particular, unknown execution times). The unknown parameters are assumed to be values of uncertain variables characterized by certainty distributions given by an expert. The formulation and solution of the optimal allocation problem for a set of parallel processors are presented. The extensio作者: effrontery 時(shí)間: 2025-3-22 22:35 作者: Interregnum 時(shí)間: 2025-3-23 04:19 作者: amnesia 時(shí)間: 2025-3-23 08:36
A Formulation for Language Independent Prelogical Deductive Inferenceuirements for an statement to be true are investigated, using set theoretical concepts only. The results lead to a sufficient condition for a statement to be deduced from a set of other statements (premises), by means of some algorithmic approach.作者: 折磨 時(shí)間: 2025-3-23 10:38
The Zero Array: A Twilight Zoneo design computer programs that determine declarations have been made. This endeavor is mainly directed to binary declarations..This paper firstly proposes a multivalued languaje, based on arrays, that allows a multivalued description of the knowledge contained in a data table, by means of array exp作者: OATH 時(shí)間: 2025-3-23 15:02 作者: 細(xì)微的差異 時(shí)間: 2025-3-23 19:48
Generalizing Programs via Subsumptionfollowing sense: The clause .. subsumes the clause .. iff .. can be reached from .. by applying these operators. We give a formalization of the closeness among clauses based on these operators and an algorithm to compute it as well as a bound for a quick estimation. We extend the operator to program作者: 禍害隱伏 時(shí)間: 2025-3-23 23:52
Modeling with Archetypes: An Effective Approach to Dealing with Complexityby Theorem, which says that the results of a management process are determined by the quality of the model on which that process is based. The author proposes that archetype-based modeling is a promising way to enhance the behavioral repertory of agents in organizations and society: It aids in achie作者: 尖 時(shí)間: 2025-3-24 02:59 作者: 擺動 時(shí)間: 2025-3-24 08:17
Knowledge Base for Evidence Based Medicine with Bioinformatics Componentscted from computer patient records. These events describe one flow of therapy for a concrete disease. Each event is represented by state and time. We introduce a measure between states, which is used to calculate the best alignment between different patient trials. The alignment measure calculates t作者: harangue 時(shí)間: 2025-3-24 13:24
Diversified Approach to Methodology and Technology in Distributed Intelligent Building Systemse buildings where microprocessor-based technologies were used in order to improve the buildings’ efficiency. This paper discusses the basic issues related to the design of an intelligent building. It offers various solutions to the issues of data acquisition and processing, including the most import作者: Isthmus 時(shí)間: 2025-3-24 18:26
Temporal Approaches in Data Mining. A Case Study in Agricultural Environmentdynamic domain, non-temporal data mining techniques are not suitable, needing to find a good temporal model. After a comparative study of several candidate models, we propose the use of the inter-transaction approach.作者: 抵制 時(shí)間: 2025-3-24 22:44
Personalized Guided Routes in an Adaptive Evolutionary Hypermedia Systemis a layered, systemic, semantic and evolutionary model for the development of adaptive hypermedia systems, which adapt to the particular features and interests of each user. For evolution it uses a Metasystem, which offers to the author a set of evolutionary actions that permit the hypermedia syste作者: 擔(dān)心 時(shí)間: 2025-3-25 01:57 作者: gene-therapy 時(shí)間: 2025-3-25 03:44 作者: octogenarian 時(shí)間: 2025-3-25 10:42 作者: 發(fā)生 時(shí)間: 2025-3-25 14:35
Invariants and Symmetries among Adaptive Agents are possible when we move from one context to another. A set of contexts can be transformed in another set of contexts by a third order action of a meta-agent. In conclusion a hierarchical tower of agents and meta agents can be built in a way to generate complex transformations.作者: Decrepit 時(shí)間: 2025-3-25 16:46 作者: conscribe 時(shí)間: 2025-3-25 23:21 作者: 故意釣到白楊 時(shí)間: 2025-3-26 00:17 作者: 滴注 時(shí)間: 2025-3-26 07:41
Epilogue: Syria in Lebanon, 1976–79requires great effort by the designer. In this paper, we propose a suitable framework to analyse and design these complex systems, and a formal model that allows us to prove the system properties and validates the specification.作者: 考博 時(shí)間: 2025-3-26 09:23 作者: 儲備 時(shí)間: 2025-3-26 15:56
Syria: Borders, Boundaries, and the Stateoptimization problems category OPT, a comparison mechanism between them and an approximation system to each optimization problem have been introduced, following the basic idea of .. In this direction, we consider new insights and a deeper understanding of some basic questions inside the Structural Complexity field, by an universal language.作者: 偏離 時(shí)間: 2025-3-26 18:28
Syria: Strong State Versus Social Cleavages are introduced by using specific clustering methods. These classes can be extended by gene expression data on micro-arrays leading to finer clustering containing similar trials – called trial families. For easy checking if a new trial belongs to a family we use profiles of Hidden Markov models to detect potential membership in a family.作者: 陶瓷 時(shí)間: 2025-3-26 23:22 作者: minaret 時(shí)間: 2025-3-27 02:24
Knowledge Base for Evidence Based Medicine with Bioinformatics Components are introduced by using specific clustering methods. These classes can be extended by gene expression data on micro-arrays leading to finer clustering containing similar trials – called trial families. For easy checking if a new trial belongs to a family we use profiles of Hidden Markov models to detect potential membership in a family.作者: GROVE 時(shí)間: 2025-3-27 07:44 作者: definition 時(shí)間: 2025-3-27 10:51 作者: CON 時(shí)間: 2025-3-27 16:54
https://doi.org/10.1007/978-1-349-05371-1To make such a cellular model as simple as possible the geometrical form of each cell was assumed to be a (regular) cube. Regarding the topology of the cellular automata model CA we assumed for each cell . the associated neighborhood . consisting of the 6 cells .., ..,...,.. which are adjacent to . (“von Neumann neighborhood”).作者: flaggy 時(shí)間: 2025-3-27 20:34 作者: 機(jī)制 時(shí)間: 2025-3-28 01:03
Epilogue: Syria in Lebanon, 1976–79sure to assess the cryptographic significance of certain boolean functions. The most remarkable facts arising from this approach are the dependency of the number of rounds on some predefined weaknesses of the tested functions, and the failure to pass the proposed tests when complexity measures are chosen . to address those weaknesses.作者: 引導(dǎo) 時(shí)間: 2025-3-28 02:20 作者: 浮夸 時(shí)間: 2025-3-28 07:07 作者: AXIS 時(shí)間: 2025-3-28 14:22
https://doi.org/10.1007/978-3-319-98458-2ons. Women discrimination is the focus of our study in this paper. The university, as a social system, is investigated. The goal is to determine the degree of gender discrimination and to provide the tools to evaluate different actions to improve the equal opportunity (EO) principle in its operation.作者: 沖擊力 時(shí)間: 2025-3-28 15:59
Syria: Strong State Versus Social Cleavagesated to the design of an intelligent building. It offers various solutions to the issues of data acquisition and processing, including the most important ones that are based on the distributed building automation system.作者: LAITY 時(shí)間: 2025-3-28 20:42
On Modeling and Simulation of Flows of Water by 3D-Cellular AutomataTo make such a cellular model as simple as possible the geometrical form of each cell was assumed to be a (regular) cube. Regarding the topology of the cellular automata model CA we assumed for each cell . the associated neighborhood . consisting of the 6 cells .., ..,...,.. which are adjacent to . (“von Neumann neighborhood”).作者: immunity 時(shí)間: 2025-3-29 02:18
Representation and Processing of Complex Knowledgeematical concepts are hierarchies of generalized relations and operations on these, corresponding to knowledge and knowledge processing. Included are objects with space and time parameterization, valuations of objects by partial ordered values, neighborhood and similarity relations, i.e. topologies, and variable objects.作者: 商業(yè)上 時(shí)間: 2025-3-29 05:40 作者: Granular 時(shí)間: 2025-3-29 09:57 作者: Fsh238 時(shí)間: 2025-3-29 12:07
Generalizing Programs via Subsumptioness among clauses based on these operators and an algorithm to compute it as well as a bound for a quick estimation. We extend the operator to programs and we also get a characterization of the subsumption between programs. Finally, a weak metric is presented to compute the closeness among programs based on subsumption.作者: CRASS 時(shí)間: 2025-3-29 16:12 作者: 評論者 時(shí)間: 2025-3-29 21:29 作者: Halfhearted 時(shí)間: 2025-3-30 02:08 作者: Vasoconstrictor 時(shí)間: 2025-3-30 07:57 作者: Maximize 時(shí)間: 2025-3-30 08:38
The Zero Array: A Twilight Zoneressions..The zero array is singled out and its interpretation analyzed, following the discussion the projection arrays or projeact-ars are introduced. Finally, a relation between formal concepts and the project-ars is examined.作者: 污點(diǎn) 時(shí)間: 2025-3-30 15:45
https://doi.org/10.1007/978-1-349-05371-1fter) a state of turbulence. In order to take in the model molecular forces into account, we proposed a model for the molecular level of description. To make such a cellular model as simple as possible the geometrical form of each cell was assumed to be a (regular) cube. Regarding the topology of th作者: Charitable 時(shí)間: 2025-3-30 18:49 作者: GEAR 時(shí)間: 2025-3-30 21:57
Epilogue: Syria in Lebanon, 1976–79nstructions is a critical parameter. In this paper, the number of rounds needed to reach a certain minimum complexity bound is proposed as a valid measure to assess the cryptographic significance of certain boolean functions. The most remarkable facts arising from this approach are the dependency of作者: Odyssey 時(shí)間: 2025-3-31 02:57 作者: antecedence 時(shí)間: 2025-3-31 06:36
https://doi.org/10.1007/978-1-349-05371-1rs (in particular, unknown execution times). The unknown parameters are assumed to be values of uncertain variables characterized by certainty distributions given by an expert. The formulation and solution of the optimal allocation problem for a set of parallel processors are presented. The extensio作者: 自由職業(yè)者 時(shí)間: 2025-3-31 10:25
Epilogue: Syria in Lebanon, 1976–79computational power allows the designer to develop better interfaces oriented to more intuitive human-computer interaction using an interaction style more adapted to the user and system characteristic. However, when the interaction is more intuitive for the user, the design and implementation phase 作者: contradict 時(shí)間: 2025-3-31 14:06
Syria: Borders, Boundaries, and the State, we have focused on structural properties of optimization problems related to approximative issue. From the observation that, intuitively, there are many connections among categorical concepts and structural complexity notions, in this work we present a categorical approach to cope with some questi作者: Incompetent 時(shí)間: 2025-3-31 21:24 作者: aerial 時(shí)間: 2025-3-31 22:38 作者: 中古 時(shí)間: 2025-4-1 02:14
Souhail Belhadj Klaz,Mongi Abdennabie state to another. At the second order the actions of the agents transform one context with rules and data to another context with other rules and data. In the transformation of the second order the new rules and the new data are projected in the new context. Rules of the new context must be adapte作者: expire 時(shí)間: 2025-4-1 07:22 作者: Handedness 時(shí)間: 2025-4-1 11:12
https://doi.org/10.1007/978-3-319-98458-2by Theorem, which says that the results of a management process are determined by the quality of the model on which that process is based. The author proposes that archetype-based modeling is a promising way to enhance the behavioral repertory of agents in organizations and society: It aids in achie作者: Eviction 時(shí)間: 2025-4-1 15:02
https://doi.org/10.1007/978-3-319-98458-2ic and / or linguistic. Human beings are not equally treated, with a clear discrimination based on age, gender, race or culture, among many other reasons. Women discrimination is the focus of our study in this paper. The university, as a social system, is investigated. The goal is to determine the d