找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: ;

[復(fù)制鏈接]
樓主: Addendum
41#
發(fā)表于 2025-3-28 16:38:16 | 只看該作者
42#
發(fā)表于 2025-3-28 18:57:45 | 只看該作者
https://doi.org/10.1007/978-3-658-20115-9n order to more effectively preserve this notion of human conceptualization, an ontology should be designed with modularity and extensibility in mind. A modular ontology thus may act as a bridge between human conceptualization and data.
43#
發(fā)表于 2025-3-29 02:37:43 | 只看該作者
44#
發(fā)表于 2025-3-29 07:04:32 | 只看該作者
https://doi.org/10.1007/978-3-0348-4016-3g in socio-economic systems?” To address this question we propose three kinds of attacks that could be defined in the context of a precise application (packaging selection) and see how the non computer science experts evaluate, against a given set of decision tasks, each of these attacks.
45#
發(fā)表于 2025-3-29 10:50:16 | 只看該作者
https://doi.org/10.1007/978-3-663-12247-0 model by Geist, Lengnink and Wille provides such a match. Predicted comparability and its direction was reflected in the human data. However, the model rated a much larger proportion of pairs as incomparable than human participants did, indicating a need for a refined similarity model.
46#
發(fā)表于 2025-3-29 15:07:57 | 只看該作者
47#
發(fā)表于 2025-3-29 18:42:59 | 只看該作者
Modular Ontologies as a Bridge Between Human Conceptualization and Datan order to more effectively preserve this notion of human conceptualization, an ontology should be designed with modularity and extensibility in mind. A modular ontology thus may act as a bridge between human conceptualization and data.
48#
發(fā)表于 2025-3-29 22:28:53 | 只看該作者
Lifted Most Probable Explanationvents. The purpose of this paper is twofold: (i) We formalise how to compute an . in a lifted way with LVE and LJT. (ii) We present a . in the area of IT security for risk analysis. A lifted computation of MPEs exploits symmetries, while providing a correct and exact result equivalent to one computed on ground level.
49#
發(fā)表于 2025-3-30 02:55:53 | 只看該作者
Defining Argumentation Attacks in Practice: An Experiment in Food Packaging Consumer Expectationsg in socio-economic systems?” To address this question we propose three kinds of attacks that could be defined in the context of a precise application (packaging selection) and see how the non computer science experts evaluate, against a given set of decision tasks, each of these attacks.
50#
發(fā)表于 2025-3-30 06:36:15 | 只看該作者
Empirically Evaluating the Similarity Model of Geist, Lengnink and Wille model by Geist, Lengnink and Wille provides such a match. Predicted comparability and its direction was reflected in the human data. However, the model rated a much larger proportion of pairs as incomparable than human participants did, indicating a need for a refined similarity model.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-8 17:57
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
涞水县| 高青县| 大连市| 凤山市| 安康市| 松阳县| 黄冈市| 宁远县| 三亚市| 济源市| 茌平县| 霞浦县| 教育| 塔城市| 元江| 隆子县| 德格县| 项城市| 威宁| 县级市| 开封县| 南溪县| 南陵县| 禄丰县| 济宁市| 玛曲县| 南和县| 洛扎县| 文水县| 高台县| 逊克县| 锦屏县| 中阳县| 宝坻区| 濮阳市| 永兴县| 沂源县| 休宁县| 石城县| 普陀区| 托克托县|