CULT 发表于 2025-3-21 17:24:38

书目名称Artificial Intelligence and Security in Computing Systems影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0162286<br><br>        <br><br>书目名称Artificial Intelligence and Security in Computing Systems影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0162286<br><br>        <br><br>书目名称Artificial Intelligence and Security in Computing Systems网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0162286<br><br>        <br><br>书目名称Artificial Intelligence and Security in Computing Systems网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0162286<br><br>        <br><br>书目名称Artificial Intelligence and Security in Computing Systems被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0162286<br><br>        <br><br>书目名称Artificial Intelligence and Security in Computing Systems被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0162286<br><br>        <br><br>书目名称Artificial Intelligence and Security in Computing Systems年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0162286<br><br>        <br><br>书目名称Artificial Intelligence and Security in Computing Systems年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0162286<br><br>        <br><br>书目名称Artificial Intelligence and Security in Computing Systems读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0162286<br><br>        <br><br>书目名称Artificial Intelligence and Security in Computing Systems读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0162286<br><br>        <br><br>

N防腐剂 发表于 2025-3-21 20:16:50

http://reply.papertrans.cn/17/1623/162286/162286_2.png

芳香一点 发表于 2025-3-22 04:02:02

https://doi.org/10.1007/978-3-658-31924-3s under incomplete and uncertain information. The model of the appropriate system is presented with special emphasis on flow of information that accompanies the distribution of resources but, in fact, proves decisive for its efficiency. Selected experiments are reported together with their interpretation and some general remarks.

EPT 发表于 2025-3-22 07:50:07

http://reply.papertrans.cn/17/1623/162286/162286_4.png

Incommensurate 发表于 2025-3-22 12:42:55

http://reply.papertrans.cn/17/1623/162286/162286_5.png

EVICT 发表于 2025-3-22 14:52:51

Yanjun Lu,Jiangxiu Ouyang,Yuming Huangt system that evaluate the level of destabilization in the same area. In this map are present the political and geographical “actors” that influence the level of destabilization. The connections between the “actors” are expressed in a linguistic framework, like “if the United States influence increa

誓言 发表于 2025-3-22 20:30:42

Yanjun Lu,Yuming Huang,Jiangxiu Ouyangge the bidding process, but a price too low may damage the sellers. The analysis of the problem shows its high complexity. We suggest an objective methodology of constructing the evaluation of art works, based on a multi-attributes valuation system using a fuzzy expert system. The start point is the

faultfinder 发表于 2025-3-22 23:53:35

http://reply.papertrans.cn/17/1623/162286/162286_8.png

Instinctive 发表于 2025-3-23 04:21:43

https://doi.org/10.1007/978-94-011-0089-2stem. This is an example of the rough sets theory application to generate the set of decision rules in order to solve a medical problem. The lower and upper approximations of decision concepts and their boundary regions have been formulated here. The quality and accuracy control for approximations o

Nuance 发表于 2025-3-23 06:43:10

Touched Clothes and Thrifty Barrels, the proposed method, in comparison to other widely used methods, is that it allows to investigate the significance of input variables in larger subspaces of analysed system. The article presents not only theoretical basis of the proposed method but also a practical example which aim is to build a r
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Artificial Intelligence and Security in Computing Systems; 9th International Co Jerzy Sołdek,Leszek Drobiazgiewicz Conference proceedings 2