有抱负者 发表于 2025-3-28 16:38:16

http://reply.papertrans.cn/39/3880/387993/387993_41.png

机密 发表于 2025-3-28 18:57:45

https://doi.org/10.1007/978-3-658-20115-9n order to more effectively preserve this notion of human conceptualization, an ontology should be designed with modularity and extensibility in mind. A modular ontology thus may act as a bridge between human conceptualization and data.

Guileless 发表于 2025-3-29 02:37:43

http://reply.papertrans.cn/39/3880/387993/387993_43.png

Ruptured-Disk 发表于 2025-3-29 07:04:32

https://doi.org/10.1007/978-3-0348-4016-3g in socio-economic systems?” To address this question we propose three kinds of attacks that could be defined in the context of a precise application (packaging selection) and see how the non computer science experts evaluate, against a given set of decision tasks, each of these attacks.

慢慢冲刷 发表于 2025-3-29 10:50:16

https://doi.org/10.1007/978-3-663-12247-0 model by Geist, Lengnink and Wille provides such a match. Predicted comparability and its direction was reflected in the human data. However, the model rated a much larger proportion of pairs as incomparable than human participants did, indicating a need for a refined similarity model.

一小块 发表于 2025-3-29 15:07:57

http://reply.papertrans.cn/39/3880/387993/387993_46.png

渗透 发表于 2025-3-29 18:42:59

Modular Ontologies as a Bridge Between Human Conceptualization and Datan order to more effectively preserve this notion of human conceptualization, an ontology should be designed with modularity and extensibility in mind. A modular ontology thus may act as a bridge between human conceptualization and data.

摆动 发表于 2025-3-29 22:28:53

Lifted Most Probable Explanationvents. The purpose of this paper is twofold: (i) We formalise how to compute an . in a lifted way with LVE and LJT. (ii) We present a . in the area of IT security for risk analysis. A lifted computation of MPEs exploits symmetries, while providing a correct and exact result equivalent to one computed on ground level.

CT-angiography 发表于 2025-3-30 02:55:53

Defining Argumentation Attacks in Practice: An Experiment in Food Packaging Consumer Expectationsg in socio-economic systems?” To address this question we propose three kinds of attacks that could be defined in the context of a precise application (packaging selection) and see how the non computer science experts evaluate, against a given set of decision tasks, each of these attacks.

patriarch 发表于 2025-3-30 06:36:15

Empirically Evaluating the Similarity Model of Geist, Lengnink and Wille model by Geist, Lengnink and Wille provides such a match. Predicted comparability and its direction was reflected in the human data. However, the model rated a much larger proportion of pairs as incomparable than human participants did, indicating a need for a refined similarity model.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: ;