有抱负者 发表于 2025-3-28 16:38:16
http://reply.papertrans.cn/39/3880/387993/387993_41.png机密 发表于 2025-3-28 18:57:45
https://doi.org/10.1007/978-3-658-20115-9n order to more effectively preserve this notion of human conceptualization, an ontology should be designed with modularity and extensibility in mind. A modular ontology thus may act as a bridge between human conceptualization and data.Guileless 发表于 2025-3-29 02:37:43
http://reply.papertrans.cn/39/3880/387993/387993_43.pngRuptured-Disk 发表于 2025-3-29 07:04:32
https://doi.org/10.1007/978-3-0348-4016-3g in socio-economic systems?” To address this question we propose three kinds of attacks that could be defined in the context of a precise application (packaging selection) and see how the non computer science experts evaluate, against a given set of decision tasks, each of these attacks.慢慢冲刷 发表于 2025-3-29 10:50:16
https://doi.org/10.1007/978-3-663-12247-0 model by Geist, Lengnink and Wille provides such a match. Predicted comparability and its direction was reflected in the human data. However, the model rated a much larger proportion of pairs as incomparable than human participants did, indicating a need for a refined similarity model.一小块 发表于 2025-3-29 15:07:57
http://reply.papertrans.cn/39/3880/387993/387993_46.png渗透 发表于 2025-3-29 18:42:59
Modular Ontologies as a Bridge Between Human Conceptualization and Datan order to more effectively preserve this notion of human conceptualization, an ontology should be designed with modularity and extensibility in mind. A modular ontology thus may act as a bridge between human conceptualization and data.摆动 发表于 2025-3-29 22:28:53
Lifted Most Probable Explanationvents. The purpose of this paper is twofold: (i) We formalise how to compute an . in a lifted way with LVE and LJT. (ii) We present a . in the area of IT security for risk analysis. A lifted computation of MPEs exploits symmetries, while providing a correct and exact result equivalent to one computed on ground level.CT-angiography 发表于 2025-3-30 02:55:53
Defining Argumentation Attacks in Practice: An Experiment in Food Packaging Consumer Expectationsg in socio-economic systems?” To address this question we propose three kinds of attacks that could be defined in the context of a precise application (packaging selection) and see how the non computer science experts evaluate, against a given set of decision tasks, each of these attacks.patriarch 发表于 2025-3-30 06:36:15
Empirically Evaluating the Similarity Model of Geist, Lengnink and Wille model by Geist, Lengnink and Wille provides such a match. Predicted comparability and its direction was reflected in the human data. However, the model rated a much larger proportion of pairs as incomparable than human participants did, indicating a need for a refined similarity model.