贞洁 发表于 2025-3-28 16:40:49

Nonmonotonic Onto-Relational Learning,ork to deal with incomplete knowledge. One such ability can turn out to be useful in application domains, such as the Semantic Web. As a showcase we face the problem of inducing an integrity theory for a relational database whose instance is given and whose schema encompasses an ontology and a set of rules linking the database to the ontology.

FEMUR 发表于 2025-3-28 19:26:54

CP-Logic Theory Inference with Contextual Variable Elimination and Comparison to BDD Based Inference algorithms for CP-logic; these are crucial for developing learning algorithms. It proposes a new CP-logic inference method based on contextual variable elimination and compares this method to variable elimination and to methods based on binary decision diagrams.

investigate 发表于 2025-3-29 00:05:54

Transfer Learning via Relational Templates,nal templates of different specificity to learn pieces of additive value functions. We show significant transfer of learned knowledge across different subdomains of a real-time strategy game by generalizing the value function using relational templates.

环形 发表于 2025-3-29 04:51:06

An Inductive Logic Programming Approach to Validate Hexose Binding Biochemical Knowledge,r method achieves an accuracy similar to that of other black-box classifiers while providing insight into the discriminating process. In addition, it confirms wet-lab findings and reveals a previously unreported . amino acids dependency.

路标 发表于 2025-3-29 09:37:26

http://reply.papertrans.cn/47/4640/463907/463907_45.png

Aerophagia 发表于 2025-3-29 14:17:34

http://reply.papertrans.cn/47/4640/463907/463907_46.png

STENT 发表于 2025-3-29 19:33:36

http://reply.papertrans.cn/47/4640/463907/463907_47.png

荧光 发表于 2025-3-29 21:06:36

Anton Dries,Luc De Raedtting machine-generated fake reviews hiding among real restaurant reviews. The method used in this work (.) has one drawback: it has difficulties staying in ., i.e. when it generates a review for specific target entity, the resulting review may contain phrases that are unrelated to the target, thus i

Radiculopathy 发表于 2025-3-30 00:19:05

Daan Fierensks generally involve observing the victim’s input device. This paper studies leakage of user secrets (passwords and PINs) based on observations of . devices (screens or projectors) that provide “helpful” feedback to users in the form of masking characters, each corresponding to a keystroke. To this

混合 发表于 2025-3-30 05:42:57

http://reply.papertrans.cn/47/4640/463907/463907_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Inductive Logic Programming; 19th International C Luc Raedt Conference proceedings 2010 Springer-Verlag Berlin Heidelberg 2010 Bayesian net