找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: ;

[复制链接]
楼主: Addendum
发表于 2025-3-28 16:38:16 | 显示全部楼层
发表于 2025-3-28 18:57:45 | 显示全部楼层
https://doi.org/10.1007/978-3-658-20115-9n order to more effectively preserve this notion of human conceptualization, an ontology should be designed with modularity and extensibility in mind. A modular ontology thus may act as a bridge between human conceptualization and data.
发表于 2025-3-29 02:37:43 | 显示全部楼层
发表于 2025-3-29 07:04:32 | 显示全部楼层
https://doi.org/10.1007/978-3-0348-4016-3g in socio-economic systems?” To address this question we propose three kinds of attacks that could be defined in the context of a precise application (packaging selection) and see how the non computer science experts evaluate, against a given set of decision tasks, each of these attacks.
发表于 2025-3-29 10:50:16 | 显示全部楼层
https://doi.org/10.1007/978-3-663-12247-0 model by Geist, Lengnink and Wille provides such a match. Predicted comparability and its direction was reflected in the human data. However, the model rated a much larger proportion of pairs as incomparable than human participants did, indicating a need for a refined similarity model.
发表于 2025-3-29 15:07:57 | 显示全部楼层
发表于 2025-3-29 18:42:59 | 显示全部楼层
Modular Ontologies as a Bridge Between Human Conceptualization and Datan order to more effectively preserve this notion of human conceptualization, an ontology should be designed with modularity and extensibility in mind. A modular ontology thus may act as a bridge between human conceptualization and data.
发表于 2025-3-29 22:28:53 | 显示全部楼层
Lifted Most Probable Explanationvents. The purpose of this paper is twofold: (i) We formalise how to compute an . in a lifted way with LVE and LJT. (ii) We present a . in the area of IT security for risk analysis. A lifted computation of MPEs exploits symmetries, while providing a correct and exact result equivalent to one computed on ground level.
发表于 2025-3-30 02:55:53 | 显示全部楼层
Defining Argumentation Attacks in Practice: An Experiment in Food Packaging Consumer Expectationsg in socio-economic systems?” To address this question we propose three kinds of attacks that could be defined in the context of a precise application (packaging selection) and see how the non computer science experts evaluate, against a given set of decision tasks, each of these attacks.
发表于 2025-3-30 06:36:15 | 显示全部楼层
Empirically Evaluating the Similarity Model of Geist, Lengnink and Wille model by Geist, Lengnink and Wille provides such a match. Predicted comparability and its direction was reflected in the human data. However, the model rated a much larger proportion of pairs as incomparable than human participants did, indicating a need for a refined similarity model.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-20 08:08
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表