نتایج جستجو برای: knowledge based route finder
تعداد نتایج: 3359897 فیلتر نتایج به سال:
Knowledge-intensive CBR assumes that cases are enriched with general domain knowledge. In CREEK, there is a very strong coupling between cases and general domain knowledge, in that cases are embedded within a general domain model. This increases the knowledge-intensiveness of the cases themselves. A knowledge-intensive CBR method calls for powerful knowledge acquisition and modeling techniques,...
Abs t rac t . This paper presents our approach for knowledge acquisition from multiple experts. In order to build a cooperative KBS, representing the knowledge of several experts and intended to multiple users inside an organization, we propose a model of cognitive agent for guiding the process of knowledge acquisition. This model of agent can serve as a basis for specifying the future KBS to b...
Customers of electronic shops find more and more support for the search and selection of products in the sales systems. Unfortunately, most of the shops do not provide additional support with parameterizable or configurable products. Such products could be further customized. One of the major problems most customization techniques suffer from is that they require large knowledge acquisition eff...
In this paper, we give a survey on the AI-field Configuration. Because configuration of software-intensive systems is currently seen as a main challenge for knowledge-based configuration, this topic is emphasized. Main challenges related to this topic are next to others: softwareintensive applications, combining of configuration, modeling and evolution of software components, integration of kno...
We argue for the separation of object and reflective problem solving levels and a selfrepresentation that is distinct from the object-level because it is selective, specialised and knowledge oriented, i.e., it is a knowledge-level model congruent with the KADS conceptual model of the object system. As an example we describe a conceptual model for competence assessment and improvement in Office ...
In this paper, we systematically explore an itemset-based extension approach for generating candidate sequence which contributes to a better and more straightforward search space traversal performance than traditional item-based extension approach. Based on this candidate generation approach, we present FINDER, a novel algorithm for discovering the set of all frequent sequences. FINDER is compo...
The management of the integrity of intelligent systems relies on techniques to integrate the components and to manage the integrity of the knowledge-based systems components. A unified methodology integrates knowledge-based systems components with database components. Constraints are used to manage the integrity of knowledge. One class of knowledge constraints protect the integrity of knowledge...
Many animals acquire food by stealing it from others. There are species of specialist thieves, but more commonly animals will search for both food items and items already found by others, often conspecifics, that can be stolen. This type of behaviour has previously been modelled using a range of approaches. One of these is the Finder–Joiner model, where one animal, the ‘‘Finder’’, discovers a f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید