We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 310 results
  1. Sequential composition of propositional logic programs

    This paper introduces and studies the sequential composition and decomposition of propositional logic programs. We show that acyclic programs can be...

    Article Open access 15 February 2024
  2. Using Hybrid Knowledge Bases for Meta-reasoning over OWL 2 QL

    Metamodeling refers to scenarios in ontologies in which class-es and roles can be members of classes or occur in roles. This is a desirable modelling...
    Haya Majid Qureshi, Wolfgang Faber in Practical Aspects of Declarative Languages
    Conference paper 2023
  3. JPPF: Multi-task Fusion for Consistent Panoptic-Part Segmentation

    Part-aware panoptic segmentation is a problem of computer vision that aims to provide a semantic understanding of the scene at multiple levels of...

    Shishir Muralidhara, Sravan Kumar Jagadeesh, ... Didier Stricker in SN Computer Science
    Article Open access 10 January 2024
  4. Eventual consensus in Synod: verification using a failure-aware actor model

    Successfully attaining consensus in the absence of a centralized coordinator is a fundamental problem in distributed multi-agent systems. We analyze...

    Saswata Paul, Gul Agha, ... Carlos Varela in Innovations in Systems and Software Engineering
    Article 25 July 2022
  5. SoK: X-assisted BFT Consensus Protocols

    Blockchain, as an enabler of the current Internet infrastructure, has introduced a plethora of unique features, revolutionizing distributed systems...
    Gang Wang, Mark Nixon in Blockchain – ICBC 2023
    Conference paper 2023
  6. Future Location and Trajectory Prediction

    This chapter presents modern approaches and frameworks for predicting trajectories with detailed descriptions of three main research pillars. The...
    Harris Georgiou, Petros Petrou, ... Yannis Theodoridis in Big Data Analytics for Time-Critical Mobility Forecasting
    Chapter 2020
  7. Detection of violence using mosaicking and DFE- WLSRF: Deep feature extraction with weighted least square with random forest

    The violence-related instances had surged recently in areas including footpaths, sports stadiums, remote roads, liquor stores and elevators that are...

    V. Elakiya, N. Puviarasan, P. Aruna in Multimedia Tools and Applications
    Article 11 October 2023
  8. Database Consistency Models

    NA
    Pierre Sutra, Marc Shapiro in Encyclopedia of Big Data Technologies
    Living reference work entry 2022
  9. Hidden Stochastic Model for Speech

    The Hidden Markov Model (HMM) has been widely used for pattern recognition since 1970s. One common application of HMM is the acoustic modeling. The...
    Michael M. Richter, Sheuli Paul, ... Marius Silaghi in Signal Processing and Machine Learning with Applications
    Chapter 2022
  10. Algebraic Models for Big Data and Knowledge Management

    When processing large volumes of information, obtaining an accurate solution often requires excessive resources or is even impossible at all....
    Conference paper 2021
  11. A comprehensive survey of link prediction methods

    Link prediction aims to anticipate the probability of a future connection between two nodes in a given network based on their previous interactions...

    Djihad Arrar, Nadjet Kamel, Abdelaziz Lakhfif in The Journal of Supercomputing
    Article 07 September 2023
  12. An Introduction to Answer Set Programming and Some of Its Extensions

    Answer Set Programming (ASP) is a rule-based language rooted in traditional Logic Programming, Databases, Knowledge Representation, and Nonmonotonic...
    Chapter 2020
  13. A new multi-wave continuous action-set cellular learning automata for link prediction problem in weighted multi-layer social networks

    One of the main research areas in social network analysis (SNA) is link prediction (LP). Social networks can be shown as a graph, and LP algorithms...

    Mozhdeh Khaksar Manshad, Mohammad Reza Meybodi, Afshin Salajegheh in The Journal of Supercomputing
    Article 09 June 2022
  14. Verification of Eventual Consensus in Synod Using a Failure-Aware Actor Model

    Successfully attaining consensus in the absence of a centralized coordinator is a fundamental problem in distributed multi-agent systems. We analyze...
    Saswata Paul, Gul A. Agha, ... Carlos A. Varela in NASA Formal Methods
    Conference paper 2021
  15. Byzantine Fault-Tolerant Causal Order Satisfying Strong Safety

    Causal ordering is an important building block for distributed software systems. It was recently proved that it is impossible to provide causal...
    Anshuman Misra, Ajay D. Kshemkalyani in Stabilization, Safety, and Security of Distributed Systems
    Conference paper 2023
  16. Chain Answer Sets for Logic Programs with Generalized Atoms

    Answer Set Programming (ASP) has seen several extensions by generalizing the notion of atom used in these programs, for example dl-atoms, aggregate...
    Mario Alviano, Wolfgang Faber in Logics in Artificial Intelligence
    Conference paper 2019
  17. Fast computation of General SimRank on heterogeneous information network

    Similarity computation is a fundamental aspect of information network analysis, underpinning many research tasks including information retrieval,...

    Chuanyan Zhang, **aoguang Hong, Yongqing Zheng in Discover Computing
    Article Open access 21 May 2024
  18. Blockchain State of the Art

    In the previous chapter, we examine the many similarities between blockchains and distributed databases, and discuss how blockchains prioritize...
    **cheng Ruan, Tien Tuan Anh Dinh, ... Gang Chen in Blockchains
    Chapter 2022
  19. MobilityDL: a review of deep learning from trajectory data

    Trajectory data combines the complexities of time series, spatial data, and (sometimes irrational) movement behavior. As data availability and...

    Anita Graser, Anahid Jalali, ... Krzysztof Janowicz in GeoInformatica
    Article Open access 28 May 2024
  20. ZERMIA - A Fault Injector Framework for Testing Byzantine Fault Tolerant Protocols

    Byzantine fault tolerant (BFT) protocols are designed to increase system dependability and security. They guarantee liveness and correctness even in...
    João Soares, Ricardo Fernandez, ... Rolando Martins in Network and System Security
    Conference paper 2021
Did you find what you were looking for? Share feedback.