The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At the end of the criminal intelligence analysis process there are relatively well established and understood approaches to explicit externalisation and representation of thought that include theories of argumentation, narrative and hybrid approaches that include both of these. However the focus of this paper is on the little understood area of how to support users in the process of arriving at such...
Due to the vast amount of data that needs to be processed in the field of intelligence analysis, visual analytic systems should be optimised with regard to sensemaking and reasoning. The main problem is that it is not clear how knowledge is derived from information systems. We outline the benefits of empirically derived design guidelines and present newly created sensemaking recommendations for the...
Abductive inference is a form of backwards logical reasoning that infers likely hypotheses from a given conclusion. In other words, given an invalid implication of the form A => B, abduction asks the question "What formula C do we need to conjoin with the antecedent A so that (i) A & C => B is logically valid and (ii) C is consistent with A?" Abductive reasoning has found many...
We present an automated compositional program verification technique for safety properties based on conditional inductive invariants. For a given program part (e.g., a single loop) and a postcondition ϕ, we show how to, using a Max-SMT solver, an inductive invariant together with a precondition can be synthesized so that the precondition ensures the validity of the invariant and that the invariant...
This paper deals with logical cryptanalysis of hash functions. They are commonly used to check data integrity and to authenticate protocols. These functions compute, from an any-length message, a fixed-length bit string, usually named digest. This work defines an experimental framework, that allows, thanks to the propositional formalism, to study cryptosystems at the bit level through corresponding...
Requirement engineering (RE) presents several challenges stemming from the required collaboration and knowledge transfer between analysists, developers and customers. In order to overcome these challenges and improve the effectiveness of RE, we developed REVISE: Requirement Elicitation and Verification Integrated in Social Environment. This tool is designed based on cognitive theories and implementing...
Context aware mobile applications are special types of context aware network systems that process gathered data from environment with context cycle functionalities and special infrastructure to obtain context information. Here, modelling and reasoning are most important functionalities and middleware is one of the common infrastructure to implement these functionalities. Essentially, techniques that...
The idea of a probability measure for fuzzy events was first studied by Zadeh in 1968. The approach taken there was to adapt the conventional notion of an event as a member of a σ-field of subsets of a sample space Ω to the case where the subsets are fuzzy subsets of Ω. The present work takes a different perspective and employs the concept of a linguistic variable, where the latter was introduced...
In Case Based Reasoning (CBR), retrieval phase is one of the important phases in view of the dependence of the overall effectiveness of the CBR system on the case retrieval stage. To run the process of finding a new case, CBR systems typically utilize knowledge similarity called Similarity-Based Reasoning (SBR) in which the knowledge encoded in the form of term measures is used to calculate the similarity...
Ranking intuitionistic fuzzy alternatives has been widely studied by Szmidt and Kacprzyk in many work. The lake of a linear order amongst elements of intuitionistic fuzzy alternative sets, as stated in [1], oriented the researches to the definition of aggregation methods measuring the distance of each alternative to the best element of an intuitionistic fuzzy set. However, in some real applications...
Process mining algorithms use event logs to learn and reason about processes by technically coupling event history data and process models. During the execution of a learning process, several events occur which are of interest and/or necessary for completing and achieving a learning goal. The work in this paper describes a Semantic Process Mining approach directed towards automated learning. The proposed...
The advance of sensor and networking technologies led to the development of many WSN-based context-aware applications. Especially, WSN-based indoor location-based services (LBS) have been studied recently. To understand the sensing data in those context-aware applications, we need to abstract the low-level sensor data into high-level context information to understand the data and transmit/process/store...
In the last few years, O2O (Online To Offline) mode become more and more popular, which brings offline service and online web service together, it is important to consider the quality attributes of offline service when recommending service for users online. But in the field of service discovery system, most of the studies focused on function and quality requirements of online service, not on offline...
In previous work we've shown that reflection supports the integration of components and of self-optimization within a complex system. In this paper, we discuss some early work on how some of these capabilities could support a similar integration and conflict resolution among the members of a system of systems (SoS). We start with a brief overview of the Wrappings approach to reflection, the notion...
Automatic test case execution is crucial for testdriven development (TDD) approach. It is beneficial if test cases can be automatically generated and executed. In this paper, we present UTGen, an Eclipse plugin for the generation and execution of test cases for JUnit test-platform. It is based on the idea of constraint-based testing, working for the methodlevel black-box unit testing. Test data are...
Nowadays, experiential teaching is still applied in informal learning fields. Although sometimes applied in the classroom, it cannot truly help teacher's teaching and student's learning. Reasons for the phenomenon are as follows: teachers are not competent enough to take care of everything in the classroom, teachers are not skilled enough to use teaching assistance tools, teachers cannot understand...
In the paper we present a method of reasoning with Horn rules within a contextual framework. We show that by proper use of a structure of contexts we can obtain partial OWA compliance with no necessity of extending the syntax of underlying Description Logics.
This paper presents an overview and the first results of the FP7 MULTISENSOR project, which deals with multidimensional content integration of multimedia content for intelligent sentiment enriched and context oriented interpretation. MULTISENSOR aims at providing unified access to multilingual, multimedia and multicultural economic, news story material across borders in order to support journalism...
Today's Internet is shifting towards a larger and smarter scenario known as the Internet of Things (IoT). The IoT envisions a multitude of heterogeneous objects and interactions with physical environments. In this environment, locating desirable services is challenging due to the considerable diversity, large number, dynamic behavior, and geographical distribution of the services provided by physical...
The physical world is becoming smarter and smarter due to the advances in smart devices and CPS/IoT technologies. In this paper, we investigate the roles various cutting-edge technologies, such as service computing, big data analytics, crowd sourcing, gaming technologies, etc., can play to significantly enhance the intelligence of our physical environment and subsequently benefit the society. We consider...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.