Results 21 to 30 of about 549,692 (299)
Introducing a Mashup-Based Approach for Design-Time Compliance Checking in Business Processes [PDF]
Business process compliance tries to ensure the business processes used in an organization are designed and executed according to the rules that govern the company.
Cabanillas Macías, Cristina +1 more
core +1 more source
Today, patients generate a massive amount of health records through electronic health records (EHRs). Extracting usable knowledge of patients’ pathological conditions or diagnoses is essential for the reasoning process in rule-based systems to ...
Chao Ou-Yang +4 more
doaj +1 more source
Design and Build a Smart Door Lock Using the Deep Learning Convolutional Neural Network Method [PDF]
The world is currently being hit by the COVID-19 virus. In this New Normal era, a rule is enforced that everyone must wear a mask wherever we are. Checking masks and body temperature is still done manually or by human observation, thus allowing for ...
Joni Koko +2 more
doaj +1 more source
BigraphER: rewriting and analysis engine for bigraphs [PDF]
BigraphER is a suite of open-source tools providing an effi- cient implementation of rewriting, simulation, and visualisation for bigraphs, a universal formalism for modelling interacting systems that evolve in time and space and first introduced by ...
DT Gillespie +12 more
core +1 more source
Flow-sensitive Coding Style Checking for C/C++ Programs [PDF]
C/C++ programming languages are applied in numerous critical software systems,and there is an extremely high demand for standardization and clarity of semantics during development.To prevent potential security issues arising from improper use of C/C ...
HU Mengze, MA Xutong, ZHANG Hao, ZHANG Jian
doaj +1 more source
Numerical inductive reasoning has been considered as one of the most important higher cognitive functions of the human brain. Importantly, previous behavioral studies have consistently reported that one critical component of numerical inductive reasoning
Yuzhao Yao +4 more
doaj +1 more source
Along with the barbarous growth of spams, anti-spam technologies including rule-based approaches and machine-learning thrive rapidly as well. In antispam industry, the rule-based systems (RBS) becomes the most prominent methods for fighting spam due to ...
Tian Xia
doaj +1 more source
Weighted Grid Authorization Graph (WGAG) [PDF]
Grid is a collection of distributed computing resources. These resources are available over a local or wide area network that appears to an end user or application as one large virtual computing system.
Ghoualmi, Nacira +5 more
core +1 more source
Checking Overlaps of Nominal Rewriting Rules [PDF]
Nominal rewriting generalises first-order rewriting by providing support forthe specification of binding operators. In this paper, we give sufficient conditions for (local) confluence of closed nominal rewriting theories, based on the analysis of rule overlaps.
Ayala-Rincon, Mauricio +3 more
openaire +4 more sources
Reasoning with Forest Logic Programs and f-hybrid Knowledge Bases [PDF]
Open Answer Set Programming (OASP) is an undecidable framework for integrating ontologies and rules. Although several decidable fragments of OASP have been identified, few reasoning procedures exist.
Feier, Cristina, Heymans, Stijn
core +2 more sources

