메뉴 건너뛰기




Volumn 19, Issue 9, 2007, Pages 1241-1251

A generalized associative petri net for reasoning

Author keywords

Association rule; Data mining; Ontology; Petri net; Reasoning

Indexed keywords

ALGORITHMS; DATA MINING; ELECTRONIC MAIL; FUZZY RULES; INTELLIGENT SYSTEMS; KNOWLEDGE BASED SYSTEMS; ONTOLOGY;

EID: 34547984359     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2007.1068     Document Type: Article
Times cited : (32)

References (40)
  • 5
    • 0025485332 scopus 로고
    • Knowledge Representation Using Fuzzy Petri Nets
    • Sept
    • S. Chen, J.S. Ke, and J. Chang, "Knowledge Representation Using Fuzzy Petri Nets," IEEE Trans. Knowledge and Data Eng., vol. 2, no. 3, pp. 311-319, Sept. 1990.
    • (1990) IEEE Trans. Knowledge and Data Eng , vol.2 , Issue.3 , pp. 311-319
    • Chen, S.1    Ke, J.S.2    Chang, J.3
  • 6
    • 0038182929 scopus 로고    scopus 로고
    • Methodologies, Tools and Languages for Building Ontologies: Where Is Their Meeting Point?
    • S. Corcho, M. Fernández-López, and A. Gómez- Pérez, "Methodologies, Tools and Languages for Building Ontologies: Where Is Their Meeting Point?" Data Knowledge Eng., vol. 46, no. 1, pp. 41-64, 2003.
    • (2003) Data Knowledge Eng , vol.46 , Issue.1 , pp. 41-64
    • Corcho, S.1    Fernández-López, M.2    Gómez- Pérez, A.3
  • 9
    • 33646354609 scopus 로고    scopus 로고
    • Consumer Trust, Perceived Security and Privacy Policy: Three Basic Elements of Loyalty to a Web Site
    • C. Flavian and M. Guinaliu, "Consumer Trust, Perceived Security and Privacy Policy: Three Basic Elements of Loyalty to a Web Site," Industrial Management and Data Systems, vol. 106, no. 5, pp. 601-620.
    • Industrial Management and Data Systems , vol.106 , Issue.5 , pp. 601-620
    • Flavian, C.1    Guinaliu, M.2
  • 11
    • 2342528686 scopus 로고    scopus 로고
    • Scanners of the Year 2000: Heuristics
    • D. Gryaznov, "Scanners of the Year 2000: Heuristics," Proc. Fifth Int'l Virus Bull., pp. 225-234, 1999.
    • (1999) Proc. Fifth Int'l Virus Bull , pp. 225-234
    • Gryaznov, D.1
  • 13
    • 0028433633 scopus 로고
    • OR/AND Neuron in Modeling Fuzzy Set Connectives
    • K. Hirota and W. Pedrycz, "OR/AND Neuron in Modeling Fuzzy Set Connectives," IEEE Trans. Fuzzy Systems, vol. 2, no. 2, pp. 151-161, 1994.
    • (1994) IEEE Trans. Fuzzy Systems , vol.2 , Issue.2 , pp. 151-161
    • Hirota, K.1    Pedrycz, W.2
  • 14
    • 34547971553 scopus 로고    scopus 로고
    • M. Horridge, H. Knublauch, A. Rector, R. Stevens, and C. Wroe, A Practical Guide to Building OWL Ontologies Using the Protégé-OWL Plug-In and CO-ODE Tools, ed. 1.0, http://www.co-ode.org/resources/ rutorials/ProtegeOWLTutorial.pdf, 2004.
    • M. Horridge, H. Knublauch, A. Rector, R. Stevens, and C. Wroe, "A Practical Guide to Building OWL Ontologies Using the Protégé-OWL Plug-In and CO-ODE Tools," ed. 1.0, http://www.co-ode.org/resources/ rutorials/ProtegeOWLTutorial.pdf, 2004.
  • 15
    • 84947915842 scopus 로고    scopus 로고
    • Dealing with Semantic Heterogeneity During Data Integration
    • J. Akoka, M. Bouzeghoub, I. Comyn-Wattiau, and E. Metais, eds, pp
    • Z. Kedad and E. Metais, "Dealing with Semantic Heterogeneity During Data Integration," Proc. 18th Int'l Conf. Conceptual Modeling, J. Akoka, M. Bouzeghoub, I. Comyn-Wattiau, and E. Metais, eds., pp. 325-339, 1999.
    • (1999) Proc. 18th Int'l Conf. Conceptual Modeling , pp. 325-339
    • Kedad, Z.1    Metais, E.2
  • 16
    • 25144474491 scopus 로고    scopus 로고
    • Enterprise Security Architecture in Business Convergence Environments
    • S. Kim and C.S. Leem, "Enterprise Security Architecture in Business Convergence Environments," Industrial Management and Data Systems, vol. 105, no. 7, pp. 919-936, 2005.
    • (2005) Industrial Management and Data Systems , vol.105 , Issue.7 , pp. 919-936
    • Kim, S.1    Leem, C.S.2
  • 19
    • 0029410109 scopus 로고
    • CYC: A Large-Scale Investment in Knowledge Infrastructure
    • D.B. Lenat, "CYC: A Large-Scale Investment in Knowledge Infrastructure," Comm. ACM, vol. 38, no. 11, pp. 33-41, 1995.
    • (1995) Comm. ACM , vol.38 , Issue.11 , pp. 33-41
    • Lenat, D.B.1
  • 21
    • 0034313609 scopus 로고    scopus 로고
    • Dynamic Knowledge Inference and Learning Under Adaptive Fuzzy Petri Net Framework
    • X. Li and W. Yu, "Dynamic Knowledge Inference and Learning Under Adaptive Fuzzy Petri Net Framework," IEEE Trans. Systems, Man, and Cybernetics - PART C: Applications and Rev., vol. 30, no. 4, pp. 442-450, 2000.
    • (2000) IEEE Trans. Systems, Man, and Cybernetics - PART C: Applications and Rev , vol.30 , Issue.4 , pp. 442-450
    • Li, X.1    Yu, W.2
  • 22
    • 0034300620 scopus 로고    scopus 로고
    • Adaptive Fuzzy Petri Nets for Dynamic Knowledge Representation and Inference
    • X. Li and F.L. Rosano, "Adaptive Fuzzy Petri Nets for Dynamic Knowledge Representation and Inference," Expert System with Applications, vol. 19, no. 3, pp. 235-241, 2000.
    • (2000) Expert System with Applications , vol.19 , Issue.3 , pp. 235-241
    • Li, X.1    Rosano, F.L.2
  • 23
    • 0347338731 scopus 로고
    • Fuzzy Petri Nets and Applications
    • S.G. Tzafestas and A.N. Venetsanopoulos, eds, pp, Kluwer Academic Publishers
    • C.G. Looney, "Fuzzy Petri Nets and Applications," Fuzzy Reasoning in Information, Decision and Control Systems, S.G. Tzafestas and A.N. Venetsanopoulos, eds., pp. 511-527, Kluwer Academic Publishers, 1994.
    • (1994) Fuzzy Reasoning in Information, Decision and Control Systems , pp. 511-527
    • Looney, C.G.1
  • 24
    • 0023531258 scopus 로고
    • Logical Controls via Boolean Rule Matrix Transformations
    • Nov./Dec
    • C.G. Looney and A.R. Alfize, "Logical Controls via Boolean Rule Matrix Transformations," IEEE Trans. Systems, Man, and Cybernetics, vol. 17, no. 6, pp. 1077-1082, Nov./Dec. 1987.
    • (1987) IEEE Trans. Systems, Man, and Cybernetics , vol.17 , Issue.6 , pp. 1077-1082
    • Looney, C.G.1    Alfize, A.R.2
  • 26
    • 0034269416 scopus 로고    scopus 로고
    • Attacking Malicious Code: Report to the Infosec Research Council
    • Sept./Oct
    • G. McGraw and G. Morrisett, "Attacking Malicious Code: Report to the Infosec Research Council," IEEE Software, vol. 17, no. 5, pp. 33-41, Sept./Oct. 2000.
    • (2000) IEEE Software , vol.17 , Issue.5 , pp. 33-41
    • McGraw, G.1    Morrisett, G.2
  • 28
    • 0141722583 scopus 로고    scopus 로고
    • Tutorial on Ontological Engineering - Part 1: Introduction to Ontological Engineering New Generation Computing
    • R. Mizoguchi, "Tutorial on Ontological Engineering - Part 1: Introduction to Ontological Engineering New Generation Computing," New Generation Computing, vol. 21, no. 4, pp. 365-384, 2003.
    • (2003) New Generation Computing , vol.21 , Issue.4 , pp. 365-384
    • Mizoguchi, R.1
  • 29
    • 0024645936 scopus 로고
    • Petri Nets: Properties, Analysis and Applications
    • T. Murata, "Petri Nets: Properties, Analysis and Applications," Proc. IEEE, vol. 77, no. 4, pp. 541-580, 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.4 , pp. 541-580
    • Murata, T.1
  • 31
    • 0028532706 scopus 로고
    • A Generalized Fuzzy Petri Net Model
    • W. Pedrycz and F. Gomide, "A Generalized Fuzzy Petri Net Model," IEEE Trans. Fuzzy Systems, vol. 2, no. 4, pp. 295-301, 1994.
    • (1994) IEEE Trans. Fuzzy Systems , vol.2 , Issue.4 , pp. 295-301
    • Pedrycz, W.1    Gomide, F.2
  • 32
    • 34547971740 scopus 로고    scopus 로고
    • Protégé 2000, http://protege.stanford.edu/, 2005.
    • (2000)
    • Protégé1
  • 33
    • 9144249722 scopus 로고    scopus 로고
    • Email Virus: How Organizations Can Protect Their Emails
    • D.H. Shih and H.S. Chiang, "Email Virus: How Organizations Can Protect Their Emails," Online Information Rev., vol. 28, no. 5, pp. 356-366, 2004.
    • (2004) Online Information Rev , vol.28 , Issue.5 , pp. 356-366
    • Shih, D.H.1    Chiang, H.S.2
  • 35
    • 18144374544 scopus 로고    scopus 로고
    • Classification Methods in the Detection of New Malicious Emails
    • June 9
    • D.H. Shih, H.S. Chiang, and D.C. Yen, "Classification Methods in the Detection of New Malicious Emails," Information Sciences, vol. 172, nos. 1-2, pp. 241-261, June 9, 2005.
    • (2005) Information Sciences , vol.172 , Issue.1-2 , pp. 241-261
    • Shih, D.H.1    Chiang, H.S.2    Yen, D.C.3
  • 36
    • 0003545819 scopus 로고
    • The Internet Worm Program: An Analysis
    • Technical Report CSD-TR-823, Dept. of Computer Science, Purdue Univ
    • E.H. Spafford, "The Internet Worm Program: An Analysis," Technical Report CSD-TR-823, Dept. of Computer Science, Purdue Univ., 1988.
    • (1988)
    • Spafford, E.H.1
  • 37
    • 0036722396 scopus 로고    scopus 로고
    • Ontologies for Conceptual Modeling: Their Creation, Use, and Management
    • V. Sugumaran and V.C. Storey, "Ontologies for Conceptual Modeling: Their Creation, Use, and Management," Data and Knowledge Eng., vol. 24, no. 3, pp. 251-271, 2002.
    • (2002) Data and Knowledge Eng , vol.24 , Issue.3 , pp. 251-271
    • Sugumaran, V.1    Storey, V.C.2
  • 39
    • 0032025183 scopus 로고    scopus 로고
    • A Multilevel Weighted Fuzzy Reasoning Algorithm for Expert Systems
    • D.S. Yeung and E.C.C. Tsang, "A Multilevel Weighted Fuzzy Reasoning Algorithm for Expert Systems," IEEE Trans. Systems, Man, and Cybernetics, vol. 28, no. 2, pp. 149-158, 1998.
    • (1998) IEEE Trans. Systems, Man, and Cybernetics , vol.28 , Issue.2 , pp. 149-158
    • Yeung, D.S.1    Tsang, E.C.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.