-
1
-
-
0027883358
-
Database Mining: A Performance Perspective
-
Dec
-
R. Agrawal, T. Imielinski, and A. Swami, "Database Mining: A Performance Perspective," IEEE Trans. Knowledge and Data Eng., vol. 5, no. 6, pp. 914-925, Dec. 1993.
-
(1993)
IEEE Trans. Knowledge and Data Eng
, vol.5
, Issue.6
, pp. 914-925
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
2
-
-
0027621699
-
Mining Association Rules between Sets of Items in Large Databases
-
May
-
R. Agrawal, T. Imielinski, and A. Swami, "Mining Association Rules between Sets of Items in Large Databases," Proc. ACM SIGMOD Conf Management of Data, pp. 207-216, May 1993.
-
(1993)
Proc. ACM SIGMOD Conf Management of Data
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
4
-
-
0002883741
-
Building and Reusing Ontologies for Electrical Network Applications
-
A. Bernaras, I. Laresgoiti, and J. Corera, "Building and Reusing Ontologies for Electrical Network Applications," Proc. European Conf. Artificial Intelligence (ECAI '96), pp. 298-302, 1996.
-
(1996)
Proc. European Conf. Artificial Intelligence (ECAI '96)
, pp. 298-302
-
-
Bernaras, A.1
Laresgoiti, I.2
Corera, J.3
-
5
-
-
0025485332
-
Knowledge Representation Using Fuzzy Petri Nets
-
Sept
-
S. Chen, J.S. Ke, and J. Chang, "Knowledge Representation Using Fuzzy Petri Nets," IEEE Trans. Knowledge and Data Eng., vol. 2, no. 3, pp. 311-319, Sept. 1990.
-
(1990)
IEEE Trans. Knowledge and Data Eng
, vol.2
, Issue.3
, pp. 311-319
-
-
Chen, S.1
Ke, J.S.2
Chang, J.3
-
6
-
-
0038182929
-
Methodologies, Tools and Languages for Building Ontologies: Where Is Their Meeting Point?
-
S. Corcho, M. Fernández-López, and A. Gómez- Pérez, "Methodologies, Tools and Languages for Building Ontologies: Where Is Their Meeting Point?" Data Knowledge Eng., vol. 46, no. 1, pp. 41-64, 2003.
-
(2003)
Data Knowledge Eng
, vol.46
, Issue.1
, pp. 41-64
-
-
Corcho, S.1
Fernández-López, M.2
Gómez- Pérez, A.3
-
7
-
-
2342513049
-
Automated Assistance for Detecting Malicious Code
-
R. Crawford, P. Kerchen, K. Levitt, R. Olsson, M. Archer, and M. Casillas, "Automated Assistance for Detecting Malicious Code," Proc. Sixth Int'l Computer Virus and Security Conf., 1993.
-
(1993)
Proc. Sixth Int'l Computer Virus and Security Conf
-
-
Crawford, R.1
Kerchen, P.2
Levitt, K.3
Olsson, R.4
Archer, M.5
Casillas, M.6
-
9
-
-
33646354609
-
Consumer Trust, Perceived Security and Privacy Policy: Three Basic Elements of Loyalty to a Web Site
-
C. Flavian and M. Guinaliu, "Consumer Trust, Perceived Security and Privacy Policy: Three Basic Elements of Loyalty to a Web Site," Industrial Management and Data Systems, vol. 106, no. 5, pp. 601-620.
-
Industrial Management and Data Systems
, vol.106
, Issue.5
, pp. 601-620
-
-
Flavian, C.1
Guinaliu, M.2
-
11
-
-
2342528686
-
Scanners of the Year 2000: Heuristics
-
D. Gryaznov, "Scanners of the Year 2000: Heuristics," Proc. Fifth Int'l Virus Bull., pp. 225-234, 1999.
-
(1999)
Proc. Fifth Int'l Virus Bull
, pp. 225-234
-
-
Gryaznov, D.1
-
13
-
-
0028433633
-
OR/AND Neuron in Modeling Fuzzy Set Connectives
-
K. Hirota and W. Pedrycz, "OR/AND Neuron in Modeling Fuzzy Set Connectives," IEEE Trans. Fuzzy Systems, vol. 2, no. 2, pp. 151-161, 1994.
-
(1994)
IEEE Trans. Fuzzy Systems
, vol.2
, Issue.2
, pp. 151-161
-
-
Hirota, K.1
Pedrycz, W.2
-
14
-
-
34547971553
-
-
M. Horridge, H. Knublauch, A. Rector, R. Stevens, and C. Wroe, A Practical Guide to Building OWL Ontologies Using the Protégé-OWL Plug-In and CO-ODE Tools, ed. 1.0, http://www.co-ode.org/resources/ rutorials/ProtegeOWLTutorial.pdf, 2004.
-
M. Horridge, H. Knublauch, A. Rector, R. Stevens, and C. Wroe, "A Practical Guide to Building OWL Ontologies Using the Protégé-OWL Plug-In and CO-ODE Tools," ed. 1.0, http://www.co-ode.org/resources/ rutorials/ProtegeOWLTutorial.pdf, 2004.
-
-
-
-
15
-
-
84947915842
-
Dealing with Semantic Heterogeneity During Data Integration
-
J. Akoka, M. Bouzeghoub, I. Comyn-Wattiau, and E. Metais, eds, pp
-
Z. Kedad and E. Metais, "Dealing with Semantic Heterogeneity During Data Integration," Proc. 18th Int'l Conf. Conceptual Modeling, J. Akoka, M. Bouzeghoub, I. Comyn-Wattiau, and E. Metais, eds., pp. 325-339, 1999.
-
(1999)
Proc. 18th Int'l Conf. Conceptual Modeling
, pp. 325-339
-
-
Kedad, Z.1
Metais, E.2
-
16
-
-
25144474491
-
Enterprise Security Architecture in Business Convergence Environments
-
S. Kim and C.S. Leem, "Enterprise Security Architecture in Business Convergence Environments," Industrial Management and Data Systems, vol. 105, no. 7, pp. 919-936, 2005.
-
(2005)
Industrial Management and Data Systems
, vol.105
, Issue.7
, pp. 919-936
-
-
Kim, S.1
Leem, C.S.2
-
17
-
-
0003521691
-
Static Analysis Virus Detection Tools for UNIX Systems
-
P. Kerchen, R. Lo, J. Crossley, G. Elkinbard, and R. Ollson, "Static Analysis Virus Detection Tools for UNIX Systems," Proc. 13th Nat'l Computer Security Conf., pp. 350-365, 1990.
-
(1990)
Proc. 13th Nat'l Computer Security Conf
, pp. 350-365
-
-
Kerchen, P.1
Lo, R.2
Crossley, J.3
Elkinbard, G.4
Ollson, R.5
-
19
-
-
0029410109
-
CYC: A Large-Scale Investment in Knowledge Infrastructure
-
D.B. Lenat, "CYC: A Large-Scale Investment in Knowledge Infrastructure," Comm. ACM, vol. 38, no. 11, pp. 33-41, 1995.
-
(1995)
Comm. ACM
, vol.38
, Issue.11
, pp. 33-41
-
-
Lenat, D.B.1
-
21
-
-
0034313609
-
Dynamic Knowledge Inference and Learning Under Adaptive Fuzzy Petri Net Framework
-
X. Li and W. Yu, "Dynamic Knowledge Inference and Learning Under Adaptive Fuzzy Petri Net Framework," IEEE Trans. Systems, Man, and Cybernetics - PART C: Applications and Rev., vol. 30, no. 4, pp. 442-450, 2000.
-
(2000)
IEEE Trans. Systems, Man, and Cybernetics - PART C: Applications and Rev
, vol.30
, Issue.4
, pp. 442-450
-
-
Li, X.1
Yu, W.2
-
22
-
-
0034300620
-
Adaptive Fuzzy Petri Nets for Dynamic Knowledge Representation and Inference
-
X. Li and F.L. Rosano, "Adaptive Fuzzy Petri Nets for Dynamic Knowledge Representation and Inference," Expert System with Applications, vol. 19, no. 3, pp. 235-241, 2000.
-
(2000)
Expert System with Applications
, vol.19
, Issue.3
, pp. 235-241
-
-
Li, X.1
Rosano, F.L.2
-
23
-
-
0347338731
-
Fuzzy Petri Nets and Applications
-
S.G. Tzafestas and A.N. Venetsanopoulos, eds, pp, Kluwer Academic Publishers
-
C.G. Looney, "Fuzzy Petri Nets and Applications," Fuzzy Reasoning in Information, Decision and Control Systems, S.G. Tzafestas and A.N. Venetsanopoulos, eds., pp. 511-527, Kluwer Academic Publishers, 1994.
-
(1994)
Fuzzy Reasoning in Information, Decision and Control Systems
, pp. 511-527
-
-
Looney, C.G.1
-
24
-
-
0023531258
-
Logical Controls via Boolean Rule Matrix Transformations
-
Nov./Dec
-
C.G. Looney and A.R. Alfize, "Logical Controls via Boolean Rule Matrix Transformations," IEEE Trans. Systems, Man, and Cybernetics, vol. 17, no. 6, pp. 1077-1082, Nov./Dec. 1987.
-
(1987)
IEEE Trans. Systems, Man, and Cybernetics
, vol.17
, Issue.6
, pp. 1077-1082
-
-
Looney, C.G.1
Alfize, A.R.2
-
25
-
-
0029488806
-
MCF: A Malicious Code Filter
-
R.W. Lo, K.N. Levitt, and R.A. Olsson, "MCF: A Malicious Code Filter," Computers and Security, vol. 14, no. 6, pp. 541-566, 1995.
-
(1995)
Computers and Security
, vol.14
, Issue.6
, pp. 541-566
-
-
Lo, R.W.1
Levitt, K.N.2
Olsson, R.A.3
-
26
-
-
0034269416
-
Attacking Malicious Code: Report to the Infosec Research Council
-
Sept./Oct
-
G. McGraw and G. Morrisett, "Attacking Malicious Code: Report to the Infosec Research Council," IEEE Software, vol. 17, no. 5, pp. 33-41, Sept./Oct. 2000.
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 33-41
-
-
McGraw, G.1
Morrisett, G.2
-
27
-
-
0346212365
-
Machine Learning of Rules and Trees
-
Ellis Horwood
-
D. Michie, J. Spiegelhalter, and D.C.C. Taylor, "Machine Learning of Rules and Trees," Machine Learning, Neural and Statistical Classification, Ellis Horwood, 1994.
-
(1994)
Machine Learning, Neural and Statistical Classification
-
-
Michie, D.1
Spiegelhalter, J.2
Taylor, D.C.C.3
-
28
-
-
0141722583
-
Tutorial on Ontological Engineering - Part 1: Introduction to Ontological Engineering New Generation Computing
-
R. Mizoguchi, "Tutorial on Ontological Engineering - Part 1: Introduction to Ontological Engineering New Generation Computing," New Generation Computing, vol. 21, no. 4, pp. 365-384, 2003.
-
(2003)
New Generation Computing
, vol.21
, Issue.4
, pp. 365-384
-
-
Mizoguchi, R.1
-
29
-
-
0024645936
-
Petri Nets: Properties, Analysis and Applications
-
T. Murata, "Petri Nets: Properties, Analysis and Applications," Proc. IEEE, vol. 77, no. 4, pp. 541-580, 1989.
-
(1989)
Proc. IEEE
, vol.77
, Issue.4
, pp. 541-580
-
-
Murata, T.1
-
31
-
-
0028532706
-
A Generalized Fuzzy Petri Net Model
-
W. Pedrycz and F. Gomide, "A Generalized Fuzzy Petri Net Model," IEEE Trans. Fuzzy Systems, vol. 2, no. 4, pp. 295-301, 1994.
-
(1994)
IEEE Trans. Fuzzy Systems
, vol.2
, Issue.4
, pp. 295-301
-
-
Pedrycz, W.1
Gomide, F.2
-
32
-
-
34547971740
-
-
Protégé 2000, http://protege.stanford.edu/, 2005.
-
(2000)
-
-
Protégé1
-
33
-
-
9144249722
-
Email Virus: How Organizations Can Protect Their Emails
-
D.H. Shih and H.S. Chiang, "Email Virus: How Organizations Can Protect Their Emails," Online Information Rev., vol. 28, no. 5, pp. 356-366, 2004.
-
(2004)
Online Information Rev
, vol.28
, Issue.5
, pp. 356-366
-
-
Shih, D.H.1
Chiang, H.S.2
-
34
-
-
9444223825
-
Internet Security: Malicious E-Mails Detection and Protection
-
D.H. Shih, H.S. Chiang, C.Y. Chan, and B. Lin, "Internet Security: Malicious E-Mails Detection and Protection," Industrial Management and Data Systems, vol. 104, no. 7, pp. 613-623.
-
Industrial Management and Data Systems
, vol.104
, Issue.7
, pp. 613-623
-
-
Shih, D.H.1
Chiang, H.S.2
Chan, C.Y.3
Lin, B.4
-
35
-
-
18144374544
-
Classification Methods in the Detection of New Malicious Emails
-
June 9
-
D.H. Shih, H.S. Chiang, and D.C. Yen, "Classification Methods in the Detection of New Malicious Emails," Information Sciences, vol. 172, nos. 1-2, pp. 241-261, June 9, 2005.
-
(2005)
Information Sciences
, vol.172
, Issue.1-2
, pp. 241-261
-
-
Shih, D.H.1
Chiang, H.S.2
Yen, D.C.3
-
36
-
-
0003545819
-
The Internet Worm Program: An Analysis
-
Technical Report CSD-TR-823, Dept. of Computer Science, Purdue Univ
-
E.H. Spafford, "The Internet Worm Program: An Analysis," Technical Report CSD-TR-823, Dept. of Computer Science, Purdue Univ., 1988.
-
(1988)
-
-
Spafford, E.H.1
-
37
-
-
0036722396
-
Ontologies for Conceptual Modeling: Their Creation, Use, and Management
-
V. Sugumaran and V.C. Storey, "Ontologies for Conceptual Modeling: Their Creation, Use, and Management," Data and Knowledge Eng., vol. 24, no. 3, pp. 251-271, 2002.
-
(2002)
Data and Knowledge Eng
, vol.24
, Issue.3
, pp. 251-271
-
-
Sugumaran, V.1
Storey, V.C.2
-
38
-
-
85008539568
-
Ontologies
-
A.T. Swartout, "Ontologies," IEEE Intelligent Systems and Their Applications, vol. 14, no. 1, pp. 18-19, 1999.
-
(1999)
IEEE Intelligent Systems and Their Applications
, vol.14
, Issue.1
, pp. 18-19
-
-
Swartout, A.T.1
-
39
-
-
0032025183
-
A Multilevel Weighted Fuzzy Reasoning Algorithm for Expert Systems
-
D.S. Yeung and E.C.C. Tsang, "A Multilevel Weighted Fuzzy Reasoning Algorithm for Expert Systems," IEEE Trans. Systems, Man, and Cybernetics, vol. 28, no. 2, pp. 149-158, 1998.
-
(1998)
IEEE Trans. Systems, Man, and Cybernetics
, vol.28
, Issue.2
, pp. 149-158
-
-
Yeung, D.S.1
Tsang, E.C.C.2
|