Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 136 - 150 of 158.

Add to Quick Collection   All 158 Results

Sort:
 Add All Items to Quick Collection
Date: 2006
Subject Keyword: 080400 Data Format
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/101177
Description: Clustering is a major technique in data mining. However the numerical feedback of clustering algorithms is difficult for user to have an intuitive overview of the dataset that they deal with. Visualiz ... More
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/101195
Description: Cluster analysis is an important technique that has been used in data mining. However, cluster analysis provides numerical feedback making it hard for users to understand the results better; and also ... More
Reviewed: Reviewed
Date: 2006
Subject Keyword: 080600 Information Systems
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/101332
Description: Relational Database storage for XML data is the most affordable and available solution. Meanwhile supporting document order and structure for dynamic XML data in RDBMS still needs more work. We presen ... More
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/111354
Description: To develop theories to specify and reason about various aspects of multi-agent systems, many researchers have proposed the use of modal logics such as belief logics, logics of knowledge, and logics of ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/101171
Description: We present a new model of knowledge, belief, desire and intention, called the interpreted KBDI-system model (or KBDI-model for short). The key point of the interpreted KBDI-system model is that we exp ... More
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/17742
Description: Many formal frameworks have been proposed for specifying and reasoning about the notion of trust and trust mechanisms in agent-based systems. Typed modal logic (TML) is a logic of beliefs which is sui ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/17786
Description: Modelling, reasoning about and integrating knowledge based on multiple time granularities in knowledge-based systems is important, especially when talking about events that take place in the real worl ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/17647
Description: The multi-version approach is useful in both synchronous and asynchronous groupware systems. This paper discusses the implementation of a real-time group editor that embodies our approaches and algori ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/12038
Description: Most work on iterated belief change has focused on iterated belief revision, namely how to compute (K*ₓ)*y. Historically however, belief revision can be defined in terms of belief expansion and belief ... More
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/102637
Description: We present a new model of knowledge, belief, desire and intention, called the interpreted KBDI-system model (or KBDI-model for short). The key point of the interpreted KBDI-system model is that we exp ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/104739
Description: Security labels are applied for numerous reasons, including the handling of data communicated between open systems. The information contained within a security label can be utilised to perform access ... More
Reviewed: Reviewed
Authors: Ma, Ji | Orgun, Mehmet A
Date: 2006
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/8965
Description: A theory of trust for a given system consists of a set of rules that describe trust of agents in the system. In a certain logical framework, the theory is generally established based on the initial tr ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/17754
Description: Unsupervised learning plays an important role in knowledge exploration and discovery. Two basic examples of unsupervised learning are clustering and dimensionality reduction. In this paper, we introdu ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2006
Subject Keyword: 080600 Information Systems
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/101329
Description: Storing XML documents in relational database systems is still the most affordable and available storage solution. Meanwhile more work is still needed to provide efficient support for dynamic XML data ... More
Reviewed: Reviewed
Date: 2005
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/148343
Description: To introduce a temporal dimension to a belief logic, we consider a powerful technique called fibring for combining belief logics and temporal logics. In a fibred belief logic, both temporal operators ... More
Reviewed: Reviewed