Skip to main content
Primarily guided with the idea to express zero-time transitions by means of temporal propositional language, we have developed a temporal logic where the time flow is isomorphic to ordinal ω 2 (concatenation of ω copies of ω). If we think... more
    • by 
    •   3  
      Cognitive SciencePure MathematicsApplied Logic
The aim of the paper is to present a sound, strongly complete and decidable probabilistic temporal logic that can model reasoning about evidence. The formal system developed here is actually a solution of a problem proposed by Halpern and... more
    • by 
    •   5  
      Applied MathematicsEvidenceProbabilistic LogicDecidability
We show that certain families of sets and functions related to a countable structure A are analytic subsets of a Polish space. Examples include sets of automorphisms, endomorphisms and congruences of A and sets of the combinatorial nature... more
    • by 
    • Pure Mathematics
This paper presents a sound and strongly complete axiomatization of the reasoning about linear combinations of conditional probabilities, including compar- ative statements. The developed logic is decidable, with a PSPACE containment for... more
    • by 
    •   3  
      Pure MathematicsConditional probabilitydecision Procedure
Editors
    • by 
The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the need of plenty of Computational Power or the Local... more
    • by 
    •   11  
      Artificial Immune SystemsNetwork SecurityIntrusion DetectionArtificial Immune System
Abstract. In our understanding, a mind-map is an adaptive en-gine that basically works incrementally on the fundament of ex-isting transactional streams. Generally, mind-maps consist of sym-bolic cells that are connected with each other... more
    • by 
    •   10  
      Data AnalysisSymbolic ComputationComputer NetworkNatural language
Abstract— In the today's Internet and TCP/IP-networks, the queueing of packets is commonly imple-mented using the protocol FIFO (First In First Out). Unfortunately, FIFO performs poorly in the Adversar-ial Queueing Theory. Other... more
    • by 
    •   4  
      Queueing theoryUpper BoundFirst In First OutInternet traffic
Our belief is that conviviality is a concept of great depth that plays an important role in any social interaction. A convivial relation between individuals is one that allows participating individuals to behave and interact with each... more
    • by 
    • Web Based System
The following (position) paper follows the concept of the field of Artificial Life and argues that the (relational) management of data can be understood as a chemical model. Whereas each data itself is consistent with atomic entities,... more
    • by 
    • Artificial chemistry
We motivate the idea of e-conviviality in web-based systems and argue that a convivial social being deeply depends on the implicit and explicit co-operation and collaboration of natural users inside a community. We believe that a... more
    • by 
    •   3  
      User BehaviourWeb Based SystemInternet
The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion De- tection Systems have significant Disadvantages, e.g. the need of plenty of Computational Power or the Local... more
    • by 
    •   12  
      Computational ComplexityArtificial Immune SystemsNetwork SecurityIntrusion Detection
Content zoning can be understood as a segmentation of textual documents into zones. This is inspired by [6] who initially proposed an approach for the argumentative zoning of textual documents. With the prototypical Cozo+ engine, we focus... more
    • by 
    •   2  
      Information RetrievalAutomatic code generation
    • by 
    •   2  
      Machine LearningSentiment Analysis
Our belief is that conviviality is a concept of great depth that plays an important role in any social interaction. A convivial relation between individuals is one that allows participating individuals to behave and interact with each... more
    • by 
In the today's Internet and TCP/IP-networks, the queueing of packets is commonly implemented using the protocol FIFO (First In First Out). Unfortunately, FIFO performs poorly in the Adversarial Queueing Theory. Other queueing strategies... more
    • by 
    •   4  
      Queueing theoryUpper BoundFirst In First OutInternet traffic
The explorative mind-map is a dynamic framework, that emerges automatically from the input, it gets. It is unlike a verificative modeling system where existing (human) thoughts are placed and connected together. In this regard,... more
    • by 
    •   5  
      Data MiningCognitionCognitive EngineeringComputational Trust
For human beings, the processing of text streams of unknown size leads generally to problems because e.g. noise must be selected out, information be tested for its relevance or redundancy, and linguistic phenomenon like ambiguity or the... more
    • by 
    • Noun
In this paper, we introduce an explorative but adaptive-associative information management system in the presence of a natural conversation. We take advantage of these explorative mind-maps, which have been demonstrated in and which are... more
    • by 
    •   8  
      Computer ArchitectureInformation ManagementCognitionSkeleton
Current network protection systems use a collection of intelligent components -e.g. classifiers or rule-based firewall systems to detect intrusions and anomalies and to secure a network against viruses, worms, or trojans. However, these... more
    • by 
    •   5  
      Data MiningArtificial Immune SystemsArtificial Immune SystemRule Based