Fuzzy colored time Petri net and termination analysis for fuzzy Event-Condition-Action rules
暂无分享,去创建一个
Xiaolin Hu | Xiaoming Wang | Lichen Zhang | Wenyang Dou | Xiaolin Hu | Xiaoming Wang | Lichen Zhang | Wenyang Dou
[1] Kurt Jensen. An Introduction to the Theoretical Aspects of Coloured Petri Nets , 1994 .
[2] Klaus Reinhardt,et al. Reachability in Petri Nets with Inhibitor Arcs , 2008, RP.
[3] Roy H. Campbell,et al. An ECA-P policy-based framework for managing ubiquitous computing environments , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[4] Özgür Ulusoy,et al. Dealing with Fuzziness in Active Mobile Database Systems , 1999, Inf. Sci..
[5] Mark Weiser. The computer for the 21st century , 1991 .
[6] Mukesh Singhal,et al. Trust Management in Distributed Systems , 2007, Computer.
[7] Elena Baralis,et al. Improving Rule Analysis by Means of Triggering and Activation Graphs , 1995, Rules in Database Systems.
[8] Letizia Tanca,et al. A structured approach for the definition of the semantics of active databases , 1995, TODS.
[9] T. Bouaziz,et al. Applying fuzzy events to approximate reasoning in active databases , 1997, Proceedings of 6th International Fuzzy Systems Conference.
[10] Tharam S. Dillon,et al. The Fuzzy and Dynamic Nature of Trust , 2005, TrustBus.
[11] Tharam S. Dillon,et al. Fuzzy nature of trust and dynamic trust modeling in service oriented environments , 2005, SWS '05.
[12] Matthias Baldauf,et al. A survey on context-aware systems , 2007, Int. J. Ad Hoc Ubiquitous Comput..
[13] Peter Scheuermann,et al. Active Database Systems , 2008, Wiley Encyclopedia of Computer Science and Engineering.
[14] Bin Hu,et al. Fuzzy ECA Rules for Pervasive Decision-Centric Personalised Mobile Learning , 2010, Computational Intelligence for Technology Enhanced Learning.
[15] Bill N. Schilit,et al. Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.
[16] Adnan Yazici,et al. A fuzzy Petri net model for intelligent databases , 2007, Data Knowl. Eng..
[17] Suzanne W. Dietrich,et al. Active Rule Termination Analysis: An Implementation and Evaluation of the Refined Triggering Graph Method , 1999, Journal of Intelligent Information Systems.
[18] Jennifer Widom,et al. Better Termination Analysis for Active Databases , 1993, Rules in Database Systems.
[19] Lotfi A. Zadeh,et al. Is there a need for fuzzy logic? , 2008, NAFIPS 2008 - 2008 Annual Meeting of the North American Fuzzy Information Processing Society.
[20] Eun-Sun Cho,et al. An ECA rule-based task programming language for ubiquitous environments , 2006, 2006 8th International Conference Advanced Communication Technology.
[21] Timothy W. Finin,et al. Trust-Based Security in Pervasive Computing Environments , 2022 .
[22] Xiaoou Li,et al. ECA Rule Analysis in a Distributed Active Database , 2009, 2009 International Conference on Computer Technology and Development.
[23] Jennifer Widom,et al. Behavior of database production rules: termination, confluence, and observable determinism , 1992, SIGMOD '92.
[24] Hafida Belbachir,et al. The Priority of Rules and the Termination Analysis Using Petri Nets , 2007, Int. Arab J. Inf. Technol..
[25] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[26] Jennifer Widom,et al. An algebraic approach to static analysis of active database rules , 2000, TODS.
[27] Hélène Kirchner,et al. Secure interoperation design in multi-domains environments based on colored Petri nets , 2013, Inf. Sci..
[28] Vincent M. Stanford,et al. NIST Information Technology Laboratory Pervasive Computing Initiative , 2000 .
[29] Zhengping Wu,et al. Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).
[30] Antonio Puliafito,et al. From UML to Petri Nets: The PCM-Based Methodology , 2011, IEEE Transactions on Software Engineering.
[31] Danilo Montesi,et al. Termination analysis in active databases , 1999, Proceedings. IDEAS'99. International Database Engineering and Applications Symposium (Cat. No.PR00265).
[32] Morteza Amini,et al. Enhancing Role-Based Access Control Model through Fuzzy Relations , 2007, Third International Symposium on Information Assurance and Security.
[33] Vincent M. Stanford,et al. NIST Smart Space: pervasive computing initiative , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).
[34] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[35] Jan Friso Groote,et al. Operational semantics for Petri net components , 2007, Theor. Comput. Sci..
[36] Carlo Zaniolo,et al. On the Unification of Active Databases and Deductive databases , 1993, BNCOD.
[37] Jean Jacques Loiseau,et al. Constrained regulation of continuous Petri nets , 2009 .
[38] Witold Pedrycz,et al. Fuzzy timed Petri nets , 2003, Fuzzy Sets Syst..
[39] Jennifer Widom,et al. Static analysis techniques for predicting the behavior of active database rules , 1995, TODS.
[40] B. C. Brookes,et al. Information Sciences , 2020, Cognitive Skills You Need for the 21st Century.
[41] Alessandro Giua,et al. A Survey of Petri Net Methods for Controlled Discrete Event Systems , 1997, Discret. Event Dyn. Syst..
[42] Daniel P. Siewiorek,et al. Toward Context-Aware Computing: Experiences and Lessons , 2001, IEEE Intell. Syst..
[43] Shengyi Jiang,et al. Some information measures for interval-valued intuitionistic fuzzy sets , 2010, Inf. Sci..
[44] Friedemann Mattern,et al. Pervasive/Ubiquitous Computing , 2001, Informatik-Spektrum.
[45] Vilém Vychodil,et al. Confluence and termination of fuzzy relations , 2010, Inf. Sci..
[46] L. Baba-Hamed. Rules Termination Analysis Based on Petri Nets: Implementation Issues , 2006, 2006 2nd International Conference on Information & Communication Technologies.