Foundations of Information and Knowledge Systems
暂无分享,去创建一个
[1] Joshua Zhexue Huang,et al. Extensions to the k-Means Algorithm for Clustering Large Data Sets with Categorical Values , 1998, Data Mining and Knowledge Discovery.
[2] Wolfgang Spohn,et al. Ordinal Conditional Functions: A Dynamic Theory of Epistemic States , 1988 .
[3] Dorothy E. Denning,et al. Inference Controls for Statistical Databases , 1983, Computer.
[4] Fred B. Schneider,et al. Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[5] Joachim Biskup,et al. Preprocessing for controlled query evaluation with availability policy , 2008, J. Comput. Secur..
[6] Leonid Libkin,et al. Elements of Finite Model Theory , 2004, Texts in Theoretical Computer Science.
[7] Bernhard Thalheim,et al. Entity-relationship modeling - foundations of database technology , 2010 .
[8] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[9] Sushil Jajodia,et al. Combining fragmentation and encryption to protect privacy in data storage , 2010, TSEC.
[10] Selim G. Akl,et al. Views for Multilevel Database Security , 1986, 1986 IEEE Symposium on Security and Privacy.
[11] Sudipto Guha,et al. CURE: an efficient clustering algorithm for large databases , 1998, SIGMOD '98.
[12] Yi Li,et al. COOLCAT: an entropy-based algorithm for categorical clustering , 2002, CIKM '02.
[13] Jay Ligatti,et al. A Theory of Gray Security Policies , 2015, ESORICS.
[14] Sharad Malik,et al. Boolean satisfiability from theoretical hardness to practical success , 2009, Commun. ACM.
[15] Sarit Kraus,et al. Foundations of Secure Deductive Databases , 1995, IEEE Trans. Knowl. Data Eng..
[16] Sushil Jajodia,et al. The inference problem: a survey , 2002, SKDD.
[17] Martin Diller,et al. An Extension-Based Approach to Belief Revision in Abstract Argumentation , 2015, IJCAI.
[18] Richard L. Mendelsohn,et al. First-Order Modal Logic , 1998 .
[19] Zhexue Huang,et al. CLUSTERING LARGE DATA SETS WITH MIXED NUMERIC AND CATEGORICAL VALUES , 1997 .
[20] Thomas Studer,et al. Censors for Boolean Description Logic , 2014, Trans. Data Priv..
[21] Renata Wassermann,et al. Inconsistent-tolerant base revision through Argument Theory Change , 2012, Log. J. IGPL.
[22] Vipin Kumar,et al. Similarity Measures for Categorical Data: A Comparative Evaluation , 2008, SDM.
[23] Johannes Gehrke,et al. CACTUS—clustering categorical data using summaries , 1999, KDD '99.
[24] Michael K. Ng,et al. On the Impact of Dissimilarity Measure in k-Modes Clustering Algorithm , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[25] Dekang Lin,et al. An Information-Theoretic Definition of Similarity , 1998, ICML.
[26] Joseph Y. Halpern,et al. Secrecy in Multiagent Systems , 2008, TSEC.
[27] Ronald Fagin,et al. Reasoning about knowledge , 1995 .
[28] Geoff Sutcliffe. The TPTP Problem Library and Associated Infrastructure , 2017, Journal of Automated Reasoning.
[29] J. Aitchison,et al. Multivariate binary discrimination by the kernel method , 1976 .
[30] Sudipto Guha,et al. ROCK: a robust clustering algorithm for categorical attributes , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).
[31] Joachim Biskup,et al. A sound and complete model-generation procedure for consistent and confidentiality-preserving databases , 2011, Theor. Comput. Sci..
[32] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[33] James C. Bezdek,et al. Local convergence of the fuzzy c-Means algorithms , 1986, Pattern Recognit..
[34] Hector J. Levesque,et al. Knowledge Representation and Reasoning , 2004 .
[35] Ruggero G. Pensa,et al. Context-Based Distance Learning for Categorical Data Clustering , 2009, IDA.
[36] Shengrui Wang,et al. Central Clustering of Categorical Data with Automated Feature Weighting , 2013, IJCAI.
[37] E. Prud hommeaux,et al. SPARQL query language for RDF , 2011 .
[38] Joseph Y. Halpern,et al. Plausibility measures and default reasoning , 1996, JACM.
[39] Piero A. Bonatti,et al. A Confidentiality Model for Ontologies , 2013, International Semantic Web Conference.
[40] Michael K. Ng,et al. A fuzzy k-modes algorithm for clustering categorical data , 1999, IEEE Trans. Fuzzy Syst..
[41] Sébastien Konieczny,et al. On the Revision of Argumentation Systems: Minimal Change of Arguments Statuses , 2014, KR.
[42] Guillermo Ricardo Simari,et al. Argument Theory Change: Revision Upon Warrant , 2008, COMMA.
[43] Sébastien Konieczny,et al. Extension Enforcement in Abstract Argumentation as an Optimization Problem , 2015, IJCAI.
[44] Henryk Wozniakowski,et al. The statistical security of a statistical database , 1984, TODS.
[45] Iyad Rahwan,et al. Quantifying disagreement in argument-based reasoning , 2012, AAMAS.
[46] Piero A. Bonatti,et al. Optimized Construction of Secure Knowledge-Base Views , 2015, Description Logics.
[47] J. A. Robinson,et al. Handbook of Automated Reasoning (in 2 volumes) , 2001 .
[48] Phan Minh Dung,et al. On the Acceptability of Arguments and its Fundamental Role in Nonmonotonic Reasoning, Logic Programming and n-Person Games , 1995, Artif. Intell..
[49] Sushil Jajodia,et al. Fragmentation in Presence of Data Dependencies , 2014, IEEE Transactions on Dependable and Secure Computing.
[50] H. Ralambondrainy,et al. A conceptual version of the K-means algorithm , 1995, Pattern Recognit. Lett..
[51] Yuri Gurevich,et al. The Classical Decision Problem , 1997, Perspectives in Mathematical Logic.
[52] David Sands,et al. Dimensions and principles of declassification , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[53] Mihalis Yannakakis,et al. Equivalences Among Relational Expressions with the Union and Difference Operators , 1980, J. ACM.
[54] Michael K. Ng,et al. Automated variable weighting in k-means type clustering , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[55] R. Suganya,et al. Data Mining Concepts and Techniques , 2010 .
[56] Anthony Hunter,et al. Instantiating abstract argumentation with classical logic arguments: Postulates and properties , 2011, Artif. Intell..
[57] Ruggero G. Pensa,et al. From Context to Distance: Learning Dissimilarity for Categorical Data Clustering , 2012, TKDD.
[58] James W. Gray,et al. Toward a mathematical foundation for information flow security , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[59] Reind P. van de Riet,et al. Answering queries without revealing secrets , 1983, TODS.
[60] Ohn Mar San,et al. An alternative extension of the k-means algorithm for clustering categorical data , 2004 .
[61] Ringo Baumann,et al. AGM Meets Abstract Argumentation: Expansion and Revision for Dung Frameworks , 2015, IJCAI.
[62] Sushil Jajodia,et al. Polyinstantation for Cover Stories , 1992, ESORICS.
[63] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[64] Joydeep Ghosh,et al. Cluster Ensembles --- A Knowledge Reuse Framework for Combining Multiple Partitions , 2002, J. Mach. Learn. Res..
[65] Torsten Werner. Introduction To Privacy Preserving Data Publishing Concepts And Techniques , 2016 .
[66] Jay Ligatti,et al. Modeling runtime enforcement with mandatory results automata , 2014, International Journal of Information Security.
[67] Isaac Levi. Subjunctives, dispositions and chances , 1977 .
[68] Dorothy E. Denning,et al. The SeaView Security Model , 1990, IEEE Trans. Software Eng..
[69] Ringo Baumann. What Does it Take to Enforce an Argument? Minimal Change in abstract Argumentation , 2012, ECAI.
[70] Sushil Jajodia,et al. Secure Data Management in Decentralized Systems , 2014, Secure Data Management in Decentralized Systems.
[71] Joao Marques-Silva,et al. Empirical Study of the Anatomy of Modern Sat Solvers , 2011, SAT.
[72] Michael Schmidt,et al. Foundations of SPARQL query optimization , 2008, ICDT '10.
[73] Raymond Reiter,et al. What should a database know? , 1988, PODS '88.
[74] Rajeev Motwani,et al. Distributing data for secure database services , 2011, PAIS '11.
[75] Jon M. Kleinberg,et al. Clustering categorical data: an approach based on dynamical systems , 2000, The VLDB Journal.
[76] Leila Amgoud,et al. Postulates for logic-based argumentation systems , 2014, Int. J. Approx. Reason..
[77] Panayiotis Tsaparas,et al. Limbo: A scalable algorithm to cluster categorical data , 2003 .
[78] Frédéric Cuppens,et al. Cover story management , 2001, Data Knowl. Eng..
[79] Peter Gärdenfors,et al. On the logic of theory change: Partial meet contraction and revision functions , 1985, Journal of Symbolic Logic.
[80] Gerhard Lakemeyer,et al. The logic of knowledge bases , 2000 .
[81] L. Hubert,et al. Comparing partitions , 1985 .
[82] Ringo Baumann,et al. Expanding Argumentation Frameworks: Enforcing and Monotonicity Results , 2010, COMMA.
[83] Shokri Z. Selim,et al. K-Means-Type Algorithms: A Generalized Convergence Theorem and Characterization of Local Optimality , 1984, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[84] Lucas Bordeaux,et al. Propositional Satisfiability and Constraint Programming: A comparative survey , 2006, CSUR.
[85] Guillermo Ricardo Simari,et al. Argument Theory Change Applied to Defeasible Logic Programming , 2008, AAAI.