Gotowa bibliografia na temat „Anomaly reasoning”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Anomaly reasoning”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Anomaly reasoning"
Naguib, Mohamed, Sorin J. Brull i Hal R. Arkes. "Reasoning of an Anomaly". Anesthesia & Analgesia 117, nr 2 (sierpień 2013): 297–300. http://dx.doi.org/10.1213/ane.0b013e318292ee3c.
Pełny tekst źródłaFauzi, Arwin Happy Nur, i Masduki Masduki. "Student’s Anomaly Reasoning in Solving Number Pattern in terms of Gender". Jurnal Didaktik Matematika 9, nr 2 (31.10.2022): 328–42. http://dx.doi.org/10.24815/jdm.v9i2.27146.
Pełny tekst źródłaSamaan, Nancy, i Ahmed Karmouch. "Network anomaly diagnosis via statistical analysis and evidential reasoning". IEEE Transactions on Network and Service Management 5, nr 2 (czerwiec 2008): 65–77. http://dx.doi.org/10.1109/tnsm.2008.021103.
Pełny tekst źródłaZaheer, Muhammad Zaigham, Arif Mahmood, Hochul Shin i Seung-Ik Lee. "A Self-Reasoning Framework for Anomaly Detection Using Video-Level Labels". IEEE Signal Processing Letters 27 (2020): 1705–9. http://dx.doi.org/10.1109/lsp.2020.3025688.
Pełny tekst źródłaJaunzemis, Andris D., Marcus J. Holzinger i K. Kim Luu. "Sensor Tasking for Spacecraft Custody Maintenance and Anomaly Detection Using Evidential Reasoning". Journal of Aerospace Information Systems 15, nr 3 (marzec 2018): 131–56. http://dx.doi.org/10.2514/1.i010584.
Pełny tekst źródłaJungck, John R. "Reasoning in biological discoveries: Essays of mechanisms, interfield relations, and anomaly resolution". Science Education 91, nr 5 (wrzesień 2007): 844–45. http://dx.doi.org/10.1002/sce.20229.
Pełny tekst źródłaSun, De Gang, Kun Yang, Xiang Jing, Bin Lv i Yan Wang. "Abnormal Network Traffic Detection Based on Conditional Event Algebra". Applied Mechanics and Materials 644-650 (wrzesień 2014): 1093–99. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.1093.
Pełny tekst źródłaABE, MITSUO, i NOBORU NAKANISHI. "EXACT SOLUTIONS TO THE TWO-DIMENSIONAL BF AND YANG–MILLS THEORIES IN THE LIGHT-CONE GAUGE". International Journal of Modern Physics A 17, nr 11 (30.04.2002): 1491–502. http://dx.doi.org/10.1142/s0217751x02009825.
Pełny tekst źródłaEfendi, Erfan, i Abd Rozzaq. "Nalar Atensi Pemilihan Perguruan Tinggi Islam di Program Studi FTIK UIN K.H Achmad Shiddiq Jember". Scaffolding: Jurnal Pendidikan Islam dan Multikulturalisme 4, nr 2 (30.08.2022): 531–48. http://dx.doi.org/10.37680/scaffolding.v4i2.1721.
Pełny tekst źródłaAl Rashdan, Ahmad Y., Hany S. Abdel-Khalik, Kellen M. Giraud, Daniel G. Cole, Jacob A. Farber, William W. Clark, Abenezer Alemu, Marcus C. Allen, Ryan M. Spangler i Athi Varuttamaseni. "A Qualitative Strategy for Fusion of Physics into Empirical Models for Process Anomaly Detection". Energies 15, nr 15 (3.08.2022): 5640. http://dx.doi.org/10.3390/en15155640.
Pełny tekst źródłaRozprawy doktorskie na temat "Anomaly reasoning"
Riveiro, María José. "Visual analytics for maritime anomaly detection". Doctoral thesis, Örebro universitet, Akademin för naturvetenskap och teknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-12783.
Pełny tekst źródłaMaria Riveiro is also affiliated to Informatics Research Centre, Högskolan i Skövde
Information Fusion Research Program, Högskolan i Skövde
Eckroth, Joshua Ryan. "Anomaly-Driven Belief Revision by Abductive Metareasoning". The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397557509.
Pełny tekst źródłaKronberg, F., A. Weiner, T. Morgan, B. Stroozas, E. Girouard, A. Hopkins, L. Wong, M. James, J. Kneubuhl i R. F. Malina. "Document Retrieval Triggered by Spacecraft Anomaly: Using the Kolodner Case-Based Reasoning (CBR) Paradigm to Design a Fault-Induced Response System". International Foundation for Telemetering, 1996. http://hdl.handle.net/10150/611459.
Pełny tekst źródłaWe report on the initial design and development of a prototype computer-mediated response system, the Fault Induced Document Officer (FIDO), at the UC Berkeley Center for EUV Astrophysics (CEA) Extreme Ultraviolet Explorer project (EUVE). Typical 24x7 staffed spacecraft operations use highly skilled expert teams to monitor current ground systems and spacecraft state for responding to anomalous ground system and spacecraft conditions. Response to ground system error messages and spacecraft anomalies is based on knowledge of nominal component behavior and the evaluation of relevant telemetry by the team. This type of human-mediated operation is being replaced by an intelligent software system to reduce costs and to increase performance and reliability. FIDO is a prototype software application that will provide automated retrieval and display of documentation for operations staff. Initially, FIDO will be applied for ground systems. Later implementations of FIDO will target spacecraft systems. FIDO is intended to provide system state summary, links to relevant documentation, and suggestions for operator responses to error messages. FIDO will provide the operator with near realtime expert assistance and access to necessary information. This configuration should allow the resolution of many anomalies without the need for on-site intervention by a skilled controller or expert.
Książki na temat "Anomaly reasoning"
Darden, Lindley. Reasoning in Biological Discoveries: Essays on Mechanisms, Interfield Relations, and Anomaly Resolution. Cambridge University Press, 2006.
Znajdź pełny tekst źródłaDarden, Lindley. Reasoning in Biological Discoveries: Essays on Mechanisms, Interfield Relations, and Anomaly Resolution. Cambridge University Press, 2006.
Znajdź pełny tekst źródłaDarden, Lindley. Reasoning in Biological Discoveries: Essays on Mechanisms, Interfield Relations, and Anomaly Resolution. Cambridge University Press, 2009.
Znajdź pełny tekst źródłaDarden, Lindley. Reasoning in Biological Discoveries: Essays on Mechanisms, Interfield Relations, and Anomaly Resolution. Cambridge University Press, 2006.
Znajdź pełny tekst źródłaDarden, Lindley. Reasoning in Biological Discoveries: Essays on Mechanisms, Interfield Relations, and Anomaly Resolution. Cambridge University Press, 2006.
Znajdź pełny tekst źródłaDarden, Lindley. Reasoning in Biological Discoveries: Essays on Mechanisms, Interfield Relations, and Anomaly Resolution. Cambridge University Press, 2009.
Znajdź pełny tekst źródłaDarden, Lindley. Reasoning in Biological Discoveries: Essays on Mechanisms, Interfield Relations, and Anomaly Resolution (Cambridge Studies in Philosophy and Biology). Cambridge University Press, 2006.
Znajdź pełny tekst źródłaCzęści książek na temat "Anomaly reasoning"
Zhang, Kehan, Xiaoqiang Di, Xu Liu, Bo Li, Luyue Fang, Yiping Qin i Jinhui Cao. "LogLR: A Log Anomaly Detection Method Based on Logical Reasoning". W Wireless Algorithms, Systems, and Applications, 489–500. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19214-2_41.
Pełny tekst źródłaEyorokon, Vahid B., Pratyusha Yalamanchili i Michael T. Cox. "Tangent Recognition and Anomaly Pruning to TRAP Off-Topic Questions in Conversational Case-Based Dialogues". W Case-Based Reasoning Research and Development, 95–109. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01081-2_7.
Pełny tekst źródłaHammer, Patrick, Tony Lofthouse, Enzo Fenoglio, Hugo Latapie i Pei Wang. "A Reasoning Based Model for Anomaly Detection in the Smart City Domain". W Advances in Intelligent Systems and Computing, 144–59. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-55187-2_13.
Pełny tekst źródłaXu, Jie, i Jiantao Zhou. "A Fine-Grained Anomaly Detection Method Fusing Isolation Forest and Knowledge Graph Reasoning". W Web Information Systems and Applications, 135–42. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-20309-1_12.
Pełny tekst źródłaSharma, Pulkit, Shezan Rohinton Mirzan, Apurva Bhandari, Anish Pimpley, Abhiram Eswaran, Soundar Srinivasan i Liqun Shao. "Evaluating Tree Explanation Methods for Anomaly Reasoning: A Case Study of SHAP TreeExplainer and TreeInterpreter". W Lecture Notes in Computer Science, 35–45. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65847-2_4.
Pełny tekst źródłaCorneli, Alessandra, Leonardo Binni, Berardo Naticchia i Massimo Vaccarini. "Digital Twin Models Supporting Cognitive Buildings for Ambient Assisted Living". W The Urban Book Series, 167–78. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29515-7_16.
Pełny tekst źródłaMakhlouf, Amel Meddeb, i Noureddine Boudriga. "Intrusion and Anomaly Detection in Wireless Networks". W Handbook of Research on Wireless Security, 78–94. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch006.
Pełny tekst źródłaStreszczenia konferencji na temat "Anomaly reasoning"
Carter, Kevin M., i William W. Streilein. "Probabilistic reasoning for streaming anomaly detection". W 2012 IEEE Statistical Signal Processing Workshop (SSP). IEEE, 2012. http://dx.doi.org/10.1109/ssp.2012.6319708.
Pełny tekst źródłaSun, Che, Yunde Jia i Yuwei Wu. "Evidential Reasoning for Video Anomaly Detection". W MM '22: The 30th ACM International Conference on Multimedia. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3503161.3548091.
Pełny tekst źródłaSaleh, Babak, Ali Farhadi i Ahmed Elgammal. "Object-Centric Anomaly Detection by Attribute-Based Reasoning". W 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2013. http://dx.doi.org/10.1109/cvpr.2013.107.
Pełny tekst źródłaRamachandran, Sowmya, i Christian Belardi. "Case-Based Reasoning for System Anomaly Detection and Management". W 2021 IEEE Aerospace Conference. IEEE, 2021. http://dx.doi.org/10.1109/aero50100.2021.9438252.
Pełny tekst źródłaVandecasteele, Arnaud, i Aldo Napoli. "An enhanced spatial reasoning ontology for maritime anomaly detection". W 2012 7th International Conference on System of Systems Engineering (SoSE). IEEE, 2012. http://dx.doi.org/10.1109/sysose.2012.6384120.
Pełny tekst źródłaRen, Wenyu, Tuo Yu, Timothy Yardley i Klara Nahrstedt. "CAPTAR: Causal-Polytree-based Anomaly Reasoning for SCADA Networks". W 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, 2019. http://dx.doi.org/10.1109/smartgridcomm.2019.8909766.
Pełny tekst źródłaTrifunov, Violeta Teodora, Maha Shadaydeh, Bjorn Barz i Joachim Denzler. "Anomaly Attribution of Multivariate Time Series using Counterfactual Reasoning". W 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, 2021. http://dx.doi.org/10.1109/icmla52953.2021.00033.
Pełny tekst źródłaChen, Qiuwen, Qing Wu, Morgan Bishop, Richard Linderman i Qinru Qiu. "Self-structured confabulation network for fast anomaly detection and reasoning". W 2015 International Joint Conference on Neural Networks (IJCNN). IEEE, 2015. http://dx.doi.org/10.1109/ijcnn.2015.7280371.
Pełny tekst źródłaLi, Fei, Guowen Zhou, Xingshuo Li, Linhai Zhu i Hongzhi Wang. "A symbolic reasoning based anomaly detection for gas turbine subsystems". W 2017 Prognostics and System Health Management Conference (PHM-Harbin). IEEE, 2017. http://dx.doi.org/10.1109/phm.2017.8079230.
Pełny tekst źródłaRiveiro, Maria, i Göran Falkman. "Supporting the Analytical Reasoning Process in Maritime Anomaly Detection: Evaluation and Experimental Design". W 2010 14th International Conference Information Visualisation (IV). IEEE, 2010. http://dx.doi.org/10.1109/iv.2010.34.
Pełny tekst źródłaRaporty organizacyjne na temat "Anomaly reasoning"
Muchnik, Ilya B., William M. Pottenger i Nikita I. Lytkin. Anomaly Detection by Reasoning from Evidence in Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, sierpień 2008. http://dx.doi.org/10.21236/ada501011.
Pełny tekst źródła