Literatura científica selecionada sobre o tema "Information-Based Complexity"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Information-Based Complexity".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Information-Based Complexity"
Wozniakowski, H. "Information-Based Complexity". Annual Review of Computer Science 1, n.º 1 (junho de 1986): 319–80. http://dx.doi.org/10.1146/annurev.cs.01.060186.001535.
Texto completo da fontePackel, Edward W., e J. F. Traub. "Information-based complexity". Nature 328, n.º 6125 (julho de 1987): 29–33. http://dx.doi.org/10.1038/328029a0.
Texto completo da fonteHeinrich, Stefan, e Jörg-Detlef Kern. "Parallel information-based complexity". Journal of Complexity 7, n.º 4 (dezembro de 1991): 339–70. http://dx.doi.org/10.1016/0885-064x(91)90024-r.
Texto completo da fonteKon, Mark A. "Book Review: Information-based complexity". Bulletin of the American Mathematical Society 21, n.º 2 (1 de outubro de 1989): 332–40. http://dx.doi.org/10.1090/s0273-0979-1989-15851-5.
Texto completo da fonteTraub, J. F., e H. Wo\'zniakowski. "Perspectives on Information-Based Complexity". Bulletin of the American Mathematical Society 26, n.º 1 (1 de abril de 1992): 29–53. http://dx.doi.org/10.1090/s0273-0979-1992-00240-9.
Texto completo da fonteLui, Leong Ting, Germán Terrazas, Hector Zenil, Cameron Alexander e Natalio Krasnogor. "Complexity Measurement Based on Information Theory and Kolmogorov Complexity". Artificial Life 21, n.º 2 (maio de 2015): 205–24. http://dx.doi.org/10.1162/artl_a_00157.
Texto completo da fonteParlett, Beresford N. "Some basic information\\ on information-based complexity theory". Bulletin of the American Mathematical Society 26, n.º 1 (1 de janeiro de 1992): 3–29. http://dx.doi.org/10.1090/s0273-0979-1992-00239-2.
Texto completo da fonteOrme, Anthony Mark, Haining Yao e Letha H. Etzkorn. "Complexity metrics for ontology based information". International Journal of Technology Management 47, n.º 1/2/3 (2009): 161. http://dx.doi.org/10.1504/ijtm.2009.024120.
Texto completo da fontePackel, Edward W., e Henryk Woźniakowski. "Recent developments in information-based complexity". Bulletin of the American Mathematical Society 17, n.º 1 (1 de julho de 1987): 9–37. http://dx.doi.org/10.1090/s0273-0979-1987-15511-x.
Texto completo da fonteGalas, David J., Matti Nykter, Gregory W. Carter, Nathan D. Price e Ilya Shmulevich. "Biological Information as Set-Based Complexity". IEEE Transactions on Information Theory 56, n.º 2 (fevereiro de 2010): 667–77. http://dx.doi.org/10.1109/tit.2009.2037046.
Texto completo da fonteTeses / dissertações sobre o assunto "Information-Based Complexity"
Schmitt, Wagner. "A new 3D shape descriptor based on depth complexity and thickness information". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2015. http://hdl.handle.net/10183/127030.
Texto completo da fonteGeometric models play a vital role in several fields, from the entertainment industry to scientific applications. To reduce the high cost of model creation, reusing existing models is the solution of choice. Model reuse is supported by content-based shape retrieval (CBR) techniques that help finding the desired models in massive repositories, many publicly available on the Internet. Key to efficient and effective CBR techniques are shape descriptors that accurately capture the characteristics of a shape and are able to discriminate between different shapes. We present a descriptor based on the distribution of two global features measured on a 3D shape, depth complexity and thickness, which respectively capture aspects of the geometry and topology of 3D shapes. The final descriptor, called DCT (depth complexity and thickness histogram), is a 2D histogram that is invariant to the translation, rotation and scale of geometric shapes. We efficiently implement the DCT on the GPU, allowing its use in real-time queries of large model databases. We validate the DCT with the Princeton and Toyohashi Shape Benchmarks, containing 1815 and 10000 models respectively. Results show that DCT can discriminate meaningful classes of these benchmarks, and is fast to compute and robust against shape transformations and different levels of subdivision and smoothness.
Alamoudi, Rami Hussain. "Interaction Based Measure of Manufacturing Systems Complexity and Supply Chain Systems Vulnerability Using Information Entropy". Scholarly Repository, 2008. http://scholarlyrepository.miami.edu/oa_dissertations/76.
Texto completo da fonteThost, Veronika. "Using Ontology-Based Data Access to Enable Context Recognition in the Presence of Incomplete Information". Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-227633.
Texto completo da fonteDash, Santanu Kumar. "Adaptive constraint solving for information flow analysis". Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16354.
Texto completo da fonteEugénio, António Luís Beja. "The information systems and technology innovation process: a study using an agent-based approach". Master's thesis, Instituto Superior de Economia e Gestão, 2007. http://hdl.handle.net/10400.5/636.
Texto completo da fonteUm modelo abstracto baseado em agentes é utilizado para estudar a inovação em Sistemas de Informação e em Tecnologia de Informação, no plano organizacional, utilizando uma aproximação sócio-cognitiva. A conclusão do estudo indica que o poder dos profissionais conhecedores de tecnologias de informação na decisão de adopção de uma determinada inovação varia com o nível de concordância de ideias entre eles e os decisores, ao mesmo tempo que depende da taxa de depreciação das transacções, conduzindo a uma forte flutuação de poder quando o ambiente é instável.
An abstract Agent Based Model is used to study Information Systems and Information Technology innovation on an organizational realm, using a socio-cognitive approach. Conclusion is drawn that the power of the knowledge workers in the decision to adopt an IS/IT innovation within an organization varies with the matching level of ideas between them and the top management, while being dependant of the transactions’ depreciation rate, leading to a strong fluctuation of power when the environment is unstable.
Syed, Tamseel Mahmood. "Precoder Design Based on Mutual Information for Non-orthogonal Amplify and Forward Wireless Relay Networks". University of Akron / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=akron1392043776.
Texto completo da fonteClément, François. "An Optimization Perspective on the Construction of Low-Discrepancy Point Sets". Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS138.
Texto completo da fonteDiscrepancy measures are metrics designed to quantify how well spread a point set is in a given space. Among these, the L∞ star discrepancy is arguably one of the most popular. Indeed, by the Koksma-Hlawka inequality~cite{Hlawka,Koksma}, when replacing an integral by the average of function evaluations in specific points, the error made is bounded by a product of two terms, one depending only on the function and the other on the L∞ star discrepancy of the points. This leads to a variety of applications, from computer vision to financial mathematics and to design of experiments where well-spread points covering a space are essential.Low-discrepancy sets used in such applications usually correspond to number theoretic designs, with a wide variety of possible constructions. Despite the high demand in practice, the design of these point sets remains largely the work of mathematicians, often more interested in finding asymptotic bounds than in adapting the point sets to the desired applications. This results in point sets that, while theoretically excellent, sometimes leave a lot to be desired for applications, in particular high-dimensional ones. Indeed, the constructions are not tailored to the many different settings found in applications and are thus suboptimal. Furthermore, not only do we not know how low the discrepancy of point sets of a given size in a fixed dimension can go, but often we do not even know the discrepancy of existing constructions. This leaves essential questions unanswered in the design of low-discrepancy sets and sequences. In this thesis, we tackle the problem of constructing low-discrepancy sets from a computational perspective. With optimization approaches applied in isolation or on top of existing sets and sequences, we provide a diverse set of methods to generate excellent low-discrepancy sets, largely outperforming the discrepancy of known constructions in a wide variety of contexts. In particular, we describe a number of examples such as provably optimal sets for very few points in dimension 2, or improved sets of hundreds of points in moderate dimensions via subset selection. Finally, we extend recent work on greedy one-dimensional sequence construction to show that greedy L2 construction of point sets provides excellent empirical results with respect to the L∞ star discrepancy
Domercant, Jean Charles. "ARC-VM: an architecture real options complexity-based valuation methodology for military systems-of-systems acquisitions". Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42928.
Texto completo da fonteМельничук, Андрій Богданович, e Andrii Melnychuk. "Методи захисту інформації в рамках предметно-орієнтованого проєктування інформаційних систем". Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36742.
Texto completo da fonteПредметно-орієнтоване проектування — це підхід до проектування програмного забезпечення. Метод проєктування визначає у собі практики як спілкуватись із спеціалістами, самої, предметної області та набір правил проектування де кінцевий код буде відображати у собі всі поняття самого домену. У деяких випадках розділення проблем, передбачених предметно орієнтованим підходом, важко досягти, а саме, коли розглядається функціональність, яка не залежить від домену, але є тісно пов’язаною з функціональністю, пов’язаною з предметною областю. Дані проблеми стосуються блоку програми яка б відповідала за безпеку. На жаль, засновник досліджуваного підходу не визначив як саме можна поєднати таку логіку, тому було досліджено різні методи забезпечення захисту даних та аналіз найкращих варіантів реалізації, які можна застосовувати у реальних проектах.
Domain Driven Design — is an approach to software design. The approach method defines the practices of how to communicate with specialists, of the subject area and a set of design rules where the final code will reflect all the concepts of the domain itself. In some cases, the separation covered by a subject-oriented approach is difficult to achieve, namely when considering functionality that is independent of the domain but is closely related to functionality related to the subject area. These issues are related to the security unit. Unfortunately, the founder of the researched approach did not define exactly how such logic can be combined. That is why were researched the different methods of data protection and analysis of the best implementation options that can be used in real projects.
ПЕРЕЛІК УМОВНИХ СКОРОЧЕНЬ…8 ВСТУП… 9 РОЗДІЛ 1. АНАЛІЗ ПРЕДМЕТНО-ОРІЄНТОВАНОГО ПРОЄКТУВАННЯ ТА ПРОБЛЕМИ БЕЗПЕКИ У НЬОМУ…13 1.1. Предметно-орієнтоване проєктування…13 1.2 Архітектура та структура проекту при DDD проєктуванні… 16 1.3 Аспектно-орієнтоване програмування…18 1.4 Вимірювання складності реалізації методу… 20 1.5 Проблема захисту даних при проектуванні…22 РОЗДІЛ 2. ЗАХИСТ ІНФОРМАЦІЇ В РАМКАХ ПРЕДМЕТНО-ОРІЄНТОВАНОГО ПРОЄКТУВАННЯ…24 2.1 Предмет дослідження проблеми захисту інформації… 24 2.2 Критерії оцінки варіантів реалізації безпеки в рамках предметно-орієнтованому проектуванні… 26 2.3 Аналіз методу захисту інформації, яка вбудована у шар предметної області… 28 2.3.1 Опис підходу та його плюси…28 2.3.2 Недоліки підходу… 30 2.3.3 Висновок по підрозділу…30 2.4 Аналіз методу захисту інформації, яка винесена в окремий контекст… 31 2.4.1 Опис підходу та його плюси…31 2.4.2 Недоліки підходу… 32 2.4.3 Висновок по підрозділу…34 2.5 Аналіз методу захисту інформації, з використанням фасаду предметної області… 34 2.5.1 Опис підходу та його плюси…35 2.5.2 Недоліки підходу… 36 2.5.3 Висновок по підрозділу…36 2.6 Аналіз методу захисту інформації, з використанням аспектно-орієнтованого підходу…37 2.6.1 Опис підходу та його плюси…37 2.6.2 Недоліки підходу… 38 2.6.3 Висновок по підрозділу…39 РОЗДІЛ 3. РЕАЛІЗАЦІЯ МЕТОДІВ ЗАХИСТУ ТА ПОРІВНЯННЯ СКЛАДНОСТІ…40 3.1 Реалізація базової структури проекту…40 3.1.1 Вибір середовища та технологія для створення інформаційної системи… 40 3.1.2 Розробка головного ядра інформаційної системи… 40 3.1.3 Розробка відокремленого контексту безпеки… 42 3.1.4 Розробка інтерфейсу користувача… 43 3.2 Аналіз складності у реалізацій та підтримки кожного із методів…44 3.2.1 Визначення значення залежностей у інформаційній системі…44 3.2.2 Вимірювання цикломатичної складності… 44 3.3 Підсумки отриманих результатів…45 РОЗДІЛ 4. ОХОРОНА ПРАЦІ ТА БЕЗПЕКА У НАДЗВИЧАЙНИХ СИТУАЦІЯХ…47 4.1 Охорона праці…47 4.2 Підвищення стійкості роботи підприємств будівельної галузі у воєнний час…49 ВИСНОВКИ… 54 СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ… 56 ДОДАТКИ…59
Kuhn, John. "A THEORY OF COMPLEX ADAPTIVE INQUIRING ORGANIZATIONS: APPLICATION TO CONTINUOUS ASSURANCE OF CORPORATE FINANCIAL INFORMATION". Doctoral diss., University of Central Florida, 2009. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2432.
Texto completo da fontePh.D.
Department of Management Information Systems
Business Administration
Business Administration PhD
Livros sobre o assunto "Information-Based Complexity"
W, Wasilkowski G., e Woźniakowski H, eds. Information-based complexity. Boston: Academic Press, 1988.
Encontre o texto completo da fontePetras, Iasonas. Contributions to Information-Based Complexity and to Quantum Computing. [New York, N.Y.?]: [publisher not identified], 2013.
Encontre o texto completo da fonteCvetkov, Viktor. Basics of complexity theory. ru: INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/2110856.
Texto completo da fonteZu, Qiaohong. Pervasive Computing and the Networked World: Joint International Conference, ICPCA/SWS 2012, Istanbul, Turkey, November 28-30, 2012, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Encontre o texto completo da fonteBaryshev, Ruslan. Proactive library in the information and educational environment of the University. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1123649.
Texto completo da fonteKaliski, Burton S. Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13 15, 2002 Revised Papers. Berlin: Springer-Verlag Berlin Heidelberg, 2003.
Encontre o texto completo da fonteChristof, Paar, e SpringerLink (Online service), eds. RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Encontre o texto completo da fonteJianying, Zhou, Li Hui e SpringerLink (Online service), eds. Information Security: 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings. Berlin, Heidelberg: Springer-Verlag GmbH Berlin Heidelberg, 2011.
Encontre o texto completo da fonteStanescu, Liana. Creating New Medical Ontologies for Image Annotation: A Case Study. New York, NY: Springer Science+Business Media, LLC, 2012.
Encontre o texto completo da fonte1969-, Sarkar Palash, e SpringerLink (Online service), eds. Identity-Based Encryption. Boston, MA: Springer Science+Business Media, LLC, 2011.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Information-Based Complexity"
Traub, J. F. "Introduction to Information-Based Complexity". In Complexity in Information Theory, 63–76. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4612-3774-7_3.
Texto completo da fonteStandish, Russell K. "Information-Based Complexity of Networks". In Advances in Network Complexity, 209–27. Weinheim, Germany: Wiley-VCH Verlag GmbH & Co. KGaA, 2013. http://dx.doi.org/10.1002/9783527670468.ch09.
Texto completo da fontePolkowski, Lech. "Granulation of Knowledge: Similarity Based Approach in Information and Decision Systems". In Computational Complexity, 1464–87. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1800-9_94.
Texto completo da fonteLin, Grace Y., Richard Breitwieser, Feng Cheng, John T. Eagen e Markus Ettl. "Product Hardware Complexity and Its Impact on Inventory and Customer On-Time Delivery". In Information-Based Manufacturing, 61–79. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1599-9_4.
Texto completo da fonteZhao, Weidong, Haitao Liu e Xi Liu. "Role Identification Based on the Information Dependency Complexity". In Advanced Data Mining and Applications, 276–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-53917-6_25.
Texto completo da fonteTraub, Joseph F. "Information-based complexity: Recent results and open problems". In Fundamentals of Computation Theory, 86–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/3-540-54458-5_52.
Texto completo da fonteMockus, Jonas, William Eddy, Audris Mockus, Linas Mockus e Gintaras Reklaitis. "Information-Based Complexity (IBC) and the Bayesian Heuristic Approach". In Nonconvex Optimization and Its Applications, 31–46. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4757-2627-5_2.
Texto completo da fontePolkowski, Lech. "Granulation of Knowledge: Similarity Based Approach in Information and Decision Systems". In Encyclopedia of Complexity and Systems Science, 4411–35. New York, NY: Springer New York, 2009. http://dx.doi.org/10.1007/978-0-387-30440-3_262.
Texto completo da fontePolkowski, Lech. "Granulation of Knowledge: Similarity Based Approach in Information and Decision Systems". In Encyclopedia of Complexity and Systems Science, 1–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-642-27737-5_262-2.
Texto completo da fonteEguchi, Takao, Tsuyoshi Koga e Kazuhiro Aoyama. "MANAGEMENT OF RELATIONSHIPS BETWEEN PRODUCT INFORMATION ON MODEL BASED DESIGN PROCESS". In Gain competitive advantage by managing complexity, 211–24. München: Carl Hanser Verlag GmbH & Co. KG, 2012. http://dx.doi.org/10.3139/9783446434127.017.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Information-Based Complexity"
Wasilkowski, G. W. "Information-Based Complexity; An Overview". In 1990 American Control Conference. IEEE, 1990. http://dx.doi.org/10.23919/acc.1990.4790762.
Texto completo da fonteKipp, Teresa A. "Fusion by the information-based complexity approach". In Optical Engineering and Photonics in Aerospace Sensing, editado por Lynn E. Garn e Lynda L. Graceffo. SPIE, 1993. http://dx.doi.org/10.1117/12.161456.
Texto completo da fonteMoore, Philip. "The Complexity of Context in Mobile Information Systems". In 2009 International Conference on Network-Based Information Systems (NBIS). IEEE, 2009. http://dx.doi.org/10.1109/nbis.2009.10.
Texto completo da fonteFoucart, Simon. "Complexity of multivariate problems based on binary information". In 2017 International Conference on Sampling Theory and Applications (SampTA). IEEE, 2017. http://dx.doi.org/10.1109/sampta.2017.8024351.
Texto completo da fonteFuhrer, Julian, Alejandro Blenkmann, Tor Endestad, Anne-Kristin Solbakk e Kyrre Glette. "Complexity-based Encoded Information Quantification in Neurophysiological Recordings". In 2022 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC). IEEE, 2022. http://dx.doi.org/10.1109/embc48229.2022.9871501.
Texto completo da fontePizzolante, Raffaele, Arcangelo Castiglione, Bruno Carpentieri e Alfredo De Santis. "Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical Images". In 2014 17th International Conference on Network-Based Information Systems (NBiS). IEEE, 2014. http://dx.doi.org/10.1109/nbis.2014.107.
Texto completo da fonteRavari, Alireza Norouzzadeh, e Hamid D. Taghirad. "Transformation invariant 3D object recognition based on information complexity". In 2014 Second RSI/ISM International Conference on Robotics and Mechatronics (ICRoM). IEEE, 2014. http://dx.doi.org/10.1109/icrom.2014.6991019.
Texto completo da fonteAimin, Luo, Huang Li e Luo Xueshan. "Entropy-Based Complexity Analysis for Architecture of Information System". In 2008 IEEE International Conference on Networking, Sensing and Control (ICNSC). IEEE, 2008. http://dx.doi.org/10.1109/icnsc.2008.4525503.
Texto completo da fonteLee, Gil-beom, Youn-chul Shin, Joo-heon Park e Myeong-jin Lee. "Low-complexity camera tamper detection based on edge information". In 2014 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW). IEEE, 2014. http://dx.doi.org/10.1109/icce-tw.2014.6904034.
Texto completo da fonteSun Yanming, Zhang Kaisheng, Zhang Xiaohua e Zheng Shixiong. "Modeling of manufacturing information system based on complexity science". In International Technology and Innovation Conference 2006 (ITIC 2006). IEE, 2006. http://dx.doi.org/10.1049/cp:20060765.
Texto completo da fonteRelatórios de organizações sobre o assunto "Information-Based Complexity"
Parlett, Beresford. Some Basic Information on Information-Based Complexity Theory. Fort Belvoir, VA: Defense Technical Information Center, julho de 1989. http://dx.doi.org/10.21236/ada256585.
Texto completo da fonteSanders, David M., e William B. Carlton. Information Overload at the Tactical Level (an Application of Agent Based Modeling and Complexity Theory in Combat Modeling). Fort Belvoir, VA: Defense Technical Information Center, agosto de 2002. http://dx.doi.org/10.21236/ada405459.
Texto completo da fonteMascagni, Giulia, Roel Dom e Fabrizio Santoro. The VAT in Practice: Equity, Enforcement and Complexity. Institute of Development Studies (IDS), janeiro de 2021. http://dx.doi.org/10.19088/ictd.2021.002.
Texto completo da fontePilkevych, Ihor, Oleg Boychenko, Nadiia Lobanchykova, Tetiana Vakaliuk e Serhiy Semerikov. Method of Assessing the Influence of Personnel Competence on Institutional Information Security. CEUR Workshop Proceedings, abril de 2021. http://dx.doi.org/10.31812/123456789/4374.
Texto completo da fonteBaader, Franz, Stefan Borgwardt e Marcel Lippmann. Temporal Conjunctive Queries in Expressive DLs with Non-simple Roles. Technische Universität Dresden, 2015. http://dx.doi.org/10.25368/2022.222.
Texto completo da fonteBorgwardt, Stefan, e Walter Forkel. Closed-World Semantics for Conjunctive Queries with Negation over ELH⊥ Ontologies. Technische Universität Dresden, 2019. http://dx.doi.org/10.25368/2023.222.
Texto completo da fonteKud, A. A. Figures and Tables. Reprinted from “Comprehensive сlassification of virtual assets”, A. A. Kud, 2021, International Journal of Education and Science, 4(1), 52–75. KRPOCH, 2021. http://dx.doi.org/10.26697/reprint.ijes.2021.1.6.a.kud.
Texto completo da fonteLutz, Carsten, e Frank Wolter. Modal Logics of Topological Relations. Technische Universität Dresden, 2004. http://dx.doi.org/10.25368/2022.142.
Texto completo da fonteKoopmann, Patrick. Ontology-Mediated Query Answering for Probabilistic Temporal Data with EL Ontologies (Extended Version). Technische Universität Dresden, 2018. http://dx.doi.org/10.25368/2022.242.
Texto completo da fonteLutz, Carsten, Carlos Areces, Ian Horrocks e Ulrike Sattler. Keys, Nominals, and Concrete Domains. Technische Universität Dresden, 2002. http://dx.doi.org/10.25368/2022.122.
Texto completo da fonte