处理不确定性的外延方法和内涵方法的比较

来源 :计算机科学 | 被引量 : 0次 | 上传用户:coni
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Extensional approach vs. intensional approach is taxonomy of tackling uncertainty. In this paper,we compare these two approaches. Extensional systems are computational convenient but semantically sloppy,while intensional systems are semantically clear but
其他文献
This paper outlines the state-of-the-art of word sense disambiguation(WSD)in the following aspects: the application of WSD,representation of disambiguation know
1引言  电子政务是基于网络的符合Internet技术标准的面向政府机关内部、其他政府机构、企业以及社会公众的信息服务和信息处理系统.……
期刊
This document describes one PKI based Kerberos cross-realm authentication protocol to pro-vide a method for using public key cryptography in cross-realm authent
<正> 1 引言 Java是一种编程语言,用其编写的程序具有安全、模块化和可移植等特点。当前Java在Internet有广泛应用,在网站主页的HTML代码中嵌入Java类文件,可以增强界面的动
【正】 1 引言目前计算机科学理论和实践正处在一个飞速发展的时期,各种新的理论不断涌现,新的应用层出不穷。计算机应用从计算机网络应用发展到互联网应用,又从互联网发展到
This paper has comprehensively classified implication operations, and proposed information measure requirement of all implication operators by using Yager&#39;s
Given a graph of a fractal interpolation function f which is the attractor of an unknown IFS with affine constration maps w1 ,w2 ,… ,wN ,the maps wi(i= 1,2,…
In past years ,people were hardly aware of Mapping Knowledge between Environments when dealing with problems,did not consider the ability of their constraint an
This paper firstly introduces some mobile agent terminology, and then, brings forward the control algorithms of Mobile Agent Shadow Protocol.
<正> 一、多层体系结构的应用系统传统的应用系统基本上是单一结构或C/S结构的系统,这种结构的应用系统其构造和维护一般很难,即使是简单的改动也需要对整个系统进行重编译和