Identifying Strategies Using Decision Lists from Trace Information
نویسنده
چکیده
probability of occurrences. However, in the current paper, we discuss the issue of identifying a target strategy exactly from trace data. Learning criterion used in this paper is the identi cation in the limit proposed by Gold. Further, we use the tree pattern language to represent preconditions of operators, and propose a class of strategies, called decision list strategies. One of the interesting features of our learning algorithm is the coupled use of state and operator sequence information of traces. Theoretically,
منابع مشابه
Barriers and strategies in Implementing Clinical Decision Support System in Hospitals: A Case Study in Iran
Introduction: Most modern medical issues are inherently complicated and accurate decisions are not always likely to be made based on logical reasons. Furthermore, the huge volume of information relevant to a simple diagnostic area makes this decision making even more troublesome. Hence, with the advent of technology, there is an ever increasing need for the Clinical Decision Support System (CDS...
متن کاملIdentifying and Ranking Comprehensive Decision-Making Criteria for Determination of Optimal Gas Monetization Strategy Using Fuzzy Delphi Method
The development and exploitation of the countrychr('39')s gas fields requires huge investments that will require appropriate monetization strategies to offset these costs and generate revenue for the government. This study describes the most important gas monetization strategies, including pipeline, LNG, GTL, petrochemical, CNG, GTW and GTS, and emphasizes the need for utilize the appropriate s...
متن کاملThe State of the Art of Spam and Anti-Spam Strategies and a Possible Solution using Digital Forensics
Electronic communication such as email is an efficient and cost effective communication medium in today’s connected world. This paper looks at the strategies employed by spam and anti-spam and shows the coevolution of these strategies. Anti-spam software makes use of intelligent filtering based on content scanning, block lists, black lists, white lists and mailbox authentication. Spammers have ...
متن کاملPROVIDE A MODEL FOR IDENTIFYING AND RANKING THE MANAGERIAL FACTORS AFFECTING INFORMATION SECURITY IN ORGANIZATION BY USING VIKOR METHOD; CASE STUDY: TEHRAN UNIVERSITY OF MEDICAL SCIENCES
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
متن کاملPROVIDE A MODEL FOR IDENTIFYING AND RANKING THE MANAGERIAL FACTORS AFFECTING INFORMATION SECURITY IN ORGANIZATION BY USING VIKOR METHOD; CASE STUDY: TEHRAN UNIVERSITY OF MEDICAL SCIENCES
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEICE Transactions
دوره 78-D شماره
صفحات -
تاریخ انتشار 1995