Identifying Strategies Using Decision Lists from Trace Information

نویسنده

  • Satoshi Kobayashi
چکیده

probability of occurrences. However, in the current paper, we discuss the issue of identifying a target strategy exactly from trace data. Learning criterion used in this paper is the identi cation in the limit proposed by Gold. Further, we use the tree pattern language to represent preconditions of operators, and propose a class of strategies, called decision list strategies. One of the interesting features of our learning algorithm is the coupled use of state and operator sequence information of traces. Theoretically,

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Barriers and strategies in Implementing Clinical Decision Support System in Hospitals: A Case Study in Iran

Introduction: Most modern medical issues are inherently complicated and accurate decisions are not always likely to be made based on logical reasons. Furthermore, the huge volume of information relevant to a simple diagnostic area makes this decision making even more troublesome. Hence, with the advent of technology, there is an ever increasing need for the Clinical Decision Support System (CDS...

متن کامل

Identifying and Ranking Comprehensive Decision-Making Criteria for Determination of Optimal Gas Monetization Strategy Using Fuzzy Delphi Method

The development and exploitation of the countrychr('39')s gas fields requires huge investments that will require appropriate monetization strategies to offset these costs and generate revenue for the government. This study describes the most important gas monetization strategies, including pipeline, LNG, GTL, petrochemical, CNG, GTW and GTS, and emphasizes the need for utilize the appropriate s...

متن کامل

The State of the Art of Spam and Anti-Spam Strategies and a Possible Solution using Digital Forensics

Electronic communication such as email is an efficient and cost effective communication medium in today’s connected world. This paper looks at the strategies employed by spam and anti-spam and shows the coevolution of these strategies. Anti-spam software makes use of intelligent filtering based on content scanning, block lists, black lists, white lists and mailbox authentication. Spammers have ...

متن کامل

PROVIDE A MODEL FOR IDENTIFYING AND RANKING THE MANAGERIAL FACTORS AFFECTING INFORMATION SECURITY IN ORGANIZATION BY USING VIKOR METHOD; CASE STUDY: TEHRAN UNIVERSITY OF MEDICAL SCIENCES

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...

متن کامل

PROVIDE A MODEL FOR IDENTIFYING AND RANKING THE MANAGERIAL FACTORS AFFECTING INFORMATION SECURITY IN ORGANIZATION BY USING VIKOR METHOD; CASE STUDY: TEHRAN UNIVERSITY OF MEDICAL SCIENCES

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEICE Transactions

دوره 78-D  شماره 

صفحات  -

تاریخ انتشار 1995