Semantic Modeling: Computational Models of the Concepts
As known, computing allows maintenance of the constructions corresponding to the needs in comprehended models which enable the computational experiment. Computing takes the enabling of such a model which corresponds to a 'theory'. The parameters of the model are systematically changing and...
Saved in:
| Published in | 2010 International Conference on Computational Intelligence and Security pp. 42 - 46 |
|---|---|
| Main Author | |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.12.2010
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 9781424491148 1424491142 |
| DOI | 10.1109/CIS.2010.16 |
Cover
| Abstract | As known, computing allows maintenance of the constructions corresponding to the needs in comprehended models which enable the computational experiment. Computing takes the enabling of such a model which corresponds to a 'theory'. The parameters of the model are systematically changing and correspond to 'entries' for the inputs. The parameterized family of its 'behaviors' is used as the 'outputs' of the model. These -- being computed, -- behaviors are matched with the real behavior of the problem domain object under the real inputs -- prototypes of model inputs. In case of conclusion that the model satisfactory reflects the features of the real object-prototype, then the real experiment can be replaced by the computational one, which is executed using the model-image. |
|---|---|
| AbstractList | As known, computing allows maintenance of the constructions corresponding to the needs in comprehended models which enable the computational experiment. Computing takes the enabling of such a model which corresponds to a 'theory'. The parameters of the model are systematically changing and correspond to 'entries' for the inputs. The parameterized family of its 'behaviors' is used as the 'outputs' of the model. These -- being computed, -- behaviors are matched with the real behavior of the problem domain object under the real inputs -- prototypes of model inputs. In case of conclusion that the model satisfactory reflects the features of the real object-prototype, then the real experiment can be replaced by the computational one, which is executed using the model-image. |
| Author | Wolfengagen, V |
| Author_xml | – sequence: 1 givenname: V surname: Wolfengagen fullname: Wolfengagen, V email: vew@jmsuice.msk.ru organization: Dept. of ACS & IT, Inst. JurlnfoR-MGU/NRNU MEPhI, Moscow, Russia |
| BookMark | eNotjLtOw0AURBcBEhBcUdL4Bxz2vb50yOIRKVGKpI-uvdewyF5b8VLw9xjCaUZnRpobdhGHSIzdCb4UgsNDtdotJf81e8YycCV3FoyW4NT5nwsttQYhdHnFsmn65DNGOmfFNXM76jGm0OSbwVMX4vtjXg39-JUwhSFid-qnfGjz9EHzFhsa03TLLlvsJsr-c8H2L8_76q1Yb19X1dO6CMBTYb1W1EqOmnvQFjQooYzxCoij9zVXsq1nhK9NSU2DIFGqRhnkWFtfqgW7P90GIjqMx9Dj8ftgLFgpS_UDfsJIQg |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/CIS.2010.16 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9780769542973 0769542972 |
| EndPage | 46 |
| ExternalDocumentID | 5696228 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i90t-6d43ef20a40d94694931355d39e0addb032fbbbb1db58ecca92a23c35a0ab6d83 |
| IEDL.DBID | RIE |
| ISBN | 9781424491148 1424491142 |
| IngestDate | Wed Aug 27 03:21:29 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-6d43ef20a40d94694931355d39e0addb032fbbbb1db58ecca92a23c35a0ab6d83 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_5696228 |
| PublicationCentury | 2000 |
| PublicationDate | 2010-Dec. |
| PublicationDateYYYYMMDD | 2010-12-01 |
| PublicationDate_xml | – month: 12 year: 2010 text: 2010-Dec. |
| PublicationDecade | 2010 |
| PublicationTitle | 2010 International Conference on Computational Intelligence and Security |
| PublicationTitleAbbrev | cis |
| PublicationYear | 2010 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000527761 ssib015832302 |
| Score | 1.5281587 |
| Snippet | As known, computing allows maintenance of the constructions corresponding to the needs in comprehended models which enable the computational experiment.... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 42 |
| SubjectTerms | applicative computing Computational modeling Data models Data visualization Maintenance engineering Prototypes semantic modeling and integrity Semantics variable domains Web integrity |
| Title | Semantic Modeling: Computational Models of the Concepts |
| URI | https://ieeexplore.ieee.org/document/5696228 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFA_bTp5UNvGbHjyaLc1Hm3gdjilMhE3YbeSrMMRNXHvxr_elaaeIBwuBNr30NR_vl-T93g-hm4J4DkXj1EiDOSsUlpZ4DNCegUfRztZyPrOnbPrCH5di2UG3ey6M974OPvPDcFuf5butrcJW2UhkKqNUdlE3l1nkarV9JxXQNdtUVjGvN81hid5yuVTgjLYpnppn2fD1UqJG44d5jPMKwuc_dFZqNzM5RLP2A2N0yeuwKs3Qfv7K3fhfC47Q4JvQlzzvXdUx6vhNH-Vz_wb_dW2TIIgWaOl3SRR5aDYIY_0u2RYJwER4VzMcdwO0mNwvxlPc6CjgtSIlzhxnvqBEc-IUrIa5YimgDMeUJzC7GcJoYeBKnREytKiimjLLhCbaZE6yE9TbbDf-FCWFkNKbMIyF5QYGu6JWZqkFFKZzADdnqB9sXr3HTBmrxtzzv6sv0AHdB4dcol75UfkrcPGlua7b9gvGAqBS |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEJ4gHvSkBoxve_BoYbuPsuuVSECBmIAJN9J9NCFGIFIu_npn-0BjPNhkk3Z76XQf8-3ufPMB3KXEcSxJGGmpQ85SFUpDXIjQnqFHSazJ5XxG47j_yp9mYlaD-x0XxjmXB5-5lr_Nz_Ltymz9VllbxCqmVO7BvuCci4KtVfWeSGDnrJJZFZm9aQcX6RWbS3nWaJXkqXyWJWMvIqrdHUyKSC8vff5DaSV3NL0jGFWfWMSXvLW2mW6Zz1_ZG_9rwzE0vyl9wcvOWZ1AzS0b0Jm4d_yzCxN4STRPTH8ICpmHcouwqN8EqzRAoIjvco7jpgnT3uO02w9LJYVwoUgWxpYzl1KScGIVroe5YhHiDMuUIzi_acJoqvGKrBbSt6miCWWGiYQkOraSnUJ9uVq6MwhSIaXTfiALwzUOd0WNjCODOCzpILw5h4a3eb4ucmXMS3Mv_q6-hYP-dDScDwfj50s4pLtQkSuoZx9bd40OP9M3eTt_AWTco58 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+International+Conference+on+Computational+Intelligence+and+Security&rft.atitle=Semantic+Modeling%3A+Computational+Models+of+the+Concepts&rft.au=Wolfengagen%2C+V&rft.date=2010-12-01&rft.pub=IEEE&rft.isbn=9781424491148&rft.spage=42&rft.epage=46&rft_id=info:doi/10.1109%2FCIS.2010.16&rft.externalDocID=5696228 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424491148/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424491148/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424491148/sc.gif&client=summon&freeimage=true |