GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing Modelling and digital science by Title

Sort by: Order: Results:

  • Matsebe, O; Namoshe, M; Tlale, N (INTECH, 2010)
    The goal of the chapter is to provide an opportunity for researchers who are new to, or interested in, this exciting area of research with the basics, background information, major issues, and the state-of-the-art as well ...
  • Botha, L; Meyer, Thomas; Penaloza, R (2018-10)
    Description Logics (DLs) that support uncertainty are not as well studied as their crisp alternatives, thereby limiting their use in real world domains. The Bayesian DL BEL and its extensions have been introduced to deal ...
  • Claessens, R; De Waal, A; De Villiers, Pieter; Penders, A; Pavlin, G; Tuyls, K (SCITEPRESS, 2016-04)
    The range of applications that require processing of temporally and spatially distributed sensory data is expanding. Common challenges in domains with these characteristics are sound reasoning about uncertain phenomena and ...
  • Rosman, Benjamin S; Hawasly, M; Ramamoorthy, S (Springer Verlag, 2016-02)
    A long-lived autonomous agent should be able to respond online to novel instances of tasks from a familiar domain. Acting online requires `fast' responses, in terms of rapid convergence, especially when the task instance ...
  • Dlamini, MT; Eloff, MM; Eloff, JHP; Hone, K (2009-07)
    The entire business landscape finds itself on the verge of a recession because of ongoing global economic turmoil. Thus, there is a heightened need to minimise and mitigate business risk and scrutinise information spending ...
  • Rens, G; Ferrein, A; Van der Poel, E (2009-06)
    Traditionally, agent architectures based on the Belief-Desire-Intention (BDI) model make use of precompiled plans, or if they do generate plans, the plans do not involve stochastic actions nor probabilistic observations. ...
  • Dlamini, Thandokuhle M; Eloff, JHP; Venter, HS; Eloff, MM; Henha Eyono, RPS; Mosola, NN (2017-09)
    This paper investigates how to effectively stop an attacker from using compromised user credentials to gain authorized entry to systems that they are otherwise not authorised to access. The proposed solution extends previous ...
  • Rosman, Benjamin S (Association for the Advancement of Artificial Intelligence, 2014-11)
    An agent continuously performing different tasks in the same domain has the opportunity to learn, over the course of its operational lifetime, about the behavioural regularities afforded by the domain. This paper addresses ...
  • Booth, R; Meyer, T (College Publications, 2012-07)
    In this paper the authors present a brief overview of belief change, a research area concerned with the question of how a rational agent ought to change its mind in the face of new, possibly conflicting, information. The ...
  • Booth, R; Meyer, T (Indian Council of Philosophical Research, 2011-08)
    In this paper the authors present a brief overview of belief change, a research area concerned with the question of how a rational agent ought to change its mind in the face of new, possibly conflicting, information. The ...
  • Marom, O; Rosman, Benjamin S (AAAI, 2018-02)
    A key challenge in many reinforcement learning problems is delayed rewards, which can significantly slow down learning. Although reward shaping has previously been introduced to accelerate learning by bootstrapping an agent ...
  • Rens, G; Ferrein, A (Centre for Artificial Intelligence Research, 2013-09)
    We consider online partially observable Markov decision processes (POMDPs) which compute policies by local look-ahead from the current belief-state. One problem is that belief-nodes deeper in the decision-tree increase in ...
  • Mouton, Francois; Teixeira, M; Meyer, T (IEEE, 2017-11)
    As the nature of information stored digitally be- comes more important and confidential, the security of the systems put in place to protect this information needs to be increased. The human element, however, remains a ...
  • Helbig, M; Engelbrecht, AP (IEEE Xplore, 2013-06)
    When algorithms solve dynamic multi-objective optimisation problems (DMOOPs), benchmark functions should be used to determine whether the algorithm can overcome specific difficulties that can occur in real-world problems. ...
  • Belyi, VN; Forbes, A; Kazak, NS; Khilo, NA; Ropot, PI (Society of Photo-Optical Instrumentation Engineers (SPIE), 2009-08)
    A new type of Bessel-like optical beams, which is distinguished by the dependence on the cone angle from the longitudinal coordinate, is investigated. Such beams have the properties of Bessel beams (ring-spatial spatial ...
  • Anochie-Boateng, Joseph (Scranton Gillette Communications, 2011-09)
    The author of this article is conducting research in South Africa which addresses the difficulties in pavement design in developing methods and procedures for accurate quantification of aggregate shape and surface properties, ...
  • Grobler, MM; Von Solms, SH (2009-07)
    The development of the Live Forensic discipline instigates the development of a method that allows forensically sound acquisition to stand fast in a court of law. The study presents the development of a comprehensive model ...
  • Pretorius, Morne; Ngejane, Hombakazi C (Wits LINK Centre, 2019-12)
    The South African Government’s National Cybersecurity Policy Framework (NCPF) of 2012 provides for the establishment of a national computer security incident response team (CSIRT) in the form of the National Cybersecurity ...
  • Cronje, J (2011-11)
    A fast local image feature detector and descriptor that is implementable on the GPU is proposed. This method is the first GPU implementation of the popular FAST detector. A simple but novel method of feature orientation ...
  • Dlamini, I; Olivier, M; Sibiya, S (SATNAC 2009, 2009-08)
    Network forensics involves capturing, recording and analysing network activity in discovering the source of security policy violations or information assurance. The network forensic system that is described in this paper ...

Search ResearchSpace


Advanced Search

Browse

My Account