callback( { "result":{ "query":":facetid:toc:\"db/journals/kbs/kbs16.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"65.95" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"44", "@dc":"44", "@oc":"44", "@id":"43459948", "text":":facetid:toc:db/journals/kbs/kbs16.bht" } }, "hits":{ "@total":"44", "@computed":"44", "@sent":"44", "@first":"0", "hit":[{ "@score":"1", "@id":"6126382", "info":{"authors":{"author":[{"@pid":"78/11148","text":"Reda Alhajj"},{"@pid":"99/4002","text":"Faruk Polat"}]},"title":"Rule-based schema evolution in object-oriented databases.","venue":"Knowl. Based Syst.","volume":"16","number":"1","pages":"47-57","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/AlhajjP03","doi":"10.1016/S0950-7051(02)00051-5","ee":"https://doi.org/10.1016/S0950-7051(02)00051-5","url":"https://dblp.org/rec/journals/kbs/AlhajjP03"}, "url":"URL#6126382" }, { "@score":"1", "@id":"6126383", "info":{"authors":{"author":[{"@pid":"64/1111","text":"Rajan Amin"},{"@pid":"b/MaxBramer","text":"Max Bramer"},{"@pid":"45/5927","text":"Richard Emslie"}]},"title":"Intelligent data analysis for conservation: experiments with rhino horn fingerprint identification.","venue":"Knowl. Based Syst.","volume":"16","number":"5-6","pages":"329-336","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/AminBE03","doi":"10.1016/S0950-7051(03)00035-2","ee":"https://doi.org/10.1016/S0950-7051(03)00035-2","url":"https://dblp.org/rec/journals/kbs/AminBE03"}, "url":"URL#6126383" }, { "@score":"1", "@id":"6126384", "info":{"authors":{"author":[{"@pid":"25/4403","text":"Benedict Amon"},{"@pid":"53/544","text":"Love Ekenberg"},{"@pid":"j/PaulJohannesson","text":"Paul Johannesson"},{"@pid":"21/4510","text":"Marcelo Munguanaze"},{"@pid":"03/6405","text":"Upendo Njabili"},{"@pid":"46/5765","text":"Rika Manka Tesha"}]},"title":"From first-order logic to automated word generation for Lyee.","venue":"Knowl. Based Syst.","volume":"16","number":"7-8","pages":"413-429","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/AmonEJMNT03","doi":"10.1016/J.KNOSYS.2003.08.009","ee":"https://doi.org/10.1016/j.knosys.2003.08.009","url":"https://dblp.org/rec/journals/kbs/AmonEJMNT03"}, "url":"URL#6126384" }, { "@score":"1", "@id":"6126385", "info":{"authors":{"author":[{"@pid":"80/41","text":"Osamu Arai"},{"@pid":"49/6628","text":"Hamido Fujita"}]},"title":"Mathematical structure model for Word-Based Program.","venue":"Knowl. Based Syst.","volume":"16","number":"7-8","pages":"399-411","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/AraiF03","doi":"10.1016/J.KNOSYS.2003.08.006","ee":"https://doi.org/10.1016/j.knosys.2003.08.006","url":"https://dblp.org/rec/journals/kbs/AraiF03"}, "url":"URL#6126385" }, { "@score":"1", "@id":"6126386", "info":{"authors":{"author":[{"@pid":"50/5944","text":"José Augusto Baranauskas"},{"@pid":"25/5085","text":"Maria Carolina Monard"}]},"title":"Combining symbolic classifiers from multiple inducers.","venue":"Knowl. Based Syst.","volume":"16","number":"3","pages":"129-136","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/BaranauskasM03","doi":"10.1016/S0950-7051(02)00021-7","ee":"https://doi.org/10.1016/S0950-7051(02)00021-7","url":"https://dblp.org/rec/journals/kbs/BaranauskasM03"}, "url":"URL#6126386" }, { "@score":"1", "@id":"6126387", "info":{"authors":{"author":[{"@pid":"91/652","text":"Yaxin Bi"},{"@pid":"72/4962","text":"Terry J. Anderson"},{"@pid":"m/SallyIMcClean","text":"Sally I. McClean"}]},"title":"A rough set model with ontologies for discovering maximal association rules in document collections.","venue":"Knowl. Based Syst.","volume":"16","number":"5-6","pages":"243-251","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/BiAM03","doi":"10.1016/S0950-7051(03)00025-X","ee":"https://doi.org/10.1016/S0950-7051(03)00025-X","url":"https://dblp.org/rec/journals/kbs/BiAM03"}, "url":"URL#6126387" }, { "@score":"1", "@id":"6126388", "info":{"authors":{"author":[{"@pid":"63/5367","text":"Keith Bradley"},{"@pid":"s/BarrySmyth","text":"Barry Smyth"}]},"title":"Personalized information ordering: a case study in online recruitment.","venue":"Knowl. Based Syst.","volume":"16","number":"5-6","pages":"269-275","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/BradleyS03","doi":"10.1016/S0950-7051(03)00028-5","ee":"https://doi.org/10.1016/S0950-7051(03)00028-5","url":"https://dblp.org/rec/journals/kbs/BradleyS03"}, "url":"URL#6126388" }, { "@score":"1", "@id":"6126389", "info":{"authors":{"author":{"@pid":"b/MaxBramer","text":"Max Bramer"}},"title":"Guest Editorial.","venue":"Knowl. Based Syst.","volume":"16","number":"5-6","pages":"233-234","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/Bramer03","doi":"10.1016/S0950-7051(03)00043-1","ee":"https://doi.org/10.1016/S0950-7051(03)00043-1","url":"https://dblp.org/rec/journals/kbs/Bramer03"}, "url":"URL#6126389" }, { "@score":"1", "@id":"6126390", "info":{"authors":{"author":[{"@pid":"20/2954","text":"Darren Brown"},{"@pid":"b/MMBurnett","text":"Margaret M. Burnett"},{"@pid":"25/6796","text":"Gregg Rothermel"}]},"title":"End-User Testing for the Lyee Methodology using the Screen Transition Paradigm and WYSIWYT.","venue":"Knowl. Based Syst.","volume":"16","number":"7-8","pages":"431-440","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/BrownBR03","doi":"10.1016/J.KNOSYS.2003.08.003","ee":"https://doi.org/10.1016/j.knosys.2003.08.003","url":"https://dblp.org/rec/journals/kbs/BrownBR03"}, "url":"URL#6126390" }, { "@score":"1", "@id":"6126391", "info":{"authors":{"author":{"@pid":"b/MMBurnett","text":"Margaret M. Burnett"}},"title":"HCI research regarding end-user requirement specification: a tutorial.","venue":"Knowl. Based Syst.","volume":"16","number":"7-8","pages":"341-349","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/Burnett03","doi":"10.1016/J.KNOSYS.2003.08.007","ee":"https://doi.org/10.1016/j.knosys.2003.08.007","url":"https://dblp.org/rec/journals/kbs/Burnett03"}, "url":"URL#6126391" }, { "@score":"1", "@id":"6126392", "info":{"authors":{"author":[{"@pid":"43/3579","text":"Kwang-Jong Cho"},{"@pid":"12/3610-1","text":"Seong-Jin Ahn 0001"},{"@pid":"12/1534","text":"Jin-Wook Chung"}]},"title":"A study on the classified model and the agent collaboration model for network configuration fault management.","venue":"Knowl. Based Syst.","volume":"16","number":"4","pages":"177-190","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/ChoAC03","doi":"10.1016/S0950-7051(03)00012-1","ee":"https://doi.org/10.1016/S0950-7051(03)00012-1","url":"https://dblp.org/rec/journals/kbs/ChoAC03"}, "url":"URL#6126392" }, { "@score":"1", "@id":"6126393", "info":{"authors":{"author":[{"@pid":"30/5898","text":"Laurence Cholvy"},{"@pid":"23/4530","text":"Anthony Hunter"}]},"title":"Merging requirements from a set of ranked agents.","venue":"Knowl. Based Syst.","volume":"16","number":"2","pages":"113-126","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/CholvyH03","doi":"10.1016/S0950-7051(02)00078-3","ee":"https://doi.org/10.1016/S0950-7051(02)00078-3","url":"https://dblp.org/rec/journals/kbs/CholvyH03"}, "url":"URL#6126393" }, { "@score":"1", "@id":"6126394", "info":{"authors":{"author":[{"@pid":"53/4090","text":"Paul W. H. Chung"},{"@pid":"93/3929","text":"Larry Y. C. Cheung"},{"@pid":"10/3224","text":"Jussi Stader"},{"@pid":"16/727","text":"Peter Jarvis"},{"@pid":"93/3613","text":"Jonathan P. Moore"},{"@pid":"47/6540","text":"Ann Macintosh"}]},"title":"Knowledge-based process management - an approach to handling adaptive workflow.","venue":"Knowl. Based Syst.","volume":"16","number":"3","pages":"149-160","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/ChungCSJMM03","doi":"10.1016/S0950-7051(02)00080-1","ee":"https://doi.org/10.1016/S0950-7051(02)00080-1","url":"https://dblp.org/rec/journals/kbs/ChungCSJMM03"}, "url":"URL#6126394" }, { "@score":"1", "@id":"6126395", "info":{"authors":{"author":[{"@pid":"79/5697","text":"Gavin R. Finnie"},{"@pid":"52/3652","text":"Zhaohao Sun"}]},"title":"R5 model for case-based reasoning.","venue":"Knowl. Based Syst.","volume":"16","number":"1","pages":"59-65","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/FinnieS03","doi":"10.1016/S0950-7051(02)00053-9","ee":"https://doi.org/10.1016/S0950-7051(02)00053-9","url":"https://dblp.org/rec/journals/kbs/FinnieS03"}, "url":"URL#6126395" }, { "@score":"1", "@id":"6126396", "info":{"authors":{"author":[{"@pid":"19/2776","text":"Joseph Fong"},{"@pid":"55/1265","text":"Hing Kwok Wong"},{"@pid":"01/2181","text":"Shi-Ming Huang"}]},"title":"Continuous and incremental data mining association rules using frame metadata model.","venue":"Knowl. Based Syst.","volume":"16","number":"2","pages":"91-100","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/FongWH03","doi":"10.1016/S0950-7051(02)00076-X","ee":"https://doi.org/10.1016/S0950-7051(02)00076-X","url":"https://dblp.org/rec/journals/kbs/FongWH03"}, "url":"URL#6126396" }, { "@score":"1", "@id":"6126397", "info":{"authors":{"author":{"@pid":"49/6628","text":"Hamido Fujita"}},"title":"Special issue on 'Intention and Software Process'.","venue":"Knowl. Based Syst.","volume":"16","number":"7-8","pages":"339","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/Fujita03","doi":"10.1016/J.KNOSYS.2003.08.005","ee":"https://doi.org/10.1016/j.knosys.2003.08.005","url":"https://dblp.org/rec/journals/kbs/Fujita03"}, "url":"URL#6126397" }, { "@score":"1", "@id":"6126398", "info":{"authors":{"author":[{"@pid":"g/VolkerGruhn","text":"Volker Gruhn"},{"@pid":"67/3741","text":"Raschid Ijioui"},{"@pid":"62/4320","text":"Dirk Peters"},{"@pid":"32/6949","text":"Clemens Schäfer"}]},"title":"Configuration management for Lyee software.","venue":"Knowl. Based Syst.","volume":"16","number":"7-8","pages":"441-447","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/GruhnIPS03","doi":"10.1016/J.KNOSYS.2003.08.004","ee":"https://doi.org/10.1016/j.knosys.2003.08.004","url":"https://dblp.org/rec/journals/kbs/GruhnIPS03"}, "url":"URL#6126398" }, { "@score":"1", "@id":"6126399", "info":{"authors":{"author":[{"@pid":"21/5674","text":"Abolfazl Toroghi Haghighat"},{"@pid":"13/730","text":"Karim Faez"},{"@pid":"50/314-1","text":"Mehdi Dehghan 0001"},{"@pid":"89/304","text":"Amir Mowlaei"},{"@pid":"15/5691","text":"Y. Ghahremani"}]},"title":"GA-Based Heuristic Algorithms for QoS Based Multicast Routing.","venue":"Knowl. Based Syst.","volume":"16","number":"5-6","pages":"305-312","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/HaghighatFDMG03","doi":"10.1016/S0950-7051(03)00032-7","ee":"https://doi.org/10.1016/S0950-7051(03)00032-7","url":"https://dblp.org/rec/journals/kbs/HaghighatFDMG03"}, "url":"URL#6126399" }, { "@score":"1", "@id":"6126400", "info":{"authors":{"author":{"@pid":"84/620","text":"Richard C. Hicks"}},"title":"Knowledge base management systems-tools for creating verified intelligent systems.","venue":"Knowl. Based Syst.","volume":"16","number":"3","pages":"165-171","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/Hicks03","doi":"10.1016/S0950-7051(02)00082-5","ee":"https://doi.org/10.1016/S0950-7051(02)00082-5","url":"https://dblp.org/rec/journals/kbs/Hicks03"}, "url":"URL#6126400" }, { "@score":"1", "@id":"6126401", "info":{"authors":{"author":[{"@pid":"04/2380-1","text":"Bo Hu 0001"},{"@pid":"29/2200","text":"Inés Arana"},{"@pid":"22/3711","text":"Ernesto Compatangelo"}]},"title":"Facilitating DL-based hybrid reasoning with inference fusion.","venue":"Knowl. Based Syst.","volume":"16","number":"5-6","pages":"253-260","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/HuAC03","doi":"10.1016/S0950-7051(03)00026-1","ee":"https://doi.org/10.1016/S0950-7051(03)00026-1","url":"https://dblp.org/rec/journals/kbs/HuAC03"}, "url":"URL#6126401" }, { "@score":"1", "@id":"6126402", "info":{"authors":{"author":[{"@pid":"55/469","text":"Yi-Chung Hu"},{"@pid":"89/4376","text":"Ruey-Shun Chen"},{"@pid":"32/2902","text":"Gwo-Hshiung Tzeng"}]},"title":"Discovering fuzzy association rules using fuzzy partition methods.","venue":"Knowl. Based Syst.","volume":"16","number":"3","pages":"137-147","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/HuCT03","doi":"10.1016/S0950-7051(02)00079-5","ee":"https://doi.org/10.1016/S0950-7051(02)00079-5","url":"https://dblp.org/rec/journals/kbs/HuCT03"}, "url":"URL#6126402" }, { "@score":"1", "@id":"6126403", "info":{"authors":{"author":[{"@pid":"64/4569","text":"Roger P. Knott"},{"@pid":"01/778","text":"Vojtech Merunka"},{"@pid":"93/1031","text":"Jirí Polák"}]},"title":"The BORM methodology: a third-generation fully object-oriented methodology.","venue":"Knowl. Based Syst.","volume":"16","number":"2","pages":"77-89","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/KnottMP03","doi":"10.1016/S0950-7051(02)00075-8","ee":"https://doi.org/10.1016/S0950-7051(02)00075-8","url":"https://dblp.org/rec/journals/kbs/KnottMP03"}, "url":"URL#6126403" }, { "@score":"1", "@id":"6126404", "info":{"authors":{"author":[{"@pid":"52/4440","text":"Maarja Kruusmaa"},{"@pid":"22/101","text":"Jan Willemson"}]},"title":"Covering the path space: a casebase analysis for mobile robot path planning.","venue":"Knowl. Based Syst.","volume":"16","number":"5-6","pages":"235-242","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/KruusmaaW03","doi":"10.1016/S0950-7051(03)00024-8","ee":"https://doi.org/10.1016/S0950-7051(03)00024-8","url":"https://dblp.org/rec/journals/kbs/KruusmaaW03"}, "url":"URL#6126404" }, { "@score":"1", "@id":"6126405", "info":{"authors":{"author":[{"@pid":"81/818","text":"Henry C. W. Lau"},{"@pid":"37/6891","text":"Christina W. Y. Wong"},{"@pid":"42/47","text":"Ip-Kee Hui"},{"@pid":"63/2506","text":"Kit Fai Pun"}]},"title":"Design and implementation of an integrated knowledge system.","venue":"Knowl. Based Syst.","volume":"16","number":"2","pages":"69-76","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/LauWHP03","doi":"10.1016/S0950-7051(02)00052-7","ee":"https://doi.org/10.1016/S0950-7051(02)00052-7","url":"https://dblp.org/rec/journals/kbs/LauWHP03"}, "url":"URL#6126405" }, { "@score":"1", "@id":"6126406", "info":{"authors":{"author":[{"@pid":"24/3947","text":"Kecheng Liu"},{"@pid":"88/3240","text":"Lily Sun"},{"@pid":"b/JosephBarjis","text":"Joseph Barjis"},{"@pid":"d/JLGDietz","text":"Jan L. G. Dietz"}]},"title":"Modelling dynamic behaviour of business organisations - extension of DEMO from a semiotic perspective.","venue":"Knowl. Based Syst.","volume":"16","number":"2","pages":"101-111","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/LiuSBD03","doi":"10.1016/S0950-7051(02)00077-1","ee":"https://doi.org/10.1016/S0950-7051(02)00077-1","url":"https://dblp.org/rec/journals/kbs/LiuSBD03"}, "url":"URL#6126406" }, { "@score":"1", "@id":"6126407", "info":{"authors":{"author":[{"@pid":"02/79","text":"Stewart Long"},{"@pid":"97/2141","text":"Roy D. Dowsing"},{"@pid":"38/2476","text":"Patrick Craven"}]},"title":"Knowledge-based systems for marking professional IT skills examinations.","venue":"Knowl. Based Syst.","volume":"16","number":"5-6","pages":"287-294","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/LongDC03","doi":"10.1016/S0950-7051(03)00030-3","ee":"https://doi.org/10.1016/S0950-7051(03)00030-3","url":"https://dblp.org/rec/journals/kbs/LongDC03"}, "url":"URL#6126407" }, { "@score":"1", "@id":"6126408", "info":{"authors":{"author":[{"@pid":"13/2223","text":"Iliana Gutiérrez Martínez"},{"@pid":"38/5311","text":"Rafael Esteban Bello Pérez"}]},"title":"Making decision in case-based systems using probabilities and rough sets.","venue":"Knowl. Based Syst.","volume":"16","number":"4","pages":"205-213","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/MartinezP03","doi":"10.1016/S0950-7051(02)00036-9","ee":"https://doi.org/10.1016/S0950-7051(02)00036-9","url":"https://dblp.org/rec/journals/kbs/MartinezP03"}, "url":"URL#6126408" }, { "@score":"1", "@id":"6126409", "info":{"authors":{"author":[{"@pid":"38/4934","text":"Ian McBriar"},{"@pid":"03/685","text":"Colin Smith"},{"@pid":"43/5981","text":"Geoff Bain"},{"@pid":"59/5890","text":"Peter Unsworth"},{"@pid":"04/5476","text":"Stephen Magraw"},{"@pid":"29/2789","text":"John L. Gordon"}]},"title":"Risk, gap and strength: key concepts in knowledge management.","venue":"Knowl. Based Syst.","volume":"16","number":"1","pages":"29-36","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/McBriarSBUMG03","doi":"10.1016/S0950-7051(02)00049-7","ee":"https://doi.org/10.1016/S0950-7051(02)00049-7","url":"https://dblp.org/rec/journals/kbs/McBriarSBUMG03"}, "url":"URL#6126409" }, { "@score":"1", "@id":"6126410", "info":{"authors":{"author":[{"@pid":"32/720","text":"Mohamed Mejri"},{"@pid":"76/1268","text":"Béchir Ktari"},{"@pid":"49/6628","text":"Hamido Fujita"},{"@pid":"58/1253","text":"M. M. Erhioui"}]},"title":"Static analysis of Lyee requirements.","venue":"Knowl. Based Syst.","volume":"16","number":"7-8","pages":"361-382","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/MejriKFE03","doi":"10.1016/J.KNOSYS.2003.08.002","ee":"https://doi.org/10.1016/j.knosys.2003.08.002","url":"https://dblp.org/rec/journals/kbs/MejriKFE03"}, "url":"URL#6126410" }, { "@score":"1", "@id":"6126411", "info":{"authors":{"author":{"@pid":"72/2471","text":"Alfonsas Misevicius"}},"title":"Genetic algorithm hybridized with ruin and recreate procedure: application to the quadratic assignment problem.","venue":"Knowl. Based Syst.","volume":"16","number":"5-6","pages":"261-268","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/Misevicius03","doi":"10.1016/S0950-7051(03)00027-3","ee":"https://doi.org/10.1016/S0950-7051(03)00027-3","url":"https://dblp.org/rec/journals/kbs/Misevicius03"}, "url":"URL#6126411" }, { "@score":"1", "@id":"6126412", "info":{"authors":{"author":{"@pid":"05/2268","text":"Fumio Negoro"}},"title":"Study on axiomatic rules for building up relationships between requirement and source programs.","venue":"Knowl. Based Syst.","volume":"16","number":"7-8","pages":"383-397","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/Negoro03","doi":"10.1016/J.KNOSYS.2003.08.008","ee":"https://doi.org/10.1016/j.knosys.2003.08.008","url":"https://dblp.org/rec/journals/kbs/Negoro03"}, "url":"URL#6126412" }, { "@score":"1", "@id":"6126413", "info":{"authors":{"author":[{"@pid":"58/555","text":"P. A. Paraskevas"},{"@pid":"28/4376","text":"I. S. Pantelakis"},{"@pid":"47/4189","text":"Themistocles D. Lekkas"}]},"title":"An advanced integrated expert system for wastewater treatment plants control: an addendum.","venue":"Knowl. Based Syst.","volume":"16","number":"3","pages":"173","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/ParaskevasPL03","doi":"10.1016/S0950-7051(02)00005-9","ee":"https://doi.org/10.1016/S0950-7051(02)00005-9","url":"https://dblp.org/rec/journals/kbs/ParaskevasPL03"}, "url":"URL#6126413" }, { "@score":"1", "@id":"6126414", "info":{"authors":{"author":[{"@pid":"29/533","text":"Katerina Pastra"},{"@pid":"36/2688","text":"Horacio Saggion"},{"@pid":"w/YorickWilks","text":"Yorick Wilks"}]},"title":"Extracting relational facts for indexing and retrieval of crime-scene photographs.","venue":"Knowl. Based Syst.","volume":"16","number":"5-6","pages":"313-320","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/PastraSW03","doi":"10.1016/S0950-7051(03)00033-9","ee":"https://doi.org/10.1016/S0950-7051(03)00033-9","url":"https://dblp.org/rec/journals/kbs/PastraSW03"}, "url":"URL#6126414" }, { "@score":"1", "@id":"6126415", "info":{"authors":{"author":[{"@pid":"80/33","text":"Svetan M. Ratchev"},{"@pid":"150/3709","text":"Esmond Neil Urwin"},{"@pid":"156/4869","text":"Dirk Muller"},{"@pid":"11/6054","text":"Kulwant Singh Pawar"},{"@pid":"18/3343","text":"I. Moulek"}]},"title":"Knowledge based requirement engineering for one-of-a-kind complex systems.","venue":"Knowl. Based Syst.","volume":"16","number":"1","pages":"1-5","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/RatchevUMPM03","doi":"10.1016/S0950-7051(02)00027-8","ee":"https://doi.org/10.1016/S0950-7051(02)00027-8","url":"https://dblp.org/rec/journals/kbs/RatchevUMPM03"}, "url":"URL#6126415" }, { "@score":"1", "@id":"6126416", "info":{"authors":{"author":[{"@pid":"r/CyrilRay","text":"Cyril Ray"},{"@pid":"c/CClaramunt","text":"Christophe Claramunt"}]},"title":"A distributed system for the simulation of people flows in an airport terminal.","venue":"Knowl. Based Syst.","volume":"16","number":"4","pages":"191-203","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/RayC03","doi":"10.1016/S0950-7051(03)00013-3","ee":"https://doi.org/10.1016/S0950-7051(03)00013-3","url":"https://dblp.org/rec/journals/kbs/RayC03"}, "url":"URL#6126416" }, { "@score":"1", "@id":"6126417", "info":{"authors":{"author":[{"@pid":"r/FlorentinoFernandezRiverola","text":"Florentino Fernández Riverola"},{"@pid":"87/6349","text":"Juan M. Corchado"}]},"title":"CBR based system for forecasting red tides.","venue":"Knowl. Based Syst.","volume":"16","number":"5-6","pages":"321-328","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/RiverolaC03","doi":"10.1016/S0950-7051(03)00034-0","ee":"https://doi.org/10.1016/S0950-7051(03)00034-0","url":"https://dblp.org/rec/journals/kbs/RiverolaC03"}, "url":"URL#6126417" }, { "@score":"1", "@id":"6126418", "info":{"authors":{"author":[{"@pid":"r/CRolland","text":"Colette Rolland"},{"@pid":"s/CarineSouveyet","text":"Carine Souveyet"},{"@pid":"12/5428","text":"Mohamed Ben Ayed"}]},"title":"Guiding Lyee user requirements capture.","venue":"Knowl. Based Syst.","volume":"16","number":"7-8","pages":"351-359","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/RollandSA03","doi":"10.1016/J.KNOSYS.2003.08.001","ee":"https://doi.org/10.1016/j.knosys.2003.08.001","url":"https://dblp.org/rec/journals/kbs/RollandSA03"}, "url":"URL#6126418" }, { "@score":"1", "@id":"6126419", "info":{"authors":{"author":[{"@pid":"50/2495","text":"Miguel A. Salido"},{"@pid":"60/1527","text":"Federico Barber"}]},"title":"A polynomial algorithm for continuous non-binary disjunctive CSPs: extended DLRs.","venue":"Knowl. Based Syst.","volume":"16","number":"5-6","pages":"277-285","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/SalidoB03","doi":"10.1016/S0950-7051(03)00029-7","ee":"https://doi.org/10.1016/S0950-7051(03)00029-7","url":"https://dblp.org/rec/journals/kbs/SalidoB03"}, "url":"URL#6126419" }, { "@score":"1", "@id":"6126420", "info":{"authors":{"author":[{"@pid":"71/5934","text":"Elhadi M. Shakshuki"},{"@pid":"31/1849","text":"Hamada H. Ghenniwa"},{"@pid":"k/MSKamel","text":"Mohamed S. Kamel"}]},"title":"An architecture for cooperative information systems.","venue":"Knowl. Based Syst.","volume":"16","number":"1","pages":"17-27","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/ShakshukiGK03","doi":"10.1016/S0950-7051(02)00048-5","ee":"https://doi.org/10.1016/S0950-7051(02)00048-5","url":"https://dblp.org/rec/journals/kbs/ShakshukiGK03"}, "url":"URL#6126420" }, { "@score":"1", "@id":"6126421", "info":{"authors":{"author":[{"@pid":"95/2537","text":"D. K. Subramanian"},{"@pid":"09/6634","text":"V. S. Ananthanarayana"},{"@pid":"m/MNarasimhaMurty","text":"M. Narasimha Murty"}]},"title":"Knowledge-based association rule mining using AND-OR taxonomies.","venue":"Knowl. Based Syst.","volume":"16","number":"1","pages":"37-45","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/SubramanianAM03","doi":"10.1016/S0950-7051(02)00050-3","ee":"https://doi.org/10.1016/S0950-7051(02)00050-3","url":"https://dblp.org/rec/journals/kbs/SubramanianAM03"}, "url":"URL#6126421" }, { "@score":"1", "@id":"6126422", "info":{"authors":{"author":[{"@pid":"v/AntanasVerikas","text":"Antanas Verikas"},{"@pid":"67/6669","text":"Marija Bacauskiene"},{"@pid":"88/5986","text":"Alvydas Dosinas"},{"@pid":"42/4556","text":"Vacys Bartkevicius"},{"@pid":"38/638","text":"Adas Gelzinis"},{"@pid":"05/1117","text":"Mindaugas Vaitkunas"},{"@pid":"19/512","text":"Arunas Lipnickas"}]},"title":"An intelligent system for tuning magnetic field of a cathode ray tube deflection yoke.","venue":"Knowl. Based Syst.","volume":"16","number":"3","pages":"161-164","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/VerikasBDBGVL03","doi":"10.1016/S0950-7051(02)00081-3","ee":"https://doi.org/10.1016/S0950-7051(02)00081-3","url":"https://dblp.org/rec/journals/kbs/VerikasBDBGVL03"}, "url":"URL#6126422" }, { "@score":"1", "@id":"6126423", "info":{"authors":{"author":[{"@pid":"50/6999","text":"J. Mark Ware"},{"@pid":"63/1864","text":"Ian D. Wilson"},{"@pid":"94/2446","text":"J. Andrew Ware"}]},"title":"A knowledge based genetic algorithm approach to automating cartographic generalisation.","venue":"Knowl. Based Syst.","volume":"16","number":"5-6","pages":"295-303","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/WareWW03","doi":"10.1016/S0950-7051(03)00031-5","ee":"https://doi.org/10.1016/S0950-7051(03)00031-5","url":"https://dblp.org/rec/journals/kbs/WareWW03"}, "url":"URL#6126423" }, { "@score":"1", "@id":"6126424", "info":{"authors":{"author":[{"@pid":"05/4530","text":"Shaw Voon Wong"},{"@pid":"79/5370","text":"Abdel Magid S. Hamouda"}]},"title":"The development of an online knowledge-based expert system for machinability data selection.","venue":"Knowl. Based Syst.","volume":"16","number":"4","pages":"215-229","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/WongH03","doi":"10.1016/S0950-7051(02)00083-7","ee":"https://doi.org/10.1016/S0950-7051(02)00083-7","url":"https://dblp.org/rec/journals/kbs/WongH03"}, "url":"URL#6126424" }, { "@score":"1", "@id":"6126425", "info":{"authors":{"author":[{"@pid":"80/3285","text":"Shouqin Zhou"},{"@pid":"32/2173","text":"Kwai-Sang Chin"},{"@pid":"72/1515","text":"Prasad K. D. V. Yarlagadda"}]},"title":"Internet-based intensive product design platform for product design.","venue":"Knowl. Based Syst.","volume":"16","number":"1","pages":"7-15","year":"2003","type":"Journal Articles","access":"closed","key":"journals/kbs/ZhouCY03","doi":"10.1016/S0950-7051(02)00035-7","ee":"https://doi.org/10.1016/S0950-7051(02)00035-7","url":"https://dblp.org/rec/journals/kbs/ZhouCY03"}, "url":"URL#6126425" } ] } } } )