Sciweavers

4007 search results - page 40 / 802
» Computation with imprecise probabilities
Sort
View
CSREASAM
2006
13 years 10 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
COSIT
2005
Springer
95views GIS» more  COSIT 2005»
14 years 2 months ago
Simulation of Obfuscation and Negotiation for Location Privacy
Abstract. Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because c...
Matt Duckham, Lars Kulik
TFS
2008
116views more  TFS 2008»
13 years 8 months ago
Fuzzifying Allen's Temporal Interval Relations
When the time span of an event is imprecise, it can be represented by a fuzzy set, called a fuzzy time interval. In this paper, we propose a framework to represent, compute, and re...
Steven Schockaert, Martine De Cock, Etienne E. Ker...
IEEEICCI
2002
IEEE
14 years 1 months ago
Computational Intelligence for Medical Knowledge Acquisition with Application to Glaucoma
This paper presents an approach that integrates computational intelligence/soft computing paradigms with clinical investigation methods and knowledge. Computational intelligence m...
Nicolae Varachiu, Cynthia Karanicolas, Mihaela Uli...
AH
2004
Springer
14 years 2 months ago
Recent Soft Computing Approaches to User Modeling in Adaptive Hypermedia
Abstract. The ability of an adaptive hypermedia system to create tailored environments depends mainly on the amount and accuracy of information stored in each user model. One of th...
Enrique Frías-Martínez, George D. Ma...