Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Abstract. Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because c...
When the time span of an event is imprecise, it can be represented by a fuzzy set, called a fuzzy time interval. In this paper, we propose a framework to represent, compute, and re...
Steven Schockaert, Martine De Cock, Etienne E. Ker...
This paper presents an approach that integrates computational intelligence/soft computing paradigms with clinical investigation methods and knowledge. Computational intelligence m...
Nicolae Varachiu, Cynthia Karanicolas, Mihaela Uli...
Abstract. The ability of an adaptive hypermedia system to create tailored environments depends mainly on the amount and accuracy of information stored in each user model. One of th...