Sciweavers

426 search results - page 64 / 86
» Fuzzy Description Logics and t-norm based fuzzy logics
Sort
View
FSKD
2007
Springer
354views Fuzzy Logic» more  FSKD 2007»
14 years 2 months ago
Using Fuzzy-Word Correlation Factors to Compute Document Similarity Based on Phrase Matching
One of the Web information Retrieval (IR) problems these days is to identify redundant information that exist in (replicated) Web documents. These documents can easily be found in...
Jun won Lee, Yiu-Kai Ng
ICDCSW
2006
IEEE
14 years 2 months ago
Fuzzy Trust for Peer-to-Peer Systems
Peer-to-peer (P2P) systems are based upon the cooperative interactions of member peers. Typically, peers are both autonomous and self-interested, meaning that there is no hierarch...
Nathan Griffiths, Kuo-Ming Chao, Muhammad Younas
RSCTC
1993
Springer
96views Fuzzy Logic» more  RSCTC 1993»
14 years 24 days ago
Trusting an Information Agent
: While the common kinds of uncertainties in databases (e.g., null values, disjunction, corrupt/missing data, domain mismatch, etc.) have been extensively studied, a relatively une...
Hasan M. Jamil, Fereidoon Sadri
FUZZIEEE
2007
IEEE
14 years 3 months ago
Learning Fuzzy Linguistic Models from Low Quality Data by Genetic Algorithms
— Incremental rule base learning techniques can be used to learn models and classifiers from interval or fuzzyvalued data. These algorithms are efficient when the observation e...
Luciano Sánchez, José Otero
FSKD
2005
Springer
78views Fuzzy Logic» more  FSKD 2005»
14 years 2 months ago
Using Feedback Cycle for Developing an Adjustable Security Design Metric
In this paper, we develop a security design metric that can be used at system design time to build more secure systems. This metric is based on the system-wide approach and adopt a...
Charlie Y. Shim, Jung Y. Kim, Sung Y. Shin, Jiman ...