Sciweavers

1105 search results - page 87 / 221
» Fuzzy logics as the logics of chains
Sort
View
ISCC
2006
IEEE
202views Communications» more  ISCC 2006»
14 years 3 months ago
Fuzzy Logic Congestion Control in TCP/IP Tandem Networks
Network resource management and control is a complex problem that requires robust, possibly intelligent, control methodologies to obtain satisfactory performance. While many Activ...
Chrysostomos Chrysostomou, Andreas Pitsillides
CSREASAM
2006
13 years 10 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
SEMWEB
2005
Springer
14 years 2 months ago
The Fuzzy Description Logic f-SHIN
Abstract. In the Semantic Web information would be retrieved, processed, combined, shared and reused in the maximum automatic way possible. Obviously, such procedures involve a hig...
Giorgos Stoilos, Giorgos B. Stamou, Vassilis Tzouv...
LFCS
2009
Springer
14 years 3 months ago
Fuzzy Description Logic Reasoning Using a Fixpoint Algorithm
We present FixIt(ALC), a novel procedure for deciding knowledge base (KB) satisfiability in the Fuzzy Description Logic (FDL) ALC. FixIt(ALC) does not search for tree-structured m...
Uwe Keller, Stijn Heymans
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
14 years 3 months ago
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks
—The feature selection phase is one of the first, and yet very important, tasks to be completed during the development of any Intrusion Detection System. If this phase is neglec...
Iosif-Viorel Onut, Ali A. Ghorbani