Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet are now limited to simple incremental updates; deployment o...
In the development of location-based services, various location-sensing techniques and experimental/commercial services have been used. However, conventional location-based service...
We present techniques to index mobile objects in order to efficiently answer range queries about their future positions. This problem appears in real-life applications, such as pr...
Dimitris Papadopoulos, George Kollios, Dimitrios G...
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
This paper considers a portfolio selection problem with type-2 fuzzy future returns involving ambiguous and subjectivity. Since this proposed problem is not well-defined due to fuz...