Sciweavers

117 search results - page 15 / 24
» Investment using technical analysis and fuzzy logic
Sort
View
SYNTHESE
2011
177views more  SYNTHESE 2011»
13 years 3 months ago
Quantum logic as a dynamic logic
We address the old question whether a logical understanding of Quantum Mechanics requires abandoning some of the principles of classical logic. Against Putnam and others1 , our an...
Alexandru Baltag, Sonja Smets
ISCI
2010
96views more  ISCI 2010»
13 years 7 months ago
Multi-adjoint t-concept lattices
The t-concept lattice is introduced as a set of triples associated to graded tabular information interpreted in a non-commutative fuzzy logic. Following the general techniques of ...
Jesús Medina, Manuel Ojeda-Aciego
EUSFLAT
2009
220views Fuzzy Logic» more  EUSFLAT 2009»
13 years 6 months ago
Web Usage Mining: users' navigational patterns extraction from web logs using ant-based clustering method
Web Usage Mining is the process of applying data mining techniques to the discovery of usage patterns from data extracted from Web Log files. It mines the secondary data (web logs)...
Kobra Etminani, Mohammad R. Akbarzadeh-Totonchi, N...
BMCBI
2004
185views more  BMCBI 2004»
13 years 8 months ago
Linear fuzzy gene network models obtained from microarray data by exhaustive search
Background: Recent technological advances in high-throughput data collection allow for experimental study of increasingly complex systems on the scale of the whole cellular genome...
Bahrad A. Sokhansanj, J. Patrick Fitch, Judy N. Qu...
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
14 years 8 hour ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang