Trust management model that we present is adapted for ubiquitous devices cooperation, rather than for classic client-supplier relationship. We use fuzzy numbers to represent trust...
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
In fuzzy modeling (FM), the quantity and quality of the training set is crucial to properly grasp the behavior of the system being modeled. However, the available data are often n...
Pablo Carmona, Juan Luis Castro, Jose Manuel Zurit...
— One of the main advantages of fuzzy modeling is the ability to yield interpretable results. Amongst these modeling methods, the OLS algorithm is a mathematically robust techniq...
In this paper we propose a quadratic programming approach to computing the edit distance of graphs. Whereas the standard edit distance is defined with respect to a minimum-cost ed...