Sciweavers

952 search results - page 157 / 191
» Substructural fuzzy logics
Sort
View
RSCTC
2000
Springer
227views Fuzzy Logic» more  RSCTC 2000»
14 years 13 days ago
Rough Sets in Approximate Spatial Reasoning
Abstract. In spatial reasoning the qualitative description of relations between spatial regions is of practical importance and has been widely studied. Examples of such relations a...
Thomas Bittner, John G. Stell
ISSA
2004
13 years 10 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
FSKD
2010
Springer
270views Fuzzy Logic» more  FSKD 2010»
13 years 10 months ago
Ontology-based knowledge discovery and sharing in bioinformatics and medical informatics: A brief survey
Abstract--Worldwide health scientists are producing, accessing, analyzing, integrating, and storing massive amounts of digital medical data daily, through observation, experimentat...
Jingshan Huang, Dejing Dou, Lei He, Pat Hayes, Jia...
FSKD
2008
Springer
174views Fuzzy Logic» more  FSKD 2008»
13 years 10 months ago
A Hybrid Re-sampling Method for SVM Learning from Imbalanced Data Sets
Support Vector Machine (SVM) has been widely studied and shown success in many application fields. However, the performance of SVM drops significantly when it is applied to the pr...
Peng Li, Pei-Li Qiao, Yuan-Chao Liu
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
13 years 10 months ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...