Sciweavers

1512 search results - page 256 / 303
» When Suboptimal Rules
Sort
View
DMIN
2009
144views Data Mining» more  DMIN 2009»
13 years 8 months ago
Fish or Shark - Data Mining Online Poker
In this paper, data mining techniques are used to analyze data gathered from online poker. The study focuses on short-handed Texas Hold'em, and the data sets used contain thou...
Ulf Johansson, Cecilia Sönströd
EUSFLAT
2009
162views Fuzzy Logic» more  EUSFLAT 2009»
13 years 8 months ago
Discussions on Interpretability of Fuzzy Systems using Simple Examples
Two conflicting goals are often involved in the design of fuzzy rule-based systems: Accuracy maximization and interpretability maximization. A number of approaches have been propos...
Hisao Ishibuchi, Yusuke Nojima
EUSFLAT
2009
245views Fuzzy Logic» more  EUSFLAT 2009»
13 years 8 months ago
Universal Approximation of a Class of Interval Type-2 Fuzzy Neural Networks Illustrated with the Case of Non-linear Identificati
Neural Networks (NN), Type-1 Fuzzy Logic Systems (T1FLS) and Interval Type-2 Fuzzy Logic Systems (IT2FLS) are universal approximators, they can approximate any non-linear function....
Juan R. Castro, Oscar Castillo, Patricia Melin, An...
ICB
2009
Springer
132views Biometrics» more  ICB 2009»
13 years 8 months ago
Fusion in Multibiometric Identification Systems: What about the Missing Data?
Many large-scale biometric systems operate in the identification mode and include multimodal information. While biometric fusion is a well-studied problem, most of the fusion schem...
Karthik Nandakumar, Anil K. Jain, Arun Ross
ICEBE
2009
IEEE
157views Business» more  ICEBE 2009»
13 years 8 months ago
Trust-Based Access Control for Privacy Protection in Collaborative Environment
Privacy has been acknowledged to be a critical requirement for many business environments. A variety of uncertainty and mutability poses challenges when sharing resources must happ...
Min Li, Hua Wang, David Ross