Sciweavers

1512 search results - page 256 / 303
» When Suboptimal Rules
Sort
View
DMIN
2009
144views Data Mining» more  DMIN 2009»
15 years 18 days ago
Fish or Shark - Data Mining Online Poker
In this paper, data mining techniques are used to analyze data gathered from online poker. The study focuses on short-handed Texas Hold'em, and the data sets used contain thou...
Ulf Johansson, Cecilia Sönströd
116
Voted
EUSFLAT
2009
162views Fuzzy Logic» more  EUSFLAT 2009»
15 years 17 days ago
Discussions on Interpretability of Fuzzy Systems using Simple Examples
Two conflicting goals are often involved in the design of fuzzy rule-based systems: Accuracy maximization and interpretability maximization. A number of approaches have been propos...
Hisao Ishibuchi, Yusuke Nojima
EUSFLAT
2009
245views Fuzzy Logic» more  EUSFLAT 2009»
15 years 17 days ago
Universal Approximation of a Class of Interval Type-2 Fuzzy Neural Networks Illustrated with the Case of Non-linear Identificati
Neural Networks (NN), Type-1 Fuzzy Logic Systems (T1FLS) and Interval Type-2 Fuzzy Logic Systems (IT2FLS) are universal approximators, they can approximate any non-linear function....
Juan R. Castro, Oscar Castillo, Patricia Melin, An...
136
Voted
ICB
2009
Springer
132views Biometrics» more  ICB 2009»
15 years 16 days ago
Fusion in Multibiometric Identification Systems: What about the Missing Data?
Many large-scale biometric systems operate in the identification mode and include multimodal information. While biometric fusion is a well-studied problem, most of the fusion schem...
Karthik Nandakumar, Anil K. Jain, Arun Ross
127
Voted
ICEBE
2009
IEEE
157views Business» more  ICEBE 2009»
15 years 16 days ago
Trust-Based Access Control for Privacy Protection in Collaborative Environment
Privacy has been acknowledged to be a critical requirement for many business environments. A variety of uncertainty and mutability poses challenges when sharing resources must happ...
Min Li, Hua Wang, David Ross