Sciweavers

TIFS
2011
253views Education» more  TIFS 2011»
13 years 6 months ago
Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification
—Sensor photo-response non-uniformity has been proposed as a unique identifier (fingerprint) for various forensic tasks, including digital-camera ballistics in which an image is ...
Miroslav Goljan, Jessica J. Fridrich, Mo Chen
TGIS
2011
218views Education» more  TGIS 2011»
13 years 6 months ago
Pervasive Web Mapping, Geoprocessing and Services
acts submitted in total and among them 30 were accepted for oral presentation and 20 were accepted for poster presentation. 42 full papers were submitted and included in the worksh...
Suzana Dragicevic, Songnian Li, Maria A. Brovelli,...
TFS
2011
194views Education» more  TFS 2011»
13 years 6 months ago
Top-Down Induction of Fuzzy Pattern Trees
Fuzzy pattern tree induction was recently introduced as a novel machine learning method for classification. Roughly speaking, a pattern tree is a hierarchical, tree-like structur...
R. Senge, Eyke Hüllermeier
TFS
2011
264views Education» more  TFS 2011»
13 years 6 months ago
Information Granularity in Fuzzy Binary GrC Model
—Zadeh’s seminal work in theory of fuzzy-information3 granulation in human reasoning is inspired by the ways in which4 humans granulate information and reason with it. This has...
Yuhua Qian, Jiye Liang, W.-z. Z. Wu, Chuangyin Dan...
TFS
2011
242views Education» more  TFS 2011»
13 years 6 months ago
Linguistic Summarization Using IF-THEN Rules and Interval Type-2 Fuzzy Sets
—Linguistic summarization (LS) is a data mining or knowledge discovery approach to extract patterns from databases. Many authors have used this technique to generate summaries li...
Dongrui Wu, Jerry M. Mendel
TFS
2011
239views Education» more  TFS 2011»
13 years 6 months ago
Systems Control With Generalized Probabilistic Fuzzy-Reinforcement Learning
—Reinforcement learning (RL) is a valuable learning method when the systems require a selection of control actions whose consequences emerge over long periods for which input– ...
William M. Hinojosa, Samia Nefti, Uzay Kaymak
TELSYS
2011
177views Education» more  TELSYS 2011»
13 years 6 months ago
Overhead of ARQ mechanism in IEEE 802.16 networks
Zdenek Becvar, Robert Bestak
TELSYS
2011
206views Education» more  TELSYS 2011»
13 years 6 months ago
A line search approach for high dimensional function optimization
Crina Grosan, Ajith Abraham, Aboul Ella Hassanien
TELSYS
2011
220views Education» more  TELSYS 2011»
13 years 6 months ago
Multi swarms for neighbor selection in peer-to-peer overlay networks
Ajith Abraham, Hongbo Liu, Aboul Ella Hassanien