Emerging approaches to enforce some form of protection in (pseudo)anonymous peer to peer systems propose the use of reputations as a means to establish the reliability of servents...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
The methods of reconstruction of perception based functions (PBF) given by the set of rules like “If X is SMALL then Y is VERY QUICKLY INCREASING”, “If X is BETWEEN A and B ...
We present a modification of the vehicle routing problem with the additional restriction that time windows are associated with each customer by defining an interval wherein the cu...
The article deals with the possible methodology of processing of data and information for the search of prediction of heat supply daily diagram (HSDD). The methodology includes te...
Conventional approach to mathematical description of experiments applies probability theory. Here, another approach is used to express uncertainty based on probability, fuzzy sets...
In this paper some research trends are presented concerning the application of fuzzy techniques to model flexible systems for the access to information on the WWW. The focus is o...
Fuzzy inference process usually involves the use of fuzzy rule base consisting in several fuzzy rules. Overall output can be obtained by aggregation of outputs of all rules. To ob...
In this paper we present the application of a particular neuro-fuzzy system, named KERNEL, to the problem of differential diagnosis of erythematosquamous diseases, which represen...
Giovanna Castellano, Ciro Castiello, Anna Maria Fa...