As dialogue systems are widely demanded, the research on natural language generation in dialogue has raised interest. Contrary to conventional dialogue systems that reply to the us...
We shall discuss further regularity properties of null-additive fuzzy measure on metric spaces following the previous results. Under the null-additivity condition, some properties ...
We formulate a fuzzy perceptive model for Markov decision processes with discounted payoff in which the perception for transition probabilities is described by fuzzy sets. Our aim...
Combining a set of classifiers has often been exploited to improve the classification performance. Accurate as well as diverse base classifiers are prerequisite to construct a good...
Abstract. Common inductive learning strategies offer the tools for knowledge acquisition, but possess some inherent limitations due to the use of fixed bias during the learning p...
Ciro Castiello, Giovanna Castellano, Anna Maria Fa...
Watermarking has been used on multimedia for a variety of applications, among which intellectual property protection stands out. However, and in spite of a growing need, very few a...
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this goal, an agreed key between the sender and receive...
The purpose of this paper is to introduce pairing over elliptic curve and apply it to ID based key agreement schemes and privacy preserving key agreement schemes. The key words her...