The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...
We describe recent work on MedSLT, a medium-vocabulary interlingua-based medical speech translation system, focussing on issues that arise when handling languages of which the gra...
: In an ideal scenario of intelligent machine tools [18] the human mechanist was almost replaced by the controller. During the last decade many efforts have been made to get closer...
This paper compares the performance of two provably successful evolutionary optimization tools in the optimization of a Fuzzy-Rule-Base (FRB) for the three well known fuzzy modeli...