Sciweavers

517 search results - page 30 / 104
» Computing Fuzzy Answer Sets Using dlvhex
Sort
View
ENVSOFT
2008
115views more  ENVSOFT 2008»
14 years 9 months ago
Adaptive fuzzy modeling versus artificial neural networks
In this paper two areas of soft computing (fuzzy modeling and artificial neural networks) are discussed. Based on the fundamental mathematical similarity of fuzzy technique and ra...
Ralf Wieland, Wilfried Mirschel
83
Voted
GCC
2005
Springer
15 years 3 months ago
Using Fuzzy Cognitive Map to Effectively Classify E-Documents and Application
In the current Web, e-document has been the most common vehicle for delivering and exchanging information. As the amount of e-documents has grown enormously, effective classificati...
Jianzeng Wang, Yunpeng Xing, Peng Shi, Fei Guo, Zh...
PVLDB
2010
84views more  PVLDB 2010»
14 years 8 months ago
Processing Top-k Join Queries
We consider the problem of efficiently finding the top-k answers for join queries over web-accessible databases. Classical algorithms for finding top-k answers use branch-and-b...
Minji Wu, Laure Berti-Equille, Amélie Maria...
ADBIS
2009
Springer
162views Database» more  ADBIS 2009»
15 years 1 months ago
Efficient Set Similarity Joins Using Min-prefixes
Identification of all objects in a dataset whose similarity is not less than a specified threshold is of major importance for management, search, and analysis of data. Set similari...
Leonardo Ribeiro, Theo Härder
CSREASAM
2006
14 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin