Abstract. Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever ...
— We study similarity in formal concept analysis of data tables with fuzzy attributes. We focus on similarity related to attribute implications, i.e. rules A ⇒ B describing dep...
Knowledge acquisition (KA) plays an important role in building knowledge based systems (KBS). However, evaluating different KA techniques has been difficult because of the costs...
We present an automatic on-line adaptation mechanism to the writer’s handwriting style for the recognition of isolated handwritten characters. The classifier is based on a Fuzz...
This paper presents a multi-expert system for dynamic signature verification. The system uses a stroke-oriented description of signatures well-suited for multi-expert approach. Ea...
L. Bovino, Sebastiano Impedovo, Giuseppe Pirlo, L....