Sciweavers

854 search results - page 154 / 171
» From Fuzzy - to Bipolar - Datalog
Sort
View
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
15 years 1 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
CDC
2009
IEEE
135views Control Systems» more  CDC 2009»
15 years 29 days ago
The hybrid intelligent control for the fused magnesia production
—The electro-fused magnesia furnace is one of the main equipments used to produce electro-fused magnesia which is high performance refractory. Due to the multivariable, strong no...
Yongjian Wu, Zhiwei Wu, Bin Dong, Li Zhang, Tianyo...
73
Voted
CAISE
2008
Springer
14 years 11 months ago
A Framework to Analyse IS Alignment Approaches: Towards the Definition of Underlying Alignment Mechanisms
Abstract. Today, companies are immersed in extremely competitive worldwide markets that change continuously. Thus, companies have to evolve introducing strategic and structural cha...
Oscar Avila, Virginie Goepp, François Kiefe...
113
Voted
CSL
2008
Springer
14 years 11 months ago
Fractional Collections with Cardinality Bounds, and Mixed Linear Arithmetic with Stars
Abstract. We present decision procedures for logical constraints involving collections such as sets, multisets, and fuzzy sets. Element membership in our collections is given by ch...
Ruzica Piskac, Viktor Kuncak
EWCBR
2008
Springer
14 years 11 months ago
Supporting Case-Based Retrieval by Similarity Skylines: Basic Concepts and Extensions
Conventional approaches to similarity search and case-based retrieval, such as nearest neighbor search, require the specification of a global similarity measure which is typically ...
Eyke Hüllermeier, Ilya Vladimirskiy, Bel&eacu...