Sciweavers

285 search results - page 12 / 57
» Fuzzy Logic Approach to Modelling in Ecosystem Research
Sort
View
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
15 years 1 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
IEAAIE
2000
Springer
15 years 1 months ago
Fuzzy Modeling Approach for Integrated Assessments Using Cultural Theory
It has already been noted that the accurate prediction of societal responses requires the use of a formal model based on some social or cultural taxonomy. One such taxonomic candi...
Adnan Yazici, Frederick E. Petry, Curt Pendergraft
ISSA
2004
14 years 11 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
RSCTC
2000
Springer
146views Fuzzy Logic» more  RSCTC 2000»
15 years 1 months ago
An Algorithm for Induction of Decision Rules Consistent with the Dominance Principle
Induction of decision rules within the dominance-based rough set approach to the multiple-criteria sorting decision problem is discussed in this paper. We introduce an algorithm ca...
Salvatore Greco, Benedetto Matarazzo, Roman Slowin...
IFSA
2003
Springer
101views Fuzzy Logic» more  IFSA 2003»
15 years 3 months ago
Commutativity as Prior Knowledge in Fuzzy Modeling
In fuzzy modeling (FM), the quantity and quality of the training set is crucial to properly grasp the behavior of the system being modeled. However, the available data are often n...
Pablo Carmona, Juan Luis Castro, Jose Manuel Zurit...