Sciweavers

2997 search results - page 95 / 600
» Fuzzy robustness analysis
Sort
View
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 10 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
ICANN
2003
Springer
15 years 9 months ago
Self-Organizing Operator Maps in Complex System Analysis
Abstract. The growth in amount of data available today has encouraged the development of effective data analysis methods to support human decision-making. Neuro-fuzzy computation ...
Pasi Lehtimäki, Kimmo Raivio, Olli Simula
INFOCOM
2010
IEEE
15 years 2 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
ESANN
2007
15 years 5 months ago
How to process uncertainty in machine learning?
Uncertainty is a popular phenomenon in machine learning and a variety of methods to model uncertainty at different levels has been developed. The aim of this paper is to motivate ...
Barbara Hammer, Thomas Villmann
FLAIRS
2004
15 years 5 months ago
Inducing Fuzzy Decision Trees in Non-Deterministic Domains using CHAID
Most decision tree induction methods used for extracting knowledge in classification problems are unable to deal with uncertainties embedded within the data, associated with human...
Jay Fowdar, Zuhair Bandar, Keeley A. Crockett