Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Fluid simulation is one of the most active research areas in computer graphics. However, it remains difficult to obtain measurements of real fluid flows for validation of the simu...
Bradley Atcheson, Ivo Ihrke, Wolfgang Heidrich, Ar...
Abstract. The growth in amount of data available today has encouraged the development of effective data analysis methods to support human decision-making. Neuro-fuzzy computation ...
One of the techniques used to support decisions in uncertain environments is the Fuzzy TOPSIS method. However, from crisp data, this method considers only one fuzzy set in their a...
We consider the interpolation problem for functions whose range and whose domain both consist of convex or fuzzy subsets of a real Euclidean space. This problem arises in fuzzy co...