Sciweavers

1512 search results - page 256 / 303
» When Suboptimal Rules
Sort
View
DMIN
2009
144views Data Mining» more  DMIN 2009»
14 years 10 months ago
Fish or Shark - Data Mining Online Poker
In this paper, data mining techniques are used to analyze data gathered from online poker. The study focuses on short-handed Texas Hold'em, and the data sets used contain thou...
Ulf Johansson, Cecilia Sönströd
EUSFLAT
2009
162views Fuzzy Logic» more  EUSFLAT 2009»
14 years 10 months ago
Discussions on Interpretability of Fuzzy Systems using Simple Examples
Two conflicting goals are often involved in the design of fuzzy rule-based systems: Accuracy maximization and interpretability maximization. A number of approaches have been propos...
Hisao Ishibuchi, Yusuke Nojima
100
Voted
EUSFLAT
2009
245views Fuzzy Logic» more  EUSFLAT 2009»
14 years 10 months ago
Universal Approximation of a Class of Interval Type-2 Fuzzy Neural Networks Illustrated with the Case of Non-linear Identificati
Neural Networks (NN), Type-1 Fuzzy Logic Systems (T1FLS) and Interval Type-2 Fuzzy Logic Systems (IT2FLS) are universal approximators, they can approximate any non-linear function....
Juan R. Castro, Oscar Castillo, Patricia Melin, An...
108
Voted
ICB
2009
Springer
132views Biometrics» more  ICB 2009»
14 years 10 months ago
Fusion in Multibiometric Identification Systems: What about the Missing Data?
Many large-scale biometric systems operate in the identification mode and include multimodal information. While biometric fusion is a well-studied problem, most of the fusion schem...
Karthik Nandakumar, Anil K. Jain, Arun Ross
110
Voted
ICEBE
2009
IEEE
157views Business» more  ICEBE 2009»
14 years 10 months ago
Trust-Based Access Control for Privacy Protection in Collaborative Environment
Privacy has been acknowledged to be a critical requirement for many business environments. A variety of uncertainty and mutability poses challenges when sharing resources must happ...
Min Li, Hua Wang, David Ross