The importance of computer security in order to maintain the confidentiality, integrity and availability of data and information is well known. Different mechanisms have been propo...
There are many key problems of decision making related to spectrum occupancies in cognitive radio networks. It is known that there exist correlations of spectrum occupancies in tim...
This paper surveys some genetic-fuzzy data mining techniques for mining both membership functions and fuzzy association rules. The motivation from crisp mining to fuzzy mining wil...
The concept of neighbor system, introduced by Hartvigsen (2009), is a set of integral vectors satisfying a certain combinatorial property. In this paper, we reveal the relationship...
This paper investigates the suitability of contemporary DSL tools in the context of enterprise software development. The main focus is on integration issues between the DSL tool, ...