-
1
-
-
77952346686
-
Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures
-
February
-
J. Aubert, T. Schaberreiter, C. Incoul, D. Khadraoui, and B. Gateau. Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures. In Int'l Conference on Availability, Reliability and Security, pages 262-267, February 2010.
-
(2010)
Int'l Conference on Availability, Reliability and Security
, pp. 262-267
-
-
Aubert, J.1
Schaberreiter, T.2
Incoul, C.3
Khadraoui, D.4
Gateau, B.5
-
3
-
-
82955197412
-
An Evolving Risk Management Framework for Wireless Sensor Networks
-
Ottawa, Canada, September
-
R. Falcon, R. Abielmona, and A. Nayak. An Evolving Risk Management Framework for Wireless Sensor Networks. In Proceedings of the 2011 IEEE Int'l Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA), pages 1-6, Ottawa, Canada, September 2011.
-
(2011)
Proceedings of the 2011 IEEE Int'l Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA)
, pp. 1-6
-
-
Falcon, R.1
Abielmona, R.2
Nayak, A.3
-
4
-
-
79959468848
-
The One-Commodity Traveling Salesman Problem with Selective Pickup and Delivery: An Ant Colony Approach
-
Barcelona, Spain
-
R. Falcon, X. Li, A. Nayak, and I. Stojmenovic. The One-Commodity Traveling Salesman Problem with Selective Pickup and Delivery: an Ant Colony Approach. In IEEE Congress on Evolutionary Computation (CEC), pages 4326-4333, Barcelona, Spain, 2010.
-
(2010)
IEEE Congress on Evolutionary Computation (CEC)
, pp. 4326-4333
-
-
Falcon, R.1
Li, X.2
Nayak, A.3
Stojmenovic, I.4
-
5
-
-
38949132578
-
Multisensor Real-time Risk Assessment using Continuous-time Hidden Markov Models
-
Nov.
-
K. Haslum and A. Arnes. Multisensor Real-time Risk Assessment using Continuous-time Hidden Markov Models. In Int'l Conference on Computational Intelligence and Security, pages 1536-1540, Nov. 2006.
-
(2006)
Int'l Conference on Computational Intelligence and Security
, pp. 1536-1540
-
-
Haslum, K.1
Arnes, A.2
-
6
-
-
40949083521
-
A Fuzzy C Means Variant for Clustering Evolving Data Streams
-
October
-
P. Hore, L. O. Hall, and D. B. Goldgof. A Fuzzy C Means Variant For Clustering Evolving Data Streams. In Proc. of the IEEE International Conference on Systems, Man and Cybernetics, pages 360-365, October 2007.
-
(2007)
Proc. of the IEEE International Conference on Systems, Man and Cybernetics
, pp. 360-365
-
-
Hore, P.1
Hall, L.O.2
Goldgof, D.B.3
-
8
-
-
51149106562
-
Online Fuzzy C Means
-
May
-
P. Hore, L. O. Hall, D. B. Goldgof, and W. Cheng. Online Fuzzy C Means. In Annual Meeting of the North American Fuzzy Information Processing Society, pages 1-5, May 2008.
-
(2008)
Annual Meeting of the North American Fuzzy Information Processing Society
, pp. 1-5
-
-
Hore, P.1
Hall, L.O.2
Goldgof, D.B.3
Cheng, W.4
-
11
-
-
74449092532
-
Shadowed C-means: Integrating Fuzzy and Rough Clustering
-
S. Mitra, W. Pedrycz, and B. Barman. Shadowed C-means: Integrating Fuzzy and Rough Clustering. Pat. Recognition, 43(4):1282-1291, 2010.
-
(2010)
Pat. Recognition
, vol.43
, Issue.4
, pp. 1282-1291
-
-
Mitra, S.1
Pedrycz, W.2
Barman, B.3
-
12
-
-
26844532803
-
A Possibilistic Fuzzy c-Means Clustering Algorithm
-
aug.
-
N. R. Pal, K. Pal, , J. M. Keller, and J. C. Bezdek. A Possibilistic Fuzzy c-Means Clustering Algorithm. IEEE Transactions on Fuzzy Systems, 13(4):517-530, aug. 2005.
-
(2005)
IEEE Transactions on Fuzzy Systems
, vol.13
, Issue.4
, pp. 517-530
-
-
Pal, N.R.1
Pal, K.2
Keller, J.M.3
Bezdek, J.C.4
-
13
-
-
0008435541
-
Shadowed Sets: Bridging Fuzzy and Rough Sets
-
S. K. Pal and A. Skowron, editors, Springer Verlag / Singapore
-
W. Pedrycz. Shadowed Sets: Bridging Fuzzy and Rough Sets. In S. K. Pal and A. Skowron, editors, Rough Fuzzy Hybridization. A New Trend in Decision-Making, pages 179-199. Springer Verlag / Singapore, 1999.
-
(1999)
Rough Fuzzy Hybridization. A New Trend in Decision-Making
, pp. 179-199
-
-
Pedrycz, W.1
-
14
-
-
58449116911
-
From Fuzzy Sets to Shadowed Sets: Interpretation and Computing
-
W. Pedrycz. From Fuzzy Sets to Shadowed Sets: Interpretation and Computing. Int'l Journal of Intelligent Systems, 24:48-61, 2009.
-
(2009)
Int'l Journal of Intelligent Systems
, vol.24
, pp. 48-61
-
-
Pedrycz, W.1
-
15
-
-
79952364186
-
Evolvable Fuzzy Systems: Some Insights and Challenges
-
W. Pedrycz. Evolvable Fuzzy Systems: Some Insights and Challenges. Evolving Systems, 1:73-82, 2010.
-
(2010)
Evolving Systems
, vol.1
, pp. 73-82
-
-
Pedrycz, W.1
-
18
-
-
67649682148
-
Using Hidden Markov Models to Evaluate the Real-Time Risks of Network
-
December
-
X. Tan, Y. Zhang, X. Cui, and H. Xi. Using Hidden Markov Models to Evaluate the Real-Time Risks of Network. In IEEE Int'l Symposium on Knowledge Acquisition and Modeling Workshop, pages 490-493, December 2008.
-
(2008)
IEEE Int'l Symposium on Knowledge Acquisition and Modeling Workshop
, pp. 490-493
-
-
Tan, X.1
Zhang, Y.2
Cui, X.3
Xi, H.4
|