A fuzzy reasoning scheme for context sharing decision making
暂无分享,去创建一个
[1] L. Zadeh. Fuzzy sets as a basis for a theory of possibility , 1999 .
[2] Judea Pearl,et al. Bayesian decision methods , 1990 .
[3] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[4] Judea Pearl,et al. Decision making under uncertainty , 1996, CSUR.
[5] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[6] Arkady Bolotin,et al. A Generalized Uncertainty Function and Fuzzy Modeling , 2001, ISMDA.
[7] Russell Greiner,et al. Efficient reasoning , 2001, CSUR.
[8] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[9] David Chaum,et al. Security without Identification: Card Computers to make Big Brother Obsolete , 1985 .
[10] E. H. Mamdani,et al. Advances in the linguistic synthesis of fuzzy controllers , 1976 .
[11] Marc Langheinrich,et al. The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .
[12] Didier Dubois,et al. What does fuzzy logic bring to AI? , 1995, CSUR.
[13] Hairong Yu,et al. A Combined Approach to Uncertain Data Analysis , 1997, IDA.
[14] Lotfi A. Zadeh,et al. Fuzzy Logic for Business, Finance, and Management , 1997, Advances in Fuzzy Systems - Applications and Theory.
[15] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[16] Amit Konar,et al. Artificial Intelligence and Soft Computing: Behavioral and Cognitive Modeling of the Human Brain , 1999 .
[17] Uzay Kaymak,et al. Probabilistic Reasoning in Fuzzy Rule-Based Systems , 2002 .
[18] Rakesh Agrawal,et al. Watermarking Relational Databases , 2002, Very Large Data Bases Conference.
[19] René W. Wagenaar,et al. A fuzzy logic based approach to support users self-control of their private contextual data retrieval , 2004, ECIS.
[20] Amit Sahai,et al. Pseudonym Systems , 1999, Selected Areas in Cryptography.
[21] Lotfi A. Zadeh,et al. Outline of a New Approach to the Analysis of Complex Systems and Decision Processes , 1973, IEEE Trans. Syst. Man Cybern..
[22] Willem G. Vree,et al. Trust metrics for survivable security systems , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[23] Jan Camenisch,et al. Design and implementation of the idemix anonymous credential system , 2002, CCS '02.
[24] E. Mizutani,et al. Neuro-Fuzzy and Soft Computing-A Computational Approach to Learning and Machine Intelligence [Book Review] , 1997, IEEE Transactions on Automatic Control.
[25] Michio Sugeno,et al. Fuzzy identification of systems and its applications to modeling and control , 1985, IEEE Transactions on Systems, Man, and Cybernetics.