Perspectives and Views of Flexible Query Answering | 0 | 0.34 | 2021 |
Flexible Query Answering Systems: 10th International Conference, FQAS 2013, Granada, Spain, September 18-20, 2013. Proceedings | 59 | 2.39 | 2013 |
Issues of Security and Informational Privacy in Relation to an Environmental Scanning System for Fighting Organized Crime. | 0 | 0.34 | 2013 |
Importance weighting and andness control in De Morgan dual power means and OWA operators | 6 | 0.51 | 2012 |
Flexible Query Answering Systems - 9th International Conference, FQAS 2011, Ghent, Belgium, October 26-28, 2011 Proceedings | 43 | 1.53 | 2011 |
Multiplicative And Implicative Importance Weighted Averaging Aggregation Operators With Accurate Andness Direction | 0 | 0.34 | 2009 |
Flexible Query Answering Systems, 8th International Conference, FQAS 2009, Roskilde, Denmark, October 26-28, 2009. Proceedings | 55 | 2.73 | 2009 |
Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies | 17 | 1.13 | 2008 |
Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings | 26 | 2.97 | 2008 |
Generalized conjunction/disjunction | 35 | 3.07 | 2007 |
Erratum: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks. | 0 | 0.34 | 2007 |
How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks | 5 | 0.86 | 2007 |
Dependence Centrality: Identifying Dependence of Nodes in Terrorist Networks | 0 | 0.34 | 2007 |
Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network | 11 | 0.86 | 2007 |
Harvesting Terrorists Information from Web | 5 | 1.23 | 2007 |
Understanding the structure of terrorist networks | 3 | 0.49 | 2007 |
Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks | 9 | 1.15 | 2006 |
Practical algorithms for destabilizing terrorist networks | 10 | 1.08 | 2006 |
Introduction To The Section On Concept Oriented Knowledge Representation Under Uncertainty | 0 | 0.34 | 2006 |
Structural analysis and mathematical methods for destabilizing terrorist networks using investigative data mining | 13 | 0.99 | 2006 |
Structural Analysis and Destabilizing Terrorist Networks | 10 | 1.18 | 2006 |
Flexible Query Answering Systems, 7th International Conference, FQAS 2006, Milan, Italy, June 7-10, 2006, Proceedings | 57 | 2.98 | 2006 |
Fuzzeval: a fuzzy controller-based approach in adaptive learning for backgammon game | 0 | 0.34 | 2005 |
Investigative Data Mining: A General Framework | 2 | 1.55 | 2004 |
Special Issue on Web mining using soft computing | 2 | 0.38 | 2004 |
Flexible Query Answering Systems, 6th International Conference, FQAS 2004, Lyon, France, June 24-26, 2004, Proceedings | 38 | 2.12 | 2004 |
Efficient andness-directed importance weighted averaging operators | 20 | 1.68 | 2003 |
Flexible Query Answering Systems, 5th International Conference, FQAS 2002, Copenhagen, Denmark, October 27-29, 2002, Proceedings | 27 | 2.33 | 2002 |
Fuzzy data mining of term associations for flexible query answering | 1 | 0.37 | 2001 |
An Approach to Flexible Information Access Systems Using Soft Computing | 5 | 0.51 | 1999 |
A fuzzy genetic algorithm approach to an adaptive information retrieval agent | 34 | 1.39 | 1999 |
A genetic fuzzy classifier to adaptive user interest profiles with feature selection | 0 | 0.34 | 1999 |
Flexible Query Answering Systems, Third International Conference, FQAS'98, Roskilde, Denmark, May 13-15, 1998, Proceedings | 32 | 3.82 | 1998 |
Knowledge Discovery for Flexible Querying | 5 | 0.57 | 1998 |
Fuzzy Querying Using Concept Object Algebra | 0 | 0.34 | 1996 |
Retrieving information by fuzzification of queries | 10 | 1.11 | 1993 |
Validation Methods and Tools for Knowledge-Based Systems (VALID) | 2 | 0.42 | 1989 |
Generalized Double Modulo 11 Check Digit Error Detection | 3 | 0.71 | 1983 |