Author of the publication

Construction of Capacities from Overlap Indexes.

, , , , , , and . Fuzzy Sets, Rough Sets, Multisets and Clustering, volume 671 of Studies in Computational Intelligence, page 323-335. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending the upper-lower edge detector by means of directional masks and OWA operators., , , and . Progress in AI, 1 (4): 267-276 (2012)CHI-PG: A fast prototype generation algorithm for Big Data classification problems., , , and . Neurocomputing, (2018)An Experimental Case of Study on the Behavior of Multiple Classifier Systems with Class Noise Datasets., , , and . HAIS, volume 8073 of Lecture Notes in Computer Science, page 568-577. Springer, (2013)Similarity Measures for Radial Data., , , , , and . IPMU (1), volume 610 of Communications in Computer and Information Science, page 599-611. Springer, (2016)Aggregation of Color Information in Stereo Matching Problem: A Comparison Study., , , , and . IEA/AIE (3), volume 6098 of Lecture Notes in Computer Science, page 369-378. Springer, (2010)On the Usage of the Probability Integral Transform to Reduce the Complexity of Multi-Way Fuzzy Decision Trees in Big Data Classification Problems., , , and . BigData Congress, page 25-32. IEEE Computer Society, (2018)On the use of quasi-arithmetic means for the generation of edge detection blending functions., , , , , and . FUZZ-IEEE, page 1-8. IEEE, (2010)Do we still need fuzzy classifiers for Small Data in the Era of Big Data?, , and . FUZZ-IEEE, page 1-6. IEEE, (2019)Unsupervised Fuzzy Measure Learning for Classifier Ensembles From Coalitions Performance., , , , and . IEEE Access, (2020)Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing., , , , and . Comput. Secur., (2022)