Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Papílio Cryptography Algorithm., , , and . CIS, volume 3314 of Lecture Notes in Computer Science, page 928-933. Springer, (2004)Classical Computability and Fuzzy Turing Machines., and . LATIN, volume 3887 of Lecture Notes in Computer Science, page 154-165. Springer, (2006)Closure properties for fuzzy recursively enumerable languages and fuzzy recursive languages., , , and . J. Intell. Fuzzy Syst., 31 (3): 1795-1806 (2016)A New Way to Obtain the Initial Centroid Clusters in Fuzzy C-Means Algorithm., and . WEIT, page 139-144. IEEE Computer Society, (2013)Analysing Properties, Conjugate and Dual Constructions on Fuzzy s-X(N)or Connectives., , , and . WEIT, page 78. IEEE Computer Society, (2013)T-Norms on Bounded Lattices: t-norm Morphisms and Operators., , and . FUZZ-IEEE, page 22-28. IEEE, (2006)A normal form which preserves 1-tautologies and 0-contradictions in a class of residuum-based propositional fuzzy logics., , and . FUZZ-IEEE, page 647-652. IEEE, (2004)A Comparative Analysis of Cryptographic Algorithms and Transformation Functions for Biometric Data., , , and . ICMLA (2), page 255-260. IEEE, (2013)978-0-7695-5144-9.Interval t-norms as Interval Representations of t-norms., and . FUZZ-IEEE, page 909-914. IEEE, (2005)A Way to Obtain the Quality of a Partition by Adjusted Rand Index., and . WEIT, page 67-71. IEEE Computer Society, (2013)