Author of the publication

A Method for the Access to the Contents in a Set of Knowledge Using a Fuzzy Logic Based Intelligent Agent.

, , , and . FSKD (4), page 103-108. IEEE Computer Society, (2007)0-7695-2874-0.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Planning Security Policy on E-Commerce., , , and . ICEIS (2), page 915-919. (2001)Improving Classification Algorithms by Considering Score Series in Wireless Acoustic Sensor Networks., , , and . Sensors, 18 (8): 2465 (2018)Exploiting the Symmetry of Integral Transforms for Featuring Anuran Calls., , , and . Symmetry, 11 (3): 405 (2019)Visualizing Classification Results: Confusion Star and Confusion Gear., , , and . IEEE Access, (2022)Facilitating Decision Making and Maintenance for Power Systems Operators through the Use of Agents and Distributed Embedded Systems., , , , , and . Int. J. Intell. Inf. Technol., 6 (4): 1-16 (2010)A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot., , , , and . QRS Companion, page 633-634. IEEE, (2018)A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices., , , , and . Entropy, 21 (12): 1136 (2019)Term Weighting: Novel Fuzzy Logic based Method Vs. Classical TF-IDF Method for Web Information Extraction., , , and . ICEIS (2), page 130-137. (2009)Remote Controlling and Monitoring of Safety Devices Using Web-Interface Embedded Systems., , , , and . ICEIS, volume 24 of Lecture Notes in Business Information Processing, page 737-744. Springer, (2009)Model of Knowledge Spreading for Multi-agent Systems., , , , , and . ICEIS (2), page 326-331. SciTePress, (2010)