Author of the publication

An Interpretable Logical Theory: The case of Compensatory Fuzzy Logic.

, , , and . Int. J. Comput. Intell. Syst., 9 (4): 612-626 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enterprise security pattern: A model-driven architecture instance., , , and . Comput. Stand. Interfaces, 36 (4): 748-758 (2014)BlockBD: a security pattern to incorporate blockchain in big data ecosystems., , , and . EuroPLoP, page 17:1-17:8. ACM, (2019)Application of security reference architecture to Big Data ecosystems in an industrial scenario., , , , and . Softw. Pract. Exp., 50 (8): 1520-1538 (2020)Enterprise security pattern: a new type of security pattern., , , , and . Secur. Commun. Networks, 7 (11): 1670-1690 (2014)Secure Development of Big Data Ecosystems., , , and . IEEE Access, (2019)Towards a Security Reference Architecture for Big Data., , , and . DOLAP, volume 2062 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)A Security Pattern for Key-Value NoSQL Database Authorization., , , and . EuroPLoP, page 12:1-12:4. ACM, (2018)Decoding the Population Responses of Retinal Ganglions Cells Using Information Theory., , , , , , and . IWANN (1), volume 2084 of Lecture Notes in Computer Science, page 55-62. Springer, (2001)Modeling the Effect of Fixational Eye Movements in Natural Scenes., , , , and . IWINAC (1), volume 7930 of Lecture Notes in Computer Science, page 332-341. Springer, (2013)Design and Solution of a Surrogate Model for Portfolio Optimization Based on Project Ranking., , , , and . Sci. Program., (2017)