Author of the publication

A Practical Approach to Fusing Prioritized Knowledge Bases.

, , , and . EPIA, volume 1695 of Lecture Notes in Computer Science, page 223-236. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kalman-like Filtering in a possibilistic Setting., , and . ECAI, page 8-12. IOS Press, (2000)Alert Correlation based on a Logical Handling of Administrator Preferences and Knowledge., and . SECRYPT, page 50-56. INSTICC Press, (2008)Merging Possibilistic Networks.. ECAI, volume 141 of Frontiers in Artificial Intelligence and Applications, page 332-336. IOS Press, (2006)Modeling positive and negative information in possibility theory., , , and . Int. J. Intell. Syst., 23 (10): 1094-1118 (2008)An Alternative Inference for Qualitative Choice Logic., , and . ECAI, volume 141 of Frontiers in Artificial Intelligence and Applications, page 741-742. IOS Press, (2006)Revision of Partially Ordered Information: Axiomatization, Semantics and Iteration., , and . IJCAI, page 376-381. Professional Book Center, (2005)Qualitative classification and evaluation in possibilistic decision trees., , and . FUZZ-IEEE, page 653-657. IEEE, (2004)A complexity analysis of MPE inference in possibilistic networks., , and . FUZZ-IEEE, page 1-6. IEEE, (2019)Possibilistic Local Structure for Compiling Min-Based Networks., , and . SMPS, volume 190 of Advances in Intelligent Systems and Computing, page 479-487. Springer, (2012)Enhanced Correlation in an Intrusion Detection Process., , and . MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 157-170. Springer, (2003)