Invited Paper: Graded Logic Aggregation |
|
3 | (12) |
|
Aggregation Operators, Fuzzy Measures and Integrals |
|
|
Coherent Risk Measures Derived from Utility Functions |
|
|
15 | (12) |
|
|
On k--additive Aggregation Functions |
|
|
27 | (8) |
|
|
|
|
Constructing an Outranking Relation with Weighted OWA for Multi-criteria Decision Analysis |
|
|
35 | (13) |
|
|
|
Sugeno Integrals and the Commutation Problem |
|
|
48 | (16) |
|
|
|
|
Characterization of k-Choquet Integrals |
|
|
64 | (13) |
|
|
|
Event-Based Transformations of Set Functions and the Consensus Requirement |
|
|
77 | (12) |
|
|
|
Association Analysis on Interval-Valued Fuzzy Sets |
|
|
89 | (12) |
|
|
|
|
Fuzzy Hit-or-Miss Transform Using Uninorms |
|
|
101 | (13) |
|
|
|
|
|
|
Learning Fuzzy Measures for Aggregation in Fuzzy Rule-Based Models |
|
|
114 | (17) |
|
|
|
|
|
|
|
Decision Making Extraction of Patterns to Support Dairy Culling Management |
|
|
131 | (12) |
|
|
|
|
|
An Axiomatisation of the Banzhaf Value and Interaction Index for Multichoice Games |
|
|
143 | (13) |
|
|
|
|
Fuzzy Positive Primitive Formulas |
|
|
156 | (13) |
|
|
Basic Level Concepts as a Means to Better Interpretability of Boolean Matrix Factors and Their Application to Clustering |
|
|
169 | (13) |
|
|
|
Fuzzy Type Powerset Operators and F-Transforms |
|
|
182 | (11) |
|
|
Implicative Weights as Importance Quantifiers in Evaluation Criteria |
|
|
193 | (13) |
|
|
Balancing Assembly Lines and Matching Demand Through Worker Reallocations |
|
|
206 | (15) |
|
Randall Mauricio Perez-Wheelock |
|
|
|
Clustering and Classification Optimal Clustering with Twofold Memberships |
|
|
221 | (11) |
|
|
|
|
|
Privacy Preserving Collaborative Fuzzy Co-clustering of Three-Mode Cooccurrence Data |
|
|
232 | (11) |
|
|
|
|
|
Generalized Fuzzy c-Means Clustering and Its Theoretical Properties |
|
|
243 | (12) |
|
|
|
A Self-tuning Possibilistic k-Means Clustering Algorithm |
|
|
255 | (12) |
|
|
|
|
k-CCM: A Center-Based Algorithm for Clustering Categorical Data with Missing Values |
|
|
267 | (16) |
|
|
|
Data Privacy and Security WEDL-NIDS: Improving Network Intrusion Detection Using Word Embedding-Based Deep Learning Method |
|
|
283 | (13) |
|
|
|
|
|
Anonymization of Unstructured Data via Named-Entity Recognition |
|
|
296 | (10) |
|
|
|
|
On the Application of SDC Stream Methods to Card Payments Analytics |
|
|
306 | (13) |
|
|
|
Correction to: Modeling Decisions for Artificial Intelligence |
|
|
1 | |
|
|
|
|
Author Index |
|
319 | |