Now showing items 21-30 of 186
Verification and enforcement of access control policies
Academic Activism in the Face of Enclosure in the Digital University
(Symposium Journals Ltd, 2013)
The role of the academic, both inside and beyond the University, is under scrutiny across global higher education. In-part this is tied to the neoliberal agenda for universities, which is underpinned by a discourse of ...
Dynamic vehicle routing: A memetic ant colony optimization approach
Challenges and Open Questions in Soft Consensus Models
In group decision making problems, given the importance of obtaining an accepted solution by the whole group, the consensus has attained a great attention and it is virtually a major goal of these problems. Consensus, as ...
Fuzzy in 3-D: Contrasting Complex Fuzzy Sets with Type-2 Fuzzy Sets
Complex fuzzy sets come in two forms, the standard form, postulated in 2002 by Ramot et al., and the 2011 innovation of pure complex fuzzy sets, proposed by Tamir et al.. In this paper we compare and contrast both forms ...
Type-Reduction of General Type-2 Fuzzy Sets: The Type-1 OWA Approach
For general type-2 fuzzy sets, the defuzzification process is very complex, and the exhaustive direct method of implementing type-reduction is computationally expensive and turns out to be impractical. This has inevitably ...
Computational Properties of Fiction Writing and Collaborative Work
From the earliest days of computing, there have been tools to help shape narrative. Spell-checking, word counts, and readability analysis, give today's novelists tools that Dickens, Austen, and Shakespeare could only have ...