Invited Papers | |
Relationships between Qualitative and Quantitative Scales for Aggregation Operations: The Example of Sugeno Integrals | p. 1 |
User Privacy in Web Search | p. 3 |
A Bibliometric Index Based on Collaboration Distances | p. 5 |
Regular Papers | |
Aggregation Operators and Decision Making | |
Measuring the Influence of the kth Largest Variable on Functions over the Unit Hypercube | p. 7 |
Measuring the Interactions among Variables of Functions over the Unit Hypercube | p. 19 |
Weighted Quasi-arithmetic Means and Conditional Expectations | p. 31 |
Modelling Group Decision Making Problems in Changeable Conditions | p. 43 |
Individual Opinions-Based Judgment Aggregation Procedures | p. 55 |
Aggregation of Bounded Fuzzy Natural Number-Valued Multisets | p. 67 |
Sugeno Utility Functions I: Axiomatizations | p. 79 |
Sugeno Utility Functions II: Factorizations | p. 91 |
Managing Information Fusion with Formal Concept Analysis | p. 104 |
Clustering and Similarity | |
Indefinite Kernel Fuzzy c-Means Clustering Algorithms | p. 116 |
Algorithms in Sequential Fuzzy Regression Models Based on Least Absolute Deviations | p. 129 |
A Generalized Approach to the Suppressed Fuzzy c-Means Algorithm | p. 140 |
Semi-supervised Agglomerative Hierarchical Clustering Using Clusterwise Tolerance Based Pairwise Constraints | p. 152 |
Computational Intelligence | |
Gallbladder Segmentation in 2-D Ultrasound Images Using Deformable Contour Methods | p. 163 |
Pattern Mining on Stars with FP-Growth | p. 175 |
A Computational Intelligence Based Framework for One-Subsequence-Ahead Forecasting of Nonstationary Time Series | p. 187 |
Non-hierarchical Clustering of Decision Tables toward Rough Set-Based Group Decision Aid | p. 195 |
Revisiting Natural Actor-Critics with Value Function Approximation | p. 207 |
Cost-Continuty Model for Web Search | p. 219 |
An Enhanced Framework of Subjective Logic for Semantic Document Analysis | p. 231 |
Data Privacy | |
Ontology-Based Anonymization of Categorical Values | p. 243 |
Rational Privacy Disclosure in Social Networks | p. 255 |
Towards Semantic Microaggregation of Categorical Data for Confidential Documents | p. 266 |
Using Classification Methods to Evaluate Attribute Disclosure Risk | p. 277 |
A Misleading Attack against Semi-supervised Learning for Intrusion Detection | p. 287 |
Author Index | p. 299 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.