Displaying similar documents to “Study of the Information Security of File Objects under Information Attacks with a Record of Effect of the Methods of Compression”

The Value of Knowing that You Do Not Know

Greenstein, Gil, Ahituv, Niv (2009)

Serdica Journal of Computing

Similarity:

The value of knowing about data availability and system accessibility is analyzed through theoretical models of Information Economics. When a user places an inquiry for information, it is important for the user to learn whether the system is not accessible or the data is not available, rather than not have any response. In reality, various outcomes can be provided by the system: nothing will be displayed to the user (e.g., a traffic light that does not operate, a browser that keeps browsing,...

Weighting quantitative and qualitative variables in clustering methods.

Karina Gibert, Ulises Cortés (1997)

Mathware and Soft Computing

Similarity:

Description of individuals in ill-structured domains produces messy data matrices. In this context, automated classification requires the management of those kind of matrices. One of the features involved in clustering is the evaluation of distances between individuals. Then, a special function to calculate distances between individuals partially simultaneously described by qualitative and quantitative variables is required. In this paper properties and details of the metrics...

A Prototype of an Extension to the UDDI Registry Allowing Pubilcation and Search Based on Subjective Evaluations

Mintchev, Alexander (2007)

Serdica Journal of Computing

Similarity:

The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedicated to Nikola Obreshko and Lubomir Tschakalo , So a, July, 2006. The current paper introduces the usage of subjective evaluations by others as a tool that can support consumers' decisions. It summarizes the features of the main UDDI registry providers and presents an extension to any UDDI registry allowing users of the registry to publish subjective evaluations for any artifact...

Automatic risk control based on FSA methodology adaptation for safety assessment in intelligent buildings

Jerzy Mikulik, Mirosław Zajdel (2009)

International Journal of Applied Mathematics and Computer Science

Similarity:

The main area which Formal Safety Assessment (FSA) methodology was created for is maritime safety. Its model presents quantitative risk estimation and takes detailed information about accident characteristics into account. Nowadays, it is broadly used in shipping navigation around the world. It has already been shown that FSA can be widely used for the assessment of pilotage safety. On the basis of analysis and conclusion on the FSA approach, this paper attempts to show that the adaptation...

Sedàs: A semantic based general classifier system.

Aïda Valls, David Riaño, Vicenç Torra (1997)

Mathware and Soft Computing

Similarity:

In this work we present the general classifier system Sedàs. We show how this system implements the description of the domain and how it builds similarity matrices and classification trees. The system uses a new semantics, introduced in [Torra96], to define a distance between qualitative values.