José A. Gámez, Juan A. Aledo, Enrique G. Rodrigo
Published Online: Oct 16 2018
DOI: 10.1002/widm.1288
Thanks to crowdsourcing platforms, several problems that seemed impossible to tackle from a machine learning perspective, can now be solved. To discover how crowdsourced data is used as well as what are the main problems derived from its use, we analyze many applications in several fields of interest.
Abstract
Full article on Wiley Online Library:
HTML |
PDF
Jorge Lobo
Published Online: Sep 06 2018
DOI: 10.1002/widm.1282
Zooming in a portion of a network of profesional relationships (relations between the cicles) as well as other relations between subjects and objects of a system to protect. Relationship‐based access control policies are defined as paths between nodes that the network must have. For example, the secretary at any department has access to salary information of any employee that reports to the manager of the department: Bob can access salary information of Doug because of the paths (Bob, secretary_at, Wireless Dept) and (Doug, reports_to, Alice, manages, Wireless Dept).
Abstract
Full article on Wiley Online Library:
HTML |
PDF
Marley M. B. R. Vellasco, Ricardo Tanscheit, Adriano S. Koshiyama
Published Online: Mar 05 2018
DOI: 10.1002/widm.1251
Generic Diagram of an Evolutionary Fuzzy System.
Abstract
Full article on Wiley Online Library:
HTML |
PDF