Export 375 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Navarro-Arribas G, Abril D, Torra V.  2014.  Dynamic anonymous index for confidential data. Data Privacy Management and Autonomous Spontaneous Security. :362–368.
Narukawa Y, Torra V.  2008.  Domain extension for multidimensional generalized fuzzy integrals. FUZZ-IEEE 2008 / WCCI 2008, Hong-Kong. :1715-1720.
Herranz J, Nin J, Torra V.  2010.  Distributed Privacy-Preserving Methods for Statistical Disclosure Control. Int. Workshop on Data Privacy Management (DPM'09). 5939:33-47.
Narukawa Y, Torra V.  2009.  Distorted probabilities and m-separable fuzzy measures. EUSFLAT-ESTYLF Joint Conference. :624-629.
Domingo-Ferrer J, Torra V.  2002.  Distance-based and probabilistic record linkage for re-identification of records with categorical variables. Butlletí de l´ACIA. 28:243-250.
Nin J, Torra V.  2006.  Distance based re-identification for time series, Analysis of distances. Lecture Notes in Computer Science. :205-216.
Trescak T, Sierra C, Simoff S, de Mántaras RLópez.  2014.  Dispute Resolution Using Argumentation-Based Mediation. CoRR. abs/1409.4
Trescak T, Sierra C, Simoff S, de Mántaras RLópez.  2014.  Dispute Resolution Using Argumentation-Based Mediation. European Conference on Social Intelligence (ECSI-2014). :274–285.
Domingo-Ferrer J, Torra V.  2003.  Disclosure risk assessment in statistical microdata protection via advanced record linkage. Statistics and Computing. 13:343-354.
Domingo-Ferrer J, Torra V.  2004.  Disclosure risk assessment in statistical data protection. Journal of computational and applied mathematics. 164-165:285-293.
Torra V, Domingo-Ferrer J.  2001.  Disclosure control methods and information loss for microdata. Confidentiality, disclosure, and data access : Theory and practical applications for statistical agencies. :91-110.
Torra V, Domingo-Ferrer J.  2001.  Disclosure control methods and information loss for microdata. Confidentiality, disclosure, and data access : Theory and practical applications for statistical agencies. :91-110.
Nettling M, Treutler H, Cerquides J, Grosse I.  2016.  Detecting and correcting the binding-affinity bias in ChIP-seq data using inter-species information. BMC Genomics. 17:347.
Sierra C, Thangarajah J, Padgham L, Winikoff M.  2007.  Designing Institutional Multi-Agent Systems. LNCS. 4405:84-103.
Sierra C, Godo L, de Mántaras RLópez, Manzano M.  2002.  Descriptive Dynamic Logic and its Application to Reflective Architectures. Handbook of Defeasible Reasoning and Uncertainty Management-Systems. Vol.7. :197-220.
Valls A, Torra V.  2003.  Describing Preferences with a Negation-based Vocabulary. Frontiers in Artificial Intelligence and Applications. 100:51-61.
Torra V.  2010.  Del abaco a la revolucion digital: Algoritmos y computacion. :100.
Torra V.  2008.  Defining A-IFS from negations. Developments in Fuzzy sets, Intuitionistic Fuzzy sets, Generalized Nets and related topics. Foundations. :337-345.
Jelenc D., Hermoso R., Sabater-Mir J., Trcek D.  2013.  Decision making matters: A better way to evaluate trust models. Knowledge-Based Systems. 52:147–164.
Cerami M, Esteva F, Bou F.  2010.  Decidability of a Description Logic over infinite-valued Product Logic. 12th Conference on Principles of Knowledge Representation and Reasoning, KR 2010. :203-213.
Espinoza MMorveli, Possebom AT, Puyol-Gruart J, Tacla CA.  2017.  Dealing with incompatibilities among goals (Extended Abstract). 16th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2017).
Torra V, Cano I, Navarro-Arribas G.  2009.  Dealing with edit constraints in microdata protection: microaggregation. Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality.
Abril D, Navarro-Arribas G, Torra V.  2015.  Data Privacy with R. Advanced Research in Data Privacy. 567:63-82.
Abril D, Navarro-Arribas G, Torra V.  2015.  Data Privacy with R. Advanced Research in Data Privacy. 567:63-82.
Nettleton D, Torra V.  2011.  Data privacy for simply anonymized network logs represented as graphs - considerations for graph alteration operations. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems.
Torra V, Domingo-Ferrer J, Torres À.  2003.  Data Mining Methods for Linking Data Coming from Several Sources. The 3rd Joint UN/ECE-Eurostat Work session on Statistical Data Confidentiality. Working Pa:1-8.
Torra V, Domingo-Ferrer J, Torres À.  2003.  Data Mining Methods for Linking Data Coming from Several Sources. The 3rd Joint UN/ECE-Eurostat Work session on Statistical Data Confidentiality. Working Pa:1-8.
Torra V, Domingo-Ferrer J, Torres À.  2004.  Data mining methods for linking data coming from several sources. Monographs in official statistics. 3rd Joint UN/ECE-Eurostat Work session on statistical data confidentiality. :143-150.
Torra V, Domingo-Ferrer J, Torres À.  2004.  Data mining methods for linking data coming from several sources. Monographs in official statistics. 3rd Joint UN/ECE-Eurostat Work session on statistical data confidentiality. :143-150.
C
Ontañón S, Plaza E.  2002.  Cooperative Case Bartering for Case-Based Reasoning Agents. Lecture Notes in Artificial Intelligence. 2504:294-308.
Godo L, Puyol-Gruart J, Sierra C.  2002.  Control Techniques for Complex Reasoning: The Case of MILORD II. HANDBOOK OF DEFEASIBLE REASONING AND UNCERTAINTY MANGEMENT SYSTEMS, VOLUME7: Agent-based Defeasible Control in Dynamic Environments. :65-97.
Torra V, Godo L.  2002.  Continuous WOWA Operators with Application to Defuzzification. Studies in Fuzziness and Soft Computing. Vol.97. Agregation Operators.. :159-176.
Narukawa Y, Torra V.  2009.  Continuous OWA operator and its calculation. EUSFLAT-ESTYLF Joint Conference. :1132-1135.
Torra V, Miyamoto S.  2008.  Container loading for nonorthogonal objects: detecting colisions. J. of Advanced Computational Intelligence and Intelligent Informatics. 12:422-425.
Torra V, Cano I, Miyamoto S, Endo Y.  2010.  Container loading for nonorthogonal objects: an approximation using local search and simulated annealing. Soft Computing. 14:537-544.
Cano I, Torra V.  2009.  Container Loading for Nonorthogonal Objects with Stability and Load Bearing Strength Compliance. Logistics and Industrial Informatics, LINDI 2009. :13-18.
Torra V.  2004.  Conjuntos difusos en la universidad Oberta de Catalunya. Actas del xii congreso español sobre tecnologias y logicas fuzzy. Sesión especial: "La enseñanza de la lógica difusa: motivaciones y acciones" Jaén 16 de septiembre. ESTYLF 2004. :57-61.
Nin J, Carminati B, Ferrari E, Torra V.  2009.  Computing Reputation for Collaborative Private Networks. 33rd IEEE International Computer Software and Applications Conference (COMPSAC). :246-253.
Torra V, Endo Y, Miyamoto S.  2011.  Computationally Intensive Parameter Selection for Clustering Algorithms: the case of fuzzy c-means with tolerance. International Journal of Intelligent Systems. 26:313-322.
Abasolo C, Plaza E, Arcos JLluis.  2002.  Components for Case-Based Reasoning Systems. Lecture Notes in Artificial Intelligence. :1-16.
Torra V, Narukawa Y, Abril D.  2014.  Comparing fuzzy measures through their Möbius transform. Information Fusion.
Ramisa A, de Mántaras RLópez, Aldavert D, Toledo R.  2007.  Comparing Combinations of Feature Regions for Panoramic VSLAM. ICINCO-07 4th International Conference on Informatics in Control, Automation and Robotics, Angers, France. :292-297.
Confalonieri R, Kutz O, Galliani P, Peñaloza R, Porello D, Schorlemmer M, Troquard N.  2017.  Coherence, Similarity, and Concept Generalisation. Proceedings of the 30th International Workshop on Description Logics, Montpellier, France, July 18-21, 2017. 1879
Serrà J, Arcos JLluis, Garcia-Rudolph A, García-Molina A, Roig T, Tormos JMaria.  2013.  Cognitive prognosis of acquired brain injury patients using machine learning techniques. Int. Conf. on Advanced Cognitive Technologies and Applications (COGNITIVE). :108-113.
Marés J, Torra V.  2012.  Clustering-Based Categorical Data Protection. Privacy in Statistical Databases. 7556:78-89.
Torra V, Ladra S.  2008.  Cluster-specific information loss measures in data privacy: a review. Proc. ARES 2008, PSAI Workshop. :994-999.
Herranz J, Matwin S, Nin J, Torra V.  2010.  Classifying data from protected statistical datasets. Computer and Security. 29:875-890.