On the definition of cluster-specific information loss measures.
Advances in Artificial Intelligence for Privacy Protection and Security. :145-163.
A new framework to automate constrained microaggregation.
Proc. PAVLAD Workshop in CIKM 2009, (Publicado por ACM, ISBN: 978-1-60558-884-1), Hong Kong, China, 2009, 1-8.. :1–8.
Aggregation Operators and Soft Computing.
Encyclopedia of Complexity and Systems Science.
Aggregation operators on the real line.
Proc. 3rd International Workshop on Soft Computing Applications (SOFA 2009). :185-188.
Agreeing on Institutional Goals for Multi-agent Societies.
Coordination, Organizations, Institutions, and Norms in Agent Systems IV. :1-16.
Computing Reputation for Collaborative Private Networks.
33rd IEEE International Computer Software and Applications Conference (COMPSAC). :246-253.
Continuous OWA operator and its calculation.
EUSFLAT-ESTYLF Joint Conference. :1132-1135.
Dealing with edit constraints in microdata protection: microaggregation.
Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality.
From the weighted means to fuzzy integrals: a tour on aggregation functions.
Proc. Proc. 5th Int. Summer School on Aggregation operators and their applications (AGOP 2009). :17-19.
Generation of Synthetic Data by means of Fuzzy c-Regression.
2009 IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2009. :1145-1150.
Logics preserving degrees of truth from varieties of residuated lattices.
Journal of Logic and Computation (doi:10.1093/logcom/exp030). 19:1031-1069.
On Hesitant Fuzzy Sets and Decision.
Proc. FUZZ-IEEE 2009. :1378-1382.
On Metric Temporal Lukasiewicz Logic.
Electronic Notes in Theoretical Computer Science. 246:71–85.