Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
What does fuzzy logic bring to AI?
ACM Computing Surveys (CSUR)
Decision making under uncertainty
ACM Computing Surveys (CSUR)
Neuro-fuzzy and soft computing: a computational approach to learning and machine intelligence
Neuro-fuzzy and soft computing: a computational approach to learning and machine intelligence
Artificial intelligence and soft computing: behavioral and cognitive modeling of the human brain
Artificial intelligence and soft computing: behavioral and cognitive modeling of the human brain
ACM Computing Surveys (CSUR)
Fuzzy Logic for Business, Finance, and Management
Fuzzy Logic for Business, Finance, and Management
A Combined Approach to Uncertain Data Analysis
IDA '97 Proceedings of the Second International Symposium on Advances in Intelligent Data Analysis, Reasoning about Data
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Middleware for pervasive computing: A survey
Pervasive and Mobile Computing
Hi-index | 0.00 |
In context aware mobile applications users' sensitive information will be available to be collected by a large number of service providers, which might threaten users privacy. In this paper, we propose the use of fuzzy logic in helping automating consent decisions done by end users. The proposed fuzzy approach has been implemented based on Mamdani fuzzy inference systems, and has been integrated in one of the services provided by a real time UMTS mobile platform known as MIES at the university campus with real users. Results obtained give the indication of possibilities of adopting this approach in practical applications.