Basket

  Untick selected:   0
  1. A reference model for security level evaluation : Policy and fuzzy techniques
    Casola V.  Preziosi R. Rak M. Troiano L.
    Journal of Universal Computer Science . Vol. 11, No. 1 (2005), s.150-174
    článok z periodika
    (1) - monografia
    article

    article

  2. Intuitionistic fuzzy aggregation operators
    Xu Z. 
    IEEE Transactions on fuzzy systems . Vol. 15, No. 6 (2007), s.1179-1187
    článok z periodika
    (1) - monografia
    article

    article


  This site uses cookies to make them easier to browse. Learn more about how we use cookies.