default search action
Information Sciences, Volume 180
Volume 180, Number 1, January 2010
- Epaminondas Kapetanios, Georgia Koutrika:
Guest editorial: Special issue on collective intelligence. 1-3 - Vasco Furtado, Leonardo Ayres, Marcos de Oliveira, Eurico Vasconcelos Filho, Carlos Caminha, Johnatas D'Orleans, Mairon Belchior:
Collective intelligence in law enforcement - The WikiCrimes system. 4-17 - Ioanna Lykourentzou, Katerina Papadaki, Dimitrios J. Vergados, Despina Polemi, Vassilis Loumos:
CorpWiki: A self-regulating wiki to promote corporate collective intelligence through expert peer matching. 18-38 - Nitin Agarwal, Magdiel Galan Oliveras, Huan Liu, Shankara B. Subramanya:
WisColl: Collective wisdom based blog clustering. 39-61 - Wei-Hsun Lee, Shian-Shyong Tseng, Wern-Yarng Shieh:
Collaborative real-time traffic information generation and sharing framework for the intelligent transportation system. 62-70 - Pierre Lévy:
From social computing to reflexive collective intelligence: The IEML research program. 71-94 - James Caverlee, Ling Liu, Steve Webb:
The SocialTrust framework for trusted social information management: Architecture and algorithms. 95-112 - Ja-Hwung Su, Bo-Wen Wang, Chin-Yuan Hsiao, Vincent S. Tseng:
Personalized rough-set-based recommendation by integrating multiple contents and collaborative information. 113-131 - Martijn C. Schut:
On model design for simulation of collective intelligence. 132-155
- Manfred Droste, Torsten Stüber, Heiko Vogler:
Weighted finite automata over strong bimonoids. 156-166 - Jian Fu, H. John Caulfield, Seong-Moo Yoo, Dongsheng Wu:
Fuzzy Aggregation with Artificial Color filters. 167-180 - Zeshui Xu:
A method based on distance measure for interval-valued intuitionistic fuzzy group decision making. 181-190 - Shiying Wang, Shangwei Lin:
Path embeddings in faulty 3-ary n-cubes. 191-197 - Qiang Dong, Xiaofan Yang, Dajin Wang:
Embedding paths and cycles in 3-ary n-cubes with faulty nodes and links. 198-208
Volume 180, Number 2, January 2010
- Chris Cornelis, Richard Jensen, Germán Hurtado Martín, Dominik Slezak:
Attribute selection with fuzzy decision reducts. 209-224 - Guoyin Jiang, Bin Hu, Youtian Wang:
Agent-based simulation of competitive and collaborative mechanisms for mobile service chains. 225-240 - Babak Rezaee, Mohammad Hossein Fazel Zarandi:
Data-driven fuzzy modeling for Takagi-Sugeno-Kang fuzzy system. 241-255 - Yu Zhou, Min Xie, Guozhen Xiao:
On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity. 256-265 - Sugata Gangopadhyay, Sumanta Sarkar, Ruchi Telang:
On the lower bounds of the second order nonlinearities of some Boolean functions. 266-273 - Yan-Lan Zhang, Jinjin Li, Wei-Zhi Wu:
On axiomatic characterizations of three pairs of covering based approximation operators. 274-287 - Ahmed H. Abdel-Gawad, Amir F. Atiya, Nevin M. Darwish:
Solution of systems of Boolean equations via the integer domain. 288-300 - Jia Zeng, Wei Feng, Lei Xie, Zhi-Qiang Liu:
Cascade Markov random fields for stroke extraction of Chinese characters. 301-311 - Bo Huang, Jinsong Wu, David Zhang, Naimin Li:
Tongue shape classification by geometric features. 312-324
Volume 180, Number 3, February 2010
- Sang Wan Lee, Yong-Soo Kim, Kwang-Hyun Park, Zeungnam Bien:
Iterative Bayesian fuzzy clustering toward flexible icon-based assistive software for the disabled. 325-340 - Yiyu Yao:
Three-way decisions with probabilistic rough sets. 341-353 - Yingjie Yang, Chris J. Hinde:
A new extension of fuzzy sets using rough sets: R-fuzzy sets. 354-365 - Gabriel Cardona, Mercè Llabrés, Francesc Rosselló, Gabriel Valiente:
Path lengths in tree-child time consistent hybridization networks. 366-383 - Elías F. Combarro, Pedro Miranda:
Characterizing isometries on the order polytope with an application to the theory of fuzzy measures. 384-398 - Wei Wang, Xiaohong Guan, Beizhan Wang, Yaping Wang:
A novel mobility model based on semi-random circular movement in mobile ad hoc networks. 399-413 - Kweku-Muata Osei-Bryson:
Towards supporting expert evaluation of clustering results using a data mining process model. 414-431 - Feng Lin, Xinguang Jim Chen:
Estimation of transitional probabilities of discrete event systems from cross-sectional survey and its application in tobacco control. 432-440 - Gülçin Büyüközkan, Da Ruan:
Choquet integral based aggregation approach to software development risk assessment. 441-451 - Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma:
Certificateless signcryption scheme in the standard model. 452-464 - Dan Huang, Sing Kiong Nguang:
Robust fault estimator design for uncertain networked control systems with random time delays: An ILMI approach. 465-480
Volume 180, Number 4, February 2010
- Guangquan Zhang, Jie Lu, Javier Montero, Yi Zeng:
Model, solution concept, and Kth-best algorithm for linear trilevel programming. 481-492 - Ferdinando Di Martino, Vincenzo Loia, Salvatore Sessa:
Fuzzy transforms method and attribute dependency in data analysis. 493-505 - Kit Yan Chan, C. K. Kwong, Terence C. Fogarty:
Modeling manufacturing processes using a genetic programming-based fuzzy regression with detection of outliers. 506-518 - Sunil Mathew, M. S. Sunitha:
Node connectivity and arc connectivity of a fuzzy graph. 519-531 - Yao Ouyang, Zhudeng Wang, Hua-Peng Zhang:
On fuzzy rough sets based on tolerance relations. 532-542 - Endre Pap, Mirjana Strboja:
Generalization of the Jensen inequality for pseudo-integral. 543-548 - Chung Ki Li, Duncan S. Wong:
Signcryption from randomness recoverable public key encryption. 549-559
Volume 180, Number 5, March 2010
- Emilio Serrano, Arnaud Quirin, Juan A. Botía, Oscar Cordón:
Debugging complex software systems by means of pathfinder networks. 561-583 - Jesús Pardillo, Jose-Norberto Mazón, Juan Trujillo:
Extending OCL for OLAP querying on conceptual multidimensional models of data warehouses. 584-601 - Buhwan Jeong, Jaewook Lee, Hyunbo Cho:
Improving memory-based collaborative filtering via similarity updating and prediction modulation. 602-612 - Yi Guo, Zhiqing Shao, Nan Hua:
Automatic text categorization based on content analysis with cognitive situation models. 613-630 - A. S. Salama:
Topological solution of missing attribute values problem in incomplete information tables. 631-639 - Quan Yuan, Feng Qian, Wenli Du:
A hybrid genetic algorithm with the Baldwin effect. 640-652 - Paulo Sérgio Sausen, Marco Aurélio Spohn, Angelo Perkusich:
Broadcast routing in wireless sensor networks with dynamic power management and multi-coverage backbones. 653-663 - Farshad Safaei, Ahmad Khonsari, Mohammad Mahdi Gilak:
A new performance measure for characterizing fault rings in interconnection networks. 664-678 - Jiuping Xu, Lihui Zhao:
A multi-objective decision-making model with fuzzy rough coefficients and its application to the inventory problem. 679-696 - Jein-Shan Chen, Chun-Hsu Ko, Shaohua Pan:
A neural network based on the generalized Fischer-Burmeister function for nonlinear complementarity problems. 697-711 - Jesús Medina, Manuel Ojeda-Aciego:
Multi-adjoint t-concept lattices. 712-725 - Zeshui Xu:
Choquet integrals of weighted intuitionistic fuzzy information. 726-736 - Saeed Rasouli, Bijan Davvaz:
Roughness in MV-algebras. 737-747 - Shihong Yue, Jeen-Shing Wang, Teresa Wu, Huaxiang Wang:
A new separation measure for improving the effectiveness of validity indices. 748-764 - Malrey Lee, Nam-Deok Cho, Thomas M. Gatton:
A function-based user authority delegation model. 765-775 - Bing Chen, Xiaoping Liu, Kefu Liu, Peng Shi, Chong Lin:
Direct adaptive fuzzy control for nonlinear systems with time-varying delays. 776-792 - Lavinia Corina Ciungu, Beloslav Riecan:
Representation theorem for probabilities on IFS-events. 793-798
Volume 180, Number 6, March 2010
- Javier Montero, Da Ruan:
Modelling uncertainty. 799-802 - Gaspar Mayor, Óscar Valero:
Aggregation of asymmetric distances in Computer Science. 803-812 - Hui Wang, Jun Liu, Juan Carlos Augusto:
Mass function derivation and combination in multivariate data spaces. 813-819 - Elena Castiñeira, Susana Cubillo, Wilmer Montilla:
Measuring incompatibility between Atanassov's intuitionistic fuzzy sets. 820-833 - Carmen Torres-Blanc, Susana Cubillo, Elena Castiñeira:
An axiomatic model for measuring contradiction and N-contradiction between two AIFSs. 834-845 - José Antonio Martín H., Matilde Santos Peñas, Javier de Lope Asiaín:
Orthogonal variant moments features in image analysis. 846-860 - Ihsan Kaya, Cengiz Kahraman:
Development of fuzzy process accuracy index for decision making problems. 861-872 - Xiaoxiao Kong, Qiang Wei, Guoqing Chen:
An approach to discovering multi-temporal patterns and its application to financial databases. 873-885 - Selçuk Çebi, Metin Celik, Cengiz Kahraman:
Structuring ship design project approval mechanism towards installation of operator-system interfaces via fuzzy axiomatic design principles. 886-895 - Fernando Alonso Zotes, Matilde Santos Peñas:
Multi-criteria genetic optimisation of the manoeuvres of a two-stage launcher. 896-910
- María Lourdes Borrajo Diz, Juan M. Corchado, Emilio S. Corchado Rodríguez, María A. Pellicer, Javier Bajo:
Multi-agent neural business control system. 911-927 - Ki Yong Lee, Yon Dohn Chung, Myoung-Ho Kim:
An efficient method for maintaining data cubes incrementally. 928-948 - Yuhua Qian, Jiye Liang, Yiyu Yao, Chuangyin Dang:
MGRS: A multi-granulation rough set. 949-970 - Radomír Halas, Judita Lihová:
On weakly cut-stable maps. 971-983 - Jianwei Dian:
A meaning based information theory - informalogical space: Basic concepts and convergence of information sequences. 984-994 - Yi-Chun Chang, Chih-Ping Chu:
Applying learning behavioral Petri nets to the analysis of learning behavior in web-based learning environments. 995-1009 - Nung-Yue Shi, Chih-Ping Chu:
A molecular solution to the hitting-set problem in DNA-based supercomputing. 1010-1019 - Lei Zhang, Futai Zhang, Qianhong Wu, Josep Domingo-Ferrer:
Simulatable certificateless two-party authenticated key agreement protocol. 1020-1030 - Wang Chen, Yanjun Shi, Hong-fei Teng, Xiaoping Lan, Li-chen Hu:
An efficient hybrid algorithm for resource-constrained project scheduling. 1031-1039 - Rza Bashirov, Tolgay Karanfiller:
On path dependent loss and switch crosstalk reduction in optical networks. 1040-1050 - Mohammad Saber Fallahnezhad, Seyed Taghi Akhavan Niaki:
A new monitoring design for uni-variate statistical quality control charts. 1051-1059 - Murat Ak, Kamer Kaya, Kaan Onarlioglu, Ali Aydin Selçuk:
Efficient broadcast encryption with user profiles. 1060-1072
- Wen-Chiung Lee, Peng-Jen Lai, Chin-Chia Wu:
Erratum to 'Some single-machine and m-machine flowshop scheduling problems with learning considerations' [Inform. Sci. 179(2009) 3885-3892]. 1073
Volume 180, Number 7, April 2010
- Roberta O. Parreiras, Petr Ekel, José Sidnei Colombo Martini, Reinaldo M. Palhares:
A flexible consensus scheme for multicriteria group decision making under linguistic assessments. 1075-1089 - Gayathri Tambaram Kailasam, Jinseung Lee, Jae-Won Rhee, Jaewoo Kang:
Efficient skycube computation using point and domain-based filtering. 1090-1103 - Jelena Ignjatovic, Miroslav Ciric:
Formal power series and regular operations on fuzzy languages. 1104-1120 - Anton Bardera, Miquel Feixas, Imma Boada, Mateu Sbert:
Image registration by compression. 1121-1133 - Vladimír Janis:
t-Norm based cuts of intuitionistic fuzzy sets. 1134-1137 - Dariusz Malyszko, Jaroslaw Stepaniuk:
Adaptive multilevel rough entropy evolutionary thresholding. 1138-1158 - Jianming Zhan, Bijan Davvaz, Kar-Ping Shum:
On probabilistic n-ary hypergroups. 1159-1166 - Yu Long, Kefei Chen:
Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism. 1167-1181
Volume 180, Number 8, April 2010
- Francisco José Berlanga, Antonio Jesús Rivera Rivas, María José del Jesus, Francisco Herrera:
GP-COACH: Genetic Programming-based learning of COmpact and ACcurate fuzzy rule-based classification systems for High-dimensional problems. 1183-1200 - Huan Xu, Jianjun Wang, Hyoung-Joong Kim:
Near-optimal solution to pair-wise LSB matching via an immune programming strategy. 1201-1217 - Maoguo Gong, Licheng Jiao, Lining Zhang:
Baldwinian learning in clonal selection algorithm for optimization. 1218-1236 - Swagatam Das, Sudeshna Sil:
Kernel-induced fuzzy clustering of image pixels with an improved differential evolution algorithm. 1237-1256 - Pediredla Ravisankar, Vadlamani Ravi, Indranil Bose:
Failure prediction of dotcom companies using neural network-genetic programming hybrids. 1257-1267 - Alberto Fernández, María José del Jesus, Francisco Herrera:
On the 2-tuples based genetic tuning performance for fuzzy rule based classification systems in imbalanced data-sets. 1268-1291 - Hyun Back, Jung-Im Won, Jeehee Yoon, Sanghyun Park, Sang-Wook Kim:
Efficient processing of spatial joins with DOT-based indexing. 1292-1312 - Guodong Zhou, Longhua Qian, Jianxi Fan:
Tree kernel-based semantic relation extraction with rich syntactic and semantic information. 1313-1325 - Humberto Bustince Sola, Edurne Barrenechea Tartas, Javier Fernández, Miguel Pagola, Javier Montero, Carlos Guerra:
Contrast of a fuzzy relation. 1326-1344 - Ivan Chajda, Radek Halas, Ivo G. Rosenberg:
On the role of logical connectives for primality and functional completeness of algebras of logics. 1345-1353 - Carles Noguera, Francesc Esteva, Lluís Godo:
Generalized continuous and left-continuous t-norms arising from algebraic semantics for fuzzy logics. 1354-1372 - Benjamín R. C. Bedregal, Graçaliz Pereira Dimuro, Regivan Hugo Nunes Santiago, Renata Hax Sander Reiser:
On interval fuzzy S-implications. 1373-1389 - Ronald R. Yager:
A framework for reasoning with soft information. 1390-1406 - Enrique Miranda, Inés Couso, Pedro Gil:
Approximations of upper and lower probabilities by measurable selections. 1407-1417 - Murat Diker:
Textural approach to generalized rough sets based on relations. 1418-1433 - Sohrab Effati, Morteza Pakdaman:
Artificial neural network approach for solving fuzzy differential equations. 1434-1457 - Woong-Kee Loh, Yang-Sae Moon, Jaideep Srivastava:
Distortion-free predictive streaming time-series matching. 1458-1476 - Ali Emrouznejad, Gholam R. Amin:
Improving minimax disparity model to determine the OWA operator weights. 1477-1485 - Leila Golshani, Einollah Pasha:
Rényi entropy rate for Gaussian processes. 1486-1491 - Gur Mosheiov, Assaf Sarig:
Scheduling with a common due-window: Polynomially solvable cases. 1492-1505 - Irina Cristea, Bijan Davvaz:
Atanassov's intuitionistic fuzzy grade of hypergroups. 1506-1517
Volume 180, Number 9, May 2010
- James S. Albus:
A model of computation and representation in the brain. 1519-1554 - Hyung Jun Ahn:
Evaluating customer aid functions of online stores with agent-based models of customer behavior and evolution strategy. 1555-1570 - Rammohan Mallipeddi, S. Mallipeddi, Ponnuthurai N. Suganthan:
Ensemble strategies with adaptive evolutionary programming. 1571-1581 - S. Ghazinoory, A. Esmail Zadeh, Amir Saman Kheirkhah:
Application of fuzzy calculations for improving portfolio matrices. 1582-1590 - Deng-Feng Li, Guo-Hong Chen, Zhi-Gang Huang:
Linear programming method for multiattribute group decision making using IF sets. 1591-1609 - Ching-Hsue Cheng, Tai-Liang Chen, Liang-Ying Wei:
A hybrid model based on rough sets theory and genetic algorithms for stock price forecasting. 1610-1629 - Wei Wu, Long Li, Jie Yang, Yan Liu:
A modified gradient-based neuro-fuzzy learning algorithm and its convergence. 1630-1642 - Qingzhong Liu, Andrew H. Sung, Mengyu Qiao, Zhongxue Chen, Bernardete Ribeiro:
An improved approach to steganalysis of JPEG images. 1643-1655 - Changsoo Ok, Seokcheon Lee, Prasenjit Mitra, Soundar R. T. Kumara:
Distributed routing in wireless sensor networks using energy welfare metric. 1656-1670 - Eddie Cheng, Jerrold W. Grossman, László Lipták, Ke Qiu, Zhizhang Shen:
Distance formula and shortest paths for the (n, k)-star graphs. 1671-1680 - Jin Li, Kwangjo Kim:
Hidden attribute-based signatures without anonymity revocation. 1681-1689 - Tzungher Chen, Chang-Sian Wu:
Compression-unimpaired batch-image encryption combining vector quantization and index compression. 1690-1701 - Tian-Fu Lee, Tzonelih Hwang:
Simple password-based three-party authenticated key exchange without server public keys. 1702-1714 - Hong-Bo Xie, Yong-Ping Zheng, Jing-Yi Guo, Xin Chen:
Cross-fuzzy entropy: A new method to test pattern synchrony of bivariate time series. 1715-1724 - Jinling Liang, Zidong Wang, Xiaohui Liu:
Robust passivity and passification of stochastic fuzzy time-delay systems. 1725-1737 - Shaocheng Tong, Xianglei He, Yongming Li:
Direct adaptive fuzzy backstepping robust control for single input and single output uncertain nonlinear systems using small-gain approach. 1738-1758 - Sultan Yamak, Osman Kazanci, Bijan Davvaz:
Generalized lower and upper approximations in a ring. 1759-1768 - Dug Hun Hong:
Blackwell's Theorem for T-related fuzzy variables. 1769-1777
Volume 180, Number 10, May 2010
- Costin Badica, Giuseppe Mangioni, Shahram Rahimi:
Intelligent distributed information systems. 1779-1780 - Doina Bein, Si-Qing Zheng:
Energy efficient all-to-all broadcast in all-wireless networks. 1781-1792 - Yukiko Yamauchi, Doina Bein, Toshimitsu Masuzawa, Linda Morales, Ivan Hal Sudborough:
Calibrating embedded protocols on asynchronous systems. 1793-1801 - Yukiko Yamauchi, Sayaka Kamei, Fukuhito Ooshita, Yoshiaki Katayama, Hirotsugu Kakugawa, Toshimitsu Masuzawa:
Timer-based composition of fault-containing self-stabilizing protocols. 1802-1816 - Ales Wojnar, Irena Mlýnková, Jirí Dokulil:
Structural and semantic aspects of similarity of Document Type Definitions and XML schemas. 1817-1836 - Michael Hartung, Frank Loebe, Heinrich Herre, Erhard Rahm:
Management of evolving semantic grid metadata within a collaborative platform. 1837-1849 - Mariano Rico, David Camacho, Óscar Corcho:
A contribution-based framework for the creation of semantically-enabled web applications. 1850-1864 - Ognen Paunovski, George Eleftherakis, Konstantinos Dimopoulos, Tony Cowling:
Evaluation of a selective distributed discovery strategy in a fully decentralized biologically inspired environment. 1865-1875 - Mirko Viroli, Franco Zambonelli:
A biochemical approach to adaptive service ecosystems. 1876-1892 - Vincenza Carchiolo, Alessandro Longheu, Michele Malgeri:
Reliable peers and useful resources: Searching for the best personalised learning path in a trust- and recommendation-aware environment. 1893-1907 - Maria Ganzha, Marcin Paprzycki, Jakub Stadnik:
Combining information from multiple search engines - Preliminary comparison. 1908-1923
- Francesco Marcelloni, Massimo Vecchio:
Enabling energy-efficient and lossy-aware data compression in wireless sensor networks by multi-objective evolutionary optimization. 1924-1941 - Guosheng Yang, Yingzi Lin, Prabir Bhattacharya:
A driver fatigue recognition model based on information fusion and dynamic Bayesian network. 1942-1954 - Rosario Toscano, Patrick Lyonnet:
A new heuristic approach for non-convex optimization problems. 1955-1966 - Radko Mesiar, Humberto Bustince Sola, Javier Fernández:
On the alpha-migrativity of semicopulas, quasi-copulas, and copulas. 1967-1976 - Humberto Bustince Sola, Tomasa Calvo, Bernard De Baets, János C. Fodor, Radko Mesiar, Javier Montero, Daniel Paternain, Ana Pradera:
A class of aggregation functions encompassing two-dimensional OWA operators. 1977-1989 - Jiajun Lai, Yang Xu:
Linguistic truth-valued lattice-valued propositional logic system lP(X) based on linguistic truth-valued lattice implication algebra. 1990-2002 - Qinghua Hu, Daren Yu, Maozu Guo:
Fuzzy preference based rough sets. 2003-2022 - Rosario Toscano, Patrick Lyonnet:
Robust static output feedback controller synthesis using Kharitonov's theorem and evolutionary algorithms. 2023-2028 - Bruno Baruque, Emilio Corchado, Aitor Mata, Juan M. Corchado:
A forecasting solution to the oil spill problem based on a hybrid intelligent system. 2029-2043 - Salvador García, Alberto Fernández, Julián Luengo, Francisco Herrera:
Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining: Experimental analysis of power. 2044-2064
Volume 180, Number 11, June 2010
- Werner Groissboeck, Edwin Lughofer, Stefan Thumfart:
Associating visual textures with human perceptions using genetic algorithms. 2065-2084 - José M. Merigó, Anna Maria Gil Lafuente:
New decision-making techniques and their application in the selection of financial products. 2085-2094 - François Fouss, Youssef Achbany, Marco Saerens:
A probabilistic reputation model based on transaction ratings. 2095-2123 - Shu-Hsien Liao, Shiu-Hwei Ho:
Investment project valuation based on a fuzzy binomial approach. 2124-2133 - Yen Hung Chen, Chuan Yi Tang:
On the bottleneck tree alignment problems. 2134-2141 - Seok Kee Lee, Yoon Ho Cho, Soung Hie Kim:
Collaborative filtering with ordinal scale-based implicit ratings for mobile music recommendations. 2142-2155 - Sozon Papavlasopoulos, Marios Poulos, Nikolaos Korfiatis, George Bokos:
A non-linear index to evaluate a journal's scientific impact. 2156-2175 - Yunjun Gao, Baihua Zheng, Gencai Chen, Qing Li, Chun Chen, Gang Chen:
Efficient mutual nearest neighbor query processing for moving object trajectories. 2176-2195 - Hung-Jr Shiu, Ka-Lok Ng, Jywe-Fei Fang, Richard C. T. Lee, Chien-Hung Huang:
Data hiding methods based upon DNA sequences. 2196-2208 - José A. Cruz-Lemus, Ann Maes, Marcela Genero, Geert Poels, Mario Piattini:
The impact of structural complexity on the understandability of UML statechart diagrams. 2209-2220 - Guilong Liu, Ying Sai:
Invertible approximation operators of generalized rough sets and fuzzy rough sets. 2221-2229 - James Jiann-Haw Liou, Gwo-Hshiung Tzeng:
A Dominance-based Rough Set Approach to customer behavior in the airline market. 2230-2238 - Mahdi Zarghami, Ferenc Szidarovszky:
On the relation between Compromise Programming and Ordered Weighted Averaging operator. 2239-2248 - Naixue Xiong, Athanasios V. Vasilakos, Laurence Tianruo Yang, Cheng-Xiang Wang, Rajgopal Kannan, Chin-Chen Chang, Yi Pan:
A novel self-tuning feedback controller for active queue management supporting TCP flows. 2249-2263 - Pankaj Gupta, Mukesh Kumar Mehlawat, Anand Saxena:
A hybrid approach to asset allocation with simultaneous consideration of suitability and optimality. 2264-2285 - Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Yeh, Yung-Kuan Chan:
A high payload frequency-based reversible image hiding method. 2286-2298 - Khalid M. Hosny:
A systematic method for efficient computation of full and subsets Zernike moments. 2299-2313 - Chang-Ho Hyun, Chang-Woo Park, Seungwoo Kim:
Takagi-Sugeno fuzzy model based indirect adaptive fuzzy observer and controller design. 2314-2327 - S. Razavi, Hamid Sarbazi-Azad:
The triangular pyramid: Routing and topological properties. 2328-2339
Volume 180, Number 12, June 2010
- Joris D'hondt, Joris Vertommen, Paul-Armand Verhaegen, Dirk Cattrysse, Joost R. Duflou:
Pairwise-adaptive dissimilarity measure for document clustering. 2341-2358 - Flora S. Tsai, Wenyin Tang, Kap Luk Chan:
Evaluation of novelty metrics for sentence-level novelty mining. 2359-2374 - Nam Hun Park, Sang Hyun Oh, Won Suk Lee:
Anomaly intrusion detection by clustering transactional audit streams in a host computer. 2375-2389 - Colin Twomey, Thomas Stützle, Marco Dorigo, Max Manfrin, Mauro Birattari:
An analysis of communication policies for homogeneous multi-colony ACO algorithms. 2390-2404 - Yu Wang, Bin Li, Thomas Weise:
Estimation of distribution and differential evolution cooperation for large scale economic load dispatch optimization of power systems. 2405-2420 - Dominik Fisch, Alexander Hofmann, Bernhard Sick:
On the versatility of radial basis function neural networks: A case study in the field of intrusion detection. 2421-2439 - Sergiu Rudeanu:
Boolean sets and most general solutions of Boolean equations. 2440-2447 - Petr Gregor, Riste Skrekovski:
On generalized middle-level problem. 2448-2457 - Fabien Laguillaumie, Damien Vergnaud:
Time-selective convertible undeniable signatures with short conversion receipts. 2458-2475 - Yongjian Xie, Yongming Li, Aili Yang:
The pasting constructions of lattice ordered effect algebras. 2476-2486 - Aifang Xie, Feng Qin:
Solutions to the functional equation I(x, y)=I(x, I(x, y)) for a continuous D-operation. 2487-2497
- José Antonio Martín H., Matilde Santos Peñas, Javier de Lope Asiaín:
Erratum to 'Orthogonal variant moments features in image analysis' [Information Sciences 180 (2010) 846-860]. 2498
Volume 180, Number 13, July 2010
- Hemant Kumar Singh, Tapabrata Ray, Warren F. Smith:
C-PSA: Constrained Pareto simulated annealing for constrained multi-objective optimization. 2499-2513 - Yaodong Ni, Lei Xie, Zhi-Qiang Liu:
Minimizing the expected complete influence time of a social network. 2514-2527 - Yi-Chung Hu:
Analytic network process for pattern classification problems using genetic algorithms. 2528-2539 - S. Geetha, N. Ishwarya, N. Kamaraj:
Evolving decision tree rule based system for audio stego anomalies detection based on Hausdorff distance statistics. 2540-2559 - Shuqin Zhang, Wai-Ki Ching, Xi Chen, Nam-Kiu Tsing:
Generating probabilistic Boolean networks from a prescribed stationary distribution. 2560-2570 - David J. Walker, Shahram Latifi:
Improving bounds on link failure tolerance of the star graph. 2571-2575 - Jun Shao, Zhenfu Cao, Xiaohui Liang, Huang Lin:
Proxy re-encryption with keyword search. 2576-2587 - Yi-Ching Chen, Dyi-Rong Duh:
Two-node-Hamiltonicity of enhanced pyramid networks. 2588-2595 - Sun-Yuan Hsieh, Yi-Ru Cian:
Conditional edge-fault Hamiltonicity of augmented cubes. 2596-2617 - Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao:
Secure threshold multi authority attribute based encryption without a central authority. 2618-2632
Volume 180, Number 14, July 2010
- Emilio Corchado, Ajith Abraham, André Carlos Ponce de Leon Ferreira de Carvalho:
Hybrid intelligent algorithms and applications. 2633-2634 - Richard J. Duro, Manuel Graña, Javier de Lope Asiaín:
On the potential contributions of hybrid intelligent approaches to Multicomponent Robotic System development. 2635-2648 - Hujun Yin, Weilin Huang:
Adaptive nonlinear manifolds and their applications to pattern recognition. 2649-2662 - Yan Zhang, Xindong Wu:
Integrating induction and deduction for noisy data mining. 2663-2673 - Crina Grosan, Ajith Abraham:
Approximating Pareto frontier using a hybrid line search approach. 2674-2695
- Nissim Matatov, Lior Rokach, Oded Maimon:
Privacy-preserving data mining: A feature set partitioning approach. 2696-2720 - María Isabel Sánchez Segura, Fuensanta Medina-Domínguez, Antonio de Amescua Seco, Arturo Mora-Soto:
Improving the efficiency of use of software engineering practices using product patterns. 2721-2742 - Engin Demir, Cevdet Aykanat:
Efficient successor retrieval operations for aggregate query processing on clustered road networks. 2743-2762 - Georgios Paltoglou, Michail Salampasis, Maria Satratzemi:
Collection-integral source selection for uncooperative distributed information retrieval environments. 2763-2776 - Rodolfo E. Haber, Raúl M. del Toro, Agustín Gajate:
Optimal fuzzy control system using the cross-entropy method. A case study of a drilling process. 2777-2792 - Yao Ouyang, Radko Mesiar, Hamzeh Agahi:
An inequality related to Minkowski type for Sugeno integrals. 2793-2801 - Navid Imani, Hamid Sarbazi-Azad:
Properties of a hierarchical network based on the star graph. 2802-2813
Volume 180, Number 15, August 2010
- E. L. Yu, Ponnuthurai N. Suganthan:
Ensemble of niching algorithms. 2815-2833 - Josep Domingo-Ferrer, Úrsula González-Nicolás:
Hybrid microdata using microaggregation. 2834-2844 - Tareq Z. Ahram, Pamela McCauley Bush, Waldemar Karwowski:
Estimating intrinsic dimensionality using the multi-criteria decision weighted model and the average standard estimator. 2845-2855 - Daisuke Kitakoshi, Hiroyuki Shioya, Ryohei Nakano:
Empirical analysis of an on-line adaptive system using a mixture of Bayesian networks. 2856-2874 - Lei-Da Li, Xiaoping Yuan, Zhaolin Lu, Jeng-Shyang Pan:
Rotation invariant watermark embedding based on scale-adapted characteristic regions. 2875-2888 - Ziba Eslami, Jamal Zarepour-Ahmadabadi:
A verifiable multi-secret sharing scheme based on cellular automata. 2889-2894 - Xuefei Cao, Weidong Kou, Xiaoni Du:
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. 2895-2903 - Che-Nan Kuo, Sun-Yuan Hsieh:
Pancyclicity and bipancyclicity of conditional faulty folded hypercubes. 2904-2914
Volume 180, Number 16, August 2010
- Ying Zhao, Yanyu Lu, Yukun Tian, Liming Li, Qiushi Ren, Xinyu Chai:
Image processing based recognition of images with a limited number of pixels using simulated prosthetic vision. 2915-2924 - Shao-Hu Peng, Deok-Hwan Kim, Seok-Lyong Lee, Chin-Wan Chung:
A visual shape descriptor using sectors and shape context of contour lines. 2925-2939 - Sun Zheng:
An intensive restraint topology adaptive snake model and its application in tracking dynamic image sequence. 2940-2959 - Tongyan Li, Xingming Li:
Novel alarm correlation analysis system based on association rules mining in telecommunication networks. 2960-2978 - Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee, Murad Khalid, Ravi Sankar:
Activity-oriented access control to ubiquitous hospital information and services. 2979-2990 - Zuqiang Long, Ximing Liang, Lirong Yang:
Some approximation properties of adaptive fuzzy systems with variable universe of discourse. 2991-3005 - Bart Van Gasse, Glad Deschrijver, Chris Cornelis, Etienne E. Kerre:
Filters of residuated lattices and triangle algebras. 3006-3020 - Bijan Davvaz, M. Fathi, Abdul Razak Salleh:
Fuzzy hyperrings (Hv-rings) based on fuzzy universal sets. 3021-3032 - Mohammad Hossein Fazel Zarandi, Adel Alaeddini:
A general fuzzy-statistical clustering approach for estimating the time of change in variable sampling control charts. 3033-3044 - Chin-Chen Chang, The Duc Kieu:
A reversible data hiding scheme using complementary embedding strategy. 3045-3058 - Lein Harn, Changlu Lin:
Strong (n, t, n) verifiable secret sharing scheme. 3059-3064
Volume 180, Number 17, September 2010
- Jason J. Jung, Ngoc Thanh Nguyen:
Virtual agent and organization modeling: Theory and applications. 3065-3066 - Longbing Cao:
In-depth behavior understanding and use: The behavior informatics approach. 3067-3085 - Jianxin Li, Jinpeng Huai, Chunming Hu, Yanmin Zhu:
A secure collaboration service for dynamic virtual organizations. 3086-3107 - Tien Van Do:
Modeling a resource contention in the management of virtual organizations. 3108-3116 - Beishui Liao, Huaxin Huang:
ANGLE: An autonomous, normative and guidable agent with changing knowledge. 3117-3139 - Guofu Zhang, Jianguo Jiang, Zhaopin Su, Meibin Qi, Hua Fang:
Searching for overlapping coalitions in multiple virtual organizations. 3140-3156 - Markus Gärtner, Ingo Seidel, Josef Froschauer, Helmut Berger:
The formation of virtual organizations by means of electronic institutions in a 3D e-Tourism environment. 3157-3169
- Bo-Yang Qu, Ponnuthurai N. Suganthan:
Multi-objective evolutionary algorithms based on the summation of normalized objectives and diversified selection. 3170-3181 - Shyam Sundar, Alok Singh:
A swarm intelligence approach to the quadratic minimum spanning tree problem. 3182-3191 - Els Lefever, Timur Fayruzov, Véronique Hoste, Martine De Cock:
Clustering web people search results using fuzzy ants. 3192-3209 - Nen-Fu Huang, Yih-Jou Tzang, Hong-Yi Chang, Chia-Wen Ho:
Enhancing P2P overlay network architecture for live multimedia streaming. 3210-3231 - Hajime Nobuhara, Dang Ba Khac Trieu, Tsutomu Maruyama, Barnabás Bede:
Max-plus algebra-based wavelet transforms and their FPGA implementation for image coding. 3232-3247 - Jason J. Jung:
Reusing ontology mappings for query routing in semantic peer-to-peer environment. 3248-3257 - Kudret Demirli, Sujikumar Vijayakumar:
Fuzzy logic based assignable cause diagnosis using control chart patterns. 3258-3272 - Xiao-Heng Chang, Guang-Hong Yang:
Relaxed stabilization conditions for continuous-time Takagi-Sugeno fuzzy control systems. 3273-3287 - Radim Belohlávek, Tomas Kuhr, Vilém Vychodil:
Confluence and termination of fuzzy relations. 3288-3303 - Irina Perfilieva, Bernard De Baets:
Fuzzy transforms of monotone functions with application to image compression. 3304-3315 - Tony Cheng-Kui Huang:
Knowledge gathering of fuzzy multi-time-interval sequential patterns. 3316-3334 - Bahram Karimi, Mohammad Bagher Menhaj:
Non-affine nonlinear adaptive control of decentralized large-scale systems using neural networks. 3335-3347 - Babushri Srinivas Kedukodi, Syam Prasad Kuncham, Satyanarayana Bhavanari:
Reference points and roughness. 3348-3361 - M. H. Shahzamanian, Mahsa Shirmohammadi, Bijan Davvaz:
Roughness in Cayley graphs. 3362-3372 - Meijie Ma:
The spanning connectivity of folded hypercubes. 3373-3379
Volume 180, Number 18, September 2010
- Dominik Fisch, Bernhard Kühbeck, Bernhard Sick, Seppo J. Ovaska:
So near and yet so far: New insight into properties of some well-known classifier paradigms. 3381-3401 - Jin Xiao, Changzheng He, Xiaoyi Jiang, Dunhu Liu:
A dynamic classifier ensemble selection approach for noise data. 3402-3421 - Hong Tang, Henri Maître, Nozha Boujemaa, Weiguo Jiang:
On the relevance of linear discriminative features. 3422-3433 - Qing Guo, Siyue Chen, Henry Leung, Shutian Liu:
Covariance intersection based image fusion technique with application to pansharpening in remote sensing. 3434-3443 - Haiping Ma:
An analysis of the equilibrium of migration models for biogeography-based optimization. 3444-3464 - Manuel Chica, Oscar Cordón, Sergio Damas, Joaquín Bautista:
Multiobjective constructive heuristics for the 1/3 variant of the time and space assembly line balancing problem: ACO and random greedy search. 3465-3487 - Anna Kolesárová, Radko Mesiar:
Lipschitzian De Morgan triplets of fuzzy connectives. 3488-3496 - Miroslav Ciric, Manfred Droste, Jelena Ignjatovic, Heiko Vogler:
Determinization of weighted finite automata over strong bimonoids. 3497-3520 - Ping Zhu, Qiaoyan Wen:
Some improved results on communication between information systems. 3521-3531 - Haixia Wu, Xiaofeng Liao, Wei Feng, Songtao Guo, Wei Zhang:
Robust stability for uncertain genetic regulatory networks with interval time-varying delays. 3532-3545 - Lu Zhen, Zuhua Jiang, Haitao Song:
Distributed recommender for peer-to-peer knowledge sharing. 3546-3561 - Irfan Siap, Hasan Akin, Ferhat Sah:
Garden of eden configurations for 2-D cellular automata with rule 2460 N. 3562-3571
Volume 180, Number 19, October 2010
- Enric Trillas, Itziar García-Honrado, Ana Pradera:
Consequences and conjectures in preordered sets. 3573-3588 - Esra Kirci Ozorhan, Esat Kaan Kuban, Nihan Kesim Cicekli:
Automated composition of web services with the abductive event calculus. 3589-3613 - Yiquan Zhu, Yang Xu:
On filter theory of residuated lattices. 3614-3632 - Guido Fiorino:
Fast decision procedure for propositional Dummett logic based on a multiple premise tableau calculus. 3633-3646 - Chaoyi Pang, Rui Zhang, Qing Zhang, Junhu Wang:
Dominating sets in directed graphs. 3647-3652 - Amory Bisserier, Reda Boukezzoula, Sylvie Galichet:
A revisited approach to linear fuzzy regression using trapezoidal fuzzy intervals. 3653-3673 - José Antonio Sanz, Alberto Fernández, Humberto Bustince Sola, Francisco Herrera:
Improving the performance of fuzzy rule-based classification systems with interval-valued fuzzy sets and genetic amplitude tuning. 3674-3685 - Ali Gürkan, Luca Iandoli, Mark Klein, Giuseppe Zollo:
Mediating debate through on-line large-scale argumentation: Evidence from the field. 3686-3702 - Sung Ho Ha:
Behavioral assessment of recoverable credit of retailer's customers. 3703-3717 - Chul-Ho Park, Seong-Moo Yoo, W. David Pan:
LSM: A layer subdivision method for deformable object matching. 3718-3727 - L. Shaw, William M. Spears, L. Billings, Paul M. Maxim:
Effective vaccination policies. 3728-3744 - Zhanhong Shi, Zengtai Gong:
The further investigation of covering-based rough sets: Uncertainty characterization, similarity measure and generalized models. 3745-3763 - Xiaohong Zhang, Yiyu Yao, Hong Yu:
Rough implication operator based on strong topological rough algebras. 3764-3780 - Tzu-Liang Kung, Yuan-Hsiang Teng, Lih-Hsing Hsu:
The panpositionable panconnectedness of augmented cubes. 3781-3793 - Yuejuan Han, Jianxi Fan, Shukui Zhang, Jiwen Yang, Peide Qian:
Embedding meshes into locally twisted cubes. 3794-3805 - Huan Huang:
Some notes on Zadeh's extensions. 3806-3813 - Wen-Hung Kuo, Dar-Li Yang:
Note on "Single-machine and flowshop scheduling with a general learning effect model" and "Some single-machine and m-machine flowshop scheduling problems with learning considerations". 3814-3816
Volume 180, Number 20, October 2010
- Fatma Nasoz, Christine L. Lisetti, Athanasios V. Vasilakos:
Affectively intelligent and adaptive car interfaces. 3817-3836 - Luis Reynoso, M. Esperanza Manso, Marcela Genero, Mario Piattini:
Assessing the influence of import-coupling on OCL expression maintainability: A cognitive theory-based perspective. 3837-3862 - Xinjun Peng:
A nu-twin support vector machine (nu-TSVM) classifier and its geometric algorithms. 3863-3875 - Hengjian Li, Jiashu Zhang, Zutao Zhang:
Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes. 3876-3893 - Shuaiqiang Wang, Jun Ma, Qiang He, Jiancheng Wan:
Formal behavior modeling and effective automatic refinement. 3894-3913 - Ferdinando Di Martino, Vincenzo Loia, Salvatore Sessa:
Fuzzy transforms for compression and decompression of color videos. 3914-3931 - Silvia Abrahão, Jaime Gómez, Emilio Insfrán:
Validating a size measure for effort estimation in model-driven Web development. 3932-3954 - Rosfuzah Roslan, Razib M. Othman, Zuraini Ali Shah, Shahreen Kasim, Hishammuddin Asmuni, Jumail Taliba, Rohayanti Hassan, Zalmiyah Zakaria:
Incorporating multiple genomic features with the utilization of interacting domain patterns to improve the prediction of protein-protein interactions. 3955-3973 - Mehmet Gulek, Ismail Hakki Toroslu:
A dynamic programming algorithm for tree-like weighted set packing problem. 3974-3979 - Rodrigo Rodrigues Sumar, Antonio Augusto Rodrigues Coelho, Leandro dos Santos Coelho:
Computational intelligence approach to PID controller design using the universal model. 3980-3991 - Isabel Aguiló, Jaume Suñer, Joan Torrens:
A characterization of residual implications derived from left-continuous uninorms. 3992-4005 - Branka Budimirovic, Vjekoslav Budimirovic, Andreja Tepavcevic:
Fuzzy epsilon-subgroups. 4006-4014 - Jun Li, Radko Mesiar, Peter Struk:
Pseudo-optimal measures. 4015-4021 - Yingwei Li, Huaiqin Wu:
Global stability analysis in Cohen-Grossberg neural networks with delays and inverse Hölder neuron activation functions. 4022-4030 - Liu Wenyin, Xiaojun Quan, Min Feng, Bite Qiu:
A short text modeling method combining semantic and statistical information. 4031-4041 - Hongbing Wang, Zhenfu Cao, Licheng Wang:
Multi-use and unidirectional identity-based proxy re-encryption schemes. 4042-4059 - Tsung-Ching Lin, Hung-Peng Lee, Hsin-Chiu Chang, Shao-I Chu, Trieu-Kien Truong:
High speed decoding of the binary (47, 24, 11) quadratic residue code. 4060-4068 - Xianfeng Guo, Jiashu Zhang:
Secure group key agreement protocol based on chaotic Hash. 4069-4074 - Ming-Chien Yang:
Constructing edge-disjoint spanning trees in twisted cubes. 4075-4083 - Mehmet Koç, Atalay Barkana, Ömer Nezih Gerek:
A fast method for the implementation of common vector approach. 4084-4098
Volume 180, Number 21, November 2010
- Willem Waegeman, Bernard De Baets:
A transitivity analysis of bipartite rankings in pairwise multi-class classification. 4099-4117 - Wook-Shin Han, Woong-Kee Loh, Kyu-Young Whang:
Type-level access pattern view: Enhancing prefetching performance using the iterative and recursive patterns. 4118-4135 - Marcos Eduardo Valle:
Permutation-based finite implicative fuzzy associative memories. 4136-4152 - Giuseppe Calcagno, Antonino Staiano, Giuliana Fortunato, Vincenzo Brescia-Morra, Elena Salvatore, Rosario Liguori, Silvana Capone, Alessandro Filla, Giuseppe Longo, Lucia Sacchetti:
A multilayer perceptron neural network-based approach for the identification of responsiveness to interferon therapy in multiple sclerosis patients. 4153-4163 - Sergio Guadarrama, Antonio Ruiz-Mayor:
Approximate robotic mapping from sonar data by modeling perceptions with antonyms. 4164-4188 - Marian Grendár Jr., Robert K. Niven:
The Pólya information divergence. 4189-4194 - Somayeh Zarezadeh, Majid Asadi:
Results on residual Rényi entropy of order statistics and record values. 4195-4206 - Ting-Yu Chen, Chia-Hang Li:
Determining objective weights with intuitionistic fuzzy entropy measures: A comparative analysis. 4207-4222
Volume 180, Number 22, November 2010
- Efrén Mezura-Montes, Mariana Edith Miranda-Varela, Rubí del Carmen Gómez-Ramón:
Differential evolution in constrained numerical optimization: An empirical study. 4223-4262 - Frank S. C. Tseng, Yen-Hung Kuo, Yueh-Min Huang:
Toward boosting distributed association rule mining by data de-clustering. 4263-4289 - Ana Belén Barragáns-Martínez, Enrique Costa-Montenegro, Juan C. Burguillo-Rial, Marta Rey-López, Fernando A. Mikic-Fonte, Ana Peleteiro-Ramallo:
A hybrid content-based and item-based collaborative filtering approach to recommend TV programs enhanced with singular value decomposition. 4290-4311 - Stefano Moretti, Athanasios V. Vasilakos:
An overview of recent applications of Game Theory to bioinformatics. 4312-4322 - Inma P. Cabrera, Pablo Cordero, Gloria Gutiérrez, Javier Martínez, Manuel Ojeda-Aciego:
A coalgebraic approach to non-determinism: Applications to multilattices. 4323-4335 - Kai Liu, Victor C. S. Lee:
On-demand broadcast for multiple-item requests in a multiple-channel environment. 4336-4352 - Junjie Wu, Hua Yuan, Hui Xiong, Guoqing Chen:
Validation of overlapping clustering: A random clustering perspective. 4353-4369 - Min Gan, Hui Peng, Xiaoyan Peng, Xiaohong Chen, Garba Inoussa:
A locally linear RBF network-based state-dependent AR model for nonlinear time series modeling. 4370-4383 - Qinghua Hu, Shuang An, Daren Yu:
Soft fuzzy rough sets for robust feature evaluation and selection. 4384-4400 - Qiang Shen, Ruiqing Zhao:
Risk assessment of serious crime with fuzzy random theory. 4401-4411 - Zhihui Li, Ting Xue, Hong Lai:
Secret sharing schemes from binary linear codes. 4412-4419 - Peng Xu, Guohua Cui, Feng-Yu Lei, Jing-Fang Xu:
One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity. 4420-4429 - Lingye Wu, Erfang Shan, Zengrong Liu:
On the k-tuple domination of generalized de Brujin and Kautz digraphs. 4430-4435 - Xiaojuan Cai:
A pure labeled transition semantics for the applied pi calculus. 4436-4458
Volume 180, Number 23, December 2010
- Rudolf Seising:
Cybernetics, system(s) theory, information theory and Fuzzy Sets and Systems in the 1950s and 1960s. 4459-4476 - Sergio Alonso, Enrique Herrera-Viedma, Francisco Chiclana, Francisco Herrera:
A web based consensus support system for group decision making problems and incomplete preferences. 4477-4495 - Amelia Zafra, Sebastián Ventura:
G3P-MI: A genetic programming algorithm for multiple instance learning. 4496-4513 - Qi Wu, Rob Law:
Complex system fault diagnosis based on a fuzzy robust wavelet support vector classifier and an adaptive Gaussian particle swarm optimization. 4514-4528 - Wen-Hsien Ho, Shinn-Horng Chen, Tung-Kuan Liu, Jyh-Horng Chou:
Design of robust-optimal output feedback controllers for linear uncertain systems using LMI-based approach and genetic algorithm. 4529-4542 - Guiyi Wei, Yun Ling, Athanasios V. Vasilakos, Bin Xiao, Yao Zheng:
PIVOT: An adaptive information discovery framework for computational grids. 4543-4556 - V. Alba Fernández, María-Dolores Jiménez-Gamero, B. Lagos-Álvarez:
Divergence statistics for testing uniform association in cross-classifications. 4557-4571 - Byeong Seok Ahn:
A priori identification of preferred alternatives of OWA operators by relational analysis of arguments. 4572-4581 - Choon Ki Ahn:
Passive learning and input-to-state stability of switched Hopfield neural networks with time-delay. 4582-4594 - Yi-Kuei Lin:
A method to evaluate routing policy through p minimal paths for stochastic case. 4595-4605 - M. Arun Kumar, Reshma Khemchandani, Madan Gopal, Suresh Chandra:
Knowledge based Least Squares Twin support vector machines. 4606-4618 - Shaocheng Tong, Yongming Li:
Fuzzy adaptive robust backstepping stabilization for SISO nonlinear systems with unknown virtual control direction. 4619-4640 - Tzuu-Hseng S. Li, Yun-Cheng Huang:
MIMO adaptive fuzzy terminal sliding-mode controller for robotic manipulators. 4641-4660 - Jiancheng Zhang, Xiyang Yang:
Some properties of fuzzy reasoning in propositional fuzzy logic systems. 4661-4671 - Bin Zhao, Weidong Kou, Hui Li, Lanjun Dang, Jun Zhang:
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol. 4672-4684 - Tao Zhang, Wenxiang Li, Yan Zhang, Ergong Zheng, Xijian Ping:
Steganalysis of LSB matching based on statistical modeling of pixel difference distributions. 4685-4694 - Yi Guo, Zhiqing Shao, Nan Hua:
A cognitive interactionist sentence parser with simple recurrent networks. 4695-4705 - Zengfeng Tian, Liangjian Hu, David Greenhalgh:
Perturbation analysis of fuzzy linear systems. 4706-4713 - Hong Yuan, Futai Zhang, Xinyi Huang, Yi Mu, Willy Susilo, Lei Zhang:
Certificateless threshold signature scheme from bilinear maps. 4714-4728 - Tsung-Ching Lin, Hsin-Chiu Chang, Hung-Peng Lee, Trieu-Kien Truong:
On the decoding of the (24, 12, 8) Golay code. 4729-4736
Volume 180, Number 24, December 2010
- Pierpaolo D'Urso, Riccardo Massari, Adriana Santoro:
A class of fuzzy clusterwise regression models. 4737-4762 - Stijn Lievens, Bernard De Baets:
Supervised ranking in the weka environment. 4763-4771 - Shyi-Ming Chen, Yu-Chuan Chang:
Multi-variable fuzzy forecasting based on fuzzy clustering and fuzzy rule interpolation techniques. 4772-4783 - Ricardo de A. Araújo:
Swarm-based translation-invariant morphological prediction method for financial time series forecasting. 4784-4805 - Yonghun Park, Dongmin Seo, Jonghyeon Yun, Christopher T. Ryu, Jun Kim, Jaesoo Yoo:
An efficient data-centric storage method using time parameter for sensor networks. 4806-4817 - Chuan-Kang Ting, Chien-Chih Liao:
A memetic algorithm for extending wireless sensor network lifetime. 4818-4833 - Zhi-Jie Zhou, Chang-Hua Hu, Dong-Ling Xu, Jian-Bo Yang, Dong-Hua Zhou:
New model for system behavior prediction based on belief rule based systems. 4834-4864 - Lidong Wang, Xiaodong Liu, Jiannong Cao:
A new algebraic structure for formal concept analysis. 4865-4876 - Serkan Genç, Fatih Emre Boran, Diyar Akay, Zeshui Xu:
Interval multiplicative transitivity for consistency, missing values and priority weights of interval fuzzy preference relations. 4877-4891 - Tzu-Chao Lin:
Switching-based filter based on Dempster's combination rule for image processing. 4892-4908 - Rafiullah Chamlawi, Asifullah Khan:
Digital image authentication and recovery: Employing integer transform based information embedding and extraction. 4909-4928 - Qing Li, Jia Wang, Yuanzhu Peter Chen, Zhangxi Lin:
User comments for news recommendation in forum-based social media. 4929-4939 - Anthony Chiu Wa Lo, Tansel Özyer, Radwan Tahboub, Keivan Kianmehr, Jamal Jida, Reda Alhajj:
XML materialized views and schema evolution in VIREX. 4940-4957 - Nuno Homem, João Paulo Carvalho:
Finding top-k elements in data streams. 4958-4974 - Alsayed Algergawy, Richi Nayak, Gunter Saake:
Element similarity measures in XML schema matching. 4975-4998 - Shesheng Gao, Yongmin Zhong, Bijan Shirinzadeh:
Random weighting estimation for fusion of multi-dimensional position data. 4999-5007 - Nimmy Ravindran, Yao Liang, Xu Liang:
A labeled-tree approach to semantic and structural data interoperability applied in hydrology domain. 5008-5028 - Yongfu Wang, Tianyou Chai, Yimin Zhang:
State observer-based adaptive fuzzy output-feedback control for a class of uncertain nonlinear systems. 5029-5040 - Abdesselem Boulkroune, Mohammed M'Saad, Hachemi Chekireb:
Design of a fuzzy adaptive controller for MIMO nonlinear time-delay systems with unknown actuator nonlinearities and unknown control direction. 5041-5059 - Stelios E. Papadakis, Vassilis G. Kaburlasos:
Piecewise-linear approximation of non-linear models based on probabilistically/possibilistically interpreted intervals' numbers (INs). 5060-5076 - Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen:
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. 5077-5089 - Chia-Jui Lai, Chang-Hsiung Tsai, Hong-Chun Hsu, Tseng-Kuei Li:
A dynamic programming algorithm for simulation of a multi-dimensional torus in a crossed cube. 5090-5100 - Thomas Vetterlein:
Pseudo-BCK algebras as partial algebras. 5101-5114 - Shan Zhao, Xue-ping Wang:
Invertible matrices and semilinear spaces over commutative semirings. 5115-5124 - Babington B. Makamba, Venkat Murali:
Preferential normal fuzzy subgroups. 5125-5129 - Qiansheng Zhang, Shengyi Jiang, Baoguo Jia, Shihua Luo:
Some information measures for interval-valued intuitionistic fuzzy sets. 5130-5145
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.