Stop the war!
Остановите войну!
for scientists:
default search action
Information Sciences, Volume 265
Volume 265, May 2014
- Fabio Caraffini, Ferrante Neri, Lorenzo Picinali:
An analysis on separability for Memetic Computing automatic design. 1-22 - Alexandros Giagkos, Myra S. Wilson:
BeeIP - A Swarm Intelligence based routing for wireless ad hoc networks. 23-35 - Leticia C. Cagnina, Marcelo Errecalde, Diego Ingaramo, Paolo Rosso:
An efficient Particle Swarm Optimization approach to cluster short texts. 36-49 - Dariusz Brzezinski, Jerzy Stefanowski:
Combining block-based and online methods in learning ensembles from concept drifting data streams. 50-67 - Jianwei Yin, Wei Lo, ShuiGuang Deng, Ying Li, Zhaohui Wu, Naixue Xiong:
Colbar: A collaborative location-based regularization framework for QoS prediction. 68-84 - José Carlos R. Alcantud:
Finite sets of data compatible with multidimensional inequality measures. 85-90 - Daniel Carlos Guimarães Pedronette, Jurandy Almeida, Ricardo da Silva Torres:
A scalable re-ranking method for content-based image retrieval. 91-104 - Xiaolian Zheng, Ben M. Chen:
Identification of stock market forces in the system adaptation framework. 105-122 - Peng Shi, Yanyan Yin, Fei Liu, Jianhua Zhang:
Robust control on saturated Markov jump systems with missing information. 123-138 - Abdesselem Boulkroune, Mohamed Tadjine, Mohammed M'Saad, Mondher Farza:
Design of a unified adaptive fuzzy observer for uncertain nonlinear systems. 139-153 - Jinhui Zhang, James Lam, Yuanqing Xia:
Output feedback delay compensation control for networked control systems with random delays. 154-166 - Shengwei Han, Zixiong Peng, Shunqin Wang:
The maximum flow problem of uncertain network. 167-175 - Chang Liu, Liehuang Zhu, Mingzhong Wang, Yu-an Tan:
Search pattern leakage in searchable encryption: Attacks and new construction. 176-188 - Pedro Pablo Alarcón, Fernando Arroyo, Victor Mitrana:
Networks of polarized evolutionary processors. 189-197 - Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim:
Identity-based chameleon hashing and signatures without key exposure. 198-210 - Mehmet Kaya, Reda Alhajj:
Development of multidimensional academic information networks with a novel data cube based modeling method. 211-224
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.