


default search action
Information Sciences, Volume 178
Volume 178, Number 1, January 2008
- Yaohua Chen, Yiyu Yao

:
A multiview approach for intelligent data analysis based on data operators. 1-20 - Qingzhong Liu

, Andrew H. Sung, Bernardete Ribeiro
, Mingzhen Wei, Zhongxue Chen
, Jianyun Xu:
Image complexity and feature mining for steganalysis of least significant bit matching steganography. 21-36 - Hyung Jun Ahn:

A new similarity measure for collaborative filtering to alleviate the new user cold-starting problem. 37-51 - Shihong Du, Qimin Qin, Qiao Wang, Haijian Ma:

Evaluating structural and topological consistency of complex regions with broad boundaries in multi-resolution spatial databases. 52-68 - Tianming Hu, Sam Yuan Sung, Hui Xiong, Qian Fu:

Discovery of maximum length frequent itemsets. 69-87 - Youngmi Yoon, Jongchan Lee, Sanghyun Park, Sangjay Bien, Hyun Cheol Chung, Sun Young Rha:

Direct integration of microarrays for selecting informative genes and phenotype classification. 88-105 - Wong Li Yun, U. Rajendra Acharya

, Y. V. Venkatesh, Caroline Chee, Lim Choo Min, E. Y. K. Ng:
Identification of different stages of diabetic retinopathy using retinal optical images. 106-121 - Chutima Pisarn, Thanaruk Theeramunkong:

Thai spelling analysis for automatic spelling speech recognition. 122-136 - Chi-Cheng Cheng, Gwo-Long Lin:

Acquisition of translational motion by the parallel trinocular. 137-151 - Masaharu Munetomo, Naoya Murao, Kiyoshi Akama:

Introducing assignment functions to Bayesian optimization algorithms. 152-163 - Jelena Ignjatovic, Miroslav Ciric

, Stojan Bogdanovic:
Determinization of fuzzy automata with membership values in complete residuated lattices. 164-180 - Yuhua Qian, Jiye Liang

, Deyu Li
, Haiyun Zhang, Chuangyin Dang
:
Measures for evaluating the decision performance of a decision table in rough set theory. 181-202 - Rogemar S. Mamon

, Christina Erlwein, R. Bhushan Gopaluni:
Adaptive signal processing of asset price dynamics with predictability analysis. 203-219 - Hao-Rung Chung, Wei-Chi Ku:

Three weaknesses in a simple three-party key exchange protocol. 220-229 - Yu-Fang Chung

, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen
:
Access control in user hierarchy based on elliptic curve cryptosystem. 230-243 - Shundong Li, Daoshun Wang, Yiqi Dai, Ping Luo:

Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations. 244-255 - Tzong-Sun Wu, Chien-Lung Hsu, Kuo-Yu Tsai, Han-Yu Lin, Tzong-Chen Wu:

Convertible multi-authenticated encryption scheme. 256-263 - Wei Zhang, Pepe Siy:

An efficient design of residue to binary converter for four moduli set (2n-1, 2n+1, 22n-2, 22n+1-3) based on new CRT II. 264-279 - Yuan Li:

Results on rotation symmetric polynomials over GF(p). 280-286
Volume 178, Number 2, January 2008
- Yue-Shi Lee

, Show-Jane Yen:
Incremental and interactive mining of web traversal patterns. 287-306 - Xiao Long Xin, Ti Yao Li

, Jing Hua Lu:
On derivations of lattices. 307-316 - Chang-Sup Park, Soyeon Park:

Efficient execution of composite Web services exchanging intensional data. 317-339 - Jianxi Fan, Xiaohua Jia

:
Edge-pancyclicity and path-embeddability of bijective connection graphs. 340-351 - Eui-nam Huh, Hyunseung Choo:

Performance enhancement of TCP in high-speed networks. 352-362 - Ronald R. Yager:

Using trapezoids for representing granular objects: Applications to learning and OWA aggregation. 363-380 - Dongrui Wu

, Jerry M. Mendel:
A vector similarity measure for linguistic approximation: Interval type-2 and type-1 fuzzy sets. 381-402 - Xiaodong Pan, Yang Xu:

Lattice implication ordered semigroups. 403-413 - Dechao Li, Zhong-Ke Shi, Yongming Li

:
Sufficient and necessary conditions for Boolean fuzzy systems as universal approximators. 414-424 - Jianming Zhan

, Bijan Davvaz, Kar-Ping Shum:
A new view of fuzzy hypernear-rings. 425-438 - Hae Kyung Kim, Jin Hee Yoon, Ying Li:

Asymptotic properties of least squares estimation with fuzzy observations. 439-451 - Zeshui Xu

:
Group decision making based on multiple types of linguistic preference relations. 452-467 - E. E. Ammar

:
On solutions of fuzzy random multiobjective quadratic programming with applications in portfolio problem. 468-484 - Dogan Özgen, Semih Önüt

, Bahadir Gülsün, Umut Rifat Tuzkaya
, Gülfem Tuzkaya:
A two-phase possibilistic linear programming methodology for multi-objective supplier evaluation and order allocation problems. 485-500 - Amin Ghodousian, Esmaile Khorram

:
Fuzzy linear optimization in the presence of the fuzzy relation inequality constraints with max-min composition. 501-519 - Daowu Pei:

Unified full implication algorithms of fuzzy reasoning. 520-530 - Kuo-liang Lee, Shu-chen Lin:

A fuzzy quantified SWOT procedure for environmental evaluation of an international distribution center. 531-549 - Sang-Eon Han:

Equivalent (k0, k1)-covering and generalized digital lifting. 550-561 - Teimuraz Tsabadze:

The reduction of binary fuzzy relations and its applications. 562-572 - Jiashun Zhang, Ruiqing Zhao, Wansheng Tang

:
Fuzzy age-dependent replacement policy and SPSA algorithm based-on fuzzy simulation. 573-583
Volume 178, Number 3, February 2008
- Athanasios V. Vasilakos

:
Special Issue: Ambient Intelligence. 585-587 - Stephen Keegan, Gregory M. P. O'Hare

, Michael J. O'Grady
:
Easishop: Ambient intelligence assists everyday shopping. 588-611 - Anton Nijholt

:
Google home: Experience, support and re-experience of social home activities. 612-630 - Giovanni Acampora

, Vincenzo Loia:
A proposal of ubiquitous fuzzy computing for Ambient Intelligence. 631-646 - Steffen Pauws

, Wim Verhaegh, Mark Vossen:
Music playlist generation by adapted simulated annealing. 647-662 - Magy Seif El-Nasr, Athanasios V. Vasilakos

:
DigitalBeing - using the environment as an expressive medium for dance. 663-678 - Athanasios V. Vasilakos

, Wei Liu, Ta Huynh Duy Nguyen, Tran Cong Thien Qui, Li Cheng Chen, Clara Boj Tovar
, Diego J. Díaz
, Adrian David Cheok
, Georgios N. Marentakis
:
Interactive theatre via mixed reality and Ambient Intelligence. 679-693
- Seung-Woo Kim, Sanghyun Park, Jung-Im Won

, Sang-Wook Kim:
Privacy preserving data mining of sequential patterns for network traffic data. 694-713 - Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang:

A discretization algorithm based on Class-Attribute Contingency Coefficient. 714-731 - Jen-der Day, Jeng-Shyang Pan

:
A new measure of index assignment in dynamic channels. 732-741 - Shanshan Duan:

Certificateless undeniable signature scheme. 742-755 - Rongxing Lu, Xiaodong Lin, Zhenfu Cao

, Jun Shao, Xiaohui Liang
:
New (t, n) threshold directed signature scheme with provable security. 756-765 - Jianhong Zhang, Jane Mao:

A novel ID-based designated verifier signature scheme. 766-773 - Jun Gao, Tengjiao Wang, Dongqing Yang:

XFlat: Query-friendly encrypted XML view publishing. 774-787 - Tsung-Chi Lin, Dyi-Rong Duh:

Constructing vertex-disjoint paths in (n, k)-star graphs. 788-801 - Shahram Latifi, Ebrahim Saberinia, Xialong Wu:

Robustness of star graph network under link failure. 802-806 - Tongjiang Yan, Li Hong, Guozhen Xiao:

The linear complexity of new generalized cyclotomic binary sequences of order four. 807-815 - Ronald R. Yager, Dimitar P. Filev:

Summarizing data using a similarity based mountain method. 816-826 - Seyed Mahmoud Taheri:

C-fuzzy numbers and a dual of extension principle. 827-835 - Qiang Luo, Wenqiang Yang, Dongyun Yi:

Kernel shapes of fuzzy sets in fuzzy systems for function approximation. 836-857 - Erdal Kiliç

:
Diagnosability of fuzzy discrete event systems. 858-870 - Chen-Chia Chuang:

Extended support vector interval regression networks for interval input-output data. 871-891 - Tong-Jun Li, Wen-Xiu Zhang:

Rough fuzzy approximations on two universes of discourse. 892-906 - Fei Han, Qing-Hua Ling, De-Shuang Huang:

Modified constrained learning algorithms incorporating additional functional constraints into neural networks. 907-919 - Qun-Liang Zhang, Yu-Geng Xi:

An efficient model predictive controller with pole placement. 920-930
Volume 178, Number 4, February 2008
- Javier Sanchis

, Miguel A. Martínez
, Xavier Blasco Ferragud
:
Integrated multiobjective optimization and a priori preferences using genetic algorithms. 931-951 - Luciano Sánchez

, José Ramón Villar
:
Obtaining transparent models of chaotic systems with multi-objective simulated annealing algorithms. 952-970 - Huaxiang Zhang, Jing Lu:

Adaptive evolutionary programming based on reinforcement learning. 971-984 - Theodore Dalamagas

, Alexandra Meliou
, Timos K. Sellis
:
Modeling and manipulating the structure of hierarchical schemas for the web. 985-1010 - Abdel-Rahman H. Tawil

, Matthew Montebello, Rami Bahsoon, W. A. Gray, Nick J. Fiddian:
Interschema correspondence establishment in a cooperative OWL-based multi-information server grid environment. 1011-1031 - Long-Sheng Chen

, Fei-Hao Hsu, Mu-Chen Chen, Yuan-Chia Hsu:
Developing recommender systems with the consideration of product profitability for sellers. 1032-1048 - I-En Liao, Kuo-Fong Kao:

Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information. 1049-1068 - Qiang Zhu

, San-Yang Liu, Min Xu:
On conditional diagnosability of the folded hypercubes. 1069-1077 - Tongjiang Yan, Bingjia Huang, Guozhen Xiao:

Cryptographic properties of some binary generalized cyclotomic sequences with the length p2. 1078-1086 - Yu-Jie Wang, Hsuan-Shih Lee:

A clustering method to identify representative financial ratios. 1087-1097 - Yan-Ping Jiang, Zhi-Ping Fan, Jian Ma

:
A method for group decision making with multi-granularity linguistic assessment information. 1098-1109 - Kiam Tian Seow, Kwang Mong Sim

:
Collaborative assignment using belief-desire-intention agent modeling and negotiation with speedup strategies. 1110-1132 - Radko Mesiar, Jana Spirková

, Lucia Vavríková:
Weighted aggregation operators based on minimization. 1133-1140 - Han-Liang Huang, Fu-Gui Shi

:
L-fuzzy numbers and their properties. 1141-1151 - Mohammad Hossein Fazel Zarandi, Adel Alaeddini, I. Burhan Türksen:

A hybrid fuzzy adaptive sampling - Run rules for Shewhart control charts. 1152-1170 - Zhi-Ren Tsai, Yau-Zen Chang

, Jiing-Dong Hwang, Jye Lee:
Robust fuzzy stabilization of dithered chaotic systems using island-based random optimization algorithm. 1171-1188 - Mehmet Duran Toksari:

Taylor series approach to fuzzy multiobjective linear fractional programming. 1189-1204 - Yunjie Zhang, Weina Wang, Xiaona Zhang, Yi Li:

A cluster validity index for fuzzy clustering. 1205-1218 - Xibei Yang, Jingyu Yang, Chen Wu, Dongjun Yu:

Dominance-based rough set approach and knowledge reductions in incomplete ordered information system. 1219-1234 - Jinfu Liu, Qinghua Hu, Daren Yu:

A weighted rough set based method developed for class imbalance learning. 1235-1256 - Ayse Bayar, Süheyla Ekmekçi, Ziya Akça:

A note on fibered projective plane geometry. 1257-1262
Volume 178, Number 5, March 2008
- Yu-Chu Tian

, David Levy:
Compensation for control packet dropout in networked control systems. 1263-1278 - Alexandru Mihai Bica:

Error estimation in the approximation of the solution of nonlinear fuzzy Fredholm integral equations. 1279-1292 - Ali Abbasi Molai

, Esmaile Khorram
:
An algorithm for solving fuzzy relation equations with max-T composition operator. 1293-1308 - Tofigh Allahviranloo

, E. Ahmady
, Nazanin Ahmady
:
Nth-order fuzzy linear differential equations. 1309-1324 - Yau-Tarng Juang, Yun-Tien Chang, Chih-Peng Huang:

Design of fuzzy PID controllers using modified triangular membership functions. 1325-1333 - Wenyi Zeng, Ping Guo

:
Normalized distance, similarity measure, inclusion measure and entropy of interval-valued fuzzy sets and their relationship. 1334-1342 - Osman Kazanci, Bijan Davvaz:

On the structure of rough prime (primary) ideals and rough fuzzy prime (primary) ideals in commutative rings. 1343-1354 - Wei-Zhi Wu:

Attribute reduction based on evidence theory in incomplete decision systems. 1355-1371 - Ki K. Lee, Wan Chul Yoon:

A classifier learning system using a coevolution method for deflection yoke misconvergence pattern classification problem. 1372-1390 - Yong Wang, Xiaofeng Liao, Di Xiao, Kwok-Wo Wong:

One-way hash function construction based on 2D coupled map lattices. 1391-1406 - Hsi-Chung Lin, Sung-Ming Yen, Yi-Hsiung Huang:

Security reconsideration of the Huang-Wang nominative signature. 1407-1417 - Alfredo De Santis

, Anna Lisa Ferrara, Barbara Masucci
:
An attack on a payment scheme. 1418-1421
Volume 178, Number 6, March 2008
- Mathieu Serrurier, Henri Prade:

Improving inductive logic programming by using simulated annealing. 1423-1441 - Deja Hepziba Francis, Sanjay Madria, Chaman L. Sabharwal:

A scalable constraint-based Q-hash indexing for moving objects. 1442-1460 - Hyo-Sang Lim, Kyu-Young Whang, Yang-Sae Moon:

Similar sequence matching supporting variable-length and variable-tolerance continuous queries on time-series data stream. 1461-1478 - Fabrizio Angiulli

, Eugenio Cesario
, Clara Pizzuti:
Random walk biclustering for microarray data. 1479-1497 - Enhong Chen, Huanhuan Cao, Qing Li

, Tieyun Qian
:
Efficient strategies for tough aggregate constraint-based sequential pattern mining. 1498-1518 - Ben Zhang, John C. Lusth:

Computing with random quantum dot repulsion. 1519-1532 - Dongmin Choi, Okbin Lee, Ilyong Chung:

A parallel routing algorithm on recursive cube of rings networks employing Hamiltonian circuit Latin square. 1533-1541 - Robert Meolic

, Tatjana Kapus, Zmago Brezocnik:
ACTLW - An action-based computation tree logic with unless operator. 1542-1557 - Kai-Yuan Cai, Zhao Dong, Ke Liu:

Software testing processes as a linear dynamic system. 1558-1597 - Di Xiao, Xiaofeng Liao, Shaojiang Deng:

Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. 1598-1602 - Yifeng Yin

, Xinshe Li, Yupu Hu:
Fast S-box security mechanism research based on the polymorphic cipher. 1603-1610 - Sunilkumar S. Manvi, M. S. Kakkasageri:

Multicast routing in mobile ad hoc networks by using a multiagent system. 1611-1628 - Shang-Ming Zhou

, John Q. Gan
, Francisco Sepulveda:
Classifying mental tasks based on features of higher-order statistics from EEG signals in brain-computer interface. 1629-1640 - Wen-Liang Hung, Miin-Shen Yang:

On the J-divergence of intuitionistic fuzzy sets with its application to pattern recognition. 1641-1650 - Guilong Liu:

Generalized rough sets over fuzzy lattices. 1651-1662 - Mohamed Abd El-Hady Kassem

:
Stability of vector optimization problems with fuzzy weights in the objective functions and fuzzy matrix parameters in the constraints. 1663-1679 - Jiuxiang Dong, Guang-Hong Yang:

State feedback control of continuous-time T-S fuzzy systems via switched fuzzy controllers. 1680-1695 - Ming-Ying Hsiao, Tzuu-Hseng S. Li, Jia-Zhen Lee, Chan-Hong Chao, Shun-Hung Tsai

:
Design of interval type-2 fuzzy sliding-mode controller. 1696-1716 - Metin Dagdeviren

, Ihsan Yüksel
:
Developing a fuzzy analytic hierarchy process (AHP) model for behavior-based safety management. 1717-1733 - Pankaj Gupta, Mukesh Kumar Mehlawat, Anand Saxena

:
Asset portfolio optimization using fuzzy mathematical programming. 1734-1755 - Rosana Rodríguez-López

:
Comparison results for fuzzy differential equations. 1756-1779 - Tofigh Allahviranloo

, Nazanin Ahmady
, E. Ahmady
:
Erratum to "Numerical solution of fuzzy differential equations by predictor-corrector method" [Inf Sci 177 (7) (2007) 1633-1647]. 1780-1782
Volume 178, Number 7, April 2008
- Stacie Petter

, Vijay K. Vaishnavi:
Facilitating experience reuse among software project managers. 1783-1802 - Wei-Yi Liu, Kun Yue, Shuang-Xian Liu, Yin-Bo Sun:

Qualitative-probabilistic-network-based modeling of temporal causalities and its application to feedback loop identification. 1803-1824 - Jun-Bao Li, Jeng-Shyang Pan

, Shu-Chuan Chu
:
Kernel class-wise locality preserving projection. 1825-1835 - Lei Zhang, Renhou Li:

Designing of classifiers based on immune principles and fuzzy rules. 1836-1847 - Feng-Hsu Wang:

On discovery of soft associations with "most" fuzzy quantifier for item promotion applications. 1848-1876 - Minghao Chen, Congxin Wu, Xiaoping Xue, Guoqing Liu:

On fuzzy boundary value problems. 1877-1892 - Wang Huisong, Wang Jun, Du Qun, Zeng Guihua:

A new approach to constructing CSS codes based on factor graphs. 1893-1902 - Yassir Nawaz, Guang Gong:

WG: A family of stream ciphers with designed randomness properties. 1903-1916 - Barnabás Bede:

Note on "Numerical solutions of fuzzy differential equations by predictor-corrector method". 1917-1922
Volume 178, Number 8, April 2008
- Ibrahim Özkan

, I. Burhan Türksen, Naci Canpolat:
A currency crisis and its perception with fuzzy C-means. 1923-1934 - Jun Yoneyama:

Robust stability and stabilizing controller design of fuzzy systems with discrete and distributed delays. 1935-1947 - Saeid Abbasbandy, Mahmood Otadi, Maryam Mosleh

:
Numerical solution of a system of fuzzy polynomials by fuzzy neural network. 1948-1960 - Bih-Sheue Shieh:

Infinite fuzzy relation equations with continuous t-norms. 1961-1967 - Zengtai Gong, Bingzhen Sun, Degang Chen:

Rough set theory for the interval-valued fuzzy information systems. 1968-1985 - Jianhua Dai:

Rough 3-valued algebras. 1986-1996 - Matthias Delafontaine, Nico Van de Weghe

, Peter Bogaert, Philippe De Maeyer
:
Qualitative relations between moving objects in a network changing its topological relations. 1997-2006 - Joseph Anderson, Lang Hong:

Sensor Resource Management driven by threat projection and priorities. 2007-2021 - Jiuping Xu, Qiang Liu, Rui Wang:

A class of multi-objective supply chain networks optimal model under random fuzzy environment and its application to the industry of Chinese liquor. 2022-2043 - Yu-Fang Chung

, Zhen Yu Wu, Tzer-Shyong Chen
:
Unconditionally secure cryptosystems based on quantum cryptography. 2044-2058 - Benlian Xu, Qinglan Chen, Zhengyi Wu, Zhiquan Wang:

Analysis and approximation of performance bound for two-observer bearings-only tracking. 2059-2078 - Ran Liu

, Qingsheng Zhu, Xiaoyan Xu, Liou Zhi, Hongtao Xie, Jun Yang, Xiaoyun Zhang:
Stereo effect of image converted from planar. 2079-2090 - Sang-Eon Han:

Comparison among digital fundamental groups and its applications. 2091-2104
Volume 178, Number 9, May 2008
- Sergio Ilarri

, Eduardo Mena
, Arantza Illarramendi
:
Using cooperative mobile agents to monitor distributed and dynamic environments. 2105-2127 - Zhen He

, Byung Suk Lee, Xiaoyang Sean Wang:
Aggregation in sensor networks with a user-provided quality of service goal. 2128-2149 - Javier Echanobe

, Inés del Campo
, Guillermo Bosque:
An adaptive neuro-fuzzy system for efficient implementations. 2150-2162 - Yu Liu

, Yi Zhang, Yong Gao:
GNet: A generalized network model and its applications in qualitative spatial reasoning. 2163-2175 - Adriano O. Andrade

, Peter J. Kyberd
, Slawomir J. Nasuto
:
The application of the Hilbert spectrum to the analysis of electromyographic signals. 2176-2193 - Chuangxia Huang, Yigang He, Lihong Huang

, Wenji Zhu:
pth moment stability analysis of stochastic recurrent neural networks with time-varying delays. 2194-2203 - Junhua Zhang, Yuanyuan Wang:

A rough margin based support vector machine. 2204-2214 - Zhonglong Zheng, Jia Jiong, Duanmu Chunjiang, XinHong Liu, Jie Yang:

Facial feature localization based on an improved active shape model. 2215-2223 - Feilong Liu:

An efficient centroid type-reduction strategy for general type-2 fuzzy logic system. 2224-2236 - Changzhong Wang, Congxin Wu, Degang Chen:

A systematic study on attribute reduction with rough sets based on general binary relations. 2237-2261 - Massoud Hadian Dehkordi, Samaneh Mashhadi

:
New efficient and practical verifiable multi-secret sharing schemes. 2262-2274 - Shesheng Gao, Zhihua Feng, Yongmin Zhong

, Bijan Shirinzadeh:
Random weighting estimation of parameters in generalized Gaussian distribution. 2275-2281 - Guohong Fu, Chunyu Kit

, Jonathan J. Webster:
Chinese word segmentation as morpheme-based lexical chunking. 2282-2296
Volume 178, Number 10, May 2008
- Seungho Lee, Young-Jun Son

, Judy Jin:
Decision field theory extensions for behavior modeling in dynamic environment using Bayesian belief network. 2297-2314 - Pradipta Maji

, Parimal Pal Chaudhuri:
Non-uniform cellular automata based associative memory: Evolutionary design and basins of attraction. 2315-2336 - Xiaolong Wu, Shahram Latifi:

Substar Reliability Analysis in Star Networks. 2337-2348 - Osman Kazanci, Sultan Yamak, Bijan Davvaz:

The lower and upper approximations in a quotient hypermodule with respect to fuzzy sets. 2349-2359 - Zuhua Shao:

Certificate-based verifiably encrypted signatures from pairings. 2360-2373
Volume 178, Number 11, June 2008
- Pascual Castelló, Mateu Sbert

, Miguel Chover
, Miquel Feixas
:
Viewpoint-based simplification using f-divergences. 2375-2388 - Om Parkash, P. K. Sharma, Renuka Mahajan:

New measures of weighted fuzzy entropy and their applications for the study of maximum weighted fuzzy entropy principle. 2389-2395 - Qiang Dong

, Xiaofan Yang, Juan Zhao, Yuan Yan Tang:
Embedding a family of disjoint 3D meshes into a crossed cube. 2396-2405 - Xuetao Wei, Lei Guo

, Xingwei Wang, Qingyang Song, Lemin Li:
Availability guarantee in survivable WDM mesh networks: A time perspective. 2406-2415 - Hyun-Ho Lee, Eun-Won Yun, Won-Suk Lee:

Attribute-based evaluation of multiple continuous queries for filtering incoming tuples of a data stream. 2416-2432 - Chin-Chen Chang, Chia-Chen Lin, Chia-Hsuan Lin, Yi-Hui Chen:

A novel secret image sharing scheme in color images using small shadow images. 2433-2447 - Lei Zhou, Wei-Zhi Wu:

On generalized intuitionistic fuzzy rough approximation operators. 2448-2465 - Young Bae Jun, Chul Hwan Park

:
Applications of soft sets in ideal theory of BCK/BCI-algebras. 2466-2475 - T. C. Edwin Cheng

, Chin-Chia Wu
, Wen-Chiung Lee:
Some scheduling problems with sum-of-processing-times-based and job-position-based learning effects. 2476-2487
Volume 178, Number 12, June 2008
- Jean-François Bercher

:
On some entropy functionals derived from Rényi information divergence. 2489-2506 - Hong-Cheu Liu, Jeffrey Xu Yu, Weifa Liang

:
Safety, domain independence and translation of complex value database queries. 2507-2533 - Guzen Erozel, Nihan Kesim Cicekli, Ilyas Cicekli:

Natural language querying for video databases. 2534-2552 - Mikyung Kang, Dong-In Kang, Jinwoo Suh, Junghoon Lee:

An energy-efficient real-time scheduling scheme on dual-channel networks. 2553-2563 - Okbin Lee, Yeojin Lee, Seongyeol Kim, Sangman Moh, Ilyong Chung:

Application of load balancing based on symmetric balanced incomplete block design to random networks. 2564-2572 - Jung-Sheng Fu:

Hamiltonian connectivity of the WK-recursive network with faulty nodes. 2573-2584 - Lain-Chyr Hwang, Chia-Hsu Kuo, San-Yuan Wang:

Concave piecewise linear service curves and deadline calculations. 2585-2599 - Mikhail Moshkov, Andrzej Skowron

, Zbigniew Suraj
:
Maximal consistent extensions of information systems relative to their theories. 2600-2620 - Suresh Sundaram

, Narasimhan Sundararajan, Paramasivan Saratchandran:
Risk-sensitive loss functions for sparse multi-category classification problems. 2621-2638 - Fathi B. Saidi

, Ali Jaballah
:
Alternative characterizations for the representation of families of sets by fuzzy sets. 2639-2647 - Ke-Ang Fu, Li-Xin Zhang

:
Strong limit theorems for random sets and fuzzy random sets with slowly varying weights. 2648-2660 - Yixiang Chen, Hengyang Wu:

Domain semantics of possibility computations. 2661-2679 - Yongguo Liu, Zhang Yi, Hong Wu, Mao Ye

, Kefei Chen:
A tabu search approach for the minimum sum-of-squares clustering problem. 2680-2704 - Yinghui Wang, Xiaojuan Ning, Chunxia Yang, Qiongfang Wang:

A method of illumination compensation for human face image based on quotient image. 2705-2721 - Odemir Martinez Bruno

, Rodrigo de Oliveira Plotze, Mauricio Falvo, Mário de Castro:
Fractal dimension applied to plant identification. 2722-2733 - Engang Tian, Dong Yue, Chen Peng:

Quantized output feedback control for networked control systems. 2734-2749
Volume 178, Number 13, July 2008
- Lotfi A. Zadeh:

Is there a need for fuzzy logic? 2751-2779 - Faheem Ahmed, Luiz Fernando Capretz, Jagath Samarabandu:

Fuzzy inference system for software product family process evaluation. 2780-2793 - Bingzhen Sun, Zengtai Gong, Degang Chen:

Fuzzy rough set theory for the interval-valued fuzzy information systems. 2794-2815 - Ashish Ghosh

, Anindya Halder
, Megha Kothari, Susmita Ghosh
:
Aggregation pheromone density based data clustering. 2816-2831 - Susana Díaz

, José Luis García-Lapresta
, Susana Montes:
Consistent models of transitivity for reciprocal preferences on a finite ordinal scale. 2832-2848 - Raphael Chung-Wei Phan

, Wei-Chuen Yau, Bok-Min Goi
:
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE). 2849-2856
Volume 178, Number 14, July 2008
- Matthew S. Gibbs

, Graeme C. Dandy, Holger R. Maier
:
A genetic algorithm calibration method based on convergence due to genetic drift. 2857-2869 - David Shilane, Jarno Martikainen, Sandrine Dudoit, Seppo J. Ovaska:

A general framework for statistical performance comparison of evolutionary computation algorithms. 2870-2879 - Tzu-Fang Sheu, Nen-Fu Huang, Hsiao Ping Lee:

Hierarchical multi-pattern matching algorithm for network content inspection. 2880-2898 - Jiuping Xu, Yonggang Liu:

Multi-objective decision making model under fuzzy random environment and its application to inventory problems. 2899-2914 - Ibrahim Korkmaz

, Hadi Gökçen
, Tahsin Çetinyokus:
An analytic hierarchy process and two-sided matching based decision support system for military personnel assignment. 2915-2927 - Shihong Du, Luo Guo, Qiao Wang:

A model for describing and composing direction relations between overlapping and contained regions. 2928-2949 - Fan Zhang, Zhigeng Pan, Kui Cao, Fengbin Zheng, Fangming Wu:

The upper and lower bounds of the information-hiding capacity of digital images. 2950-2959 - Jeng-Jung Wang, Tung-Yang Ho, Daniela Ferrero

, Ting-Yi Sung:
Diameter variability of cycles and tori. 2960-2967 - Younho Lee

, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon:
An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids. 2968-2982
Volume 178, Number 15, August 2008
- Ke Tang, Xin Yao

:
Special Issue on "Nature Inspired Problem-Solving". 2983-2984 - Zhenyu Yang, Ke Tang, Xin Yao

:
Large scale evolutionary optimization using cooperative coevolution. 2985-2999 - Weishan Dong, Xin Yao

:
Unified eigen analysis on multivariate Gaussian based estimation of distribution algorithms. 3000-3023 - Simon T. Powers, Jun He

:
A hybrid artificial immune system and Self Organising Map for network intrusion detection. 3024-3042 - Min Zhang, Wenjian Luo, Xufa Wang:

Differential evolution with dynamic stochastic selection for constrained optimization. 3043-3074 - Andrea Arcuri, Xin Yao

:
Search based software testing of object-oriented containers. 3075-3095 - Weilin Du, Bin Li:

Multi-strategy ensemble particle swarm optimization for dynamic optimization. 3096-3109 - D. Manivannan

, Qiangfeng Jiang, Jianchang Yang, Mukesh Singhal:
A quasi-synchronous checkpointing algorithm that prevents contention for stable storage. 3110-3117 - Abbas Ghaemi Bafghi, Reza Safabakhsh

, Babak Sadeghiyan:
Finding the differential characteristics of block ciphers with neural networks. 3118-3132 - Umut Rifat Tuzkaya

, Semih Önüt
:
A fuzzy analytic network process based approach to transportation-mode selection between Turkey and Germany: A case study. 3133-3146 - Bijan Davvaz, Jianming Zhan

, Kar-Ping Shum:
Generalized fuzzy Hv-submodules endowed with interval valued membership functions. 3147-3159
Volume 178, Number 16, August 2008
- Daniel S. Yeung, Xizhao Wang, Degang Chen:

Preface: Recent advances in granular computing. 3161-3162 - Suyun Zhao, Eric C. C. Tsang:

On fuzzy approximation operators in attribute reduction with fuzzy rough sets. 3163-3176 - Degang Chen, Wenxia Yang, Fachao Li:

Measures of general fuzzy rough sets on a probabilistic space. 3177-3187 - Xizhao Wang, Jun-Hai Zhai, Shu-Xia Lu:

Induction of multiple fuzzy decision trees based on rough set technique. 3188-3202 - Ju-Sheng Mi, Yee Leung, Hui-Yin Zhao, Tao Feng:

Generalized fuzzy rough sets determined by a triangular norm. 3203-3213 - Mu-Chen Chen, Long-Sheng Chen

, Chun-Chin Hsu, Wei-Rong Zeng:
An information granulation based data mining approach for classifying imbalanced data. 3214-3227 - Changzhong Wang

, Congxin Wu, Degang Chen, Qinghua Hu, Chong Wu:
Communicating between information systems. 3228-3239 - Ming-Hu Ha, Jing Tian:

The theoretical foundations of statistical learning theory based on fuzzy number samples. 3240-3246 - Bijan Davvaz:

A short note on algebraic T. 3247-3252 - Ciro Castiello, Giovanna Castellano

, Anna Maria Fanelli
:
Mindful: A framework for Meta-INDuctive neuro-FUzzy Learning. 3253-3274 - Aybars Ugur

:
Path planning on a cuboid using genetic algorithms. 3275-3287 - Carlos Gomes da Silva

:
Time series forecasting with a non-linear model and the scatter search meta-heuristic. 3288-3299 - Xiaoni Du, Zhixiong Chen, Guozhen Xiao:

On the linear complexity of some new q. 3300-3306 - Xiaoni Du, Tongjiang Yan, Guozhen Xiao:

Trace representation of some generalized cyclotomic sequences of length pq. 3307-3316
Volume 178, Number 17, September 2008
- Estela Saquete

, Óscar Ferrández, Sergio Ferrández, Patricio Martínez-Barco
, Rafael Muñoz
:
Combining automatic acquisition of knowledge with machine learning approaches for multilingual temporal recognition and normalization. 3319-3332 - Joris Vertommen, Frizo A. L. Janssens, Bart De Moor, Joost R. Duflou

:
Multiple-vector user profiles in support of knowledge sharing. 3333-3346 - Cheng-Hsiang Liu, Long-Sheng Chen

, Chun-Chin Hsu:
An association-based case reduction technique for case-based reasoning. 3347-3355 - Yiyu Yao

, Yan Zhao:
Attribute reduction in decision-theoretic rough set models. 3356-3373 - Ruoning Xu, Xiaoyan Zhai:

Optimal models for single-period supply chain problems with fuzzy demand. 3374-3381 - El Houssaine Aghezzaf

, Najib M. Najid:
Integrated production planning and preventive maintenance in deteriorating production systems. 3382-3392 - Seong-Jin Park, Kwang-Hyun Cho:

Real-time preemptive scheduling of sporadic tasks based on supervisory control of discrete event systems. 3393-3401 - Jayadeva, Reshma Khemchandani

, Suresh Chandra:
Regularized least squares support vector regression for the simultaneous learning of a function and its derivatives. 3402-3414 - Hussein Alzoubi

, W. David Pan:
Fast and accurate global motion estimation algorithm using pixel subsampling. 3415-3425 - Ting Yi Chang:

A Convertible Multi-Authenticated Encryption scheme for group communications. 3426-3434 - Chik How Tan:

Secure public-key encryption scheme without random oracles. 3435-3442 - Xianzhong Zhao, Young Bae Jun, Fang Ren:

The semiring of matrices over a finite chain. 3443-3450 - Yunqiang Yin, Hongxing Li:

The characterizations of h. 3451-3464 - Zhudeng Wang, Jin-xuan Fang:

On v-filters and normal v-filters of a residuated lattice with a weak vt-operator. 3465-3473 - Jirí Rachunek, Dana Salounová

:
Fuzzy filters and fuzzy prime filters of bounded R. 3474-3481 - Xiao-Bing Qu

, Xue-Ping Wang
:
Minimization of linear objective functions under the constraints expressed by a system of fuzzy relation equations. 3482-3490
Volume 178, Number 18, September 2008
- Yu-Chin Liu, Ping-Yu Hsu

, Gwo-Ji Sheen, Steve Ku, Kai-Wen Chang:
Simultaneous determination of view selection and update policy with stochastic query and response time constraints. 3491-3509 - Gae-won You, Seung-won Hwang, Hwanjo Yu:

Supporting personalized ranking over categorical attributes. 3510-3524 - Biao Qin, Shan Wang, Xiaoyong Du, Qiming Chen, Qiuyue Wang:

Graph-based query rewriting for knowledge sharing between peer ontologies. 3525-3542 - Chin-Chen Chang, Wen-Chuan Wu, Yi-Hui Chen:

Joint coding and embedding techniques for multimedia images. 3543-3556 - Radko Mesiar, Endre Pap:

Aggregation of infinite sequences. 3557-3564 - Ronald R. Yager:

Level sets and the extension principle for interval valued fuzzy sets and its application to uncertainty measures. 3565-3576 - Qinghua Hu, Daren Yu, Jinfu Liu, Congxin Wu:

Neighborhood rough set based heterogeneous feature subset selection. 3577-3594 - Dong Qiu

, Lan Shu:
Supremum metric on the space of fuzzy sets and common fixed point theorems for fuzzy mappings. 3595-3604 - Violeta Leoreanu Fotea:

The lower and upper approximations in a hypergroup. 3605-3615 - Godfrey C. Onwubolu:

Design of hybrid differential evolution and group method of data handling networks for modeling and prediction. 3616-3634 - Lei Guo

, Xingwei Wang, Qingyang Song, Xuetao Wei, Weigang Hou, Ting Yang, Fei Yang:
New insights on survivability in multi-domain optical networks. 3635-3644
Volume 178, Number 19, October 2008
- Pierre Loslever, Philippe Simon, F. Rousseau, Jean-Christophe Popieul:

Using space windowing for a preliminary analysis of complex time data in human component system studies. Examples with eye-tracking in advertising and car/head movements in driving. 3645-3664 - Aziz Sözer, Adnan Yazici

, Halit Oguztüzün
, Osman Tas:
Modeling and querying fuzzy spatiotemporal databases. 3665-3682 - Hui-Ling Hu, Yen-Liang Chen:

Mining typical patterns from databases. 3683-3696 - Hsu-Sheng Tsai, Wei Kuang Lai:

Improving fairness among TCP flows by stateless buffer control with early drop maximum. 3697-3715 - Serkan Günal

, Rifat Edizkan
:
Subspace based feature selection for pattern recognition. 3716-3726 - Wei Li, Dawu Gu, Juanru Li:

Differential fault analysis on the ARIA algorithm. 3727-3737 - Xueling Ma, Jianming Zhan

, Bijan Davvaz, Young Bae Jun:
Some kinds of (epsilon, epsilon or q)-interval-valued fuzzy ideals of BCI-algebras. 3738-3754 - Tien-Chin Wang, Yueh-Hsiang Chen:

Applying fuzzy linguistic preference relations to the improvement of consistency of fuzzy AHP. 3755-3765 - Bih-Sheue Shieh:

Deriving minimal solutions for fuzzy relation equations with max-product composition. 3766-3774 - Zeshui Xu

, Jian Chen, Junjie Wu:
Clustering algorithm for intuitionistic fuzzy sets. 3775-3790 - Alireza Kamel Mirmostafaee

, Mohammad Sal Moslehian
:
Fuzzy approximately cubic mappings. 3791-3798
Volume 178, Number 20, October 2008
- Lazaros S. Iliadis:

Special issue on Industrial Applications of Neural Networks. 3799-3801 - Miao Kang, Dominic Palmer-Brown:

A modal learning adaptive function neural network applied to handwritten digit recognition. 3802-3812 - Gérard Bloch, Fabien Lauer, Guillaume Colin

, Yann Chamaillard:
Support vector regression from simulation data and few experimental samples. 3813-3827 - Lazaros S. Iliadis, Stefanos Spartalis, Stavros Tachos:

Application of fuzzy T-norms towards a new Artificial Neural Networks' evaluation framework: A case from wood industry. 3828-3839 - Pekka Kumpulainen

, Kimmo Hätönen:
Local anomaly detection for mobile network monitoring. 3840-3859 - Dimitrios H. Mantzaris, George C. Anastassopoulos

, Adam V. Adamopoulos
, Stefanos Gardikis:
A non-symbolic implementation of abdominal pain estimation in childhood. 3860-3866 - Ioannis Partalas, Grigorios Tsoumakas

, Evaggelos V. Hatzikos, Ioannis P. Vlahavas:
Greedy regression ensemble selection: Theory and an application to water quality prediction. 3867-3879 - Athanasios K. Tsadiras:

Comparing the inference capabilities of binary, trivalent and sigmoid fuzzy cognitive maps. 3880-3894 - George E. Tsekouras

, Mamalis Antonios, Christos Anagnostopoulos, Damianos Gavalas
, Daphne Economou
:
Improved batch fuzzy learning vector quantization for image compression. 3895-3907 - Xavier Blasco Ferragud

, Juan Manuel Herrero Durá
, Javier Sanchis
, Miguel A. Martínez
:
A new graphical visualization of n-dimensional Pareto front for decision-making in multiobjective optimization. 3908-3924 - Gae-won You, Seung-won Hwang:

Search structures and algorithms for personalized ranking. 3925-3942 - Zhanggui Zeng, Hong Yan

:
Supervised classification of share price trends. 3943-3956 - Sultan Yamak, Osman Kazanci, Bijan Davvaz:

Applications of interval valued t. 3957-3972 - Shih-Pin Chen

, Jr-Fong Dang
:
A variable spread fuzzy linear regression model with higher explanatory power and forecasting accuracy. 3973-3988
Volume 178, Number 21, November 2008
- Sven Groppe

, Jinghua Groppe:
Output schemas of XSLT stylesheets and their applications. 3989-4018 - Wojciech Kotlowski, Krzysztof Dembczynski

, Salvatore Greco
, Roman Slowinski
:
Stochastic dominance-based rough set model for ordinal classification. 4019-4037 - Mario Ventresca, Hamid R. Tizhoosh

:
A diversity maintaining population-based incremental learning algorithm. 4038-4056 - Zuohua Ding, Kao Zhang, Jueliang Hu:

A rigorous approach towards test case generation. 4057-4079 - Hongbin Yan, Van-Nam Huynh

, Tetsuya Murai, Yoshiteru Nakamori:
Kansei evaluation based on prioritized multi-attribute fuzzy target-oriented decision analysis. 4080-4093 - Jordi Recasens

:
The structure of decomposable indistinguishability operators. 4094-4104 - Guilong Liu, William Zhu:

The algebraic structures of generalized rough set theory. 4105-4113 - Violeta Leoreanu Fotea, Bijan Davvaz:

Roughness in n. 4114-4124 - Lidong Wang

, Xiaodong Liu:
Concept analysis via rough set and AFS algebra. 4125-4137 - Keyun Qin, Jilin Yang, Zheng Pei:

Generalized rough sets based on reflexive and transitive relations. 4138-4141 - Junping Liu, Yongming Li

:
The relationship of controllability between classical and fuzzy discrete-event systems. 4142-4151 - Ketty Peeva, Zlatko Zahariev

:
Computing behavior of finite fuzzy machines - Algorithm and its application to reduction and minimization. 4152-4165 - Jiann Liang Yang, Huan Neng Chiu, Gwo-Hshiung Tzeng

, Ruey-Huei Yeh:
Vendor selection by integrated fuzzy MCDM techniques with independent and interdependent relationships. 4166-4183 - Qian-Sheng Zhang, Sheng-Yi Jiang:

A note on information entropy measures for vague sets and its applications. 4184-4191 - Xiaofeng Chen, Fangguo Zhang

, Haibo Tian, Baodian Wei, Willy Susilo
, Yi Mu, Hyunrok Lee, Kwangjo Kim:
Efficient generic on-line/off-line (threshold) signatures without key exposure. 4192-4203
Volume 178, Number 22, November 2008
- Cao D. Nguyen, Krzysztof J. Cios:

GAKREM: A novel hybrid clustering algorithm. 4205-4227 - Ming-Yen Lin

, Sue-Chen Hsueh, Chia-Wen Chang:
Fast discovery of sequential patterns in large databases using effective time-indexing. 4228-4245 - Antonio Sala

:
Encoding fuzzy possibilistic diagnostics as a constrained optimization problem. 4246-4263 - Wen Yu

, Xiaoou Li
:
On-line fuzzy modeling via clustering and support vector machines. 4264-4279 - Ali Azadeh, I. M. Fam, M. Khoshnoud, M. Nikafrouz:

Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: The case of a gas refinery. 4280-4300 - Woo-Cheol Kim, Ji-Young Song, Seung-Woo Kim, Sanghyun Park:

Image retrieval model based on weighted visual features determined by relevance feedback. 4301-4313 - Hui Zhou, Runsheng Wang, Cheng Wang:

A novel extended local-binary-pattern operator for texture analysis. 4314-4325 - Min Wang, Bing Chen, Kefu Liu, Xiaoping Liu, Siying Zhang:

Adaptive fuzzy tracking control of nonlinear time-delay systems with unknown virtual control coefficients. 4326-4340 - Xiaona Song, Shengyuan Xu, Hao Shen:

Robust H∞ control for uncertain fuzzy systems with distributed delays via output feedback controllers. 4341-4356 - Xiang-Yun Xie, Jian Tang:

Fuzzy radicals and prime fuzzy ideals of ordered semigroups. 4357-4374 - Zoran H. Peric

, Olivera D. Milanovic, Aleksandra Z. Jovanovic
:
Optimal companding vector quantization for circularly symmetric sources. 4375-4381 - Gonzalo Álvarez Marañón

, Luis Hernández Encinas
, Ángel Martín del Rey:
A multisecret sharing scheme for color images based on cellular automata. 4382-4395 - Yao Ouyang

, Jinxuan Fang:
Some results of weighted quasi-arithmetic mean of continuous triangular norms. 4396-4402 - Yuhui Deng

, Frank Wang, Na Helian
:
EED: Energy Efficient Disk drive architecture. 4403-4417
Volume 178, Number 23, December 2008
- Uday K. Chakraborty:

Genetic and evolutionary computing. 4419-4420 - Manuel Lozano

, Francisco Herrera
, José Ramón Cano:
Replacement strategies to preserve useful diversity in steady-state genetic algorithms. 4421-4433 - John R. Koza, Matthew J. Streeter, Martin A. Keane:

Routine high-return human-competitive automated problem-solving by means of genetic programming. 4434-4452 - Hitoshi Iba:

Inference of differential equation models by genetic programming. 4453-4468 - Ivan Tanev, Kikuo Yuta:

Epigenetic programming: Genetic programming incorporating epigenetic learning through modification of histones. 4469-4481 - Samuel Landau, Olivier Sigaud:

A comparison between ATNoSFERES and Learning Classifier Systems on non-Markov problems. 4482-4500 - Chi-Hoon Lee, Osmar R. Zaïane, Ho-Hyun Park, Jiayuan Huang, Russell Greiner:

Clustering high dimensional data: A graph-based relaxed optimization approach. 4501-4511 - Hai-Tao Zheng, Bo-Yeong Kang

, Hong-Gee Kim
:
An ontology-based approach to learnable focused crawling. 4512-4522 - Vasile Lupulescu

:
Initial value problem for fuzzy differential equations under dissipative conditions. 4523-4533 - Fabrizio Durante

, Susanne Saminger-Platz, Peter Sarkoci:
On representations of 2-increasing binary aggregation functions. 4534-4541 - Kun-Lun Zhang

, Dong-Hai Li, Li-Xia Song:
Solution of an open problem on pseudo-Archimedean t-norms. 4542-4549 - Coskun Hamzaçebi:

Improving artificial neural networks' performance in seasonal time series forecasting. 4550-4559 - Jeng-Chung Chen, Wei-Hsin Chen

:
Diagnostic analysis of a small-scale incinerator by the Garson index. 4560-4570 - U. Rajendra Acharya

, Meena Sankaranarayanan, Jagadish Nayak
, Chen Xiang, Toshiyo Tamura
:
Automatic identification of cardiac health using modeling techniques: A comparative study. 4571-4582 - A. Volgenant:

An addendum on the incremental assignment problem. 4583 - Ismail Hakki Toroslu

, Göktürk Üçoluk:
Authors' response to "an addendum on the incremental assignment problem" by Volgenant. 4584
Volume 178, Number 24, December 2008
- Corrado Mencar

, Anna Maria Fanelli
:
Interpretability constraints for fuzzy information granulation. 4585-4618 - Yong-Sheng Ding, Zhi-Hua Hu

, Hongbin Sun:
An antibody network inspired evolutionary framework for distributed object computing. 4619-4631 - Jui-Chung Hung

:
A genetic algorithm approach to the spectral estimation of time series with noise and missed observations. 4632-4643 - Josep Domingo-Ferrer, Agusti Solanas

:
A measure of variance for hierarchical nominal attributes. 4644-4655 - Jih-Hsin Ho, Wen-Ping Chen, Wen-Shyang Hwang, Ce-Kuen Shieh:

A study of the length effect of fiber delay line based on CSMA/CP optical packet switching. 4656-4669 - Vijay Kumar

, Kuldeep Kumar:
On the ideal convergence of sequences of fuzzy numbers. 4670-4678 - Jywe-Fei Fang:

The bipancycle-connectivity of the hypercube. 4679-4687 - Cheng Wang, Wansheng Tang

, Ruiqing Zhao:
Static Bayesian games with finite fuzzy types and the existence of equilibrium. 4688-4698 - Jenq-Der Chen, Chyi-Da Yang, Chang-Hua Lien, Ji-Hwei Horng

:
New delay-dependent non-fragile H. 4699-4706

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














