


Остановите войну!
for scientists:


default search action
Information Sciences, Volume 178
Volume 178, Number 1, January 2008
- Yaohua Chen, Yiyu Yao
:
A multiview approach for intelligent data analysis based on data operators. 1-20 - Qingzhong Liu
, Andrew H. Sung, Bernardete Ribeiro
, Mingzhen Wei, Zhongxue Chen
, Jianyun Xu:
Image complexity and feature mining for steganalysis of least significant bit matching steganography. 21-36 - Hyung Jun Ahn:
A new similarity measure for collaborative filtering to alleviate the new user cold-starting problem. 37-51 - Shihong Du, Qimin Qin, Qiao Wang, Haijian Ma:
Evaluating structural and topological consistency of complex regions with broad boundaries in multi-resolution spatial databases. 52-68 - Tianming Hu, Sam Yuan Sung, Hui Xiong, Qian Fu:
Discovery of maximum length frequent itemsets. 69-87 - Youngmi Yoon, Jongchan Lee, Sanghyun Park, Sangjay Bien, Hyun Cheol Chung, Sun Young Rha:
Direct integration of microarrays for selecting informative genes and phenotype classification. 88-105 - Wong Li Yun, U. Rajendra Acharya
, Y. V. Venkatesh, Caroline Chee, Lim Choo Min, E. Y. K. Ng:
Identification of different stages of diabetic retinopathy using retinal optical images. 106-121 - Chutima Pisarn, Thanaruk Theeramunkong:
Thai spelling analysis for automatic spelling speech recognition. 122-136 - Chi-Cheng Cheng, Gwo-Long Lin:
Acquisition of translational motion by the parallel trinocular. 137-151 - Masaharu Munetomo, Naoya Murao, Kiyoshi Akama:
Introducing assignment functions to Bayesian optimization algorithms. 152-163 - Jelena Ignjatovic, Miroslav Ciric
, Stojan Bogdanovic:
Determinization of fuzzy automata with membership values in complete residuated lattices. 164-180 - Yuhua Qian, Jiye Liang, Deyu Li
, Haiyun Zhang, Chuangyin Dang
:
Measures for evaluating the decision performance of a decision table in rough set theory. 181-202 - Rogemar S. Mamon
, Christina Erlwein, R. Bhushan Gopaluni:
Adaptive signal processing of asset price dynamics with predictability analysis. 203-219 - Hao-Rung Chung, Wei-Chi Ku:
Three weaknesses in a simple three-party key exchange protocol. 220-229 - Yu-Fang Chung
, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen
:
Access control in user hierarchy based on elliptic curve cryptosystem. 230-243 - Shundong Li, Daoshun Wang, Yiqi Dai, Ping Luo:
Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations. 244-255 - Tzong-Sun Wu, Chien-Lung Hsu, Kuo-Yu Tsai, Han-Yu Lin, Tzong-Chen Wu:
Convertible multi-authenticated encryption scheme. 256-263 - Wei Zhang, Pepe Siy:
An efficient design of residue to binary converter for four moduli set (2n-1, 2n+1, 22n-2, 22n+1-3) based on new CRT II. 264-279 - Yuan Li:
Results on rotation symmetric polynomials over GF(p). 280-286
Volume 178, Number 2, January 2008
- Yue-Shi Lee, Show-Jane Yen:
Incremental and interactive mining of web traversal patterns. 287-306 - Xiao Long Xin, Ti Yao Li
, Jing Hua Lu:
On derivations of lattices. 307-316 - Chang-Sup Park, Soyeon Park:
Efficient execution of composite Web services exchanging intensional data. 317-339 - Jianxi Fan, Xiaohua Jia
:
Edge-pancyclicity and path-embeddability of bijective connection graphs. 340-351 - Eui-nam Huh, Hyunseung Choo:
Performance enhancement of TCP in high-speed networks. 352-362 - Ronald R. Yager:
Using trapezoids for representing granular objects: Applications to learning and OWA aggregation. 363-380 - Dongrui Wu
, Jerry M. Mendel:
A vector similarity measure for linguistic approximation: Interval type-2 and type-1 fuzzy sets. 381-402 - Xiaodong Pan, Yang Xu:
Lattice implication ordered semigroups. 403-413 - Dechao Li, Zhong-Ke Shi, Yongming Li
:
Sufficient and necessary conditions for Boolean fuzzy systems as universal approximators. 414-424 - Jianming Zhan
, Bijan Davvaz, Kar-Ping Shum:
A new view of fuzzy hypernear-rings. 425-438 - Hae Kyung Kim, Jin Hee Yoon, Ying Li:
Asymptotic properties of least squares estimation with fuzzy observations. 439-451 - Zeshui Xu:
Group decision making based on multiple types of linguistic preference relations. 452-467 - E. E. Ammar
:
On solutions of fuzzy random multiobjective quadratic programming with applications in portfolio problem. 468-484 - Dogan Özgen, Semih Önüt
, Bahadir Gülsün, Umut Rifat Tuzkaya
, Gülfem Tuzkaya:
A two-phase possibilistic linear programming methodology for multi-objective supplier evaluation and order allocation problems. 485-500 - Amin Ghodousian, Esmaile Khorram
:
Fuzzy linear optimization in the presence of the fuzzy relation inequality constraints with max-min composition. 501-519 - Daowu Pei:
Unified full implication algorithms of fuzzy reasoning. 520-530 - Kuo-liang Lee, Shu-chen Lin:
A fuzzy quantified SWOT procedure for environmental evaluation of an international distribution center. 531-549 - Sang-Eon Han:
Equivalent (k0, k1)-covering and generalized digital lifting. 550-561 - Teimuraz Tsabadze:
The reduction of binary fuzzy relations and its applications. 562-572 - Jiashun Zhang, Ruiqing Zhao, Wansheng Tang
:
Fuzzy age-dependent replacement policy and SPSA algorithm based-on fuzzy simulation. 573-583
Volume 178, Number 3, February 2008
- Athanasios V. Vasilakos
:
Special Issue: Ambient Intelligence. 585-587 - Stephen Keegan, Gregory M. P. O'Hare
, Michael J. O'Grady
:
Easishop: Ambient intelligence assists everyday shopping. 588-611 - Anton Nijholt
:
Google home: Experience, support and re-experience of social home activities. 612-630 - Giovanni Acampora
, Vincenzo Loia:
A proposal of ubiquitous fuzzy computing for Ambient Intelligence. 631-646 - Steffen Pauws, Wim Verhaegh, Mark Vossen:
Music playlist generation by adapted simulated annealing. 647-662 - Magy Seif El-Nasr, Athanasios V. Vasilakos
:
DigitalBeing - using the environment as an expressive medium for dance. 663-678 - Athanasios V. Vasilakos
, Wei Liu, Ta Huynh Duy Nguyen, Tran Cong Thien Qui, Li Cheng Chen, Clara Boj Tovar
, Diego J. Díaz
, Adrian David Cheok
, Georgios N. Marentakis
:
Interactive theatre via mixed reality and Ambient Intelligence. 679-693
- Seung-Woo Kim, Sanghyun Park, Jung-Im Won
, Sang-Wook Kim:
Privacy preserving data mining of sequential patterns for network traffic data. 694-713 - Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang:
A discretization algorithm based on Class-Attribute Contingency Coefficient. 714-731 - Jen-der Day, Jeng-Shyang Pan
:
A new measure of index assignment in dynamic channels. 732-741 - Shanshan Duan:
Certificateless undeniable signature scheme. 742-755 - Rongxing Lu, Xiaodong Lin, Zhenfu Cao
, Jun Shao, Xiaohui Liang:
New (t, n) threshold directed signature scheme with provable security. 756-765 - Jianhong Zhang, Jane Mao:
A novel ID-based designated verifier signature scheme. 766-773 - Jun Gao, Tengjiao Wang, Dongqing Yang:
XFlat: Query-friendly encrypted XML view publishing. 774-787 - Tsung-Chi Lin, Dyi-Rong Duh:
Constructing vertex-disjoint paths in (n, k)-star graphs. 788-801 - Shahram Latifi, Ebrahim Saberinia, Xialong Wu:
Robustness of star graph network under link failure. 802-806 - Tongjiang Yan, Li Hong, Guozhen Xiao:
The linear complexity of new generalized cyclotomic binary sequences of order four. 807-815 - Ronald R. Yager, Dimitar P. Filev:
Summarizing data using a similarity based mountain method. 816-826 - Seyed Mahmoud Taheri:
C-fuzzy numbers and a dual of extension principle. 827-835 - Qiang Luo, Wenqiang Yang, Dongyun Yi:
Kernel shapes of fuzzy sets in fuzzy systems for function approximation. 836-857 - Erdal Kiliç:
Diagnosability of fuzzy discrete event systems. 858-870 - Chen-Chia Chuang:
Extended support vector interval regression networks for interval input-output data. 871-891 - Tong-Jun Li, Wen-Xiu Zhang:
Rough fuzzy approximations on two universes of discourse. 892-906 - Fei Han, Qing-Hua Ling, De-Shuang Huang:
Modified constrained learning algorithms incorporating additional functional constraints into neural networks. 907-919 - Qun-Liang Zhang, Yu-Geng Xi:
An efficient model predictive controller with pole placement. 920-930
Volume 178, Number 4, February 2008
- Javier Sanchis
, Miguel A. Martínez
, Xavier Blasco Ferragud
:
Integrated multiobjective optimization and a priori preferences using genetic algorithms. 931-951 - Luciano Sánchez
, José Ramón Villar
:
Obtaining transparent models of chaotic systems with multi-objective simulated annealing algorithms. 952-970 - Huaxiang Zhang, Jing Lu:
Adaptive evolutionary programming based on reinforcement learning. 971-984 - Theodore Dalamagas
, Alexandra Meliou
, Timos K. Sellis
:
Modeling and manipulating the structure of hierarchical schemas for the web. 985-1010 - Abdel-Rahman H. Tawil, Matthew Montebello, Rami Bahsoon, W. A. Gray, Nick J. Fiddian:
Interschema correspondence establishment in a cooperative OWL-based multi-information server grid environment. 1011-1031 - Long-Sheng Chen
, Fei-Hao Hsu, Mu-Chen Chen, Yuan-Chia Hsu:
Developing recommender systems with the consideration of product profitability for sellers. 1032-1048 - I-En Liao, Kuo-Fong Kao:
Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information. 1049-1068 - Qiang Zhu
, San-Yang Liu, Min Xu:
On conditional diagnosability of the folded hypercubes. 1069-1077 - Tongjiang Yan, Bingjia Huang, Guozhen Xiao:
Cryptographic properties of some binary generalized cyclotomic sequences with the length p2. 1078-1086 - Yu-Jie Wang, Hsuan-Shih Lee:
A clustering method to identify representative financial ratios. 1087-1097 - Yan-Ping Jiang, Zhi-Ping Fan, Jian Ma
:
A method for group decision making with multi-granularity linguistic assessment information. 1098-1109 - Kiam Tian Seow, Kwang Mong Sim
:
Collaborative assignment using belief-desire-intention agent modeling and negotiation with speedup strategies. 1110-1132 - Radko Mesiar, Jana Spirková
, Lucia Vavríková:
Weighted aggregation operators based on minimization. 1133-1140 - Han-Liang Huang, Fu-Gui Shi
:
L-fuzzy numbers and their properties. 1141-1151 - Mohammad Hossein Fazel Zarandi, Adel Alaeddini, I. Burhan Türksen:
A hybrid fuzzy adaptive sampling - Run rules for Shewhart control charts. 1152-1170 - Zhi-Ren Tsai, Yau-Zen Chang
, Jiing-Dong Hwang, Jye Lee:
Robust fuzzy stabilization of dithered chaotic systems using island-based random optimization algorithm. 1171-1188 - Mehmet Duran Toksari:
Taylor series approach to fuzzy multiobjective linear fractional programming. 1189-1204 - Yunjie Zhang, Weina Wang, Xiaona Zhang, Yi Li:
A cluster validity index for fuzzy clustering. 1205-1218 - Xibei Yang, Jingyu Yang, Chen Wu, Dongjun Yu:
Dominance-based rough set approach and knowledge reductions in incomplete ordered information system. 1219-1234 - Jinfu Liu, Qinghua Hu, Daren Yu:
A weighted rough set based method developed for class imbalance learning. 1235-1256 - Ayse Bayar, Süheyla Ekmekçi, Ziya Akça:
A note on fibered projective plane geometry. 1257-1262
Volume 178, Number 5, March 2008
- Yu-Chu Tian
, David Levy:
Compensation for control packet dropout in networked control systems. 1263-1278 - Alexandru Mihai Bica:
Error estimation in the approximation of the solution of nonlinear fuzzy Fredholm integral equations. 1279-1292 - Ali Abbasi Molai, Esmaile Khorram
:
An algorithm for solving fuzzy relation equations with max-T composition operator. 1293-1308 - Tofigh Allahviranloo
, E. Ahmady
, Nazanin Ahmady
:
Nth-order fuzzy linear differential equations. 1309-1324 - Yau-Tarng Juang, Yun-Tien Chang, Chih-Peng Huang:
Design of fuzzy PID controllers using modified triangular membership functions. 1325-1333 - Wenyi Zeng, Ping Guo
:
Normalized distance, similarity measure, inclusion measure and entropy of interval-valued fuzzy sets and their relationship. 1334-1342 - Osman Kazanci, Bijan Davvaz:
On the structure of rough prime (primary) ideals and rough fuzzy prime (primary) ideals in commutative rings. 1343-1354 - Wei-Zhi Wu:
Attribute reduction based on evidence theory in incomplete decision systems. 1355-1371 - Ki K. Lee, Wan Chul Yoon:
A classifier learning system using a coevolution method for deflection yoke misconvergence pattern classification problem. 1372-1390 - Yong Wang, Xiaofeng Liao, Di Xiao, Kwok-Wo Wong:
One-way hash function construction based on 2D coupled map lattices. 1391-1406 - Hsi-Chung Lin, Sung-Ming Yen, Yi-Hsiung Huang:
Security reconsideration of the Huang-Wang nominative signature. 1407-1417 - Alfredo De Santis
, Anna Lisa Ferrara, Barbara Masucci
:
An attack on a payment scheme. 1418-1421
Volume 178, Number 6, March 2008
- Mathieu Serrurier, Henri Prade:
Improving inductive logic programming by using simulated annealing. 1423-1441 - Deja Hepziba Francis, Sanjay Madria, Chaman L. Sabharwal:
A scalable constraint-based Q-hash indexing for moving objects. 1442-1460 - Hyo-Sang Lim, Kyu-Young Whang, Yang-Sae Moon:
Similar sequence matching supporting variable-length and variable-tolerance continuous queries on time-series data stream. 1461-1478 - Fabrizio Angiulli
, Eugenio Cesario
, Clara Pizzuti:
Random walk biclustering for microarray data. 1479-1497 - Enhong Chen, Huanhuan Cao, Qing Li
, Tieyun Qian
:
Efficient strategies for tough aggregate constraint-based sequential pattern mining. 1498-1518 - Ben Zhang, John C. Lusth:
Computing with random quantum dot repulsion. 1519-1532 - Dongmin Choi, Okbin Lee, Ilyong Chung:
A parallel routing algorithm on recursive cube of rings networks employing Hamiltonian circuit Latin square. 1533-1541 - Robert Meolic
, Tatjana Kapus, Zmago Brezocnik:
ACTLW - An action-based computation tree logic with unless operator. 1542-1557 - Kai-Yuan Cai, Zhao Dong, Ke Liu:
Software testing processes as a linear dynamic system. 1558-1597 - Di Xiao, Xiaofeng Liao, Shaojiang Deng:
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. 1598-1602 - Yifeng Yin
, Xinshe Li, Yupu Hu:
Fast S-box security mechanism research based on the polymorphic cipher. 1603-1610 - Sunilkumar S. Manvi, M. S. Kakkasageri:
Multicast routing in mobile ad hoc networks by using a multiagent system. 1611-1628 - Shang-Ming Zhou
, John Q. Gan
, Francisco Sepulveda:
Classifying mental tasks based on features of higher-order statistics from EEG signals in brain-computer interface. 1629-1640 - Wen-Liang Hung, Miin-Shen Yang:
On the J-divergence of intuitionistic fuzzy sets with its application to pattern recognition. 1641-1650 - Guilong Liu:
Generalized rough sets over fuzzy lattices. 1651-1662 - Mohamed Abd El-Hady Kassem
:
Stability of vector optimization problems with fuzzy weights in the objective functions and fuzzy matrix parameters in the constraints. 1663-1679 - Jiuxiang Dong, Guang-Hong Yang:
State feedback control of continuous-time T-S fuzzy systems via switched fuzzy controllers. 1680-1695 - Ming-Ying Hsiao, Tzuu-Hseng S. Li, Jia-Zhen Lee, Chan-Hong Chao, Shun-Hung Tsai
:
Design of interval type-2 fuzzy sliding-mode controller. 1696-1716 - Metin Dagdeviren
, Ihsan Yüksel
:
Developing a fuzzy analytic hierarchy process (AHP) model for behavior-based safety management. 1717-1733 - Pankaj Gupta, Mukesh Kumar Mehlawat, Anand Saxena:
Asset portfolio optimization using fuzzy mathematical programming. 1734-1755 - Rosana Rodríguez-López
:
Comparison results for fuzzy differential equations. 1756-1779 - Tofigh Allahviranloo
, Nazanin Ahmady
, E. Ahmady
:
Erratum to "Numerical solution of fuzzy differential equations by predictor-corrector method" [Inf Sci 177 (7) (2007) 1633-1647]. 1780-1782
Volume 178, Number 7, April 2008
- Stacie Petter
, Vijay K. Vaishnavi:
Facilitating experience reuse among software project managers. 1783-1802 - Wei-Yi Liu, Kun Yue, Shuang-Xian Liu, Yin-Bo Sun:
Qualitative-probabilistic-network-based modeling of temporal causalities and its application to feedback loop identification. 1803-1824