


default search action
Information Sciences, Volume 180
Volume 180, Number 1, January 2010
- Epaminondas Kapetanios

, Georgia Koutrika:
Guest editorial: Special issue on collective intelligence. 1-3 - Vasco Furtado

, Leonardo Ayres, Marcos de Oliveira
, Eurico Vasconcelos Filho
, Carlos Caminha
, Johnatas D'Orleans, Mairon Belchior:
Collective intelligence in law enforcement - The WikiCrimes system. 4-17 - Ioanna Lykourentzou, Katerina Papadaki, Dimitrios J. Vergados

, Despina Polemi, Vassilis Loumos:
CorpWiki: A self-regulating wiki to promote corporate collective intelligence through expert peer matching. 18-38 - Nitin Agarwal, Magdiel Galan Oliveras, Huan Liu, Shankara B. Subramanya:

WisColl: Collective wisdom based blog clustering. 39-61 - Wei-Hsun Lee, Shian-Shyong Tseng, Wern-Yarng Shieh:

Collaborative real-time traffic information generation and sharing framework for the intelligent transportation system. 62-70 - Pierre Lévy:

From social computing to reflexive collective intelligence: The IEML research program. 71-94 - James Caverlee, Ling Liu, Steve Webb:

The SocialTrust framework for trusted social information management: Architecture and algorithms. 95-112 - Ja-Hwung Su, Bo-Wen Wang, Chin-Yuan Hsiao, Vincent S. Tseng:

Personalized rough-set-based recommendation by integrating multiple contents and collaborative information. 113-131 - Martijn C. Schut:

On model design for simulation of collective intelligence. 132-155
- Manfred Droste, Torsten Stüber, Heiko Vogler:

Weighted finite automata over strong bimonoids. 156-166 - Jian Fu, H. John Caulfield, Seong-Moo Yoo, Dongsheng Wu:

Fuzzy Aggregation with Artificial Color filters. 167-180 - Zeshui Xu

:
A method based on distance measure for interval-valued intuitionistic fuzzy group decision making. 181-190 - Shiying Wang, Shangwei Lin

:
Path embeddings in faulty 3-ary n-cubes. 191-197 - Qiang Dong

, Xiaofan Yang, Dajin Wang:
Embedding paths and cycles in 3-ary n-cubes with faulty nodes and links. 198-208
Volume 180, Number 2, January 2010
- Chris Cornelis

, Richard Jensen
, Germán Hurtado Martín, Dominik Slezak:
Attribute selection with fuzzy decision reducts. 209-224 - Guoyin Jiang, Bin Hu, Youtian Wang:

Agent-based simulation of competitive and collaborative mechanisms for mobile service chains. 225-240 - Babak Rezaee

, Mohammad Hossein Fazel Zarandi:
Data-driven fuzzy modeling for Takagi-Sugeno-Kang fuzzy system. 241-255 - Yu Zhou, Min Xie, Guozhen Xiao:

On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity. 256-265 - Sugata Gangopadhyay, Sumanta Sarkar, Ruchi Telang:

On the lower bounds of the second order nonlinearities of some Boolean functions. 266-273 - Yan-Lan Zhang, Jinjin Li

, Wei-Zhi Wu:
On axiomatic characterizations of three pairs of covering based approximation operators. 274-287 - Ahmed H. Abdel-Gawad

, Amir F. Atiya
, Nevin M. Darwish:
Solution of systems of Boolean equations via the integer domain. 288-300 - Jia Zeng, Wei Feng, Lei Xie, Zhi-Qiang Liu:

Cascade Markov random fields for stroke extraction of Chinese characters. 301-311 - Bo Huang, Jinsong Wu, David Zhang

, Naimin Li:
Tongue shape classification by geometric features. 312-324
Volume 180, Number 3, February 2010
- Sang Wan Lee

, Yong-Soo Kim, Kwang-Hyun Park, Zeungnam Bien:
Iterative Bayesian fuzzy clustering toward flexible icon-based assistive software for the disabled. 325-340 - Yiyu Yao

:
Three-way decisions with probabilistic rough sets. 341-353 - Yingjie Yang, Chris J. Hinde:

A new extension of fuzzy sets using rough sets: R-fuzzy sets. 354-365 - Gabriel Cardona

, Mercè Llabrés
, Francesc Rosselló
, Gabriel Valiente
:
Path lengths in tree-child time consistent hybridization networks. 366-383 - Elías F. Combarro

, Pedro Miranda
:
Characterizing isometries on the order polytope with an application to the theory of fuzzy measures. 384-398 - Wei Wang, Xiaohong Guan, Beizhan Wang, Yaping Wang

:
A novel mobility model based on semi-random circular movement in mobile ad hoc networks. 399-413 - Kweku-Muata Osei-Bryson:

Towards supporting expert evaluation of clustering results using a data mining process model. 414-431 - Feng Lin, Xinguang Jim Chen

:
Estimation of transitional probabilities of discrete event systems from cross-sectional survey and its application in tobacco control. 432-440 - Gülçin Büyüközkan

, Da Ruan:
Choquet integral based aggregation approach to software development risk assessment. 441-451 - Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma:

Certificateless signcryption scheme in the standard model. 452-464 - Dan Huang, Sing Kiong Nguang

:
Robust fault estimator design for uncertain networked control systems with random time delays: An ILMI approach. 465-480
Volume 180, Number 4, February 2010
- Guangquan Zhang

, Jie Lu
, Javier Montero
, Yi Zeng:
Model, solution concept, and Kth-best algorithm for linear trilevel programming. 481-492 - Ferdinando Di Martino, Vincenzo Loia, Salvatore Sessa:

Fuzzy transforms method and attribute dependency in data analysis. 493-505 - Kit Yan Chan, C. K. Kwong

, Terence C. Fogarty:
Modeling manufacturing processes using a genetic programming-based fuzzy regression with detection of outliers. 506-518 - Sunil Mathew

, M. S. Sunitha:
Node connectivity and arc connectivity of a fuzzy graph. 519-531 - Yao Ouyang

, Zhudeng Wang, Hua-Peng Zhang
:
On fuzzy rough sets based on tolerance relations. 532-542 - Endre Pap, Mirjana Strboja

:
Generalization of the Jensen inequality for pseudo-integral. 543-548 - Chung Ki Li, Duncan S. Wong:

Signcryption from randomness recoverable public key encryption. 549-559
Volume 180, Number 5, March 2010
- Emilio Serrano, Arnaud Quirin

, Juan A. Botía
, Oscar Cordón
:
Debugging complex software systems by means of pathfinder networks. 561-583 - Jesús Pardillo, Jose-Norberto Mazón

, Juan Trujillo
:
Extending OCL for OLAP querying on conceptual multidimensional models of data warehouses. 584-601 - Buhwan Jeong, Jaewook Lee, Hyunbo Cho:

Improving memory-based collaborative filtering via similarity updating and prediction modulation. 602-612 - Yi Guo, Zhiqing Shao, Nan Hua:

Automatic text categorization based on content analysis with cognitive situation models. 613-630 - A. S. Salama

:
Topological solution of missing attribute values problem in incomplete information tables. 631-639 - Quan Yuan, Feng Qian, Wenli Du:

A hybrid genetic algorithm with the Baldwin effect. 640-652 - Paulo Sérgio Sausen

, Marco Aurélio Spohn
, Angelo Perkusich
:
Broadcast routing in wireless sensor networks with dynamic power management and multi-coverage backbones. 653-663 - Farshad Safaei, Ahmad Khonsari

, Mohammad Mahdi Gilak:
A new performance measure for characterizing fault rings in interconnection networks. 664-678 - Jiuping Xu, Lihui Zhao:

A multi-objective decision-making model with fuzzy rough coefficients and its application to the inventory problem. 679-696 - Jein-Shan Chen

, Chun-Hsu Ko, Shaohua Pan:
A neural network based on the generalized Fischer-Burmeister function for nonlinear complementarity problems. 697-711 - Jesús Medina

, Manuel Ojeda-Aciego
:
Multi-adjoint t-concept lattices. 712-725 - Zeshui Xu

:
Choquet integrals of weighted intuitionistic fuzzy information. 726-736 - Saeed Rasouli

, Bijan Davvaz:
Roughness in MV-algebras. 737-747 - Shihong Yue, Jeen-Shing Wang, Teresa Wu, Huaxiang Wang:

A new separation measure for improving the effectiveness of validity indices. 748-764 - Malrey Lee, Nam-Deok Cho, Thomas M. Gatton:

A function-based user authority delegation model. 765-775 - Bing Chen, Xiaoping Liu, Kefu Liu, Peng Shi, Chong Lin

:
Direct adaptive fuzzy control for nonlinear systems with time-varying delays. 776-792 - Lavinia Corina Ciungu, Beloslav Riecan:

Representation theorem for probabilities on IFS-events. 793-798
Volume 180, Number 6, March 2010
- Javier Montero

, Da Ruan:
Modelling uncertainty. 799-802 - Gaspar Mayor, Óscar Valero

:
Aggregation of asymmetric distances in Computer Science. 803-812 - Hui Wang

, Jun Liu
, Juan Carlos Augusto:
Mass function derivation and combination in multivariate data spaces. 813-819 - Elena Castiñeira, Susana Cubillo

, Wilmer Montilla:
Measuring incompatibility between Atanassov's intuitionistic fuzzy sets. 820-833 - Carmen Torres-Blanc

, Susana Cubillo
, Elena Castiñeira:
An axiomatic model for measuring contradiction and N-contradiction between two AIFSs. 834-845 - José Antonio Martín H., Matilde Santos Peñas

, Javier de Lope Asiaín
:
Orthogonal variant moments features in image analysis. 846-860 - Ihsan Kaya

, Cengiz Kahraman:
Development of fuzzy process accuracy index for decision making problems. 861-872 - Xiaoxiao Kong, Qiang Wei, Guoqing Chen:

An approach to discovering multi-temporal patterns and its application to financial databases. 873-885 - Selçuk Çebi

, Metin Celik
, Cengiz Kahraman:
Structuring ship design project approval mechanism towards installation of operator-system interfaces via fuzzy axiomatic design principles. 886-895 - Fernando Alonso Zotes, Matilde Santos Peñas

:
Multi-criteria genetic optimisation of the manoeuvres of a two-stage launcher. 896-910
- María Lourdes Borrajo Diz

, Juan M. Corchado
, Emilio S. Corchado Rodríguez, María A. Pellicer, Javier Bajo
:
Multi-agent neural business control system. 911-927 - Ki Yong Lee, Yon Dohn Chung, Myoung-Ho Kim:

An efficient method for maintaining data cubes incrementally. 928-948 - Yuhua Qian, Jiye Liang

, Yiyu Yao
, Chuangyin Dang
:
MGRS: A multi-granulation rough set. 949-970 - Radomír Halas, Judita Lihová:

On weakly cut-stable maps. 971-983 - Jianwei Dian:

A meaning based information theory - informalogical space: Basic concepts and convergence of information sequences. 984-994 - Yi-Chun Chang, Chih-Ping Chu:

Applying learning behavioral Petri nets to the analysis of learning behavior in web-based learning environments. 995-1009 - Nung-Yue Shi, Chih-Ping Chu:

A molecular solution to the hitting-set problem in DNA-based supercomputing. 1010-1019 - Lei Zhang, Futai Zhang, Qianhong Wu, Josep Domingo-Ferrer:

Simulatable certificateless two-party authenticated key agreement protocol. 1020-1030 - Wang Chen, Yanjun Shi, Hong-fei Teng, Xiaoping Lan, Li-chen Hu:

An efficient hybrid algorithm for resource-constrained project scheduling. 1031-1039 - Rza Bashirov

, Tolgay Karanfiller:
On path dependent loss and switch crosstalk reduction in optical networks. 1040-1050 - Mohammad Saber Fallahnezhad

, Seyed Taghi Akhavan Niaki
:
A new monitoring design for uni-variate statistical quality control charts. 1051-1059 - Murat Ak

, Kamer Kaya, Kaan Onarlioglu, Ali Aydin Selçuk
:
Efficient broadcast encryption with user profiles. 1060-1072
- Wen-Chiung Lee, Peng-Jen Lai, Chin-Chia Wu

:
Erratum to 'Some single-machine and m-machine flowshop scheduling problems with learning considerations' [Inform. Sci. 179(2009) 3885-3892]. 1073
Volume 180, Number 7, April 2010
- Roberta O. Parreiras, Petr Ekel

, José Sidnei Colombo Martini, Reinaldo M. Palhares
:
A flexible consensus scheme for multicriteria group decision making under linguistic assessments. 1075-1089 - Gayathri Tambaram Kailasam, Jinseung Lee, Jae-Won Rhee, Jaewoo Kang:

Efficient skycube computation using point and domain-based filtering. 1090-1103 - Jelena Ignjatovic, Miroslav Ciric

:
Formal power series and regular operations on fuzzy languages. 1104-1120 - Anton Bardera

, Miquel Feixas
, Imma Boada
, Mateu Sbert
:
Image registration by compression. 1121-1133 - Vladimír Janis

:
t-Norm based cuts of intuitionistic fuzzy sets. 1134-1137 - Dariusz Malyszko, Jaroslaw Stepaniuk

:
Adaptive multilevel rough entropy evolutionary thresholding. 1138-1158 - Jianming Zhan

, Bijan Davvaz, Kar-Ping Shum:
On probabilistic n-ary hypergroups. 1159-1166 - Yu Long, Kefei Chen:

Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism. 1167-1181
Volume 180, Number 8, April 2010
- Francisco José Berlanga, Antonio Jesús Rivera Rivas

, María José del Jesus
, Francisco Herrera
:
GP-COACH: Genetic Programming-based learning of COmpact and ACcurate fuzzy rule-based classification systems for High-dimensional problems. 1183-1200 - Huan Xu, Jianjun Wang, Hyoung-Joong Kim:

Near-optimal solution to pair-wise LSB matching via an immune programming strategy. 1201-1217 - Maoguo Gong

, Licheng Jiao
, Lining Zhang:
Baldwinian learning in clonal selection algorithm for optimization. 1218-1236 - Swagatam Das

, Sudeshna Sil:
Kernel-induced fuzzy clustering of image pixels with an improved differential evolution algorithm. 1237-1256 - Pediredla Ravisankar, Vadlamani Ravi, Indranil Bose:

Failure prediction of dotcom companies using neural network-genetic programming hybrids. 1257-1267 - Alberto Fernández

, María José del Jesus
, Francisco Herrera
:
On the 2-tuples based genetic tuning performance for fuzzy rule based classification systems in imbalanced data-sets. 1268-1291 - Hyun Back, Jung-Im Won

, Jeehee Yoon, Sanghyun Park, Sang-Wook Kim:
Efficient processing of spatial joins with DOT-based indexing. 1292-1312 - Guodong Zhou

, Longhua Qian, Jianxi Fan:
Tree kernel-based semantic relation extraction with rich syntactic and semantic information. 1313-1325 - Humberto Bustince Sola, Edurne Barrenechea Tartas

, Javier Fernández
, Miguel Pagola
, Javier Montero
, Carlos Guerra:
Contrast of a fuzzy relation. 1326-1344 - Ivan Chajda, Radek Halas, Ivo G. Rosenberg:

On the role of logical connectives for primality and functional completeness of algebras of logics. 1345-1353 - Carles Noguera

, Francesc Esteva
, Lluís Godo
:
Generalized continuous and left-continuous t-norms arising from algebraic semantics for fuzzy logics. 1354-1372 - Benjamín R. C. Bedregal, Graçaliz Pereira Dimuro, Regivan Hugo Nunes Santiago

, Renata Hax Sander Reiser
:
On interval fuzzy S-implications. 1373-1389 - Ronald R. Yager:

A framework for reasoning with soft information. 1390-1406 - Enrique Miranda

, Inés Couso
, Pedro Gil
:
Approximations of upper and lower probabilities by measurable selections. 1407-1417 - Murat Diker:

Textural approach to generalized rough sets based on relations. 1418-1433 - Sohrab Effati

, Morteza Pakdaman
:
Artificial neural network approach for solving fuzzy differential equations. 1434-1457 - Woong-Kee Loh, Yang-Sae Moon, Jaideep Srivastava

:
Distortion-free predictive streaming time-series matching. 1458-1476 - Ali Emrouznejad

, Gholam R. Amin:
Improving minimax disparity model to determine the OWA operator weights. 1477-1485 - Leila Golshani, Einollah Pasha:

Rényi entropy rate for Gaussian processes. 1486-1491 - Gur Mosheiov, Assaf Sarig

:
Scheduling with a common due-window: Polynomially solvable cases. 1492-1505 - Irina Cristea

, Bijan Davvaz:
Atanassov's intuitionistic fuzzy grade of hypergroups. 1506-1517
Volume 180, Number 9, May 2010
- James S. Albus:

A model of computation and representation in the brain. 1519-1554 - Hyung Jun Ahn:

Evaluating customer aid functions of online stores with agent-based models of customer behavior and evolution strategy. 1555-1570 - Rammohan Mallipeddi, S. Mallipeddi, Ponnuthurai N. Suganthan

:
Ensemble strategies with adaptive evolutionary programming. 1571-1581 - S. Ghazinoory

, A. Esmail Zadeh, Amir Saman Kheirkhah
:
Application of fuzzy calculations for improving portfolio matrices. 1582-1590 - Deng-Feng Li

, Guo-Hong Chen, Zhi-Gang Huang:
Linear programming method for multiattribute group decision making using IF sets. 1591-1609 - Ching-Hsue Cheng

, Tai-Liang Chen, Liang-Ying Wei:
A hybrid model based on rough sets theory and genetic algorithms for stock price forecasting. 1610-1629 - Wei Wu, Long Li, Jie Yang, Yan Liu:

A modified gradient-based neuro-fuzzy learning algorithm and its convergence. 1630-1642 - Qingzhong Liu

, Andrew H. Sung, Mengyu Qiao, Zhongxue Chen
, Bernardete Ribeiro
:
An improved approach to steganalysis of JPEG images. 1643-1655 - Changsoo Ok, Seokcheon Lee, Prasenjit Mitra, Soundar R. T. Kumara:

Distributed routing in wireless sensor networks using energy welfare metric. 1656-1670 - Eddie Cheng

, Jerrold W. Grossman, László Lipták, Ke Qiu, Zhizhang Shen
:
Distance formula and shortest paths for the (n, k)-star graphs. 1671-1680 - Jin Li, Kwangjo Kim:

Hidden attribute-based signatures without anonymity revocation. 1681-1689 - Tzungher Chen

, Chang-Sian Wu:
Compression-unimpaired batch-image encryption combining vector quantization and index compression. 1690-1701 - Tian-Fu Lee, Tzonelih Hwang:

Simple password-based three-party authenticated key exchange without server public keys. 1702-1714 - Hong-Bo Xie, Yong-Ping Zheng

, Jing-Yi Guo, Xin Chen:
Cross-fuzzy entropy: A new method to test pattern synchrony of bivariate time series. 1715-1724 - Jinling Liang, Zidong Wang

, Xiaohui Liu:
Robust passivity and passification of stochastic fuzzy time-delay systems. 1725-1737 - Shaocheng Tong, Xianglei He, Yongming Li:

Direct adaptive fuzzy backstepping robust control for single input and single output uncertain nonlinear systems using small-gain approach. 1738-1758 - Sultan Yamak, Osman Kazanci, Bijan Davvaz:

Generalized lower and upper approximations in a ring. 1759-1768 - Dug Hun Hong:

Blackwell's Theorem for T-related fuzzy variables. 1769-1777
Volume 180, Number 10, May 2010
- Costin Badica

, Giuseppe Mangioni, Shahram Rahimi:
Intelligent distributed information systems. 1779-1780 - Doina Bein

, Si-Qing Zheng:
Energy efficient all-to-all broadcast in all-wireless networks. 1781-1792 - Yukiko Yamauchi, Doina Bein

, Toshimitsu Masuzawa, Linda Morales, Ivan Hal Sudborough:
Calibrating embedded protocols on asynchronous systems. 1793-1801 - Yukiko Yamauchi, Sayaka Kamei

, Fukuhito Ooshita, Yoshiaki Katayama, Hirotsugu Kakugawa, Toshimitsu Masuzawa:
Timer-based composition of fault-containing self-stabilizing protocols. 1802-1816 - Ales Wojnar, Irena Mlýnková

, Jirí Dokulil
:
Structural and semantic aspects of similarity of Document Type Definitions and XML schemas. 1817-1836 - Michael Hartung, Frank Loebe, Heinrich Herre, Erhard Rahm

:
Management of evolving semantic grid metadata within a collaborative platform. 1837-1849 - Mariano Rico

, David Camacho
, Óscar Corcho
:
A contribution-based framework for the creation of semantically-enabled web applications. 1850-1864 - Ognen Paunovski, George Eleftherakis

, Konstantinos Dimopoulos
, Tony Cowling:
Evaluation of a selective distributed discovery strategy in a fully decentralized biologically inspired environment. 1865-1875 - Mirko Viroli

, Franco Zambonelli
:
A biochemical approach to adaptive service ecosystems. 1876-1892 - Vincenza Carchiolo

, Alessandro Longheu
, Michele Malgeri:
Reliable peers and useful resources: Searching for the best personalised learning path in a trust- and recommendation-aware environment. 1893-1907 - Maria Ganzha, Marcin Paprzycki

, Jakub Stadnik:
Combining information from multiple search engines - Preliminary comparison. 1908-1923
- Francesco Marcelloni

, Massimo Vecchio
:
Enabling energy-efficient and lossy-aware data compression in wireless sensor networks by multi-objective evolutionary optimization. 1924-1941 - Guosheng Yang, Yingzi Lin, Prabir Bhattacharya:

A driver fatigue recognition model based on information fusion and dynamic Bayesian network. 1942-1954 - Rosario Toscano, Patrick Lyonnet:

A new heuristic approach for non-convex optimization problems. 1955-1966 - Radko Mesiar, Humberto Bustince Sola, Javier Fernández

:
On the alpha-migrativity of semicopulas, quasi-copulas, and copulas. 1967-1976 - Humberto Bustince Sola, Tomasa Calvo

, Bernard De Baets
, János C. Fodor
, Radko Mesiar, Javier Montero
, Daniel Paternain
, Ana Pradera
:
A class of aggregation functions encompassing two-dimensional OWA operators. 1977-1989 - Jiajun Lai, Yang Xu:

Linguistic truth-valued lattice-valued propositional logic system lP(X) based on linguistic truth-valued lattice implication algebra. 1990-2002 - Qinghua Hu, Daren Yu, Maozu Guo:

Fuzzy preference based rough sets. 2003-2022 - Rosario Toscano, Patrick Lyonnet:

Robust static output feedback controller synthesis using Kharitonov's theorem and evolutionary algorithms. 2023-2028 - Bruno Baruque

, Emilio Corchado, Aitor Mata, Juan M. Corchado
:
A forecasting solution to the oil spill problem based on a hybrid intelligent system. 2029-2043 - Salvador García

, Alberto Fernández
, Julián Luengo
, Francisco Herrera
:
Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining: Experimental analysis of power. 2044-2064
Volume 180, Number 11, June 2010
- Werner Groissboeck, Edwin Lughofer, Stefan Thumfart:

Associating visual textures with human perceptions using genetic algorithms. 2065-2084 - José M. Merigó

, Anna Maria Gil Lafuente:
New decision-making techniques and their application in the selection of financial products. 2085-2094 - François Fouss

, Youssef Achbany, Marco Saerens:
A probabilistic reputation model based on transaction ratings. 2095-2123 - Shu-Hsien Liao

, Shiu-Hwei Ho:
Investment project valuation based on a fuzzy binomial approach. 2124-2133 - Yen Hung Chen, Chuan Yi Tang:

On the bottleneck tree alignment problems. 2134-2141 - Seok Kee Lee

, Yoon Ho Cho, Soung Hie Kim:
Collaborative filtering with ordinal scale-based implicit ratings for mobile music recommendations. 2142-2155 - Sozon Papavlasopoulos, Marios Poulos

, Nikolaos Korfiatis
, George Bokos:
A non-linear index to evaluate a journal's scientific impact. 2156-2175 - Yunjun Gao, Baihua Zheng

, Gencai Chen, Qing Li
, Chun Chen, Gang Chen:
Efficient mutual nearest neighbor query processing for moving object trajectories. 2176-2195 - Hung-Jr Shiu

, Ka-Lok Ng, Jywe-Fei Fang, Richard C. T. Lee, Chien-Hung Huang:
Data hiding methods based upon DNA sequences. 2196-2208 - José A. Cruz-Lemus

, Ann Maes, Marcela Genero
, Geert Poels
, Mario Piattini
:
The impact of structural complexity on the understandability of UML statechart diagrams. 2209-2220 - Guilong Liu, Ying Sai:

Invertible approximation operators of generalized rough sets and fuzzy rough sets. 2221-2229 - James J. H. Liou, Gwo-Hshiung Tzeng

:
A Dominance-based Rough Set Approach to customer behavior in the airline market. 2230-2238 - Mahdi Zarghami

, Ferenc Szidarovszky:
On the relation between Compromise Programming and Ordered Weighted Averaging operator. 2239-2248 - Naixue Xiong, Athanasios V. Vasilakos

, Laurence Tianruo Yang, Cheng-Xiang Wang
, Rajgopal Kannan, Chin-Chen Chang, Yi Pan:
A novel self-tuning feedback controller for active queue management supporting TCP flows. 2249-2263 - Pankaj Gupta, Mukesh Kumar Mehlawat, Anand Saxena

:
A hybrid approach to asset allocation with simultaneous consideration of suitability and optimality. 2264-2285 - Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Yeh, Yung-Kuan Chan

:
A high payload frequency-based reversible image hiding method. 2286-2298 - Khalid M. Hosny

:
A systematic method for efficient computation of full and subsets Zernike moments. 2299-2313 - Chang-Ho Hyun, Chang-Woo Park, Seungwoo Kim:

Takagi-Sugeno fuzzy model based indirect adaptive fuzzy observer and controller design. 2314-2327 - S. Razavi, Hamid Sarbazi-Azad:

The triangular pyramid: Routing and topological properties. 2328-2339
Volume 180, Number 12, June 2010
- Joris D'hondt, Joris Vertommen, Paul-Armand Verhaegen, Dirk Cattrysse

, Joost R. Duflou
:
Pairwise-adaptive dissimilarity measure for document clustering. 2341-2358 - Flora S. Tsai, Wenyin Tang, Kap Luk Chan:

Evaluation of novelty metrics for sentence-level novelty mining. 2359-2374 - Nam Hun Park, Sang Hyun Oh, Won Suk Lee:

Anomaly intrusion detection by clustering transactional audit streams in a host computer. 2375-2389 - Colin Twomey, Thomas Stützle

, Marco Dorigo
, Max Manfrin
, Mauro Birattari
:
An analysis of communication policies for homogeneous multi-colony ACO algorithms. 2390-2404 - Yu Wang, Bin Li, Thomas Weise:

Estimation of distribution and differential evolution cooperation for large scale economic load dispatch optimization of power systems. 2405-2420 - Dominik Fisch, Alexander Hofmann, Bernhard Sick

:
On the versatility of radial basis function neural networks: A case study in the field of intrusion detection. 2421-2439 - Sergiu Rudeanu:

Boolean sets and most general solutions of Boolean equations. 2440-2447 - Petr Gregor

, Riste Skrekovski
:
On generalized middle-level problem. 2448-2457 - Fabien Laguillaumie, Damien Vergnaud

:
Time-selective convertible undeniable signatures with short conversion receipts. 2458-2475 - Yongjian Xie, Yongming Li

, Aili Yang:
The pasting constructions of lattice ordered effect algebras. 2476-2486 - Aifang Xie, Feng Qin:

Solutions to the functional equation I(x, y)=I(x, I(x, y)) for a continuous D-operation. 2487-2497
- José Antonio Martín H., Matilde Santos Peñas

, Javier de Lope Asiaín
:
Erratum to 'Orthogonal variant moments features in image analysis' [Information Sciences 180 (2010) 846-860]. 2498
Volume 180, Number 13, July 2010
- Hemant Kumar Singh

, Tapabrata Ray
, Warren F. Smith
:
C-PSA: Constrained Pareto simulated annealing for constrained multi-objective optimization. 2499-2513 - Yaodong Ni, Lei Xie, Zhi-Qiang Liu:

Minimizing the expected complete influence time of a social network. 2514-2527 - Yi-Chung Hu

:
Analytic network process for pattern classification problems using genetic algorithms. 2528-2539 - S. Geetha

, N. Ishwarya, N. Kamaraj:
Evolving decision tree rule based system for audio stego anomalies detection based on Hausdorff distance statistics. 2540-2559 - Shuqin Zhang

, Wai-Ki Ching, Xi Chen, Nam-Kiu Tsing:
Generating probabilistic Boolean networks from a prescribed stationary distribution. 2560-2570 - David J. Walker, Shahram Latifi:

Improving bounds on link failure tolerance of the star graph. 2571-2575 - Jun Shao, Zhenfu Cao

, Xiaohui Liang
, Huang Lin:
Proxy re-encryption with keyword search. 2576-2587 - Yi-Ching Chen, Dyi-Rong Duh:

Two-node-Hamiltonicity of enhanced pyramid networks. 2588-2595 - Sun-Yuan Hsieh, Yi-Ru Cian:

Conditional edge-fault Hamiltonicity of augmented cubes. 2596-2617 - Huang Lin, Zhenfu Cao

, Xiaohui Liang
, Jun Shao:
Secure threshold multi authority attribute based encryption without a central authority. 2618-2632
Volume 180, Number 14, July 2010
- Emilio Corchado, Ajith Abraham, André Carlos Ponce de Leon Ferreira de Carvalho

:
Hybrid intelligent algorithms and applications. 2633-2634 - Richard J. Duro

, Manuel Graña, Javier de Lope Asiaín
:
On the potential contributions of hybrid intelligent approaches to Multicomponent Robotic System development. 2635-2648 - Hujun Yin

, Weilin Huang:
Adaptive nonlinear manifolds and their applications to pattern recognition. 2649-2662 - Yan Zhang, Xindong Wu:

Integrating induction and deduction for noisy data mining. 2663-2673 - Crina Grosan

, Ajith Abraham:
Approximating Pareto frontier using a hybrid line search approach. 2674-2695
- Nissim Matatov, Lior Rokach, Oded Maimon:

Privacy-preserving data mining: A feature set partitioning approach. 2696-2720 - María Isabel Sánchez Segura

, Fuensanta Medina-Domínguez
, Antonio de Amescua Seco
, Arturo Mora-Soto
:
Improving the efficiency of use of software engineering practices using product patterns. 2721-2742 - Engin Demir

, Cevdet Aykanat:
Efficient successor retrieval operations for aggregate query processing on clustered road networks. 2743-2762 - Georgios Paltoglou, Michail Salampasis

, Maria Satratzemi:
Collection-integral source selection for uncooperative distributed information retrieval environments. 2763-2776 - Rodolfo E. Haber

, Raúl M. del Toro
, Agustín Gajate:
Optimal fuzzy control system using the cross-entropy method. A case study of a drilling process. 2777-2792 - Yao Ouyang

, Radko Mesiar, Hamzeh Agahi:
An inequality related to Minkowski type for Sugeno integrals. 2793-2801 - Navid Imani, Hamid Sarbazi-Azad:

Properties of a hierarchical network based on the star graph. 2802-2813
Volume 180, Number 15, August 2010
- E. L. Yu, Ponnuthurai N. Suganthan

:
Ensemble of niching algorithms. 2815-2833 - Josep Domingo-Ferrer, Úrsula González-Nicolás:

Hybrid microdata using microaggregation. 2834-2844 - Tareq Z. Ahram, Pamela McCauley Bush, Waldemar Karwowski

:
Estimating intrinsic dimensionality using the multi-criteria decision weighted model and the average standard estimator. 2845-2855 - Daisuke Kitakoshi

, Hiroyuki Shioya, Ryohei Nakano:
Empirical analysis of an on-line adaptive system using a mixture of Bayesian networks. 2856-2874 - Lei-Da Li

, Xiaoping Yuan, Zhaolin Lu, Jeng-Shyang Pan
:
Rotation invariant watermark embedding based on scale-adapted characteristic regions. 2875-2888 - Ziba Eslami, Jamal Zarepour-Ahmadabadi:

A verifiable multi-secret sharing scheme based on cellular automata. 2889-2894 - Xuefei Cao, Weidong Kou, Xiaoni Du:

A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. 2895-2903 - Che-Nan Kuo, Sun-Yuan Hsieh:

Pancyclicity and bipancyclicity of conditional faulty folded hypercubes. 2904-2914
Volume 180, Number 16, August 2010
- Ying Zhao, Yanyu Lu, Yukun Tian, Liming Li, Qiushi Ren, Xinyu Chai:

Image processing based recognition of images with a limited number of pixels using simulated prosthetic vision. 2915-2924 - Shao-Hu Peng, Deok-Hwan Kim, Seok-Lyong Lee, Chin-Wan Chung:

A visual shape descriptor using sectors and shape context of contour lines. 2925-2939 - Sun Zheng:

An intensive restraint topology adaptive snake model and its application in tracking dynamic image sequence. 2940-2959 - Tongyan Li, Xingming Li:

Novel alarm correlation analysis system based on association rules mining in telecommunication networks. 2960-2978 - Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee, Murad Khalid, Ravi Sankar

:
Activity-oriented access control to ubiquitous hospital information and services. 2979-2990 - Zuqiang Long, Ximing Liang, Lirong Yang:

Some approximation properties of adaptive fuzzy systems with variable universe of discourse. 2991-3005 - Bart Van Gasse, Glad Deschrijver, Chris Cornelis

, Etienne E. Kerre:
Filters of residuated lattices and triangle algebras. 3006-3020 - Bijan Davvaz, M. Fathi, Abdul Razak Salleh:

Fuzzy hyperrings (Hv-rings) based on fuzzy universal sets. 3021-3032 - Mohammad Hossein Fazel Zarandi, Adel Alaeddini:

A general fuzzy-statistical clustering approach for estimating the time of change in variable sampling control charts. 3033-3044 - Chin-Chen Chang, The Duc Kieu:

A reversible data hiding scheme using complementary embedding strategy. 3045-3058 - Lein Harn, Changlu Lin:

Strong (n, t, n) verifiable secret sharing scheme. 3059-3064
Volume 180, Number 17, September 2010
- Jason J. Jung

, Ngoc Thanh Nguyen:
Virtual agent and organization modeling: Theory and applications. 3065-3066 - Longbing Cao

:
In-depth behavior understanding and use: The behavior informatics approach. 3067-3085 - Jianxin Li, Jinpeng Huai, Chunming Hu, Yanmin Zhu:

A secure collaboration service for dynamic virtual organizations. 3086-3107 - Tien Van Do

:
Modeling a resource contention in the management of virtual organizations. 3108-3116 - Beishui Liao, Huaxin Huang:

ANGLE: An autonomous, normative and guidable agent with changing knowledge. 3117-3139 - Guofu Zhang, Jianguo Jiang, Zhaopin Su, Meibin Qi, Hua Fang:

Searching for overlapping coalitions in multiple virtual organizations. 3140-3156 - Markus Gärtner, Ingo Seidel, Josef Froschauer, Helmut Berger:

The formation of virtual organizations by means of electronic institutions in a 3D e-Tourism environment. 3157-3169
- Bo-Yang Qu, Ponnuthurai N. Suganthan

:
Multi-objective evolutionary algorithms based on the summation of normalized objectives and diversified selection. 3170-3181 - Shyam Sundar

, Alok Singh
:
A swarm intelligence approach to the quadratic minimum spanning tree problem. 3182-3191 - Els Lefever, Timur Fayruzov, Véronique Hoste, Martine De Cock

:
Clustering web people search results using fuzzy ants. 3192-3209 - Nen-Fu Huang, Yih-Jou Tzang, Hong-Yi Chang, Chia-Wen Ho:

Enhancing P2P overlay network architecture for live multimedia streaming. 3210-3231 - Hajime Nobuhara, Dang Ba Khac Trieu, Tsutomu Maruyama, Barnabás Bede:

Max-plus algebra-based wavelet transforms and their FPGA implementation for image coding. 3232-3247 - Jason J. Jung

:
Reusing ontology mappings for query routing in semantic peer-to-peer environment. 3248-3257 - Kudret Demirli

, Sujikumar Vijayakumar:
Fuzzy logic based assignable cause diagnosis using control chart patterns. 3258-3272 - Xiao-Heng Chang

, Guang-Hong Yang:
Relaxed stabilization conditions for continuous-time Takagi-Sugeno fuzzy control systems. 3273-3287 - Radim Belohlávek, Tomas Kuhr

, Vilém Vychodil:
Confluence and termination of fuzzy relations. 3288-3303 - Irina Perfilieva

, Bernard De Baets
:
Fuzzy transforms of monotone functions with application to image compression. 3304-3315 - Tony Cheng-Kui Huang:

Knowledge gathering of fuzzy multi-time-interval sequential patterns. 3316-3334 - Bahram Karimi, Mohammad Bagher Menhaj

:
Non-affine nonlinear adaptive control of decentralized large-scale systems using neural networks. 3335-3347 - Babushri Srinivas Kedukodi

, Syam Prasad Kuncham
, Satyanarayana Bhavanari
:
Reference points and roughness. 3348-3361 - M. H. Shahzamanian

, Mahsa Shirmohammadi, Bijan Davvaz:
Roughness in Cayley graphs. 3362-3372 - Meijie Ma

:
The spanning connectivity of folded hypercubes. 3373-3379
Volume 180, Number 18, September 2010
- Dominik Fisch, Bernhard Kühbeck, Bernhard Sick

, Seppo J. Ovaska:
So near and yet so far: New insight into properties of some well-known classifier paradigms. 3381-3401 - Jin Xiao, Changzheng He, Xiaoyi Jiang

, Dunhu Liu:
A dynamic classifier ensemble selection approach for noise data. 3402-3421 - Hong Tang, Henri Maître, Nozha Boujemaa, Weiguo Jiang:

On the relevance of linear discriminative features. 3422-3433 - Qing Guo, Siyue Chen, Henry Leung, Shutian Liu:

Covariance intersection based image fusion technique with application to pansharpening in remote sensing. 3434-3443 - Haiping Ma:

An analysis of the equilibrium of migration models for biogeography-based optimization. 3444-3464 - Manuel Chica

, Oscar Cordón
, Sergio Damas
, Joaquín Bautista
:
Multiobjective constructive heuristics for the 1/3 variant of the time and space assembly line balancing problem: ACO and random greedy search. 3465-3487 - Anna Kolesárová, Radko Mesiar:

Lipschitzian De Morgan triplets of fuzzy connectives. 3488-3496 - Miroslav Ciric

, Manfred Droste, Jelena Ignjatovic, Heiko Vogler:
Determinization of weighted finite automata over strong bimonoids. 3497-3520 - Ping Zhu

, Qiaoyan Wen:
Some improved results on communication between information systems. 3521-3531 - Haixia Wu, Xiaofeng Liao, Wei Feng, Songtao Guo, Wei Zhang:

Robust stability for uncertain genetic regulatory networks with interval time-varying delays. 3532-3545 - Lu Zhen, Zuhua Jiang, Haitao Song:

Distributed recommender for peer-to-peer knowledge sharing. 3546-3561 - Irfan Siap

, Hasan Akin
, Ferhat Sah:
Garden of eden configurations for 2-D cellular automata with rule 2460 N. 3562-3571
Volume 180, Number 19, October 2010
- Enric Trillas, Itziar García-Honrado, Ana Pradera

:
Consequences and conjectures in preordered sets. 3573-3588 - Esra Kirci Ozorhan, Esat Kaan Kuban, Nihan Kesim Cicekli:

Automated composition of web services with the abductive event calculus. 3589-3613 - Yiquan Zhu, Yang Xu:

On filter theory of residuated lattices. 3614-3632 - Guido Fiorino:

Fast decision procedure for propositional Dummett logic based on a multiple premise tableau calculus. 3633-3646 - Chaoyi Pang, Rui Zhang, Qing Zhang, Junhu Wang

:
Dominating sets in directed graphs. 3647-3652 - Amory Bisserier, Reda Boukezzoula, Sylvie Galichet

:
A revisited approach to linear fuzzy regression using trapezoidal fuzzy intervals. 3653-3673 - José Antonio Sanz

, Alberto Fernández
, Humberto Bustince Sola, Francisco Herrera
:
Improving the performance of fuzzy rule-based classification systems with interval-valued fuzzy sets and genetic amplitude tuning. 3674-3685 - Ali Gürkan, Luca Iandoli, Mark Klein, Giuseppe Zollo:

Mediating debate through on-line large-scale argumentation: Evidence from the field. 3686-3702 - Sung Ho Ha:

Behavioral assessment of recoverable credit of retailer's customers. 3703-3717 - Chul-Ho Park, Seong-Moo Yoo, W. David Pan

:
LSM: A layer subdivision method for deformable object matching. 3718-3727 - L. Shaw, William M. Spears, L. Billings, Paul M. Maxim:

Effective vaccination policies. 3728-3744 - Zhanhong Shi, Zengtai Gong:

The further investigation of covering-based rough sets: Uncertainty characterization, similarity measure and generalized models. 3745-3763 - Xiaohong Zhang

, Yiyu Yao
, Hong Yu:
Rough implication operator based on strong topological rough algebras. 3764-3780 - Tzu-Liang Kung, Yuan-Hsiang Teng, Lih-Hsing Hsu:

The panpositionable panconnectedness of augmented cubes. 3781-3793 - Yuejuan Han, Jianxi Fan, Shukui Zhang, Jiwen Yang, Peide Qian:

Embedding meshes into locally twisted cubes. 3794-3805 - Huan Huang:

Some notes on Zadeh's extensions. 3806-3813 - Wen-Hung Kuo, Dar-Li Yang

:
Note on "Single-machine and flowshop scheduling with a general learning effect model" and "Some single-machine and m-machine flowshop scheduling problems with learning considerations". 3814-3816
Volume 180, Number 20, October 2010
- Fatma Nasoz

, Christine L. Lisetti
, Athanasios V. Vasilakos
:
Affectively intelligent and adaptive car interfaces. 3817-3836 - Luis Reynoso, M. Esperanza Manso, Marcela Genero

, Mario Piattini
:
Assessing the influence of import-coupling on OCL expression maintainability: A cognitive theory-based perspective. 3837-3862 - Xinjun Peng:

A nu-twin support vector machine (nu-TSVM) classifier and its geometric algorithms. 3863-3875 - Hengjian Li, Jiashu Zhang, Zutao Zhang

:
Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes. 3876-3893 - Shuaiqiang Wang

, Jun Ma, Qiang He, Jiancheng Wan:
Formal behavior modeling and effective automatic refinement. 3894-3913 - Ferdinando Di Martino, Vincenzo Loia, Salvatore Sessa:

Fuzzy transforms for compression and decompression of color videos. 3914-3931 - Silvia Abrahão

, Jaime Gómez, Emilio Insfrán
:
Validating a size measure for effort estimation in model-driven Web development. 3932-3954 - Rosfuzah Roslan, Razib M. Othman, Zuraini Ali Shah, Shahreen Kasim

, Hishammuddin Asmuni, Jumail Taliba, Rohayanti Hassan, Zalmiyah Zakaria:
Incorporating multiple genomic features with the utilization of interacting domain patterns to improve the prediction of protein-protein interactions. 3955-3973 - Mehmet Gulek, Ismail Hakki Toroslu

:
A dynamic programming algorithm for tree-like weighted set packing problem. 3974-3979 - Rodrigo Rodrigues Sumar

, Antonio Augusto Rodrigues Coelho, Leandro dos Santos Coelho
:
Computational intelligence approach to PID controller design using the universal model. 3980-3991 - Isabel Aguiló, Jaume Suñer, Joan Torrens

:
A characterization of residual implications derived from left-continuous uninorms. 3992-4005 - Branka Budimirovic, Vjekoslav Budimirovic, Andreja Tepavcevic

:
Fuzzy epsilon-subgroups. 4006-4014 - Jun Li, Radko Mesiar, Peter Struk:

Pseudo-optimal measures. 4015-4021 - Yingwei Li, Huaiqin Wu:

Global stability analysis in Cohen-Grossberg neural networks with delays and inverse Hölder neuron activation functions. 4022-4030 - Liu Wenyin, Xiaojun Quan

, Min Feng, Bite Qiu:
A short text modeling method combining semantic and statistical information. 4031-4041 - Hongbing Wang, Zhenfu Cao

, Licheng Wang:
Multi-use and unidirectional identity-based proxy re-encryption schemes. 4042-4059 - Tsung-Ching Lin, Hung-Peng Lee, Hsin-Chiu Chang, Shao-I Chu, Trieu-Kien Truong:

High speed decoding of the binary (47, 24, 11) quadratic residue code. 4060-4068 - Xianfeng Guo

, Jiashu Zhang:
Secure group key agreement protocol based on chaotic Hash. 4069-4074 - Ming-Chien Yang:

Constructing edge-disjoint spanning trees in twisted cubes. 4075-4083 - Mehmet Koç

, Atalay Barkana, Ömer Nezih Gerek
:
A fast method for the implementation of common vector approach. 4084-4098
Volume 180, Number 21, November 2010
- Willem Waegeman, Bernard De Baets

:
A transitivity analysis of bipartite rankings in pairwise multi-class classification. 4099-4117 - Wook-Shin Han, Woong-Kee Loh, Kyu-Young Whang:

Type-level access pattern view: Enhancing prefetching performance using the iterative and recursive patterns. 4118-4135 - Marcos Eduardo Valle

:
Permutation-based finite implicative fuzzy associative memories. 4136-4152 - Giuseppe Calcagno, Antonino Staiano

, Giuliana Fortunato
, Vincenzo Brescia-Morra, Elena Salvatore
, Rosario Liguori, Silvana Capone, Alessandro Filla, Giuseppe Longo, Lucia Sacchetti:
A multilayer perceptron neural network-based approach for the identification of responsiveness to interferon therapy in multiple sclerosis patients. 4153-4163 - Sergio Guadarrama, Antonio Ruiz-Mayor:

Approximate robotic mapping from sonar data by modeling perceptions with antonyms. 4164-4188 - Marian Grendár Jr.

, Robert K. Niven
:
The Pólya information divergence. 4189-4194 - Somayeh Zarezadeh, Majid Asadi:

Results on residual Rényi entropy of order statistics and record values. 4195-4206 - Ting-Yu Chen

, Chia-Hang Li:
Determining objective weights with intuitionistic fuzzy entropy measures: A comparative analysis. 4207-4222
Volume 180, Number 22, November 2010
- Efrén Mezura-Montes

, Mariana Edith Miranda-Varela, Rubí del Carmen Gómez-Ramón:
Differential evolution in constrained numerical optimization: An empirical study. 4223-4262 - Frank S. C. Tseng, Yen-Hung Kuo, Yueh-Min Huang:

Toward boosting distributed association rule mining by data de-clustering. 4263-4289 - Ana Belén Barragáns-Martínez

, Enrique Costa-Montenegro
, Juan C. Burguillo-Rial
, Marta Rey-López, Fernando A. Mikic-Fonte
, Ana Peleteiro-Ramallo:
A hybrid content-based and item-based collaborative filtering approach to recommend TV programs enhanced with singular value decomposition. 4290-4311 - Stefano Moretti, Athanasios V. Vasilakos

:
An overview of recent applications of Game Theory to bioinformatics. 4312-4322 - Inma P. Cabrera

, Pablo Cordero, Gloria Gutiérrez
, Javier Martínez, Manuel Ojeda-Aciego
:
A coalgebraic approach to non-determinism: Applications to multilattices. 4323-4335 - Kai Liu, Victor C. S. Lee

:
On-demand broadcast for multiple-item requests in a multiple-channel environment. 4336-4352 - Junjie Wu, Hua Yuan, Hui Xiong, Guoqing Chen:

Validation of overlapping clustering: A random clustering perspective. 4353-4369 - Min Gan

, Hui Peng
, Xiaoyan Peng, Xiaohong Chen, Garba Inoussa:
A locally linear RBF network-based state-dependent AR model for nonlinear time series modeling. 4370-4383 - Qinghua Hu, Shuang An, Daren Yu:

Soft fuzzy rough sets for robust feature evaluation and selection. 4384-4400 - Qiang Shen

, Ruiqing Zhao:
Risk assessment of serious crime with fuzzy random theory. 4401-4411 - Zhihui Li, Ting Xue, Hong Lai:

Secret sharing schemes from binary linear codes. 4412-4419 - Peng Xu

, Guohua Cui, Feng-Yu Lei, Jing-Fang Xu:
One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity. 4420-4429 - Lingye Wu, Erfang Shan, Zengrong Liu:

On the k-tuple domination of generalized de Brujin and Kautz digraphs. 4430-4435 - Xiaojuan Cai:

A pure labeled transition semantics for the applied pi calculus. 4436-4458
Volume 180, Number 23, December 2010
- Rudolf Seising:

Cybernetics, system(s) theory, information theory and Fuzzy Sets and Systems in the 1950s and 1960s. 4459-4476 - Sergio Alonso

, Enrique Herrera-Viedma
, Francisco Chiclana
, Francisco Herrera
:
A web based consensus support system for group decision making problems and incomplete preferences. 4477-4495 - Amelia Zafra

, Sebastián Ventura
:
G3P-MI: A genetic programming algorithm for multiple instance learning. 4496-4513 - Qi Wu, Rob Law

:
Complex system fault diagnosis based on a fuzzy robust wavelet support vector classifier and an adaptive Gaussian particle swarm optimization. 4514-4528 - Wen-Hsien Ho, Shinn-Horng Chen, Tung-Kuan Liu, Jyh-Horng Chou:

Design of robust-optimal output feedback controllers for linear uncertain systems using LMI-based approach and genetic algorithm. 4529-4542 - Guiyi Wei, Yun Ling, Athanasios V. Vasilakos

, Bin Xiao
, Yao Zheng:
PIVOT: An adaptive information discovery framework for computational grids. 4543-4556 - V. Alba Fernández

, María-Dolores Jiménez-Gamero
, B. Lagos-Álvarez:
Divergence statistics for testing uniform association in cross-classifications. 4557-4571 - Byeong Seok Ahn

:
A priori identification of preferred alternatives of OWA operators by relational analysis of arguments. 4572-4581 - Choon Ki Ahn

:
Passive learning and input-to-state stability of switched Hopfield neural networks with time-delay. 4582-4594 - Yi-Kuei Lin:

A method to evaluate routing policy through p minimal paths for stochastic case. 4595-4605 - M. Arun Kumar, Reshma Khemchandani

, Madan Gopal, Suresh Chandra:
Knowledge based Least Squares Twin support vector machines. 4606-4618 - Shaocheng Tong, Yongming Li:

Fuzzy adaptive robust backstepping stabilization for SISO nonlinear systems with unknown virtual control direction. 4619-4640 - Tzuu-Hseng S. Li, Yun-Cheng Huang:

MIMO adaptive fuzzy terminal sliding-mode controller for robotic manipulators. 4641-4660 - Jiancheng Zhang, Xiyang Yang:

Some properties of fuzzy reasoning in propositional fuzzy logic systems. 4661-4671 - Bin Zhao, Weidong Kou, Hui Li, Lanjun Dang, Jun Zhang

:
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol. 4672-4684 - Tao Zhang, Wenxiang Li, Yan Zhang, Ergong Zheng, Xijian Ping:

Steganalysis of LSB matching based on statistical modeling of pixel difference distributions. 4685-4694 - Yi Guo, Zhiqing Shao, Nan Hua:

A cognitive interactionist sentence parser with simple recurrent networks. 4695-4705 - Zengfeng Tian, Liangjian Hu, David Greenhalgh:

Perturbation analysis of fuzzy linear systems. 4706-4713 - Hong Yuan, Futai Zhang, Xinyi Huang, Yi Mu, Willy Susilo

, Lei Zhang:
Certificateless threshold signature scheme from bilinear maps. 4714-4728 - Tsung-Ching Lin, Hsin-Chiu Chang, Hung-Peng Lee, Trieu-Kien Truong:

On the decoding of the (24, 12, 8) Golay code. 4729-4736
Volume 180, Number 24, December 2010
- Pierpaolo D'Urso

, Riccardo Massari
, Adriana Santoro:
A class of fuzzy clusterwise regression models. 4737-4762 - Stijn Lievens, Bernard De Baets

:
Supervised ranking in the weka environment. 4763-4771 - Shyi-Ming Chen

, Yu-Chuan Chang:
Multi-variable fuzzy forecasting based on fuzzy clustering and fuzzy rule interpolation techniques. 4772-4783 - Ricardo de A. Araújo:

Swarm-based translation-invariant morphological prediction method for financial time series forecasting. 4784-4805 - Yonghun Park, Dongmin Seo, Jonghyeon Yun, Christopher T. Ryu, Jun Kim, Jaesoo Yoo:

An efficient data-centric storage method using time parameter for sensor networks. 4806-4817 - Chuan-Kang Ting

, Chien-Chih Liao:
A memetic algorithm for extending wireless sensor network lifetime. 4818-4833 - Zhi-Jie Zhou, Chang-Hua Hu, Dong-Ling Xu

, Jian-Bo Yang
, Dong-Hua Zhou:
New model for system behavior prediction based on belief rule based systems. 4834-4864 - Lidong Wang, Xiaodong Liu, Jiannong Cao

:
A new algebraic structure for formal concept analysis. 4865-4876 - Serkan Genç, Fatih Emre Boran

, Diyar Akay
, Zeshui Xu
:
Interval multiplicative transitivity for consistency, missing values and priority weights of interval fuzzy preference relations. 4877-4891 - Tzu-Chao Lin:

Switching-based filter based on Dempster's combination rule for image processing. 4892-4908 - Rafiullah Chamlawi

, Asifullah Khan
:
Digital image authentication and recovery: Employing integer transform based information embedding and extraction. 4909-4928 - Qing Li, Jia Wang, Yuanzhu Peter Chen, Zhangxi Lin:

User comments for news recommendation in forum-based social media. 4929-4939 - Anthony Chiu Wa Lo, Tansel Özyer, Radwan Tahboub, Keivan Kianmehr, Jamal Jida, Reda Alhajj:

XML materialized views and schema evolution in VIREX. 4940-4957 - Nuno Homem, João Paulo Carvalho

:
Finding top-k elements in data streams. 4958-4974 - Alsayed Algergawy

, Richi Nayak
, Gunter Saake:
Element similarity measures in XML schema matching. 4975-4998 - Shesheng Gao, Yongmin Zhong

, Bijan Shirinzadeh:
Random weighting estimation for fusion of multi-dimensional position data. 4999-5007 - Nimmy Ravindran, Yao Liang, Xu Liang:

A labeled-tree approach to semantic and structural data interoperability applied in hydrology domain. 5008-5028 - Yongfu Wang, Tianyou Chai, Yimin Zhang:

State observer-based adaptive fuzzy output-feedback control for a class of uncertain nonlinear systems. 5029-5040 - Abdesselem Boulkroune

, Mohammed M'Saad, Hachemi Chekireb:
Design of a fuzzy adaptive controller for MIMO nonlinear time-delay systems with unknown actuator nonlinearities and unknown control direction. 5041-5059 - Stelios E. Papadakis

, Vassilis G. Kaburlasos
:
Piecewise-linear approximation of non-linear models based on probabilistically/possibilistically interpreted intervals' numbers (INs). 5060-5076 - Jian Weng

, Robert H. Deng
, Shengli Liu, Kefei Chen:
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. 5077-5089 - Chia-Jui Lai, Chang-Hsiung Tsai, Hong-Chun Hsu, Tseng-Kuei Li:

A dynamic programming algorithm for simulation of a multi-dimensional torus in a crossed cube. 5090-5100 - Thomas Vetterlein

:
Pseudo-BCK algebras as partial algebras. 5101-5114 - Shan Zhao, Xue-ping Wang

:
Invertible matrices and semilinear spaces over commutative semirings. 5115-5124 - Babington B. Makamba, Venkat Murali:

Preferential normal fuzzy subgroups. 5125-5129 - Qiansheng Zhang, Shengyi Jiang, Baoguo Jia, Shihua Luo:

Some information measures for interval-valued intuitionistic fuzzy sets. 5130-5145

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














