


Остановите войну!
for scientists:


default search action
Information Sciences, Volume 181
Volume 181, Number 1, January 2011
- Michel Grabisch, Jean-Luc Marichal, Radko Mesiar, Endre Pap:
Aggregation functions: Means. 1-22 - Michel Grabisch, Jean-Luc Marichal, Radko Mesiar, Endre Pap:
Aggregation functions: Construction methods, conjunctive, disjunctive and mixed classes. 23-43 - Eduardo Fernández, Edy Lopez, Fernando López Irarragorri, Carlos A. Coello Coello
:
Increasing selective pressure towards the best compromise in evolutionary multiobjective optimization: The extended NOSGA method. 44-56 - Matthias Dehmer, Abbe Mowshowitz:
A history of graph entropy measures. 57-78 - Nizar Hachicha, Bassem Jarboui
, Patrick Siarry:
A fuzzy logic control using a differential evolution algorithm aimed at modelling the financial market dynamics. 79-91 - Laihong Hu, Fuchun Sun, Hualong Xu, Huaping Liu, Xuejun Zhang:
Mutation Hopfield neural network and its applications. 92-105 - Yuehui Chen, Bin Yang, Qingfang Meng, Yaou Zhao, Ajith Abraham:
Time-series forecasting using a system of ordinary differential equations. 106-114 - Sebastián Maldonado
, Richard Weber
, Jayanta Basak:
Simultaneous feature selection and classification using kernel-penalized support vector machines. 115-128 - S. J. Overbeek, Patrick van Bommel, Henderik Alex Proper
:
Statics and dynamics of cognitive and qualitative matchmaking in task fulfillment. 129-149 - Zeshui Xu, Xiaoqiang Cai:
Group consensus algorithms based on preference relations. 150-162 - Hai Zhao, Chunyu Kit
:
Integrating unsupervised and supervised word segmentation: The role of goodness measures. 163-183 - Zong Min Ma
, Jian Liu, Li Yan:
Matching twigs in fuzzy XML. 184-200 - Kelvin Sim, Guimei Liu
, Vivekanand Gopalkrishnan, Jinyan Li:
A case study on financial ratios via cross-graph quasi-bicliques. 201-216 - Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:
A communication-efficient three-party password authenticated key exchange protocol. 217-226 - Ercan Solak, Cahit Çokal:
Algebraic break of image ciphers based on discretized chaotic map lattices. 227-233 - Junghyun Nam, Juryon Paik
, Dongho Won:
A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol. 234-238 - Yonghong Xiang, Iain A. Stewart
:
Augmented k-ary n-cubes. 239-256
Volume 181, Number 2, January 2011
- Steven Schockaert
, Philip David Smart, Florian A. Twaroch:
Generating approximate region boundaries from heterogeneous spatial information: An evolutionary approach. 257-283 - Yu-Chi Chung, I-Fang Su, Chiang Lee:
An efficient mechanism for processing similarity search queries in sensor networks. 284-307 - Hao Luo, Fa-Xin Yu, Hua Chen, Zheng-Liang Huang, Hui Li, Ping-Hui Wang:
Reversible data hiding based on block median preservation. 308-328 - Ahmed Younes
:
Enhancing the security of quantum communication by hiding the message in a superposition. 329-334 - Abhishek Parakh, Subhash C. Kak:
Space efficient secret sharing for implicit data security. 335-341 - Przemyslaw Grzegorzewski
:
On possible and necessary inclusion of intuitionistic fuzzy sets. 342-350 - Je Yeon Oh, Nam Wook Cho, Hoontae Kim, Yunhong Min, Suk-Ho Kang:
Dynamic execution planning for reliable collaborative business processes. 351-361 - Vikas K. Sharma
, Manju Agarwal, Kanwar Sen:
Reliability evaluation and optimal design in heterogeneous multi-state series-parallel systems. 362-378
Volume 181, Number 3, February 2011
- Stéphane Zieba, Philippe Polet
, Frédéric Vanderhaegen:
Using adjustable autonomy and human-machine cooperation to make a human-machine system resilient - Application to a ground robotic system. 379-397 - Yen-Liang Chen, Shin-yi Wu, Yu-Cheng Wang
:
Discovering multi-label temporal patterns in sequence databases. 398-418 - Gunjan Mansingh, Kweku-Muata Osei-Bryson, Han Reichgelt
:
Using ontologies to facilitate post-processing of association rules by domain experts. 419-434 - Jaegyoon Ahn, Youngmi Yoon, Sanghyun Park:
Noise-robust algorithm for identifying functionally associated biclusters from gene expression data. 435-449 - Santi P. Maity, Malay K. Kundu:
Perceptually adaptive spread transform image watermarking scheme using Hadamard transform. 450-465 - Bernard De Baets
, Hans E. De Meyer, Radko Mesiar:
Piecewise linear aggregation functions based on triangulation. 466-478 - Ting-Yu Chen
:
Optimistic and pessimistic decision making with dissonance reduction using interval-valued fuzzy sets. 479-502 - Daoyuan Zhai, Jerry M. Mendel:
Uncertainty measures for general Type-2 fuzzy sets. 503-518 - Cecilia Leal Ramírez, Oscar Castillo
, Patricia Melin
, Antonio Rodríguez Díaz
:
Simulation of the bird age-structured population growth based on an interval type-2 fuzzy cellular structure. 519-535 - Przemyslaw Grzegorzewski
:
The inclusion-exclusion principle for IF-events. 536-546 - Frank Markham Brown:
Comments on a numerical method for solving Boolean equations. 547-551 - Elizabeth Montero
, María Cristina Riff:
On-the-fly calibrating strategies for evolutionary algorithms. 552-566 - Yun Wen, Hua Xu, Jiadong Yang:
A heuristic-based hybrid genetic-variable neighborhood search algorithm for task scheduling in heterogeneous multiprocessor system. 567-581 - Yi-Kuei Lin, Cheng-Ta Yeh:
Computer network reliability optimization under double-resource assignments subject to a transmission budget. 582-599 - Ana Cristina Vieira de Melo, Paulo Silveira:
Improving data perturbation testing techniques for Web services. 600-619 - Jheng-Cheng Chen, Chang-Hsiung Tsai:
Conditional edge-fault-tolerant Hamiltonicity of dual-cubes. 620-627 - Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang:
Provably secure identity-based authenticated key agreement protocols with malicious private key generators. 628-647 - Jia Yu, Rong Hao, Fanyu Kong, Xiangguo Cheng, Jianxi Fan, Yangkui Chen:
Forward-secure identity-based signature: Security notions and construction. 648-660 - Jian Weng, Guoxiang Yao, Robert H. Deng
, Min-Rong Chen, Xiangxue Li:
Cryptanalysis of a certificateless signcryption scheme in the standard model. 661-667 - Quan-Ke Pan
, Ling Wang, Liang Gao
, Weidong Li:
An effective hybrid discrete differential evolution algorithm for the flow shop scheduling with intermediate buffers. 668-685 - Hongbo Song
, Li Yu, Wen-an Zhang:
Networked Hinfinity filtering for linear discrete-time systems. 686-696
- V. Alba Fernández
, María-Dolores Jiménez-Gamero
, B. Lagos-Álvarez:
Erratum to "Divergence statistics for testing uniform association in cross-classifications" [Inform. Sci. 180 (2010) 4557-4571]. 697
Volume 181, Number 4, February 2011
- Ashish Ghosh
, Niladri Shekhar Mishra, Susmita Ghosh
:
Fuzzy clustering algorithms for unsupervised change detection in remote sensing images. 699-715 - Ming-Chao Chiang, Chun-Wei Tsai, Chu-Sing Yang:
A time-efficient pattern reduction algorithm for k-means clustering. 716-731 - Jong-Seok Lee, Sigurdur Ólafsson:
Data clustering by minimizing disconnectivity. 732-746 - Michaël Rademaker, Bernard De Baets
:
Optimal restoration of stochastic monotonicity with respect to cumulative label frequency loss functions. 747-757 - Fernando Bobillo, Umberto Straccia
:
Reasoning with the finitely many-valued Lukasiewicz fuzzy Description Logic SROIQ. 758-778 - Shaosheng Zhou, Wenyan Ren, James Lam:
Stabilization for T-S model based uncertain stochastic systems. 779-791 - Zhengxia Wang, Xiaofeng Liao, Songtao Guo, Haixia Wu:
Mean square exponential stability of stochastic genetic regulatory networks with time-varying delays. 792-811 - Biao Qin, Shan Wang:
Combining intensional with extensional query evaluation in tuple independent probabilistic databases. 812-831 - Bih-Sheue Shieh:
Minimizing a linear objective function under a fuzzy max-t norm relation equation constraint. 832-841 - Tien-Fu Liang:
Application of fuzzy sets to manufacturing/distribution planning decisions in supply chains. 842-854 - José Juan Pazos-Arias, Ana Fernández Vilas
, Rebeca P. Díaz Redondo
, Alberto Gil-Solla
, Manuel Ramos Cabrer
, Jorge García Duque:
Making the most of TV on the move: My newschannel. 855-868 - Weifa Liang
, Baichen Chen, Jeffrey Xu Yu:
Top-k query evaluation in sensor networks under query response time constraint. 869-882 - Ivana Turnu, Giulio Concas, Michele Marchesi
, Sandro Pinna, Roberto Tonelli
:
A modified Yule process to model the evolution of some object-oriented system properties. 883-902 - I. Álvarez Illán
, J. M. Górriz
, Javier Ramírez
, Diego Salas-Gonzalez
, M. M. López
, Fermín Segovia
, Rosa Chaves, Manuel Gómez-Río, Carlos García Puntonet
:
18F-FDG PET imaging analysis for computer aided Alzheimer's diagnosis. 903-916 - Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu:
An efficient key assignment scheme for access control in a large leaf class hierarchy. 917-925 - Mu Han, Youpei Ye, Shixin Zhu, Chungen Xu
, Bennian Dou:
Cyclic codes over R = Fp + uFp ++ uk-1Fp with length psn. 926-934
Volume 181, Number 5, March 2011
- Mario G. C. A. Cimino
, Francesco Marcelloni
:
Autonomic tracing of production processes with mobile and agent-based computing. 935-953 - Rodrigo C. Barros
, Duncan D. Ruiz
, Márcio P. Basgalupp
:
Evolutionary model trees for handling continuous classes in machine learning. 954-971 - Chao-Ton Su, Hung-Chun Lin:
Applying electromagnetism-like mechanism for feature selection. 972-986 - Jerzy Blaszczynski
, Roman Slowinski
, Marcin Szelag
:
Sequential covering rule induction algorithm for variable consistency rough set approaches. 987-1002 - Yongming Li
:
Finite automata theory with membership values in lattices. 1003-1017 - Zhongfeng Qin, Manying Bai, Dan A. Ralescu:
A fuzzy control system with application to production planning problems. 1018-1027 - Ahmet Zengin:
Modeling discrete event scalable network systems. 1028-1043
Volume 181, Number 6, March 2011
- Rafik A. Aliev, Alex Tserkovny:
Systemic approach to fuzzy logic formalization for approximate reasoning. 1045-1059 - Peng-Gang Sun, Lin Gao, Shan Shan Han:
Identification of overlapping and non-overlapping community structure by fuzzy clustering in complex networks. 1060-1071 - Hamzeh Agahi, Heriberto Román-Flores, A. Flores-Franulic:
General Barnes-Godunova-Levin type inequalities for Sugeno integral. 1072-1079 - Yiyu Yao
:
The superiority of three-way decisions in probabilistic rough set models. 1080-1096 - A. Mani
:
Choice inclusive general rough semantics. 1097-1115 - Gleb Beliakov
, Humberto Bustince Sola, D. P. Goswami, U. K. Mukherjee, Nikhil R. Pal:
On averaging operators for Atanassov's intuitionistic fuzzy sets. 1116-1124 - Feng Feng
, Xiaoyan Liu, Violeta Leoreanu Fotea, Young Bae Jun:
Soft sets and soft rough sets. 1125-1137 - Rui Xia, Chengqing Zong
, Shoushan Li:
Ensemble of feature sets and classification algorithms for sentiment classification. 1138-1152 - Chao-Li Sun, Jianchao Zeng, Jeng-Shyang Pan
:
An improved vector particle swarm optimization for constrained optimization problems. 1153-1163 - Wen-Chiung Lee, Peng-Jen Lai:
Scheduling problems with general effects of deterioration and learning. 1164-1170 - Zhiliang Zhu, Wei Zhang, Kwok-Wo Wong, Hai Yu
:
A chaos-based symmetric image encryption scheme using a bit-level permutation. 1171-1186
Volume 181, Number 7, April 2011
- Elizabeth Ann Maharaj
, Pierpaolo D'Urso
:
Fuzzy clustering of time series in the frequency domain. 1187-1211 - Jun Zhao, Quanli Liu, Wei Wang, Zhuoqun Wei, Peng Shi:
A parallel immune algorithm for traveling salesman problem and its application on cold rolling scheduling. 1212-1223 - Dan Simon, Richard Allen Rarick, Mehmet Ergezer, Dawei Du:
Analytical and numerical comparisons of biogeography-based optimization and genetic algorithms. 1224-1248 - M. Tariq Mahmood
, Abdul Majid, Tae-Sun Choi
:
Optimal depth estimation by combining focus measures using genetic programming. 1249-1263 - Ling Chen, Mingqi Lv, Qian Ye, Gencai Chen, John Woodward:
A personal route prediction system based on trajectory data mining. 1264-1284 - Pasquale De Meo
, Antonino Nocera
, Giorgio Terracina
, Domenico Ursino
:
Recommendation of similar users, resources and social networks in a Social Internetworking Scenario. 1285-1305 - Francesca Arcelli Fontana
, Marco Zanoni
:
A tool for design pattern detection and software architecture reconstruction. 1306-1324 - Mohammad Biglarbegian, William W. Melek, Jerry M. Mendel:
On the robustness of Type-1 and Interval Type-2 fuzzy logic systems in modeling. 1325-1347 - Bahram Farhadinia:
Necessary optimality conditions for fuzzy variational problems. 1348-1357 - Zorana Jancic
, Jelena Ignjatovic, Miroslav Ciric
:
An improved algorithm for determinization of weighted and fuzzy automata. 1358-1368 - Lianzhen Liu:
States on finite monoidal t-norm based algebras. 1369-1383 - Badong Chen, Yu Zhu, Jinchun Hu, José C. Príncipe:
Δ-Entropy: Definition, properties and applications in system identification with quantized data. 1384-1402 - Ching-Fang Hsu, Qi Cheng, Xueming Tang, Bing Zeng:
An ideal multi-secret sharing scheme based on MSP. 1403-1409
Volume 181, Number 8, April 2011
- Prithwish Chakraborty, Swagatam Das
, Gourab Ghosh Roy
, Ajith Abraham:
On convergence of the multi-objective particle swarm optimizers. 1411-1425 - Eduard Bartl, Radim Belohlávek:
Knowledge spaces with graded knowledge states. 1426-1439 - József Dombi
:
DeMorgan systems with an infinitely many negations in the strict monotone operator case. 1440-1453 - Valery M. Kirzhner, S. Frenkel, Abraham B. Korol:
Minimal-dot plot: "Old tale in new skin" about sequence comparison. 1454-1462 - Pei-Yan Pai, Chin-Chen Chang, Yung-Kuan Chan, Meng-Hsiun Tsai:
An adaptable threshold detector. 1463-1483 - Chenglong Yu
, Mo Deng, Stephen S.-T. Yau:
DNA sequence comparison by a novel probabilistic method. 1484-1492 - Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee
, Hyunrok Lee, Kwangjo Kim:
New receipt-free voting scheme using double-trapdoor commitment. 1493-1502
Volume 181, Number 9, May 2011
- Jesús Serrano-Guerrero
, Enrique Herrera-Viedma
, José Angel Olivas, Andres Cerezo, Francisco P. Romero:
A google wave-based fuzzy recommender system to disseminate information in University Digital Libraries 2.0. 1503-1516 - Dagoberto Castellanos Nieves
, Jesualdo Tomás Fernández-Breis
, Rafael Valencia-García
, Rodrigo Martínez-Béjar
, Miguela Iniesta-Moreno:
Semantic Web Technologies for supporting learning assessment. 1517-1537 - Bolanle Adefowoke Ojokoh, Ming Zhang, Jian Tang:
A trigram hidden Markov model for metadata extraction from heterogeneous references. 1538-1551 - Duen-Ren Liu, Pei-Yun Tsai, Po-Huan Chiu:
Personalized recommendation of popular blog articles for mobile applications. 1552-1572 - Matthias Delafontaine, Peter Bogaert, Anthony G. Cohn, Frank Witlox
, Philippe De Maeyer
, Nico Van de Weghe
:
Inferring additional knowledge from QTCN relations. 1573-1590 - Rafik A. Aliev, Witold Pedrycz, Babek Guirimov, Rashad R. Aliev, Umit Ilhan
, Mustafa Babagil, Sadik Mammadli:
Type-2 fuzzy neural networks with fuzzy clustering and differential evolution optimization. 1591-1608 - Jacqueline Christmas
, Edward C. Keedwell, Timothy M. Frayling, John R. B. Perry:
Ant colony optimisation to identify genetic variant association with type 2 diabetes. 1609-1622 - Kit Yan Chan, Tharam Singh Dillon, C. K. Kwong
:
Polynomial modeling for time-varying systems based on a particle swarm optimization algorithm. 1623-1640 - Hideki Katagiri, Masatoshi Sakawa:
Interactive multiobjective fuzzy random programming through the level set-based probability model. 1641-1650 - Yuh-Jen Chen:
Structured methodology for supplier selection and evaluation in a supply chain. 1651-1670 - Ngo Anh Vien, Hwanjo Yu, TaeChoong Chung:
Hessian matrix distribution for Bayesian policy gradient reinforcement learning. 1671-1685 - Dan Ye, Guang-Hong Yang:
Robust switching-type H∞ filter design for linear uncertain systems with time-varying delay. 1686-1699 - Zhi-gang Su, Pei-hong Wang, Xiang-jun Yu, Zhen-zhong Lv:
Maximal confidence intervals of the interval-valued belief structure and applications. 1700-1721 - Jim Z. C. Lai, Tsung-Jen Huang:
An agglomerative clustering algorithm using a dynamic k-nearest-neighbor list. 1722-1734 - Ziqiu Yun, Xun Ge, Xiaole Bai:
Axiomatization and conditions for neighborhoods in a covering to form a partition. 1735-1740 - Kamal Zuhairi Zamli, Mohammad F. J. Klaib, Mohammed Issam Younis
, Nor Ashidi Mat Isa
, Rusli Abdullah
:
Design and implementation of a t-way test data generation strategy with automated execution tool support. 1741-1758 - Bijan Davvaz, Asghar Khan:
Characterizations of regular ordered semigroups in terms of (α, β)-fuzzy generalized bi-ideals. 1759-1770
Volume 181, Number 10, May 2011
- Vassilis G. Kaburlasos
:
Special issue: Information engineering applications based on lattices. 1771-1773