


default search action
Information Sciences, Volume 295
Volume 295, February 2015
- Caiming Zhong, Mikko I. Malinen, Duoqian Miao, Pasi Fränti:

A fast minimum spanning tree algorithm based on K-means. 1-17 - Rafal Drezewski

, Jan Sepielak, Wojciech Filipkowski
:
The application of social network analysis algorithms in a system supporting money laundering detection. 18-32 - Yuan Jiang, Zeshui Xu

, Xiaohan Yu:
Group decision making based on incomplete intuitionistic multiplicative preference relations. 33-52 - Lu Tan, Mingyuan Hu, Hui Lin:

Agent-based simulation of building evacuation: Combining human behavior with predictable spatial accessibility in a fire emergency. 53-66 - Shubhajeet Chatterjee, Swagatam Das

:
Ant colony optimization based enhanced dynamic source routing algorithm for mobile Ad-hoc network. 67-90 - RajeshKanna Ala, Dong Hwan Kim

, Sung Yul Shin, ChangHwan Kim, Sung-Kee Park:
A 3D-grasp synthesis algorithm to grasp unknown objects based on graspable boundary and convex segments. 91-106 - Majid Abdollahzade, Arash Miranian, Hossein Hassani, Hossein Iranmanesh

:
A new hybrid enhanced local linear neuro-fuzzy model based on the optimized singular spectrum analysis and its application for nonlinear and chaotic time series forecasting. 107-125 - Mansoor Davoodi

, Ali Mohades
, Farnaz Sheikhi
, Payam Khanteimouri
:
Data imprecision under λ-geometry model. 126-144 - Hacene Habbi, Yassine Boudouaoui, Dervis Karaboga

, Celal Öztürk
:
Self-generated fuzzy systems design using artificial bee colony optimization. 145-159 - Enrique Bermejo Nievas

, Oscar Cordón
, Sergio Damas
, José Santamaría
:
A comparative study on the application of advanced bacterial foraging models to image registration. 160-181 - Zengtai Gong, Lu Zhang, Xinyun Zhu:

The statistical convergence for sequences of fuzzy-number-valued functions. 182-195 - Changming Zhu, Zhe Wang, Daqi Gao, Xiang Feng:

Double-fold localized multiple matrixized learning machine. 196-220 - Yanfeng Shi, Qingji Zheng, Jiqiang Liu, Zhen Han:

Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. 221-231 - Jun Liu, Ting-Zhu Huang, Ivan W. Selesnick, Xiao-Guang Lv, Po-Yu Chen:

Image restoration using total variation with overlapping group sparsity. 232-246 - Effat Farhana, M. Sohel Rahman:

Constrained sequence analysis algorithms in computational biology. 247-257 - Joe Tekli

, Richard Chbeir
, Agma J. M. Traina, Caetano Traina Jr.
, Renato Fileto:
Approximate XML structure validation based on document-grammar tree similarity. 258-302 - Ting-Yu Chen

:
Likelihoods of interval type-2 trapezoidal fuzzy preference relations and their application to multiple criteria decision analysis. 303-322 - Kun Sun, Peiran Li, Wenbing Tao, Yuanyan Tang:

Feature Guided Biased Gaussian Mixture Model for image matching. 323-336 - Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou:

Cryptanalysis and improvement of a certificateless aggregate signature scheme. 337-346 - Jana Borzová-Molnárová

, Lenka Halcinová
, Ondrej Hutník
:
Probabilistic-valued decomposable set functions with respect to triangle functions. 347-357 - Ana Maria Palacios, José Luis Palacios, Luciano Sánchez

, Jesús Alcalá-Fdez
:
Genetic learning of the membership functions for mining fuzzy association rules from low quality data. 358-378 - Jinglei Liu, Shizhong Liao:

Expressive efficiency of two kinds of specific CP-nets. 379-394 - Xuezhi Wen, Ling Shao

, Yu Xue, Wei Fang
:
A rapid learning algorithm for vehicle classification. 395-406 - Sedigheh Mahdavi, Mohammad Ebrahim Shiri, Shahryar Rahnamayan:

Metaheuristics in large-scale global continues optimization: A survey. 407-428 - Manzoor Ahmad Zahid, Harrie C. M. de Swart

:
The Borda Majority Count. 429-440 - Farman Ali

, Eun Kyoung Kim, Yong-Gi Kim:
Type-2 fuzzy ontology-based semantic knowledge for collision avoidance of autonomous underwater vehicles. 441-464 - Ali Rezaei Divroodi, Linh Anh Nguyen:

On bisimulations for description logics. 465-493 - Shahin Rostami

, Dean O'Reilly, Alex Shenfield
, Nicholas J. Bowring:
A novel preference articulation operator for the Evolutionary Multi-Objective Optimisation of classifiers in concealed weapons detection. 494-520 - Lingxia Du, Cuiping Li, Hong Chen, Liwen Tan, Yinglong Zhang:

Probabilistic SimRank computation over uncertain graphs. 521-535 - Guoliang Wang, Haizhong Shi, Feifei Hou, Yalan Bai:

Some conditional vertex connectivities of complete-transposition graphs. 536-543 - Qian Wang, D. Marc Kilgour, Keith W. Hipel:

Facilitating risky project negotiation: An integrated approach using fuzzy real options, multicriteria analysis, and conflict analysis. 544-557 - Xavier Sevillano, Xavier Valero, Francesc Alías

:
Look, listen and find: A purely audiovisual approach to online videos geotagging. 558-572 - Saif Kifah

, Salwani Abdullah:
An adaptive non-linear great deluge algorithm for the patient-admission problem. 573-585 - Nouman Azam, Jingtao Yao:

Interpretation of equilibria in game-theoretic rough sets. 586-599 - Robab Alikhani, Fariba Bahrami

:
Global solutions of fuzzy integro-differential equations under generalized differentiability by the method of upper and lower solutions. 600-608 - Victoria S. Aragón, Susana C. Esquivel, Carlos A. Coello Coello

:
An immune algorithm with power redistribution for solving economic dispatch problems. 609-632 - Simon Andrews:

A 'Best-of-Breed' approach for designing a fast algorithm for computing fixpoints of Galois Connections. 633-649 - Jack Brimberg, Nenad Mladenovic

, Dragan Urosevic
:
Solving the maximally diverse grouping problem by skewed general variable neighborhood search. 650-675

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














