


default search action
Information Sciences, Volume 279
Volume 279, September 2014
- Graçaliz Pereira Dimuro, Benjamín R. C. Bedregal, Regivan Hugo Nunes Santiago

:
On (G, N)-implications derived from grouping functions. 1-17 - Sarthak Chatterjee

, Debdipta Goswami, Sudipto Mukherjee, Swagatam Das
:
Behavioral analysis of the leader particle during stagnation in a particle swarm optimization algorithm. 18-36 - Stefano Rovetta

, Francesco Masulli
:
Visual stability analysis for model selection in graded possibilistic clustering. 37-51 - Shu-Fen Tu, Ching-Sheng Hsu:

Protecting secret documents via a sharing and hiding scheme. 52-59 - Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:

One forward-secure signature scheme using bilinear maps and its applications. 60-76 - David Sánchez

, Montserrat Batet
, Alexandre Viejo
:
Utility-preserving sanitization of semantically correlated terms in textual documents. 77-93 - Ke Tang, Fei Peng, Guoliang Chen, Xin Yao

:
Population-based Algorithm Portfolios with automated constituent algorithms selection. 94-104 - M. Rostam Niakan Kalhori, M. H. Fazel Zarandi, I. Burhan Türksen:

A new credibilistic clustering algorithm. 105-122 - Helen Costa

, Luiz Henrique de Campos Merschmann
, Fabrício Barth
, Fabrício Benevenuto
:
Pollution, bad-mouthing, and local marketing: The underground of location-based social networks. 123-137 - Elena del Val

, Miguel Rebollo, Vicente J. Botti
:
Combination of self-organization mechanisms to enhance service discovery in open systems. 138-162 - Sebastián Maldonado, Juan Pérez

, Richard Weber
, Martine Labbé
:
Feature selection for Support Vector Machines via Mixed Integer Linear Programming. 163-175 - Yingwei Zhang, Jiayu An:

Modeling and monitoring of multimode transition process based on reconstruction. 176-185 - Yun Zhang, Hongxu Ma, Qi Li, Baohong Liu, Jian Liu:

Conditions of two methods for estimating missing preference information. 186-198 - Ferdinando Di Martino, Salvatore Sessa:

Type-2 interval fuzzy rule-based systems in spatial analysis. 199-212 - Shun-Sheng Wang, Shu-Ching Wang:

The consensus problem with dual failure nodes in a cloud computing environment. 213-228 - Shin-Guang Chen:

Linguistic performance evaluation for an ERP system with link failures. 229-238 - Yumin Chen

, Keshou Wu, Xuhui Chen, Chaohui Tang, Qingxin Zhu:
An entropy-based uncertainty measurement approach in neighborhood systems. 239-250 - Asifullah Khan

, Ayesha Siddiqa
, Summuyya Munib, Sana Ambreen Malik:
A recent survey of reversible watermarking techniques. 251-272 - Yuxing Yang

, Shiying Wang, Jing Li:
Conditional connectivity of recursive interconnection networks respect to embedding restriction. 273-279 - Feng Zhang, Joshua Ignatius

, Chee Peng Lim, Yajun Zhao:
A new method for deriving priority weights by extracting consistent numerical-valued matrices from interval-valued fuzzy judgement matrix. 280-300 - Xianke Zhou, Sai Wu, Chun Chen, Gang Chen, Shanshan Ying:

Real-time recommendation for microblogs. 301-325 - David Valiente

, Arturo Gil, Lorenzo Fernández Rojo, Óscar Reinoso
:
A modified stochastic gradient descent algorithm for view-based SLAM using omnidirectional images. 326-337 - Jianwei Yin, Xingjian Lu, Hanwei Chen, Xinkui Zhao, Neal N. Xiong:

System resource utilization analysis and prediction for cloud based applications under bursty workloads. 338-357 - Jiejie Chen

, Zhigang Zeng
, Ping Jiang:
On the periodic dynamics of memristor-based neural networks with time-varying delays. 358-373 - Mingzu Zhang, Jixiang Meng, Weihua Yang, Yingzhi Tian:

Reliability analysis of bijective connection networks in terms of the extra edge-connectivity. 374-382 - Korhan Karabulut, Mehmet Fatih Tasgetiren

:
A variable iterated greedy algorithm for the traveling salesman problem with time windows. 383-395 - Omar Abu Arqub

, Za'er Salim Abo-Hammour:
Numerical solution of systems of second-order boundary value problems using continuous genetic algorithm. 396-415 - Xinjun Peng, Dong Xu:

Structural regularized projection twin support vector machine for data classification. 416-432 - Hwa-Chun Lin, Tsung-Ming Lin, Cheng-Feng Wu:

Constructing application-layer multicast trees for minimum-delay message distribution. 433-445 - Dimitris S. Sfiris, Basil K. Papadopoulos:

Non-asymptotic fuzzy estimators based on confidence intervals. 446-459 - Hongyu Wang, Bing Yao, Ming Yao:

Generalized edge-magic total labellings of models from researching networks. 460-467 - Mauro Castelli

, Sara Silva
, Luca Manzoni
, Leonardo Vanneschi
:
Geometric Selective Harmony Search. 468-482 - Patricia Melin

, Jonathan Amezcua, Fevrier Valdez
, Oscar Castillo
:
A new neural network model based on the LVQ algorithm for multi-class classification of arrhythmias. 483-497 - Mauricio A. Sanchez

, Oscar Castillo
, Juan R. Castro
, Patricia Melin
:
Fuzzy granular gravitational clustering algorithm for multivariate data. 498-511 - Jan Konecny, Petr Osicka:

Triadic concept lattices in the framework of aggregation structures. 512-527 - Gexiang Zhang

, Marian Gheorghe
, Linqiang Pan
, Mario J. Pérez-Jiménez
:
Evolutionary membrane computing: A comprehensive survey and new results. 528-551 - David H. Glass

:
Entailment and symmetry in confirmation measures of interestingness. 552-559 - Özer Talo:

Some properties of limit inferior and limit superior for sequences of fuzzy real numbers. 560-568 - Punam Bedi

, Pooja Bhatt Vashisth:
Empowering recommender systems using trust and argumentation. 569-586 - Hui Wang

, Zhijian Wu, Shahryar Rahnamayan, Hui Sun, Yong Liu, Jeng-Shyang Pan
:
Multi-strategy ensemble artificial bee colony algorithm. 587-603 - Tianfeng Zhou, Meibin Qi, Jianguo Jiang, Xin Wang, Shijie Hao, Yulong Jin:

Person Re-identification based on nonlinear ranking with difference vectors. 604-614 - Oscar Castillo

, Patricia Melin
:
A review on interval type-2 fuzzy logic applications in intelligent control. 615-631 - Ronald R. Yager, Naif Alajlan

:
A note on mean absolute deviation. 632-641 - Jiri Kupka

:
Some chaotic and mixing properties of fuzzified dynamical systems. 642-653 - Chunlin Li, Layuan Li:

Exploiting composition of mobile devices for maximizing user QoS under energy constraints in mobile grid. 654-670 - Jin Qian, Duoqian Miao, Zehua Zhang, Xiaodong Yue:

Parallel attribute reduction algorithms using MapReduce. 671-690 - Qing-quan Xiong, Xue-ping Wang

:
Infinite fuzzy relational equations with sup-conjunctor on complete Brouwerian lattices. 691-701 - Xiaofei Deng, Yiyu Yao:

Decision-theoretic three-way approximations of fuzzy sets. 702-715 - Jian Wu

, Francisco Chiclana
:
Visual information feedback mechanism and attitudinal prioritisation method for group decision making with triangular fuzzy complementary preference relations. 716-734 - Quan Liang, Jing Zhang, Yong-Hui Zhang, Jiu-mei Liang:

The placement method of resources and applications based on request prediction in cloud data center. 735-745 - Shyi-Ming Chen

, Ming-Hung Huang:
Automatically generating the weather news summary based on fuzzy reasoning and ontology techniques. 746-763 - Xiaoyan Cai, Wenjie Li

, Renxian Zhang:
Enhancing diversity and coverage of document summaries through subspace clustering and clustering-based optimization. 764-775 - Guisong Chang, Hongzeng Wang, Tie Zhang:

A novel alignment-free method for whole genome analysis: Application to HIV-1 subtyping and HEV genotyping. 776-784 - Claudia Isaza

, Henry O. Sarmiento, Tatiana Kempowsky-Hamon, Marie-Véronique Le Lann:
Situation prediction based on fuzzy clustering for industrial complex processes. 785-804 - Petr Sosík

, Ludek Cienciala
:
Computational power of cell separation in tissue P systems. 805-815 - Yashar Maali, Nezam Mahdavi-Amiri

:
A triangular type-2 multi-objective linear programming model and a solution strategy. 816-826 - Fei Liu

:
A semantic approach for web reasoning. 827-859 - Muhammad Asif Zahoor Raja

:
Stochastic numerical treatment for solving Troesch's problem. 860-873 - Min Wang, Cong Wang, Xiaoping Liu:

Dynamic learning from adaptive neural control with predefined performance for a class of nonlinear systems. 874-888 - Nasrollah Pakniat

, Ziba Eslami
, Ali Miri:
A note on "Selling multiple secrets to a single buyer". 889-892 - Yongyun Shao, Xiaodong Liu, Xin Sun, Qingling Zhang:

A delay decomposition approach to H∞ admissibility for discrete-time singular delay systems. 893-905 - M. Safi, M. Mansoori, Mahmoud Paripour

:
Note on "A new method for solving interval and fuzzy equations; Linear Case". 906-907 - Lotfi A. Zadeh:

A note on modal logic and possibility theory. 908-913 - Sultan Noman Qasem

, Siti Mariyam Shamsuddin, Siti Zaiton Mohd Hashim, Maslina Darus
, Eiman Tamah Al-Shammari
:
Corrigendum to "Memetic multiobjective particle swarm optimization-based radial basis function network for classification problems" [Inform. Sci. 239(2013) 165-190]. 914

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














