default search action
Information Sciences, Volume 176
Volume 176, Number 1, 6 January 2006
- Trieu-Kien Truong, Pei-Ding Chen, Lung-Jen Wang, Y. W. Chang, Irving S. Reed:
Fast, prime factor, discrete Fourier transform algorithms over GF(2m) for 8 leq m leq 10. 1-26 - Asok K. Nanda, Prasanta Paul:
Some results on generalized residual entropy. 27-47 - Siwoo Byun, In-Kwon Lee:
Proxy agent based replication control model for wireless internet. 48-66 - Chun-Jen Lee, Jason S. Chang, Jyh-Shing Roger Jang:
Extraction of transliteration pairs from parallel corpora using a statistical transliteration model. 67-90
Volume 176, Number 2, 20 January 2006
- Theo P. van der Weide, Patrick van Bommel:
Measuring the incremental information value of documents. 91-119 - Sang-Eon Han:
Minimal simple closed 18-surfaces and a topological preservation of 3D surfaces. 120-134 - Burkay Genç, Ugur Dogrusöz:
A layout algorithm for signaling pathways. 135-149 - Dug Hun Hong:
Fuzzy measures for a correlation coefficient of fuzzy numbers under TW(the weakest t-norm)-based fuzzy arithmetic operations. 150-160 - Ying-Hong Wang, Chih-Feng Chao:
Dynamic backup routes routing protocol for mobile ad hoc networks. 161-185 - Peng Shi, Magdi Sadek Mahmoud, Jianqiang Yi, Abdulla Ismail:
Worst case control of uncertain jumping systems with multi-state and input delay information. 186-200 - Changchun Hua, Fenglei Li, Xinping Guan:
Observer-based adaptive control for uncertain time-delay systems. 201-214
- Sang-Eon Han:
Erratum to "Non-product property of the digital fundamental group" [Informat. Sci. 171(1-3) (2005) 73-91]. 215-216
Volume 176, Number 3, 6 February 2006
- Tsang-Ling Sheu, Yang-Jing Wu:
A preemptive channel allocation scheme for multimedia traffic in mobile wireless networks. 217-236 - Tijen Ertay, Da Ruan, Umut Rifat Tuzkaya:
Integrating data envelopment analysis and analytic hierarchy for the facility layout design in manufacturing systems. 237-262 - Chun-I Fan:
Ownership-attached unblinding of blind signatures for untraceable electronic cash, . 263-284 - Bijan Davvaz, Wieslaw A. Dudek, Young Bae Jun:
Intuitionistic fuzzy Hv-submodules. 285-300 - K. Serafimidis, Athanasios Kehagias:
Some remarks on congruences obtained from the L-fuzzy Nakano hyperoperation. 301-320 - Xiaojun Tong, Mianyun Chen, Yi Lin:
The structure of pan-addition operator with pre-determined pan-multiplication. 321-331 - Sang-Eon Han:
Connected sum of digital closed surfaces. 332-348
Volume 176, Number 4, 22 February 2006
- Francisco Herrera, Enrique Herrera-Viedma, Luis Martínez-López, Paul P. Wang:
Recent advancements of fuzzy sets: Theory and practice. 349-351 - José Luis García-Lapresta:
A general class of simple majority decision rules based on linguistic opinions. 352-365 - Gloria Bordogna, Sergio Chiesa, Davide Geneletti:
Linguistic modelling of imperfect spatial information as a basis for simplifying spatial analysis. 366-389 - Gabriella Pasi, Ronald R. Yager:
Modeling the concept of majority opinion in group decision making. 390-414 - Slawomir Zadrozny, Janusz Kacprzyk:
Computing with words for text processing: An approach to the text categorization. 415-437 - Nicholas J. Randon, Jonathan Lawry:
Classification and query evaluation using modelling with words. 438-464 - Vicenç Torra, Josep Domingo-Ferrer, Josep Maria Mateo-Sanz, Michael K. Ng:
Regression for ordinal variables without underlying continuous variables. 465-474
Volume 176, Number 5, 6 March 2006
- Marco Ronchetti, Giancarlo Succi, Witold Pedrycz, Barbara Russo:
Early estimation of software size in object-oriented environments a case study in a CMM level 3 software firm. 475-489 - Ilias Sakellariou, Ioannis P. Vlahavas, Ivan Futó, Zoltán Pásztor, János Szeredi:
Communicating sequential processes for distributed constraint satisfaction. 490-521 - Ben-Jye Chang, Ren-Hung Hwang:
Modeling and analyzing the performance of adaptive hierarchical networks. 522-549 - Dong-Her Shih, Hsin-Yi Huang, David C. Yen:
A secure reverse Vickrey auction scheme with bid privacy. 550-564 - Ashok Samal, James R. Brandle, Dongsheng Zhang:
Texture as the basis for individual tree identification. 565-576 - Ronald R. Yager:
An extension of the naive Bayesian classifier. 577-588 - Michiro Kondo:
On the structure of generalized rough sets. 589-600
Volume 176, Number 6, March 2006
- Matt Duckham, Jenny Lingham, Keith T. Mason, Michael F. Worboys:
Qualitative reasoning about consistency in geographic information. 601-627 - Jun-Rong Chen, Yong-Feng Lin, Jason Jen-Yen Chen:
Component-based Web page management environment. 628-639 - Hui-Hua Tsai, Iuan-Yuan Lu:
The evaluation of service quality using generalized Choquet integral. 640-663 - Vishwanath P. Baligar, Lalit M. Patnaik, G. R. Nagabhushana:
Low complexity, and high fidelity image compression using fixed threshold method. 664-675 - Ming-Chien Yang, Tseng-Kuei Li, Jimmy J. M. Tan, Lih-Hsing Hsu:
On embedding cycles into faulty twisted cubes. 676-690 - Athanasios Tsakonas:
A comparison of classification accuracy of four genetic programming-evolved intelligent structures. 691-724 - Qi-Mei Xiao, Zhen-Liang Zhang:
Rough prime ideals and rough fuzzy prime ideals in semigroups. 725-733 - Salih Aytar, Serpil Pehlivan:
Statistically monotonic and statistically bounded sequences of fuzzy numbers. 734-744 - Salah El-Din Abbas, Halis Aygün:
Intuitionistic fuzzy semiregularization spaces. 745-757
Volume 176, Number 7, April 2006
- Jung-Sheng Fu:
Longest fault-free paths in hypercubes with vertex faults. 759-771 - Chih-Yang Tsai:
On detecting nonlinear patterns in discriminant problems. 772-798 - Kil Hong Joo, Won Suk Lee:
An efficient query evaluation in a mediator based on implementation plan. 799-819 - Shyh-Kwei Chen, Ming-Ling Lo, Kun-Lung Wu, Jih-Shyr Yih, Colleen Viehrig:
A practical approach to extracting DTD-conforming XML documents from heterogeneous data sources. 820-844 - Tsung-Chuan Huang, Po-Hsueh Hsu:
Predecessor/successor approach for high-performance run-time wavefront scheduling. 845-860 - Przemyslaw Skibinski:
PPM with the extended alphabet. 861-874 - Osama H. H. Edely, Mohammad Mursaleen:
Tauberian theorems for statistically convergent double sequences. 875-886 - Xiao-Ping Yang, Tong-Jun Li:
The minimization of axiom sets characterizing generalized approximation operators. 887-899 - Mustafa Demirci:
The generalized associative law in vague groups and its applications - I. 900-936
Volume 176, Number 8, April 2006
- Frans van den Bergh, Andries P. Engelbrecht:
A study of particle swarm optimization particle trajectories. 937-971 - Petr Musílek, Adriel Lau, Marek Z. Reformat, Loren Wyard-Scott:
Immune programming. 972-1002 - Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia:
Looking into the seeds of time: Discovering temporal patterns in large transaction sets. 1003-1031 - Hyunseung Choo, Young Jae Lee, Seong-Moo Yoo:
DIG: Degree of inter-reference gap for a dynamic buffer cache management. 1032-1044 - Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers:
Standards and verification for fair-exchange and atomicity in e-commerce transactions. 1045-1066 - Tahsin Alp Yanar, Zuhal Akyürek:
The enhancement of the cell-based GIS analyses with fuzzy processing capabilities. 1067-1085 - Sang Yeol Joo, Yun Kyong Kim, Joong Sung Kwon:
Strong convergence for weighted sums of fuzzy random sets. 1086-1099
Volume 176, Number 9, May 2006
- Vincenzo Loia:
Soft computing meets agents. 1101-1102 - Carmine Grelle, Lucio Ippolito, Vincenzo Loia, Pierluigi Siano:
Agent-based architecture for designing hybrid control systems. 1103-1130 - Chang-Shing Lee, Chun-Chih Jiang, Tung-Cheng Hsieh:
A genetic fuzzy agent using ontology model for meeting scheduling system. 1131-1155 - Tieju Ma, Yoshiteru Nakamori, Wei Huang:
An agent-based approach for predictions based on multi-dimensional complex data. 1156-1174 - Shahram Rahimi, Johan Bjursell, Marcin Paprzycki, Maria A. Cobb, Dia Ali:
Performance evaluation of SDIAGENT, a multi-agent system for distributed fuzzy geospatial data conflation. 1175-1189 - Mihaela Ulieru, Maja Hadzic, Elizabeth Chang:
Soft computing agents for e-Health in application to the research and control of unknown diseases. 1190-1214
- Yao Liu, Sam Yuan Sung, Hui Xiong:
A cubic-wise balance approach for privacy preservation in data cubes. 1215-1240 - Ming-Deng Hsieh, Tsan-Pin Wang, Ching-Sung Tsai, Chien-Chao Tseng:
Stateful session handoff for mobile WWW. 1241-1265 - Hassan B. Kazemian, Li Meng:
A fuzzy control scheme for video transmission in Bluetooth wireless. 1266-1289 - Mi-Gyung Cho:
A new gesture recognition algorithm and segmentation method of Korean scripts for gesture-allowed ink editor. 1290-1303
Volume 176, Number 10, May 2006
- Claus-Peter Schnorr:
Enhancing the security of perfect blind DL-signatures. 1305-1320 - Enrico Nardelli, Guido Proietti:
Efficient unbalanced merge-sort. 1321-1337 - Hui-Feng Huang, Chin-Chen Chang:
A novel efficient (t, n) threshold proxy signature scheme. 1338-1349 - Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia:
A fragile watermarking scheme for detecting malicious modifications of database relations. 1350-1378 - Wai-Tak Wong, Frank Y. Shih, Te-Feng Su:
Thinning algorithms based on quadtree and octree representations. 1379-1394 - Bruno Apolloni, Simone Bassis, Sabrina Gaito, Dario Malchiodi, Italo Zoppis:
Controlling the losing probability in a monotone game. 1395-1416 - Gopal Lakhani:
Reducing coding redundancy in LZW. 1417-1434 - Yair Neuman:
A theory of meaning. 1435-1449 - Bilâl Altay, Feyzi Basar, Mohammad Mursaleen:
On the Euler sequence spaces which include the spaces lp and linfinity I. 1450-1462
Volume 176, Number 11, June 2006
- Enric Trillas:
On the use of words and fuzzy sets, . 1463-1487 - Mustafa Demirci:
The generalized associative law in vague groups and its applications - II. 1488-1530 - Andrea Mesiarová:
H-transformation of t-norms. 1531-1545 - Hisao Hirakawa, Katsushi Inoue, Akira Ito:
Three-way two-dimensional alternating finite automata with rotated inputs. 1546-1569 - Kevin Burns:
Bayesian inference in disputed authorship: A case study of cognitive errors and a new system for decision support. 1570-1589 - Yongchuan Tang, Jiacheng Zheng:
Generalized Jeffrey's rule of conditioning and evidence combining rule for a priori probabilistic knowledge in conditional evidence theory. 1590-1606 - Jie Lu, Chenggen Shi, Guangquan Zhang:
On bilevel multi-follower decision making: General framework and solutions. 1607-1627
Volume 176, Number 12, June 2006
- Stephan Rein, Martin Reisslein:
Identifying the classical music composition of an unknown performance with wavelet dispersion vector and neural nets. 1629-1655 - Luis Rueda, B. John Oommen:
A fast and efficient nearly-optimal adaptive Fano coding scheme. 1656-1683 - Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Enforcing the security of a time-bound hierarchical key assignment scheme. 1684-1694 - Yun Ji Na, Choon Seong Leem, Il Seok Ko:
ACASH: an adaptive web caching method based on the heterogeneity of web object and reference characteristics. 1695-1711 - Verayuth Lertnattee, Thanaruk Theeramunkong:
Class normalization in centroid-based text categorization. 1712-1738 - Wu Jigang, Thambipillai Srikanthan:
An efficient algorithm for the collapsing knapsack problem. 1739-1751 - Ching-Yao Wang, Shian-Shyong Tseng, Tzung-Pei Hong:
Flexible online association rule mining based on multidimensional pattern relations. 1752-1780 - Rasit Köker:
Design and performance of an intelligent predictive controller for a six-degree-of-freedom robot using the Elman network. 1781-1799
Volume 176, Number 13, July 2006
- Nikos I. Karacapilidis, Alexis Lazanas, George Megalokonomos, Pavlos Moraitis:
On the development of a web-based system for transportation services. 1801-1828 - Degang Chen, Wenxiu Zhang, Daniel S. Yeung, Eric C. C. Tsang:
Rough approximations on a complete completely distributive lattice with applications to generalized rough sets. 1829-1848 - David A. Pelta, Alejandro Sancho-Royo, Carlos Cruz Corona, José L. Verdegay:
Using memory and fuzzy rules in a co-operative multi-thread strategy for optimization. 1849-1868 - Zheng Pei, Germano Resconi, Ariën J. van der Wal, Keyun Qin, Yang Xu:
Interpreting and extracting fuzzy decision rules from fuzzy information systems and their inference. 1869-1897 - Eduardo R. Hruschka, Ricardo J. G. B. Campello, Leandro Nunes de Castro:
Evolving clusters in gene-expression data. 1898-1927 - Jae-Gil Lee, Kyu-Young Whang:
Secure query processing against encrypted XML data using Query-Aware Decryption. 1928-1947
Volume 176, Number 14, July 2006
- Jianping Zhang, Huan Liu, Paul P. Wang:
Some current issues of streaming data mining. 1949-1951 - Sanghamitra Bandyopadhyay, Chris Giannella, Ujjwal Maulik, Hillol Kargupta, Kun Liu, Souptik Datta:
Clustering distributed data streams in peer-to-peer environments. 1952-1985 - Jeffrey Xu Yu, Zhihong Chong, Hongjun Lu, Zhenjie Zhang, Aoying Zhou:
A false negative approach to mining frequent itemsets from high speed transactional data streams. 1986-2015 - David Littau, Daniel Boley:
Streaming data reduction using low-memory factored representations. 2016-2041 - Jun Yan, Benyu Zhang, Shuicheng Yan, Ning Liu, Qiang Yang, QianSheng Cheng, Hua Li, Zheng Chen, Wei-Ying Ma:
A scalable supervised algorithm for dimensionality reduction on streaming data. 2042-2065
- Aykut Ünal, Yücel Saygin, Özgür Ulusoy:
Processing count queries over event streams at multiple time granularities. 2066-2096 - Kingkarn Sookhanaphibarn, Chidchanok Lursinsap:
A new feature extractor invariant to intensity, rotation, and scaling of color images. 2097-2119
Volume 176, Number 15, August 2006
- Jangmin O, Jongwoo Lee, Jae Won Lee, Byoung-Tak Zhang:
Adaptive stock trading with dynamic asset allocation using reinforcement learning. 2121-2147 - Okbin Lee, Seongjin Yoo, Byungjeon Park, Ilyong Chung:
The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design. 2148-2160 - Sing Kiong Nguang, Peng Shi:
Robust Hinfinity output feedback control design for fuzzy dynamic systems with quadratic D stability constraints: An LMI approach. 2161-2191 - Izhar Ahmad:
Symmetric duality for multiobjective fractional variational problems with generalized invexity. 2192-2207 - Zhihui Li, Ping Li, Yongming Li:
The relationships among several types of fuzzy automata. 2208-2226 - Nihan Kesim Cicekli, Ilyas Cicekli:
Formalizing the specification and execution of workflows using the event calculus. 2227-2267 - Mikail Et, Hifsi Altinok, Rifat Çolak:
On lambda-statistical convergence of difference sequences of fuzzy numbers. 2268-2278
Volume 176, Number 16, August 2006
- Fabien Lange, Michel Grabisch:
Interaction transform for bi-set functions over a finite set. 2279-2303 - Owen Kaser, Daniel Lemire:
Attribute value reordering for efficient hybrid OLAP. 2304-2336 - Zhao Lu, Leang-San Shieh, Guanrong Chen, Norman P. Coleman:
Adaptive feedback linearization control of chaotic systems via recurrent high-order neural networks. 2337-2354 - Magdi Sadek Mahmoud, Peng Shi, Jianqiang Yi, Jeng-Shyang Pan:
Robust observers for neutral jumping systems with uncertain information. 2355-2385 - Dug Hun Hong:
Renewal process with T-related fuzzy inter-arrival times and fuzzy rewards. 2386-2395 - Francisco Gallego Lupiáñez:
Nets and filters in intuitionistic fuzzy topological spaces. 2396-2404 - Saeid Abbasbandy, B. Asady:
Ranking of fuzzy numbers by sign distance. 2405-2416 - Bijan Davvaz:
Roughness based on fuzzy ideals. 2417-2437
Volume 176, Number 17, September 2006
- Wilhelm Rödder, Friedhelm Kulmann:
Recall and Reasoning - an information theoretical model of cognitive processes. 2439-2466 - Wladyslaw Homenda:
Balanced fuzzy sets. 2467-2506 - Yanyong Guan, Hongkai Wang:
Set-valued information systems. 2507-2525 - Hajime Nobuhara, Witold Pedrycz, Salvatore Sessa, Kaoru Hirota:
A motion compression/reconstruction method based on max t-norm composite fuzzy relational equations. 2526-2552 - Wenbin Luo:
Hashing via finite field. 2553-2566 - Biswajit Acharya, Arun K. Majumdar, Jayanta Mukherjee:
Video model for dynamic objects. 2567-2602
Volume 176, Number 18, September 2006
- Jun Kiniwa:
Request-based token passing for self-stabilizing mutual exclusion. 2603-2623 - Anna Formica:
Ontology-based concept similarity in Formal Concept Analysis. 2624-2641 - Jianwen Chen, Yan Zhang:
A rule based knowledge transaction model for mobile environments. 2642-2672 - Elena Tsiporkova, Veselka Boeva:
Multi-step ranking of alternatives in a multi-criteria and multi-expert decision making environment. 2673-2697 - Xiaoxia Huang:
Credibility-based chance-constrained integer programming models for capital budgeting with fuzzy parameters. 2698-2712 - Anna Pankowska, Maciej Wygralak:
General IF-sets with triangular norms and their applications to group decision making. 2713-2754 - Yasemin Claire Erensal, Temel Öncan, Murat Levent Demircan:
Determining key capabilities in technology management using fuzzy analytic hierarchy process: A case study of Turkey. 2755-2770
Volume 176, Number 19, October 2006
- Yi-Ping Phoebe Chen, Supawan Prompramote, Frédéric Maire:
MDSM: Microarray database schema matching using the Hungarian method. 2771-2790 - William Chung-Kung Yen:
The edge-orientation problem and some of its variants on weighted graphs. 2791-2816 - Chen-Sheng Ting:
Stability analysis and design of Takagi-Sugeno fuzzy systems. 2817-2845 - Petr Yakovlevitch Ekel, Fernando H. Schuffner Neto:
Algorithms of discrete optimization and their application to problems with fuzzy coefficients. 2846-2868 - Zhongsheng Hua, Feihua Huang:
A variable-grouping based genetic algorithm for large-scale integer programming. 2869-2885 - Nehad N. Morsi, Elewa M. Roshdy:
Issues on adjointness in multiple-valued logics. 2886-2909 - Tarapada Bag, Syamal Kumar Samanta:
Fixed point theorems on fuzzy normed linear spaces. 2910-2931
Volume 176, Number 20, October 2006
- Ronald R. Yager:
OWA trees and their role in security modeling using attack trees. 2933-2959 - Hui Li, Scott Dick:
A similarity measure for fuzzy rulebases based on linguistic gradients. 2960-2987 - Hajime Nobuhara, Barnabás Bede, Kaoru Hirota:
On various eigen fuzzy sets and their application to image reconstruction. 2988-3010 - Funda Karaçal:
On the direct decomposability of strong negations and S-implication operators on product lattices. 3011-3025 - Ewa Straszecka:
Combining uncertainty and imprecision in models of medical diagnosis. 3026-3059 - Jun Zhang, Yu Zhou, Fanyuan Ma, Dawu Gu, Yingcai Bai:
An extension of secure group communication using key graph. 3060-3078 - Young Bae Jun, Seok-Zun Song:
Generalized fuzzy interior ideals in semigroups. 3079-3093 - Izhar Ahmad, Z. Husain:
Second order (F, α, ρ, d)-convexity and duality in multiobjective programming. 3094-3103
Volume 176, Number 21, November 2006
- Danilo Ardagna, Chiara Francalanci, Marco Trubian:
A multi-model algorithm for the cost-oriented design of Internet-based systems. 3105-3131 - Youngjoo Cho, Ilyong Chung:
A parallel routing algorithm on circulant networks employing the Hamiltonian circuit latin square. 3132-3142 - Rza Bashirov, Valentino Crespi:
Analyzing permutation capability of multistage interconnection networks with colored Petri nets. 3143-3165 - Taigun Lee, Sung-Kee Park, Mignon Park:
An effective method for detecting facial features and face in human-robot interaction. 3166-3189 - Humberto Bustince Sola, Maria Victoria Mohedano Salillas, Edurne Barrenechea Tartas, Miguel Pagola:
Definition and construction of fuzzy DI-subsethood measures. 3190-3231 - Ping Li, Yongming Li:
Algebraic properties of LA-languages. 3232-3255 - Yingjie Yang, Robert I. John:
Roughness bounds in rough set operations. 3256-3267
Volume 176, Number 22, November 2006
- Csilla Farkas, Alexander Brodsky, Sushil Jajodia:
Unauthorized inferences in semistructured databases. 3269-3299 - Jongik Kim:
Advanced structural joins using element distribution. 3300-3331 - Jianxi Fan, Xiaohua Jia, Xiaola Lin:
Complete path embeddings in crossed cubes. 3332-3346 - Jin-Wook Baek, Heon Young Yeom:
A timed mobile agent planning approach for distributed information retrieval in dynamic network environments. 3347-3378 - Lei Qian, H. John Caulfield:
What can we do with a linear optical logic gate? 3379-3392 - Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang:
New image steganographic methods using run-length approach. 3393-3408 - Nen-Chung Wang, Tzung-Shi Chen:
Task migration in all-port wormhole-routed 2D mesh multicomputers. 3409-3425 - Chien-Yuan Chen:
An efficient parity detection technique using the two-moduli set {2h - 1, 2h + 1}. 3426-3430
Volume 176, Number 23, December 2006
- Y. Y. Yao:
Neighborhood systems and approximate retrieval. 3431-3452 - Hsu-Yang Kung, Mei-Hsien Lin, Fu-Wen Kuo:
Dynamic QoS queuing control mechanism for multimedia differentiated services. 3453-3471 - Aoi Honda, Michel Grabisch:
Entropy of capacities on lattices and set systems. 3472-3489 - Sung-Kwun Oh, Witold Pedrycz, Seok-Beom Roh:
Genetically optimized fuzzy polynomial neural networks with fuzzy set-based polynomial neurons. 3490-3519 - Ho Jae Lee, Jin Bae Park, Young Hoon Joo:
Robust load-frequency control for uncertain nonlinear power systems: A fuzzy logic approach. 3520-3537 - Ying-Ming Wang, Celik Parkan:
Two new approaches for assessing the weights of fuzzy opinions in group decision analysis. 3538-3555 - Vladimir S. Lerner:
An elementary information macrodynamic model of a market economic system. 3556-3590
Volume 176, Number 24, December 2006
- Guanling Lee, Wenpo Yang, Jia-Min Lee:
A parallel algorithm for mining multiple partial periodic patterns. 3591-3609 - Yoshiteru Nakamori, Mina Ryoke:
Treating fuzziness in subjective evaluation data. 3610-3644 - Daniel Gómez, Javier Montero, Javier Yáñez:
A coloring fuzzy graph approach for image classification. 3645-3657 - Bijan Davvaz, M. Mahdavipour:
Roughness in modules. 3658-3674 - Niovi Kehayopulu, Michael Tsingelis:
Regular ordered semigroups in terms of fuzzy subsets. 3675-3693 - Gesthimani Stefanidou, Garyfalos Papaschinopoulos:
The periodic nature of the positive solutions of a nonlinear fuzzy max-difference equation. 3694-3710 - Andrea Janes, Marco Scotto, Witold Pedrycz, Barbara Russo, Milorad Stefanovic, Giancarlo Succi:
Identification of defect-prone classes in telecommunication software systems using design metrics. 3711-3734 - Khaled Salah:
On the accuracy of two analytical models for evaluating the performance of Gigabit Ethernet hosts. 3735-3756
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.