default search action
Search dblp for Publications
export results for "toc:db/journals/isci/isci276.bht:"
@article{DBLP:journals/isci/Abd-El-BarrG14, author = {Mostafa I. H. Abd{-}El{-}Barr and Fayez Gebali}, title = {Reliability analysis and fault tolerance for hypercube multi-computer networks}, journal = {Inf. Sci.}, volume = {276}, pages = {295--318}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.10.031}, doi = {10.1016/J.INS.2013.10.031}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Abd-El-BarrG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/AnwarA14, author = {Tarique Anwar and Muhammad Abulaish}, title = {Namesake alias mining on the Web and its role towards suspect tracking}, journal = {Inf. Sci.}, volume = {276}, pages = {123--145}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.050}, doi = {10.1016/J.INS.2014.02.050}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/AnwarA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/BaluK14, author = {A. Balu and Kuppusamy Krishnamoorthy}, title = {An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption}, journal = {Inf. Sci.}, volume = {276}, pages = {354--362}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.12.027}, doi = {10.1016/J.INS.2013.12.027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/BaluK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/BaykasogluHK14, author = {Adil Baykasoglu and Alper Hamzadayi and Simge Yelkenci K{\"{o}}se}, title = {Testing the performance of teaching-learning based optimization {(TLBO)} algorithm on combinatorial problems: Flow shop and job shop scheduling cases}, journal = {Inf. Sci.}, volume = {276}, pages = {204--218}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.056}, doi = {10.1016/J.INS.2014.02.056}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/BaykasogluHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/CaoHL14, author = {Fuyuan Cao and Joshua Zhexue Huang and Jiye Liang}, title = {Trend analysis of categorical data streams with a concept change method}, journal = {Inf. Sci.}, volume = {276}, pages = {160--173}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.052}, doi = {10.1016/J.INS.2014.02.052}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/CaoHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChenSXSY14, author = {Xiu{-}Bo Chen and Yuan Su and Gang Xu and Ying Sun and Yixian Yang}, title = {Quantum state secure transmission in network communications}, journal = {Inf. Sci.}, volume = {276}, pages = {363--376}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.12.034}, doi = {10.1016/J.INS.2013.12.034}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ChenSXSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/DuW14, author = {Hongzhen Du and Qiaoyan Wen}, title = {Certificateless proxy multi-signature}, journal = {Inf. Sci.}, volume = {276}, pages = {21--30}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.043}, doi = {10.1016/J.INS.2014.02.043}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/DuW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/GactoGAH14, author = {Mar{\'{\i}}a Jos{\'{e}} Gacto and Marta Galende and Rafael Alcal{\'{a}} and Francisco Herrera}, title = {METSK-HD\({}^{\mbox{e}}\): {A} multiobjective evolutionary algorithm to learn accurate TSK-fuzzy systems in high-dimensional and large-scale regression problems}, journal = {Inf. Sci.}, volume = {276}, pages = {63--79}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.047}, doi = {10.1016/J.INS.2014.02.047}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/GactoGAH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/GuoB14, author = {Pei Fang Guo and Prabir Bhattacharya}, title = {An evolutionary framework for detecting protein conformation defects}, journal = {Inf. Sci.}, volume = {276}, pages = {332--342}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.12.013}, doi = {10.1016/J.INS.2013.12.013}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/GuoB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HanLX14, author = {Min Han and Chuang Liu and Jun Xing}, title = {An evolutionary membrane algorithm for global numerical optimization problems}, journal = {Inf. Sci.}, volume = {276}, pages = {219--241}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.057}, doi = {10.1016/J.INS.2014.02.057}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/HanLX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/KesiciogluM14, author = {M. Nesibe Kesicioglu and Radko Mesiar}, title = {Ordering based on implications}, journal = {Inf. Sci.}, volume = {276}, pages = {377--386}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.12.047}, doi = {10.1016/J.INS.2013.12.047}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/KesiciogluM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/KimQLY14, author = {Sungchul Kim and Tao Qin and Tie{-}Yan Liu and Hwanjo Yu}, title = {Advertiser-centric approach to understand user click behavior in sponsored search}, journal = {Inf. Sci.}, volume = {276}, pages = {242--254}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.058}, doi = {10.1016/J.INS.2014.02.058}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/KimQLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Kwon14, author = {Saeran Kwon}, title = {An identity-based strongly unforgeable signature without random oracles from bilinear pairings}, journal = {Inf. Sci.}, volume = {276}, pages = {1--9}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.041}, doi = {10.1016/J.INS.2014.02.041}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Kwon14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiQZ14, author = {Xiangxue Li and Haifeng Qian and Yuan Zhou}, title = {Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption}, journal = {Inf. Sci.}, volume = {276}, pages = {290--294}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.055}, doi = {10.1016/J.INS.2014.02.055}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiQZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiangL14, author = {Decui Liang and Dun Liu}, title = {Systematic studies on three-way decisions with interval-valued decision-theoretic rough sets}, journal = {Inf. Sci.}, volume = {276}, pages = {186--203}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.054}, doi = {10.1016/J.INS.2014.02.054}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LinLCL14, author = {Ke{-}Chung Lin and I{-}En Liao and Tsui{-}Ping Chang and Shu{-}Fan Lin}, title = {A frequent itemset mining algorithm based on the Principle of Inclusion-Exclusion and transaction mapping}, journal = {Inf. Sci.}, volume = {276}, pages = {278--289}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.060}, doi = {10.1016/J.INS.2014.02.060}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LinLCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Ma14, author = {Liwen Ma}, title = {Classification of coverings in the finite approximation spaces}, journal = {Inf. Sci.}, volume = {276}, pages = {31--41}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.045}, doi = {10.1016/J.INS.2014.02.045}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Ma14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/MousaviSNABM14, author = {Seyed Mohsen Mousavi and Javad Sadeghi and Seyed Taghi Akhavan Niaki and Najmeh Alikar and Ardeshir Bahreininejad and Hendrik Simon Cornelis Metselaar}, title = {Two parameter-tuned meta-heuristics for a discounted inventory control problem in a fuzzy environment}, journal = {Inf. Sci.}, volume = {276}, pages = {42--62}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.046}, doi = {10.1016/J.INS.2014.02.046}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/MousaviSNABM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/OuC14, author = {Zhan{-}He Ou and Ling{-}Hwei Chen}, title = {A steganographic method based on tetris games}, journal = {Inf. Sci.}, volume = {276}, pages = {343--353}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.12.024}, doi = {10.1016/J.INS.2013.12.024}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/OuC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ParkS14, author = {Youngbin Park and Il Hong Suh}, title = {Oriented edge-selective band-pass filtering}, journal = {Inf. Sci.}, volume = {276}, pages = {80--103}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.048}, doi = {10.1016/J.INS.2014.02.048}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ParkS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/RaffeiAHO14, author = {Anis Farihan Mat Raffei and Hishammuddin Asmuni and Rohayanti Hassan and Razib M. Othman}, title = {Fusing the line intensity profile and support vector machine for removing reflections in frontal {RGB} color eye images}, journal = {Inf. Sci.}, volume = {276}, pages = {104--122}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.049}, doi = {10.1016/J.INS.2014.02.049}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/RaffeiAHO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/TaloC14, author = {{\"{O}}zer Talo and Celal {\c{C}}akan}, title = {The extension of the Knopp core theorem to the sequences of fuzzy numbers}, journal = {Inf. Sci.}, volume = {276}, pages = {10--20}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.042}, doi = {10.1016/J.INS.2014.02.042}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/TaloC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/VanderhaegenZ14, author = {Fr{\'{e}}d{\'{e}}ric Vanderhaegen and St{\'{e}}phane Zieba}, title = {Reinforced learning systems based on merged and cumulative knowledge to predict human actions}, journal = {Inf. Sci.}, volume = {276}, pages = {146--159}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.051}, doi = {10.1016/J.INS.2014.02.051}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/VanderhaegenZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/VascoPDV14, author = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Angel L. P{\'{e}}rez del Pozo and Pedro Taborda Duarte and Jorge L. Villar}, title = {Cryptanalysis of a key exchange scheme based on block matrices}, journal = {Inf. Sci.}, volume = {276}, pages = {319--331}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.11.009}, doi = {10.1016/J.INS.2013.11.009}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/VascoPDV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ViejoRC14, author = {Diego Viejo and Jos{\'{e}} Garc{\'{\i}}a Rodr{\'{\i}}guez and Miguel Cazorla}, title = {Combining visual features and Growing Neural Gas networks for robotic 3D {SLAM}}, journal = {Inf. Sci.}, volume = {276}, pages = {174--185}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.053}, doi = {10.1016/J.INS.2014.02.053}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ViejoRC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Vita14, author = {Martin V{\'{\i}}ta}, title = {Why are papers about filters on residuated structures (usually) trivial?}, journal = {Inf. Sci.}, volume = {276}, pages = {387--391}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.01.013}, doi = {10.1016/J.INS.2014.01.013}, timestamp = {Thu, 06 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Vita14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangLZL14, author = {Sheng{-}Sheng Wang and Dong Liu and Chen Zhang and Dayou Liu}, title = {Representation, reasoning and similar matching for detailed topological relations with DTString}, journal = {Inf. Sci.}, volume = {276}, pages = {255--277}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.059}, doi = {10.1016/J.INS.2014.02.059}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangLZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.