Search dblp for Publications

export results for "toc:db/journals/isci/isci276.bht:"

 download as .bib file

@article{DBLP:journals/isci/Abd-El-BarrG14,
  author       = {Mostafa I. H. Abd{-}El{-}Barr and
                  Fayez Gebali},
  title        = {Reliability analysis and fault tolerance for hypercube multi-computer
                  networks},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {295--318},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.10.031},
  doi          = {10.1016/J.INS.2013.10.031},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Abd-El-BarrG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/AnwarA14,
  author       = {Tarique Anwar and
                  Muhammad Abulaish},
  title        = {Namesake alias mining on the Web and its role towards suspect tracking},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {123--145},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.050},
  doi          = {10.1016/J.INS.2014.02.050},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/AnwarA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/BaluK14,
  author       = {A. Balu and
                  Kuppusamy Krishnamoorthy},
  title        = {An expressive and provably secure Ciphertext-Policy Attribute-Based
                  Encryption},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {354--362},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.12.027},
  doi          = {10.1016/J.INS.2013.12.027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/BaluK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/BaykasogluHK14,
  author       = {Adil Baykasoglu and
                  Alper Hamzadayi and
                  Simge Yelkenci K{\"{o}}se},
  title        = {Testing the performance of teaching-learning based optimization {(TLBO)}
                  algorithm on combinatorial problems: Flow shop and job shop scheduling
                  cases},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {204--218},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.056},
  doi          = {10.1016/J.INS.2014.02.056},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/BaykasogluHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/CaoHL14,
  author       = {Fuyuan Cao and
                  Joshua Zhexue Huang and
                  Jiye Liang},
  title        = {Trend analysis of categorical data streams with a concept change method},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {160--173},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.052},
  doi          = {10.1016/J.INS.2014.02.052},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/CaoHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenSXSY14,
  author       = {Xiu{-}Bo Chen and
                  Yuan Su and
                  Gang Xu and
                  Ying Sun and
                  Yixian Yang},
  title        = {Quantum state secure transmission in network communications},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {363--376},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.12.034},
  doi          = {10.1016/J.INS.2013.12.034},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ChenSXSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/DuW14,
  author       = {Hongzhen Du and
                  Qiaoyan Wen},
  title        = {Certificateless proxy multi-signature},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {21--30},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.043},
  doi          = {10.1016/J.INS.2014.02.043},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/DuW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/GactoGAH14,
  author       = {Mar{\'{\i}}a Jos{\'{e}} Gacto and
                  Marta Galende and
                  Rafael Alcal{\'{a}} and
                  Francisco Herrera},
  title        = {METSK-HD\({}^{\mbox{e}}\): {A} multiobjective evolutionary algorithm
                  to learn accurate TSK-fuzzy systems in high-dimensional and large-scale
                  regression problems},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {63--79},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.047},
  doi          = {10.1016/J.INS.2014.02.047},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/GactoGAH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/GuoB14,
  author       = {Pei Fang Guo and
                  Prabir Bhattacharya},
  title        = {An evolutionary framework for detecting protein conformation defects},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {332--342},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.12.013},
  doi          = {10.1016/J.INS.2013.12.013},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/GuoB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HanLX14,
  author       = {Min Han and
                  Chuang Liu and
                  Jun Xing},
  title        = {An evolutionary membrane algorithm for global numerical optimization
                  problems},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {219--241},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.057},
  doi          = {10.1016/J.INS.2014.02.057},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/HanLX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/KesiciogluM14,
  author       = {M. Nesibe Kesicioglu and
                  Radko Mesiar},
  title        = {Ordering based on implications},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {377--386},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.12.047},
  doi          = {10.1016/J.INS.2013.12.047},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/KesiciogluM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/KimQLY14,
  author       = {Sungchul Kim and
                  Tao Qin and
                  Tie{-}Yan Liu and
                  Hwanjo Yu},
  title        = {Advertiser-centric approach to understand user click behavior in sponsored
                  search},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {242--254},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.058},
  doi          = {10.1016/J.INS.2014.02.058},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/KimQLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Kwon14,
  author       = {Saeran Kwon},
  title        = {An identity-based strongly unforgeable signature without random oracles
                  from bilinear pairings},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {1--9},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.041},
  doi          = {10.1016/J.INS.2014.02.041},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Kwon14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiQZ14,
  author       = {Xiangxue Li and
                  Haifeng Qian and
                  Yuan Zhou},
  title        = {Notes on a group-oriented setting's multisigncryption scheme with
                  threshold designcryption},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {290--294},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.055},
  doi          = {10.1016/J.INS.2014.02.055},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiQZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiangL14,
  author       = {Decui Liang and
                  Dun Liu},
  title        = {Systematic studies on three-way decisions with interval-valued decision-theoretic
                  rough sets},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {186--203},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.054},
  doi          = {10.1016/J.INS.2014.02.054},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LinLCL14,
  author       = {Ke{-}Chung Lin and
                  I{-}En Liao and
                  Tsui{-}Ping Chang and
                  Shu{-}Fan Lin},
  title        = {A frequent itemset mining algorithm based on the Principle of Inclusion-Exclusion
                  and transaction mapping},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {278--289},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.060},
  doi          = {10.1016/J.INS.2014.02.060},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LinLCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Ma14,
  author       = {Liwen Ma},
  title        = {Classification of coverings in the finite approximation spaces},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {31--41},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.045},
  doi          = {10.1016/J.INS.2014.02.045},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Ma14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/MousaviSNABM14,
  author       = {Seyed Mohsen Mousavi and
                  Javad Sadeghi and
                  Seyed Taghi Akhavan Niaki and
                  Najmeh Alikar and
                  Ardeshir Bahreininejad and
                  Hendrik Simon Cornelis Metselaar},
  title        = {Two parameter-tuned meta-heuristics for a discounted inventory control
                  problem in a fuzzy environment},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {42--62},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.046},
  doi          = {10.1016/J.INS.2014.02.046},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/MousaviSNABM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/OuC14,
  author       = {Zhan{-}He Ou and
                  Ling{-}Hwei Chen},
  title        = {A steganographic method based on tetris games},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {343--353},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.12.024},
  doi          = {10.1016/J.INS.2013.12.024},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/OuC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ParkS14,
  author       = {Youngbin Park and
                  Il Hong Suh},
  title        = {Oriented edge-selective band-pass filtering},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {80--103},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.048},
  doi          = {10.1016/J.INS.2014.02.048},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ParkS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/RaffeiAHO14,
  author       = {Anis Farihan Mat Raffei and
                  Hishammuddin Asmuni and
                  Rohayanti Hassan and
                  Razib M. Othman},
  title        = {Fusing the line intensity profile and support vector machine for removing
                  reflections in frontal {RGB} color eye images},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {104--122},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.049},
  doi          = {10.1016/J.INS.2014.02.049},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/RaffeiAHO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/TaloC14,
  author       = {{\"{O}}zer Talo and
                  Celal {\c{C}}akan},
  title        = {The extension of the Knopp core theorem to the sequences of fuzzy
                  numbers},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {10--20},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.042},
  doi          = {10.1016/J.INS.2014.02.042},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/TaloC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/VanderhaegenZ14,
  author       = {Fr{\'{e}}d{\'{e}}ric Vanderhaegen and
                  St{\'{e}}phane Zieba},
  title        = {Reinforced learning systems based on merged and cumulative knowledge
                  to predict human actions},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {146--159},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.051},
  doi          = {10.1016/J.INS.2014.02.051},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/VanderhaegenZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/VascoPDV14,
  author       = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Angel L. P{\'{e}}rez del Pozo and
                  Pedro Taborda Duarte and
                  Jorge L. Villar},
  title        = {Cryptanalysis of a key exchange scheme based on block matrices},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {319--331},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.11.009},
  doi          = {10.1016/J.INS.2013.11.009},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/VascoPDV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ViejoRC14,
  author       = {Diego Viejo and
                  Jos{\'{e}} Garc{\'{\i}}a Rodr{\'{\i}}guez and
                  Miguel Cazorla},
  title        = {Combining visual features and Growing Neural Gas networks for robotic
                  3D {SLAM}},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {174--185},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.053},
  doi          = {10.1016/J.INS.2014.02.053},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ViejoRC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Vita14,
  author       = {Martin V{\'{\i}}ta},
  title        = {Why are papers about filters on residuated structures (usually) trivial?},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {387--391},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.01.013},
  doi          = {10.1016/J.INS.2014.01.013},
  timestamp    = {Thu, 06 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Vita14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangLZL14,
  author       = {Sheng{-}Sheng Wang and
                  Dong Liu and
                  Chen Zhang and
                  Dayou Liu},
  title        = {Representation, reasoning and similar matching for detailed topological
                  relations with DTString},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {255--277},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.059},
  doi          = {10.1016/J.INS.2014.02.059},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangLZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}