nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Air management in a diesel engine using fuzzy control techniques
|
García-Nieto, S. |
|
2009 |
|
19 |
p. 3392-3409 18 p. |
artikel |
2 |
A kind of conditional vertex connectivity of Cayley graphs generated by 2-trees
|
Cheng, Eddie |
|
2011 |
|
19 |
p. 4300-4308 9 p. |
artikel |
3 |
A knapsack-based probabilistic encryption scheme
|
Wang, Baocang |
|
2007 |
|
19 |
p. 3981-3994 14 p. |
artikel |
4 |
A knowledge engineering approach to knowledge management
|
Lai, Lien F. |
|
2007 |
|
19 |
p. 4072-4094 23 p. |
artikel |
5 |
Algebraic decoding of the (41, 21, 9) Quadratic Residue code
|
Lin, Tsung-Ching |
|
2009 |
|
19 |
p. 3451-3459 9 p. |
artikel |
6 |
Algebraic models of deviant modal operators based on de Morgan and Kleene lattices
|
Cattaneo, G. |
|
2011 |
|
19 |
p. 4075-4100 26 p. |
artikel |
7 |
Algorithms of discrete optimization and their application to problems with fuzzy coefficients
|
Ekel, Petr Ya. |
|
2006 |
|
19 |
p. 2846-2868 23 p. |
artikel |
8 |
A method for stochastic multiple criteria decision making based on dominance degrees
|
Liu, Yang |
|
2011 |
|
19 |
p. 4139-4153 15 p. |
artikel |
9 |
An essay on the linguistic roots of fuzzy sets
|
García-Honrado, Itziar |
|
2011 |
|
19 |
p. 4061-4074 14 p. |
artikel |
10 |
A new point symmetry based fuzzy genetic clustering technique for automatic evolution of clusters
|
Saha, Sriparna |
|
2009 |
|
19 |
p. 3230-3246 17 p. |
artikel |
11 |
An optimal QoS-based Web service selection scheme
|
Huang, Angus F.M. |
|
2009 |
|
19 |
p. 3309-3322 14 p. |
artikel |
12 |
An order-clique-based approach for mining maximal co-locations
|
Wang, Lizhen |
|
2009 |
|
19 |
p. 3370-3382 13 p. |
artikel |
13 |
A note on the sendograph metric of fuzzy numbers
|
Wu, Congxin |
|
2009 |
|
19 |
p. 3410-3417 8 p. |
artikel |
14 |
A novel secret image sharing scheme for true-color images with size constraint
|
Tsai, Du-Shiau |
|
2009 |
|
19 |
p. 3247-3254 8 p. |
artikel |
15 |
A path optional lossless data hiding scheme based on VQ joint neighboring coding
|
Wang, Jun-Xiang |
|
2009 |
|
19 |
p. 3332-3348 17 p. |
artikel |
16 |
Applying fuzzy linguistic preference relations to the improvement of consistency of fuzzy AHP
|
Wang, Tien-Chin |
|
2008 |
|
19 |
p. 3755-3765 11 p. |
artikel |
17 |
A revisited approach to linear fuzzy regression using trapezoidal fuzzy intervals
|
Bisserier, Amory |
|
2010 |
|
19 |
p. 3653-3673 21 p. |
artikel |
18 |
A robust scheduling method based on a multi-objective immune algorithm
|
Zuo, Xingquan |
|
2009 |
|
19 |
p. 3359-3369 11 p. |
artikel |
19 |
A study on two measurements-to-tracks data assignment algorithms
|
Xu, Ben-Lian |
|
2007 |
|
19 |
p. 4176-4187 12 p. |
artikel |
20 |
Automated composition of web services with the abductive event calculus
|
Kirci Ozorhan, Esra |
|
2010 |
|
19 |
p. 3589-3613 25 p. |
artikel |
21 |
A variable-grouping based genetic algorithm for large-scale integer programming
|
Hua, Zhongsheng |
|
2006 |
|
19 |
p. 2869-2885 17 p. |
artikel |
22 |
Behavioral assessment of recoverable credit of retailer’s customers
|
Ha, Sung Ho |
|
2010 |
|
19 |
p. 3703-3717 15 p. |
artikel |
23 |
Boundary-based lower-bound functions for dynamic time warping and their indexing
|
Zhou, Mi |
|
2011 |
|
19 |
p. 4175-4196 22 p. |
artikel |
24 |
Clustering algorithm for intuitionistic fuzzy sets
|
Xu, Zeshui |
|
2008 |
|
19 |
p. 3775-3790 16 p. |
artikel |
25 |
Comparative tests of solution methods for signal-controlled road networks
|
Chiou, Suh-Wen |
|
2007 |
|
19 |
p. 4109-4121 13 p. |
artikel |
26 |
Computing the λ-covers of a string
|
Guo, Qing |
|
2007 |
|
19 |
p. 3957-3967 11 p. |
artikel |
27 |
Consequences and conjectures in preordered sets
|
Trillas, Enric |
|
2010 |
|
19 |
p. 3573-3588 16 p. |
artikel |
28 |
Delay-range-dependent robust stabilization for uncertain T–S fuzzy control systems with interval time-varying delays
|
Peng, Chen |
|
2011 |
|
19 |
p. 4287-4299 13 p. |
artikel |
29 |
Delegation with supervision
|
Lui, Richard W.C. |
|
2007 |
|
19 |
p. 4014-4030 17 p. |
artikel |
30 |
Deriving minimal solutions for fuzzy relation equations with max-product composition
|
Shieh, Bih-Sheue |
|
2008 |
|
19 |
p. 3766-3774 9 p. |
artikel |
31 |
Design and development of Distributed Virtual Geographic Environment system based on web services
|
Zhang, Jianqin |
|
2007 |
|
19 |
p. 3968-3980 13 p. |
artikel |
32 |
Design of robust active queue management controllers for a class of TCP communication networks
|
Chen, Chang-Kuo |
|
2007 |
|
19 |
p. 4059-4071 13 p. |
artikel |
33 |
Differential fault analysis on the ARIA algorithm
|
Li, Wei |
|
2008 |
|
19 |
p. 3727-3737 11 p. |
artikel |
34 |
Dominating sets in directed graphs
|
Pang, Chaoyi |
|
2010 |
|
19 |
p. 3647-3652 6 p. |
artikel |
35 |
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
|
Byun, Jin Wook |
|
2007 |
|
19 |
p. 3995-4013 19 p. |
artikel |
36 |
Editorial Board
|
|
|
2006 |
|
19 |
p. CO2- 1 p. |
artikel |
37 |
Effective vaccination policies
|
Shaw, L. |
|
2010 |
|
19 |
p. 3728-3744 17 p. |
artikel |
38 |
Embedding meshes into locally twisted cubes
|
Han, Yuejuan |
|
2010 |
|
19 |
p. 3794-3805 12 p. |
artikel |
39 |
Entropy, similarity measure of interval-valued intuitionistic fuzzy sets and their applications
|
Wei, Cui-Ping |
|
2011 |
|
19 |
p. 4273-4286 14 p. |
artikel |
40 |
Evolutionary algorithms for optimization problems with uncertainties and hybrid indices
|
Gong, Dun-wei |
|
2011 |
|
19 |
p. 4124-4138 15 p. |
artikel |
41 |
Fast decision procedure for propositional Dummett logic based on a multiple premise tableau calculus
|
Fiorino, Guido |
|
2010 |
|
19 |
p. 3633-3646 14 p. |
artikel |
42 |
Feature selection for multi-label naive Bayes classification
|
Zhang, Min-Ling |
|
2009 |
|
19 |
p. 3218-3229 12 p. |
artikel |
43 |
Fixed point theorems on fuzzy normed linear spaces
|
Bag, T. |
|
2006 |
|
19 |
p. 2910-2931 22 p. |
artikel |
44 |
Fuzzy approximately cubic mappings
|
Mirmostafaee, Alireza Kamel |
|
2008 |
|
19 |
p. 3791-3798 8 p. |
artikel |
45 |
Global stability analysis of a general class of discontinuous neural networks with linear growth activation functions
|
Wu, Huaiqin |
|
2009 |
|
19 |
p. 3432-3441 10 p. |
artikel |
46 |
How to construct secure proxy cryptosystem
|
Zhou, Yuan |
|
2007 |
|
19 |
p. 4095-4108 14 p. |
artikel |
47 |
Improving fairness among TCP flows by stateless buffer control with early drop maximum
|
Tsai, Hsu-Sheng |
|
2008 |
|
19 |
p. 3697-3715 19 p. |
artikel |
48 |
Improving the performance of fuzzy rule-based classification systems with interval-valued fuzzy sets and genetic amplitude tuning
|
Sanz, José Antonio |
|
2010 |
|
19 |
p. 3674-3685 12 p. |
artikel |
49 |
Information discovery across multiple streams
|
Hristidis, Vagelis |
|
2009 |
|
19 |
p. 3268-3285 18 p. |
artikel |
50 |
Inside Front Cover - Editorial Board
|
|
|
2010 |
|
19 |
p. IFC- 1 p. |
artikel |
51 |
Inside Front Cover - Editorial Board
|
|
|
2009 |
|
19 |
p. IFC- 1 p. |
artikel |
52 |
Inside Front Cover - Editorial Board
|
|
|
2007 |
|
19 |
p. IFC- 1 p. |
artikel |
53 |
Inside Front Cover - Editorial Board
|
|
|
2008 |
|
19 |
p. IFC- 1 p. |
artikel |
54 |
Inside Front Cover - Editorial Board
|
|
|
2011 |
|
19 |
p. IFC- 1 p. |
artikel |
55 |
Issues on adjointness in multiple-valued logics
|
Morsi, Nehad N. |
|
2006 |
|
19 |
p. 2886-2909 24 p. |
artikel |
56 |
LSM: A layer subdivision method for deformable object matching
|
Park, Chul-Ho |
|
2010 |
|
19 |
p. 3718-3727 10 p. |
artikel |
57 |
MDSM: Microarray database schema matching using the Hungarian method
|
Chen, Yi-Ping Phoebe |
|
2006 |
|
19 |
p. 2771-2790 20 p. |
artikel |
58 |
Mediating debate through on-line large-scale argumentation: Evidence from the field
|
Gürkan, Ali |
|
2010 |
|
19 |
p. 3686-3702 17 p. |
artikel |
59 |
Mental map preserving graph drawing using simulated annealing
|
Lin, Chun-Cheng |
|
2011 |
|
19 |
p. 4253-4272 20 p. |
artikel |
60 |
Mining typical patterns from databases
|
Hu, Hui-Ling |
|
2008 |
|
19 |
p. 3683-3696 14 p. |
artikel |
61 |
Modeling and querying fuzzy spatiotemporal databases
|
Sözer, Aziz |
|
2008 |
|
19 |
p. 3665-3682 18 p. |
artikel |
62 |
New code equivalence based on relative generalized Hamming weights
|
Liu, Zihui |
|
2011 |
|
19 |
p. 4309-4317 9 p. |
artikel |
63 |
New constructions of diagonal patchwork copulas
|
Durante, Fabrizio |
|
2009 |
|
19 |
p. 3383-3391 9 p. |
artikel |
64 |
Node-disjoint paths in hierarchical hypercube networks
|
Wu, Ruei-Yu |
|
2007 |
|
19 |
p. 4200-4207 8 p. |
artikel |
65 |
Nonlinear mappings in problem solving and their PSO-based development
|
Pedrycz, Adam |
|
2011 |
|
19 |
p. 4112-4123 12 p. |
artikel |
66 |
Note on “Single-machine and flowshop scheduling with a general learning effect model” and “Some single-machine and m-machine flowshop scheduling problems with learning considerations”
|
Kuo, Wen-Hung |
|
2010 |
|
19 |
p. 3814-3816 3 p. |
artikel |
67 |
On answering the question “Where do I start in order to solve a new problem involving interval type-2 fuzzy sets?”
|
Mendel, Jerry M. |
|
2009 |
|
19 |
p. 3418-3431 14 p. |
artikel |
68 |
On definable concepts of rough set models
|
Pei, Daowu |
|
2007 |
|
19 |
p. 4230-4239 10 p. |
artikel |
69 |
On filter theory of residuated lattices
|
Zhu, Yiquan |
|
2010 |
|
19 |
p. 3614-3632 19 p. |
artikel |
70 |
Online data storage using implicit security
|
Parakh, Abhishek |
|
2009 |
|
19 |
p. 3323-3331 9 p. |
artikel |
71 |
On the performance of self-organizing maps for the non-Euclidean Traveling Salesman Problem in the polygonal domain
|
Faigl, Jan |
|
2011 |
|
19 |
p. 4214-4229 16 p. |
artikel |
72 |
On the strength of hyperclique patterns for text categorization
|
Qian, Tieyun |
|
2007 |
|
19 |
p. 4040-4058 19 p. |
artikel |
73 |
Optimization of fuzzy relational equations with max-av composition
|
Wu, Yan-Kuen |
|
2007 |
|
19 |
p. 4216-4229 14 p. |
artikel |
74 |
Particle swarm optimization for determining fuzzy measures from data
|
Wang, Xi-Zhao |
|
2011 |
|
19 |
p. 4230-4252 23 p. |
artikel |
75 |
Proof that pyramid networks are 1-Hamiltonian-connected with high probability
|
Duh, Dyi-Rong |
|
2007 |
|
19 |
p. 4188-4199 12 p. |
artikel |
76 |
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
|
Zhang, Lei |
|
2011 |
|
19 |
p. 4318-4329 12 p. |
artikel |
77 |
Radial Basis Function network learning using localized generalization error bound
|
Yeung, Daniel S. |
|
2009 |
|
19 |
p. 3199-3217 19 p. |
artikel |
78 |
Rényi information measure for a used item
|
Nanda, Asok K. |
|
2007 |
|
19 |
p. 4161-4175 15 p. |
artikel |
79 |
Robust fuzzy regression analysis
|
D’Urso, Pierpaolo |
|
2011 |
|
19 |
p. 4154-4174 21 p. |
artikel |
80 |
Rough implication operator based on strong topological rough algebras
|
Zhang, Xiaohong |
|
2010 |
|
19 |
p. 3764-3780 17 p. |
artikel |
81 |
Security enhancement for digital signature schemes with fault tolerance in RSA
|
Lin, Iuon-Chang |
|
2007 |
|
19 |
p. 4031-4039 9 p. |
artikel |
82 |
Solutions of fuzzy relation equations based on continuous t-norms
|
Shieh, Bih-Sheue |
|
2007 |
|
19 |
p. 4208-4215 8 p. |
artikel |
83 |
Some kinds of ( ∈ , ∈ ∨ q ) -interval-valued fuzzy ideals of BCI-algebras
|
Ma, Xueling |
|
2008 |
|
19 |
p. 3738-3754 17 p. |
artikel |
84 |
Some notes on Zadeh’s extensions
|
Huang, Huan |
|
2010 |
|
19 |
p. 3806-3813 8 p. |
artikel |
85 |
Stability analysis and design of Takagi–Sugeno fuzzy systems
|
Ting, Chen-Sheng |
|
2006 |
|
19 |
p. 2817-2845 29 p. |
artikel |
86 |
Subspace based feature selection for pattern recognition
|
Gunal, Serkan |
|
2008 |
|
19 |
p. 3716-3726 11 p. |
artikel |
87 |
The edge-orientation problem and some of its variants on weighted graphs
|
Yen, William Chung-Kung |
|
2006 |
|
19 |
p. 2791-2816 26 p. |
artikel |
88 |
The effect of reading policy on early join result production
|
Lawrence, Ramon |
|
2007 |
|
19 |
p. 3939-3956 18 p. |
artikel |
89 |
The further investigation of covering-based rough sets: Uncertainty characterization, similarity measure and generalized models
|
Shi, Zhanhong |
|
2010 |
|
19 |
p. 3745-3763 19 p. |
artikel |
90 |
The panpositionable panconnectedness of augmented cubes
|
Kung, Tzu-Liang |
|
2010 |
|
19 |
p. 3781-3793 13 p. |
artikel |
91 |
The partitioned-layer index: Answering monotone top-k queries using the convex skyline and partitioning-merging technique
|
Heo, Jun-Seok |
|
2009 |
|
19 |
p. 3286-3308 23 p. |
artikel |
92 |
The uncovering of hidden structures by Latent Semantic Analysis
|
Valle-Lisboa, Juan C. |
|
2007 |
|
19 |
p. 4122-4147 26 p. |
artikel |
93 |
Threshold cryptography based on Asmuth–Bloom secret sharing
|
Kaya, Kamer |
|
2007 |
|
19 |
p. 4148-4160 13 p. |
artikel |
94 |
True random number generator based on mouse movement and chaotic hash function
|
Zhou, Qing |
|
2009 |
|
19 |
p. 3442-3450 9 p. |
artikel |
95 |
Ultramodular aggregation functions
|
Klement, Erich Peter |
|
2011 |
|
19 |
p. 4101-4111 11 p. |
artikel |
96 |
Using machine learning in a cooperative hybrid parallel strategy of metaheuristics
|
Cadenas, J.M. |
|
2009 |
|
19 |
p. 3255-3267 13 p. |
artikel |
97 |
Using space windowing for a preliminary analysis of complex time data in human component system studies. Examples with eye-tracking in advertising and car/head movements in driving
|
Loslever, P. |
|
2008 |
|
19 |
p. 3645-3664 20 p. |
artikel |
98 |
VisionGo: Towards video retrieval with joint exploration of human and computer
|
Luan, Huanbo |
|
2011 |
|
19 |
p. 4197-4213 17 p. |
artikel |
99 |
Wavelet-based copyright-protection scheme for digital images based on local features
|
Lin, Tzu-Chao |
|
2009 |
|
19 |
p. 3349-3358 10 p. |
artikel |