nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
ACTLW – An action-based computation tree logic with unless operator
|
Meolic, Robert |
|
2008 |
178 |
6 |
p. 1542-1557 16 p. |
artikel |
2 |
A parallel routing algorithm on recursive cube of rings networks employing Hamiltonian circuit Latin square
|
Choi, Dongmin |
|
2008 |
178 |
6 |
p. 1533-1541 9 p. |
artikel |
3 |
A scalable constraint-based Q-hash indexing for moving objects
|
Francis, Deja Hepziba |
|
2008 |
178 |
6 |
p. 1442-1460 19 p. |
artikel |
4 |
Asset portfolio optimization using fuzzy mathematical programming
|
Gupta, Pankaj |
|
2008 |
178 |
6 |
p. 1734-1755 22 p. |
artikel |
5 |
Classifying mental tasks based on features of higher-order statistics from EEG signals in brain–computer interface
|
Zhou, Shang-Ming |
|
2008 |
178 |
6 |
p. 1629-1640 12 p. |
artikel |
6 |
Comparison results for fuzzy differential equations
|
Rodríguez-López, Rosana |
|
2008 |
178 |
6 |
p. 1756-1779 24 p. |
artikel |
7 |
Computing with random quantum dot repulsion
|
Zhang, Ben |
|
2008 |
178 |
6 |
p. 1519-1532 14 p. |
artikel |
8 |
Design of interval type-2 fuzzy sliding-mode controller
|
Hsiao, Ming-Ying |
|
2008 |
178 |
6 |
p. 1696-1716 21 p. |
artikel |
9 |
Developing a fuzzy analytic hierarchy process (AHP) model for behavior-based safety management
|
Dağdeviren, Metin |
|
2008 |
178 |
6 |
p. 1717-1733 17 p. |
artikel |
10 |
Efficient strategies for tough aggregate constraint-based sequential pattern mining
|
Chen, Enhong |
|
2008 |
178 |
6 |
p. 1498-1518 21 p. |
artikel |
11 |
Erratum to “Numerical solution of fuzzy differential equations by predictor–corrector method” [Inform. Sci. 177 (7) (2007) 1633–1647]
|
Allahviranloo, T. |
|
2008 |
178 |
6 |
p. 1780-1782 3 p. |
artikel |
12 |
Fast S-box security mechanism research based on the polymorphic cipher
|
Yin, Yifeng |
|
2008 |
178 |
6 |
p. 1603-1610 8 p. |
artikel |
13 |
Generalized rough sets over fuzzy lattices
|
Liu, Guilong |
|
2008 |
178 |
6 |
p. 1651-1662 12 p. |
artikel |
14 |
Improving inductive logic programming by using simulated annealing
|
Serrurier, Mathieu |
|
2008 |
178 |
6 |
p. 1423-1441 19 p. |
artikel |
15 |
Inside Front Cover - Editorial Board
|
|
|
2008 |
178 |
6 |
p. IFC- 1 p. |
artikel |
16 |
Multicast routing in mobile ad hoc networks by using a multiagent system
|
Manvi, S.S. |
|
2008 |
178 |
6 |
p. 1611-1628 18 p. |
artikel |
17 |
On the J-divergence of intuitionistic fuzzy sets with its application to pattern recognition
|
Hung, Wen-Liang |
|
2008 |
178 |
6 |
p. 1641-1650 10 p. |
artikel |
18 |
Random walk biclustering for microarray data
|
Angiulli, Fabrizio |
|
2008 |
178 |
6 |
p. 1479-1497 19 p. |
artikel |
19 |
Similar sequence matching supporting variable-length and variable-tolerance continuous queries on time-series data stream
|
Lim, Hyo-Sang |
|
2008 |
178 |
6 |
p. 1461-1478 18 p. |
artikel |
20 |
Software testing processes as a linear dynamic system
|
Cai, Kai-Yuan |
|
2008 |
178 |
6 |
p. 1558-1597 40 p. |
artikel |
21 |
Stability of vector optimization problems with fuzzy weights in the objective functions and fuzzy matrix parameters in the constraints
|
Kassem, Mohamed Abd El-Hady |
|
2008 |
178 |
6 |
p. 1663-1679 17 p. |
artikel |
22 |
State feedback control of continuous-time T–S fuzzy systems via switched fuzzy controllers
|
Dong, Jiuxiang |
|
2008 |
178 |
6 |
p. 1680-1695 16 p. |
artikel |
23 |
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
|
Xiao, Di |
|
2008 |
178 |
6 |
p. 1598-1602 5 p. |
artikel |