nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A heuristic-based hybrid genetic-variable neighborhood search algorithm for task scheduling in heterogeneous multiprocessor system
|
Wen, Yun |
|
2011 |
181 |
3 |
p. 567-581 15 p. |
artikel |
2 |
An effective hybrid discrete differential evolution algorithm for the flow shop scheduling with intermediate buffers
|
Pan, Quan-Ke |
|
2011 |
181 |
3 |
p. 668-685 18 p. |
artikel |
3 |
Comments on a numerical method for solving Boolean equations
|
Brown, Frank Markham |
|
2011 |
181 |
3 |
p. 547-551 5 p. |
artikel |
4 |
Computer network reliability optimization under double-resource assignments subject to a transmission budget
|
Lin, Yi-Kuei |
|
2011 |
181 |
3 |
p. 582-599 18 p. |
artikel |
5 |
Conditional edge-fault-tolerant Hamiltonicity of dual-cubes
|
Chen, Jheng-Cheng |
|
2011 |
181 |
3 |
p. 620-627 8 p. |
artikel |
6 |
Cryptanalysis of a certificateless signcryption scheme in the standard model
|
Weng, Jian |
|
2011 |
181 |
3 |
p. 661-667 7 p. |
artikel |
7 |
Discovering multi-label temporal patterns in sequence databases
|
Chen, Yen-Liang |
|
2011 |
181 |
3 |
p. 398-418 21 p. |
artikel |
8 |
Erratum to “Divergence statistics for testing uniform association in cross-classifications” [Inform. Sci. 180 (2010) 4557–4571]
|
Alba-Fernández, V. |
|
2011 |
181 |
3 |
p. 697- 1 p. |
artikel |
9 |
Forward-secure identity-based signature: Security notions and construction
|
Yu, Jia |
|
2011 |
181 |
3 |
p. 648-660 13 p. |
artikel |
10 |
Improving data perturbation testing techniques for Web services
|
de Melo, Ana C.V. |
|
2011 |
181 |
3 |
p. 600-619 20 p. |
artikel |
11 |
Inside Front Cover - Editorial Board
|
|
|
2011 |
181 |
3 |
p. IFC- 1 p. |
artikel |
12 |
Networked H ∞ filtering for linear discrete-time systems
|
Song, Hongbo |
|
2011 |
181 |
3 |
p. 686-696 11 p. |
artikel |
13 |
Noise-robust algorithm for identifying functionally associated biclusters from gene expression data
|
Ahn, Jaegyoon |
|
2011 |
181 |
3 |
p. 435-449 15 p. |
artikel |
14 |
On-the-fly calibrating strategies for evolutionary algorithms
|
Montero, Elizabeth |
|
2011 |
181 |
3 |
p. 552-566 15 p. |
artikel |
15 |
Optimistic and pessimistic decision making with dissonance reduction using interval-valued fuzzy sets
|
Chen, Ting-Yu |
|
2011 |
181 |
3 |
p. 479-502 24 p. |
artikel |
16 |
Perceptually adaptive spread transform image watermarking scheme using Hadamard transform
|
Maity, Santi P. |
|
2011 |
181 |
3 |
p. 450-465 16 p. |
artikel |
17 |
Piecewise linear aggregation functions based on triangulation
|
De Baets, B. |
|
2011 |
181 |
3 |
p. 466-478 13 p. |
artikel |
18 |
Provably secure identity-based authenticated key agreement protocols with malicious private key generators
|
Guo, Hua |
|
2011 |
181 |
3 |
p. 628-647 20 p. |
artikel |
19 |
Simulation of the bird age-structured population growth based on an interval type-2 fuzzy cellular structure
|
Leal-Ramírez, Cecilia |
|
2011 |
181 |
3 |
p. 519-535 17 p. |
artikel |
20 |
The inclusion–exclusion principle for IF-events
|
Grzegorzewski, Przemysław |
|
2011 |
181 |
3 |
p. 536-546 11 p. |
artikel |
21 |
Uncertainty measures for general Type-2 fuzzy sets
|
Zhai, Daoyuan |
|
2011 |
181 |
3 |
p. 503-518 16 p. |
artikel |
22 |
Using adjustable autonomy and human–machine cooperation to make a human–machine system resilient – Application to a ground robotic system
|
Zieba, Stéphane |
|
2011 |
181 |
3 |
p. 379-397 19 p. |
artikel |
23 |
Using ontologies to facilitate post-processing of association rules by domain experts
|
Mansingh, Gunjan |
|
2011 |
181 |
3 |
p. 419-434 16 p. |
artikel |