Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             23 results found
no title author magazine year volume issue page(s) type
1 A heuristic-based hybrid genetic-variable neighborhood search algorithm for task scheduling in heterogeneous multiprocessor system Wen, Yun
2011
181 3 p. 567-581
15 p.
article
2 An effective hybrid discrete differential evolution algorithm for the flow shop scheduling with intermediate buffers Pan, Quan-Ke
2011
181 3 p. 668-685
18 p.
article
3 Comments on a numerical method for solving Boolean equations Brown, Frank Markham
2011
181 3 p. 547-551
5 p.
article
4 Computer network reliability optimization under double-resource assignments subject to a transmission budget Lin, Yi-Kuei
2011
181 3 p. 582-599
18 p.
article
5 Conditional edge-fault-tolerant Hamiltonicity of dual-cubes Chen, Jheng-Cheng
2011
181 3 p. 620-627
8 p.
article
6 Cryptanalysis of a certificateless signcryption scheme in the standard model Weng, Jian
2011
181 3 p. 661-667
7 p.
article
7 Discovering multi-label temporal patterns in sequence databases Chen, Yen-Liang
2011
181 3 p. 398-418
21 p.
article
8 Erratum to “Divergence statistics for testing uniform association in cross-classifications” [Inform. Sci. 180 (2010) 4557–4571] Alba-Fernández, V.
2011
181 3 p. 697-
1 p.
article
9 Forward-secure identity-based signature: Security notions and construction Yu, Jia
2011
181 3 p. 648-660
13 p.
article
10 Improving data perturbation testing techniques for Web services de Melo, Ana C.V.
2011
181 3 p. 600-619
20 p.
article
11 Inside Front Cover - Editorial Board 2011
181 3 p. IFC-
1 p.
article
12 Networked H ∞ filtering for linear discrete-time systems Song, Hongbo
2011
181 3 p. 686-696
11 p.
article
13 Noise-robust algorithm for identifying functionally associated biclusters from gene expression data Ahn, Jaegyoon
2011
181 3 p. 435-449
15 p.
article
14 On-the-fly calibrating strategies for evolutionary algorithms Montero, Elizabeth
2011
181 3 p. 552-566
15 p.
article
15 Optimistic and pessimistic decision making with dissonance reduction using interval-valued fuzzy sets Chen, Ting-Yu
2011
181 3 p. 479-502
24 p.
article
16 Perceptually adaptive spread transform image watermarking scheme using Hadamard transform Maity, Santi P.
2011
181 3 p. 450-465
16 p.
article
17 Piecewise linear aggregation functions based on triangulation De Baets, B.
2011
181 3 p. 466-478
13 p.
article
18 Provably secure identity-based authenticated key agreement protocols with malicious private key generators Guo, Hua
2011
181 3 p. 628-647
20 p.
article
19 Simulation of the bird age-structured population growth based on an interval type-2 fuzzy cellular structure Leal-Ramírez, Cecilia
2011
181 3 p. 519-535
17 p.
article
20 The inclusion–exclusion principle for IF-events Grzegorzewski, Przemysław
2011
181 3 p. 536-546
11 p.
article
21 Uncertainty measures for general Type-2 fuzzy sets Zhai, Daoyuan
2011
181 3 p. 503-518
16 p.
article
22 Using adjustable autonomy and human–machine cooperation to make a human–machine system resilient – Application to a ground robotic system Zieba, Stéphane
2011
181 3 p. 379-397
19 p.
article
23 Using ontologies to facilitate post-processing of association rules by domain experts Mansingh, Gunjan
2011
181 3 p. 419-434
16 p.
article
                             23 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands