nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A class of rough multiple objective programming and its application to solid transportation problem
|
Tao, Zhimiao |
|
2012 |
188 |
C |
p. 215-235 21 p. |
artikel |
2 |
A compact covering method to exploit embedding capacity for matrix encoding
|
Lin, Ren-Der |
|
2012 |
188 |
C |
p. 170-181 12 p. |
artikel |
3 |
A functional interpretation of linguistic summaries of data
|
Liétard, Ludovic |
|
2012 |
188 |
C |
p. 1-16 16 p. |
artikel |
4 |
A novel approach to probability distribution aggregation
|
Liu, X. |
|
2012 |
188 |
C |
p. 269-275 7 p. |
artikel |
5 |
A probabilistic framework for estimating the accuracy of aggregate range queries evaluated over histograms
|
Buccafurri, Francesco |
|
2012 |
188 |
C |
p. 121-150 30 p. |
artikel |
6 |
Bottleneck machine identification method based on constraint transformation for job shop scheduling with genetic algorithm
|
Zhang, Rui |
|
2012 |
188 |
C |
p. 236-252 17 p. |
artikel |
7 |
Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures
|
Bicakci, Kemal |
|
2012 |
188 |
C |
p. 44-63 20 p. |
artikel |
8 |
Diagnosability of star graphs with missing edges
|
Chiang, Chieh-Feng |
|
2012 |
188 |
C |
p. 253-259 7 p. |
artikel |
9 |
Edge fault tolerance of super edge connectivity for three families of interconnection networks
|
Wang, Dongye |
|
2012 |
188 |
C |
p. 260-268 9 p. |
artikel |
10 |
Efficient certificateless proxy signature scheme with provable security
|
Seo, Seung-Hyun |
|
2012 |
188 |
C |
p. 322-337 16 p. |
artikel |
11 |
Entropy-based efficiency enhancement techniques for evolutionary algorithms
|
Luong, Hoang Ngoc |
|
2012 |
188 |
C |
p. 100-120 21 p. |
artikel |
12 |
Formal context coverage based on isolated labels: An efficient solution for text feature extraction
|
Ferjani, Fethi |
|
2012 |
188 |
C |
p. 198-214 17 p. |
artikel |
13 |
Group skyline computation
|
Im, Hyeonseung |
|
2012 |
188 |
C |
p. 151-169 19 p. |
artikel |
14 |
Inferring gene regulatory networks using a hybrid GA–PSO approach with numerical constraints and network decomposition
|
Lee, Wei-Po |
|
2012 |
188 |
C |
p. 80-99 20 p. |
artikel |
15 |
Inside Front Cover - Editorial Board
|
|
|
2012 |
188 |
C |
p. IFC- 1 p. |
artikel |
16 |
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
|
Lou, Der-Chyuan |
|
2012 |
188 |
C |
p. 346-358 13 p. |
artikel |
17 |
Multiset topologies induced by multiset relations
|
Girish, K.P. |
|
2012 |
188 |
C |
p. 298-313 16 p. |
artikel |
18 |
Ockham’s Razor in memetic computing: Three stage optimal memetic exploration
|
Iacca, Giovanni |
|
2012 |
188 |
C |
p. 17-43 27 p. |
artikel |
19 |
On improving temporal and spatial mobility metrics for wireless ad hoc networks
|
Cavalcanti, Elmano Ramalho |
|
2012 |
188 |
C |
p. 182-197 16 p. |
artikel |
20 |
Processing generalized k-nearest neighbor queries on a wireless broadcast stream
|
Jung, HaRim |
|
2012 |
188 |
C |
p. 64-79 16 p. |
artikel |
21 |
The Henstock–Stieltjes integral for fuzzy-number-valued functions
|
Gong, Zengtai |
|
2012 |
188 |
C |
p. 276-297 22 p. |
artikel |
22 |
The relationship between similarity measure and entropy of intuitionistic fuzzy sets
|
Li, Jinquan |
|
2012 |
188 |
C |
p. 314-321 8 p. |
artikel |
23 |
Two extensions of the ring signature scheme of Rivest–Shamir–Taumann
|
Dong, Qingkuan |
|
2012 |
188 |
C |
p. 338-345 8 p. |
artikel |