Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             23 results found
no title author magazine year volume issue page(s) type
1 A class of rough multiple objective programming and its application to solid transportation problem Tao, Zhimiao
2012
188 C p. 215-235
21 p.
article
2 A compact covering method to exploit embedding capacity for matrix encoding Lin, Ren-Der
2012
188 C p. 170-181
12 p.
article
3 A functional interpretation of linguistic summaries of data Liétard, Ludovic
2012
188 C p. 1-16
16 p.
article
4 A novel approach to probability distribution aggregation Liu, X.
2012
188 C p. 269-275
7 p.
article
5 A probabilistic framework for estimating the accuracy of aggregate range queries evaluated over histograms Buccafurri, Francesco
2012
188 C p. 121-150
30 p.
article
6 Bottleneck machine identification method based on constraint transformation for job shop scheduling with genetic algorithm Zhang, Rui
2012
188 C p. 236-252
17 p.
article
7 Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures Bicakci, Kemal
2012
188 C p. 44-63
20 p.
article
8 Diagnosability of star graphs with missing edges Chiang, Chieh-Feng
2012
188 C p. 253-259
7 p.
article
9 Edge fault tolerance of super edge connectivity for three families of interconnection networks Wang, Dongye
2012
188 C p. 260-268
9 p.
article
10 Efficient certificateless proxy signature scheme with provable security Seo, Seung-Hyun
2012
188 C p. 322-337
16 p.
article
11 Entropy-based efficiency enhancement techniques for evolutionary algorithms Luong, Hoang Ngoc
2012
188 C p. 100-120
21 p.
article
12 Formal context coverage based on isolated labels: An efficient solution for text feature extraction Ferjani, Fethi
2012
188 C p. 198-214
17 p.
article
13 Group skyline computation Im, Hyeonseung
2012
188 C p. 151-169
19 p.
article
14 Inferring gene regulatory networks using a hybrid GA–PSO approach with numerical constraints and network decomposition Lee, Wei-Po
2012
188 C p. 80-99
20 p.
article
15 Inside Front Cover - Editorial Board 2012
188 C p. IFC-
1 p.
article
16 LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis Lou, Der-Chyuan
2012
188 C p. 346-358
13 p.
article
17 Multiset topologies induced by multiset relations Girish, K.P.
2012
188 C p. 298-313
16 p.
article
18 Ockham’s Razor in memetic computing: Three stage optimal memetic exploration Iacca, Giovanni
2012
188 C p. 17-43
27 p.
article
19 On improving temporal and spatial mobility metrics for wireless ad hoc networks Cavalcanti, Elmano Ramalho
2012
188 C p. 182-197
16 p.
article
20 Processing generalized k-nearest neighbor queries on a wireless broadcast stream Jung, HaRim
2012
188 C p. 64-79
16 p.
article
21 The Henstock–Stieltjes integral for fuzzy-number-valued functions Gong, Zengtai
2012
188 C p. 276-297
22 p.
article
22 The relationship between similarity measure and entropy of intuitionistic fuzzy sets Li, Jinquan
2012
188 C p. 314-321
8 p.
article
23 Two extensions of the ring signature scheme of Rivest–Shamir–Taumann Dong, Qingkuan
2012
188 C p. 338-345
8 p.
article
                             23 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands