nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A logical approach to fuzzy truth hedges
|
Esteva, Francesc |
|
2013 |
232 |
C |
p. 366-385 20 p. |
artikel |
2 |
A meta-learning approach for determining the number of clusters with consideration of nearest neighbors
|
Lee, Jong-Seok |
|
2013 |
232 |
C |
p. 208-224 17 p. |
artikel |
3 |
An efficient B+-tree design for main-memory database systems with strong access locality
|
Suei, Pei-Lun |
|
2013 |
232 |
C |
p. 325-345 21 p. |
artikel |
4 |
An efficient classification approach for large-scale mobile ubiquitous computing
|
Tang, Feilong |
|
2013 |
232 |
C |
p. 419-436 18 p. |
artikel |
5 |
A new distributed cooperative MIMO scheme for mobile ad hoc networks
|
de Moraes, Renato M. |
|
2013 |
232 |
C |
p. 88-103 16 p. |
artikel |
6 |
A new indirect approach to the type-2 fuzzy systems modeling and design
|
Fazel Zarandi, M.H. |
|
2013 |
232 |
C |
p. 346-365 20 p. |
artikel |
7 |
An improved adaptive binary Harmony Search algorithm
|
Wang, Ling |
|
2013 |
232 |
C |
p. 58-87 30 p. |
artikel |
8 |
An interleaving semantics for UML 2 interactions using Petri nets
|
Bouabana-Tebibel, Thouraya |
|
2013 |
232 |
C |
p. 276-293 18 p. |
artikel |
9 |
Application traffic classification at the early stage by characterizing application rounds
|
Huang, Nen-Fu |
|
2013 |
232 |
C |
p. 130-142 13 p. |
artikel |
10 |
Automatic seed set expansion for trust propagation based anti-spam algorithms
|
Zhang, Xianchao |
|
2013 |
232 |
C |
p. 167-187 21 p. |
artikel |
11 |
A VIKOR technique based on DEMATEL and ANP for information security risk control assessment
|
Ou Yang, Yu-Ping |
|
2013 |
232 |
C |
p. 482-500 19 p. |
artikel |
12 |
Can fuzzy entropies be effective measures for evaluating the roughness of a rough set?
|
Wei, Wei |
|
2013 |
232 |
C |
p. 143-166 24 p. |
artikel |
13 |
Cuts of intuitionistic fuzzy sets respecting fuzzy connectives
|
Martinetti, Davide |
|
2013 |
232 |
C |
p. 267-275 9 p. |
artikel |
14 |
Dynamic router node placement in wireless mesh networks: A PSO approach with constriction coefficient and its convergence analysis
|
Lin, Chun-Cheng |
|
2013 |
232 |
C |
p. 294-308 15 p. |
artikel |
15 |
Efficient processing of requests with network coding in on-demand data broadcast environments
|
Chen, Jun |
|
2013 |
232 |
C |
p. 27-43 17 p. |
artikel |
16 |
Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario
|
Vidya Banu, R. |
|
2013 |
232 |
C |
p. 437-448 12 p. |
artikel |
17 |
Fully secure hidden vector encryption under standard assumptions
|
Park, Jong Hwan |
|
2013 |
232 |
C |
p. 188-207 20 p. |
artikel |
18 |
Fuzzy colored time Petri net and termination analysis for fuzzy Event-Condition-Action rules
|
Wang, Xiaoming |
|
2013 |
232 |
C |
p. 225-240 16 p. |
artikel |
19 |
Global exponential periodicity and stability of a class of memristor-based recurrent neural networks with multiple delays
|
Zhang, Guodong |
|
2013 |
232 |
C |
p. 386-396 11 p. |
artikel |
20 |
Improving timing attack on RSA-CRT via error detection and correction strategy
|
Chen, CaiSen |
|
2013 |
232 |
C |
p. 464-474 11 p. |
artikel |
21 |
Inside Front Cover - Editorial Board
|
|
|
2013 |
232 |
C |
p. IFC- 1 p. |
artikel |
22 |
K-local hyperplane distance nearest neighbor classifier oriented local discriminant analysis
|
Xu, Jie |
|
2013 |
232 |
C |
p. 11-26 16 p. |
artikel |
23 |
Membership-function-dependent stability analysis of fuzzy-model-based control systems using fuzzy Lyapunov functions
|
Lam, H.K. |
|
2013 |
232 |
C |
p. 253-266 14 p. |
artikel |
24 |
Network-based H ∞ output feedback control for uncertain stochastic systems
|
Wu, Junli |
|
2013 |
232 |
C |
p. 397-410 14 p. |
artikel |
25 |
On security of a certificateless signcryption scheme
|
Miao, Songqin |
|
2013 |
232 |
C |
p. 475-481 7 p. |
artikel |
26 |
On some basic concepts in probability of IF-events
|
Grzegorzewski, Przemysław |
|
2013 |
232 |
C |
p. 411-418 8 p. |
artikel |
27 |
Optimized bi-dimensional data projection for clustering visualization
|
Peres, Rodrigo T. |
|
2013 |
232 |
C |
p. 104-115 12 p. |
artikel |
28 |
Rough matroids based on relations
|
Zhu, William |
|
2013 |
232 |
C |
p. 241-252 12 p. |
artikel |
29 |
Skyline queries on keyword-matched data
|
Choi, Hyunsik |
|
2013 |
232 |
C |
p. 449-463 15 p. |
artikel |
30 |
Soft large margin clustering
|
Wang, Yunyun |
|
2013 |
232 |
C |
p. 116-129 14 p. |
artikel |
31 |
Soft subsets and soft product operations
|
Feng, Feng |
|
2013 |
232 |
C |
p. 44-57 14 p. |
artikel |
32 |
The alpha parallelogram predictor: A lossless compression method for motion capture data
|
Wang, Pengjie |
|
2013 |
232 |
C |
p. 1-10 10 p. |
artikel |
33 |
Undesired state-action prediction in multi-agent reinforcement learning for linked multi-component robotic system control
|
Fernandez-Gauna, Borja |
|
2013 |
232 |
C |
p. 309-324 16 p. |
artikel |