Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             33 results found
no title author magazine year volume issue page(s) type
1 A logical approach to fuzzy truth hedges Esteva, Francesc
2013
232 C p. 366-385
20 p.
article
2 A meta-learning approach for determining the number of clusters with consideration of nearest neighbors Lee, Jong-Seok
2013
232 C p. 208-224
17 p.
article
3 An efficient B+-tree design for main-memory database systems with strong access locality Suei, Pei-Lun
2013
232 C p. 325-345
21 p.
article
4 An efficient classification approach for large-scale mobile ubiquitous computing Tang, Feilong
2013
232 C p. 419-436
18 p.
article
5 A new distributed cooperative MIMO scheme for mobile ad hoc networks de Moraes, Renato M.
2013
232 C p. 88-103
16 p.
article
6 A new indirect approach to the type-2 fuzzy systems modeling and design Fazel Zarandi, M.H.
2013
232 C p. 346-365
20 p.
article
7 An improved adaptive binary Harmony Search algorithm Wang, Ling
2013
232 C p. 58-87
30 p.
article
8 An interleaving semantics for UML 2 interactions using Petri nets Bouabana-Tebibel, Thouraya
2013
232 C p. 276-293
18 p.
article
9 Application traffic classification at the early stage by characterizing application rounds Huang, Nen-Fu
2013
232 C p. 130-142
13 p.
article
10 Automatic seed set expansion for trust propagation based anti-spam algorithms Zhang, Xianchao
2013
232 C p. 167-187
21 p.
article
11 A VIKOR technique based on DEMATEL and ANP for information security risk control assessment Ou Yang, Yu-Ping
2013
232 C p. 482-500
19 p.
article
12 Can fuzzy entropies be effective measures for evaluating the roughness of a rough set? Wei, Wei
2013
232 C p. 143-166
24 p.
article
13 Cuts of intuitionistic fuzzy sets respecting fuzzy connectives Martinetti, Davide
2013
232 C p. 267-275
9 p.
article
14 Dynamic router node placement in wireless mesh networks: A PSO approach with constriction coefficient and its convergence analysis Lin, Chun-Cheng
2013
232 C p. 294-308
15 p.
article
15 Efficient processing of requests with network coding in on-demand data broadcast environments Chen, Jun
2013
232 C p. 27-43
17 p.
article
16 Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario Vidya Banu, R.
2013
232 C p. 437-448
12 p.
article
17 Fully secure hidden vector encryption under standard assumptions Park, Jong Hwan
2013
232 C p. 188-207
20 p.
article
18 Fuzzy colored time Petri net and termination analysis for fuzzy Event-Condition-Action rules Wang, Xiaoming
2013
232 C p. 225-240
16 p.
article
19 Global exponential periodicity and stability of a class of memristor-based recurrent neural networks with multiple delays Zhang, Guodong
2013
232 C p. 386-396
11 p.
article
20 Improving timing attack on RSA-CRT via error detection and correction strategy Chen, CaiSen
2013
232 C p. 464-474
11 p.
article
21 Inside Front Cover - Editorial Board 2013
232 C p. IFC-
1 p.
article
22 K-local hyperplane distance nearest neighbor classifier oriented local discriminant analysis Xu, Jie
2013
232 C p. 11-26
16 p.
article
23 Membership-function-dependent stability analysis of fuzzy-model-based control systems using fuzzy Lyapunov functions Lam, H.K.
2013
232 C p. 253-266
14 p.
article
24 Network-based H ∞ output feedback control for uncertain stochastic systems Wu, Junli
2013
232 C p. 397-410
14 p.
article
25 On security of a certificateless signcryption scheme Miao, Songqin
2013
232 C p. 475-481
7 p.
article
26 On some basic concepts in probability of IF-events Grzegorzewski, Przemysław
2013
232 C p. 411-418
8 p.
article
27 Optimized bi-dimensional data projection for clustering visualization Peres, Rodrigo T.
2013
232 C p. 104-115
12 p.
article
28 Rough matroids based on relations Zhu, William
2013
232 C p. 241-252
12 p.
article
29 Skyline queries on keyword-matched data Choi, Hyunsik
2013
232 C p. 449-463
15 p.
article
30 Soft large margin clustering Wang, Yunyun
2013
232 C p. 116-129
14 p.
article
31 Soft subsets and soft product operations Feng, Feng
2013
232 C p. 44-57
14 p.
article
32 The alpha parallelogram predictor: A lossless compression method for motion capture data Wang, Pengjie
2013
232 C p. 1-10
10 p.
article
33 Undesired state-action prediction in multi-agent reinforcement learning for linked multi-component robotic system control Fernandez-Gauna, Borja
2013
232 C p. 309-324
16 p.
article
                             33 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands