Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             61 results found
no title author magazine year volume issue page(s) type
1 A comparative study of suboptimal branch and bound algorithms Nakariyakul, Songyot
2014
278 C p. 545-554
10 p.
article
2 A discussion on the relationship between probabilistic visual cryptography and random grid Yang, Ching-Nung
2014
278 C p. 141-173
33 p.
article
3 A framework for edge detection based on relief functions Lopez-Molina, C.
2014
278 C p. 127-140
14 p.
article
4 An adaptive invasion-based model for distributed Differential Evolution De Falco, I.
2014
278 C p. 653-672
20 p.
article
5 An evolutionary algorithm to enhance multivariate Post-Randomization Method (PRAM) protections Marés, Jordi
2014
278 C p. 344-356
13 p.
article
6 A new model for robust facility layout problem Neghabi, Hossein
2014
278 C p. 498-509
12 p.
article
7 A robust adaptive array beamformer using particle swarm optimization for space–time code division multiple access systems Chang, Jhih-Chung
2014
278 C p. 174-186
13 p.
article
8 A semantic similarity measure based on information distance for ontology alignment Jiang, Yong
2014
278 C p. 76-87
12 p.
article
9 A seven-dimensional flow analysis to help autonomous network management de Assis, Marcos V.O.
2014
278 C p. 900-913
14 p.
article
10 Asynchronous L 1 control of delayed switched positive systems with mode-dependent average dwell time Xiang, Mei
2014
278 C p. 703-714
12 p.
article
11 Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests Singh, Kamaldeep
2014
278 C p. 488-497
10 p.
article
12 Browsing and exploration of video sequences: A new scheme for key frame extraction and 3D visualization using entropy based Jensen divergence Xu, Qing
2014
278 C p. 736-756
21 p.
article
13 Central tendency for symmetric random fuzzy numbers Sinova, Beatriz
2014
278 C p. 599-613
15 p.
article
14 Chebyshev type inequalities for general fuzzy integrals Hu, Yue
2014
278 C p. 822-825
4 p.
article
15 Computational power of tissue P systems for generating control languages Zhang, Xingyi
2014
278 C p. 285-297
13 p.
article
16 Correction and improvement on several results in quantitative logic Li, Cheng
2014
278 C p. 555-558
4 p.
article
17 CP-tree: An adaptive synopsis structure for compressing frequent itemsets over online data streams Shin, Se Jung
2014
278 C p. 559-576
18 p.
article
18 Data fusion of radar and image measurements for multi-object tracking via Kalman filtering Kim, Du Yong
2014
278 C p. 641-652
12 p.
article
19 Decision region distribution preservation reduction in decision-theoretic rough set model Ma, Xi’ao
2014
278 C p. 614-640
27 p.
article
20 Design of an efficient load balancing algorithm using the symmetric balanced incomplete block design Basu, Manjusri
2014
278 C p. 221-230
10 p.
article
21 Dimensional reduction of conditional algebraic multi-information via transcripts Amigó, J.M.
2014
278 C p. 298-310
13 p.
article
22 Disturbance attenuation and rejection for discrete-time Markovian jump systems with lossy measurements Yao, Xiuming
2014
278 C p. 673-684
12 p.
article
23 Efficiently processing ( p , ε ) -approximate join aggregation on massive data Han, Xixian
2014
278 C p. 773-792
20 p.
article
24 Efficient processing of continuous min–max distance bounded query with updates in road networks Huang, Yuan-Ko
2014
278 C p. 187-205
19 p.
article
25 Efficient verifiable multi-secret sharing scheme based on hash function Shao, Jun
2014
278 C p. 104-109
6 p.
article
26 Estimation of expected human attention weights based on a decision field theory model Abad, Andres G.
2014
278 C p. 520-534
15 p.
article
27 Evaluating center-seeking and initialization bias: The case of particle swarm and gravitational search algorithms Davarynejad, Mohsen
2014
278 C p. 802-821
20 p.
article
28 Evolution of knowledge sharing behavior in social commerce: An agent-based computational approach Jiang, Guoyin
2014
278 C p. 250-266
17 p.
article
29 Exact formulas for fixation probabilities on a complete oriented star Yang, Xiaofan
2014
278 C p. 862-867
6 p.
article
30 Expressive generalized itemsets Baralis, Elena
2014
278 C p. 327-343
17 p.
article
31 Extremality of degree-based graph entropies Cao, Shujuan
2014
278 C p. 22-33
12 p.
article
32 Fuzzy job-shop scheduling problems: A review Abdullah, Salwani
2014
278 C p. 380-407
28 p.
article
33 Fuzzy partitioning of continuous attributes through discretization methods to construct fuzzy decision tree classifiers Zeinalkhani, Mohsen
2014
278 C p. 715-735
21 p.
article
34 Games with fuzzy permission structure: A conjunctive approach Gallardo, J.M.
2014
278 C p. 510-519
10 p.
article
35 Generalized Atanassov’s operators defined on lattice fuzzy multisets Lizasoain, I.
2014
278 C p. 408-422
15 p.
article
36 Group preference modeling for intelligent shared environments: Social welfare beyond the sum Ok, Changsoo
2014
278 C p. 588-598
11 p.
article
37 Hypergraph-based data link layer scheduling for reliable packet delivery in wireless sensing and control networks with end-to-end delay constraints Yan, Mao
2014
278 C p. 34-55
22 p.
article
38 Inside Front Cover - Editorial Board 2014
278 C p. IFC-
1 p.
article
39 Integrated production planning and preventive maintenance in deteriorating production systems Yalaoui, Alice
2014
278 C p. 841-861
21 p.
article
40 Interactive fuzzy stochastic two-level linear programming with simple recourse Sakawa, Masatoshi
2014
278 C p. 67-75
9 p.
article
41 List-wise probabilistic matrix factorization for recommendation Liu, Juntao
2014
278 C p. 434-447
14 p.
article
42 Maintenance of prelarge trees for data mining with modified records Lin, Chun-Wei
2014
278 C p. 88-103
16 p.
article
43 Maximizing the spread of influence ranking in social networks Zhu, Tian
2014
278 C p. 535-544
10 p.
article
44 Measuring the impact of MVC attack in large complex networks Li, Rong-Hua
2014
278 C p. 685-702
18 p.
article
45 Modified teaching learning algorithm and double differential evolution algorithm for optimal reactive power dispatch problem: A comparative study Ghasemi, Mojtaba
2014
278 C p. 231-249
19 p.
article
46 Multiple object tracking with partial occlusion handling using salient feature points Naushad Ali, M.M.
2014
278 C p. 448-465
18 p.
article
47 New stability and tracking criteria for a class of bilateral teleoperation systems Islam, Shafiqul
2014
278 C p. 868-882
15 p.
article
48 On fuzzy approximately cubic type mapping in fuzzy Banach spaces Xu, Tian Zhou
2014
278 C p. 56-66
11 p.
article
49 On languages generated by spiking neural P systems with weights Zeng, Xiangxiang
2014
278 C p. 423-433
11 p.
article
50 Path planning for multiple mobile robots under double-warehouse Ma, Yong
2014
278 C p. 357-379
23 p.
article
51 Polygonal approximation using integer particle swarm optimization Wang, Bin
2014
278 C p. 311-326
16 p.
article
52 Practical verifiably encrypted signatures without random oracles Shao, Zuhua
2014
278 C p. 793-801
9 p.
article
53 Provably secure proxy convertible authenticated encryption scheme based on RSA Wu, Tzong-Sun
2014
278 C p. 577-587
11 p.
article
54 Reaching a joint decision with minimal elicitation of voter preferences Naamani Dery, Lihi
2014
278 C p. 466-487
22 p.
article
55 Sellers in e-marketplaces: A Fuzzy Logic based decision support system Kolomvatsos, Kostas
2014
278 C p. 267-284
18 p.
article
56 Some properties of L-fuzzy approximation spaces based on bounded integral residuated lattices Wang, Zhudeng
2014
278 C p. 110-126
17 p.
article
57 The anti-bouncing data stream model for web usage streams with intralinkings Zhang, Chongsheng
2014
278 C p. 757-772
16 p.
article
58 The effect of news and public mood on stock movements Li, Qing
2014
278 C p. 826-840
15 p.
article
59 The structures of intuitionistic fuzzy equivalence relations Li, Boquan
2014
278 C p. 883-899
17 p.
article
60 Trustworthy dimension reduction for visualization different data sets Najim, Safa A.
2014
278 C p. 206-220
15 p.
article
61 Vectorized procedural models for animated trees reconstruction using differential evolution Zamuda, Aleš
2014
278 C p. 1-21
21 p.
article
                             61 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands