Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             90 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A coalgebraic approach to non-determinism: Applications to multilattices Cabrera, I.P.
2010
334-335 22 p. 4323-4335
13 p.
artikel
2 Adaptive fuzzy tracking control of nonlinear time-delay systems with unknown virtual control coefficients Wang, Min
2008
334-335 22 p. 4326-4340
15 p.
artikel
3 Advanced structural joins using element distribution Kim, Jongik
2006
334-335 22 p. 3300-3331
32 p.
artikel
4 Affine equivalence of cubic homogeneous rotation symmetric functions Cusick, Thomas W.
2011
334-335 22 p. 5067-5083
17 p.
artikel
5 A Fuzzy Asymmetric GARCH model applied to stock markets Hung, Jui-Chung
2009
334-335 22 p. 3930-3943
14 p.
artikel
6 A hybrid content-based and item-based collaborative filtering approach to recommend TV programs enhanced with singular value decomposition Barragáns-Martínez, Ana Belén
2010
334-335 22 p. 4290-4311
22 p.
artikel
7 A hybrid multi-objective immune algorithm for a flow shop scheduling problem with bi-objectives: Weighted mean completion time and weighted mean tardiness Tavakkoli-Moghaddam, Reza
2007
334-335 22 p. 5072-5090
19 p.
artikel
8 A locally linear RBF network-based state-dependent AR model for nonlinear time series modeling Gan, Min
2010
334-335 22 p. 4370-4383
14 p.
artikel
9 A multi-dimensional indexing approach for timestamped event sequence matching Park, Sanghyun
2007
334-335 22 p. 4859-4876
18 p.
artikel
10 A multisecret sharing scheme for color images based on cellular automata Alvarez, G.
2008
334-335 22 p. 4382-4395
14 p.
artikel
11 An efficient parity detection technique using the two-moduli set {2 h −1,2 h +1} Chen, Chien-Yuan
2006
334-335 22 p. 3426-3430
5 p.
artikel
12 A new approach to robust and non-fragile H ∞ control for uncertain fuzzy systems Zhang, Baoyong
2007
334-335 22 p. 5118-5133
16 p.
artikel
13 A new data hiding scheme for binary image authentication with small image distortion Lee, Younho
2009
334-335 22 p. 3866-3884
19 p.
artikel
14 A new evolutionary search strategy for global optimization of high-dimensional problems Chu, Wei
2011
334-335 22 p. 4909-4927
19 p.
artikel
15 A note on continuity in scalarization for multicriteria optimization problems Šipošová, Alexandra
2011
334-335 22 p. 5119-5122
4 p.
artikel
16 A novel extended local-binary-pattern operator for texture analysis Zhou, Hui
2008
334-335 22 p. 4314-4325
12 p.
artikel
17 An overview of recent applications of Game Theory to bioinformatics Moretti, Stefano
2010
334-335 22 p. 4312-4322
11 p.
artikel
18 Application of adaptive weights to intelligent information systems: An intelligent transportation system as a case study Dong, Chuanfei
2011
334-335 22 p. 5042-5052
11 p.
artikel
19 Approximation of fuzzy context-free grammars Wang, Yongbing
2009
334-335 22 p. 3920-3929
10 p.
artikel
20 A PROMETHEE-based classification method using concordance and discordance relations and its application to bankruptcy prediction Hu, Yi-Chung
2011
334-335 22 p. 4959-4968
10 p.
artikel
21 A pure labeled transition semantics for the applied pi calculus Cai, Xiaojuan
2010
334-335 22 p. 4436-4458
23 p.
artikel
22 A quantitative model for software engineering trends Arfa Rabai, Latifa Ben
2011
334-335 22 p. 4993-5009
17 p.
artikel
23 A simple simulated annealing algorithm for the maximum clique problem Geng, Xiutang
2007
334-335 22 p. 5064-5071
8 p.
artikel
24 A timed mobile agent planning approach for distributed information retrieval in dynamic network environments Baek, Jin-Wook
2006
334-335 22 p. 3347-3378
32 p.
artikel
25 BCI-implicative ideals of BCI-algebras Liu, Yong Lin
2007
334-335 22 p. 4987-4996
10 p.
artikel
26 CGD-GA: A graph-based genetic algorithm for sensor network design Carballido, Jessica A.
2007
334-335 22 p. 5091-5102
12 p.
artikel
27 Codes based on BCK-algebras Jun, Young Bae
2011
334-335 22 p. 5102-5109
8 p.
artikel
28 Communication efficient shuffle for mental poker protocols Wei, Tzer-jen
2011
334-335 22 p. 5053-5066
14 p.
artikel
29 Complete path embeddings in crossed cubes Fan, Jianxi
2006
334-335 22 p. 3332-3346
15 p.
artikel
30 Constructions in the category of fuzzy T-proximity spaces Hashem, Khaled A.
2007
334-335 22 p. 4947-4958
12 p.
artikel
31 Data analysis based on discernibility and indiscernibility Zhao, Yan
2007
334-335 22 p. 4959-4976
18 p.
artikel
32 Data envelopment analysis classification machine Yan, Hong
2011
334-335 22 p. 5029-5041
13 p.
artikel
33 Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: The case of a gas refinery Azadeh, A.
2008
334-335 22 p. 4280-4300
21 p.
artikel
34 Differential evolution in constrained numerical optimization: An empirical study Mezura-Montes, Efrén
2010
334-335 22 p. 4223-4262
40 p.
artikel
35 Editorial Board 2006
334-335 22 p. CO2-
1 p.
artikel
36 EED: Energy Efficient Disk drive architecture Deng, Yuhui
2008
334-335 22 p. 4403-4417
15 p.
artikel
37 Efficient cache invalidation schemes for mobile data accesses Chuang, Po-Jen
2011
334-335 22 p. 5084-5101
18 p.
artikel
38 Encoding fuzzy possibilistic diagnostics as a constrained optimization problem Sala, Antonio
2008
334-335 22 p. 4246-4263
18 p.
artikel
39 Fast discovery of sequential patterns in large databases using effective time-indexing Lin, Ming-Yen
2008
334-335 22 p. 4228-4245
18 p.
artikel
40 Feature selection via Boolean independent component analysis Apolloni, Bruno
2009
334-335 22 p. 3815-3831
17 p.
artikel
41 Fuzzy radicals and prime fuzzy ideals of ordered semigroups Xie, Xiang-Yun
2008
334-335 22 p. 4357-4374
18 p.
artikel
42 GAKREM: A novel hybrid clustering algorithm Nguyen, Cao D.
2008
334-335 22 p. 4205-4227
23 p.
artikel
43 Generalized rough sets based on relations Zhu, William
2007
334-335 22 p. 4997-5011
15 p.
artikel
44 Halfway through the semantic gap: Prosemantic features for image retrieval Ciocca, Gianluigi
2011
334-335 22 p. 4943-4958
16 p.
artikel
45 H ∞ filtering of networked discrete-time systems with random packet losses Zhang, Wen-An
2009
334-335 22 p. 3944-3955
12 p.
artikel
46 Image retrieval model based on weighted visual features determined by relevance feedback Kim, Woo-Cheol
2008
334-335 22 p. 4301-4313
13 p.
artikel
47 Inside Front Cover - Editorial Board 2010
334-335 22 p. IFC-
1 p.
artikel
48 Inside Front Cover - Editorial Board 2007
334-335 22 p. IFC-
1 p.
artikel
49 Inside Front Cover - Editorial Board 2009
334-335 22 p. IFC-
1 p.
artikel
50 Inside Front Cover - Editorial Board 2008
334-335 22 p. IFC-
1 p.
artikel
51 Inside Front Cover - Editorial Board 2011
334-335 22 p. IFC-
1 p.
artikel
52 Linearly many faults in Cayley graphs generated by transposition trees Cheng, Eddie
2007
334-335 22 p. 4877-4882
6 p.
artikel
53 Mining temporal patterns in popularity of web items Loh, Woong-Kee
2011
334-335 22 p. 5010-5028
19 p.
artikel
54 Modeling uncertain variables of the weighted average operation by fuzzy vectors Pavlačka, Ondřej
2011
334-335 22 p. 4969-4992
24 p.
artikel
55 Multi-Objective Particle Swarm Optimization with time variant inertia and acceleration coefficients Tripathi, Praveen Kumar
2007
334-335 22 p. 5033-5049
17 p.
artikel
56 New image steganographic methods using run-length approach Chang, Chin-Chen
2006
334-335 22 p. 3393-3408
16 p.
artikel
57 Notes on “the lower and upper approximations in a fuzzy group” and “rough ideals in semigroups” Cheng, Wei
2007
334-335 22 p. 5134-5140
7 p.
artikel
58 On-demand broadcast for multiple-item requests in a multiple-channel environment Liu, Kai
2010
334-335 22 p. 4336-4352
17 p.
artikel
59 One-and-only item recommendation with fuzzy logic techniques Cornelis, Chris
2007
334-335 22 p. 4906-4921
16 p.
artikel
60 One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity Xu, Peng
2010
334-335 22 p. 4420-4429
10 p.
artikel
61 On-line fuzzy modeling via clustering and support vector machines Yu, Wen
2008
334-335 22 p. 4264-4279
16 p.
artikel
62 On minimum Fisher information distributions with restricted support and fixed variance Bercher, J.-F.
2009
334-335 22 p. 3832-3842
11 p.
artikel
63 On principal component analysis, cosine and Euclidean measures in information retrieval Korenius, Tuomo
2007
334-335 22 p. 4893-4905
13 p.
artikel
64 On ∗–λ-semirings Feng, Feng
2007
334-335 22 p. 5012-5023
12 p.
artikel
65 On the dispersion measure of OWA operators Yager, Ronald R.
2009
334-335 22 p. 3908-3919
12 p.
artikel
66 On the k-tuple domination of generalized de Brujin and Kautz digraphs Wu, Lingye
2010
334-335 22 p. 4430-4435
6 p.
artikel
67 Optimal companding vector quantization for circularly symmetric sources Perić, Zoran H.
2008
334-335 22 p. 4375-4381
7 p.
artikel
68 Performance bottleneck of subsequence matching in time-series databases: Observation, solution, and performance evaluation Kim, Sang-Wook
2007
334-335 22 p. 4841-4858
18 p.
artikel
69 Per-stream loss behavior of ∑MAP/M/1/K queuing system with a random early detection mechanism Wang, Yung-Chung
2009
334-335 22 p. 3893-3907
15 p.
artikel
70 Quotient structures of intuitionistic fuzzy finite state machines Jun, Young Bae
2007
334-335 22 p. 4977-4986
10 p.
artikel
71 Risk assessment of serious crime with fuzzy random theory Shen, Qiang
2010
334-335 22 p. 4401-4411
11 p.
artikel
72 Robust adaptive critic control of nonlinear systems using fuzzy basis function networks: An LMI approach Lin, Chuan-Kai
2007
334-335 22 p. 4934-4946
13 p.
artikel
73 Robust H ∞ control for uncertain fuzzy systems with distributed delays via output feedback controllers Song, Xiaona
2008
334-335 22 p. 4341-4356
16 p.
artikel
74 Robustness of fuzzy reasoning via logically equivalence measure Jin, Jianhua
2007
334-335 22 p. 5103-5117
15 p.
artikel
75 Secret sharing schemes from binary linear codes Li, Zhihui
2010
334-335 22 p. 4412-4419
8 p.
artikel
76 Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring Z N Chen, Fei
2011
334-335 22 p. 5110-5118
9 p.
artikel
77 Simulation study of the tests of uniform association based on the power-divergence Mayoral, M.M.
2007
334-335 22 p. 5024-5032
9 p.
artikel
78 Sliding window-based frequent pattern mining over data streams Tanbeer, Syed Khairuzzaman
2009
334-335 22 p. 3843-3865
23 p.
artikel
79 Soft fuzzy rough sets for robust feature evaluation and selection Hu, Qinghua
2010
334-335 22 p. 4384-4400
17 p.
artikel
80 Some results of weighted quasi-arithmetic mean of continuous triangular norms Ouyang, Yao
2008
334-335 22 p. 4396-4402
7 p.
artikel
81 Some single-machine and m-machine flowshop scheduling problems with learning considerations Lee, Wen-Chiung
2009
334-335 22 p. 3885-3892
8 p.
artikel
82 Task migration in all-port wormhole-routed 2D mesh multicomputers Wang, Nen-Chung
2006
334-335 22 p. 3409-3425
17 p.
artikel
83 Test-cost-sensitive attribute reduction Min, Fan
2011
334-335 22 p. 4928-4942
15 p.
artikel
84 The general α-decomposition problem of fuzzy relations Yang, Yan
2007
334-335 22 p. 4922-4933
12 p.
artikel
85 The multi-criteria minimum spanning tree problem based genetic algorithm Chen, Guolong
2007
334-335 22 p. 5050-5063
14 p.
artikel
86 Toward boosting distributed association rule mining by data de-clustering Tseng, Frank S.C.
2010
334-335 22 p. 4263-4289
27 p.
artikel
87 Unauthorized inferences in semistructured databases Farkas, Csilla
2006
334-335 22 p. 3269-3299
31 p.
artikel
88 Validation of overlapping clustering: A random clustering perspective Wu, Junjie
2010
334-335 22 p. 4353-4369
17 p.
artikel
89 Variable threshold concept lattices Zhang, Wen-Xiu
2007
334-335 22 p. 4883-4892
10 p.
artikel
90 What can we do with a linear optical logic gate? Qian, Lei
2006
334-335 22 p. 3379-3392
14 p.
artikel
                             90 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland