nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A coalgebraic approach to non-determinism: Applications to multilattices
|
Cabrera, I.P. |
|
2010 |
334-335 |
22 |
p. 4323-4335 13 p. |
artikel |
2 |
Adaptive fuzzy tracking control of nonlinear time-delay systems with unknown virtual control coefficients
|
Wang, Min |
|
2008 |
334-335 |
22 |
p. 4326-4340 15 p. |
artikel |
3 |
Advanced structural joins using element distribution
|
Kim, Jongik |
|
2006 |
334-335 |
22 |
p. 3300-3331 32 p. |
artikel |
4 |
Affine equivalence of cubic homogeneous rotation symmetric functions
|
Cusick, Thomas W. |
|
2011 |
334-335 |
22 |
p. 5067-5083 17 p. |
artikel |
5 |
A Fuzzy Asymmetric GARCH model applied to stock markets
|
Hung, Jui-Chung |
|
2009 |
334-335 |
22 |
p. 3930-3943 14 p. |
artikel |
6 |
A hybrid content-based and item-based collaborative filtering approach to recommend TV programs enhanced with singular value decomposition
|
Barragáns-Martínez, Ana Belén |
|
2010 |
334-335 |
22 |
p. 4290-4311 22 p. |
artikel |
7 |
A hybrid multi-objective immune algorithm for a flow shop scheduling problem with bi-objectives: Weighted mean completion time and weighted mean tardiness
|
Tavakkoli-Moghaddam, Reza |
|
2007 |
334-335 |
22 |
p. 5072-5090 19 p. |
artikel |
8 |
A locally linear RBF network-based state-dependent AR model for nonlinear time series modeling
|
Gan, Min |
|
2010 |
334-335 |
22 |
p. 4370-4383 14 p. |
artikel |
9 |
A multi-dimensional indexing approach for timestamped event sequence matching
|
Park, Sanghyun |
|
2007 |
334-335 |
22 |
p. 4859-4876 18 p. |
artikel |
10 |
A multisecret sharing scheme for color images based on cellular automata
|
Alvarez, G. |
|
2008 |
334-335 |
22 |
p. 4382-4395 14 p. |
artikel |
11 |
An efficient parity detection technique using the two-moduli set {2
h
−1,2
h
+1}
|
Chen, Chien-Yuan |
|
2006 |
334-335 |
22 |
p. 3426-3430 5 p. |
artikel |
12 |
A new approach to robust and non-fragile H
∞ control for uncertain fuzzy systems
|
Zhang, Baoyong |
|
2007 |
334-335 |
22 |
p. 5118-5133 16 p. |
artikel |
13 |
A new data hiding scheme for binary image authentication with small image distortion
|
Lee, Younho |
|
2009 |
334-335 |
22 |
p. 3866-3884 19 p. |
artikel |
14 |
A new evolutionary search strategy for global optimization of high-dimensional problems
|
Chu, Wei |
|
2011 |
334-335 |
22 |
p. 4909-4927 19 p. |
artikel |
15 |
A note on continuity in scalarization for multicriteria optimization problems
|
Šipošová, Alexandra |
|
2011 |
334-335 |
22 |
p. 5119-5122 4 p. |
artikel |
16 |
A novel extended local-binary-pattern operator for texture analysis
|
Zhou, Hui |
|
2008 |
334-335 |
22 |
p. 4314-4325 12 p. |
artikel |
17 |
An overview of recent applications of Game Theory to bioinformatics
|
Moretti, Stefano |
|
2010 |
334-335 |
22 |
p. 4312-4322 11 p. |
artikel |
18 |
Application of adaptive weights to intelligent information systems: An intelligent transportation system as a case study
|
Dong, Chuanfei |
|
2011 |
334-335 |
22 |
p. 5042-5052 11 p. |
artikel |
19 |
Approximation of fuzzy context-free grammars
|
Wang, Yongbing |
|
2009 |
334-335 |
22 |
p. 3920-3929 10 p. |
artikel |
20 |
A PROMETHEE-based classification method using concordance and discordance relations and its application to bankruptcy prediction
|
Hu, Yi-Chung |
|
2011 |
334-335 |
22 |
p. 4959-4968 10 p. |
artikel |
21 |
A pure labeled transition semantics for the applied pi calculus
|
Cai, Xiaojuan |
|
2010 |
334-335 |
22 |
p. 4436-4458 23 p. |
artikel |
22 |
A quantitative model for software engineering trends
|
Arfa Rabai, Latifa Ben |
|
2011 |
334-335 |
22 |
p. 4993-5009 17 p. |
artikel |
23 |
A simple simulated annealing algorithm for the maximum clique problem
|
Geng, Xiutang |
|
2007 |
334-335 |
22 |
p. 5064-5071 8 p. |
artikel |
24 |
A timed mobile agent planning approach for distributed information retrieval in dynamic network environments
|
Baek, Jin-Wook |
|
2006 |
334-335 |
22 |
p. 3347-3378 32 p. |
artikel |
25 |
BCI-implicative ideals of BCI-algebras
|
Liu, Yong Lin |
|
2007 |
334-335 |
22 |
p. 4987-4996 10 p. |
artikel |
26 |
CGD-GA: A graph-based genetic algorithm for sensor network design
|
Carballido, Jessica A. |
|
2007 |
334-335 |
22 |
p. 5091-5102 12 p. |
artikel |
27 |
Codes based on BCK-algebras
|
Jun, Young Bae |
|
2011 |
334-335 |
22 |
p. 5102-5109 8 p. |
artikel |
28 |
Communication efficient shuffle for mental poker protocols
|
Wei, Tzer-jen |
|
2011 |
334-335 |
22 |
p. 5053-5066 14 p. |
artikel |
29 |
Complete path embeddings in crossed cubes
|
Fan, Jianxi |
|
2006 |
334-335 |
22 |
p. 3332-3346 15 p. |
artikel |
30 |
Constructions in the category of fuzzy T-proximity spaces
|
Hashem, Khaled A. |
|
2007 |
334-335 |
22 |
p. 4947-4958 12 p. |
artikel |
31 |
Data analysis based on discernibility and indiscernibility
|
Zhao, Yan |
|
2007 |
334-335 |
22 |
p. 4959-4976 18 p. |
artikel |
32 |
Data envelopment analysis classification machine
|
Yan, Hong |
|
2011 |
334-335 |
22 |
p. 5029-5041 13 p. |
artikel |
33 |
Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: The case of a gas refinery
|
Azadeh, A. |
|
2008 |
334-335 |
22 |
p. 4280-4300 21 p. |
artikel |
34 |
Differential evolution in constrained numerical optimization: An empirical study
|
Mezura-Montes, Efrén |
|
2010 |
334-335 |
22 |
p. 4223-4262 40 p. |
artikel |
35 |
Editorial Board
|
|
|
2006 |
334-335 |
22 |
p. CO2- 1 p. |
artikel |
36 |
EED: Energy Efficient Disk drive architecture
|
Deng, Yuhui |
|
2008 |
334-335 |
22 |
p. 4403-4417 15 p. |
artikel |
37 |
Efficient cache invalidation schemes for mobile data accesses
|
Chuang, Po-Jen |
|
2011 |
334-335 |
22 |
p. 5084-5101 18 p. |
artikel |
38 |
Encoding fuzzy possibilistic diagnostics as a constrained optimization problem
|
Sala, Antonio |
|
2008 |
334-335 |
22 |
p. 4246-4263 18 p. |
artikel |
39 |
Fast discovery of sequential patterns in large databases using effective time-indexing
|
Lin, Ming-Yen |
|
2008 |
334-335 |
22 |
p. 4228-4245 18 p. |
artikel |
40 |
Feature selection via Boolean independent component analysis
|
Apolloni, Bruno |
|
2009 |
334-335 |
22 |
p. 3815-3831 17 p. |
artikel |
41 |
Fuzzy radicals and prime fuzzy ideals of ordered semigroups
|
Xie, Xiang-Yun |
|
2008 |
334-335 |
22 |
p. 4357-4374 18 p. |
artikel |
42 |
GAKREM: A novel hybrid clustering algorithm
|
Nguyen, Cao D. |
|
2008 |
334-335 |
22 |
p. 4205-4227 23 p. |
artikel |
43 |
Generalized rough sets based on relations
|
Zhu, William |
|
2007 |
334-335 |
22 |
p. 4997-5011 15 p. |
artikel |
44 |
Halfway through the semantic gap: Prosemantic features for image retrieval
|
Ciocca, Gianluigi |
|
2011 |
334-335 |
22 |
p. 4943-4958 16 p. |
artikel |
45 |
H
∞ filtering of networked discrete-time systems with random packet losses
|
Zhang, Wen-An |
|
2009 |
334-335 |
22 |
p. 3944-3955 12 p. |
artikel |
46 |
Image retrieval model based on weighted visual features determined by relevance feedback
|
Kim, Woo-Cheol |
|
2008 |
334-335 |
22 |
p. 4301-4313 13 p. |
artikel |
47 |
Inside Front Cover - Editorial Board
|
|
|
2010 |
334-335 |
22 |
p. IFC- 1 p. |
artikel |
48 |
Inside Front Cover - Editorial Board
|
|
|
2007 |
334-335 |
22 |
p. IFC- 1 p. |
artikel |
49 |
Inside Front Cover - Editorial Board
|
|
|
2009 |
334-335 |
22 |
p. IFC- 1 p. |
artikel |
50 |
Inside Front Cover - Editorial Board
|
|
|
2008 |
334-335 |
22 |
p. IFC- 1 p. |
artikel |
51 |
Inside Front Cover - Editorial Board
|
|
|
2011 |
334-335 |
22 |
p. IFC- 1 p. |
artikel |
52 |
Linearly many faults in Cayley graphs generated by transposition trees
|
Cheng, Eddie |
|
2007 |
334-335 |
22 |
p. 4877-4882 6 p. |
artikel |
53 |
Mining temporal patterns in popularity of web items
|
Loh, Woong-Kee |
|
2011 |
334-335 |
22 |
p. 5010-5028 19 p. |
artikel |
54 |
Modeling uncertain variables of the weighted average operation by fuzzy vectors
|
Pavlačka, Ondřej |
|
2011 |
334-335 |
22 |
p. 4969-4992 24 p. |
artikel |
55 |
Multi-Objective Particle Swarm Optimization with time variant inertia and acceleration coefficients
|
Tripathi, Praveen Kumar |
|
2007 |
334-335 |
22 |
p. 5033-5049 17 p. |
artikel |
56 |
New image steganographic methods using run-length approach
|
Chang, Chin-Chen |
|
2006 |
334-335 |
22 |
p. 3393-3408 16 p. |
artikel |
57 |
Notes on “the lower and upper approximations in a fuzzy group” and “rough ideals in semigroups”
|
Cheng, Wei |
|
2007 |
334-335 |
22 |
p. 5134-5140 7 p. |
artikel |
58 |
On-demand broadcast for multiple-item requests in a multiple-channel environment
|
Liu, Kai |
|
2010 |
334-335 |
22 |
p. 4336-4352 17 p. |
artikel |
59 |
One-and-only item recommendation with fuzzy logic techniques
|
Cornelis, Chris |
|
2007 |
334-335 |
22 |
p. 4906-4921 16 p. |
artikel |
60 |
One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity
|
Xu, Peng |
|
2010 |
334-335 |
22 |
p. 4420-4429 10 p. |
artikel |
61 |
On-line fuzzy modeling via clustering and support vector machines
|
Yu, Wen |
|
2008 |
334-335 |
22 |
p. 4264-4279 16 p. |
artikel |
62 |
On minimum Fisher information distributions with restricted support and fixed variance
|
Bercher, J.-F. |
|
2009 |
334-335 |
22 |
p. 3832-3842 11 p. |
artikel |
63 |
On principal component analysis, cosine and Euclidean measures in information retrieval
|
Korenius, Tuomo |
|
2007 |
334-335 |
22 |
p. 4893-4905 13 p. |
artikel |
64 |
On ∗–λ-semirings
|
Feng, Feng |
|
2007 |
334-335 |
22 |
p. 5012-5023 12 p. |
artikel |
65 |
On the dispersion measure of OWA operators
|
Yager, Ronald R. |
|
2009 |
334-335 |
22 |
p. 3908-3919 12 p. |
artikel |
66 |
On the k-tuple domination of generalized de Brujin and Kautz digraphs
|
Wu, Lingye |
|
2010 |
334-335 |
22 |
p. 4430-4435 6 p. |
artikel |
67 |
Optimal companding vector quantization for circularly symmetric sources
|
Perić, Zoran H. |
|
2008 |
334-335 |
22 |
p. 4375-4381 7 p. |
artikel |
68 |
Performance bottleneck of subsequence matching in time-series databases: Observation, solution, and performance evaluation
|
Kim, Sang-Wook |
|
2007 |
334-335 |
22 |
p. 4841-4858 18 p. |
artikel |
69 |
Per-stream loss behavior of ∑MAP/M/1/K queuing system with a random early detection mechanism
|
Wang, Yung-Chung |
|
2009 |
334-335 |
22 |
p. 3893-3907 15 p. |
artikel |
70 |
Quotient structures of intuitionistic fuzzy finite state machines
|
Jun, Young Bae |
|
2007 |
334-335 |
22 |
p. 4977-4986 10 p. |
artikel |
71 |
Risk assessment of serious crime with fuzzy random theory
|
Shen, Qiang |
|
2010 |
334-335 |
22 |
p. 4401-4411 11 p. |
artikel |
72 |
Robust adaptive critic control of nonlinear systems using fuzzy basis function networks: An LMI approach
|
Lin, Chuan-Kai |
|
2007 |
334-335 |
22 |
p. 4934-4946 13 p. |
artikel |
73 |
Robust
H
∞
control for uncertain fuzzy systems with distributed delays via output feedback controllers
|
Song, Xiaona |
|
2008 |
334-335 |
22 |
p. 4341-4356 16 p. |
artikel |
74 |
Robustness of fuzzy reasoning via logically equivalence measure
|
Jin, Jianhua |
|
2007 |
334-335 |
22 |
p. 5103-5117 15 p. |
artikel |
75 |
Secret sharing schemes from binary linear codes
|
Li, Zhihui |
|
2010 |
334-335 |
22 |
p. 4412-4419 8 p. |
artikel |
76 |
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring Z
N
|
Chen, Fei |
|
2011 |
334-335 |
22 |
p. 5110-5118 9 p. |
artikel |
77 |
Simulation study of the tests of uniform association based on the power-divergence
|
Mayoral, M.M. |
|
2007 |
334-335 |
22 |
p. 5024-5032 9 p. |
artikel |
78 |
Sliding window-based frequent pattern mining over data streams
|
Tanbeer, Syed Khairuzzaman |
|
2009 |
334-335 |
22 |
p. 3843-3865 23 p. |
artikel |
79 |
Soft fuzzy rough sets for robust feature evaluation and selection
|
Hu, Qinghua |
|
2010 |
334-335 |
22 |
p. 4384-4400 17 p. |
artikel |
80 |
Some results of weighted quasi-arithmetic mean of continuous triangular norms
|
Ouyang, Yao |
|
2008 |
334-335 |
22 |
p. 4396-4402 7 p. |
artikel |
81 |
Some single-machine and m-machine flowshop scheduling problems with learning considerations
|
Lee, Wen-Chiung |
|
2009 |
334-335 |
22 |
p. 3885-3892 8 p. |
artikel |
82 |
Task migration in all-port wormhole-routed 2D mesh multicomputers
|
Wang, Nen-Chung |
|
2006 |
334-335 |
22 |
p. 3409-3425 17 p. |
artikel |
83 |
Test-cost-sensitive attribute reduction
|
Min, Fan |
|
2011 |
334-335 |
22 |
p. 4928-4942 15 p. |
artikel |
84 |
The general α-decomposition problem of fuzzy relations
|
Yang, Yan |
|
2007 |
334-335 |
22 |
p. 4922-4933 12 p. |
artikel |
85 |
The multi-criteria minimum spanning tree problem based genetic algorithm
|
Chen, Guolong |
|
2007 |
334-335 |
22 |
p. 5050-5063 14 p. |
artikel |
86 |
Toward boosting distributed association rule mining by data de-clustering
|
Tseng, Frank S.C. |
|
2010 |
334-335 |
22 |
p. 4263-4289 27 p. |
artikel |
87 |
Unauthorized inferences in semistructured databases
|
Farkas, Csilla |
|
2006 |
334-335 |
22 |
p. 3269-3299 31 p. |
artikel |
88 |
Validation of overlapping clustering: A random clustering perspective
|
Wu, Junjie |
|
2010 |
334-335 |
22 |
p. 4353-4369 17 p. |
artikel |
89 |
Variable threshold concept lattices
|
Zhang, Wen-Xiu |
|
2007 |
334-335 |
22 |
p. 4883-4892 10 p. |
artikel |
90 |
What can we do with a linear optical logic gate?
|
Qian, Lei |
|
2006 |
334-335 |
22 |
p. 3379-3392 14 p. |
artikel |