nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A chaos-based symmetric image encryption scheme using a bit-level permutation
|
Zhu, Zhi-liang |
|
2011 |
334-335 |
6 |
p. 1171-1186 16 p. |
artikel |
2 |
A comparison of classification accuracy of four genetic programming-evolved intelligent structures
|
Tsakonas, Athanasios |
|
2006 |
334-335 |
6 |
p. 691-724 34 p. |
artikel |
3 |
ACTLW – An action-based computation tree logic with unless operator
|
Meolic, Robert |
|
2008 |
334-335 |
6 |
p. 1542-1557 16 p. |
artikel |
4 |
Aggregation of asymmetric distances in Computer Science
|
Mayor, G. |
|
2010 |
334-335 |
6 |
p. 803-812 10 p. |
artikel |
5 |
A meaning based information theory – informalogical space: Basic concepts and convergence of information sequences
|
Dian, Jianwei |
|
2010 |
334-335 |
6 |
p. 984-994 11 p. |
artikel |
6 |
A molecular solution to the hitting-set problem in DNA-based supercomputing
|
Shi, Nung-Yue |
|
2010 |
334-335 |
6 |
p. 1010-1019 10 p. |
artikel |
7 |
An alternative approach to fuzzy control charts: Direct fuzzy approach
|
Gülbay, Murat |
|
2007 |
334-335 |
6 |
p. 1463-1480 18 p. |
artikel |
8 |
An approach to discovering multi-temporal patterns and its application to financial databases
|
Kong, Xiaoxiao |
|
2010 |
334-335 |
6 |
p. 873-885 13 p. |
artikel |
9 |
An axiomatic model for measuring contradiction and
N
-contradiction between two AIFSs
|
Torres-Blanc, C. |
|
2010 |
334-335 |
6 |
p. 834-845 12 p. |
artikel |
10 |
An efficient hybrid algorithm for resource-constrained project scheduling
|
Chen, Wang |
|
2010 |
334-335 |
6 |
p. 1031-1039 9 p. |
artikel |
11 |
An efficient method for maintaining data cubes incrementally
|
Lee, Ki Yong |
|
2010 |
334-335 |
6 |
p. 928-948 21 p. |
artikel |
12 |
A new monitoring design for uni-variate statistical quality control charts
|
Fallah Nezhad, Mohammad Saber |
|
2010 |
334-335 |
6 |
p. 1051-1059 9 p. |
artikel |
13 |
An improved vector particle swarm optimization for constrained optimization problems
|
Sun, Chao-li |
|
2011 |
334-335 |
6 |
p. 1153-1163 11 p. |
artikel |
14 |
A non-interactive deniable authentication scheme based on designated verifier proofs
|
Wang, Bin |
|
2009 |
334-335 |
6 |
p. 858-865 8 p. |
artikel |
15 |
A novel deniable authentication protocol using generalized ElGamal signature scheme
|
Lee, Wei-Bin |
|
2007 |
334-335 |
6 |
p. 1376-1381 6 p. |
artikel |
16 |
A parallel routing algorithm on recursive cube of rings networks employing Hamiltonian circuit Latin square
|
Choi, Dongmin |
|
2008 |
334-335 |
6 |
p. 1533-1541 9 p. |
artikel |
17 |
Applying learning behavioral Petri nets to the analysis of learning behavior in web-based learning environments
|
Chang, Yi-Chun |
|
2010 |
334-335 |
6 |
p. 995-1009 15 p. |
artikel |
18 |
A scalable constraint-based Q-hash indexing for moving objects
|
Francis, Deja Hepziba |
|
2008 |
334-335 |
6 |
p. 1442-1460 19 p. |
artikel |
19 |
A simple graphical approach for understanding probabilistic inference in Bayesian networks
|
Butz, C.J. |
|
2009 |
334-335 |
6 |
p. 699-716 18 p. |
artikel |
20 |
Asset portfolio optimization using fuzzy mathematical programming
|
Gupta, Pankaj |
|
2008 |
334-335 |
6 |
p. 1734-1755 22 p. |
artikel |
21 |
Choice inclusive general rough semantics
|
Mani, A. |
|
2011 |
334-335 |
6 |
p. 1097-1115 19 p. |
artikel |
22 |
Classifying mental tasks based on features of higher-order statistics from EEG signals in brain–computer interface
|
Zhou, Shang-Ming |
|
2008 |
334-335 |
6 |
p. 1629-1640 12 p. |
artikel |
23 |
Color discrimination enhancement for dichromats using self-organizing color transformation
|
Ma, Yu |
|
2009 |
334-335 |
6 |
p. 830-843 14 p. |
artikel |
24 |
Comparison results for fuzzy differential equations
|
Rodríguez-López, Rosana |
|
2008 |
334-335 |
6 |
p. 1756-1779 24 p. |
artikel |
25 |
Component-based Web page management environment
|
Chen, Jun-Rong |
|
2006 |
334-335 |
6 |
p. 628-639 12 p. |
artikel |
26 |
Componentwise decomposition of some lattice-valued fuzzy integrals
|
Ban, Adrian |
|
2007 |
334-335 |
6 |
p. 1430-1440 11 p. |
artikel |
27 |
Computing with random quantum dot repulsion
|
Zhang, Ben |
|
2008 |
334-335 |
6 |
p. 1519-1532 14 p. |
artikel |
28 |
Data gravitation based classification
|
Peng, Lizhi |
|
2009 |
334-335 |
6 |
p. 809-819 11 p. |
artikel |
29 |
DCFLA: A distributed collaborative-filtering neighbor-locating algorithm
|
Xie, Bo |
|
2007 |
334-335 |
6 |
p. 1349-1363 15 p. |
artikel |
30 |
Design of interval type-2 fuzzy sliding-mode controller
|
Hsiao, Ming-Ying |
|
2008 |
334-335 |
6 |
p. 1696-1716 21 p. |
artikel |
31 |
Developing a fuzzy analytic hierarchy process (AHP) model for behavior-based safety management
|
Dağdeviren, Metin |
|
2008 |
334-335 |
6 |
p. 1717-1733 17 p. |
artikel |
32 |
Development of fuzzy process accuracy index for decision making problems
|
Kaya, İhsan |
|
2010 |
334-335 |
6 |
p. 861-872 12 p. |
artikel |
33 |
Editorial Board
|
|
|
2006 |
334-335 |
6 |
p. CO2- 1 p. |
artikel |
34 |
Efficient approaches for materialized views selection in a data warehouse
|
Hung, Ming-Chuan |
|
2007 |
334-335 |
6 |
p. 1333-1348 16 p. |
artikel |
35 |
Efficient broadcast encryption with user profiles
|
Ak, Murat |
|
2010 |
334-335 |
6 |
p. 1060-1072 13 p. |
artikel |
36 |
Efficient strategies for tough aggregate constraint-based sequential pattern mining
|
Chen, Enhong |
|
2008 |
334-335 |
6 |
p. 1498-1518 21 p. |
artikel |
37 |
Embedding Hamiltonian cycles in alternating group graphs under conditional fault model
|
Tsai, Ping-Ying |
|
2009 |
334-335 |
6 |
p. 851-857 7 p. |
artikel |
38 |
Ensemble of feature sets and classification algorithms for sentiment classification
|
Xia, Rui |
|
2011 |
334-335 |
6 |
p. 1138-1152 15 p. |
artikel |
39 |
Erratum to “Numerical solution of fuzzy differential equations by predictor–corrector method” [Inform. Sci. 177 (7) (2007) 1633–1647]
|
Allahviranloo, T. |
|
2008 |
334-335 |
6 |
p. 1780-1782 3 p. |
artikel |
40 |
Erratum to ‘Some single-machine and m-machine flowshop scheduling problems with learning considerations’ [Inform. Sci. 179 (2009) 3885–3892]
|
Lee, Wen-Chiung |
|
2010 |
334-335 |
6 |
p. 1073- 1 p. |
artikel |
41 |
Extended triangular norms
|
Starczewski, Janusz T. |
|
2009 |
334-335 |
6 |
p. 742-757 16 p. |
artikel |
42 |
Fast S-box security mechanism research based on the polymorphic cipher
|
Yin, Yifeng |
|
2008 |
334-335 |
6 |
p. 1603-1610 8 p. |
artikel |
43 |
Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes
|
Huang, Chun-Hsiang |
|
2009 |
334-335 |
6 |
p. 791-808 18 p. |
artikel |
44 |
Fuzzy data envelopment analysis and its application to location problems
|
Guo, Peijun |
|
2009 |
334-335 |
6 |
p. 820-829 10 p. |
artikel |
45 |
Fuzzy estimation for process capability indices
|
Parchami, A. |
|
2007 |
334-335 |
6 |
p. 1452-1462 11 p. |
artikel |
46 |
General Barnes–Godunova–Levin type inequalities for Sugeno integral
|
Agahi, Hamzeh |
|
2011 |
334-335 |
6 |
p. 1072-1079 8 p. |
artikel |
47 |
Generalized rough sets over fuzzy lattices
|
Liu, Guilong |
|
2008 |
334-335 |
6 |
p. 1651-1662 12 p. |
artikel |
48 |
Identification of overlapping and non-overlapping community structure by fuzzy clustering in complex networks
|
Sun, Peng Gang |
|
2011 |
334-335 |
6 |
p. 1060-1071 12 p. |
artikel |
49 |
Improving inductive logic programming by using simulated annealing
|
Serrurier, Mathieu |
|
2008 |
334-335 |
6 |
p. 1423-1441 19 p. |
artikel |
50 |
Incremental assignment problem
|
Toroslu, Ismail H. |
|
2007 |
334-335 |
6 |
p. 1523-1529 7 p. |
artikel |
51 |
Inside Front Cover - Editorial Board
|
|
|
2010 |
334-335 |
6 |
p. IFC- 1 p. |
artikel |
52 |
Inside Front Cover - Editorial Board
|
|
|
2009 |
334-335 |
6 |
p. IFC- 1 p. |
artikel |
53 |
Inside Front Cover - Editorial Board
|
|
|
2007 |
334-335 |
6 |
p. CO2- 1 p. |
artikel |
54 |
Inside Front Cover - Editorial Board
|
|
|
2008 |
334-335 |
6 |
p. IFC- 1 p. |
artikel |
55 |
Inside Front Cover - Editorial Board
|
|
|
2011 |
334-335 |
6 |
p. IFC- 1 p. |
artikel |
56 |
Intuitionistic fuzzy semiregularization spaces
|
Abbas, S.E. |
|
2006 |
334-335 |
6 |
p. 745-757 13 p. |
artikel |
57 |
Low complexity, and high fidelity image compression using fixed threshold method
|
Baligar, V.P. |
|
2006 |
334-335 |
6 |
p. 664-675 12 p. |
artikel |
58 |
Mass function derivation and combination in multivariate data spaces
|
Wang, Hui |
|
2010 |
334-335 |
6 |
p. 813-819 7 p. |
artikel |
59 |
Measuring incompatibility between Atanassov’s intuitionistic fuzzy sets
|
Castiñeira, Elena E. |
|
2010 |
334-335 |
6 |
p. 820-833 14 p. |
artikel |
60 |
MGRS: A multi-granulation rough set
|
Qian, Yuhua |
|
2010 |
334-335 |
6 |
p. 949-970 22 p. |
artikel |
61 |
Minimization of states in automata theory based on finite lattice-ordered monoids
|
Lei, Hongxuan |
|
2007 |
334-335 |
6 |
p. 1413-1421 9 p. |
artikel |
62 |
Modelling uncertainty
|
Montero, Javier |
|
2010 |
334-335 |
6 |
p. 799-802 4 p. |
artikel |
63 |
Multi-agent neural business control system
|
Lourdes Borrajo, M. |
|
2010 |
334-335 |
6 |
p. 911-927 17 p. |
artikel |
64 |
Multicast routing in mobile ad hoc networks by using a multiagent system
|
Manvi, S.S. |
|
2008 |
334-335 |
6 |
p. 1611-1628 18 p. |
artikel |
65 |
Multi-criteria genetic optimisation of the manoeuvres of a two-stage launcher
|
Alonso Zotes, Fernando |
|
2010 |
334-335 |
6 |
p. 896-910 15 p. |
artikel |
66 |
On averaging operators for Atanassov’s intuitionistic fuzzy sets
|
Beliakov, G. |
|
2011 |
334-335 |
6 |
p. 1116-1124 9 p. |
artikel |
67 |
On embedding cycles into faulty twisted cubes
|
Yang, Ming-Chien |
|
2006 |
334-335 |
6 |
p. 676-690 15 p. |
artikel |
68 |
On path dependent loss and switch crosstalk reduction in optical networks
|
Bashirov, Rza |
|
2010 |
334-335 |
6 |
p. 1040-1050 11 p. |
artikel |
69 |
On the J-divergence of intuitionistic fuzzy sets with its application to pattern recognition
|
Hung, Wen-Liang |
|
2008 |
334-335 |
6 |
p. 1641-1650 10 p. |
artikel |
70 |
On weakly cut-stable maps
|
Halaš, Radomír |
|
2010 |
334-335 |
6 |
p. 971-983 13 p. |
artikel |
71 |
Orthogonal variant moments features in image analysis
|
Martín H., José Antonio |
|
2010 |
334-335 |
6 |
p. 846-860 15 p. |
artikel |
72 |
Qualitative reasoning about consistency in geographic information
|
Duckham, Matt |
|
2006 |
334-335 |
6 |
p. 601-627 27 p. |
artikel |
73 |
Random walk biclustering for microarray data
|
Angiulli, Fabrizio |
|
2008 |
334-335 |
6 |
p. 1479-1497 19 p. |
artikel |
74 |
Recognizing yield patterns through hybrid applications of machine learning techniques
|
Lee, Jang Hee |
|
2009 |
334-335 |
6 |
p. 844-850 7 p. |
artikel |
75 |
Redefined fuzzy implicative filters
|
Jun, Young Bae |
|
2007 |
334-335 |
6 |
p. 1422-1429 8 p. |
artikel |
76 |
Relations and functions in multiset context
|
Girish, K.P. |
|
2009 |
334-335 |
6 |
p. 758-768 11 p. |
artikel |
77 |
Robust fuzzy control for uncertain discrete-time nonlinear Markovian jump systems without mode observations
|
Wu, Huai-Ning |
|
2007 |
334-335 |
6 |
p. 1509-1522 14 p. |
artikel |
78 |
Robust synthesis of a PID controller by uncertain multimodel approach
|
Toscano, R. |
|
2007 |
334-335 |
6 |
p. 1441-1451 11 p. |
artikel |
79 |
Rough prime ideals and rough fuzzy prime ideals in semigroups
|
Xiao, Qi-Mei |
|
2006 |
334-335 |
6 |
p. 725-733 9 p. |
artikel |
80 |
Scheduling problems with general effects of deterioration and learning
|
Lee, Wen-Chiung |
|
2011 |
334-335 |
6 |
p. 1164-1170 7 p. |
artikel |
81 |
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
|
Nam, Junghyun |
|
2007 |
334-335 |
6 |
p. 1364-1375 12 p. |
artikel |
82 |
Similar sequence matching supporting variable-length and variable-tolerance continuous queries on time-series data stream
|
Lim, Hyo-Sang |
|
2008 |
334-335 |
6 |
p. 1461-1478 18 p. |
artikel |
83 |
Simulatability and security of certificateless threshold signatures
|
Wang, Licheng |
|
2007 |
334-335 |
6 |
p. 1382-1394 13 p. |
artikel |
84 |
Simulatable certificateless two-party authenticated key agreement protocol
|
Zhang, Lei |
|
2010 |
334-335 |
6 |
p. 1020-1030 11 p. |
artikel |
85 |
Soft sets and soft rough sets
|
Feng, Feng |
|
2011 |
334-335 |
6 |
p. 1125-1137 13 p. |
artikel |
86 |
Software testing processes as a linear dynamic system
|
Cai, Kai-Yuan |
|
2008 |
334-335 |
6 |
p. 1558-1597 40 p. |
artikel |
87 |
Soundness-preserving reduction rules for reset workflow nets
|
Wynn, M.T. |
|
2009 |
334-335 |
6 |
p. 769-790 22 p. |
artikel |
88 |
Stability of vector optimization problems with fuzzy weights in the objective functions and fuzzy matrix parameters in the constraints
|
Kassem, Mohamed Abd El-Hady |
|
2008 |
334-335 |
6 |
p. 1663-1679 17 p. |
artikel |
89 |
State feedback control of continuous-time T–S fuzzy systems via switched fuzzy controllers
|
Dong, Jiuxiang |
|
2008 |
334-335 |
6 |
p. 1680-1695 16 p. |
artikel |
90 |
Statistically monotonic and statistically bounded sequences of fuzzy numbers
|
Aytar, Salih |
|
2006 |
334-335 |
6 |
p. 734-744 11 p. |
artikel |
91 |
Structuring ship design project approval mechanism towards installation of operator–system interfaces via fuzzy axiomatic design principles
|
Cebi, Selcuk |
|
2010 |
334-335 |
6 |
p. 886-895 10 p. |
artikel |
92 |
Systemic approach to fuzzy logic formalization for approximate reasoning
|
Aliev, Rafik |
|
2011 |
334-335 |
6 |
p. 1045-1059 15 p. |
artikel |
93 |
The equate-to-differentiate’s way of seeing the prisoner’s dilemma
|
Li, Shu |
|
2007 |
334-335 |
6 |
p. 1395-1412 18 p. |
artikel |
94 |
The evaluation of service quality using generalized Choquet integral
|
Tsai, Hui-Hua |
|
2006 |
334-335 |
6 |
p. 640-663 24 p. |
artikel |
95 |
The induced generalized OWA operator
|
Merigó, José M. |
|
2009 |
334-335 |
6 |
p. 729-741 13 p. |
artikel |
96 |
The pseudo-linear semantics of interval-valued fuzzy logics
|
Van Gasse, B. |
|
2009 |
334-335 |
6 |
p. 717-728 12 p. |
artikel |
97 |
The superiority of three-way decisions in probabilistic rough set models
|
Yao, Yiyu |
|
2011 |
334-335 |
6 |
p. 1080-1096 17 p. |
artikel |
98 |
Topological approaches to covering rough sets
|
Zhu, William |
|
2007 |
334-335 |
6 |
p. 1499-1508 10 p. |
artikel |
99 |
Łukasiewicz transform and its application to compression and reconstruction of digital images
|
Di Nola, A. |
|
2007 |
334-335 |
6 |
p. 1481-1498 18 p. |
artikel |
100 |
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
|
Xiao, Di |
|
2008 |
334-335 |
6 |
p. 1598-1602 5 p. |
artikel |