Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             100 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A chaos-based symmetric image encryption scheme using a bit-level permutation Zhu, Zhi-liang
2011
364-365 6 p. 1171-1186
16 p.
artikel
2 A comparison of classification accuracy of four genetic programming-evolved intelligent structures Tsakonas, Athanasios
2006
364-365 6 p. 691-724
34 p.
artikel
3 ACTLW – An action-based computation tree logic with unless operator Meolic, Robert
2008
364-365 6 p. 1542-1557
16 p.
artikel
4 Aggregation of asymmetric distances in Computer Science Mayor, G.
2010
364-365 6 p. 803-812
10 p.
artikel
5 A meaning based information theory – informalogical space: Basic concepts and convergence of information sequences Dian, Jianwei
2010
364-365 6 p. 984-994
11 p.
artikel
6 A molecular solution to the hitting-set problem in DNA-based supercomputing Shi, Nung-Yue
2010
364-365 6 p. 1010-1019
10 p.
artikel
7 An alternative approach to fuzzy control charts: Direct fuzzy approach Gülbay, Murat
2007
364-365 6 p. 1463-1480
18 p.
artikel
8 An approach to discovering multi-temporal patterns and its application to financial databases Kong, Xiaoxiao
2010
364-365 6 p. 873-885
13 p.
artikel
9 An axiomatic model for measuring contradiction and N -contradiction between two AIFSs Torres-Blanc, C.
2010
364-365 6 p. 834-845
12 p.
artikel
10 An efficient hybrid algorithm for resource-constrained project scheduling Chen, Wang
2010
364-365 6 p. 1031-1039
9 p.
artikel
11 An efficient method for maintaining data cubes incrementally Lee, Ki Yong
2010
364-365 6 p. 928-948
21 p.
artikel
12 A new monitoring design for uni-variate statistical quality control charts Fallah Nezhad, Mohammad Saber
2010
364-365 6 p. 1051-1059
9 p.
artikel
13 An improved vector particle swarm optimization for constrained optimization problems Sun, Chao-li
2011
364-365 6 p. 1153-1163
11 p.
artikel
14 A non-interactive deniable authentication scheme based on designated verifier proofs Wang, Bin
2009
364-365 6 p. 858-865
8 p.
artikel
15 A novel deniable authentication protocol using generalized ElGamal signature scheme Lee, Wei-Bin
2007
364-365 6 p. 1376-1381
6 p.
artikel
16 A parallel routing algorithm on recursive cube of rings networks employing Hamiltonian circuit Latin square Choi, Dongmin
2008
364-365 6 p. 1533-1541
9 p.
artikel
17 Applying learning behavioral Petri nets to the analysis of learning behavior in web-based learning environments Chang, Yi-Chun
2010
364-365 6 p. 995-1009
15 p.
artikel
18 A scalable constraint-based Q-hash indexing for moving objects Francis, Deja Hepziba
2008
364-365 6 p. 1442-1460
19 p.
artikel
19 A simple graphical approach for understanding probabilistic inference in Bayesian networks Butz, C.J.
2009
364-365 6 p. 699-716
18 p.
artikel
20 Asset portfolio optimization using fuzzy mathematical programming Gupta, Pankaj
2008
364-365 6 p. 1734-1755
22 p.
artikel
21 Choice inclusive general rough semantics Mani, A.
2011
364-365 6 p. 1097-1115
19 p.
artikel
22 Classifying mental tasks based on features of higher-order statistics from EEG signals in brain–computer interface Zhou, Shang-Ming
2008
364-365 6 p. 1629-1640
12 p.
artikel
23 Color discrimination enhancement for dichromats using self-organizing color transformation Ma, Yu
2009
364-365 6 p. 830-843
14 p.
artikel
24 Comparison results for fuzzy differential equations Rodríguez-López, Rosana
2008
364-365 6 p. 1756-1779
24 p.
artikel
25 Component-based Web page management environment Chen, Jun-Rong
2006
364-365 6 p. 628-639
12 p.
artikel
26 Componentwise decomposition of some lattice-valued fuzzy integrals Ban, Adrian
2007
364-365 6 p. 1430-1440
11 p.
artikel
27 Computing with random quantum dot repulsion Zhang, Ben
2008
364-365 6 p. 1519-1532
14 p.
artikel
28 Data gravitation based classification Peng, Lizhi
2009
364-365 6 p. 809-819
11 p.
artikel
29 DCFLA: A distributed collaborative-filtering neighbor-locating algorithm Xie, Bo
2007
364-365 6 p. 1349-1363
15 p.
artikel
30 Design of interval type-2 fuzzy sliding-mode controller Hsiao, Ming-Ying
2008
364-365 6 p. 1696-1716
21 p.
artikel
31 Developing a fuzzy analytic hierarchy process (AHP) model for behavior-based safety management Dağdeviren, Metin
2008
364-365 6 p. 1717-1733
17 p.
artikel
32 Development of fuzzy process accuracy index for decision making problems Kaya, İhsan
2010
364-365 6 p. 861-872
12 p.
artikel
33 Editorial Board 2006
364-365 6 p. CO2-
1 p.
artikel
34 Efficient approaches for materialized views selection in a data warehouse Hung, Ming-Chuan
2007
364-365 6 p. 1333-1348
16 p.
artikel
35 Efficient broadcast encryption with user profiles Ak, Murat
2010
364-365 6 p. 1060-1072
13 p.
artikel
36 Efficient strategies for tough aggregate constraint-based sequential pattern mining Chen, Enhong
2008
364-365 6 p. 1498-1518
21 p.
artikel
37 Embedding Hamiltonian cycles in alternating group graphs under conditional fault model Tsai, Ping-Ying
2009
364-365 6 p. 851-857
7 p.
artikel
38 Ensemble of feature sets and classification algorithms for sentiment classification Xia, Rui
2011
364-365 6 p. 1138-1152
15 p.
artikel
39 Erratum to “Numerical solution of fuzzy differential equations by predictor–corrector method” [Inform. Sci. 177 (7) (2007) 1633–1647] Allahviranloo, T.
2008
364-365 6 p. 1780-1782
3 p.
artikel
40 Erratum to ‘Some single-machine and m-machine flowshop scheduling problems with learning considerations’ [Inform. Sci. 179 (2009) 3885–3892] Lee, Wen-Chiung
2010
364-365 6 p. 1073-
1 p.
artikel
41 Extended triangular norms Starczewski, Janusz T.
2009
364-365 6 p. 742-757
16 p.
artikel
42 Fast S-box security mechanism research based on the polymorphic cipher Yin, Yifeng
2008
364-365 6 p. 1603-1610
8 p.
artikel
43 Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes Huang, Chun-Hsiang
2009
364-365 6 p. 791-808
18 p.
artikel
44 Fuzzy data envelopment analysis and its application to location problems Guo, Peijun
2009
364-365 6 p. 820-829
10 p.
artikel
45 Fuzzy estimation for process capability indices Parchami, A.
2007
364-365 6 p. 1452-1462
11 p.
artikel
46 General Barnes–Godunova–Levin type inequalities for Sugeno integral Agahi, Hamzeh
2011
364-365 6 p. 1072-1079
8 p.
artikel
47 Generalized rough sets over fuzzy lattices Liu, Guilong
2008
364-365 6 p. 1651-1662
12 p.
artikel
48 Identification of overlapping and non-overlapping community structure by fuzzy clustering in complex networks Sun, Peng Gang
2011
364-365 6 p. 1060-1071
12 p.
artikel
49 Improving inductive logic programming by using simulated annealing Serrurier, Mathieu
2008
364-365 6 p. 1423-1441
19 p.
artikel
50 Incremental assignment problem Toroslu, Ismail H.
2007
364-365 6 p. 1523-1529
7 p.
artikel
51 Inside Front Cover - Editorial Board 2010
364-365 6 p. IFC-
1 p.
artikel
52 Inside Front Cover - Editorial Board 2009
364-365 6 p. IFC-
1 p.
artikel
53 Inside Front Cover - Editorial Board 2007
364-365 6 p. CO2-
1 p.
artikel
54 Inside Front Cover - Editorial Board 2008
364-365 6 p. IFC-
1 p.
artikel
55 Inside Front Cover - Editorial Board 2011
364-365 6 p. IFC-
1 p.
artikel
56 Intuitionistic fuzzy semiregularization spaces Abbas, S.E.
2006
364-365 6 p. 745-757
13 p.
artikel
57 Low complexity, and high fidelity image compression using fixed threshold method Baligar, V.P.
2006
364-365 6 p. 664-675
12 p.
artikel
58 Mass function derivation and combination in multivariate data spaces Wang, Hui
2010
364-365 6 p. 813-819
7 p.
artikel
59 Measuring incompatibility between Atanassov’s intuitionistic fuzzy sets Castiñeira, Elena E.
2010
364-365 6 p. 820-833
14 p.
artikel
60 MGRS: A multi-granulation rough set Qian, Yuhua
2010
364-365 6 p. 949-970
22 p.
artikel
61 Minimization of states in automata theory based on finite lattice-ordered monoids Lei, Hongxuan
2007
364-365 6 p. 1413-1421
9 p.
artikel
62 Modelling uncertainty Montero, Javier
2010
364-365 6 p. 799-802
4 p.
artikel
63 Multi-agent neural business control system Lourdes Borrajo, M.
2010
364-365 6 p. 911-927
17 p.
artikel
64 Multicast routing in mobile ad hoc networks by using a multiagent system Manvi, S.S.
2008
364-365 6 p. 1611-1628
18 p.
artikel
65 Multi-criteria genetic optimisation of the manoeuvres of a two-stage launcher Alonso Zotes, Fernando
2010
364-365 6 p. 896-910
15 p.
artikel
66 On averaging operators for Atanassov’s intuitionistic fuzzy sets Beliakov, G.
2011
364-365 6 p. 1116-1124
9 p.
artikel
67 On embedding cycles into faulty twisted cubes Yang, Ming-Chien
2006
364-365 6 p. 676-690
15 p.
artikel
68 On path dependent loss and switch crosstalk reduction in optical networks Bashirov, Rza
2010
364-365 6 p. 1040-1050
11 p.
artikel
69 On the J-divergence of intuitionistic fuzzy sets with its application to pattern recognition Hung, Wen-Liang
2008
364-365 6 p. 1641-1650
10 p.
artikel
70 On weakly cut-stable maps Halaš, Radomír
2010
364-365 6 p. 971-983
13 p.
artikel
71 Orthogonal variant moments features in image analysis Martín H., José Antonio
2010
364-365 6 p. 846-860
15 p.
artikel
72 Qualitative reasoning about consistency in geographic information Duckham, Matt
2006
364-365 6 p. 601-627
27 p.
artikel
73 Random walk biclustering for microarray data Angiulli, Fabrizio
2008
364-365 6 p. 1479-1497
19 p.
artikel
74 Recognizing yield patterns through hybrid applications of machine learning techniques Lee, Jang Hee
2009
364-365 6 p. 844-850
7 p.
artikel
75 Redefined fuzzy implicative filters Jun, Young Bae
2007
364-365 6 p. 1422-1429
8 p.
artikel
76 Relations and functions in multiset context Girish, K.P.
2009
364-365 6 p. 758-768
11 p.
artikel
77 Robust fuzzy control for uncertain discrete-time nonlinear Markovian jump systems without mode observations Wu, Huai-Ning
2007
364-365 6 p. 1509-1522
14 p.
artikel
78 Robust synthesis of a PID controller by uncertain multimodel approach Toscano, R.
2007
364-365 6 p. 1441-1451
11 p.
artikel
79 Rough prime ideals and rough fuzzy prime ideals in semigroups Xiao, Qi-Mei
2006
364-365 6 p. 725-733
9 p.
artikel
80 Scheduling problems with general effects of deterioration and learning Lee, Wen-Chiung
2011
364-365 6 p. 1164-1170
7 p.
artikel
81 Security weakness in a three-party pairing-based protocol for password authenticated key exchange Nam, Junghyun
2007
364-365 6 p. 1364-1375
12 p.
artikel
82 Similar sequence matching supporting variable-length and variable-tolerance continuous queries on time-series data stream Lim, Hyo-Sang
2008
364-365 6 p. 1461-1478
18 p.
artikel
83 Simulatability and security of certificateless threshold signatures Wang, Licheng
2007
364-365 6 p. 1382-1394
13 p.
artikel
84 Simulatable certificateless two-party authenticated key agreement protocol Zhang, Lei
2010
364-365 6 p. 1020-1030
11 p.
artikel
85 Soft sets and soft rough sets Feng, Feng
2011
364-365 6 p. 1125-1137
13 p.
artikel
86 Software testing processes as a linear dynamic system Cai, Kai-Yuan
2008
364-365 6 p. 1558-1597
40 p.
artikel
87 Soundness-preserving reduction rules for reset workflow nets Wynn, M.T.
2009
364-365 6 p. 769-790
22 p.
artikel
88 Stability of vector optimization problems with fuzzy weights in the objective functions and fuzzy matrix parameters in the constraints Kassem, Mohamed Abd El-Hady
2008
364-365 6 p. 1663-1679
17 p.
artikel
89 State feedback control of continuous-time T–S fuzzy systems via switched fuzzy controllers Dong, Jiuxiang
2008
364-365 6 p. 1680-1695
16 p.
artikel
90 Statistically monotonic and statistically bounded sequences of fuzzy numbers Aytar, Salih
2006
364-365 6 p. 734-744
11 p.
artikel
91 Structuring ship design project approval mechanism towards installation of operator–system interfaces via fuzzy axiomatic design principles Cebi, Selcuk
2010
364-365 6 p. 886-895
10 p.
artikel
92 Systemic approach to fuzzy logic formalization for approximate reasoning Aliev, Rafik
2011
364-365 6 p. 1045-1059
15 p.
artikel
93 The equate-to-differentiate’s way of seeing the prisoner’s dilemma Li, Shu
2007
364-365 6 p. 1395-1412
18 p.
artikel
94 The evaluation of service quality using generalized Choquet integral Tsai, Hui-Hua
2006
364-365 6 p. 640-663
24 p.
artikel
95 The induced generalized OWA operator Merigó, José M.
2009
364-365 6 p. 729-741
13 p.
artikel
96 The pseudo-linear semantics of interval-valued fuzzy logics Van Gasse, B.
2009
364-365 6 p. 717-728
12 p.
artikel
97 The superiority of three-way decisions in probabilistic rough set models Yao, Yiyu
2011
364-365 6 p. 1080-1096
17 p.
artikel
98 Topological approaches to covering rough sets Zhu, William
2007
364-365 6 p. 1499-1508
10 p.
artikel
99 Łukasiewicz transform and its application to compression and reconstruction of digital images Di Nola, A.
2007
364-365 6 p. 1481-1498
18 p.
artikel
100 Using time-stamp to improve the security of a chaotic maps-based key agreement protocol Xiao, Di
2008
364-365 6 p. 1598-1602
5 p.
artikel
                             100 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland