Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             90 results found
no title author magazine year volume issue page(s) type
1 A coalgebraic approach to non-determinism: Applications to multilattices Cabrera, I.P.
2010
457-458 22 p. 4323-4335
13 p.
article
2 Adaptive fuzzy tracking control of nonlinear time-delay systems with unknown virtual control coefficients Wang, Min
2008
457-458 22 p. 4326-4340
15 p.
article
3 Advanced structural joins using element distribution Kim, Jongik
2006
457-458 22 p. 3300-3331
32 p.
article
4 Affine equivalence of cubic homogeneous rotation symmetric functions Cusick, Thomas W.
2011
457-458 22 p. 5067-5083
17 p.
article
5 A Fuzzy Asymmetric GARCH model applied to stock markets Hung, Jui-Chung
2009
457-458 22 p. 3930-3943
14 p.
article
6 A hybrid content-based and item-based collaborative filtering approach to recommend TV programs enhanced with singular value decomposition Barragáns-Martínez, Ana Belén
2010
457-458 22 p. 4290-4311
22 p.
article
7 A hybrid multi-objective immune algorithm for a flow shop scheduling problem with bi-objectives: Weighted mean completion time and weighted mean tardiness Tavakkoli-Moghaddam, Reza
2007
457-458 22 p. 5072-5090
19 p.
article
8 A locally linear RBF network-based state-dependent AR model for nonlinear time series modeling Gan, Min
2010
457-458 22 p. 4370-4383
14 p.
article
9 A multi-dimensional indexing approach for timestamped event sequence matching Park, Sanghyun
2007
457-458 22 p. 4859-4876
18 p.
article
10 A multisecret sharing scheme for color images based on cellular automata Alvarez, G.
2008
457-458 22 p. 4382-4395
14 p.
article
11 An efficient parity detection technique using the two-moduli set {2 h −1,2 h +1} Chen, Chien-Yuan
2006
457-458 22 p. 3426-3430
5 p.
article
12 A new approach to robust and non-fragile H ∞ control for uncertain fuzzy systems Zhang, Baoyong
2007
457-458 22 p. 5118-5133
16 p.
article
13 A new data hiding scheme for binary image authentication with small image distortion Lee, Younho
2009
457-458 22 p. 3866-3884
19 p.
article
14 A new evolutionary search strategy for global optimization of high-dimensional problems Chu, Wei
2011
457-458 22 p. 4909-4927
19 p.
article
15 A note on continuity in scalarization for multicriteria optimization problems Šipošová, Alexandra
2011
457-458 22 p. 5119-5122
4 p.
article
16 A novel extended local-binary-pattern operator for texture analysis Zhou, Hui
2008
457-458 22 p. 4314-4325
12 p.
article
17 An overview of recent applications of Game Theory to bioinformatics Moretti, Stefano
2010
457-458 22 p. 4312-4322
11 p.
article
18 Application of adaptive weights to intelligent information systems: An intelligent transportation system as a case study Dong, Chuanfei
2011
457-458 22 p. 5042-5052
11 p.
article
19 Approximation of fuzzy context-free grammars Wang, Yongbing
2009
457-458 22 p. 3920-3929
10 p.
article
20 A PROMETHEE-based classification method using concordance and discordance relations and its application to bankruptcy prediction Hu, Yi-Chung
2011
457-458 22 p. 4959-4968
10 p.
article
21 A pure labeled transition semantics for the applied pi calculus Cai, Xiaojuan
2010
457-458 22 p. 4436-4458
23 p.
article
22 A quantitative model for software engineering trends Arfa Rabai, Latifa Ben
2011
457-458 22 p. 4993-5009
17 p.
article
23 A simple simulated annealing algorithm for the maximum clique problem Geng, Xiutang
2007
457-458 22 p. 5064-5071
8 p.
article
24 A timed mobile agent planning approach for distributed information retrieval in dynamic network environments Baek, Jin-Wook
2006
457-458 22 p. 3347-3378
32 p.
article
25 BCI-implicative ideals of BCI-algebras Liu, Yong Lin
2007
457-458 22 p. 4987-4996
10 p.
article
26 CGD-GA: A graph-based genetic algorithm for sensor network design Carballido, Jessica A.
2007
457-458 22 p. 5091-5102
12 p.
article
27 Codes based on BCK-algebras Jun, Young Bae
2011
457-458 22 p. 5102-5109
8 p.
article
28 Communication efficient shuffle for mental poker protocols Wei, Tzer-jen
2011
457-458 22 p. 5053-5066
14 p.
article
29 Complete path embeddings in crossed cubes Fan, Jianxi
2006
457-458 22 p. 3332-3346
15 p.
article
30 Constructions in the category of fuzzy T-proximity spaces Hashem, Khaled A.
2007
457-458 22 p. 4947-4958
12 p.
article
31 Data analysis based on discernibility and indiscernibility Zhao, Yan
2007
457-458 22 p. 4959-4976
18 p.
article
32 Data envelopment analysis classification machine Yan, Hong
2011
457-458 22 p. 5029-5041
13 p.
article
33 Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: The case of a gas refinery Azadeh, A.
2008
457-458 22 p. 4280-4300
21 p.
article
34 Differential evolution in constrained numerical optimization: An empirical study Mezura-Montes, Efrén
2010
457-458 22 p. 4223-4262
40 p.
article
35 Editorial Board 2006
457-458 22 p. CO2-
1 p.
article
36 EED: Energy Efficient Disk drive architecture Deng, Yuhui
2008
457-458 22 p. 4403-4417
15 p.
article
37 Efficient cache invalidation schemes for mobile data accesses Chuang, Po-Jen
2011
457-458 22 p. 5084-5101
18 p.
article
38 Encoding fuzzy possibilistic diagnostics as a constrained optimization problem Sala, Antonio
2008
457-458 22 p. 4246-4263
18 p.
article
39 Fast discovery of sequential patterns in large databases using effective time-indexing Lin, Ming-Yen
2008
457-458 22 p. 4228-4245
18 p.
article
40 Feature selection via Boolean independent component analysis Apolloni, Bruno
2009
457-458 22 p. 3815-3831
17 p.
article
41 Fuzzy radicals and prime fuzzy ideals of ordered semigroups Xie, Xiang-Yun
2008
457-458 22 p. 4357-4374
18 p.
article
42 GAKREM: A novel hybrid clustering algorithm Nguyen, Cao D.
2008
457-458 22 p. 4205-4227
23 p.
article
43 Generalized rough sets based on relations Zhu, William
2007
457-458 22 p. 4997-5011
15 p.
article
44 Halfway through the semantic gap: Prosemantic features for image retrieval Ciocca, Gianluigi
2011
457-458 22 p. 4943-4958
16 p.
article
45 H ∞ filtering of networked discrete-time systems with random packet losses Zhang, Wen-An
2009
457-458 22 p. 3944-3955
12 p.
article
46 Image retrieval model based on weighted visual features determined by relevance feedback Kim, Woo-Cheol
2008
457-458 22 p. 4301-4313
13 p.
article
47 Inside Front Cover - Editorial Board 2010
457-458 22 p. IFC-
1 p.
article
48 Inside Front Cover - Editorial Board 2007
457-458 22 p. IFC-
1 p.
article
49 Inside Front Cover - Editorial Board 2009
457-458 22 p. IFC-
1 p.
article
50 Inside Front Cover - Editorial Board 2008
457-458 22 p. IFC-
1 p.
article
51 Inside Front Cover - Editorial Board 2011
457-458 22 p. IFC-
1 p.
article
52 Linearly many faults in Cayley graphs generated by transposition trees Cheng, Eddie
2007
457-458 22 p. 4877-4882
6 p.
article
53 Mining temporal patterns in popularity of web items Loh, Woong-Kee
2011
457-458 22 p. 5010-5028
19 p.
article
54 Modeling uncertain variables of the weighted average operation by fuzzy vectors Pavlačka, Ondřej
2011
457-458 22 p. 4969-4992
24 p.
article
55 Multi-Objective Particle Swarm Optimization with time variant inertia and acceleration coefficients Tripathi, Praveen Kumar
2007
457-458 22 p. 5033-5049
17 p.
article
56 New image steganographic methods using run-length approach Chang, Chin-Chen
2006
457-458 22 p. 3393-3408
16 p.
article
57 Notes on “the lower and upper approximations in a fuzzy group” and “rough ideals in semigroups” Cheng, Wei
2007
457-458 22 p. 5134-5140
7 p.
article
58 On-demand broadcast for multiple-item requests in a multiple-channel environment Liu, Kai
2010
457-458 22 p. 4336-4352
17 p.
article
59 One-and-only item recommendation with fuzzy logic techniques Cornelis, Chris
2007
457-458 22 p. 4906-4921
16 p.
article
60 One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity Xu, Peng
2010
457-458 22 p. 4420-4429
10 p.
article
61 On-line fuzzy modeling via clustering and support vector machines Yu, Wen
2008
457-458 22 p. 4264-4279
16 p.
article
62 On minimum Fisher information distributions with restricted support and fixed variance Bercher, J.-F.
2009
457-458 22 p. 3832-3842
11 p.
article
63 On principal component analysis, cosine and Euclidean measures in information retrieval Korenius, Tuomo
2007
457-458 22 p. 4893-4905
13 p.
article
64 On ∗–λ-semirings Feng, Feng
2007
457-458 22 p. 5012-5023
12 p.
article
65 On the dispersion measure of OWA operators Yager, Ronald R.
2009
457-458 22 p. 3908-3919
12 p.
article
66 On the k-tuple domination of generalized de Brujin and Kautz digraphs Wu, Lingye
2010
457-458 22 p. 4430-4435
6 p.
article
67 Optimal companding vector quantization for circularly symmetric sources Perić, Zoran H.
2008
457-458 22 p. 4375-4381
7 p.
article
68 Performance bottleneck of subsequence matching in time-series databases: Observation, solution, and performance evaluation Kim, Sang-Wook
2007
457-458 22 p. 4841-4858
18 p.
article
69 Per-stream loss behavior of ∑MAP/M/1/K queuing system with a random early detection mechanism Wang, Yung-Chung
2009
457-458 22 p. 3893-3907
15 p.
article
70 Quotient structures of intuitionistic fuzzy finite state machines Jun, Young Bae
2007
457-458 22 p. 4977-4986
10 p.
article
71 Risk assessment of serious crime with fuzzy random theory Shen, Qiang
2010
457-458 22 p. 4401-4411
11 p.
article
72 Robust adaptive critic control of nonlinear systems using fuzzy basis function networks: An LMI approach Lin, Chuan-Kai
2007
457-458 22 p. 4934-4946
13 p.
article
73 Robust H ∞ control for uncertain fuzzy systems with distributed delays via output feedback controllers Song, Xiaona
2008
457-458 22 p. 4341-4356
16 p.
article
74 Robustness of fuzzy reasoning via logically equivalence measure Jin, Jianhua
2007
457-458 22 p. 5103-5117
15 p.
article
75 Secret sharing schemes from binary linear codes Li, Zhihui
2010
457-458 22 p. 4412-4419
8 p.
article
76 Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring Z N Chen, Fei
2011
457-458 22 p. 5110-5118
9 p.
article
77 Simulation study of the tests of uniform association based on the power-divergence Mayoral, M.M.
2007
457-458 22 p. 5024-5032
9 p.
article
78 Sliding window-based frequent pattern mining over data streams Tanbeer, Syed Khairuzzaman
2009
457-458 22 p. 3843-3865
23 p.
article
79 Soft fuzzy rough sets for robust feature evaluation and selection Hu, Qinghua
2010
457-458 22 p. 4384-4400
17 p.
article
80 Some results of weighted quasi-arithmetic mean of continuous triangular norms Ouyang, Yao
2008
457-458 22 p. 4396-4402
7 p.
article
81 Some single-machine and m-machine flowshop scheduling problems with learning considerations Lee, Wen-Chiung
2009
457-458 22 p. 3885-3892
8 p.
article
82 Task migration in all-port wormhole-routed 2D mesh multicomputers Wang, Nen-Chung
2006
457-458 22 p. 3409-3425
17 p.
article
83 Test-cost-sensitive attribute reduction Min, Fan
2011
457-458 22 p. 4928-4942
15 p.
article
84 The general α-decomposition problem of fuzzy relations Yang, Yan
2007
457-458 22 p. 4922-4933
12 p.
article
85 The multi-criteria minimum spanning tree problem based genetic algorithm Chen, Guolong
2007
457-458 22 p. 5050-5063
14 p.
article
86 Toward boosting distributed association rule mining by data de-clustering Tseng, Frank S.C.
2010
457-458 22 p. 4263-4289
27 p.
article
87 Unauthorized inferences in semistructured databases Farkas, Csilla
2006
457-458 22 p. 3269-3299
31 p.
article
88 Validation of overlapping clustering: A random clustering perspective Wu, Junjie
2010
457-458 22 p. 4353-4369
17 p.
article
89 Variable threshold concept lattices Zhang, Wen-Xiu
2007
457-458 22 p. 4883-4892
10 p.
article
90 What can we do with a linear optical logic gate? Qian, Lei
2006
457-458 22 p. 3379-3392
14 p.
article
                             90 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands