


default search action
Computational Intelligence, Volume 30
Volume 30, Number 1, February 2014
- Ivan Marsá-Maestre

, Miguel A. López-Carmona, Mark Klein, Takayuki Ito
, Katsuhide Fujita
:
Addressing Utility Space Complexity in Negotiations involving Highly Uncorrelated, Constraint-Based Utility Spaces. 1-29 - Katsuhide Fujita

, Takayuki Ito
, Mark Klein:
An Approach to Scalable Multi-Issue Negotiation: Decomposing the Contract Space. 30-47 - Raz Lin, Sarit Kraus

, Tim Baarslag
, Dmytro Tykhonov, Koen V. Hindriks
, Catholijn M. Jonker:
Genius: an Integrated Environment for Supporting the Design of Generic Automated Negotiators. 48-70 - Simon Duff, John Thangarajah

, James Harland
:
Maintenance Goals in Intelligent Agents. 71-114 - Dongdong Yang, Licheng Jiao

, Ruican Niu, Maoguo Gong:
Investigation of Combinational Clustering Indices in Artificial Immune Multi-objective Clustering. 115-144 - Tzung-Pei Hong

, Chun-Wei Lin
, Tsung-Ching Lin:
The MFFP-Tree fuzzy Mining Algorithm to Discover Complete Linguistic Frequent Itemsets. 145-166
Volume 30, Number 2, May 2014
- Liang Chen:

Robustness instead of accuracy Should be the Primary objective for Subjective Pattern Recognition Research: stability Analysis on multicandidate electoral College versus Direct Popular Vote. 167-204 - Kewen Wang

, Zhe Wang
, Rodney W. Topor, Jeff Z. Pan, Grigoris Antoniou
:
Eliminating Concepts and Roles from Ontologies in Expressive Descriptive Logics. 205-232 - Yuexian Hou, Bo Wang, Dawei Song

, Xiaochun Cao, Wenjie Li
:
Quadratic Tsallis Entropy Bias and generalized Maximum Entropy Models. 233-262 - Tetsuya Yoshida:

A Graph-Based Approach for Semisupervised Clustering. 263-284 - Tingting Mu

, Makoto Miwa
, Junichi Tsujii, Sophia Ananiadou
:
Discovering robust Embeddings in (DIS)Similarity Space for High-Dimensional Linguistic Features. 285-315 - Siyuan Liu, Jie Zhang, Chunyan Miao

, Yin-Leng Theng
, Alex C. Kot:
An Integrated Clustering-Based Approach to Filtering Unfair Multi-Nominal Testimonies. 316-341 - Huawen Liu, Xindong Wu, Shichao Zhang:

A New Supervised Feature Selection Method for Pattern Classification. 342-361 - Gauvain Bourgne, Nicolas Maudet

:
Designing Protocols for Abductive Hypothesis Refinement in Dynamic Multiagent Environments. 362-401 - Pavel Surynek

:
Solving Abstract Cooperative Path-Finding in Densely Populated Environments. 402-450
Volume 30, Number 3, August 2014
- Jiajin Huang, Ning Zhong, Yiyu Yao:

A Unified Framework of Targeted Marketing using Customer Preferences. 451-472 - Vicent Estruch, César Ferri

, José Hernández-Orallo, M. José Ramírez-Quintana
:
Bridging the Gap between Distance and Generalization. 473-513 - Ahmed Al-Faresi

, Ahmed Alazzawe, Anis Alazzawe:
Privacy Leakage in Health Social Networks. 514-534 - Derrall Heath, Dan Ventura:

Improving Multilabel Classification by Avoiding Implicit Negativity with Incomplete Data. 535-561 - Chuan Shi, Philip S. Yu, Zhenyu Yan, Yue Huang, Bai Wang:

Comparison and Selection of objective Functions in multiobjective Community Detection. 562-582 - Ya Gao, Guangquan Zhang

, Jie Lu
, Jun Ma
:
A bi-Level Decision Model for Customer Churn Analysis. 583-599 - Haibin Liu, Vlado Keselj

, Christian Blouin
:
Exploring a Subgraph Matching Approach for Extracting Biological Events from literature. 600-635 - Chien-Hsing Chen:

Feature Selection Based on compactness and Separability: Comparison with filter-Based Methods. 636-656
Volume 30, Number 4, November 2014
- Harm van Seijen, Shimon Whiteson, Leon J. H. M. Kester:

Efficient Abstraction Selection in Reinforcement Learning. 657-699 - Xin Liu, Gilles Trédan, Anwitaman Datta

:
A Generic Trust Framework for Large-Scale Open Systems using Machine Learning. 700-721 - Yao Wang, Jie Zhang, Julita Vassileva

:
A Super-Agent-Based Framework for Reputation Management and Community Formation in Decentralized Systems. 722-751 - Nattapon Harnsamut

, Juggapong Natwichai
, Xingzhi Sun, Xue Li
:
Privacy Preservation for Associative Classification. 752-770 - Le-Hung Vu, Jie Zhang, Karl Aberer:

Using Identity Premium for Honesty Enforcement and whitewashing Prevention. 771-797 - César Estébanez, Yago Sáez

, Gustavo Recio, Pedro Isasi Viñuela:
Automatic Design of Noncryptographic Hash Functions using Genetic Programming. 798-831

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














