


default search action
Information Sciences, Volume 176
Volume 176, Number 1, 6 January 2006
- Trieu-Kien Truong, Pei-Ding Chen, Lung-Jen Wang, Y. W. Chang, Irving S. Reed:

Fast, prime factor, discrete Fourier transform algorithms over GF(2m) for 8 leq m leq 10. 1-26 - Asok K. Nanda, Prasanta Paul

:
Some results on generalized residual entropy. 27-47 - Siwoo Byun, In-Kwon Lee

:
Proxy agent based replication control model for wireless internet. 48-66 - Chun-Jen Lee, Jason S. Chang, Jyh-Shing Roger Jang

:
Extraction of transliteration pairs from parallel corpora using a statistical transliteration model. 67-90
Volume 176, Number 2, 20 January 2006
- Theo P. van der Weide, Patrick van Bommel:

Measuring the incremental information value of documents. 91-119 - Sang-Eon Han:

Minimal simple closed 18-surfaces and a topological preservation of 3D surfaces. 120-134 - Burkay Genç

, Ugur Dogrusöz
:
A layout algorithm for signaling pathways. 135-149 - Dug Hun Hong:

Fuzzy measures for a correlation coefficient of fuzzy numbers under TW(the weakest t-norm)-based fuzzy arithmetic operations. 150-160 - Ying-Hong Wang, Chih-Feng Chao:

Dynamic backup routes routing protocol for mobile ad hoc networks. 161-185 - Peng Shi, Magdi Sadek Mahmoud

, Jianqiang Yi, Abdulla Ismail:
Worst case control of uncertain jumping systems with multi-state and input delay information. 186-200 - Changchun Hua

, Fenglei Li, Xinping Guan:
Observer-based adaptive control for uncertain time-delay systems. 201-214
- Sang-Eon Han:

Erratum to "Non-product property of the digital fundamental group" [Informat. Sci. 171(1-3) (2005) 73-91]. 215-216
Volume 176, Number 3, 6 February 2006
- Tsang-Ling Sheu, Yang-Jing Wu:

A preemptive channel allocation scheme for multimedia traffic in mobile wireless networks. 217-236 - Tijen Ertay, Da Ruan, Umut Rifat Tuzkaya

:
Integrating data envelopment analysis and analytic hierarchy for the facility layout design in manufacturing systems. 237-262 - Chun-I Fan:

Ownership-attached unblinding of blind signatures for untraceable electronic cash, . 263-284 - Bijan Davvaz, Wieslaw A. Dudek

, Young Bae Jun:
Intuitionistic fuzzy Hv-submodules. 285-300 - K. Serafimidis, Athanasios Kehagias:

Some remarks on congruences obtained from the L-fuzzy Nakano hyperoperation. 301-320 - Xiaojun Tong, Mianyun Chen, Yi Lin:

The structure of pan-addition operator with pre-determined pan-multiplication. 321-331 - Sang-Eon Han:

Connected sum of digital closed surfaces. 332-348
Volume 176, Number 4, 22 February 2006
- Francisco Herrera

, Enrique Herrera-Viedma
, Luis Martínez-López
, Paul P. Wang:
Recent advancements of fuzzy sets: Theory and practice. 349-351 - José Luis García-Lapresta

:
A general class of simple majority decision rules based on linguistic opinions. 352-365 - Gloria Bordogna

, Sergio Chiesa, Davide Geneletti
:
Linguistic modelling of imperfect spatial information as a basis for simplifying spatial analysis. 366-389 - Gabriella Pasi

, Ronald R. Yager:
Modeling the concept of majority opinion in group decision making. 390-414 - Slawomir Zadrozny

, Janusz Kacprzyk
:
Computing with words for text processing: An approach to the text categorization. 415-437 - Nicholas J. Randon, Jonathan Lawry:

Classification and query evaluation using modelling with words. 438-464 - Vicenç Torra

, Josep Domingo-Ferrer, Josep Maria Mateo-Sanz
, Michael K. Ng
:
Regression for ordinal variables without underlying continuous variables. 465-474
Volume 176, Number 5, 6 March 2006
- Marco Ronchetti, Giancarlo Succi

, Witold Pedrycz, Barbara Russo
:
Early estimation of software size in object-oriented environments a case study in a CMM level 3 software firm. 475-489 - Ilias Sakellariou

, Ioannis P. Vlahavas
, Ivan Futó, Zoltán Pásztor, János Szeredi:
Communicating sequential processes for distributed constraint satisfaction. 490-521 - Ben-Jye Chang, Ren-Hung Hwang

:
Modeling and analyzing the performance of adaptive hierarchical networks. 522-549 - Dong-Her Shih, Hsin-Yi Huang, David C. Yen

:
A secure reverse Vickrey auction scheme with bid privacy. 550-564 - Ashok Samal, James R. Brandle, Dongsheng Zhang:

Texture as the basis for individual tree identification. 565-576 - Ronald R. Yager:

An extension of the naive Bayesian classifier. 577-588 - Michiro Kondo:

On the structure of generalized rough sets. 589-600
Volume 176, Number 6, March 2006
- Matt Duckham

, Jenny Lingham, Keith T. Mason, Michael F. Worboys:
Qualitative reasoning about consistency in geographic information. 601-627 - Jun-Rong Chen, Yong-Feng Lin, Jason Jen-Yen Chen:

Component-based Web page management environment. 628-639 - Hui-Hua Tsai, Iuan-Yuan Lu:

The evaluation of service quality using generalized Choquet integral. 640-663 - Vishwanath P. Baligar, Lalit M. Patnaik, G. R. Nagabhushana:

Low complexity, and high fidelity image compression using fixed threshold method. 664-675 - Ming-Chien Yang, Tseng-Kuei Li, Jimmy J. M. Tan, Lih-Hsing Hsu:

On embedding cycles into faulty twisted cubes. 676-690 - Athanasios Tsakonas

:
A comparison of classification accuracy of four genetic programming-evolved intelligent structures. 691-724 - Qi-Mei Xiao, Zhen-Liang Zhang:

Rough prime ideals and rough fuzzy prime ideals in semigroups. 725-733 - Salih Aytar, Serpil Pehlivan

:
Statistically monotonic and statistically bounded sequences of fuzzy numbers. 734-744 - Salah El-Din Abbas, Halis Aygün

:
Intuitionistic fuzzy semiregularization spaces. 745-757
Volume 176, Number 7, April 2006
- Jung-Sheng Fu:

Longest fault-free paths in hypercubes with vertex faults. 759-771 - Chih-Yang Tsai

:
On detecting nonlinear patterns in discriminant problems. 772-798 - Kil Hong Joo, Won Suk Lee:

An efficient query evaluation in a mediator based on implementation plan. 799-819 - Shyh-Kwei Chen, Ming-Ling Lo, Kun-Lung Wu, Jih-Shyr Yih, Colleen Viehrig:

A practical approach to extracting DTD-conforming XML documents from heterogeneous data sources. 820-844 - Tsung-Chuan Huang, Po-Hsueh Hsu:

Predecessor/successor approach for high-performance run-time wavefront scheduling. 845-860 - Przemyslaw Skibinski:

PPM with the extended alphabet. 861-874 - Osama H. H. Edely

, Mohammad Mursaleen:
Tauberian theorems for statistically convergent double sequences. 875-886 - Xiao-Ping Yang, Tong-Jun Li:

The minimization of axiom sets characterizing generalized approximation operators. 887-899 - Mustafa Demirci:

The generalized associative law in vague groups and its applications - I. 900-936
Volume 176, Number 8, April 2006
- Frans van den Bergh, Andries P. Engelbrecht

:
A study of particle swarm optimization particle trajectories. 937-971 - Petr Musílek

, Adriel Lau, Marek Z. Reformat
, Loren Wyard-Scott:
Immune programming. 972-1002 - Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia:

Looking into the seeds of time: Discovering temporal patterns in large transaction sets. 1003-1031 - Hyunseung Choo, Young Jae Lee, Seong-Moo Yoo:

DIG: Degree of inter-reference gap for a dynamic buffer cache management. 1032-1044 - Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers

:
Standards and verification for fair-exchange and atomicity in e-commerce transactions. 1045-1066 - Tahsin Alp Yanar, Zuhal Akyürek:

The enhancement of the cell-based GIS analyses with fuzzy processing capabilities. 1067-1085 - Sang Yeol Joo, Yun Kyong Kim, Joong Sung Kwon:

Strong convergence for weighted sums of fuzzy random sets. 1086-1099
Volume 176, Number 9, May 2006
- Vincenzo Loia:

Soft computing meets agents. 1101-1102 - Carmine Grelle, Lucio Ippolito, Vincenzo Loia, Pierluigi Siano

:
Agent-based architecture for designing hybrid control systems. 1103-1130 - Chang-Shing Lee

, Chun-Chih Jiang, Tung-Cheng Hsieh:
A genetic fuzzy agent using ontology model for meeting scheduling system. 1131-1155 - Tieju Ma, Yoshiteru Nakamori, Wei Huang:

An agent-based approach for predictions based on multi-dimensional complex data. 1156-1174 - Shahram Rahimi, Johan Bjursell, Marcin Paprzycki

, Maria A. Cobb, Dia Ali:
Performance evaluation of SDIAGENT, a multi-agent system for distributed fuzzy geospatial data conflation. 1175-1189 - Mihaela Ulieru, Maja Hadzic, Elizabeth Chang

:
Soft computing agents for e-Health in application to the research and control of unknown diseases. 1190-1214
- Yao Liu, Sam Yuan Sung, Hui Xiong:

A cubic-wise balance approach for privacy preservation in data cubes. 1215-1240 - Ming-Deng Hsieh, Tsan-Pin Wang, Ching-Sung Tsai, Chien-Chao Tseng

:
Stateful session handoff for mobile WWW. 1241-1265 - Hassan B. Kazemian, Li Meng:

A fuzzy control scheme for video transmission in Bluetooth wireless. 1266-1289 - Mi-Gyung Cho:

A new gesture recognition algorithm and segmentation method of Korean scripts for gesture-allowed ink editor. 1290-1303
Volume 176, Number 10, May 2006
- Claus-Peter Schnorr:

Enhancing the security of perfect blind DL-signatures. 1305-1320 - Enrico Nardelli, Guido Proietti

:
Efficient unbalanced merge-sort. 1321-1337 - Hui-Feng Huang, Chin-Chen Chang:

A novel efficient (t, n) threshold proxy signature scheme. 1338-1349 - Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia:

A fragile watermarking scheme for detecting malicious modifications of database relations. 1350-1378 - Wai-Tak Wong

, Frank Y. Shih, Te-Feng Su:
Thinning algorithms based on quadtree and octree representations. 1379-1394 - Bruno Apolloni, Simone Bassis

, Sabrina Gaito
, Dario Malchiodi
, Italo Zoppis
:
Controlling the losing probability in a monotone game. 1395-1416 - Gopal Lakhani:

Reducing coding redundancy in LZW. 1417-1434 - Yair Neuman:

A theory of meaning. 1435-1449 - Bilâl Altay, Feyzi Basar, Mohammad Mursaleen:

On the Euler sequence spaces which include the spaces lp and linfinity I. 1450-1462
Volume 176, Number 11, June 2006
- Enric Trillas:

On the use of words and fuzzy sets, . 1463-1487 - Mustafa Demirci:

The generalized associative law in vague groups and its applications - II. 1488-1530 - Andrea Mesiarová:

H-transformation of t-norms. 1531-1545 - Hisao Hirakawa, Katsushi Inoue, Akira Ito:

Three-way two-dimensional alternating finite automata with rotated inputs. 1546-1569 - Kevin Burns:

Bayesian inference in disputed authorship: A case study of cognitive errors and a new system for decision support. 1570-1589 - Yongchuan Tang, Jiacheng Zheng:

Generalized Jeffrey's rule of conditioning and evidence combining rule for a priori probabilistic knowledge in conditional evidence theory. 1590-1606 - Jie Lu

, Chenggen Shi, Guangquan Zhang
:
On bilevel multi-follower decision making: General framework and solutions. 1607-1627
Volume 176, Number 12, June 2006
- Stephan Rein, Martin Reisslein

:
Identifying the classical music composition of an unknown performance with wavelet dispersion vector and neural nets. 1629-1655 - Luis Rueda, B. John Oommen

:
A fast and efficient nearly-optimal adaptive Fano coding scheme. 1656-1683 - Alfredo De Santis

, Anna Lisa Ferrara, Barbara Masucci
:
Enforcing the security of a time-bound hierarchical key assignment scheme. 1684-1694 - Yun Ji Na, Choon Seong Leem, Il Seok Ko:

ACASH: an adaptive web caching method based on the heterogeneity of web object and reference characteristics. 1695-1711 - Verayuth Lertnattee, Thanaruk Theeramunkong:

Class normalization in centroid-based text categorization. 1712-1738 - Wu Jigang, Thambipillai Srikanthan:

An efficient algorithm for the collapsing knapsack problem. 1739-1751 - Ching-Yao Wang, Shian-Shyong Tseng, Tzung-Pei Hong:

Flexible online association rule mining based on multidimensional pattern relations. 1752-1780 - Rasit Köker:

Design and performance of an intelligent predictive controller for a six-degree-of-freedom robot using the Elman network. 1781-1799
Volume 176, Number 13, July 2006
- Nikos I. Karacapilidis

, Alexis Lazanas
, George Megalokonomos, Pavlos Moraitis:
On the development of a web-based system for transportation services. 1801-1828 - Degang Chen, Wenxiu Zhang, Daniel S. Yeung, Eric C. C. Tsang:

Rough approximations on a complete completely distributive lattice with applications to generalized rough sets. 1829-1848 - David A. Pelta

, Alejandro Sancho-Royo, Carlos Cruz Corona, José L. Verdegay:
Using memory and fuzzy rules in a co-operative multi-thread strategy for optimization. 1849-1868 - Zheng Pei, Germano Resconi, Ariën J. van der Wal, Keyun Qin, Yang Xu:

Interpreting and extracting fuzzy decision rules from fuzzy information systems and their inference. 1869-1897 - Eduardo R. Hruschka

, Ricardo J. G. B. Campello
, Leandro Nunes de Castro
:
Evolving clusters in gene-expression data. 1898-1927 - Jae-Gil Lee, Kyu-Young Whang:

Secure query processing against encrypted XML data using Query-Aware Decryption. 1928-1947
Volume 176, Number 14, July 2006
- Jianping Zhang, Huan Liu, Paul P. Wang:

Some current issues of streaming data mining. 1949-1951 - Sanghamitra Bandyopadhyay, Chris Giannella, Ujjwal Maulik

, Hillol Kargupta, Kun Liu, Souptik Datta:
Clustering distributed data streams in peer-to-peer environments. 1952-1985 - Jeffrey Xu Yu, Zhihong Chong, Hongjun Lu, Zhenjie Zhang, Aoying Zhou:

A false negative approach to mining frequent itemsets from high speed transactional data streams. 1986-2015 - David Littau, Daniel Boley:

Streaming data reduction using low-memory factored representations. 2016-2041 - Jun Yan, Benyu Zhang, Shuicheng Yan, Ning Liu, Qiang Yang, QianSheng Cheng, Hua Li, Zheng Chen, Wei-Ying Ma

:
A scalable supervised algorithm for dimensionality reduction on streaming data. 2042-2065
- Aykut Ünal, Yücel Saygin, Özgür Ulusoy

:
Processing count queries over event streams at multiple time granularities. 2066-2096 - Kingkarn Sookhanaphibarn, Chidchanok Lursinsap:

A new feature extractor invariant to intensity, rotation, and scaling of color images. 2097-2119
Volume 176, Number 15, August 2006
- Jangmin O, Jongwoo Lee, Jae Won Lee, Byoung-Tak Zhang:

Adaptive stock trading with dynamic asset allocation using reinforcement learning. 2121-2147 - Okbin Lee, Seongjin Yoo, Byungjeon Park, Ilyong Chung:

The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design. 2148-2160 - Sing Kiong Nguang

, Peng Shi:
Robust Hinfinity output feedback control design for fuzzy dynamic systems with quadratic D stability constraints: An LMI approach. 2161-2191 - Izhar Ahmad

:
Symmetric duality for multiobjective fractional variational problems with generalized invexity. 2192-2207 - Zhihui Li, Ping Li, Yongming Li

:
The relationships among several types of fuzzy automata. 2208-2226 - Nihan Kesim Cicekli, Ilyas Cicekli:

Formalizing the specification and execution of workflows using the event calculus. 2227-2267 - Mikail Et, Hifsi Altinok, Rifat Çolak

:
On lambda-statistical convergence of difference sequences of fuzzy numbers. 2268-2278
Volume 176, Number 16, August 2006
- Fabien Lange, Michel Grabisch:

Interaction transform for bi-set functions over a finite set. 2279-2303 - Owen Kaser, Daniel Lemire:

Attribute value reordering for efficient hybrid OLAP. 2304-2336 - Zhao Lu, Leang-San Shieh, Guanrong Chen

, Norman P. Coleman:
Adaptive feedback linearization control of chaotic systems via recurrent high-order neural networks. 2337-2354 - Magdi Sadek Mahmoud

, Peng Shi, Jianqiang Yi, Jeng-Shyang Pan
:
Robust observers for neutral jumping systems with uncertain information. 2355-2385 - Dug Hun Hong:

Renewal process with T-related fuzzy inter-arrival times and fuzzy rewards. 2386-2395 - Francisco Gallego Lupiáñez

:
Nets and filters in intuitionistic fuzzy topological spaces. 2396-2404 - Saeid Abbasbandy, B. Asady:

Ranking of fuzzy numbers by sign distance. 2405-2416 - Bijan Davvaz:

Roughness based on fuzzy ideals. 2417-2437
Volume 176, Number 17, September 2006
- Wilhelm Rödder, Friedhelm Kulmann:

Recall and Reasoning - an information theoretical model of cognitive processes. 2439-2466 - Wladyslaw Homenda:

Balanced fuzzy sets. 2467-2506 - Yanyong Guan

, Hongkai Wang:
Set-valued information systems. 2507-2525 - Hajime Nobuhara, Witold Pedrycz, Salvatore Sessa, Kaoru Hirota:

A motion compression/reconstruction method based on max t-norm composite fuzzy relational equations. 2526-2552 - Wenbin Luo:

Hashing via finite field. 2553-2566 - Biswajit Acharya, Arun K. Majumdar, Jayanta Mukherjee:

Video model for dynamic objects. 2567-2602
Volume 176, Number 18, September 2006
- Jun Kiniwa:

Request-based token passing for self-stabilizing mutual exclusion. 2603-2623 - Anna Formica

:
Ontology-based concept similarity in Formal Concept Analysis. 2624-2641 - Jianwen Chen, Yan Zhang:

A rule based knowledge transaction model for mobile environments. 2642-2672 - Elena Tsiporkova, Veselka Boeva:

Multi-step ranking of alternatives in a multi-criteria and multi-expert decision making environment. 2673-2697 - Xiaoxia Huang:

Credibility-based chance-constrained integer programming models for capital budgeting with fuzzy parameters. 2698-2712 - Anna Pankowska, Maciej Wygralak:

General IF-sets with triangular norms and their applications to group decision making. 2713-2754 - Yasemin Claire Erensal, Temel Öncan, Murat Levent Demircan

:
Determining key capabilities in technology management using fuzzy analytic hierarchy process: A case study of Turkey. 2755-2770
Volume 176, Number 19, October 2006
- Yi-Ping Phoebe Chen

, Supawan Prompramote, Frédéric Maire:
MDSM: Microarray database schema matching using the Hungarian method. 2771-2790 - William Chung-Kung Yen:

The edge-orientation problem and some of its variants on weighted graphs. 2791-2816 - Chen-Sheng Ting:

Stability analysis and design of Takagi-Sugeno fuzzy systems. 2817-2845 - Petr Yakovlevitch Ekel

, Fernando H. Schuffner Neto:
Algorithms of discrete optimization and their application to problems with fuzzy coefficients. 2846-2868 - Zhongsheng Hua

, Feihua Huang:
A variable-grouping based genetic algorithm for large-scale integer programming. 2869-2885 - Nehad N. Morsi, Elewa M. Roshdy:

Issues on adjointness in multiple-valued logics. 2886-2909 - Tarapada Bag

, Syamal Kumar Samanta:
Fixed point theorems on fuzzy normed linear spaces. 2910-2931
Volume 176, Number 20, October 2006
- Ronald R. Yager:

OWA trees and their role in security modeling using attack trees. 2933-2959 - Hui Li, Scott Dick:

A similarity measure for fuzzy rulebases based on linguistic gradients. 2960-2987 - Hajime Nobuhara, Barnabás Bede, Kaoru Hirota:

On various eigen fuzzy sets and their application to image reconstruction. 2988-3010 - Funda Karaçal:

On the direct decomposability of strong negations and S-implication operators on product lattices. 3011-3025 - Ewa Straszecka

:
Combining uncertainty and imprecision in models of medical diagnosis. 3026-3059 - Jun Zhang, Yu Zhou, Fanyuan Ma, Dawu Gu, Yingcai Bai:

An extension of secure group communication using key graph. 3060-3078 - Young Bae Jun, Seok-Zun Song

:
Generalized fuzzy interior ideals in semigroups. 3079-3093 - Izhar Ahmad

, Z. Husain:
Second order (F, α, ρ, d)-convexity and duality in multiobjective programming. 3094-3103
Volume 176, Number 21, November 2006
- Danilo Ardagna

, Chiara Francalanci, Marco Trubian:
A multi-model algorithm for the cost-oriented design of Internet-based systems. 3105-3131 - Youngjoo Cho, Ilyong Chung:

A parallel routing algorithm on circulant networks employing the Hamiltonian circuit latin square. 3132-3142 - Rza Bashirov

, Valentino Crespi:
Analyzing permutation capability of multistage interconnection networks with colored Petri nets. 3143-3165 - Taigun Lee, Sung-Kee Park, Mignon Park:

An effective method for detecting facial features and face in human-robot interaction. 3166-3189 - Humberto Bustince Sola, Maria Victoria Mohedano Salillas, Edurne Barrenechea Tartas

, Miguel Pagola
:
Definition and construction of fuzzy DI-subsethood measures. 3190-3231 - Ping Li, Yongming Li

:
Algebraic properties of LA-languages. 3232-3255 - Yingjie Yang, Robert I. John

:
Roughness bounds in rough set operations. 3256-3267
Volume 176, Number 22, November 2006
- Csilla Farkas, Alexander Brodsky, Sushil Jajodia:

Unauthorized inferences in semistructured databases. 3269-3299 - Jongik Kim:

Advanced structural joins using element distribution. 3300-3331 - Jianxi Fan, Xiaohua Jia

, Xiaola Lin
:
Complete path embeddings in crossed cubes. 3332-3346 - Jin-Wook Baek, Heon Young Yeom:

A timed mobile agent planning approach for distributed information retrieval in dynamic network environments. 3347-3378 - Lei Qian, H. John Caulfield:

What can we do with a linear optical logic gate? 3379-3392 - Chin-Chen Chang, Chih-Yang Lin

, Yu-Zheng Wang:
New image steganographic methods using run-length approach. 3393-3408 - Nen-Chung Wang

, Tzung-Shi Chen:
Task migration in all-port wormhole-routed 2D mesh multicomputers. 3409-3425 - Chien-Yuan Chen:

An efficient parity detection technique using the two-moduli set {2h - 1, 2h + 1}. 3426-3430
Volume 176, Number 23, December 2006
- Y. Y. Yao

:
Neighborhood systems and approximate retrieval. 3431-3452 - Hsu-Yang Kung, Mei-Hsien Lin, Fu-Wen Kuo:

Dynamic QoS queuing control mechanism for multimedia differentiated services. 3453-3471 - Aoi Honda

, Michel Grabisch:
Entropy of capacities on lattices and set systems. 3472-3489 - Sung-Kwun Oh, Witold Pedrycz, Seok-Beom Roh:

Genetically optimized fuzzy polynomial neural networks with fuzzy set-based polynomial neurons. 3490-3519 - Ho Jae Lee, Jin Bae Park, Young Hoon Joo

:
Robust load-frequency control for uncertain nonlinear power systems: A fuzzy logic approach. 3520-3537 - Ying-Ming Wang, Celik Parkan:

Two new approaches for assessing the weights of fuzzy opinions in group decision analysis. 3538-3555 - Vladimir S. Lerner:

An elementary information macrodynamic model of a market economic system. 3556-3590
Volume 176, Number 24, December 2006
- Guanling Lee, Wenpo Yang, Jia-Min Lee:

A parallel algorithm for mining multiple partial periodic patterns. 3591-3609 - Yoshiteru Nakamori, Mina Ryoke:

Treating fuzziness in subjective evaluation data. 3610-3644 - Daniel Gómez

, Javier Montero
, Javier Yáñez
:
A coloring fuzzy graph approach for image classification. 3645-3657 - Bijan Davvaz, M. Mahdavipour:

Roughness in modules. 3658-3674 - Niovi Kehayopulu, Michael Tsingelis:

Regular ordered semigroups in terms of fuzzy subsets. 3675-3693 - Gesthimani Stefanidou, Garyfalos Papaschinopoulos:

The periodic nature of the positive solutions of a nonlinear fuzzy max-difference equation. 3694-3710 - Andrea Janes

, Marco Scotto, Witold Pedrycz, Barbara Russo
, Milorad Stefanovic, Giancarlo Succi
:
Identification of defect-prone classes in telecommunication software systems using design metrics. 3711-3734 - Khaled Salah

:
On the accuracy of two analytical models for evaluating the performance of Gigabit Ethernet hosts. 3735-3756

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














