


default search action
Information Sciences, Volume 177
Volume 177, Number 1, January 2007
- James F. Peters, Andrzej Skowron:

Zdzislaw Pawlak life and work (1926-2006). 1-2 - Zdzislaw Pawlak, Andrzej Skowron

:
Rudiments of rough sets. 3-27 - Zdzislaw Pawlak, Andrzej Skowron

:
Rough sets: Some extensions. 28-40 - Zdzislaw Pawlak, Andrzej Skowron

:
Rough sets and Boolean reasoning. 41-73
- Pawel Terlecki, Krzysztof Walczak:

On the relation between rough set reducts and jumping emerging patterns. 74-83 - Jerry M. Mendel:

Advances in type-2 fuzzy sets and systems. 84-110 - Fabrizio Durante

, Radko Mesiar, Pier Luigi Papini, Carlo Sempi:
2-Increasing binary aggregation operators. 111-129 - Corrado Mencar

, Giovanna Castellano
, Anna Maria Fanelli
:
Distinguishability quantification of fuzzy sets. 130-149 - Mustafa Demirci, Zeynep Eken:

An introduction to vague complemented ordered sets. 150-160 - Vladimír Janis

, Branimir Seselja, Andreja Tepavcevic
:
Non-standard cut classification of fuzzy sets. 161-169 - Stuart Harvey Rubin:

On randomization and discovery. 170-191 - Shuhai Li, Yumin Wang:

Exploiting randomness on continuous sets. 192-201 - Stephen Drape:

Generalising the array split obfuscation. 202-219 - Karel De Loof, Bernard De Baets

, Hans E. De Meyer:
On the random generation and counting of weak order extensions of a poset with given class cardinalities. 220-230 - Alessandro Bogliolo

, Valerio Freschi:
Parallel comparison of run-length-encoded strings on a linear systolic array. 231-238 - Michel Neuhaus, Horst Bunke:

Automatic learning of cost functions for graph edit distance. 239-247 - Zeshui Xu

, Jian Chen:
An interactive method for fuzzy multiple attribute group decision making. 248-263 - Chi-Yung Lee, Cheng-Jian Lin, Huei-Jen Chen:

A self-constructing fuzzy CMAC model and its applications. 264-280 - Huiping Guo, Yingjiu Li, Sushil Jajodia:

Chaining watermarks for detecting malicious modifications to streaming data. 281-298 - Nicoletta De Francesco, Antonella Santone, Gigliola Vaglini:

A user-friendly interface to specify temporal properties of concurrent systems. 299-311 - Hongbin Dong, Jun He

, Houkuan Huang, Wei Hou:
Evolutionary programming using a mixed mutation strategy. 312-327
Volume 177, Number 2, January 2007
- Abraham Kandel, Mark Last:

Special issue on advances in fuzzy logic. 329-331 - I. Burhan Türksen:

Meta-linguistic axioms as a foundation for computing with words. 332-359 - Jerry M. Mendel, Hongwei Wu:

New results about the centroid of an interval type-2 fuzzy set, including the centroid of a fuzzy granule. 360-377 - Anca L. Ralescu, Dan A. Ralescu, Yoko Yamakata:

Inference by aggregation of evidence with applications to fuzzy probabilities. 378-387 - Vladik Kreinovich, Jan Beck, Hung T. Nguyen:

Ellipsoids and ellipsoid-shaped fuzzy sets as natural multi-variate generalization of intervals and fuzzy numbers: How to elicit them from users, and how to use them in data processing. 388-407 - Scott Dick, Adam Schenker, Witold Pedrycz, Abraham Kandel:

Regranulation: A granular algorithm enabling communication between granular worlds. 408-435 - Leonard J. Jowers, James J. Buckley, Kevin D. Reilly:

Simulating continuous fuzzy systems. 436-448 - Özge Uncu, I. Burhan Türksen:

A novel feature selection approach: Combining feature wrappers and filters. 449-466 - Menahem Friedman, Mark Last, Yaniv Makover, Abraham Kandel:

Anomaly detection in web documents using crisp and fuzzy-based cosine clustering methodology. 467-475 - Bo Jin, Y. C. Tang, Yan-Qing Zhang:

Support vector machines with genetic fuzzy feature transformation for biomedical data classification. 476-489
- Sheng Zhong:

Privacy-preserving algorithms for distributed mining of frequent itemsets. 490-503 - Zhanfeng Shen, Jiancheng Luo, Guangyu Huang, Dongping Ming, Weifeng Ma, Hao Sheng:

Distributed computing model for processing remotely sensed images based on grid computing. 504-518 - Sun-Yuan Hsieh:

The interval-merging problem. 519-524 - Yon Dohn Chung:

An indexing scheme for energy-efficient processing of content-based retrieval queries on a wireless data stream. 525-542 - Chien-Lung Hsu, Kuo-Yu Tsai, Pei-Ling Tsai:

Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. 543-549 - Hung-Hsu Tsai

, Duen-Wu Sun:
Color image watermark extraction based on support vector machines. 550-569 - Ruey-Shun Chen, Chin-Hsiao Hsiang:

A study on the critical success factors for corporations embarking on knowledge community-based e-learning. 570-586 - Songtao Jiang, Byung Suk Lee, Zhen He

:
Cost modeling of spatial operators using non-parametric regression. 607-631 - Kazi Shah Nawaz Ripon, Sam Kwong

, Kim-Fung Man
:
A real-coding jumping gene genetic algorithm (RJGGA) for multiobjective optimization. 632-654
- Salih Aytar, Serpil Pehlivan:

Addendum to "Statistically monotonic and statistically bounded sequences of fuzzy numbers" [Informat Sci 176: (2006) 734-744]. 655-656
Volume 177, Number 3, February 2007
- Young-Guk Ha, Joo-Chan Sohn, Young-Jo Cho, Hyunsoo Yoon:

A robotic service framework supporting automated integration of ubiquitous sensors and devices. 657-679 - Dennis Fuchs, Zhen He

, Byung Suk Lee:
Compressed histograms with arbitrary bucket layouts for selectivity estimation. 680-702 - Yaochun Huang, Hui Xiong, Weili Wu, Ping Deng, Zhongnan Zhang:

Mining maximal hyperclique pattern: A hybrid search strategy. 703-721 - Yongsheng Ding, Lei Gao, Da Ruan:

Communication mechanisms in ecological network-based grid middleware for service emergence. 722-733 - Shu-Chuan Chu

, Zhe-Ming Lu, Jeng-Shyang Pan
:
Hadamard transform based fast codeword search algorithm for high-dimensional VQ encoding. 734-746 - Chih-Hung Wang, Chih-Yu Liu:

A new ring signature scheme with signer-admission property. 747-754 - Ulas Beldek, Kemal Leblebicioglu

:
Strategy creation, decomposition and distribution in particle navigation. 755-770 - Waranyu Wongseree, Nachol Chaiyaratana

, Kanjana Vichittumaros, Pranee Winichagoon, Suthat Fucharoen:
Thalassaemia classification by neural networks and genetic programming. 771-786 - Ismail H. Toroslu

, Yilmaz Arslanoglu:
Genetic algorithm for the personnel assignment problem with multiple objectives. 787-803 - Ho-Youl Jung, Yun-Ju Park, Young-Jin Kim, Jung-Sun Park, Kuchan Kimm, InSong Koh:

New methods for imputation of missing genotype using linkage disequilibrium and haplotype information. 804-814 - W. David Pan

, Seong-Moo Yoo, Mahesh Nalasani, Paul G. Cox:
Efficient local transformation estimation using Lie operators. 815-831 - SangYoon Lee, Sanghyun Park, Woo-Cheol Kim, Dongwon Lee

:
An efficient location encoding method for moving objects using hierarchical administrative district and road network. 832-843 - V. Lakshmi Narasimhan, B. Hendradjaya:

Some theoretical considerations for a suite of metrics for the integration of software components. 844-864 - Bijan Davvaz, Piergiulio Corsini:

Redefined fuzzy Hv-submodules and many valued implications. 865-875 - Jianming Zhan

, Wieslaw A. Dudek
:
Fuzzy h-ideals of hemirings. 876-886 - Zhudeng Wang:

TL-filters of integral residuated l-monoids. 887-896 - Hee Sik Kim, B. Monk, Joseph Neggers:

On pseudo-fuzzy linear mappings. 897-905 - Humberto Bustince Sola, Miguel Pagola

, Edurne Barrenechea Tartas
:
Construction of fuzzy indices from fuzzy DI-subsethood measures: Application to the global comparison of images. 906-929 - J. Balasubramaniam

:
Yager's new class of implications Jf and some classical tautologies. 930-946 - M. Masoom Ali, Saralees Nadarajah:

Information matrices for normal and Laplace mixtures. 947-955 - Huawen Liu, Guo-Jun Wang:

Unified forms of fully implicational restriction methods for fuzzy reasoning. 956-966 - Trieu-Kien Truong, Pei-Ding Chen, Lung-Jen Wang, Y. W. Chang, Irving S. Reed:

Erratum to "Fast, prime factor, discrete Fourier transform algorithms over GF(2m) for 8 leq m leq 10" [Informat Sci 176 (1) (2006) 1-26]. 967-968
Volume 177, Number 4, February 2007
- Marion G. Ceruti, Stuart Harvey Rubin:

Infodynamics: Analogical analysis of states of matter and information. 969-987 - Jerry M. Mendel:

Computing with words and its relationships with fuzzistics. 988-1006 - Xiaodong Liu, Tianyou Chai, Wei Wang, Wanquan Liu

:
Approaches to the representations and logic operations of fuzzy concepts in the framework of axiomatic fuzzy set theory I. 1007-1026 - Xiaodong Liu, Wei Wang, Tianyou Chai, Wanquan Liu

:
Approaches to the representations and logic operations of fuzzy concepts in the framework of axiomatic fuzzy set theory II. 1027-1045 - Jun Ma, Wenjiang Li, Da Ruan, Yang Xu:

Filter-based resolution principle for lattice-valued propositional logic LP(X). 1046-1062 - Huan Huang, Congxin Wu:

On the triangle inequalities in fuzzy metric spaces. 1063-1072 - Tzu-Chao Lin:

A new adaptive center weighted median filter for suppressing impulsive noise in images. 1073-1087 - Ling Shao

, Timor Kadir, Michael Brady:
Geometric and photometric invariant distinctive regions detection. 1088-1122 - Yu Wang, Marc Q. Ma, Kai Zhang, Frank Y. Shih:

A hierarchical refinement algorithm for fully automatic gridding in spotted DNA microarray image processing. 1123-1135 - Di Xiao, Xiaofeng Liao, Shaojiang Deng:

A novel key agreement protocol based on chaotic maps. 1136-1142 - Kyung-Ah Shim, Sungsik Woo:

Cryptanalysis of tripartite and multi-party authenticated key agreement protocols. 1143-1151
Volume 177, Number 5, March 2007
- Shu-Heng Chen

:
Computationally intelligent agents in economics and finance. 1153-1168 - Raquel Flórez López

:
Strategic supplier selection in the added-value perspective: A CI approach. 1169-1179 - Zhineng Zhu, Haibo He, Janusz A. Starzyk, C. Tseng:

Self-organizing learning array and its application to economic and financial problems. 1180-1192 - Ping-Chen Lin, Jiah-Shing Chen:

FuzzyTree crossover for multi-valued stock valuation. 1193-1203 - Domenico Delli Gatti

, Edoardo Gaffeo
, Mauro Gallegati, Gianfranco Giulioni
, Alan Kirman, Antonio Palestrini
, Alberto Russo
:
Complex dynamics and empirical evidence. 1204-1221 - Shu-Heng Chen

, Ya-Chi Huang:
Relative risk aversion and wealth dynamics. 1222-1229
- Ying-Ming Wang, Jian-Bo Yang

, Dong-Ling Xu
, Kwai-Sang Chin
:
On the combination and normalization of interval-valued belief structures. 1230-1247 - Ismail Ellabib, Paul H. Calamai, Otman A. Basir

:
Exchange strategies for multiple Ant Colony System. 1248-1264 - Qiu-Hua Lin, Yong-Rui Zheng, Fuliang Yin, Hualou Liang, Vince D. Calhoun

:
A fast algorithm for one-unit ICA-R. 1265-1275 - Ester Yen, I-Wen Mike Chu:

Relaxing instance boundaries for the search of splitting points of numerical attributes in classification trees. 1276-1289 - Prodip Bhowal, Dipankar Sarkar, Siddhartha Mukhopadhyay, Anupam Basu:

Fault diagnosis in discrete time hybrid systems - A case study. 1290-1308 - Ali Saman Tosun:

Threshold-based declustering. 1309-1331
Volume 177, Number 6, March 2007
- Ming-Chuan Hung, Man-Lin Huang, Don-Lin Yang

, Nien-Lin Hsueh:
Efficient approaches for materialized views selection in a data warehouse. 1333-1348 - Bo Xie, Peng Han, Fan Yang, Ruimin Shen, Hua-Jun Zeng, Zheng Chen:

DCFLA: A distributed collaborative-filtering neighbor-locating algorithm. 1349-1363 - Junghyun Nam, Youngsook Lee, Seungjoo Kim

, Dongho Won:
Security weakness in a three-party pairing-based protocol for password authenticated key exchange. 1364-1375 - Wei-Bin Lee, Chia Chun Wu, Woei-Jiunn Tsaur:

A novel deniable authentication protocol using generalized ElGamal signature scheme. 1376-1381 - Licheng Wang, Zhenfu Cao

, Xiangxue Li, Haifeng Qian:
Simulatability and security of certificateless threshold signatures. 1382-1394 - Shu Li

, John E. Taplin, Yuching Zhang:
The equate-to-differentiate's way of seeing the prisoner's dilemma. 1395-1412 - Hongxuan Lei, Yongming Li

:
Minimization of states in automata theory based on finite lattice-ordered monoids. 1413-1421 - Young Bae Jun, Yang Xu, Jun Ma:

Redefined fuzzy implicative filters. 1422-1429 - Adrian I. Ban

, Ioan Fechete:
Componentwise decomposition of some lattice-valued fuzzy integrals. 1430-1440 - Rosario Toscano:

Robust synthesis of a PID controller by uncertain multimodel approach. 1441-1451 - Abbas Parchami, Mashaallah Mashinchi:

Fuzzy estimation for process capability indices. 1452-1462 - Murat Gülbay, Cengiz Kahraman:

An alternative approach to fuzzy control charts: Direct fuzzy approach. 1463-1480 - Antonio Di Nola, Ciro Russo

:
Lukasiewicz transform and its application to compression and reconstruction of digital images. 1481-1498 - William Zhu:

Topological approaches to covering rough sets. 1499-1508 - Huai-Ning Wu

, Kai-Yuan Cai:
Robust fuzzy control for uncertain discrete-time nonlinear Markovian jump systems without mode observations. 1509-1522 - Ismail H. Toroslu

, Göktürk Üçoluk:
Incremental assignment problem. 1523-1529
Volume 177, Number 7, April 2007
- Cengiz Kahraman:

Fuzzy set applications in industrial engineering. 1531-1532 - Luis Martínez-López

, Jun Liu
, Da Ruan, Jian-Bo Yang
:
Dealing with heterogeneous information in engineering evaluation processes. 1533-1542 - Patricia Melin

, Oscar Castillo
:
An intelligent hybrid approach for industrial quality control combining neural networks, fuzzy logic and fractal theory. 1543-1557 - Guoqing Chen, Ming Ren, Peng Yan, Xunhua Guo

:
Enriching the ER model based on discovered association rules. 1558-1566 - Cengiz Kahraman, Gülçin Büyüközkan

, Nüfer Yasin Ates
:
A two phase multi-attribute decision-making approach for new product introduction. 1567-1582 - Chongfu Huang, Hiroshi Inoue:

Soft risk maps of natural disasters and their applications to decision-making. 1583-1592
- Anthony J. T. Lee, Ruey-Wen Hong, Wei-Min Ko, Wen-Kwang Tsao, Hsiu-Hui Lin:

Mining spatial association rules in image databases. 1593-1608 - Chang-Tien Lu

, Yufeng Kou, Jiang Zhao, Li Chen:
Detecting and tracking regional outliers in meteorological data. 1609-1632 - Tofigh Allahviranloo

, Nazanin Ahmady
, E. Ahmady
:
Numerical solution of fuzzy differential equations by predictor-corrector method. 1633-1647 - Barnabás Bede, Imre J. Rudas, Attila L. Bencsik:

First order linear fuzzy differential equations under generalized differentiability. 1648-1662 - Bin Liu, Xinzhi Liu, Kok Lay Teo:

Feedback stabilization of dissipative impulsive dynamical systems. 1663-1672 - Yi-Chung Hu

:
Fuzzy integral-based perceptron for two-class pattern classification problems. 1673-1686 - Cristina Alcalde, Ana Burusco

, Ramón Fuentes-González:
Ambiguity and fuzziness measures defined on the set of closed intervals in [0, 1]. 1687-1698 - Wudhichai Assawinchaichote, Sing Kiong Nguang

, Peng Shi:
Robust Hinfinity fuzzy filter design for uncertain nonlinear singularly perturbed systems with Markovian jumps: An LMI approach. 1699-1714 - Violeta Tomasevic

, Slobodan Bojanic, Octavio Nieto-Taladriz:
Finding an internal state of RC4 stream cipher. 1715-1727
Volume 177, Number 8, April 2007
- Pasquale De Meo

, Alfredo Garro
, Giorgio Terracina
, Domenico Ursino
:
Personalizing learning programs with X-Learn, an XML-based, "user-device" adaptive multi-agent system. 1729-1770 - Xiaofan Yang, Yuan Yan Tang:

A (4n-9)/3 diagnosis algorithm on n-dimensional cube network. 1771-1781 - Qiang Zhu

, Jun-Ming Xu, Xinmin Hou
, Min Xu:
On reliability of the folded hypercubes. 1782-1788 - Vasilios Katos

, Bernard S. Doherty:
Exploring confusion in product ciphers through regression analysis. 1789-1795 - Chin-Chen Chang, Chih-Yang Lin

:
Reversible steganographic method using SMVQ approach based on declustering. 1796-1805 - Habib M. Ammari:

Lessons learned from the simulation experience of a three-tier multi-hop wireless Internet architecture. 1806-1833 - Cheng-Kang Chu, Wen-Guey Tzeng:

Optimal resilient threshold GQ signatures. 1834-1851 - S. Dhompongsa, A. Kaewkhao, Satit Saejung

:
On topological properties of the Choquet weak convergence of capacity functionals of random sets. 1852-1859 - Glad Deschrijver, Etienne E. Kerre:

On the position of intuitionistic fuzzy set theory in the framework of theories modelling imprecision. 1860-1866 - Ying-Ming Wang, Celik Parkan:

A preemptive goal programming method for aggregating OWA operator weights in group decision making. 1867-1877 - Wai-Tak Wong

, Frank Y. Shih, Jung Liu:
Shape-based image retrieval using support vector machines, Fourier descriptors and self-organizing maps. 1878-1891 - Ranjit Kumar Barai, Kenzo Nonami:

Optimal two-degree-of-freedom fuzzy control for locomotion control of a hydraulically actuated hexapod robot. 1892-1915 - Erzsébet Németh

, Rozália Lakner
, Katalin M. Hangos
, Ian T. Cameron:
Prediction-based diagnosis and loss prevention using qualitative multi-scale models. 1916-1930
Volume 177, Number 9, May 2007
- Yon Dohn Chung, Ji Yeon Lee:

An indexing method for wireless broadcast XML data. 1931-1953 - Emilios Cambouropoulos, Maxime Crochemore

, Costas S. Iliopoulos, Manal Mohamed
, Marie-France Sagot:
All maximal-pairs in step-leap representation of melodic sequence. 1954-1962 - Markku Siermala, Martti Juhola, Jorma Laurikkala, Kati Iltanen, Erna Kentala, Ilmari Pyykkö:

Evaluation and classification of otoneurological data with new data analysis methods based on machine learning. 1963-1976 - Nguyen Van Hop:

Solving fuzzy (stochastic) linear programming problems using superiority and inferiority measures. 1977-1991 - Jihad Mohamad Jaam

:
A new construction technique of a triangle-free 3-colored K16's. 1992-1995
Volume 177, Number 10, May 2007
- Oscar Castillo

, Patricia Melin
:
Special Issue on Hybrid Intelligent Systems. 1997-1998 - Edgar N. Sánchez, Héctor M. Becerra

, Carlos M. Velez
:
Combining fuzzy, PID and regulation control for an autonomous mini-helicopter. 1999-2022 - Roberto Sepúlveda, Oscar Castillo

, Patricia Melin
, Antonio Rodríguez Díaz
, Oscar Montiel
:
Experimental study of intelligent controllers under uncertainty using type-1 and type-2 fuzzy logic. 2023-2048 - Clodoaldo Ap. M. Lima

, André L. V. Coelho
, Fernando J. Von Zuben
:
Hybridizing mixtures of experts with support vector machines: Investigation into nonlinear dynamic systems identification. 2049-2074 - Oscar Montiel

, Oscar Castillo
, Patricia Melin
, Antonio Rodríguez Díaz
, Roberto Sepúlveda:
Human evolutionary model: A new approach to optimization. 2075-2098
- Leonid I. Perlovsky:

Cognitive high level information fusion. 2099-2118 - Ning Zhang, Zhixiong Chen, Guozhen Xiao:

Efficient elliptic curve scalar multiplication algorithms resistant to power analysis. 2119-2129 - Kuo-Liang Chung, Yi-Luen Huang, Yau-Wen Liu:

Efficient algorithms for coding Hilbert curve of arbitrary-sized image and application to window query. 2130-2151 - Guoli Ding, Jianhua Chen, Robert F. Lax, Peter P. Chen:

Graph-theoretic method for merging security system specifications. 2152-2166 - Irena Koprinska

, Josiah Poon, James Clark, Jason Chan:
Learning to classify e-mail. 2167-2187 - Qingchun Ren, Qilian Liang:

Energy and quality aware query processing in wireless sensor database systems. 2188-2205
Volume 177, Number 11, June 2007
- Antonio Corral

, Jesús Manuel Almendros-Jiménez
:
A performance comparison of distance-based query algorithms using R-trees in spatial databases. 2207-2237 - Shi-Ming Huang, Tung-Hsiang Chou, Jia-Lang Seng

:
Data warehouse enhancement: A semantic cube model approach. 2238-2254 - Guoren Wang, Xiangmin Zhou, Bin Wang, Baiyou Qiao, Donghong Han:

A hyperplane based indexing technique for high-dimensional data. 2255-2268 - Przemyslaw Kazienko

, Michal Adamski:
AdROSA - Adaptive personalization of web advertising. 2269-2295 - Mansoor J. Zolghadri

, Eghbal G. Mansoori
:
Weighting fuzzy classification rules using receiver operating characteristics (ROC) analysis. 2296-2307 - Tingquan Deng

, Yanmei Chen, Wenli Xu, Qionghai Dai:
A novel approach to fuzzy rough sets based on a fuzzy covering. 2308-2326 - Robert Bennes, Shahram Latifi, Naoto Kimura:

A comparative study of job allocation and migration in the pancake network. 2327-2335 - Victor Balopoulos

, Anestis G. Hatzimichailidis, Basil K. Papadopoulos:
Distance and similarity measures for fuzzy operators. 2336-2348 - Ferdinando Di Martino, Salvatore Sessa:

Compression and decompression of images with discrete fuzzy transforms. 2349-2362 - Zeshui Xu

:
Intuitionistic preference relations and their application in group decision making. 2363-2379 - Enrique Alba

, Francisco Chicano
:
Software project management with GAs. 2380-2401
Volume 177, Number 12, June 2007
- William Chung-Kung Yen, Paul P. Wang:

Guest editorial special issue on graph theory and its applications. 2403-2404 - Yin-Te Tsai, Yaw-Ling Lin

, Fang-Rong Hsu:
Efficient algorithms for the minimum connected domination on trapezoid graphs. 2405-2417 - Chu-Fu Wang, Rong-Hong Jan:

A factoring approach for the Steiner tree problem in undirected networks. 2418-2435 - Rung-Bin Lin, Shuyu Chen:

Conjugate conflict continuation graphs for multi-layer constrained via minimization. 2436-2447 - Chen-Tung Chen, Sue-Fen Huang:

Applying fuzzy method for measuring criticality in project network. 2448-2458 - Ugur Dogrusöz

, Konstantinos G. Kakoulis, Brendan Madden, Ioannis G. Tollis:
On labeling in graph visualization. 2459-2472 - Chung-Hsien Hsu, Sheng-Lung Peng, Chong-Hui Shi:

Constructing a minimum height elimination tree of a tree in linear time. 2473-2479 - Anita Saha, Madhumangal Pal, Tapan Kumar Pal:

Selection of programme slots of television channels for giving advertisement: A graph theoretic approach. 2480-2492
- David Taniar, Hui Yee Khaw, Haorianto Cokrowijoyo Tjioe, Eric Pardede

:
The use of Hints in SQL-Nested query optimization. 2493-2521 - Feng-Hsing Wang, Kang K. Yen, Lakhmi C. Jain, Jeng-Shyang Pan

:
Multiuser-based shadow watermark extraction system. 2522-2532 - Chong-Yaw Wee, Paramesran Raveendran

:
Measure of image sharpness using eigenvalues. 2533-2552 - N. Nalini

, G. Raghavendra Rao:
Attacks of simple block ciphers via efficient heuristics. 2553-2569 - Félix García

, Manuel A. Serrano
, José A. Cruz-Lemus
, Francisco Ruiz
, Mario Piattini
:
Managing software process measurement: A metamodel-based approach. 2570-2586 - Samantha Jenkins

, Steven R. Kirk
:
Software architecture graphs as complex networks: A novel partitioning scheme to measure stability and evolution. 2587-2601 - Mostafa I. H. Abd-El-Barr, Salman A. Khan:

Design and analysis of a fault tolerant hybrid mobile scheme. 2602-2620
Volume 177, Number 13, July 2007
- Chih-Yung Chang, Chao-Tsun Chang, Tzung-Shi Chen, Hsu-Ruey Chang:

Hierarchical management protocol for constructing a QoS communication path in wireless Ad Hoc networks. 2621-2641 - Wan-De Weng, Che-Shih Yang, Rui-Chang Lin:

A channel equalizer using reduced decision feedback Chebyshev functional link artificial neural networks. 2642-2654 - Luis M. San-José-Revuelta

:
A new adaptive genetic algorithm for fixed channel assignment. 2655-2678 - Toru Araki

, Yosuke Kikuchi:
Hamiltonian laceability of bubble-sort graphs with edge faults. 2679-2691 - Salman A. Khan, Andries P. Engelbrecht

:
A new fuzzy operator and its application to topology design of distributed local area networks. 2692-2711 - Xiang-Yun Wang, Wenhui Zhang, Yong-Chao Li, Kai-Yuan Cai:

A polynomial dynamic system approach to software design for attractivity requirement. 2712-2725 - Haci Aktas, Naim Çagman

:
Soft sets and soft groups. 2726-2735 - Fotis N. Koumboulis

, Robert E. King, Anna Stathaki:
Logic-based switching controllers - A stepwise safe switching approach. 2736-2755 - Shichao Zhang, Jilian Zhang, Chengqi Zhang

:
EDUA: An efficient algorithm for dynamic database mining. 2756-2767 - Chin-Chen Chang, Chia-Chen Lin

, Chun-Sen Tseng, Wei-Liang Tai
:
Reversible hiding in DCT-based compressed images. 2768-2786 - Wei-Guo Zhang, Ying-Luo Wang, Zhiping Chen, Zan Kan Nie:

Possibilistic mean-variance models and efficient frontiers for portfolio selection problem. 2787-2801 - George A. Papakostas

, Yiannis S. Boutalis, Dimitris A. Karras
, Basil G. Mertzios:
A new class of Zernike moments for computer vision applications. 2802-2819
Volume 177, Number 14, July 2007
- Xiaodi Huang

, Wei Lai, A. S. M. Sajeev, Junbin Gao
:
A new algorithm for removing node overlapping in graph visualization. 2821-2844 - Masakazu Takahashi, Kazutoshi Hanzawa, Takashi Kawasaki:

An efficient method for developing requirement specifications for plant control software using a component-based software prototype. 2845-2866 - Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ababneh:

An efficient non-contiguous processor allocation strategy for 2D mesh connected multicomputers. 2867-2883 - Pedro Ángel Castillo Valdivieso

, Juan Julián Merelo Guervós
, Maribel García Arenas
, Gustavo Romero
:
Comparing evolutionary hybrid systems for design and optimization of multilayer perceptron structure along training parameters. 2884-2905 - Glad Deschrijver:

Arithmetic operators in interval-valued fuzzy set theory. 2906-2924 - Susana Díaz

, Pedro Gil
, Jorge Jiménez Meana, Susana Montes:
Compatibility of t-norms with the concept of epsilon-partition. 2925-2944 - Yao Ouyang

, Jinxuan Fang, Guiling Li:
On the convex combination of TD and continuous triangular norms. 2945-2953 - Yun Shi, Da Ruan, Etienne E. Kerre:

On the characterizations of fuzzy implications satisfying I(x, y)=I(x, I(x, y)). 2954-2970 - Nguyen Van Hop:

Solving linear programming problems under fuzziness and randomness environment using attainment values. 2971-2984 - Pei Yee Ho, Kazuyuki Shimizu:

Evolutionary constrained optimization using an addition of ranking method and a percentage-based tolerance value adjustment scheme. 2985-3004 - Dan Huang, Sing Kiong Nguang

:
Static output feedback controller design for fuzzy systems: An ILMI approach. 3005-3015
Volume 177, Number 15, August 2007
- Manolis G. Vozalis, Konstantinos G. Margaritis

:
Using SVD and demographic data for the enhancement of generalized Collaborative Filtering. 3017-3037 - Chunlin Li, Layuan Li:

Joint QoS optimization for layered computational grid. 3038-3059 - Vasilios Katos

:
Network intrusion detection: Evaluating cluster, discriminant, and logit analysis. 3060-3073 - Sung Jin Yoo, Jin Bae Park, Yoon Ho Choi:

Indirect adaptive control of nonlinear dynamic systems using self recurrent wavelet neural networks via adaptive learning rates. 3074-3098 - Xiaoxia Li, Jianjun Wang:

A steganographic method based upon JPEG and particle swarm optimization algorithm. 3099-3109 - Ling Tan, David Taniar:

Adaptive estimated maximum-entropy distribution model. 3110-3128 - Danhyung Lee, Kwang Chun Lee, Sungwon Kang, Jongmoon Baik:

A priori ordering protocols to support consensus-building in multiple stakeholder contexts. 3129-3150 - Jianxi Fan, Xiaohua Jia

:
Embedding meshes into crossed cubes. 3151-3160 - Chih-Yung Chang, Kuei-Ping Shih, Chung-Hsien Hsu, Hung-Chang Chen:

A location-aware multicasting protocol for Bluetooth Location Networks. 3161-3177 - Ling Wei, Hong-Ru Li, Wen-Xiu Zhang:

Knowledge reduction based on the equivalence relations defined on attribute set and its power set. 3178-3185 - Radim Belohlávek:

A note on variable threshold concept lattices: Threshold-based operators are reducible to classical concept-forming operators. 3186-3191 - Heriberto Román-Flores, A. Flores-Franulic, Yurilev Chalco-Cano

:
A Jensen type inequality for fuzzy integrals. 3192-3201 - Gh. Khaledi, S. A. Ziaie, Mashaallah Mashinchi:

Lattice structure of e-implications on L*. 3202-3214
Volume 177, Number 16, August 2007
- Hung T. Nguyen, Vladik Kreinovich, Sompong Dhompongsa:

Mathematical foundations for intelligent technologies. 3215-3217 - Irina Perfilieva

, Vilém Novák:
System of fuzzy relation equations as a continuous model of IF-THEN rules. 3218-3227 - Vladik Kreinovich, Hung T. Nguyen, Berlin Wu:

On-line algorithms for computing mean and variance of interval data, and their use in intelligent systems. 3228-3238 - Ding Feng, Hung T. Nguyen:

Choquet weak convergence of capacity functionals of random sets. 3239-3250 - Shoumei Li, Li Guan:

Fuzzy set-valued Gaussian processes and Brownian motions. 3251-3259 - Baokun Li, Tonghui Wang:

Computational aspects of the coarsening at random model and the Shapley value. 3260-3270
- Tarapada Bag

, Syamal Kumar Samanta:
Some fixed point theorems in fuzzy normed linear spaces. 3271-3289 - Salih Aytar, Serpil Pehlivan

:
Statistical cluster and extreme limit points of sequences of fuzzy numbers. 3290-3296 - A. Nihal Tuncer, F. Berna Benli:

lambda-Statistical limit points of the sequences of fuzzy numbers. 3297-3304 - Mahmood Bakhshi

, Rajab Ali Borzooei:
Lattice structure on fuzzy congruence relations of a hypergroupoid. 3305-3313 - Sang-Eon Han:

Digital fundamental group and Euler characteristic of a connected sum of digital closed surfaces. 3314-3326 - John D. Angelopoulos, C. Dessauvage, Helen-Catherine Leligou

, Konstantinos Kanonakis, Chris Matrakidis, Erwin Six:
Dynamic address resolution for enhanced configurability in packet-based TDMA GPONs. 3327-3340 - DaeEun Kim, Jaehong Park:

Application of adaptive control to the fluctuation of engine speed at idle. 3341-3355 - Ying-Ming Wang, Ying Luo, Zhongsheng Hua

:
Aggregating preference rankings using OWA operator weights. 3356-3363 - Ihsan Yüksel

, Metin Dagdeviren
:
Using the analytic network process (ANP) in a SWOT analysis - A case study for a textile firm. 3364-3382 - Che-Wei Chang, Cheng-Ru Wu

, Chin-Tsai Lin
, Hung-Lung Lin
:
Evaluating digital video recorder systems using analytic hierarchy and analytic network processes. 3383-3396 - Mahmoud A. Abo-Sinna, Ibrahim A. Baky

:
Interactive balance space approach for solving multi-level multi-objective programming problems. 3397-3410
Volume 177, Number 17, September 2007
- Michael D. Morse, Jignesh M. Patel, William I. Grosky:

Efficient continuous skyline computation. 3411-3437 - Peyman Kouchakpour, Anthony Zaknich, Thomas Bräunl

:
Population variation in genetic programming. 3438-3452 - Anthony J. T. Lee, Chun-Sheng Wang:

An efficient algorithm for mining frequent inter-transaction patterns. 3453-3476 - Unil Yun:

Efficient mining of weighted interesting patterns with a strong weight and/or support affinity. 3477-3499 - Degang Chen, Changzhong Wang, Qinghua Hu:

A new approach to attribute reduction of consistent and inconsistent covering decision systems with covering rough sets. 3500-3518 - Jun-Ki Min, Myung-Jae Park, Chin-Wan Chung:

XTREAM: An efficient multi-query evaluation on streaming XML data. 3519-3538 - Gen Ming Guo:

A computer-aided bibliometric system to generate core article ranked lists in interdisciplinary subjects. 3539-3556 - Yiqiu Han, Wai Lam, Charles X. Ling:

Customized classification learning based on query projections. 3557-3573 - Donghua Yang, Jianzhong Li:

Distributed multi-join query processing in data grids. 3574-3591 - Shahar Cohen, Lior Rokach, Oded Maimon:

Decision-tree instance-space decomposition with grouped gain-ratio. 3592-3612 - Baoliu Ye, Minyi Guo, Daoxu Chen, Sanglu Lu:

A degree-constrained QoS-aware routing algorithm for application layer multicast. 3613-3626 - Marina T. Mizukoshi

, Laécio Carvalho de Barros, Yurilev Chalco-Cano
, Heriberto Román-Flores, Rodney Carlos Bassanezi:
Fuzzy differential equations and the extension principle. 3627-3635
- Gholam R. Amin:

Note on "A preemptive goal programming method for aggregating OWA operator weights in group decision making". 3636-3638
Volume 177, Number 18, September 2007
- Julian R. Ullmann:

Partition search for non-binary constraint satisfaction. 3639-3678 - Yen-Ting Chen, Ping-Yu Hsu

:
A grain preservation translation algorithm: From ER diagram to multidimensional model. 3679-3695 - Hyo-Jung Oh, Sung-Hyon Myaeng, Myung-Gil Jang:

Semantic passage segmentation based on sentence topics for question answering. 3696-3717 - Xiaojun Wan:

A novel document similarity measure based on earth mover's distance. 3718-3730 - Sang-Eon Han:

The k-fundamental group of a closed k-surface. 3731-3748 - Feng Lin, Hao Ying, Rodger D. MacArthur, Jonathan A. Cohn, Daniel C. Barth-Jones, Lawrence R. Crane:

Decision making in fuzzy discrete event systems. 3749-3763 - Xuesong Wang

, Yuhu Cheng, Jian-Qiang Yi:
A fuzzy Actor-Critic reinforcement learning network. 3764-3781 - Pawan Lingras, Cory J. Butz:

Rough set based 1-v-1 and 1-v-r approaches to support vector machine multi-classification. 3782-3798 - Taeshik Shon, Jongsub Moon:

A hybrid machine learning approach to network anomaly detection. 3799-3821 - Anna Kolesárová, Gaspar Mayor, Radko Mesiar:

Weighted ordinal means. 3822-3830 - Dug Hun Hong, Changha Hwang, Kyung Tae Kim:

T-sum of sigmoid-shaped fuzzy intervals. 3831-3839 - Xiao-Ping Yang:

Minimization of axiom sets on fuzzy approximation operators. 3840-3854 - Garyfalos Papaschinopoulos, Gesthimani Stefanidou, Pavlos S. Efraimidis:

Existence, uniqueness and asymptotic behavior of the solutions of a fuzzy differential equation with piecewise constant argument. 3855-3870 - Seyed Mahmoud Taheri, R. Azizi:

On information energy of the image fuzzy sets. 3871-3881 - Ning Wang, Wen-Xiu Zhang, Changlin Mei

:
Fuzzy nonparametric regression based on local linear smoothing technique. 3882-3900 - Yan-Jun Liu

, Wei Wang:
Adaptive fuzzy control for a class of uncertain nonaffine nonlinear systems. 3901-3917 - Dong Hwa Kim, Ajith Abraham, Jae Hoon Cho:

A hybrid genetic algorithm and bacterial foraging approach for global optimization. 3918-3937
Volume 177, Number 19, October 2007
- Ramon Lawrence, Ralph P. Russo, Nariankadu D. Shyamalkumar:

The effect of reading policy on early join result production. 3939-3956 - Qing Guo, Hui Zhang, Costas S. Iliopoulos:

Computing the lambda-covers of a string. 3957-3967 - Jianqin Zhang, Jianhua Gong, Hui Lin, Gang Wang, JianLing Huang, Jun Zhu, Bingli Xu, Jack Teng:

Design and development of Distributed Virtual Geographic Environment system based on web services. 3968-3980 - Baocang Wang, Qianhong Wu, Yupu Hu:

A knapsack-based probabilistic encryption scheme. 3981-3994 - Jin Wook Byun, Dong Hoon Lee, Jong In Lim:

EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. 3995-4013 - Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:

Delegation with supervision. 4014-4030 - Iuon-Chang Lin, Chin-Chen Chang:

Security enhancement for digital signature schemes with fault tolerance in RSA. 4031-4039 - Tieyun Qian

, Hui Xiong, Yuanzhen Wang, Enhong Chen:
On the strength of hyperclique patterns for text categorization. 4040-4058 - Chang-Kuo Chen, Yung-Ching Hung, Teh-Lu Liao

, Jun-Juh Yan
:
Design of robust active queue management controllers for a class of TCP communication networks. 4059-4071 - Lien Fu Lai:

A knowledge engineering approach to knowledge management. 4072-4094 - Yuan Zhou, Binxing Fang, Zhenfu Cao

, Xiao-chun Yun, Xiaoming Cheng:
How to construct secure proxy cryptosystem. 4095-4108 - Suh-Wen Chiou

:
Comparative tests of solution methods for signal-controlled road networks. 4109-4121 - Juan C. Valle-Lisboa

, Eduardo Mizraji:
The uncovering of hidden structures by Latent Semantic Analysis. 4122-4147 - Kamer Kaya, Ali Aydin Selçuk

:
Threshold cryptography based on Asmuth-Bloom secret sharing. 4148-4160 - Asok K. Nanda, Sudhansu S. Maiti

:
Rényi information measure for a used item. 4161-4175 - Ben-Lian Xu, Zheng-Yi Wu:

A study on two measurements-to-tracks data assignment algorithms. 4176-4187 - Dyi-Rong Duh, Yi-Ching Chen, Ruei-Yu Wu:

Proof that pyramid networks are 1-Hamiltonian-connected with high probability. 4188-4199 - Ruei-Yu Wu, Gen-Huey Chen, Yu-Liang Kuo, Gerard J. Chang

:
Node-disjoint paths in hierarchical hypercube networks. 4200-4207 - Bih-Sheue Shieh:

Solutions of fuzzy relation equations based on continuous t-norms. 4208-4215 - Yan-Kuen Wu:

Optimization of fuzzy relational equations with max-av composition. 4216-4229 - Daowu Pei:

On definable concepts of rough set models. 4230-4239
Volume 177, Number 20, October 2007
- Rafik A. Aliev, Bijan Fazlollahi, Babek G. Guirimov

, Rashad R. Aliev:
Fuzzy-genetic approach to aggregate production-distribution planning in supply chain management. 4241-4255 - Juan J. Nieto

, Rosana Rodríguez-López
:
Euler polygonal method for metric dynamical systems. 4256-4270 - Mehdi Ghatee

, S. Mehdi Hashemi:
Ranking function-based solutions of fully fuzzified minimal cost flow problem. 4271-4294 - K. G. Srinivasa

, K. R. Venugopal, Lalit M. Patnaik:
A self-adaptive migration model genetic algorithm for data mining applications. 4295-4313 - Chen-Sheng Ting:

An observer-based approach to controlling time-delay chaotic systems via Takagi-Sugeno fuzzy model. 4314-4328 - Weiyin Fei:

Existence and uniqueness of solution for fuzzy random differential equations with non-Lipschitz coefficients. 4329-4337 - Yanqing Ji, R. Michael Massanari, Joel Ager, John Yen, Richard E. Miller, Hao Ying:

A fuzzy logic-based computational recognition-primed decision model. 4338-4353 - Temel Öncan:

Design of capacitated minimum spanning tree with uncertain cost and demand parameters. 4354-4367 - Frederico G. Guimarães

, Reinaldo M. Palhares
, Felipe Campelo
, Hajime Igarashi
:
Design of mixed H2/Hinfinity control systems using algorithms inspired by the immune system. 4368-4386 - Xiaojun Ban, Xiao Zhi Gao, Xianlin Huang, Athanasios V. Vasilakos

:
Stability analysis of the simplest Takagi-Sugeno fuzzy control system using circle criterion. 4387-4409 - Radu-Emil Precup

, Stefan Preitl:
PI-Fuzzy controllers for integral plants to ensure robust stability. 4410-4429 - Slavka Bodjanova:

Granulation of a fuzzy set: Nonspecificity. 4430-4444 - Mingzhen Wei, Baojun Bai, Andrew H. Sung, Qingzhong Liu

, Jiachun Wang, Martha E. Cather:
Predicting injection profiles using ANFIS. 4445-4461 - Osvaldo Ronald Saavedra

, H. H. D. Mangueira, Yurilev Chalco-Cano
, Heriberto Román-Flores:
Solution of non-linear fuzzy systems by decomposition of incremental fuzzy numbers. 4462-4473 - Chung-Chian Hsu, Chin-Long Chen, Yu-Wei Su:

Hierarchical clustering of mixed data based on distance hierarchy. 4474-4492 - Xizhao Wang, Eric C. C. Tsang, Suyun Zhao, Degang Chen, Daniel S. Yeung:

Learning fuzzy rules from fuzzy samples based on rough set technique. 4493-4514 - Eva Chung-chiung Yen:

Warning signals for potential accounting frauds in blue chip companies - An application of adaptive resonance theory. 4515-4525 - E. Y. K. Ng, U. Rajendra Acharya

, Louis G. Keith, Susan Lockwood:
Detection and differentiation of breast cancer using neural classifiers with first warning thermal sensors. 4526-4538
Volume 177, Number 21, November 2007
- John T. Rickard, Janet Aisbett, Greg Gibbon:

Reformulation of the theory of conceptual spaces. 4539-4565 - Bas van Gils, Erik Proper, Patrick van Bommel, Theo P. van der Weide:

On the quality of resources on the Web: An information retrieval perspective. 4566-4597 - Rafik Bouaziz

, Salem Chakhar
, Vincent Mousseau
, Sudha Ram, Abdelkader Telmoudi:
Database design and querying within the fuzzy semantic model. 4598-4620 - Jun Zhu, Jianhua Gong, Weiguo Liu, Tao Song, Jianqin Zhang:

A collaborative virtual geographic environment based on P2P and Grid technologies. 4621-4633 - Eiji Uchino, Kazuaki Yano, Tadahiro Azetsu:

A self-organizing map with twin units capable of describing a nonlinear input-output relation applied to speech code vector mapping. 4634-4644 - Pavel Sevastianov:

Numerical methods for interval and fuzzy number comparison based on the probabilistic approach and Dempster-Shafer theory. 4645-4661 - Young Bae Jun, Mehmet Ali Öztürk

, Chul Hwan Park
:
Intuitionistic nil radicals of intuitionistic fuzzy ideals and Euclidean intuitionistic fuzzy ideals in rings. 4662-4677 - Le Liu, Yuanguo Zhu:

Rough variables with values in measurable spaces. 4678-4685 - Yasuo Narukawa

, Vicenç Torra
:
Fuzzy measures and integrals in evaluation of strategies. 4686-4695 - Yung-fu Chen, Yung-Kuan Chan

, Ching-Chun Huang, Meng-Hsiun Tsai, Yen-Ping Chu:
A multiple-level visual secret-sharing scheme without image size expansion. 4696-4710 - Fei Li, Yunqiang Yin, Lingxia Lu:

(delta, T)-fuzzy rough approximation operators and the TL-fuzzy rough ideals on a ring. 4711-4726 - Daisuke Yamaguchi, GuoDong Li, Masatake Nagai:

A grey-based rough approximation model for interval data processing. 4727-4744 - Bonifacio Llamazares

:
Choosing OWA operator weights in the field of Social Choice. 4745-4756 - Qing-quan Xiong, Xue-ping Wang

:
Solution sets of inf-alphaF fuzzy relational equations on complete Brouwerian lattices. 4757-4767 - Liming Hu, Heng-Da Cheng, Ming Zhang:

A high performance edge detector based on fuzzy inference rules. 4768-4784 - Kok-Wah Lee, Hong Tat Ewe

:
Performance study of Byzantine Agreement Protocol with artificial neural network. 4785-4798 - Giselle Cardoso, Fernando A. C. Gomide

:
Newspaper demand prediction and replacement model based on fuzzy clustering and rules. 4799-4809 - Kamal El-Saady

:
Lattice-valued fuzzy frames. 4810-4819 - Zhixiong Chen, Xiaoni Du, Guozhen Xiao:

Sequences related to Legendre/Jacobi sequences. 4820-4831
- Hesham A. Hefny

:
Comments on "Distinguishability quantification of fuzzy sets". 4832-4839
Volume 177, Number 22, November 2007
- Sang-Wook Kim, Byeong-Soo Jeong:

Performance bottleneck of subsequence matching in time-series databases: Observation, solution, and performance evaluation. 4841-4858 - Sanghyun Park, Jung-Im Won

, Jeehee Yoon, Sang-Wook Kim:
A multi-dimensional indexing approach for timestamped event sequence matching. 4859-4876 - Eddie Cheng

, László Lipták:
Linearly many faults in Cayley graphs generated by transposition trees. 4877-4882 - Wen-Xiu Zhang, Jianmin Ma, Shi-Qing Fan:

Variable threshold concept lattices. 4883-4892 - Tuomo Korenius, Jorma Laurikkala, Martti Juhola:

On principal component analysis, cosine and Euclidean measures in information retrieval. 4893-4905 - Chris Cornelis

, Jie Lu
, Xuetao Guo, Guanquang Zhang:
One-and-only item recommendation with fuzzy logic techniques. 4906-4921 - Yan Yang, Xue-ping Wang

:
The general alpha-decomposition problem of fuzzy relations. 4922-4933 - Chuan-Kai Lin:

Robust adaptive critic control of nonlinear systems using fuzzy basis function networks: An LMI approach. 4934-4946 - Khaled A. Hashem, Ahmed E. Radwan:

Constructions in the category of fuzzy T-proximity spaces. 4947-4958 - Yan Zhao, Yiyu Yao

, Feng Luo:
Data analysis based on discernibility and indiscernibility. 4959-4976 - Young Bae Jun:

Quotient structures of intuitionistic fuzzy finite state machines. 4977-4986 - Yong Lin Liu, Yang Xu, Jie Meng:

BCI-implicative ideals of BCI-algebras. 4987-4996 - William Zhu:

Generalized rough sets based on relations. 4997-5011 - Feng Feng

, Young Bae Jun, Xianzhong Zhao:
On *-lambda-semirings. 5012-5023 - M. M. Mayoral, Julio A. Pardo:

Simulation study of the tests of uniform association based on the power-divergence. 5024-5032 - Praveen Kumar Tripathi, Sanghamitra Bandyopadhyay, Sankar K. Pal:

Multi-Objective Particle Swarm Optimization with time variant inertia and acceleration coefficients. 5033-5049 - Guolong Chen, Shuili Chen, Wenzhong Guo, Huowang Chen:

The multi-criteria minimum spanning tree problem based genetic algorithm. 5050-5063 - Xiutang Geng, Jin Xu, Jianhua Xiao, Linqiang Pan

:
A simple simulated annealing algorithm for the maximum clique problem. 5064-5071 - Reza Tavakkoli-Moghaddam

, Alireza Rahimi-Vahed, Ali Hossein Mirzaei:
A hybrid multi-objective immune algorithm for a flow shop scheduling problem with bi-objectives: Weighted mean completion time and weighted mean tardiness. 5072-5090 - Jessica Andrea Carballido

, Ignacio Ponzoni
, Nélida Beatriz Brignole:
CGD-GA: A graph-based genetic algorithm for sensor network design. 5091-5102 - Jianhua Jin, Yongming Li

, Chunquan Li:
Robustness of fuzzy reasoning via logically equivalence measure. 5103-5117 - Baoyong Zhang, Shaosheng Zhou, Tao Li

:
A new approach to robust and non-fragile Hinfinity control for uncertain fuzzy systems. 5118-5133 - Wei Cheng, Zhiwen Mo, Jue Wang:

Notes on "the lower and upper approximations in a fuzzy group" and "rough ideals in semigroups". 5134-5140
Volume 177, Number 23, December 2007
- Paul P. Wang:

Guest Editorial. 5141-5142 - Ibrahim Özkan

, I. Burhan Türksen:
Upper and lower values for the level of fuzziness in FCM. 5143-5152 - Kemal Kilic, Özge Uncu, I. Burhan Türksen:

Comparison of different strategies of utilizing fuzzy clustering in structure identification. 5153-5162 - Asli Celikyilmaz

, I. Burhan Türksen:
Fuzzy functions with support vector machines. 5163-5177 - Weiyin Fei:

Optimal consumption and portfolio choice with ambiguity and anticipation. 5178-5190 - Feyzan Arikan, Zülal Güngör:

A two-phase approach for multi-objective programming problems with fuzzy coefficients. 5191-5202 - Mirza Mohd. Sufyan Beg, Nesar Ahmad

:
Web search enhancement by mining user actions. 5203-5218 - Rifat Gürcan Özdemir

, Günes Gençyilmaz, Tülin Aktin:
The modified fuzzy art and a two-stage clustering approach to cell design. 5219-5236 - Yildiray Turhan, Sezai Tokat

, Recep Eren:
Statistical and computational intelligence tools for the analyses of warp tension in different back-rest oscillations. 5237-5252 - Adem Göleç, Harun Taskin:

Novel methodologies and a comparative study for manufacturing systems performance evaluations. 5253-5274 - Challa S. Sastry, Sanjay Rawat

, Arun K. Pujari, Ved Prakash Gulati:
Network traffic analysis using singular value decomposition and multiscale transforms. 5275-5291
- Christos Riziotis, Athanasios V. Vasilakos

:
Computational intelligence in photonics technology and optical networks: A survey and future perspectives. 5292-5315 - Jia-Hwa Wu, Chih-Ping Chu:

An exact data dependence testing method for quadratic expressions. 5316-5328 - G. Peter Zhang:

A neural network ensemble method with jittered training data for time series forecasting. 5329-5346 - Rafael Álvarez

, José-Vicente Noguera, Leandro Tortosa
, Antonio Zamora
:
A mesh optimization algorithm based on neural networks. 5347-5364 - Jianmin Ma, Wen-Xiu Zhang, Yee Leung, Xiaoxue Song:

Granular computing and dual Galois connection. 5365-5377 - Dongrui Wu

, Jerry M. Mendel:
Uncertainty measures for interval type-2 fuzzy sets. 5378-5393 - Yurilev Chalco-Cano

, Heriberto Román-Flores, Marko Antonio Rojas-Medar
, Osvaldo Ronald Saavedra
, María-Dolores Jiménez-Gamero
:
The extension principle and a decomposition of fuzzy sets. 5394-5403 - Xiaoxia Huang:

A new perspective for optimal portfolio selection with random fuzzy returns. 5404-5414 - Yang-Sae Moon, Jinho Kim:

Efficient moving average transform-based subsequence matching algorithms in time-series databases. 5415-5431 - Zuhua Shao:

A provably secure short signature scheme based on discrete logarithms. 5432-5440 - Junghyun Nam, Juryon Paik

, Ung-Mo Kim, Dongho Won:
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks. 5441-5467 - Divyesh Shah, Sheng Zhong:

Two methods for privacy preserving data mining with malicious participants. 5468-5483 - San-Yih Hwang, Haojun Wang, Jian Tang, Jaideep Srivastava

:
A probabilistic approach to modeling and estimating the QoS of web-services-based workflows. 5484-5503
Volume 177, Number 24, December 2007
- Hye-Kyeong Ko, Min-Jeong Kim, SangKeun Lee:

On the efficiency of secure XML broadcasting. 5505-5521 - Nen-Chung Wang

, Yung-Fa Huang
, Jhu-Chan Chen:
A stable weight-based on-demand routing protocol for mobile ad hoc networks. 5522-5537 - Yungho Leu, Jen-Jou Hung:

An energy efficient re-access scheme for data caching in data broadcast of a mobile computing environment. 5538-5557 - I-Shyan Hwang, San-Nan Lee, Chih-Chien Chen:

A novel ring-tree-based routing and wavelength assignment algorithm for multicasting in DWDM optical mesh networks. 5558-5572 - Yuan-Hsiang Teng, Jimmy J. M. Tan, Lih-Hsing Hsu:

The globally Bi-3*-connected property of the honeycomb rectangular torus. 5573-5589 - Chang-Hsiung Tsai, Yung-Chun Lai:

Conditional edge-fault-tolerant edge-bipancyclicity of hypercubes. 5590-5597 - Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen:

Packet construction for secure conference call request in ad hoc network systems. 5598-5610 - Jywe-Fei Fang, Yuh-Rau Wang, Hui-Ling Huang:

The m-pancycle-connectivity of a WK-Recursive network. 5611-5619 - Yu Long, Kefei Chen:

Certificateless threshold cryptosystem secure against chosen-ciphertext attack. 5620-5637 - Zecheng Wang, Haifeng Qian, Zhibin Li:

Hybrid proxy multisignature: A new type multi-party signature. 5638-5650 - Jui-Ting Chung, Chuan-Ming Li, Tzonelih Hwang:

All-in-one group-oriented cryptosystem based on bilinear pairing. 5651-5663 - Hao-Shun Hung, Jung-Sheng Fu, Gen-Huey Chen:

Fault-free Hamiltonian cycles in crossed cubes with conditional link faults. 5664-5674 - Pawel Terlecki, Krzysztof Walczak:

Jumping emerging patterns with negation in transaction databases - Classification and discovery. 5675-5690 - Seung-Hwan Lim, Heejin Park, Sang-Wook Kim:

Using multiple indexes for efficient subsequence matching in time-series databases. 5691-5706 - Ambedkar Dukkipati, Shalabh Bhatnagar

, M. Narasimha Murty:
Gelfand-Yaglom-Perez theorem for generalized relative entropy functionals. 5707-5714 - Fabrizio Durante

, José Juan Quesada-Molina, Manuel Úbeda-Flores
:
On a family of multivariate copulas for aggregation processes. 5715-5724 - Lianzhen Liu, Kaitai Li:

Boolean filters and positive implicative filters of residuated lattices. 5725-5738 - Kalipada Maity

, Manoranjan Maiti:
Necessity constraint in two plant optimal production problem with imprecise parameters. 5739-5753 - Suh-Wen Chiou

:
A non-smooth optimization model for a two-tiered supply chain network. 5754-5762 - Chen Peng, Yu-Chu Tian

:
Networked Hinfinity control of linear systems with state quantization. 5763-5774 - Thanasis G. Barbounis, John B. Theocharis:

Locally recurrent neural networks for wind speed prediction using spatial correlation. 5775-5797
- Yunqiang Yin, Hongxing Li:

Note on "Generalized fuzzy interior ideals in semigroups". 5798-5800

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














