default search action
Information Sciences, Volume 179
Volume 179, Numbers 1-2, January 2009
- Cristina Alcalde, Ana Burusco, Ramón Fuentes-González, Itziar Zubia:
Treatment of L-Fuzzy contexts with absent values. 1-15 - Francesca Carmagnola, Federica Cena:
User identification for cross-system personalisation. 16-32 - David A. Pelta, Ronald R. Yager:
On the conflict between inducing confusion and attaining payoff in adversarial decision making. 33-40 - Tsuen-Ho Hsu, Tsung-Nan Tsai, Pei-Ling Chiang:
Selection of the optimum promotion mix by integrating a fuzzy linguistic decision model with genetic algorithms. 41-52 - Fatma Tiryaki, Beyza Ahlatçioglu:
Fuzzy portfolio selection using fuzzy analytic hierarchy process. 53-69 - Yijun Bei, Gang Chen, Lidan Shou, Xiaoyan Li, Jinxiang Dong:
Bottom-up discovery of frequent rooted unordered subtrees. 70-88 - Hui Li, Jie Sun:
Gaussian case-based reasoning for business failure prediction with empirical data in China. 89-108 - Suh-Wen Chiou:
Optimization of limited network capacity with toll settings. 109-119 - Vladan Batanovic, Dobrila Petrovic, Radivoj Petrovic:
Fuzzy logic based algorithms for maximum covering location problems. 120-129 - Jordi Recasens:
Maximal fuzzy maps. 130-139 - Ching-Chiuan Lin, Shih-Chieh Chen, Nien-Lin Hsueh:
Adaptive embedding techniques for VQ-compressed images. 140-149 - Vahid Amirzadeh, Mashaallah Mashinchi, Abbas Parchami:
Construction of p. 150-160 - Jiqiang Lv, Kui Ren, Xiaofeng Chen, Kwangjo Kim:
The ring authenticated encryption scheme - How to provide a clue wisely. 161-168 - Ying Xiong, Jie Zhu, Hao Huang, Haihua Xu:
Minimum tag error for discriminative training of conditional random fields. 169-179 - Chih-Yang Chen, Tzuu-Hseng S. Li, Ying-Chieh Yeh:
EP-based kinematic control and adaptive fuzzy sliding-mode dynamic control for wheeled mobile robots. 180-195
Volume 179, Number 3, January 2009
- Dominik Slezak:
Degrees of conditional (in)dependence: A framework for approximate Bayesian networks and examples related to the rough set-based feature selection. 197-209 - William Zhu:
Relationship between generalized rough sets based on binary relation and covering. 210-225 - Guojun Wang, Hongjun Zhou:
Quantitative logic. 226-247 - Faria Nassiri Mofakham, Mohammad Ali Nematbakhsh, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee:
Electronic promotion to new customers using mk. 248-266 - Guanghong Sun, Chuankun Wu:
The lower bounds on the second order nonlinearity of three classes of Boolean functions with high nonlinearity. 267-278 - Alessandro De Gregorio, Stefano Maria Iacus:
On Rényi information for ergodic diffusion processes. 279-291 - Feng Cao, Zhenfu Cao:
A secure identity-based proxy multi-signature scheme. 292-302 - Kyung-Ah Shim:
Breaking the short certificateless signature scheme. 303-306 - Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang:
An improved identity-based key agreement protocol and its security proof. 307-318 - Steve Pederson, M. Sambandham:
Numerical solution of hybrid fuzzy differential equation IVPs by a characterization theorem. 319-328 - Ying-Ming Wang, Kwai-Sang Chin, Ying Luo:
Aggregation of direct and indirect judgments in pairwise comparison matrices with a re-examination of the criticisms by Bana e Costa and Vansnick. 329-337 - Haci Aktas, Naim Çagman:
Erratum to "Soft sets and soft groups" [Information Sciences 177 (2007) 2726-2735]. 338
Volume 179, Number 4, February 2009
- Jesualdo Tomás Fernández-Breis, Dagoberto Castellanos Nieves, Rafael Valencia-García:
Measuring individual learning performance in group work from a knowledge integration perspective. 339-354 - Tsung-Han Chang, Tien-Chin Wang:
Using the fuzzy multi-criteria decision making approach for measuring the possibility of successful knowledge management. 355-370 - Gang Kou, Yi Peng, Zhengxin Chen, Yong Shi:
Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection. 371-381 - Dilek Yaman, Seçkin Polat:
A fuzzy cognitive map approach for effect-based operations: An illustrative case. 382-403 - Hai-Liang Wang, Jian-Wei Wang, Jun-Ming Xu:
Edge-fault-tolerant bipanconnectivity of hypercubes. 404-409 - Chia-Long Wu:
An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation. 410-421 - Chien-Lung Hsu, Yu-Hao Chuang:
A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks. 422-429 - Tong-Seng Quah:
Estimating software readiness using predictive models. 430-445 - Badr Mansouri, Noureddine Manamanni, Kevin Guelton, Alexandre Kruszewski, Thierry-Marie Guerra:
Output feedback LMI tracking control conditions with H. 446-457 - Jiye Liang, Junhong Wang, Yuhua Qian:
A new measure of uncertainty based on knowledge granulation for rough sets. 458-470 - Hua-Peng Zhang, Yao Ouyang, Zhudeng Wang:
Note on "Generalized rough sets based on reflexive and transitive relations". 471-473
Volume 179, Number 5, February 2009
- Radko Mesiar, Olga Nánásiová, Zdenka Riecanová, Jan Paseka:
Special issue - Quantum structures: Theory and applications. 475-477 - Olga Choustova:
Quantum probability and financial market. 478-484 - Gejza Dohnal:
Markov property in quantum logic: A reflection. 485-491 - Andrei Yu. Khrennikov:
Nonlocality as well as rejection of realism are only sufficient (but non-necessary!) conditions for violation of Bell's inequality. 492-504 - Zhihao Ma:
Note on ideals of effect algebras. 505-507 - Olga Nánásiová, Sylvia Pulmannová:
S-map and tracial states. 515-520 - Jan Paseka, Zdenka Riecanová:
Isomorphism theorems on generalized effect algebras based on atoms. 521-528 - Zdenka Riecanová:
Pseudocomplemented lattice effect algebras and existence of states. 529-534 - Karl Svozil:
Quantum scholasticism: On quantum contexts, counterfactuals, and the absurdities of quantum omniscience. 535-541 - David West, Scott Dellana:
Diversity of ability and cognitive style for group decision processes. 542-558 - Syed Khairuzzaman Tanbeer, Chowdhury Farhan Ahmed, Byeong-Soo Jeong, Young-Koo Lee:
Efficient single-pass frequent pattern mining using a prefix-tree. 559-583 - Lucas Antiqueira, Osvaldo N. Oliveira Jr., Luciano da Fontoura Costa, Maria das Graças Volpe Nunes:
A complex network approach to text summarization. 584-599 - Yuncheng Jiang, Ju Wang, Suqin Tang, Bao Xiao:
Reasoning with rough description logics: An approximate concepts approach. 600-612 - Ying Zhai, Zhong Yi, Peimin Deng:
On behavior of two-dimensional cellular automata with an exceptional rule. 613-622 - Bin Xu, Weiguo Fang, Ruifeng Shi, Jing Yu, Lu Liu:
Three-objective fuzzy chance-constrained programming model for multiproject and multi-item investment combination. 623-641 - Gil González-Rodríguez, Ana Colubi, Wolfgang Trutschnig:
Simulation of fuzzy random variables. 642-653 - Bijan Davvaz, Piergiulio Corsini, Violeta Leoreanu Fotea:
Atanassov's intuitionistic (S,T)-fuzzy n-ary sub-hypergroups and their properties. 654-666 - Tz-Liang Kueng, Tyne Liang, Lih-Hsing Hsu, Jimmy J. M. Tan:
Long paths in hypercubes with conditional node-faults. 667-681 - Pinhui Ke, Liuling Huang, Shengyuan Zhang:
Improved lower bound on the number of balanced symmetric functions over GF. 682-687 - Efendi N. Nasibov, A. Övgü Kinay:
An iterative approach for estimation of student performances based on linguistic evaluations. 688-698
Volume 179, Number 6, March 2009
- Cory J. Butz, Shan Hua, Junying Chen, Hong Yao:
A simple graphical approach for understanding probabilistic inference in Bayesian networks. 699-716 - Bart Van Gasse, Chris Cornelis, Glad Deschrijver, Etienne E. Kerre:
The pseudo-linear semantics of interval-valued fuzzy logics. 717-728 - José M. Merigó, Anna Maria Gil Lafuente:
The induced generalized OWA operator. 729-741 - Janusz T. Starczewski:
Extended triangular norms. 742-757 - K. P. Girish, Sunil Jacob John:
Relations and functions in multiset context. 758-768 - Moe Thandar Wynn, H. M. W. Verbeek, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, David Edmond:
Soundness-preserving reduction rules for reset workflow nets. 769-790 - Chun-Hsiang Huang, Ja-Ling Wu:
Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes. 791-808 - Lizhi Peng, Bo Yang, Yuehui Chen, Ajith Abraham:
Data gravitation based classification. 809-819 - Peijun Guo:
Fuzzy data envelopment analysis and its application to location problems. 820-829 - Yu Ma, Xiaodong Gu, Yuanyuan Wang:
Color discrimination enhancement for dichromats using self-organizing color transformation. 830-843 - Jang Hee Lee, Sung Ho Ha:
Recognizing yield patterns through hybrid applications of machine learning techniques. 844-850 - Ping-Ying Tsai, Jung-Sheng Fu, Gen-Huey Chen:
Embedding Hamiltonian cycles in alternating group graphs under conditional fault model. 851-857 - Bin Wang, ZhaoXia Song:
A non-interactive deniable authentication scheme based on designated verifier proofs. 858-865
Volume 179, Number 7, March 2009
- Yiyu Yao, Yan Zhao:
Discernibility matrix simplification for constructing attribute reducts. 867-882 - Lei Zhou, Wei-Zhi Wu, Wen-Xiu Zhang:
On characterization of intuitionistic fuzzy rough sets based on intuitionistic fuzzy implicators. 883-898 - Hongyan Liu, Xiaoyu Wang, Jun He, Jiawei Han, Dong Xin, Zheng Shao:
Top-down mining of frequent closed patterns from very high dimensional data. 899-924 - Pavel V. Sevastjanov, Ludmila Dymova:
A new method for solving interval and fuzzy equations: Linear case. 925-937 - Yung-Yih Lur, Yan-Kuen Wu, Sy-Ming Guu:
Convergence of powers for a fuzzy matrix with convex combination of max-min and max-arithmetic mean operations. 938-944 - Tofigh Allahviranloo, Saeid Abbasbandy, Nazanin Ahmady, E. Ahmady:
Improved predictor-corrector method for solving fuzzy initial value problems. 945-955 - Tofigh Allahviranloo, Narsis Aftab Kiani, N. Motamedi:
Solving fuzzy differential equations by differential transformation method. 956-966 - Yen-Liang Chen, Chia-Chi Wu, Kwei Tang:
Building a cost-constrained decision tree with multiple condition attributes. 967-979 - Ugur Dogrusöz, Erhan Giral, Ahmet Cetintas, Ali Civril, Emek Demir:
A layout algorithm for undirected compound graphs. 980-994 - Yuyue Du, Changjun Jiang, MengChu Zhou, You Fu:
Modeling and monitoring of E-commerce workflows. 995-1006 - Jinhua Zhang, Jian Zhuang, Haifeng Du, Sunan Wang:
Self-organizing genetic algorithm based tuning of PID controllers. 1007-1018 - Tongjiang Yan, Xiaoni Du, Guozhen Xiao, Xiaolong Huang:
Linear complexity of binary Whiteman generalized cyclotomic sequences of order 2k. 1019-1023
Volume 179, Number 8, March 2009
- Ricardo José Gabrielli Barreto Campello, Eduardo R. Hruschka:
On comparing two sequences of numbers and its applications to clustering analysis. 1025-1039 - Cagatay Catal, Banu Diri:
Investigating the effect of dataset size, metrics sets, and feature selection techniques on software fault prediction problem. 1040-1058 - B. Chandra, P. Paul Varghese:
Moving towards efficient decision tree construction. 1059-1069 - Xianbin Cao, Yanwu Xu, D. Chen, Hong Qiao:
Associated evolution of a support vector machine-based classifier for pedestrian detection. 1070-1077 - Peyman Kouchakpour, Anthony Zaknich, Thomas Bräunl:
Dynamic population variation in genetic programming. 1078-1091 - Eddie Cheng, Linda M. Lesniak, Marc J. Lipman, László Lipták:
Conditional matching preclusion sets. 1092-1101 - Ian Reay, Scott Dick, James Miller:
An analysis of privacy signals on the World Wide Web: Past, present and future. 1102-1115 - Hong Zhu, Kevin Lü, Renchao Jin:
A practical mandatory access control model for XML databases. 1116-1133 - Li Li, Xiaodong Liu:
New results on delay-dependent robust stability criteria of uncertain fuzzy systems with state and input delays. 1134-1148 - Leonardo A. Mozelli, Reinaldo M. Palhares, Gustavo S. C. Avellar:
A systematic approach to improve multiple Lyapunov function stability and stabilization conditions for fuzzy systems. 1149-1162 - Marius Tarnauceanu:
Distributivity in lattices of fuzzy subgroups. 1163-1168 - Dongrui Wu, Jerry M. Mendel:
A comparative study of ranking methods, similarity measures and uncertainty measures for interval type-2 fuzzy sets. 1169-1192 - Xinwang Liu:
Parameterized defuzzification with continuous weighted quasi-arithmetic means - An extension. 1193-1206 - Tofigh Allahviranloo, Narsis Aftab Kiani, M. Barkhordari Ahmadi:
Toward the existence and uniqueness of solutions of second-order fuzzy differential equations. 1207-1215
Volume 179, Number 9, April 2009
- Janusz Szczepanski:
On the distribution function of the complexity of finite sequences. 1217-1220 - Koen Maes, Andrea Mesiarová-Zemánková:
Cancellativity properties for t-norms and t-subnorms. 1221-1233 - Hao Cheng, Khanh Vu, Kien A. Hua:
SubSpace Projection: A unified framework for a class of partition-based dimension reduction techniques. 1234-1248 - Xueling Ma, Jianming Zhan:
Generalized fuzzy h-bi-ideals and h-quasi-ideals of hemirings. 1249-1268 - Iuon-Chang Lin, Chin-Chen Chang:
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce. 1269-1277 - Balasubramaniam Jayaram, Radko Mesiar:
I-Fuzzy equivalence relations and I-fuzzy partitions. 1278-1297 - Aydin Ulas, Murat Semerci, Olcay Taner Yildiz, Ethem Alpaydin:
Incremental construction of classifier and discriminant ensembles. 1298-1318 - Shaocheng Tong, Yongming Li, Peng Shi:
Fuzzy adaptive backstepping robust control for SISO nonlinear system with dynamic uncertainties. 1319-1332 - Sheshayya A. Choudum, Indhumathi Raman:
On embedding subclasses of height-balanced trees in hypercubes. 1333-1347 - Cheqing Jin, Bolin Ding, Jeffrey Xu Yu:
Making filters smart in distributed data stream environments. 1348-1361 - Thierry Denoeux:
Extending stochastic ordering to belief functions on the real line. 1362-1376
Volume 179, Number 10, April 2009
- Tadeusz Burczynski:
Information Sciences Special Issue on Artificial Immune Systems. 1377-1378
- Amy L. Bauer, Catherine Beauchemin, Alan S. Perelson:
Agent-based modeling of host-pathogen systems: The successes and challenges. 1379-1389
- Zhou Ji, Dipankar Dasgupta:
V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage. 1390-1406 - Michal Bereta, Tadeusz Burczynski:
Immune K-means and negative selection algorithms for data analysis. 1407-1425 - Pablo Alberto Dalbem de Castro, Fernando J. Von Zuben:
BAIS: A Bayesian Artificial Immune System for the effective handling of building blocks. 1426-1440
- Rodrigo Pasti, Leandro Nunes de Castro:
Bio-inspired and gradient-based algorithms to train MLPs: The influence of diversity. 1441-1453 - Thiago A. S. Masutti, Leandro Nunes de Castro:
A self-organizing neural network using ideas from the immune system to solve the traveling salesman problem. 1454-1468
- Adriel Lau, Petr Musílek:
Immune programming models of Cryptosporidium parvum inactivation by ozone and chlorine dioxide. 1469-1482 - Erkan Ülker, Ahmet Arslan:
Automatic knot adjustment using an artificial immune system for B-spline curve approximation. 1483-1494
- Krzysztof Trojanowski, Slawomir T. Wierzchon:
Immune-based algorithms for dynamic optimization. 1495-1515 - Guan-Chun Luh, Chung-Huei Chueh:
A multi-modal immune algorithm for the job-shop scheduling problem. 1516-1532
- Özer Uygun, Ercan Öztemel, Cemalettin Kubat:
Scenario based distributed manufacturing simulation using HLA technologies. 1533-1541