


default search action
Information Sciences, Volume 188
Volume 188, April 2012
- Ludovic Liétard:

A functional interpretation of linguistic summaries of data. 1-16 - Giovanni Iacca

, Ferrante Neri
, Ernesto Mininno, Yew-Soon Ong
, Meng-Hiot Lim:
Ockham's Razor in memetic computing: Three stage optimal memetic exploration. 17-43 - Kemal Bicakci

, Ibrahim Ethem Bagci
, Bülent Tavli
:
Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures. 44-63 - HaRim Jung, Yon Dohn Chung, Ling Liu:

Processing generalized k-nearest neighbor queries on a wireless broadcast stream. 64-79 - Wei-Po Lee, Yu-Ting Hsiao:

Inferring gene regulatory networks using a hybrid GA-PSO approach with numerical constraints and network decomposition. 80-99 - Ngoc Hoang Luong

, Hai Thanh Thi Nguyen, Chang Wook Ahn
:
Entropy-based efficiency enhancement techniques for evolutionary algorithms. 100-120 - Francesco Buccafurri

, Filippo Furfaro
, Domenico Saccà
:
A probabilistic framework for estimating the accuracy of aggregate range queries evaluated over histograms. 121-150 - Hyeonseung Im

, Sungwoo Park:
Group skyline computation. 151-169 - Ren-Der Lin, Chao-Tsun Chang:

A compact covering method to exploit embedding capacity for matrix encoding. 170-181 - Elmano Ramalho Cavalcanti, Marco Aurélio Spohn

:
On improving temporal and spatial mobility metrics for wireless ad hoc networks. 182-197 - Fethi Ferjani, Samir Elloumi, Ali Jaoua

, Sadok Ben Yahia
, Sahar Ahmad Ismail, Sheikha Ravan:
Formal context coverage based on isolated labels: An efficient solution for text feature extraction. 198-214 - Zhimiao Tao, Jiuping Xu:

A class of rough multiple objective programming and its application to solid transportation problem. 215-235 - Rui Zhang, Cheng Wu:

Bottleneck machine identification method based on constraint transformation for job shop scheduling with genetic algorithm. 236-252 - Chieh-Feng Chiang, Guo-Huang Hsu, Lun-Min Shih, Jimmy J. M. Tan:

Diagnosability of star graphs with missing edges. 253-259 - Dongye Wang, Mei Lu:

Edge fault tolerance of super edge connectivity for three families of interconnection networks. 260-268 - Xiao Liu

, Amol Ghorpade, Y. L. Tu, Wen-Jun Zhang
:
A novel approach to probability distribution aggregation. 269-275 - Zengtai Gong, Liangliang Wang:

The Henstock-Stieltjes integral for fuzzy-number-valued functions. 276-297 - K. P. Girish, Sunil Jacob John

:
Multiset topologies induced by multiset relations. 298-313 - Jinquan Li, Guannan Deng, Hongxing Li, Wenyi Zeng:

The relationship between similarity measure and entropy of intuitionistic fuzzy sets. 314-321 - Seung-Hyun Seo

, Kyu Young Choi
, Jung Yeon Hwang, Seungjoo Kim
:
Efficient certificateless proxy signature scheme with provable security. 322-337 - Qingkuan Dong, Xiaoping Li, Yanming Liu:

Two extensions of the ring signature scheme of Rivest-Shamir-Taumann. 338-345 - Der-Chyuan Lou

, Chen-Hao Hu:
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. 346-358

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














