![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Information Sciences, Volume 188
Volume 188, April 2012
- Ludovic Liétard:
A functional interpretation of linguistic summaries of data. 1-16 - Giovanni Iacca
, Ferrante Neri
, Ernesto Mininno, Yew-Soon Ong
, Meng-Hiot Lim:
Ockham's Razor in memetic computing: Three stage optimal memetic exploration. 17-43 - Kemal Bicakci
, Ibrahim Ethem Bagci
, Bülent Tavli
:
Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures. 44-63 - HaRim Jung, Yon Dohn Chung, Ling Liu:
Processing generalized k-nearest neighbor queries on a wireless broadcast stream. 64-79 - Wei-Po Lee, Yu-Ting Hsiao:
Inferring gene regulatory networks using a hybrid GA-PSO approach with numerical constraints and network decomposition. 80-99 - Ngoc Hoang Luong
, Hai Thanh Thi Nguyen, Chang Wook Ahn
:
Entropy-based efficiency enhancement techniques for evolutionary algorithms. 100-120 - Francesco Buccafurri
, Filippo Furfaro
, Domenico Saccà
:
A probabilistic framework for estimating the accuracy of aggregate range queries evaluated over histograms. 121-150 - Hyeonseung Im
, Sungwoo Park:
Group skyline computation. 151-169 - Ren-Der Lin, Chao-Tsun Chang:
A compact covering method to exploit embedding capacity for matrix encoding. 170-181 - Elmano Ramalho Cavalcanti, Marco Aurélio Spohn
:
On improving temporal and spatial mobility metrics for wireless ad hoc networks. 182-197 - Fethi Ferjani, Samir Elloumi, Ali Jaoua
, Sadok Ben Yahia
, Sahar Ahmad Ismail, Sheikha Ravan:
Formal context coverage based on isolated labels: An efficient solution for text feature extraction. 198-214 - Zhimiao Tao, Jiuping Xu:
A class of rough multiple objective programming and its application to solid transportation problem. 215-235 - Rui Zhang, Cheng Wu:
Bottleneck machine identification method based on constraint transformation for job shop scheduling with genetic algorithm. 236-252 - Chieh-Feng Chiang, Guo-Huang Hsu, Lun-Min Shih, Jimmy J. M. Tan:
Diagnosability of star graphs with missing edges. 253-259 - Dongye Wang, Mei Lu:
Edge fault tolerance of super edge connectivity for three families of interconnection networks. 260-268 - Xiao Liu
, Amol Ghorpade, Y. L. Tu, Wen-Jun Zhang
:
A novel approach to probability distribution aggregation. 269-275 - Zengtai Gong, Liangliang Wang:
The Henstock-Stieltjes integral for fuzzy-number-valued functions. 276-297 - K. P. Girish, Sunil Jacob John
:
Multiset topologies induced by multiset relations. 298-313 - Jinquan Li, Guannan Deng, Hongxing Li, Wenyi Zeng:
The relationship between similarity measure and entropy of intuitionistic fuzzy sets. 314-321 - Seung-Hyun Seo
, Kyu Young Choi
, Jung Yeon Hwang, Seungjoo Kim
:
Efficient certificateless proxy signature scheme with provable security. 322-337 - Qingkuan Dong, Xiaoping Li, Yanming Liu:
Two extensions of the ring signature scheme of Rivest-Shamir-Taumann. 338-345 - Der-Chyuan Lou
, Chen-Hao Hu:
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. 346-358
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.