default search action
Information Sciences, Volume 238
Volume 238, July 2013
- Willy Picard:
A formalization of social requirements for human interactions with service protocols. 1-21 - Martin Craig Serpell, Jim E. Smith, Alistair R. Clark, Andrea T. Staggemeier:
A preprocessing optimization applied to the cell suppression problem in statistical disclosure control. 22-32 - I-Ching Hsu:
Extensible access control markup language integrated with Semantic Web technologies. 33-51 - Olivier Van Laere, Steven Schockaert, Bart Dhoedt:
Georeferencing Flickr resources based on textual meta-data. 52-74 - Jiuping Xu, Xiaoyang Zhou:
Approximation based fuzzy multi-objective models with expected objectives and chance constraints: Application to earth-rock work allocation. 75-95 - Qi Wu, Rob Law, Edmond H. C. Wu, Jinxing Lin:
A hybrid-forecasting model reducing Gaussian noise based on the Gaussian support vector regression machine and chaotic particle swarm optimization. 96-110 - Eva Besada-Portas, Luis de la Torre, Alejandro Moreno, José L. Risco-Martín:
On the performance comparison of multi-objective evolutionary UAV path planners. 111-125 - Choon Ki Ahn:
Passive and exponential filter design for fuzzy neural networks. 126-137 - Yong Xu, Qi Zhu, Zizhu Fan, David Zhang, Jian-Xun Mi, Zhihui Lai:
Using the idea of the sparse representation to perform coarse-to-fine face recognition. 138-148 - Ludmila Dymova, Pavel V. Sevastjanov, Anna Tikhonenko:
An approach to generalization of fuzzy TOPSIS method. 149-162 - Masatoshi Sakawa, Takeshi Matsui:
Interactive fuzzy random two-level linear programming based on level sets and fractile criterion optimization. 163-175 - Sung Jin Yoo:
Adaptive neural tracking and obstacle avoidance of uncertain mobile robots with unknown skidding and slipping. 176-189 - Moonseong Kim, Hyunseung Choo, Matt W. Mutka, Hyung-Jin Lim, Kwangjin Park:
On QoS multicast routing algorithms using k-minimum Steiner trees. 190-204 - Yan Jiang, Chaoyi Pang, Hao Lan Zhang, Junhu Wang, Tongliang Li, Qing Zhang, Jing He:
Finding the minimum number of elements with sum above a threshold. 205-211 - Pariya Raoufi, Habib Rostami, Hessam Bagherinezhad:
An optimal time algorithm for minimum linear arrangement of chord graphs. 212-220 - Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Public key encryption with keyword search secure against keyword guessing attacks without random oracle. 221-241 - Hao-Chuan Tsai, Chin-Chen Chang:
Provably secure three party encrypted key exchange scheme with explicit authentication. 242-249 - Eddie Cheng, László Lipták:
Diagnosability of Cayley graphs generated by transposition trees with missing edges. 250-252
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.