


default search action
Information Sciences, Volume 486
Volume 486, June 2019
- Dechao Li, Yee Leung, Weizhi Wu

:
Multiobjective interval linear programming in admissible-order vector space. 1-19 - Zhifeng Hao, Wei-Chang Yeh

, Jing Wang, Gai-Ge Wang
, Bin Sun:
A Quick Inclusion-Exclusion technique. 20-30 - Gianni D'Angelo, Francesco Palmieri

, Salvatore Rampone
:
Detecting unfair recommendations in trust-based pervasive environments. 31-51 - Sungil Kim

:
Revealing household characteristics using connected home products. 52-61 - Zhaogang Ding, Xia Chen

, Yucheng Dong, Francisco Herrera
:
Consensus reaching in social network DeGroot Model: The roles of the Self-confidence and node degree. 62-72 - Alberto Dennunzio, Enrico Formenti

, Luca Manzoni
, Luciano Margara
, Antonio E. Porreca:
On the dynamical behaviour of linear higher-order cellular automata and its decidability. 73-87 - Jinghui Zhang, Yuan Wan

, Zhiping Chen, Xiaojing Meng:
Non-negative and local sparse coding based on l2-norm and Hessian regularization. 88-100 - Mingjin Yang, Chen Peng

, Guiling Li, Yu-Long Wang
, Shaodong Ma:
Event-triggered H∞ control for active semi-vehicle suspension system with communication constraints. 101-113 - Yong Su

, Wenwen Zong
, Feng Qin, Bin Zhao:
The cross-migrativity with respect to continuous triangular norms revisited. 114-118 - Jun Lu, Jinliang Ding

:
Construction of prediction intervals for carbon residual of crude oil based on deep stochastic configuration networks. 119-132 - Jun Sun

, Qidong Chen, Jianan Sun, Tao Zhang, Wei Fang
, Xiaojun Wu:
Graph-structured multitask sparsity model for visual tracking. 133-147 - Frédéric Ros, Serge Guillaume:

Munec: a mutual neighbor-based clustering algorithm. 148-170 - Xin Yang

, Tianrui Li
, Dun Liu
, Hamido Fujita
:
A temporal-spatial composite sequential approach of three-way granular computing. 171-189 - Yu-Chien Ko, Hamido Fujita

:
An evidential analytics for buried information in big data samples: Case study of semiconductor manufacturing. 190-203 - Behrouz Bolourian Haghighi

, Amir Hossein Taherinia
, Amir Hossein Mohajerzadeh:
TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA. 204-230 - Hamido Fujita

, Dalibor Cimr
:
Computer Aided detection for fibrillations and flutters using deep convolutional neural network. 231-239 - Ignacio Leguey, Pedro Larrañaga

, Concha Bielza
, Shogo Kato:
A circular-linear dependence measure under Johnson-Wehrly distributions and its application in Bayesian networks. 240-253 - Hu-Chen Liu

, Mei-Yun Quan, ZhiWu Li
, Ze-Ling Wang:
A new integrated MCDM model for sustainable supplier selection under interval-valued intuitionistic uncertain linguistic environment. 254-270 - Min Yang, Qiang Qu

, Xiaojun Chen
, Wenting Tu, Ying Shen
, Jia Zhu
:
Discovering author interest evolution in order-sensitive and Semantic-aware topic modeling. 271-286 - Ning Yao, Duoqian Miao:

Identification of structures and causation in flow graphs. 287-309 - Ling Xiao, Chen Wang, Yunxuan Dong

, Jianzhou Wang:
A novel sub-models selection algorithm based on max-relevance and min-redundancy neighborhood mutual information. 310-339 - Xingyuan Wang, Feng Le, Hongyu Zhao:

Fast image encryption algorithm based on parallel computing system. 340-358 - Zhenyu Gao

, Ge Guo
:
Velocity free leader-follower formation control for autonomous underwater vehicles with line-of-sight range and angle constraints. 359-378 - Michal Cerný

:
Narrow big data in a stream: Computational limitations and regression. 379-392 - Bruno Ordozgoiti, Alberto Mozo, Jesús García López de Lacalle

:
Regularized greedy column subset selection. 393-418 - Kaixin Lu

, Zhi Liu, Guanyu Lai, C. L. Philip Chen, Yun Zhang:
Adaptive fuzzy output feedback control for nonlinear systems based on event-triggered mechanism. 419-433 - Urszula Bentkowska

, Jan G. Bazan
, Wojciech Rzasa
, Lech Zareba
:
Application of interval-valued aggregation to optimization problem of k-NN classifiers for missing values case. 434-449 - Yu Chen

, Jiang Zhang, Yi Deng, Jinyong Chang:
KDM security for identity-based encryption: Constructions and separations. 450-473

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














