


default search action
Information Sciences, Volume 516
Volume 516, April 2020
- Xiaoxiang Guo

, Yutong Sun, Jingli Ren
:
Low dimensional mid-term chaotic time series prediction by delay parameterized method. 1-19 - Dongzi Chen, Qinli Yang

, Jiaming Liu, Zhu Zeng:
Selective prototype-based learning on concept-drifting data streams. 20-32 - Chunlin Li, Jingpan Bai, Yi Chen, Youlong Luo:

Resource and replica management strategy for optimizing financial cost and user experience in edge cloud computing system. 33-55 - Mohammad Sadegh Khorshidi

, Mohammad Reza Nikoo
, Narges Taravatrooy
, Mojtaba Sadegh
, Malik Al-Wardy
, Ghazi Ali Al-Rawas:
Pressure sensor placement in water distribution networks for leak detection using a hybrid information-entropy approach. 56-71 - Wanying Xie

, Zeshui Xu
, Zhiliang Ren
, Enrique Herrera-Viedma:
Restoring incomplete PUMLPRs for evaluating the management way of online public opinion. 72-88 - Hyung Tae Lee, San Ling

, Jae Hong Seo
, Huaxiong Wang, Taek-Young Youn:
Public key encryption with equality test in the standard model. 89-108 - Wenzhu Yan, Quansen Sun, Huaijiang Sun, Yanmeng Li:

Joint dimensionality reduction and metric learning for image set classification. 109-124 - Weizhong Zhao, Huifang Ma, Zhixin Li

, Xiang Ao
, Ning Li:
Improving social and behavior recommendations via network embedding. 125-141 - Nan Zhang

, Shifei Ding, Tongfeng Sun, Hongmei Liao, Lijuan Wang, Zhongzhi Shi:
Multi-view RBM with posterior consistency and domain adaptation. 142-157 - Bin Lian

, Gongliang Chen, Lang Wang, Jialin Cui, Ping Yu, Dake He:
A practical solution to clone problem in anonymous information system. 158-191 - Xiaobin Xu, Deqing Zhang, Yu Bai, Leilei Chang

, Jianning Li:
Evidence reasoning rule-based classifier with uncertainty quantification. 192-204 - Leida Li

, Xi Chen, Jinjian Wu, Shiqi Wang
, Guangming Shi:
No-reference quality index of depth images based on statistics of edge profiles for view synthesis. 205-219 - Aiping Yang

, Bingwang Yang, Zhong Ji
, Yanwei Pang
, Ling Shao
:
Lightweight group convolutional network for single image super-resolution. 220-233 - Ping Huang

, Chao Wen, Liping Fu, Qiyuan Peng, Yixiong Tang
:
A deep learning approach for multi-attribute data: A study of train delay prediction in railway systems. 234-253 - Jie Ren, Qimin Zhang

, Feilong Cao
, Chunmei Ding, Li Wang:
Modeling a stochastic age-structured capital system with Poisson jumps using neural networks. 254-265 - Hui Liu

, Zhu Duan, Chao Chen:
A hybrid multi-resolution multi-objective ensemble model and its application for forecasting of daily PM2.5 concentrations. 266-292 - Pengfei Li

, Mark Sanderson
, Mark J. Carman
, Falk Scholer:
Self-labeling methods for unsupervised transfer ranking. 293-315 - Huilai Zhi

, Jianjun Qi, Ting Qian, Ruisi Ren:
Conflict analysis under one-vote veto based on approximate three-way concept lattice. 316-330 - Shengke Zeng

, Yi Mu, Hongjie Zhang, Mingxing He:
A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy. 331-345 - Xinyang Deng, Wen Jiang

:
On the negation of a Dempster-Shafer belief structure based on maximum uncertainty allocation. 346-352 - Byungju Kim, Dongha Lee

, Jinoh Oh, Hwanjo Yu:
Scalable disk-based topic modeling for memory limited devices. 353-369 - Hangyao Wu

, Peijia Ren
, Zeshui Xu
:
Addressing site selection for earthquake shelters with hesitant multiplicative linguistic preference relation. 370-387 - Joan-Andreu Sánchez

, Verónica Romero
:
Computation of moments for probabilistic finite-state automata. 388-400 - Pawel Plawiak

, Moloud Abdar
, Joanna Plawiak, Vladimir Makarenkov, U. Rajendra Acharya
:
DGHNL: A new deep genetic hierarchical network of learners for prediction of credit scoring. 401-418 - Qihong Duan

, Bin Zhao:
Maximal chains on the interval [0, 1] with respect to t-norm-partial orders and uninorm-partial orders. 419-428 - Zhou-Jing Wang

, Jian Lin
:
And-like-uninorm based consistency analysis and optimized fuzzy weight closed-form solution of triangular fuzzy additive preference relations. 429-452 - Lianwei Wu, Yuan Rao, Ambreen Nazir, Haolin Jin:

Discovering differential features: Adversarial learning for information credibility evaluation. 453-473 - Ruiqi Wu

, Changle Zhou, Fei Chao
, Longzhi Yang
, Chih-Min Lin, Changjing Shang:
GANCCRobot: Generative adversarial nets based chinese calligraphy robot. 474-490 - Pengfei Wan

, Xinzhuang Chen, Jianhua Tu
, Matthias Dehmer, Shenggui Zhang, Frank Emmert-Streib
:
On graph entropy measures based on the number of independent sets and matchings. 491-504 - Yanqing Yao, Zhoujun Li

, Hua Guo:
A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes. 505-514 - Baodong Qin

, Yu Chen, Qiong Huang
, Ximeng Liu
, Dong Zheng:
Public-key authenticated encryption with keyword search revisited: Security model and constructions. 515-528 - Ling Wei, Lin Liu, Jianjun Qi, Ting Qian:

Rules acquisition of formal decision contexts based on three-way concept lattices. 529-544 - Bin Xiao, Jiangxia Luo, Xiuli Bi, Weisheng Li

, Beijing Chen:
Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking. 545-559 - Zhiming Zhang, Shyi-Ming Chen, Chao Wang

:
Group decision making with incomplete intuitionistic multiplicative preference relations. 560-571

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














