default search action
IEEE Transactions on Systems, Man, and Cybernetics, Part A, Volume 34
Volume 34, Number 1, January 2004
- Maria Pia Fanti, MengChu Zhou:
Deadlock control methods in automated manufacturing systems. 5-22 - Jonathan Billington, Guy Edward Gallasch, Lars Michael Kristensen, Thomas Mailund:
Exploiting equivalence reduction and the sweep-line method for detecting terminal states. 23-37 - ZhiWu Li, MengChu Zhou:
Elementary siphons of Petri nets and their application to deadlock prevention in flexible manufacturing systems. 38-51 - Elzbieta Roszkowska:
Supervisory control for deadlock avoidance in compound processes. 52-64 - Fu-Shiung Hsieh:
Fault-tolerant deadlock avoidance algorithm for assembly processes. 65-79 - Maria Pia Fanti:
Deadlock resolution strategy for automated manufacturing systems including conjunctive resource service. 80-92 - Joaquin Ezpeleta, Laura Recalde:
A deadlock avoidance approach for nonsequential resource allocation systems. 93-101 - MuDer Jeng, Xiaolan Xie, Sheng-Luen Chung:
ERCN* merged nets for modeling degraded behavior and parallel processes in semiconductor manufacturing systems. 102-112 - Gang Xu, Zhiming Wu:
Deadlock-free scheduling strategy for automated production cell. 113-122 - Jonghun Park:
A deadlock and livelock free protocol for decentralized Internet resource coallocation. 123-131 - Ching-Torng Lin, Chen-Tung Chen:
A fuzzy-logic-based approach for new product Go/NoGo decision at the front end. 132-142 - Kwok-Wai Cheung, Kwok Ching Tsui, Jiming Liu:
Extended latent class models for collaborative recommendation. 143-148 - Jin Hou, Yuko Aoki:
A real-time interactive nonverbal communication system through semantic feature extraction as an interlingua. 148-154 - Chrysostomos D. Stylios, Petros P. Groumpos:
Modeling complex systems using fuzzy cognitive maps. 155-162
Volume 34, Number 2, March 2004
- Ali E. Abbas:
Entropy methods for adaptive utility elicitation. 169-178 - Leonard Adelman, Sheryl L. Miller, Cedric Yeo:
Testing the effectiveness of icons for supporting distributed team decision making under time pressure. 179-189 - Giorgos Akrivas, Giorgos B. Stamou, Stefanos D. Kollias:
Semantic association of multimedia document descriptions through fuzzy relational algebra and fuzzy reasoning. 190-196 - A. Terry Bahill:
The ideal moment of inertia for a baseball or softball bat. 197-204 - Samuel W. K. Chan:
Extraction of salient textual patterns: synergy between lexical cohesion and contextual coherence. 205-218 - Lawrence E. Holloway, A. S. Khare, Yu Gong:
Computing bounds for forbidden State reachability functions for controlled Petri nets. 219-228 - Jianqiang Li, Yushun Fan, MengChu Zhou:
Performance modeling and analysis of workflow. 229-242 - Srinivas Peeta, J. W. Yu:
Adaptability of a hybrid route choice model to incorporating driver behavior dynamics under information provision. 243-256 - Raj Subbu, Arthur C. Sanderson:
Network-based distributed planning using coevolutionary agents: architecture and evaluation. 257-269 - Qianhua He, Sam Kwong, Q. Y. Hong:
Adaptation of hidden Markov models using maximum model distance algorithm. 270-276 - Keng L. Siau, Hock Chuan Chan, Kwok Kee Wei:
Effects of query complexity and learning on novice user query performance with conceptual and logical database interfaces. 276-281 - Benjamin P.-C. Yen, O. Q. Wu:
Internet scheduling environment with market-driven agents. 281-289
Volume 34, Number 3, May 2004
- Michael Diehl, Yacov Y. Haimes:
Influence diagrams with multiple objectives and tradeoff analysis. 293-304 - Gaolin Fang, Wen Gao, Debin Zhao:
Large vocabulary sign language recognition based on fuzzy decision trees. 305-314 - Marco Farina, Paolo Amato:
A fuzzy definition of "optimality" for many-criteria optimization problems. 315-326 - J. R. Hoffman, Ronald P. S. Mahler:
Multitarget miss distance via optimal assignment. 327-336 - Georgiy M. Levchuk, Yuri N. Levchuk, Candra Meirina, Krishna R. Pattipati, David L. Kleinman:
Normative design of project-based organizations-Part III: modeling congruent, robust, and adaptive organizations. 337-350 - Zhengping Ma, Deguang Cui, Peng Cheng:
Dynamic network flow model for short-term air traffic flow management. 351-358 - Rubén Medina, Mireille Garreau, Javier Toro, Jean-Louis Coatrieux, D. Jugo:
Three-dimensional reconstruction of the left ventricle from two angiographic views: an evidence combination approach. 359-370 - James Moffat, I. Campbell:
Intelligent behavior is a partly emergent process for agents in conflict. 371-375 - Woojin Park, Don B. Chaffin, B. J. Martin:
Toward memory-based human motion simulation: development and validation of a motion modification algorithm. 376-386 - Ismael E. Arciniegas Rueda, Fabio A. Arciniegas, Mark J. Embrechts:
SVM sensitivity analysis: an application to currency crises aftermaths. 387-398 - Athanasios Sfetsos, C. Siriopoulos:
Time series forecasting with a hybrid clustering scheme and pattern recognition. 399-405 - Yansheng Yang, Gang Feng, Junsheng Ren:
A combined backstepping and small-gain approach to robust adaptive fuzzy control for strict-feedback nonlinear systems. 406-420 - Raymond S. T. Lee:
iJADE stock advisor: an intelligent agent based stock prediction system using hybrid RBF recurrent network. 421-428 - Lorenzo José Tardón García, Javier Portillo-García, Carlos Alberola-López:
A novel Markovian formulation of the correspondence problem in stereo vision. 428-436
Volume 34, Number 4, July 2004
- Ellen J. Bass, Samuel T. Ernst-Fortin, R. L. Small, J. Hogans:
Architecture and development environment of a knowledge-based monitor that facilitate incremental knowledge-base development. 441-449 - Frank Y. Chen, Houmin Yan, Li Yao:
A newsvendor pricing game. 450-456 - François Delmotte, Philippe Smets:
Target identification based on the transferable belief model interpretation of dempster-shafer model. 457-471 - Stephen R. Gulliver, George Ghinea:
Stars in their eyes: what eye-tracking reveals about multimedia perceptual quality. 472-482 - Geoffrey S. Hubona, Gregory W. Shirah, D. K. Jennings:
The effects of cast shadows and stereopsis on performing computer-generated spatial tasks. 483-493 - A. T. Langewisch, F. Fred Choobineh:
Mean and variance bounds and propagation for ill-specified random variables. 494-506 - Kevin W. Li, Keith W. Hipel, D. Marc Kilgour, Liping Fang:
Preference uncertainty in the graph model for conflict resolution. 507-520 - Hanan Luss, Richard T. Wong:
Survivable telecommunications network design under different types of failures. 521-530 - Katya Rodríguez-Vázquez, Carlos M. Fonseca, Peter J. Fleming:
'Identifying the structure of nonlinear dynamic systems using multiobjective genetic programming. 531-545 - Maria Virvou, Katerina Kabassi:
Adapting the human plausible reasoning theory to a graphical user interface. 546-563 - Mustafa Nazmi Kaynak, Qi Zhi, Adrian David Cheok, Kuntal Sengupta, Jian Zhang, Chi Chung Ko:
Analysis of lip geometric features for audio-visual speech recognition. 564-570 - Zidong Wang, Daniel W. C. Ho, Xiaohui Liu:
A note on the robust stability of uncertain stochastic fuzzy systems with time-delays. 570-576
Volume 34, Number 5, September 2004
- Jiannong Cao, Xinyu Feng, Jian Lu, Henry C. B. Chan, Sajal K. Das:
Reliable message delivery for mobile agents: push or pull? 577-587 - Shin-Hang Ho, Shinn-Ying Ho, Li-Sun Shu:
OSA: orthogonal simulated annealing algorithm and its application to designing mixed H2/H∞ optimal controllers. 588-600 - K. S. Park:
Mathematical programming models for characterizing dominance and potential optimality when multicriteria alternative values and weights are simultaneously incomplete. 601-614 - Shinsuk Park, Thomas B. Sheridan:
Enhanced human-machine interface in braking. 615-629 - Philippe Sardain, Guy Bessonnet:
Forces acting on a biped robot. Center of pressure-zero moment point. 630-637 - Philippe Sardain, Guy Bessonnet:
Zero moment point-measurements from a human walker wearing robot feet as shoes. 638-648 - F. S. Smith, Qiang Shen:
Fault identification through the combination of symbolic conflict recognition and Markov chain-aided belief revision. 649-663 - Haiying Tu, Yuri N. Levchuk, Krishna R. Pattipati:
Robust action strategies to induce desired effects. 664-680 - Jianming Shi, Hiroshi Inoue:
Convex maximization on a convex set with fuzzy constraints. 681-685
Volume 34, Number 6, November 2004
- Meghan M. Dierks, Caprice K. Christian, Emilie M. Roth, Thomas B. Sheridan:
Healthcare safety: the impact of Disabling "safety" protocols. 693-698 - Stephanie A. Guerlain, Kristen Brook Green, Marcel C. LaFollette, T. C. Mersch, B. A. Mitchell, G. R. Poole, James Forrest Calland, Jianhong Lv, E. G. Chekan:
Improving surgical pattern recognition through repetitive viewing of video clips. 699-707 - Brian Hazlehurst, Carmit K. McMullen, Paul N. Gorman:
Getting the right tools for the job: distributed planning in cardiac surgery. 708-717 - Helen Altman Klein, A. R. Meininger:
Self management of medication and Diabetes: cognitive control. 718-725 - Christopher P. Nemeth, Richard I. Cook, Michael F. O'Connor, P. Allan Klock:
Using cognitive artifacts to understand distributed cognition. 726-735 - Mark E. Nunnally, Christopher P. Nemeth, V. Brunetti, Richard I. Cook:
Lost in menuspace: user interactions with complex medical devices. 736-742 - Anne-Sophie Nyssen:
Integrating cognitive and collective aspects of work in evaluating technology. 743-748 - Emily S. Patterson, Richard I. Cook, David D. Woods, Marta L. Render:
Examining the complexity behind a medication error: generic patterns in communication. 749-756 - Michelle L. Rogers, Richard I. Cook, Robert Bower, Mark Molloy, Marta L. Render:
Barriers to implementing wrong site surgery guidelines: a cognitive work analysis. 757-763 - F. Jacob Seagull, Yan Xiao, Cheryl L. Plasters:
Information accuracy and sampling effort: a field study of surgical scheduling coordination. 764-771 - Yan Xiao, F. Jacob Seagull, Fe Nieves-Khouw, Nancy Barczak, Sherry Perkins:
Organizational-historical analysis of the "failure to respond to alarm" problems. 772-778
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.