


default search action
Information Sciences, Volume 232
Volume 232, May 2013
- Pengjie Wang, Zhigeng Pan

, Mingmin Zhang, Rynson W. H. Lau
, Haiyu Song:
The alpha parallelogram predictor: A lossless compression method for motion capture data. 1-10 - Jie Xu, Jian Yang, Zhihui Lai:

K-local hyperplane distance nearest neighbor classifier oriented local discriminant analysis. 11-26 - Jun Chen, Victor C. S. Lee

, Kai Liu, G. G. Md. Nawaz Ali, Edward Chan:
Efficient processing of requests with network coding in on-demand data broadcast environments. 27-43 - Feng Feng

, Yongming Li
:
Soft subsets and soft product operations. 44-57 - Ling Wang, Ruixin Yang

, Yin Xu, Qun Niu, Panos M. Pardalos, Minrui Fei:
An improved adaptive binary Harmony Search algorithm. 58-87 - Renato Mariz de Moraes

, Hyunchul Kim, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves:
A new distributed cooperative MIMO scheme for mobile ad hoc networks. 88-103 - Rodrigo T. Peres, Claus Aranha, Carlos Eduardo Pedreira

:
Optimized bi-dimensional data projection for clustering visualization. 104-115 - Yunyun Wang, Songcan Chen:

Soft large margin clustering. 116-129 - Nen-Fu Huang, Gin-Yuan Jai, Han-Chieh Chao

, Yih-Jou Tzang, Hong-Yi Chang:
Application traffic classification at the early stage by characterizing application rounds. 130-142 - Wei Wei, Jiye Liang

, Yuhua Qian, Chuangyin Dang
:
Can fuzzy entropies be effective measures for evaluating the roughness of a rough set? 143-166 - Xianchao Zhang, Wenxin Liang, Shaoping Zhu, Bo Han:

Automatic seed set expansion for trust propagation based anti-spam algorithms. 167-187 - Jong Hwan Park, Kwangsu Lee

, Willy Susilo
, Dong Hoon Lee:
Fully secure hidden vector encryption under standard assumptions. 188-207 - Jong-Seok Lee

, Sigurdur Ólafsson:
A meta-learning approach for determining the number of clusters with consideration of nearest neighbors. 208-224 - Xiaoming Wang, Lichen Zhang

, Wenyang Dou, Xiaolin Hu:
Fuzzy colored time Petri net and termination analysis for fuzzy Event-Condition-Action rules. 225-240 - William Zhu, Shiping Wang:

Rough matroids based on relations. 241-252 - Hak-Keung Lam

, Jimmy Lauber
:
Membership-function-dependent stability analysis of fuzzy-model-based control systems using fuzzy Lyapunov functions. 253-266 - Davide Martinetti

, Vladimír Janis
, Susana Montes:
Cuts of intuitionistic fuzzy sets respecting fuzzy connectives. 267-275 - Thouraya Bouabana-Tebibel, Stuart Harvey Rubin:

An interleaving semantics for UML 2 interactions using Petri nets. 276-293 - Chun-Cheng Lin

:
Dynamic router node placement in wireless mesh networks: A PSO approach with constriction coefficient and its convergence analysis. 294-308 - Borja Fernández-Gauna

, Ion Marqués, Manuel Graña:
Undesired state-action prediction in multi-agent reinforcement learning for linked multi-component robotic system control. 309-324 - Pei-Lun Suei, Victor C. S. Lee

, Shi-Wu Lo, Tei-Wei Kuo
:
An efficient B+-tree design for main-memory database systems with strong access locality. 325-345 - M. H. Fazel Zarandi, Abolfazl Doostparast Torshizi, I. Burhan Türksen, Babak Rezaee

:
A new indirect approach to the type-2 fuzzy systems modeling and design. 346-365 - Francesc Esteva

, Lluís Godo
, Carles Noguera
:
A logical approach to fuzzy truth hedges. 366-385 - Guodong Zhang

, Yi Shen, Quan Yin, Junwei Sun
:
Global exponential periodicity and stability of a class of memristor-based recurrent neural networks with multiple delays. 386-396 - Junli Wu, Hamid Reza Karimi, Peng Shi:

Network-based H∞ output feedback control for uncertain stochastic systems. 397-410 - Przemyslaw Grzegorzewski

:
On some basic concepts in probability of IF-events. 411-418 - Feilong Tang, Ilsun You, Can Tang, Minyi Guo:

An efficient classification approach for large-scale mobile ubiquitous computing. 419-436 - R. Vidya Banu, N. Nagaveni:

Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario. 437-448 - Hyunsik Choi, HaRim Jung, Ki Yong Lee, Yon Dohn Chung:

Skyline queries on keyword-matched data. 449-463 - Cai-Sen Chen, Tao Wang, Jun-Jian Tian:

Improving timing attack on RSA-CRT via error detection and correction strategy. 464-474 - Songqin Miao, Futai Zhang, Sujuan Li, Yi Mu:

On security of a certificateless signcryption scheme. 475-481 - Yu-Ping Ou Yang, How-Ming Shieh, Gwo-Hshiung Tzeng

:
A VIKOR technique based on DEMATEL and ANP for information security risk control assessment. 482-500

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














