


default search action
Information Sciences, Volume 269
Volume 269, June 2014
- Jeonil Kang, DaeHun Nyang, KyungHee Lee:

Two-factor face authentication using matrix permutation transformation and a user password. 1-20 - Sara Tedmori

, Nijad Al-Najdawi
:
Image cryptographic algorithm based on the Haar wavelet transform. 21-34 - Moumita Roy

, Susmita Ghosh
, Ashish Ghosh
:
A novel approach for change detection of remotely sensed images using semi-supervised multiple classifier system. 35-47 - Shuyuan Yang, Yuan Lv, Yu Ren, Lixia Yang, Licheng Jiao

:
Unsupervised images segmentation via incremental dictionary learning based sparse representation. 48-59 - Muwei Jian

, Kin-Man Lam, Junyu Dong
:
Illumination-insensitive texture discrimination based on illumination compensation and enhancement. 60-72 - Francisco R. Feito

, Juan Ruiz de Miras
, Marilina Rivero, Rafael Jesús Segura
, Juan Carlos Torres
:
From theoretical graphic objects to real free-form solids. 73-93 - Sasan Golabi, Mohammad Sadegh Helfroush, Habibollah Danyali, Mehri Owjimehr:

Robust watermarking against geometric attacks using partial calculation of radial moments and interval phase modulation. 94-105 - Chia-Hung Yeh, Chih-Yang Lin

, Kahlil Muchtar
, Li-Wei Kang:
Real-time background modeling based on a multi-level texture description. 106-127 - Yiwei Jiang, Jueliang Hu, Longcheng Liu, Yuqing Zhu, T. C. E. Cheng

:
Competitive ratios for preemptive and non-preemptive online scheduling with nondecreasing concave machine cost. 128-141 - Wei-Chang Yeh

, Peng-Jen Lai, Wen-Chiung Lee, Mei-Chi Chuang:
Parallel-machine scheduling to minimize makespan with fuzzy processing times and learning effects. 142-158 - Kuo-Liang Chung, Wei-Jen Yang, Wei-Ning Yang:

Reversible data hiding for depth maps using the depth no-synthesis-error model. 159-175 - Billy Peralta

, Alvaro Soto:
Embedded local feature selection within mixture of experts. 176-187 - Seyedali Mirjalili

, Seyed Mohammad Mirjalili, Andrew Lewis:
Let a biogeography-based optimizer train your Multi-Layer Perceptron. 188-209 - Muhammad Aslam, Nasrullah Khan, Muhammad Azam, Chi-Hyuck Jun:

Designing of a new monitoring t-chart using repetitive sampling. 210-216 - Gajaruban Kandavanam, Rammohan Mallipeddi, Dmitri Botvich, Sasitharan Balasubramaniam

, Ponnuthurai N. Suganthan
:
Achieving high robustness and performance in QoS-aware route planning for IPTV networks. 217-237 - Jun Li, Xiaolin Zheng, Song-Tao Chen, William Wei Song, Deren Chen:

An efficient and reliable approach for quality-of-service-aware service composition. 238-254 - Marta Fort

, Joan Antoni Sellarès
:
Solving the k-influence region problem with the GPU. 255-269 - Vanga Odelu

, Ashok Kumar Das, Adrijit Goswami:
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. 270-285 - Weidong Chen, Zaixin Lu, Weili Wu:

Dominating problems in swapped networks. 286-299 - Huanqing Wang

, Bing Chen, Xiaoping Liu, Kefu Liu, Chong Lin
:
Adaptive neural tracking control for stochastic nonlinear strict-feedback systems with unknown input saturation. 300-315 - Yanling Wei, Jianbin Qiu, Hamid Reza Karimi, Mao Wang:

Filtering design for two-dimensional Markovian jump systems with state-delays and deficient mode information. 316-331 - Yu-Long Wang, Qing-Long Han

:
Modelling and controller design for discrete-time networked control systems with limited channels and data drift. 332-348 - Shuli Sun, Jing Ma:

Linear estimation for networked control systems with random transmission delays and packet dropouts. 349-365 - Olivier A. Heubo-Kwegna:

Fuzzy semistar operations of finite character on integral domains. 366-377 - Ning Lin Zhou, Bao Qing Hu:

Rough sets based on complete completely distributive lattice. 378-387 - Shaojing Fu, Chao Li, Longjiang Qu:

A recursive construction of highly nonlinear resilient vectorial functions. 388-396

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














