


default search action
Information Sciences, Volume 275
Volume 275, August 2014
- Gang Kou

, Yi Peng, Guoxun Wang:
Evaluation of clustering algorithms for financial risk analysis using MCDM methods. 1-12 - Junhua Zhao, Yan Xu

, Fengji Luo, Zhao Yang Dong
, Yaoyao Peng:
Power system fault diagnosis based on history driven differential evolution and stochastic time domain simulation. 13-29 - Umarani Jayaraman

, Aman Kishore Gupta, Phalguni Gupta:
Boosted geometric hashing based indexing technique for finger-knuckle-print database. 30-44 - Carlos M. Travieso

, Jaime Roberto Ticay-Rivas
, Juan Carlos Briceño, Marcos del Pozo-Baños
, Jesús B. Alonso
:
Hand shape identification on multirange images. 45-56 - Jianhong Chen, Yu Long, Kefei Chen, Jie Guo:

Attribute-based key-insulated signature and its applications. 57-67 - Sungmin Yi, Hyoseok Ryu, Jihoon Son, Yon Dohn Chung:

View field nearest neighbor: A novel type of spatial queries. 68-82 - James N. K. Liu, Yan-Xing Hu, Yu-Lin He:

A set covering based approach to find the reduct of variable precision rough set. 83-100 - Masoud Mahootchi, Hamid R. Tizhoosh, Kumaraswamy Ponnambalam:

Oppositional extension of reinforcement learning techniques. 101-114 - Miguel Ángel Gómez-Villegas, Paloma Main

, Paola Viviani
:
Sensitivity to evidence in Gaussian Bayesian networks using mutual information. 115-126 - Sara Moein, Rajasvaran Logeswaran

:
KGMO: A swarm optimization algorithm based on the kinetic energy of gas molecules. 127-144 - Alireza Khastan

, Juan J. Nieto
, Rosana Rodríguez-López
:
Fuzzy delay differential equations under generalized differentiability. 145-167 - Aleksandar Stamenkovic, Miroslav Ciric

, Jelena Ignjatovic:
Reduction of fuzzy automata by means of fuzzy quasi-orders. 168-198 - Bijan Davvaz:

Construction of n-ary F-polygroups. 199-212 - Yu-Chieh Wu:

A top-down information theoretic word clustering algorithm for phrase recognition. 213-225 - Ji-Bo Wang, Jian-Jun Wang

:
Single machine group scheduling with time dependent processing times and ready times. 226-231 - Francesco Bonchi, Aristides Gionis, Tamir Tassa:

Identity obfuscation in graphs through the information theoretic lens. 232-256 - Jung-Sheng Fu:

Vertex-pancyclicity of augmented cubes with maximal faulty edges. 257-266 - Juan J. Nieto

, Rosana Rodríguez-López
:
Cauchy-Peano theorem for Metric Dynamical Systems. 267-283 - Jung Yeon Hwang, Hyoung Joong Kim, Dong Hoon Lee, Boyeon Song:

An enhanced (t, n) threshold directed signature scheme. 284-292 - Ling Chen, Qiang Yu, Bolun Chen:

Anti-modularity and anti-community detecting in complex networks. 293-313 - C. L. Philip Chen

, Chun-Yang Zhang:
Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. 314-347 - Mu-En Wu, Shih-Ying Chang, Chi-Jen Lu, Hung-Min Sun:

A communication-efficient private matching scheme in Client-Server model. 348-359 - Deli Jia, Caihao Cui

, Siqi Wang:
Propagation properties of acoustic waves inside periodic pipelines. 360-369 - Hua Deng, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer

, Lei Zhang, Jianwei Liu
, Wenchang Shi:
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. 370-384 - Guotao Hui, Huaguang Zhang, Zhenning Wu, Yingchun Wang:

Control synthesis problem for networked linear sampled-data control systems with band-limited channels. 385-399 - Marta R. Costa-jussà

, Jens Grivolla
, Bart Mellebeek, Francesc Benavent, Joan Codina, Rafael E. Banchs:
Using annotations on Mechanical Turk to perform supervised polarity classification of Spanish customer comments. 400-412

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














