Abstract is missing.
- Type-2 fuzzy sets for computing with wordsJerry M. Mendel. 8 [doi]
- A model of granular computing with applications. granules from rough inclusions in information systemsLech Polkowski. 9-16 [doi]
- Towards the integration of diverse spam filtering techniquesCalton Pu, Steve Webb, Oleg M. Kolesnikov, Wenke Lee, Richard J. Lipton. 17-20 [doi]
- Data and learningStephen Smale. 21 [doi]
- Learning hidden information: SVM+Vladimir Vapnik. 22 [doi]
- Understanding microbial genomic structures and applications to biological pathway inferenceZhengchang Su, Fenglou Mao, Hongwei Wu, PhuongAn Dam, Xin Chen, Tao Jiang, Victor Olman, Brian Palenik, Ying Xu. 23-24 [doi]
- Some learning paradigms for granular computingRonald R. Yager. 25-29 [doi]
- Graduation and granulation are keys to computation with information described in natural languageLotfi A. Zadeh. 30 [doi]
- The Impending Revolution in Web Intelligence (WI) and Brain Informatics (BI)Ning Zhong. 31 [doi]
- Structuralism? functionalism? behaviorism? or mechanism? - looking backward and forward on better approach to AIYi X. Zhong. 32-37 [doi]
- Relationships among three types of covering rough setsWilliam Zhu, Fei-Yue Wang. 43-48 [doi]
- A novel neural network model for different information granulation processingJianmin Zhao, Jiuzhen Liang. 49-52 [doi]
- Feature extraction by structured stepwise nonparametric maximum margin criterionYu-Jie Zheng, Xiaojun Wu, Dongjun Yu, Jingyu Yang, Wei-Dong Wang, Yong-Zhi Li. 53-56 [doi]
- Evaluating the effect of rough set feature selection on the performance of decision treesDavid Tian, John A. Keane, Xiao-Jun Zeng. 57-62 [doi]
- The transitive closures of matrices over distributive latticesGuilong Liu. 63-66 [doi]
- Ensembles of classifiers based on rough sets theory and set-oriented database operationsXiaohua Hu. 67-73 [doi]
- The intelligent control terminal with SCM based on constructive neural networksC. J. Zhang, H. L. Wang, L. Zhang. 74-78 [doi]
- An analytical model to estimate the time taken for cytoplasmic reactions for stochastic simulation of complex biological systemsPreetam Ghosh, Samik Ghosh, Kalyan Basu, Sajal K. Das, Simon Daefler. 79-84 [doi]
- Parallel ant colony algorithm for mining classification rulesYixin Chen, Ling Chen, Li Tu. 85-90 [doi]
- YinYang bipolar T-norms and T-conorms as granular neurological operatorsWen-Ran Zhang. 91-96 [doi]
- Prediction of the input impedance of two coupled monopole antennas using fuzzy modelingSaeed Reza Ostadzadeh, Mohammad Soleimani, Majid Tayarani. 97-100 [doi]
- Simulating protein computing: character recognition via probabilistic transition treesChristopher N. Eichelberger, Kayvan Najarian. 101-105 [doi]
- A taxonomy of types of granularityC. Maria Keet. 106-111 [doi]
- Real time target tracking with binary sensor networks and parallel computingHong Lin, John A. Rushing, Sara J. Graves, Steve Tanner, Evans Criswell. 112-117 [doi]
- Application of kohonen self-organizing map for urban structure analysisWenxue Ju, Nina Siu-Ngan Lam, Jianhua Chen. 118-123 [doi]
- On structural information similarity measurementsJin-Mao Wei, Shu-Qin Wang, Wei Zheng, Jing Wang, Jun-Ping You, Jie Zhang, Dan Liu. 124-129 [doi]
- On structural information similarity measurementsJin-Mao Wei, Shu-Qin Wang, Wei Zheng, Jing Wang, Jun-Ping You, Jie Zhang, Dan Liu. 124-129 [doi]
- Artificial general intelligence and classical neural networkPei Wang. 130-135 [doi]
- A new method for classifying and searching software components by using a self-organizing neural network architectureClaudia A. S. Mello, Rodrigo Fernandes de Mello, Marilde T. P. Santos, Luciano José Senger, Laurence Tianruo Yang. 136-141 [doi]
- Classification and reduction of attributes in concept latticesHong-Ru Li, Wen-Xiu Zhang, Hong Wang. 142-147 [doi]
- Reliable classification of childhood acute leukaemia from gene expression data using confidence machinesTony Bellotti, Zhiyuan Luo, Alexander Gammerman. 148-153 [doi]
- Efficient indirect association discovery using compact transaction databasesQian Wan, Aijun An. 154-159 [doi]
- Modeling hierarchical and modular complex networks based on FCMJianyu Li, Rui Lv, Shuzhong Yang, Xianglin Huang, Zhanxin Yang, Yingjian Qi. 160-165 [doi]
- Multipopulation genetic learning of midsagittal articulatory models for speech synthesisJosé Brito, Wladimir Rodriguez. 166-169 [doi]
- Learning the Parameters of Stochastic Grammar Models for RNA Structures with PseudoknotsJizhen Zhao, Liming Cai, Russell L. Malmberg. 170-175 [doi]
- Online Mining of Risk Level of Traffic Anomalies with User~s FeedbacksYu Meng, Margaret H. Dunham. 176-181 [doi]
- Discriminant analysis using nonnegative matrix factorization for nonparametric multiclass classificationHyunsoo Kim, Haesun Park. 182-187 [doi]
- Mining parameters that characterize the communities in web-like networksNarsingh Deo, Aurel Cami. 188-193 [doi]
- Two phase approach for grid enablement of legacy applicationsPreethy Iyer, Aparna Nagargadde, Srividya Gopalan, Sridhar Varadarajan. 194-199 [doi]
- Dependence space of concept lattices based on rough setJianmin Ma, Wen-Xiu Zhang, Xia Wang. 200-204 [doi]
- Computing non-redundant bases of if-then rules from data tables with graded attributesRadim Belohlávek, Vilém Vychodil. 205-210 [doi]
- Granularity transformation of qualitative criterion, orthogonality of qualitative mapping system, and pattern recognitionJiali Feng, Jingjuan Feng. 211-216 [doi]
- Using UMLS-based Re-Weighting Terms as a Query Expansion StrategyWeizhong Zhu, Xuheng Xu, Xiaohua Hu, Il-Yeol Song, Robert B. Allen. 217-222 [doi]
- A cutting plane algorithm for multiclass kernel discriminationsTien-Fang Kuo, Yasutoshi Yajima. 223-228 [doi]
- Priority ordered direction basis function neural networks and the application for object recognitionWenming Cao, Fei Lu, Shoujue Wang. 229-231 [doi]
- A granular computing view on function approximationXiao-Jun Zeng, John A. Keane. 232-237 [doi]
- Spam email filtering with bayesian belief network: using relevant wordsXin Jin, Anbang Xu, Rongfang Bie, Xian Shen, Min Yin. 238-243 [doi]
- Methodology for fraud detection using rough setsJosé Edison Cabral, João O. P. Pinto, Kathya S. C. Linares, Alexandra M. A. C. Pinto. 244-249 [doi]
- Generating and exploiting bayesian networks for fault diagnosis in airplane enginesM. Çetin Yavuz, Ferat Sahin, Ziya Arnavut, Önder Uluyol. 250-255 [doi]
- Nonlinear modeling of a flight vehicle using fuzzy clusteringAli Reza Mehrabian, S. Vahid Hashemi, Jafar Roshanian, Salman Mohagheghi. 256-261 [doi]
- CM-test: An Innovative Divergence Measurement and Its Application in Diabetes Gene Expression Data AnalysisLily R. Liang, Shiyong Lu, Yi Lu, Puneet Dhawan, Deepak Kumar. 262-268 [doi]
- Error awareness data miningXingquan Zhu, Xindong Wu. 269-274 [doi]
- The uncertainty principle of cross-validationMark Last. 275-280 [doi]
- Multiview intelligent data analysis based on granular computingYaohua Chen, Yiyu Yao. 281-286 [doi]
- Approximation method in incomplete information systems based on variable precision modelWenhai Li, Yucai Feng, Xiaoming Ma. 287-292 [doi]
- Detecting communities using bibliographic metricsHemant Balakrishnan, Narsingh Deo. 293-298 [doi]
- On designing QoS for congestion control service using neural network predictive techniquesNaixue Xiong, Yan Yang, Jing He, Yanxiang He. 299-304 [doi]
- A neutrosophic description logicHaibin Wang, André Rogatko, Florentin Smarandache, Rajshekhar Sunderraman. 305-308 [doi]
- The entropy for rough fuzzy setsChengyi Zhang, Bencheng Wei, Guohui Chen, Haiyan Fu. 309-312 [doi]
- Granular computing based text classificationTaorong Qiu, Xiaoqing Chen, Qing Liu, Houkuan Huang. 313-316 [doi]
- Pseudo-quotient space theory for granular computing of non-partition modelWan-Li Chen, Qian-sheng Fang, Jia-xing Cheng. 317-320 [doi]
- Granular computing model based on ontologyGuangcheng Zhou, Jiuzhen Liang. 321-324 [doi]
- Service oriented architectures for grid computing environments: opportunities and challengesSrinivasan Ramaswamy, M. Malarvannan. 325-328 [doi]
- Rough set approximations VS. measurable spacesWei-Zhi Wu, Wen-Xiu Zhang. 329-332 [doi]
- A rough set approach to mining concise rules from inconsistent dataYing Sai, Peiyao Nie, Ruzhi Xu, Jincai Huang. 333-336 [doi]
- Item sets based graph mining algorithm and application in genetic regulatory networksYongling Song, Su-Shing Chen. 337-340 [doi]
- The virtual human affective interaction based on affective entropyWeimin Xue, Huimin Xue, Hong Bao. 341-344 [doi]
- Granular computing and compositional complexity of biomolecular sequencesJiannong Zhang, Yongling Song, Su-Shing Chen. 345-348 [doi]
- A novel rough set approach for classificationLi-Juan Zhang, Zhou-Jun Li. 349-352 [doi]
- Object oriented modeling of protein translation systemZhong Huang, Xiaohua Hu. 353-356 [doi]
- The research of a web-based network blocking prototype for next generation networkWenchuan Yang, Qiong Wu, Ping Hou, Yang Zhang. 357-360 [doi]
- Flooding isolated region reassignmentS. Kami Makki, David A. Heitbrink, Xiaohua Jia. 361-364 [doi]
- A graduate seminar on foundations of data miningZhengxin Chen. 365-368 [doi]
- Training radial basis function networks with differential evolutionBing Yu, Xingshi He. 369-372 [doi]
- Pattern evaluation using polynomial regression- a clustering and probabilistic approachAsit Kumar Das, Jaya Sil. 373-376 [doi]
- A new knowledge reduction in inconsistent decision information systemJiyi Wang, Renbing Lin. 377-380 [doi]
- Semantic reasoning study for rough logic about n-ary formulasLin Yan, Sui-Hua Wang, Xue-Dong Zhang. 381-384 [doi]
- A Hidden Markov Model Approach to Model Protein Sequence and Structural Information: Identification of Helix-Turn-Helix DNA-Binding MotifChanghui Yan. 385-388 [doi]
- Characterizing visitor groups from web data streamsAlzennyr Da Silva, Francisco de Assis Tenório de Carvalho, Yves Lechevallier, Brigitte Trousse. 389-392 [doi]
- Semantic analysis of rough logical formulas based on granular computingQing Liu, Jiyi Wang. 393-396 [doi]
- Relation of relative reduct based on nested decision granularityLi Dao-Guo, Duo-Qian Miao, Yin Yi-Qi. 397-400 [doi]
- Lie group machine learning s axiom hypothesizesHuan Xu, Fan-Zhang Li. 401-404 [doi]
- An improved ant colony algorithm with biological characteristicsLing Qin, Yixin Chen, Ling Chen, Yan Wu. 405-408 [doi]
- Denotational semantics of dynamic fuzzy logic programming languageXiaofang Zhao, Fanzhang Li. 409-412 [doi]
- Default assumption reasoning based on DFLJin Huang, Fan-Zhang Li. 413-416 [doi]
- Research and application of data mining in individual diagnosis and treatment based on chinese traditional medicineXiaoxing He, Weitong Huang, Mingyu Lu, Weimin Xue, Yuchang Lu. 417-419 [doi]
- Research for Hopf bifurcation of an inertial two-neuron system with time delayQun Liu, Xiaofeng Liao, Guoyin Wang, Yu Wu. 420-423 [doi]
- Automatic acquisition of concepts from domain textsJanardhana Punuru, Jianhua Chen. 424-427 [doi]
- Fuzzy kernel clustering based on particle swarm optimizationLibiao Zhang, Chunguang Zhou, Ming Ma, Xiaohua Liu, Chunxia Li, Caitang Sun, Miao Liu. 428-430 [doi]
- Granulating semantic web ontologiesPavel Klinov, Lawrence J. Mazlack. 431-434 [doi]
- Stochastic processes and temporal rulesPaul Cotofrei, Kilian Stoffel. 435-440 [doi]
- Applying RBF Network to Predict Location in Mobile NetworkMing Lei, Pilian He, Zhichao Li. 441-444 [doi]
- Transductive Support Vector Classification for RNA Related Biological AbstractsBlake Adams, Muhammad Asadur Rahman. 445-448 [doi]
- Novel Clustering Algorithm Combined With DSSP Post Processing For Protein Sequence Motif DiscoveringBernard Chen, Phang C. Tai, Robert W. Harrison, Yi Pan. 449-452 [doi]
- Quantum-behaved particle swarm optimization based on immune memory and vaccinationJing Liu, Jun Sun 0008, Wenbo Xu, X. H. Kong. 453-456 [doi]
- Granular SVM with Repetitive Undersampling for Highly Imbalanced Protein Homology PredictionYuchun Tang, Yan-Qing Zhang. 457-460 [doi]
- Mining fuzzy association rules from microarray gene expression data for leukemia classificationYuanchen He, Yuchun Tang, Yan-Qing Zhang, Rajshekhar Sunderraman. 461-464 [doi]
- Collision detection for deforming linear objects using particle swarm optimizationYi Wang, Wenhui Li, Tianzhu Wang, Dongfeng Han, Yu Meng. 465-468 [doi]
- Application of SVM in web page categorizationWeimin Xue, Weitong Huang, Yuchang Lu. 469-472 [doi]
- Inducing decision rules: a granular computing approachXiaosheng Wang. 473-477 [doi]
- Mining Frequent Patterns based on Compressed FP-tree without Conditional FP-tree GenerationFei Chen, Lin Shang, Ming Li, Zhaoqian Chen, Shifu Chen. 478-481 [doi]
- ART-based Clustering AggregationYan Yang, Mohamed S. Kamel, Fan Jin. 482-485 [doi]
- A new aggregation operator of linguistic information and its propertiesZheng Pei, Liangzhong Yi. 486-489 [doi]
- Agent-based peer-to-peer layered architecture for data transfer in wireless sensor networksElhadi Shakshuki, Sajid Hussain, Abdul Wasey Matin, Abdur Rafey Matin. 490-493 [doi]
- On discovering potentially useful patterns from databasesYing Xie, Tom Johnsten, Vijay V. Raghavan, Karthik Ramachandran. 494-497 [doi]
- Statistical analysis of high dimensional gene dataYichuan Zhao, Yue Zhou. 502-505 [doi]
- A framework for global constraint checking involving aggregates in multidatabases using granular computingPraveen Madiraju, Rajshekhar Sunderraman, Haibin Wang. 506-509 [doi]
- A new optimization method based on restructuring penalty function for solving constrained minimization problemsLiu Zijun, Baiquan Lu, Yuan Cao. 510-513 [doi]
- Flexible geospatial web services through fuzzy multisetsGiuseppe Fenza, Vincenzo Loia, Luigi Scarpa, Sabrina Senatore. 514-517 [doi]
- Discovering e-action rules from incomplete information systemsLi-Shiang Tsay, Zbigniew W. Ras. 518-521 [doi]
- An agent-based dual-tier algorithm for clustering data streamsDongbin Zhou, Lifeng Jia, Zhe Wang, Xiujuan Xu, Chunguang Zhou. 522-525 [doi]
- Quotient space approachability basing on measure space and fusion model of weighted graphical structureHongbin Fang, Ling Zhang. 526-529 [doi]
- A self-learning model based on granular computingQuan Gan, Guoyin Wang, Jun Hu. 530-533 [doi]
- Finding periodicity in pseudo periodic time series and forecastingFei Chen, Jie Yuan, Fusheng Yu. 534-537 [doi]
- DPITT: Multi-viewpoint Visualization System for Detecting Peculiar WWW Pages RapidlyMasayuki Hirose, Einoshin Suzuki. 538-541 [doi]
- Dynamic information system and its rough set model based on time sequenceXiaowei He, Liming Xu, WenZhong Shen. 542-545 [doi]
- New Soft Sensor Method Based on SVMHaoran Zhang, Xiaodong Wang, Changjiang Zhang, Ganyun Lv. 546-549 [doi]
- Comparison of charge state determination methods for high resolution mass spectraParminder Kaur, Peter B. O Connor. 550-553 [doi]
- Dynamic Task Distribution in the Grid for BLASTEnis Afgan, Pavithran Sathyanarayana, Purushotham Bangalore. 554-557 [doi]
- Grid intrusion detection based on soft computing by modeling real-user s normal behaviorsGuiling Zhang, Jizhou Sun. 558-561 [doi]
- Application of rough set attributes reduction in quality evaluation of dissertationXiaohong Wu, Qunxia Wang. 562-565 [doi]
- Formal automatic verification of security protocolsMeihua Xiao, Jinyun Xue. 566-569 [doi]
- Multi-tie SVMs Classifier based Power Equipment Fault DiagnosisGanyun Lv, Jinjv Zheng, Hanran Zhang. 570-573 [doi]
- A framework of linguistic truth-valued propositional logic based on lattice implication algebraLi Zou, Jun Ma, Yang Xu. 574-577 [doi]
- Differentiated harmonic feature analysis on music information retrieval for instrument recognitionXin Zhang, Zbigniew W. Ras. 578-581 [doi]
- Rule analysis with rough sets theoryPuntip Pattaraintakorn, Nick Cercone, Kanlaya Naruedomkul. 582-585 [doi]
- Dense rectangles in object-attribute dataRadim Belohlávek, Vilém Vychodil. 586-591 [doi]
- Wavesim transform - a new perspective of wavelet transform for temporal data clusteringR. Pradeep Kumar, P. Nagabhushan. 592-595 [doi]
- Large-scale software unit testing on the gridYaohang Li, Tao Dong, Xinyu Zhang, Yong-Duan Song, Xiaohong Yuan. 596-599 [doi]
- Using null data processing to recognize variant computer viruses for rule-based anti-virus systemsMinh Nhat Quang Truong, Van Kiem Hoang, Thuy Thanh Nguyen. 600-603 [doi]
- The framework of temporal granular logic based on information systemXiaoqing Chen, Taorong Qiu, Qing Liu, Houkuan Huang. 604-606 [doi]
- Assigning missing attribute values based on rough sets theoryJiye Li, Nick Cercone. 607-610 [doi]
- Text-continuous speech recognition based on ICA and geometrical learningWenming Cao, Tiancheng He, Shoujue Wang. 611-614 [doi]
- An effective extension to okapi for biomedical text miningMing Zhong, Xiangji Huang. 615-618 [doi]
- A multilevel searching and re-ranking framework for information retrievalMiao Wen, Xiangji Huang. 619-622 [doi]
- New ontology-based semantic similarity measure for the biomedical domainHisham Al-Mubaid, Hoa Al-Mubaid. 623-628 [doi]
- Rare Event Detection in a Spatiotemporal EnvironmentYu Meng, Margaret H. Dunham, Marco F. Marchetti, Jie Huang. 629-634 [doi]
- Multi-objective evolutionary algorithms and rough sets for decomposition and analysis of cortical evoked potentialsMariofanna G. Milanova, Tomasz G. Smolinski, Grzegorz M. Boratyn, Roger Buchanan, Astrid A. Prinz. 635-638 [doi]
- Using 2-additive measures in nonlinear multiregressionsL. Scott Bock, Zhenyuan Wang. 639-642 [doi]
- A genetic algorithm based approach for systematic SOM clustering of directory metadataLei Li, Vijay K. Vaishnavi, Art Vandenberg. 643-646 [doi]
- Whole transcriptome mRNA secondary structure analysis using distributed computationJae Yoo, David W. Digby, Adam Davis, William Seffens. 647-650 [doi]
- Fuzzy clustering for knowledge discovery in oceanographic dataZhijian Liu, Bin Wu, Roy George. 651-654 [doi]
- Identifying the most significant genes from gene expression profiles for sample classificationHisham Al-Mubaid, Noushin Ghaffari. 655-658 [doi]
- Mining fuzzy association rules: interestingness measure and algorithmJianchao Han, Mohsen Beheshti. 659-662 [doi]
- Cysteine separations profiles on protein secondary structure infer disulfide connectivityGuantao Chen, Hai Deng, Yufeng Gui, Yi Pan, Xue Wang. 663-665 [doi]
- An ensemble approach for generating partitional clusters from multiple cluster hierarchiesMahmood Hossain, Susan M. Bridges, Yong Wang, Julia E. Hodges. 666-670 [doi]
- Evolutionary voting kernel machines for cyclooxygenase-2 inhibitor activity comparisonsBo Jin, Yan-Qing Zhang. 671-674 [doi]
- Contrast enhancement for image with non-linear gray transform and wavelet neural networkChangjiang Zhang, Xiaodong Wang, Haoran Zhang, Ganyun Lv. 675-678 [doi]
- Simultaneously mining inter- and intra-object association rulesCheng-Ming Huang, Tzung-Pei Hong, Shi-Jinn Horng. 679-682 [doi]
- The STP model for solving imprecise problemsJingtao Yao, Wei-Ning Liu. 683-687 [doi]
- Clustering high dimensional sparse transactional data with constraintsYanrong Li, Raj P. Gopalan. 692-695 [doi]
- A novel stabilization criterion for discrete time fuzzy systemsYing-Jen Chen, Wen-June Wang. 696-699 [doi]
- A functional approach to pattern recognition theoryJames Kuodo Huang. 700-703 [doi]
- Research of the model about the application of granular computing in data fusion systemJuan Jiang, Hong Ding, Tao Peng. 704-707 [doi]
- BGrC for Superheated Steam Temperature System Modeling in Power PlantKeming Xie, Gang Xie. 708-711 [doi]
- Analysis of sample size effect on dependency of contingency matrixShusaku Tsumoto, Shoji Hirano. 712-715 [doi]
- Characterization of contextual independence of contingency matrixShusaku Tsumoto, Shoji Hirano. 716-719 [doi]
- Zero-knowledge test of vector equivalence granulation of user data with privacyYitao Duan, John Canny. 720-725 [doi]
- Attribute-oriented Granulation for Privacy ProtectionDa-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu. 726-731 [doi]
- Combating imbalance in network intrusion datasetsDavid A. Cieslak, Nitesh V. Chawla, Aaron Striegel. 732-737 [doi]
- A Two-stage Classifier for Protein B-turn Prediction Using Support Vector MachinesHua-Sheng Chiu, Hsin-Nan Lin, Allan Lo, Ting-Yi Sung, Wen-Lian Hsu. 738-743 [doi]
- An indexation and discovery architecture for semantic web services and its application in bioinformaticsLiyang Yu, Rajshekhar Sunderraman, Haibin Wang. 744-749 [doi]
- Modeling infectious diseases using global stochastic field simulationSangeeta Venkatachalam, Armin R. Mikler. 750-753 [doi]
- Genotype susceptibility and integrated risk factors for complex diseasesWeidong Mao, Dumitru Brinza, Nisar Hundewale, Stefan Gremalschi, Alexander Zelikovsky. 754-757 [doi]
- Haplotype tagging using support vector machinesJingwu He, Jun Zhang, Gulsah Altun, Alexander Zelikovsky, Yanqing Zhang. 758-761 [doi]
- Hybrid SVM Kernels for Protein Secondary Structure PredictionGulsah Altun, Hae-Jin Hu, Dumitru Brinza, Robert W. Harrison, Alexander Zelikovsky, Yi Pan. 762-765 [doi]
- Neural networks with resilient propagation for protein secondary structure predictionArnshea Clayton, Yanqing Zhang. 766-769 [doi]
- Obfuscate arrays by homomorphic functionsWilliam Zhu, Clark D. Thomborson, Fei-Yue Wang. 770-773 [doi]
- Privacy in Statistical Databases: k-Anonymity Through MicroaggregationJosep Domingo-Ferrer, Agusti Solanas, Antoni Martínez-Ballesté. 774-777 [doi]
- Fair and secure m-cashValli Kumari Vatsavayi, Ravi Mukkamala, K. V. S. V. N. Raju. 778-781 [doi]
- The case for collaborative distributed wireless intrusion detection systemsRaheem A. Beyah, Cherita L. Corbett, John A. Copeland. 782-787 [doi]
- Privacy homomorphisms for e-gambling and mental pokerJordi Castellà-Roca, Vanesa Daza, Josep Domingo-Ferrer, Francesc Sebé. 788-791 [doi]
- Expressing authorization in semantic web servicesRichard Scott Patterson, John A. Miller. 792-795 [doi]
- Semantic integration of web services and peertopeer networks to achieve fault-toleranceJorge Cardoso. 796-799 [doi]
- A comparison of two partial matching strategies for classification of unseen casesJerzy W. Grzymala-Busse, Gustavo P. Sudre. 800-805 [doi]
- The roots of granular computingAndrzej Bargiela, Witold Pedrycz. 806-809 [doi]