Journal: Inf. Sci.

Volume 176, Issue 20

2933 -- 2959Ronald R. Yager. OWA trees and their role in security modeling using attack trees
2960 -- 2987Hui Li, Scott Dick. A similarity measure for fuzzy rulebases based on linguistic gradients
2988 -- 3010Hajime Nobuhara, Barnabás Bede, Kaoru Hirota. On various eigen fuzzy sets and their application to image reconstruction
3011 -- 3025Funda Karaçal. On the direct decomposability of strong negations and ::::S::::-implication operators on product lattices
3026 -- 3059Ewa Straszecka. Combining uncertainty and imprecision in models of medical diagnosis
3060 -- 3078Jun Zhang, Yu Zhou, Fanyuan Ma, Gu Dawu, Yingcai Bai. An extension of secure group communication using key graph
3079 -- 3093Young Bae Jun, Seok-Zun Song. Generalized fuzzy interior ideals in semigroups
3094 -- 3103I. Ahmad, Z. Husain. Second order (::::F::::, ::::alpha::::, ::::rho::::, ::::d::::)-convexity and duality in multiobjective programming