5141 | -- | 5142 | Paul P. Wang. Guest Editorial |
5143 | -- | 5152 | Ibrahim Ozkan, I. Burhan Türksen. Upper and lower values for the level of fuzziness in FCM |
5153 | -- | 5162 | Kemal Kilic, Özge Uncu, I. Burhan Türksen. Comparison of different strategies of utilizing fuzzy clustering in structure identification |
5163 | -- | 5177 | Asli Çelikyilmaz, I. Burhan Türksen. Fuzzy functions with support vector machines |
5178 | -- | 5190 | Weiyin Fei. Optimal consumption and portfolio choice with ambiguity and anticipation |
5191 | -- | 5202 | Feyzan Arikan, Zülal Güngör. A two-phase approach for multi-objective programming problems with fuzzy coefficients |
5203 | -- | 5218 | Mirza Mohd. Sufyan Beg, Nesar Ahmad. Web search enhancement by mining user actions |
5219 | -- | 5236 | Rifat Gürcan Özdemir, Günes Gençyilmaz, Tülin Aktin. The modified fuzzy art and a two-stage clustering approach to cell design |
5237 | -- | 5252 | Yildiray Turhan, Sezai Tokat, Recep Eren. Statistical and computational intelligence tools for the analyses of warp tension in different back-rest oscillations |
5253 | -- | 5274 | Adem Göleç, Harun Taskin. Novel methodologies and a comparative study for manufacturing systems performance evaluations |
5275 | -- | 5291 | Challa S. Sastry, Sanjay Rawat, Arun K. Pujari, Ved Prakash Gulati. Network traffic analysis using singular value decomposition and multiscale transforms |
5292 | -- | 5315 | Christos Riziotis, Athanasios V. Vasilakos. Computational intelligence in photonics technology and optical networks: A survey and future perspectives |
5316 | -- | 5328 | Jia-Hwa Wu, Chih-Ping Chu. An exact data dependence testing method for quadratic expressions |
5329 | -- | 5346 | G. Peter Zhang. A neural network ensemble method with jittered training data for time series forecasting |
5347 | -- | 5364 | Rafael Álvarez, José-Vicente Noguera, Leandro Tortosa, Antonio Zamora. A mesh optimization algorithm based on neural networks |
5365 | -- | 5377 | Jianmin Ma, Wen-Xiu Zhang, Yee Leung, Xiaoxue Song. Granular computing and dual Galois connection |
5378 | -- | 5393 | Dongrui Wu, Jerry M. Mendel. Uncertainty measures for interval type-2 fuzzy sets |
5394 | -- | 5403 | Yurilev Chalco-Cano, Heriberto Román-Flores, Marko Antonio Rojas-Medar, O. R. Saavedra, María-Dolores Jiménez-Gamero. The extension principle and a decomposition of fuzzy sets |
5404 | -- | 5414 | Xiaoxia Huang. A new perspective for optimal portfolio selection with random fuzzy returns |
5415 | -- | 5431 | Yang-Sae Moon, Jinho Kim. Efficient moving average transform-based subsequence matching algorithms in time-series databases |
5432 | -- | 5440 | Zuhua Shao. A provably secure short signature scheme based on discrete logarithms |
5441 | -- | 5467 | Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won. Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks |
5468 | -- | 5483 | Divyesh Shah, Sheng Zhong. Two methods for privacy preserving data mining with malicious participants |
5484 | -- | 5503 | San-Yih Hwang, Haojun Wang, Jian Tang, Jaideep Srivastava. A probabilistic approach to modeling and estimating the QoS of web-services-based workflows |