1333 | -- | 1348 | Ming-Chuan Hung, Man-Lin Huang, Don-Lin Yang, Nien-Lin Hsueh. Efficient approaches for materialized views selection in a data warehouse |
1349 | -- | 1363 | Bo Xie, Peng Han, Fan Yang, Ruimin Shen, Hua-Jun Zeng, Zheng Chen. DCFLA: A distributed collaborative-filtering neighbor-locating algorithm |
1364 | -- | 1375 | Junghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won. Security weakness in a three-party pairing-based protocol for password authenticated key exchange |
1376 | -- | 1381 | Wei-Bin Lee, Chia Chun Wu, Woei-Jiunn Tsaur. A novel deniable authentication protocol using generalized ElGamal signature scheme |
1382 | -- | 1394 | Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian. Simulatability and security of certificateless threshold signatures |
1395 | -- | 1412 | Shu Li, John E. Taplin, Yuching Zhang. The equate-to-differentiate s way of seeing the prisoner s dilemma |
1413 | -- | 1421 | Hongxuan Lei, Yongming Li. Minimization of states in automata theory based on finite lattice-ordered monoids |
1422 | -- | 1429 | Young Bae Jun, Yang Xu, Jun Ma. Redefined fuzzy implicative filters |
1430 | -- | 1440 | Adrian Ban, Ioan Fechete. Componentwise decomposition of some lattice-valued fuzzy integrals |
1441 | -- | 1451 | R. Toscano. Robust synthesis of a PID controller by uncertain multimodel approach |
1452 | -- | 1462 | Abbas Parchami, Mashaallah Mashinchi. Fuzzy estimation for process capability indices |
1463 | -- | 1480 | Murat Gülbay, Cengiz Kahraman. An alternative approach to fuzzy control charts: Direct fuzzy approach |
1481 | -- | 1498 | Antonio di Nola, Ciro Russo. Lukasiewicz transform and its application to compression and reconstruction of digital images |
1499 | -- | 1508 | William Zhu. Topological approaches to covering rough sets |
1509 | -- | 1522 | Huai-Ning Wu, Kai-Yuan Cai. Robust fuzzy control for uncertain discrete-time nonlinear Markovian jump systems without mode observations |
1523 | -- | 1529 | Ismail H. Toroslu, Göktürk Üçoluk. Incremental assignment problem |