1729 | -- | 1770 | Pasquale De Meo, Alfredo Garro, Giorgio Terracina, Domenico Ursino. Personalizing learning programs with X-Learn, an XML-based, user-device adaptive multi-agent system |
1771 | -- | 1781 | Xiaofan Yang, Yuan Yan Tang. A (4n |
1782 | -- | 1788 | Qiang Zhu, Jun Ming Xu, Xinmin Hou, Min Xu. On reliability of the folded hypercubes |
1789 | -- | 1795 | Vasilios Katos, Bernard S. Doherty. Exploring confusion in product ciphers through regression analysis |
1796 | -- | 1805 | Chin-Chen Chang, Chih-Yang Lin. Reversible steganographic method using SMVQ approach based on declustering |
1806 | -- | 1833 | Habib M. Ammari. Lessons learned from the simulation experience of a three-tier multi-hop wireless Internet architecture |
1834 | -- | 1851 | Cheng-Kang Chu, Wen-Guey Tzeng. Optimal resilient threshold GQ signatures |
1852 | -- | 1859 | S. Dhompongsa, A. Kaewkhao, Satit Saejung. On topological properties of the Choquet weak convergence of capacity functionals of random sets |
1860 | -- | 1866 | Glad Deschrijver, Etienne E. Kerre. On the position of intuitionistic fuzzy set theory in the framework of theories modelling imprecision |
1867 | -- | 1877 | Ying-Ming Wang, Celik Parkan. A preemptive goal programming method for aggregating OWA operator weights in group decision making |
1878 | -- | 1891 | Wai-Tak Wong, Frank Y. Shih, Jung Liu. Shape-based image retrieval using support vector machines, Fourier descriptors and self-organizing maps |
1892 | -- | 1915 | Ranjit Kumar Barai, Kenzo Nonami. Optimal two-degree-of-freedom fuzzy control for locomotion control of a hydraulically actuated hexapod robot |
1916 | -- | 1930 | Erzsébet Németh, Rozália Lakner, Katalin M. Hangos, Ian T. Cameron. Prediction-based diagnosis and loss prevention using qualitative multi-scale models |