Journal: Inf. Sci.

Volume 177, Issue 8

1729 -- 1770Pasquale De Meo, Alfredo Garro, Giorgio Terracina, Domenico Ursino. Personalizing learning programs with X-Learn, an XML-based, user-device adaptive multi-agent system
1771 -- 1781Xiaofan Yang, Yuan Yan Tang. A (4n
1782 -- 1788Qiang Zhu, Jun Ming Xu, Xinmin Hou, Min Xu. On reliability of the folded hypercubes
1789 -- 1795Vasilios Katos, Bernard S. Doherty. Exploring confusion in product ciphers through regression analysis
1796 -- 1805Chin-Chen Chang, Chih-Yang Lin. Reversible steganographic method using SMVQ approach based on declustering
1806 -- 1833Habib M. Ammari. Lessons learned from the simulation experience of a three-tier multi-hop wireless Internet architecture
1834 -- 1851Cheng-Kang Chu, Wen-Guey Tzeng. Optimal resilient threshold GQ signatures
1852 -- 1859S. Dhompongsa, A. Kaewkhao, Satit Saejung. On topological properties of the Choquet weak convergence of capacity functionals of random sets
1860 -- 1866Glad Deschrijver, Etienne E. Kerre. On the position of intuitionistic fuzzy set theory in the framework of theories modelling imprecision
1867 -- 1877Ying-Ming Wang, Celik Parkan. A preemptive goal programming method for aggregating OWA operator weights in group decision making
1878 -- 1891Wai-Tak Wong, Frank Y. Shih, Jung Liu. Shape-based image retrieval using support vector machines, Fourier descriptors and self-organizing maps
1892 -- 1915Ranjit Kumar Barai, Kenzo Nonami. Optimal two-degree-of-freedom fuzzy control for locomotion control of a hydraulically actuated hexapod robot
1916 -- 1930Erzsébet Németh, Rozália Lakner, Katalin M. Hangos, Ian T. Cameron. Prediction-based diagnosis and loss prevention using qualitative multi-scale models