1423 | -- | 1441 | Mathieu Serrurier, Henri Prade. Improving inductive logic programming by using simulated annealing |
1442 | -- | 1460 | Deja Hepziba Francis, Sanjay Kumar Madria, Chaman L. Sabharwal. A scalable constraint-based Q-hash indexing for moving objects |
1461 | -- | 1478 | Hyo-Sang Lim, Kyu-Young Whang, Yang-Sae Moon. Similar sequence matching supporting variable-length and variable-tolerance continuous queries on time-series data stream |
1479 | -- | 1497 | Fabrizio Angiulli, Eugenio Cesario, Clara Pizzuti. Random walk biclustering for microarray data |
1498 | -- | 1518 | Enhong Chen, Huanhuan Cao, Qing Li, Tieyun Qian. Efficient strategies for tough aggregate constraint-based sequential pattern mining |
1519 | -- | 1532 | Ben Zhang, John C. Lusth. Computing with random quantum dot repulsion |
1533 | -- | 1541 | Dongmin Choi, Okbin Lee, Ilyong Chung. A parallel routing algorithm on recursive cube of rings networks employing Hamiltonian circuit Latin square |
1542 | -- | 1557 | Robert Meolic, Tatjana Kapus, Zmago Brezocnik. ACTLW - An action-based computation tree logic with unless operator |
1558 | -- | 1597 | Kai-Yuan Cai, Zhao Dong, Ke Liu. Software testing processes as a linear dynamic system |
1598 | -- | 1602 | Di Xiao, Xiaofeng Liao, Shaojiang Deng. Using time-stamp to improve the security of a chaotic maps-based key agreement protocol |
1603 | -- | 1610 | Yifeng Yin, Xinshe Li, Yupu Hu. Fast S-box security mechanism research based on the polymorphic cipher |
1611 | -- | 1628 | S. S. Manvi, M. S. Kakkasageri. Multicast routing in mobile ad hoc networks by using a multiagent system |
1629 | -- | 1640 | Shang Ming Zhou, John Q. Gan, Francisco Sepulveda. Classifying mental tasks based on features of higher-order statistics from EEG signals in brain-computer interface |
1641 | -- | 1650 | Wen-Liang Hung, Miin-Shen Yang. On the J-divergence of intuitionistic fuzzy sets with its application to pattern recognition |
1651 | -- | 1662 | Guilong Liu. Generalized rough sets over fuzzy lattices |
1663 | -- | 1679 | Mohamed Abd El-Hady Kassem. Stability of vector optimization problems with fuzzy weights in the objective functions and fuzzy matrix parameters in the constraints |
1680 | -- | 1695 | Jiuxiang Dong, Guang-Hong Yang. State feedback control of continuous-time T-S fuzzy systems via switched fuzzy controllers |
1696 | -- | 1716 | Ming-Ying Hsiao, Tzuu-Hseng S. Li, Jia-Zhen Lee, Chan-Hong Chao, Shun-Hung Tsai. Design of interval type-2 fuzzy sliding-mode controller |
1717 | -- | 1733 | Metin Dagdeviren, Ihsan Yüksel. Developing a fuzzy analytic hierarchy process (AHP) model for behavior-based safety management |
1734 | -- | 1755 | Pankaj Gupta, Mukesh Kumar Mehlawat, Anand Saxena. Asset portfolio optimization using fuzzy mathematical programming |
1756 | -- | 1779 | Rosana Rodríguez-López. Comparison results for fuzzy differential equations |
1780 | -- | 1782 | Tofigh Allahviranloo, N. Ahmady, E. Ahmady. Erratum to Numerical solution of fuzzy differential equations by predictor-corrector method [Inf Sci 177 (7) (2007) 1633-1647] |