699 | -- | 716 | Cory J. Butz, Shan Hua, J. Chen, H. Yao. A simple graphical approach for understanding probabilistic inference in Bayesian networks |
717 | -- | 728 | Bart Van Gasse, Chris Cornelis, Glad Deschrijver, Etienne E. Kerre. The pseudo-linear semantics of interval-valued fuzzy logics |
729 | -- | 741 | José M. Merigó, Anna Maria Gil Lafuente. The induced generalized OWA operator |
742 | -- | 757 | Janusz T. Starczewski. Extended triangular norms |
758 | -- | 768 | K. P. Girish, Sunil Jacob John. Relations and functions in multiset context |
769 | -- | 790 | Moe Thandar Wynn, H. M. W. Verbeek, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, David Edmond. Soundness-preserving reduction rules for reset workflow nets |
791 | -- | 808 | Chun-Hsiang Huang, Ja-Ling Wu. Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes |
809 | -- | 819 | Lizhi Peng, Bo Yang, Yuehui Chen, Ajith Abraham. Data gravitation based classification |
820 | -- | 829 | Peijun Guo. Fuzzy data envelopment analysis and its application to location problems |
830 | -- | 843 | Yu Ma, Xiaodong Gu, Yuanyuan Wang. Color discrimination enhancement for dichromats using self-organizing color transformation |
844 | -- | 850 | Jang Hee Lee, Sung Ho Ha. Recognizing yield patterns through hybrid applications of machine learning techniques |
851 | -- | 857 | Ping-Ying Tsai, Jung-Sheng Fu, Gen-Huey Chen. Embedding Hamiltonian cycles in alternating group graphs under conditional fault model |
858 | -- | 865 | Bin Wang, ZhaoXia Song. A non-interactive deniable authentication scheme based on designated verifier proofs |