Journal: Inf. Sci.

Volume 180, Issue 13

2499 -- 2513Hemant Kumar Singh, Tapabrata Ray, Warren Smith. C-PSA: Constrained Pareto simulated annealing for constrained multi-objective optimization
2514 -- 2527Yaodong Ni, Lei Xie, Zhi-Qiang Liu. Minimizing the expected complete influence time of a social network
2528 -- 2539Yi-Chung Hu. Analytic network process for pattern classification problems using genetic algorithms
2540 -- 2559S. Geetha, N. Ishwarya, N. Kamaraj. Evolving decision tree rule based system for audio stego anomalies detection based on Hausdorff distance statistics
2560 -- 2570Shuqin Zhang, Wai-Ki Ching, Xi Chen, Nam-Kiu Tsing. Generating probabilistic Boolean networks from a prescribed stationary distribution
2571 -- 2575David Walker, Shahram Latifi. Improving bounds on link failure tolerance of the star graph
2576 -- 2587Jun Shao, Zhenfu Cao, Xiaohui Liang, Huang Lin. Proxy re-encryption with keyword search
2588 -- 2595Yi-Ching Chen, Dyi-Rong Duh. Two-node-Hamiltonicity of enhanced pyramid networks
2596 -- 2617Sun-Yuan Hsieh, Yi-Ru Cian. Conditional edge-fault Hamiltonicity of augmented cubes
2618 -- 2632Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao. Secure threshold multi authority attribute based encryption without a central authority