2499 | -- | 2513 | Hemant Kumar Singh, Tapabrata Ray, Warren Smith. C-PSA: Constrained Pareto simulated annealing for constrained multi-objective optimization |
2514 | -- | 2527 | Yaodong Ni, Lei Xie, Zhi-Qiang Liu. Minimizing the expected complete influence time of a social network |
2528 | -- | 2539 | Yi-Chung Hu. Analytic network process for pattern classification problems using genetic algorithms |
2540 | -- | 2559 | S. Geetha, N. Ishwarya, N. Kamaraj. Evolving decision tree rule based system for audio stego anomalies detection based on Hausdorff distance statistics |
2560 | -- | 2570 | Shuqin Zhang, Wai-Ki Ching, Xi Chen, Nam-Kiu Tsing. Generating probabilistic Boolean networks from a prescribed stationary distribution |
2571 | -- | 2575 | David Walker, Shahram Latifi. Improving bounds on link failure tolerance of the star graph |
2576 | -- | 2587 | Jun Shao, Zhenfu Cao, Xiaohui Liang, Huang Lin. Proxy re-encryption with keyword search |
2588 | -- | 2595 | Yi-Ching Chen, Dyi-Rong Duh. Two-node-Hamiltonicity of enhanced pyramid networks |
2596 | -- | 2617 | Sun-Yuan Hsieh, Yi-Ru Cian. Conditional edge-fault Hamiltonicity of augmented cubes |
2618 | -- | 2632 | Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao. Secure threshold multi authority attribute based encryption without a central authority |