Journal: Inf. Sci.

Volume 180, Issue 16

2915 -- 2924Ying Zhao, Yanyu Lu, Yukun Tian, Liming Li, QiuShi Ren, Xinyu Chai. Image processing based recognition of images with a limited number of pixels using simulated prosthetic vision
2925 -- 2939Shao-Hu Peng, Deok-Hwan Kim, Seok-Lyong Lee, Chin-Wan Chung. A visual shape descriptor using sectors and shape context of contour lines
2940 -- 2959Sun Zheng. An intensive restraint topology adaptive snake model and its application in tracking dynamic image sequence
2960 -- 2978Tongyan Li, Xingming Li. Novel alarm correlation analysis system based on association rules mining in telecommunication networks
2979 -- 2990Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee, Murad Khalid, Ravi Sankar. Activity-oriented access control to ubiquitous hospital information and services
2991 -- 3005Zuqiang Long, Ximing Liang, Lirong Yang. Some approximation properties of adaptive fuzzy systems with variable universe of discourse
3006 -- 3020Bart Van Gasse, Glad Deschrijver, Chris Cornelis, Etienne E. Kerre. Filters of residuated lattices and triangle algebras
3021 -- 3032Bijan Davvaz, M. Fathi, A. R. Salleh. Fuzzy hyperrings (H::v::-rings) based on fuzzy universal sets
3033 -- 3044Mohammad Hossein Fazel Zarandi, Adel Alaeddini. A general fuzzy-statistical clustering approach for estimating the time of change in variable sampling control charts
3045 -- 3058Chin-Chen Chang, The Duc Kieu. A reversible data hiding scheme using complementary embedding strategy
3059 -- 3064Lein Harn, Changlu Lin. Strong (n, t, n) verifiable secret sharing scheme