Journal: Inf. Sci.

Volume 181, Issue 1

1 -- 22Michel Grabisch, Jean-Luc Marichal, Radko Mesiar, Endre Pap. Aggregation functions: Means
23 -- 43Michel Grabisch, Jean-Luc Marichal, Radko Mesiar, Endre Pap. Aggregation functions: Construction methods, conjunctive, disjunctive and mixed classes
44 -- 56Eduardo Fernandez, Edy Lopez, Fernando Lopez, Carlos A. Coello Coello. Increasing selective pressure towards the best compromise in evolutionary multiobjective optimization: The extended NOSGA method
57 -- 78Matthias Dehmer, Abbe Mowshowitz. A history of graph entropy measures
79 -- 91Nizar Hachicha, Bassem Jarboui, Patrick Siarry. A fuzzy logic control using a differential evolution algorithm aimed at modelling the financial market dynamics
92 -- 105Laihong Hu, Fuchun Sun, Hualong Xu, Huaping Liu, Xuejun Zhang. Mutation Hopfield neural network and its applications
106 -- 114Yuehui Chen, Bin Yang, Qingfang Meng, Yaou Zhao, Ajith Abraham. Time-series forecasting using a system of ordinary differential equations
115 -- 128Sebastián Maldonado, Richard Weber, Jayanta Basak. Simultaneous feature selection and classification using kernel-penalized support vector machines
129 -- 149S. J. Overbeek, Patrick van Bommel, Henderik Alex Proper. Statics and dynamics of cognitive and qualitative matchmaking in task fulfillment
150 -- 162Zeshui Xu, Xiaoqiang Cai. Group consensus algorithms based on preference relations
163 -- 183Hai Zhao, Chunyu Kit. Integrating unsupervised and supervised word segmentation: The role of goodness measures
184 -- 200Z. M. Ma, Jian Liu, Li Yan. Matching twigs in fuzzy XML
201 -- 216Kelvin Sim, Guimei Liu, Vivekanand Gopalkrishnan, Jinyan Li. A case study on financial ratios via cross-graph quasi-bicliques
217 -- 226Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang. A communication-efficient three-party password authenticated key exchange protocol
227 -- 233Ercan Solak, Cahit Çokal. Algebraic break of image ciphers based on discretized chaotic map lattices
234 -- 238Junghyun Nam, Juryon Paik, Dongho Won. A security weakness in Abdalla et al. s generic construction of a group key exchange protocol
239 -- 256Yonghong Xiang, Iain A. Stewart. Augmented k-ary n-cubes