1 | -- | 22 | Michel Grabisch, Jean-Luc Marichal, Radko Mesiar, Endre Pap. Aggregation functions: Means |
23 | -- | 43 | Michel Grabisch, Jean-Luc Marichal, Radko Mesiar, Endre Pap. Aggregation functions: Construction methods, conjunctive, disjunctive and mixed classes |
44 | -- | 56 | Eduardo Fernandez, Edy Lopez, Fernando Lopez, Carlos A. Coello Coello. Increasing selective pressure towards the best compromise in evolutionary multiobjective optimization: The extended NOSGA method |
57 | -- | 78 | Matthias Dehmer, Abbe Mowshowitz. A history of graph entropy measures |
79 | -- | 91 | Nizar Hachicha, Bassem Jarboui, Patrick Siarry. A fuzzy logic control using a differential evolution algorithm aimed at modelling the financial market dynamics |
92 | -- | 105 | Laihong Hu, Fuchun Sun, Hualong Xu, Huaping Liu, Xuejun Zhang. Mutation Hopfield neural network and its applications |
106 | -- | 114 | Yuehui Chen, Bin Yang, Qingfang Meng, Yaou Zhao, Ajith Abraham. Time-series forecasting using a system of ordinary differential equations |
115 | -- | 128 | Sebastián Maldonado, Richard Weber, Jayanta Basak. Simultaneous feature selection and classification using kernel-penalized support vector machines |
129 | -- | 149 | S. J. Overbeek, Patrick van Bommel, Henderik Alex Proper. Statics and dynamics of cognitive and qualitative matchmaking in task fulfillment |
150 | -- | 162 | Zeshui Xu, Xiaoqiang Cai. Group consensus algorithms based on preference relations |
163 | -- | 183 | Hai Zhao, Chunyu Kit. Integrating unsupervised and supervised word segmentation: The role of goodness measures |
184 | -- | 200 | Z. M. Ma, Jian Liu, Li Yan. Matching twigs in fuzzy XML |
201 | -- | 216 | Kelvin Sim, Guimei Liu, Vivekanand Gopalkrishnan, Jinyan Li. A case study on financial ratios via cross-graph quasi-bicliques |
217 | -- | 226 | Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang. A communication-efficient three-party password authenticated key exchange protocol |
227 | -- | 233 | Ercan Solak, Cahit Çokal. Algebraic break of image ciphers based on discretized chaotic map lattices |
234 | -- | 238 | Junghyun Nam, Juryon Paik, Dongho Won. A security weakness in Abdalla et al. s generic construction of a group key exchange protocol |
239 | -- | 256 | Yonghong Xiang, Iain A. Stewart. Augmented k-ary n-cubes |