4909 | -- | 4927 | Wei Chu, Xiaogang Gao, Soroosh Sorooshian. A new evolutionary search strategy for global optimization of high-dimensional problems |
4928 | -- | 4942 | Fan Min, Huaping He, Yuhua Qian, William Zhu. Test-cost-sensitive attribute reduction |
4943 | -- | 4958 | Gianluigi Ciocca, Claudio Cusano, Simone Santini, Raimondo Schettini. Halfway through the semantic gap: Prosemantic features for image retrieval |
4959 | -- | 4968 | Yi-Chung Hu, Chiung-Jung Chen. A PROMETHEE-based classification method using concordance and discordance relations and its application to bankruptcy prediction |
4969 | -- | 4992 | Ondrej Pavlacka. Modeling uncertain variables of the weighted average operation by fuzzy vectors |
4993 | -- | 5009 | Latifa Ben Arfa Rabai, Yanzhi Bai, Ali Mili. A quantitative model for software engineering trends |
5010 | -- | 5028 | Woong-Kee Loh, Sandeep Mane, Jaideep Srivastava. Mining temporal patterns in popularity of web items |
5029 | -- | 5041 | Hong Yan, Quanling Wei. Data envelopment analysis classification machine |
5042 | -- | 5052 | Chuanfei Dong, Carol S. Paty. Application of adaptive weights to intelligent information systems: An intelligent transportation system as a case study |
5053 | -- | 5066 | Tzer-jen Wei. Communication efficient shuffle for mental poker protocols |
5067 | -- | 5083 | Thomas W. Cusick. Affine equivalence of cubic homogeneous rotation symmetric functions |
5084 | -- | 5101 | Po-Jen Chuang, Yu-Shian Chiu. Efficient cache invalidation schemes for mobile data accesses |
5102 | -- | 5109 | Young Bae Jun, Seok-Zun Song. Codes based on BCK-algebras |
5110 | -- | 5118 | Fei Chen, Xiaofeng Liao, Tao Xiang, Hongying Zheng. Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring Z::N:: |
5119 | -- | 5122 | Alexandra Siposová. A note on continuity in scalarization for multicriteria optimization problems |