Journal: Inf. Sci.

Volume 181, Issue 3

379 -- 397Stéphane Zieba, Philippe Polet, Frédéric Vanderhaegen. Using adjustable autonomy and human-machine cooperation to make a human-machine system resilient - Application to a ground robotic system
398 -- 418Yen-Liang Chen, Shin-yi Wu, Yu-Cheng Wang. Discovering multi-label temporal patterns in sequence databases
419 -- 434Gunjan Mansingh, Kweku-Muata Osei-Bryson, Han Reichgelt. Using ontologies to facilitate post-processing of association rules by domain experts
435 -- 449Jaegyoon Ahn, Youngmi Yoon, Sanghyun Park. Noise-robust algorithm for identifying functionally associated biclusters from gene expression data
450 -- 465Santi P. Maity, Malay K. Kundu. Perceptually adaptive spread transform image watermarking scheme using Hadamard transform
466 -- 478Bernard De Baets, Hans De Meyer, Radko Mesiar. Piecewise linear aggregation functions based on triangulation
479 -- 502Ting-Yu Chen. Optimistic and pessimistic decision making with dissonance reduction using interval-valued fuzzy sets
503 -- 518Daoyuan Zhai, Jerry M. Mendel. Uncertainty measures for general Type-2 fuzzy sets
519 -- 535Cecilia Leal Ramírez, Oscar Castillo, Patricia Melin, Antonio Rodríguez Díaz. Simulation of the bird age-structured population growth based on an interval type-2 fuzzy cellular structure
536 -- 546Przemyslaw Grzegorzewski. The inclusion-exclusion principle for IF-events
547 -- 551Frank Markham Brown. Comments on a numerical method for solving Boolean equations
552 -- 566Elizabeth Montero, María-Cristina Riff. On-the-fly calibrating strategies for evolutionary algorithms
567 -- 581Yun Wen, Hua Xu, Jiadong Yang. A heuristic-based hybrid genetic-variable neighborhood search algorithm for task scheduling in heterogeneous multiprocessor system
582 -- 599Yi-Kuei Lin, Cheng-Ta Yeh. Computer network reliability optimization under double-resource assignments subject to a transmission budget
600 -- 619Ana Cristina Vieira de Melo, Paulo Silveira. Improving data perturbation testing techniques for Web services
620 -- 627Jheng-Cheng Chen, Chang-Hsiung Tsai. Conditional edge-fault-tolerant Hamiltonicity of dual-cubes
628 -- 647Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang. Provably secure identity-based authenticated key agreement protocols with malicious private key generators
648 -- 660Jia Yu, Rong Hao, Fanyu Kong, Xiangguo Cheng, Jianxi Fan, Yangkui Chen. Forward-secure identity-based signature: Security notions and construction
661 -- 667Jian Weng, Guoxiang Yao, Robert H. Deng, Min-Rong Chen, Xiangxue Li. Cryptanalysis of a certificateless signcryption scheme in the standard model
668 -- 685Quan-ke Pan, Ling Wang, Liang Gao, W. D. Li. An effective hybrid discrete differential evolution algorithm for the flow shop scheduling with intermediate buffers
686 -- 696Hongbo Song, Li Yu, Wen-an Zhang. Networked H::infinity:: filtering for linear discrete-time systems
697 -- 0V. Alba Fernández, M. D. Jiménez-Gamero, B. Lagos-Álvarez. Erratum to Divergence statistics for testing uniform association in cross-classifications [Inform. Sci. 180 (2010) 4557-4571]