379 | -- | 397 | Stéphane Zieba, Philippe Polet, Frédéric Vanderhaegen. Using adjustable autonomy and human-machine cooperation to make a human-machine system resilient - Application to a ground robotic system |
398 | -- | 418 | Yen-Liang Chen, Shin-yi Wu, Yu-Cheng Wang. Discovering multi-label temporal patterns in sequence databases |
419 | -- | 434 | Gunjan Mansingh, Kweku-Muata Osei-Bryson, Han Reichgelt. Using ontologies to facilitate post-processing of association rules by domain experts |
435 | -- | 449 | Jaegyoon Ahn, Youngmi Yoon, Sanghyun Park. Noise-robust algorithm for identifying functionally associated biclusters from gene expression data |
450 | -- | 465 | Santi P. Maity, Malay K. Kundu. Perceptually adaptive spread transform image watermarking scheme using Hadamard transform |
466 | -- | 478 | Bernard De Baets, Hans De Meyer, Radko Mesiar. Piecewise linear aggregation functions based on triangulation |
479 | -- | 502 | Ting-Yu Chen. Optimistic and pessimistic decision making with dissonance reduction using interval-valued fuzzy sets |
503 | -- | 518 | Daoyuan Zhai, Jerry M. Mendel. Uncertainty measures for general Type-2 fuzzy sets |
519 | -- | 535 | Cecilia Leal Ramírez, Oscar Castillo, Patricia Melin, Antonio Rodríguez Díaz. Simulation of the bird age-structured population growth based on an interval type-2 fuzzy cellular structure |
536 | -- | 546 | Przemyslaw Grzegorzewski. The inclusion-exclusion principle for IF-events |
547 | -- | 551 | Frank Markham Brown. Comments on a numerical method for solving Boolean equations |
552 | -- | 566 | Elizabeth Montero, María-Cristina Riff. On-the-fly calibrating strategies for evolutionary algorithms |
567 | -- | 581 | Yun Wen, Hua Xu, Jiadong Yang. A heuristic-based hybrid genetic-variable neighborhood search algorithm for task scheduling in heterogeneous multiprocessor system |
582 | -- | 599 | Yi-Kuei Lin, Cheng-Ta Yeh. Computer network reliability optimization under double-resource assignments subject to a transmission budget |
600 | -- | 619 | Ana Cristina Vieira de Melo, Paulo Silveira. Improving data perturbation testing techniques for Web services |
620 | -- | 627 | Jheng-Cheng Chen, Chang-Hsiung Tsai. Conditional edge-fault-tolerant Hamiltonicity of dual-cubes |
628 | -- | 647 | Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang. Provably secure identity-based authenticated key agreement protocols with malicious private key generators |
648 | -- | 660 | Jia Yu, Rong Hao, Fanyu Kong, Xiangguo Cheng, Jianxi Fan, Yangkui Chen. Forward-secure identity-based signature: Security notions and construction |
661 | -- | 667 | Jian Weng, Guoxiang Yao, Robert H. Deng, Min-Rong Chen, Xiangxue Li. Cryptanalysis of a certificateless signcryption scheme in the standard model |
668 | -- | 685 | Quan-ke Pan, Ling Wang, Liang Gao, W. D. Li. An effective hybrid discrete differential evolution algorithm for the flow shop scheduling with intermediate buffers |
686 | -- | 696 | Hongbo Song, Li Yu, Wen-an Zhang. Networked H::infinity:: filtering for linear discrete-time systems |
697 | -- | 0 | V. Alba Fernández, M. D. Jiménez-Gamero, B. Lagos-Álvarez. Erratum to Divergence statistics for testing uniform association in cross-classifications [Inform. Sci. 180 (2010) 4557-4571] |