Journal: Inf. Sci.

Volume 172, Issue 3-4

281 -- 307Ali Selamat, Md. Hafiz Selamat. Analysis on the performance of mobile agents for query retrieval
309 -- 333Po-Jen Chuang, Li-Chiang Yao. An efficient reconfiguration scheme for fault-tolerant meshes
335 -- 359Chi-Chung Lee, Yungho Leu. Efficient data broadcast schemes for mobile computing environments with data missing
361 -- 395Qing Li, Ling Feng, Allan K. Y. Wong. From intra-transaction to generalized inter-transaction: Landscaping multidimensional contexts in association rule mining
397 -- 416Amit Konar, Uday Kumar Chakraborty, Paul P. Wang. Supervised learning on a fuzzy Petri net
417 -- 430Jerry M. Mendel. On a 50 savings in the computation of the centroid of a ::::symmetrical:::: interval type-2 fuzzy set

Volume 172, Issue 1-2

1 -- 40Lotfi A. Zadeh. Toward a generalized theory of uncertainty (GTU)--an outline
41 -- 71Siegfried Gottwald. Mathematical fuzzy logic as a tool for the treatment of vague information
73 -- 89Slavka Bodjanova. Median value and median interval of a fuzzy number
91 -- 129Zengchang Qin, Jonathan Lawry. Decision tree learning with fuzzy labels
131 -- 153Ivan Kojadinovic, Jean-Luc Marichal, Marc Roubens. An axiomatic approach to the definition of the entropy of a discrete Choquet capacity
155 -- 172Timo Poranen. A simulated annealing algorithm for determining the thickness of a graph
173 -- 193Kalin Penev, Guy Littlefair. Free Search - a comparative analysis
195 -- 214Hyun Kyoo Park, Jin Hyun Son, Myoung-Ho Kim. Dynamic histograms for future spatiotemporal range predicates
215 -- 240Pawan Lingras, Mofreh Hogo, Miroslav Snorek, Chad West. Temporal analysis of clusters of supermarket customers: conventional versus interval set approach
241 -- 261Dong-Her Shih, Hsiu-Sen Chiang, David C. Yen. Classification methods in the detection of new malicious emails
263 -- 280Jongbae Lee, Joonhong Lim, Chang-Woo Park. Development of ethernet based tele-operation systems using haptic devices