Journal: Inf. Sci.

Volume 177, Issue 9

1931 -- 1953Yon Dohn Chung, Ji Yeon Lee. An indexing method for wireless broadcast XML data
1954 -- 1962Emilios Cambouropoulos, Maxime Crochemore, Costas S. Iliopoulos, Manal Mohamed, Marie-France Sagot. All maximal-pairs in step-leap representation of melodic sequence
1963 -- 1976Markku Siermala, Martti Juhola, Jorma Laurikkala, Kati Iltanen, Erna Kentala, Ilmari Pyykkö. Evaluation and classification of otoneurological data with new data analysis methods based on machine learning
1977 -- 1991Nguyen Van Hop. Solving fuzzy (stochastic) linear programming problems using superiority and inferiority measures
1992 -- 1995Jihad Mohamad Jaam. A new construction technique of a triangle-free 3-colored K16 s

Volume 177, Issue 8

1729 -- 1770Pasquale De Meo, Alfredo Garro, Giorgio Terracina, Domenico Ursino. Personalizing learning programs with X-Learn, an XML-based, user-device adaptive multi-agent system
1771 -- 1781Xiaofan Yang, Yuan Yan Tang. A (4n
1782 -- 1788Qiang Zhu, Jun Ming Xu, Xinmin Hou, Min Xu. On reliability of the folded hypercubes
1789 -- 1795Vasilios Katos, Bernard S. Doherty. Exploring confusion in product ciphers through regression analysis
1796 -- 1805Chin-Chen Chang, Chih-Yang Lin. Reversible steganographic method using SMVQ approach based on declustering
1806 -- 1833Habib M. Ammari. Lessons learned from the simulation experience of a three-tier multi-hop wireless Internet architecture
1834 -- 1851Cheng-Kang Chu, Wen-Guey Tzeng. Optimal resilient threshold GQ signatures
1852 -- 1859S. Dhompongsa, A. Kaewkhao, Satit Saejung. On topological properties of the Choquet weak convergence of capacity functionals of random sets
1860 -- 1866Glad Deschrijver, Etienne E. Kerre. On the position of intuitionistic fuzzy set theory in the framework of theories modelling imprecision
1867 -- 1877Ying-Ming Wang, Celik Parkan. A preemptive goal programming method for aggregating OWA operator weights in group decision making
1878 -- 1891Wai-Tak Wong, Frank Y. Shih, Jung Liu. Shape-based image retrieval using support vector machines, Fourier descriptors and self-organizing maps
1892 -- 1915Ranjit Kumar Barai, Kenzo Nonami. Optimal two-degree-of-freedom fuzzy control for locomotion control of a hydraulically actuated hexapod robot
1916 -- 1930Erzsébet Németh, Rozália Lakner, Katalin M. Hangos, Ian T. Cameron. Prediction-based diagnosis and loss prevention using qualitative multi-scale models

Volume 177, Issue 7

1531 -- 1532Cengiz Kahraman. Fuzzy set applications in industrial engineering
1533 -- 1542Luis Martínez, Jun Liu, Da Ruan, Jian-Bo Yang. Dealing with heterogeneous information in engineering evaluation processes
1543 -- 1557Patricia Melin, Oscar Castillo. An intelligent hybrid approach for industrial quality control combining neural networks, fuzzy logic and fractal theory
1558 -- 1566Guoqing Chen, Ming Ren, Peng Yan, Xunhua Guo. Enriching the ER model based on discovered association rules
1567 -- 1582Cengiz Kahraman, Gülçin Büyüközkan, Nüfer Yasin Ates. A two phase multi-attribute decision-making approach for new product introduction
1583 -- 1592Chongfu Huang, Hiroshi Inoue. Soft risk maps of natural disasters and their applications to decision-making
1593 -- 1608Anthony J. T. Lee, Ruey-Wen Hong, Wei-Min Ko, Wen-Kwang Tsao, Hsiu-Hui Lin. Mining spatial association rules in image databases
1609 -- 1632Chang-Tien Lu, Yufeng Kou, Jiang Zhao, Li Chen. Detecting and tracking regional outliers in meteorological data
1633 -- 1647Tofigh Allahviranloo, N. Ahmady, E. Ahmady. Numerical solution of fuzzy differential equations by predictor-corrector method
1648 -- 1662Barnabás Bede, Imre J. Rudas, Attila L. Bencsik. First order linear fuzzy differential equations under generalized differentiability
1663 -- 1672Bin Liu, Xinzhi Liu, Kok Lay Teo. Feedback stabilization of dissipative impulsive dynamical systems
1673 -- 1686Yi-Chung Hu. Fuzzy integral-based perceptron for two-class pattern classification problems
1687 -- 1698Cristina Alcalde, Ana Burusco, Ramón Fuentes-González. Ambiguity and fuzziness measures defined on the set of closed intervals in [0, 1]
1699 -- 1714Wudhichai Assawinchaichote, Sing Kiong Nguang, Peng Shi. Robust ::::H::::::infinity:: fuzzy filter design for uncertain nonlinear singularly perturbed systems with Markovian jumps: An LMI approach
1715 -- 1727Violeta Tomasevic, Slobodan Bojanic, Octavio Nieto-Taladriz. Finding an internal state of RC4 stream cipher

Volume 177, Issue 6

1333 -- 1348Ming-Chuan Hung, Man-Lin Huang, Don-Lin Yang, Nien-Lin Hsueh. Efficient approaches for materialized views selection in a data warehouse
1349 -- 1363Bo Xie, Peng Han, Fan Yang, Ruimin Shen, Hua-Jun Zeng, Zheng Chen. DCFLA: A distributed collaborative-filtering neighbor-locating algorithm
1364 -- 1375Junghyun Nam, Youngsook Lee, Seungjoo Kim, Dongho Won. Security weakness in a three-party pairing-based protocol for password authenticated key exchange
1376 -- 1381Wei-Bin Lee, Chia Chun Wu, Woei-Jiunn Tsaur. A novel deniable authentication protocol using generalized ElGamal signature scheme
1382 -- 1394Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian. Simulatability and security of certificateless threshold signatures
1395 -- 1412Shu Li, John E. Taplin, Yuching Zhang. The equate-to-differentiate s way of seeing the prisoner s dilemma
1413 -- 1421Hongxuan Lei, Yongming Li. Minimization of states in automata theory based on finite lattice-ordered monoids
1422 -- 1429Young Bae Jun, Yang Xu, Jun Ma. Redefined fuzzy implicative filters
1430 -- 1440Adrian Ban, Ioan Fechete. Componentwise decomposition of some lattice-valued fuzzy integrals
1441 -- 1451R. Toscano. Robust synthesis of a PID controller by uncertain multimodel approach
1452 -- 1462Abbas Parchami, Mashaallah Mashinchi. Fuzzy estimation for process capability indices
1463 -- 1480Murat Gülbay, Cengiz Kahraman. An alternative approach to fuzzy control charts: Direct fuzzy approach
1481 -- 1498Antonio di Nola, Ciro Russo. Lukasiewicz transform and its application to compression and reconstruction of digital images
1499 -- 1508William Zhu. Topological approaches to covering rough sets
1509 -- 1522Huai-Ning Wu, Kai-Yuan Cai. Robust fuzzy control for uncertain discrete-time nonlinear Markovian jump systems without mode observations
1523 -- 1529Ismail H. Toroslu, Göktürk Üçoluk. Incremental assignment problem

Volume 177, Issue 5

1153 -- 1168Shu-Heng Chen. Computationally intelligent agents in economics and finance
1169 -- 1179Raquel Flórez López. Strategic supplier selection in the added-value perspective: A CI approach
1180 -- 1192Zhineng Zhu, Haibo He, Janusz A. Starzyk, C. Tseng. Self-organizing learning array and its application to economic and financial problems
1193 -- 1203Ping-Chen Lin, Jiah-Shing Chen. FuzzyTree crossover for multi-valued stock valuation
1204 -- 1221Domenico Delli Gatti, Edoardo Gaffeo, Mauro Gallegati, Gianfranco Giulioni, Alan Kirman, Antonio Palestrini, Alberto Russo. Complex dynamics and empirical evidence
1222 -- 1229Shu-Heng Chen, Ya-Chi Huang. Relative risk aversion and wealth dynamics
1230 -- 1247Ying-Ming Wang, Jian-Bo Yang, Dong-Ling Xu, Kwai-Sang Chin. On the combination and normalization of interval-valued belief structures
1248 -- 1264Ismail Ellabib, Paul H. Calamai, Otman A. Basir. Exchange strategies for multiple Ant Colony System
1265 -- 1275Qiu-Hua Lin, Yong-Rui Zheng, Fuliang Yin, Hualou Liang, Vince D. Calhoun. A fast algorithm for one-unit ICA-R
1276 -- 1289Ester Yen, I-Wen Mike Chu. Relaxing instance boundaries for the search of splitting points of numerical attributes in classification trees
1290 -- 1308Prodip Bhowal, Dipankar Sarkar, Siddhartha Mukhopadhyay, Anupam Basu. Fault diagnosis in discrete time hybrid systems - A case study
1309 -- 1331Ali Saman Tosun. Threshold-based declustering

Volume 177, Issue 4

969 -- 987Marion G. Ceruti, Stuart Harvey Rubin. Infodynamics: Analogical analysis of states of matter and information
988 -- 1006Jerry M. Mendel. Computing with words and its relationships with fuzzistics
1007 -- 1026Xiaodong Liu, Tianyou Chai, Wei Wang, Wanquan Liu. Approaches to the representations and logic operations of fuzzy concepts in the framework of axiomatic fuzzy set theory I
1027 -- 1045Xiaodong Liu, Wei Wang, Tianyou Chai, Wanquan Liu. Approaches to the representations and logic operations of fuzzy concepts in the framework of axiomatic fuzzy set theory II
1046 -- 1062Jun Ma, Wenjiang Li, Da Ruan, Yang Xu. Filter-based resolution principle for lattice-valued propositional logic LP(::::X::::)
1063 -- 1072Huan Huang, Congxin Wu. On the triangle inequalities in fuzzy metric spaces
1073 -- 1087Tzu-Chao Lin. A new adaptive center weighted median filter for suppressing impulsive noise in images
1088 -- 1122Ling Shao, Timor Kadir, Michael Brady. Geometric and photometric invariant distinctive regions detection
1123 -- 1135Yu Wang, Marc Q. Ma, Kai Zhang, Frank Y. Shih. A hierarchical refinement algorithm for fully automatic gridding in spotted DNA microarray image processing
1136 -- 1142Di Xiao, Xiaofeng Liao, Shaojiang Deng. A novel key agreement protocol based on chaotic maps
1143 -- 1151Kyung-Ah Shim, Sung Sik Woo. Cryptanalysis of tripartite and multi-party authenticated key agreement protocols

Volume 177, Issue 3

657 -- 679Young-Guk Ha, Joo-Chan Sohn, Young-Jo Cho, Hyunsoo Yoon. A robotic service framework supporting automated integration of ubiquitous sensors and devices
680 -- 702Dennis Fuchs, Zhen He, Byung Suk Lee. Compressed histograms with arbitrary bucket layouts for selectivity estimation
703 -- 721Yaochun Huang, Hui Xiong, Weili Wu, Ping Deng, Zhongnan Zhang. Mining maximal hyperclique pattern: A hybrid search strategy
722 -- 733Yongsheng Ding, Lei Gao, Da Ruan. Communication mechanisms in ecological network-based grid middleware for service emergence
734 -- 746Shu-Chuan Chu, Zhe-Ming Lu, Jeng-Shyang Pan. Hadamard transform based fast codeword search algorithm for high-dimensional VQ encoding
747 -- 754Chih-Hung Wang, Chih-Yu Liu. A new ring signature scheme with signer-admission property
755 -- 770Ulas Beldek, Kemal Leblebicioglu. Strategy creation, decomposition and distribution in particle navigation
771 -- 786Waranyu Wongseree, Nachol Chaiyaratana, Kanjana Vichittumaros, Pranee Winichagoon, Suthat Fucharoen. Thalassaemia classification by neural networks and genetic programming
787 -- 803Ismail H. Toroslu, Yilmaz Arslanoglu. Genetic algorithm for the personnel assignment problem with multiple objectives
804 -- 814Ho-Youl Jung, Yun-Ju Park, Young-Jin Kim, Jung-Sun Park, Kuchan Kimm, InSong Koh. New methods for imputation of missing genotype using linkage disequilibrium and haplotype information
815 -- 831W. David Pan, Seong-Moo Yoo, Mahesh Nalasani, Paul G. Cox. Efficient local transformation estimation using Lie operators
832 -- 843Sangyoon Lee, Sanghyun Park, Woo-Cheol Kim, Dongwon Lee. An efficient location encoding method for moving objects using hierarchical administrative district and road network
844 -- 864V. Lakshmi Narasimhan, B. Hendradjaya. Some theoretical considerations for a suite of metrics for the integration of software components
865 -- 875Bijan Davvaz, P. Corsini. Redefined fuzzy ::::H::::::::::v::::::-submodules and many valued implications
876 -- 886Jianming Zhan, Wieslaw A. Dudek. Fuzzy ::::h::::-ideals of hemirings
887 -- 896Zhudeng Wang. ::::TL::::-filters of integral residuated ::::l::::-monoids
897 -- 905Hee Sik Kim, B. Monk, J. Neggers. On pseudo-fuzzy linear mappings
906 -- 929Humberto Bustince Sola, Miguel Pagola, Edurne Barrenechea Tartas. Construction of fuzzy indices from fuzzy DI-subsethood measures: Application to the global comparison of images
930 -- 946J. Balasubramaniam. Yager s new class of implications ::::J::::::::::f:::::: and some classical tautologies
947 -- 955M. Masoom Ali, Saralees Nadarajah. Information matrices for normal and Laplace mixtures
956 -- 966Hua-Wen Liu, Guo-Jun Wang. Unified forms of fully implicational restriction methods for fuzzy reasoning
967 -- 968Trieu-Kien Truong, Pei-Ding Chen, Lung-Jen Wang, Y.-W. Chang, Irving S. Reed. Erratum to Fast, prime factor, discrete Fourier transform algorithms over GF(2:::::::m:::::::) for 8 leq ::::m:::: leq 10 [Informat Sci 176 (1) (2006) 1-26]

Volume 177, Issue 24

5505 -- 5521Hye-Kyeong Ko, Min-Jeong Kim, SangKeun Lee. On the efficiency of secure XML broadcasting
5522 -- 5537Nen-Chung Wang, Yung-Fa Huang, Jhu-Chan Chen. A stable weight-based on-demand routing protocol for mobile ad hoc networks
5538 -- 5557Yungho Leu, Jen-Jou Hung. An energy efficient re-access scheme for data caching in data broadcast of a mobile computing environment
5558 -- 5572I-Shyan Hwang, San-Nan Lee, Chih-Chien Chen. A novel ring-tree-based routing and wavelength assignment algorithm for multicasting in DWDM optical mesh networks
5573 -- 5589Yuan-Hsiang Teng, Jimmy J. M. Tan, Lih-Hsing Hsu. The globally Bi-3:::*:::-connected property of the honeycomb rectangular torus
5590 -- 5597Chang-Hsiung Tsai, Yung-Chun Lai. Conditional edge-fault-tolerant edge-bipancyclicity of hypercubes
5598 -- 5610Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen. Packet construction for secure conference call request in ad hoc network systems
5611 -- 5619Jywe-Fei Fang, Yuh-Rau Wang, Hui-Ling Huang. The m-pancycle-connectivity of a WK-Recursive network
5620 -- 5637Yu Long, Kefei Chen. Certificateless threshold cryptosystem secure against chosen-ciphertext attack
5638 -- 5650Zecheng Wang, Haifeng Qian, Zhibin Li. Hybrid proxy multisignature: A new type multi-party signature
5651 -- 5663Jui-Ting Chung, Chuan-Ming Li, Tzonelih Hwang. All-in-one group-oriented cryptosystem based on bilinear pairing
5664 -- 5674Hao-Shun Hung, Jung-Sheng Fu, Gen-Huey Chen. Fault-free Hamiltonian cycles in crossed cubes with conditional link faults
5675 -- 5690Pawel Terlecki, Krzysztof Walczak 0002. Jumping emerging patterns with negation in transaction databases - Classification and discovery
5691 -- 5706Seung-Hwan Lim, Heejin Park, Sang-Wook Kim. Using multiple indexes for efficient subsequence matching in time-series databases
5707 -- 5714Ambedkar Dukkipati, Shalabh Bhatnagar, M. Narasimha Murty. Gelfand-Yaglom-Perez theorem for generalized relative entropy functionals
5715 -- 5724Fabrizio Durante, José Juan Quesada-Molina, Manuel Úbeda-Flores. On a family of multivariate copulas for aggregation processes
5725 -- 5738Lianzhen Liu, Kaitai Li. Boolean filters and positive implicative filters of residuated lattices
5739 -- 5753K. Maity, M. Maiti. Necessity constraint in two plant optimal production problem with imprecise parameters
5754 -- 5762Suh-Wen Chiou. A non-smooth optimization model for a two-tiered supply chain network
5763 -- 5774Chen Peng, Yu-Chu Tian. Networked H::infinity:: control of linear systems with state quantization
5775 -- 5797T. G. Barbounis, John B. Theocharis. Locally recurrent neural networks for wind speed prediction using spatial correlation
5798 -- 5800Yunqiang Yin, Hongxing Li. Note on Generalized fuzzy interior ideals in semigroups

Volume 177, Issue 23

5141 -- 5142Paul P. Wang. Guest Editorial
5143 -- 5152Ibrahim Ozkan, I. Burhan Türksen. Upper and lower values for the level of fuzziness in FCM
5153 -- 5162Kemal Kilic, Özge Uncu, I. Burhan Türksen. Comparison of different strategies of utilizing fuzzy clustering in structure identification
5163 -- 5177Asli Çelikyilmaz, I. Burhan Türksen. Fuzzy functions with support vector machines
5178 -- 5190Weiyin Fei. Optimal consumption and portfolio choice with ambiguity and anticipation
5191 -- 5202Feyzan Arikan, Zülal Güngör. A two-phase approach for multi-objective programming problems with fuzzy coefficients
5203 -- 5218Mirza Mohd. Sufyan Beg, Nesar Ahmad. Web search enhancement by mining user actions
5219 -- 5236Rifat Gürcan Özdemir, Günes Gençyilmaz, Tülin Aktin. The modified fuzzy art and a two-stage clustering approach to cell design
5237 -- 5252Yildiray Turhan, Sezai Tokat, Recep Eren. Statistical and computational intelligence tools for the analyses of warp tension in different back-rest oscillations
5253 -- 5274Adem Göleç, Harun Taskin. Novel methodologies and a comparative study for manufacturing systems performance evaluations
5275 -- 5291Challa S. Sastry, Sanjay Rawat, Arun K. Pujari, Ved Prakash Gulati. Network traffic analysis using singular value decomposition and multiscale transforms
5292 -- 5315Christos Riziotis, Athanasios V. Vasilakos. Computational intelligence in photonics technology and optical networks: A survey and future perspectives
5316 -- 5328Jia-Hwa Wu, Chih-Ping Chu. An exact data dependence testing method for quadratic expressions
5329 -- 5346G. Peter Zhang. A neural network ensemble method with jittered training data for time series forecasting
5347 -- 5364Rafael Álvarez, José-Vicente Noguera, Leandro Tortosa, Antonio Zamora. A mesh optimization algorithm based on neural networks
5365 -- 5377Jianmin Ma, Wen-Xiu Zhang, Yee Leung, Xiaoxue Song. Granular computing and dual Galois connection
5378 -- 5393Dongrui Wu, Jerry M. Mendel. Uncertainty measures for interval type-2 fuzzy sets
5394 -- 5403Yurilev Chalco-Cano, Heriberto Román-Flores, Marko Antonio Rojas-Medar, O. R. Saavedra, María-Dolores Jiménez-Gamero. The extension principle and a decomposition of fuzzy sets
5404 -- 5414Xiaoxia Huang. A new perspective for optimal portfolio selection with random fuzzy returns
5415 -- 5431Yang-Sae Moon, Jinho Kim. Efficient moving average transform-based subsequence matching algorithms in time-series databases
5432 -- 5440Zuhua Shao. A provably secure short signature scheme based on discrete logarithms
5441 -- 5467Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won. Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
5468 -- 5483Divyesh Shah, Sheng Zhong. Two methods for privacy preserving data mining with malicious participants
5484 -- 5503San-Yih Hwang, Haojun Wang, Jian Tang, Jaideep Srivastava. A probabilistic approach to modeling and estimating the QoS of web-services-based workflows

Volume 177, Issue 22

4841 -- 4858Sang-Wook Kim, Byeong-Soo Jeong. Performance bottleneck of subsequence matching in time-series databases: Observation, solution, and performance evaluation
4859 -- 4876Sanghyun Park, Jung-Im Won, Jeehee Yoon, Sang-Wook Kim. A multi-dimensional indexing approach for timestamped event sequence matching
4877 -- 4882Eddie Cheng, László Lipták. Linearly many faults in Cayley graphs generated by transposition trees
4883 -- 4892Wen-Xiu Zhang, Jianmin Ma, Shi-Qing Fan. Variable threshold concept lattices
4893 -- 4905Tuomo Korenius, Jorma Laurikkala, Martti Juhola. On principal component analysis, cosine and Euclidean measures in information retrieval
4906 -- 4921Chris Cornelis, Jie Lu, Xuetao Guo, Guanquang Zhang. One-and-only item recommendation with fuzzy logic techniques
4922 -- 4933Yan Yang, Xue-ping Wang. The general alpha-decomposition problem of fuzzy relations
4934 -- 4946Chuan-Kai Lin. Robust adaptive critic control of nonlinear systems using fuzzy basis function networks: An LMI approach
4947 -- 4958Khaled A. Hashem, A. E. Radwan. Constructions in the category of fuzzy T-proximity spaces
4959 -- 4976Yan Zhao, Yiyu Yao, Feng Luo. Data analysis based on discernibility and indiscernibility
4977 -- 4986Young Bae Jun. Quotient structures of intuitionistic fuzzy finite state machines
4987 -- 4996Yong Lin Liu, Yang Xu, Jie Meng. BCI-implicative ideals of BCI-algebras
4997 -- 5011William Zhu. Generalized rough sets based on relations
5012 -- 5023Feng Feng, Young Bae Jun, Xianzhong Zhao. On *-lambda-semirings
5033 -- 5049Praveen Kumar Tripathi, Sanghamitra Bandyopadhyay, Sankar K. Pal. Multi-Objective Particle Swarm Optimization with time variant inertia and acceleration coefficients
5050 -- 5063Guolong Chen, Shuili Chen, Wenzhong Guo, Huowang Chen. The multi-criteria minimum spanning tree problem based genetic algorithm
5064 -- 5071Xiutang Geng, Jin Xu, Jianhua Xiao, Linqiang Pan. A simple simulated annealing algorithm for the maximum clique problem
5072 -- 5090Reza Tavakkoli-Moghaddam, Alireza Rahimi-Vahed, Ali Hossein Mirzaei. A hybrid multi-objective immune algorithm for a flow shop scheduling problem with bi-objectives: Weighted mean completion time and weighted mean tardiness
5091 -- 5102Jessica Andrea Carballido, Ignacio Ponzoni, Nélida Beatriz Brignole. CGD-GA: A graph-based genetic algorithm for sensor network design
5103 -- 5117Jianhua Jin, Yongming Li, Chunquan Li. Robustness of fuzzy reasoning via logically equivalence measure
5118 -- 5133Baoyong Zhang, Shaosheng Zhou, Tao Li. A new approach to robust and non-fragile H::infinity:: control for uncertain fuzzy systems
5134 -- 5140Wei Cheng, Zhi Wen Mo, Jue Wang. Notes on the lower and upper approximations in a fuzzy group and rough ideals in semigroups

Volume 177, Issue 21

4539 -- 4565John T. Rickard, Janet Aisbett, Greg Gibbon. Reformulation of the theory of conceptual spaces
4566 -- 4597Bas van Gils, Erik Proper, Patrick van Bommel, Theo P. van der Weide. On the quality of resources on the Web: An information retrieval perspective
4598 -- 4620Rafik Bouaziz, Salem Chakhar, Vincent Mousseau, Sudha Ram, Abdelkader Telmoudi. Database design and querying within the fuzzy semantic model
4621 -- 4633Jun Zhu, Jianhua Gong, Weiguo Liu, Tao Song, Jianqin Zhang. A collaborative virtual geographic environment based on P2P and Grid technologies
4634 -- 4644Eiji Uchino, Kazuaki Yano, Tadahiro Azetsu. A self-organizing map with twin units capable of describing a nonlinear input-output relation applied to speech code vector mapping
4645 -- 4661Pavel Sevastianov. Numerical methods for interval and fuzzy number comparison based on the probabilistic approach and Dempster-Shafer theory
4662 -- 4677Young Bae Jun, Mehmet Ali Öztürk, Chul Hwan Park. Intuitionistic nil radicals of intuitionistic fuzzy ideals and Euclidean intuitionistic fuzzy ideals in rings
4678 -- 4685Le Liu, Yuanguo Zhu. Rough variables with values in measurable spaces
4686 -- 4695Yasuo Narukawa, Vicenç Torra. Fuzzy measures and integrals in evaluation of strategies
4696 -- 4710Yung-fu Chen, Yung-Kuan Chan, Ching-Chun Huang, Meng-Hsiun Tsai, Yen-Ping Chu. A multiple-level visual secret-sharing scheme without image size expansion
4711 -- 4726Fei Li, Yunqiang Yin, Lingxia Lu. (delta, T)-fuzzy rough approximation operators and the TL-fuzzy rough ideals on a ring
4727 -- 4744Daisuke Yamaguchi, Guodong Li, Masatake Nagai. A grey-based rough approximation model for interval data processing
4745 -- 4756Bonifacio Llamazares. Choosing OWA operator weights in the field of Social Choice
4757 -- 4767Qing-quan Xiong, Xue-ping Wang. Solution sets of inf-alphaF fuzzy relational equations on complete Brouwerian lattices
4768 -- 4784Liming Hu, H. D. Cheng, Ming Zhang. A high performance edge detector based on fuzzy inference rules
4785 -- 4798Kok-Wah Lee, Hong Tat Ewe. Performance study of Byzantine Agreement Protocol with artificial neural network
4799 -- 4809G. Cardoso, Fernando A. C. Gomide. Newspaper demand prediction and replacement model based on fuzzy clustering and rules
4810 -- 4819Kamal El-Saady. Lattice-valued fuzzy frames
4820 -- 4831Zhixiong Chen, Xiaoni Du, Guozhen Xiao. Sequences related to Legendre/Jacobi sequences
4832 -- 4839Hesham A. Hefny. Comments on Distinguishability quantification of fuzzy sets

Volume 177, Issue 20

4241 -- 4255Rafik A. Aliev, Bijan Fazlollahi, Babek Guirimov, R. R. Aliev. Fuzzy-genetic approach to aggregate production-distribution planning in supply chain management
4256 -- 4270Juan J. Nieto, Rosana Rodríguez-López. Euler polygonal method for metric dynamical systems
4271 -- 4294Mehdi Ghatee, S. Mehdi Hashemi. Ranking function-based solutions of fully fuzzified minimal cost flow problem
4295 -- 4313K. G. Srinivasa, K. R. Venugopal, Lalit M. Patnaik. A self-adaptive migration model genetic algorithm for data mining applications
4314 -- 4328Chen-Sheng Ting. An observer-based approach to controlling time-delay chaotic systems via Takagi-Sugeno fuzzy model
4329 -- 4337Weiyin Fei. Existence and uniqueness of solution for fuzzy random differential equations with non-Lipschitz coefficients
4338 -- 4353Yanqing Ji, R. Michael Massanari, Joel Ager, John Yen, Richard E. Miller, Hao Ying. A fuzzy logic-based computational recognition-primed decision model
4354 -- 4367Temel Öncan. Design of capacitated minimum spanning tree with uncertain cost and demand parameters
4368 -- 4386Frederico G. Guimarães, Reinaldo M. Palhares, Felipe Campelo, Hajime Igarashi. Design of mixed H::2::/H::infinity:: control systems using algorithms inspired by the immune system
4387 -- 4409Xiaojun Ban, Xiao Zhi Gao, Xianlin Huang, Athanasios V. Vasilakos. Stability analysis of the simplest Takagi-Sugeno fuzzy control system using circle criterion
4410 -- 4429Radu-Emil Precup, Stefan Preitl. PI-Fuzzy controllers for integral plants to ensure robust stability
4430 -- 4444Slavka Bodjanova. Granulation of a fuzzy set: Nonspecificity
4445 -- 4461Mingzhen Wei, Baojun Bai, Andrew H. Sung, Qingzhong Liu, Jiachun Wang, Martha E. Cather. Predicting injection profiles using ANFIS
4462 -- 4473O. R. Saavedra, H. H. D. Mangueira, Yurilev Chalco-Cano, Heriberto Román-Flores. Solution of non-linear fuzzy systems by decomposition of incremental fuzzy numbers
4474 -- 4492Chung-Chian Hsu, Chin-Long Chen, Yu-Wei Su. Hierarchical clustering of mixed data based on distance hierarchy
4493 -- 4514Xizhao Wang, Eric C. C. Tsang, Suyun Zhao, Degang Chen, Daniel S. Yeung. Learning fuzzy rules from fuzzy samples based on rough set technique
4515 -- 4525Eva Chung-chiung Yen. Warning signals for potential accounting frauds in blue chip companies - An application of adaptive resonance theory
4526 -- 4538E. Y. K. Ng, U. Rajendra Acharya, Louis G. Keith, Susan Lockwood. Detection and differentiation of breast cancer using neural classifiers with first warning thermal sensors

Volume 177, Issue 2

329 -- 331Abraham Kandel, Mark Last. Special issue on advances in fuzzy logic
332 -- 359I. Burhan Türksen. Meta-linguistic axioms as a foundation for computing with words
360 -- 377Jerry M. Mendel, Hongwei Wu. New results about the centroid of an interval type-2 fuzzy set, including the centroid of a fuzzy granule
378 -- 387Anca L. Ralescu, Dan A. Ralescu, Yoko Yamakata. Inference by aggregation of evidence with applications to fuzzy probabilities
388 -- 407Vladik Kreinovich, Jan Beck, Hung T. Nguyen. Ellipsoids and ellipsoid-shaped fuzzy sets as natural multi-variate generalization of intervals and fuzzy numbers: How to elicit them from users, and how to use them in data processing
408 -- 435Scott Dick, Adam Schenker, Witold Pedrycz, Abraham Kandel. Regranulation: A granular algorithm enabling communication between granular worlds
436 -- 448Leonard J. Jowers, James J. Buckley, Kevin D. Reilly. Simulating continuous fuzzy systems
449 -- 466Özge Uncu, I. Burhan Türksen. A novel feature selection approach: Combining feature wrappers and filters
467 -- 475Menahem Friedman, Mark Last, Yaniv Makover, Abraham Kandel. Anomaly detection in web documents using crisp and fuzzy-based cosine clustering methodology
476 -- 489Bo Jin, Y. C. Tang, Yan-Qing Zhang. Support vector machines with genetic fuzzy feature transformation for biomedical data classification
490 -- 503Sheng Zhong. Privacy-preserving algorithms for distributed mining of frequent itemsets
504 -- 518Zhanfeng Shen, Jiancheng Luo, Guangyu Huang, Dongping Ming, Weifeng Ma, Hao Sheng. Distributed computing model for processing remotely sensed images based on grid computing
519 -- 524Sun-Yuan Hsieh. The interval-merging problem
525 -- 542Yon Dohn Chung. An indexing scheme for energy-efficient processing of content-based retrieval queries on a wireless data stream
543 -- 549Chien-Lung Hsu, Kuo-Yu Tsai, Pei-Ling Tsai. Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
550 -- 569Hung-Hsu Tsai, Duen-Wu Sun. Color image watermark extraction based on support vector machines
570 -- 586Ruey-Shun Chen, Chin-Hsiao Hsiang. A study on the critical success factors for corporations embarking on knowledge community-based e-learning
587 -- 606Vijay K. Vaishnavi, Sandeep Purao, Jens Liegle. Object-oriented product metrics: A generic framework
607 -- 631Songtao Jiang, Byung Suk Lee, Zhen He. Cost modeling of spatial operators using non-parametric regression
632 -- 654Kazi Shah Nawaz Ripon, Sam Kwong, K. F. Man. A real-coding jumping gene genetic algorithm (RJGGA) for multiobjective optimization
655 -- 656Salih Aytar, Serpil Pehlivan. Addendum to Statistically monotonic and statistically bounded sequences of fuzzy numbers [Informat Sci 176: (2006) 734-744]

Volume 177, Issue 19

3939 -- 3956Ramon Lawrence, Ralph P. Russo, Nariankadu D. Shyamalkumar. The effect of reading policy on early join result production
3957 -- 3967Qing Guo, Hui Zhang, Costas S. Iliopoulos. Computing the lambda-covers of a string
3968 -- 3980Jianqin Zhang, Jianhua Gong, Hui Lin 0002, Gang Wang, JianLing Huang, Jun Zhu, Bingli Xu, Jack Teng. Design and development of Distributed Virtual Geographic Environment system based on web services
3981 -- 3994Baocang Wang, Qianhong Wu, Yupu Hu. A knapsack-based probabilistic encryption scheme
3995 -- 4013Jin Wook Byun, Dong-Hoon Lee, Jong In Lim. EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
4014 -- 4030Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu. Delegation with supervision
4031 -- 4039Iuon-Chang Lin, Chin-Chen Chang. Security enhancement for digital signature schemes with fault tolerance in RSA
4040 -- 4058Tieyun Qian, Hui Xiong, Yuanzhen Wang, Enhong Chen. On the strength of hyperclique patterns for text categorization
4059 -- 4071Chang-Kuo Chen, Yung-Ching Hung, Teh-Lu Liao, Jun-Juh Yan. Design of robust active queue management controllers for a class of TCP communication networks
4072 -- 4094Lien Fu Lai. A knowledge engineering approach to knowledge management
4095 -- 4108Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng. How to construct secure proxy cryptosystem
4109 -- 4121Suh-Wen Chiou. Comparative tests of solution methods for signal-controlled road networks
4122 -- 4147Juan C. Valle-Lisboa, Eduardo Mizraji. The uncovering of hidden structures by Latent Semantic Analysis
4148 -- 4160Kamer Kaya, Ali Aydin Selçuk. Threshold cryptography based on Asmuth-Bloom secret sharing
4161 -- 4175Asok K. Nanda, Sudhansu S. Maiti. Rényi information measure for a used item
4188 -- 4199Dyi-Rong Duh, Yi-Ching Chen, Ruei-Yu Wu. Proof that pyramid networks are 1-Hamiltonian-connected with high probability
4200 -- 4207Ruei-Yu Wu, Gen-Huey Chen, Yu-Liang Kuo, Gerard J. Chang. Node-disjoint paths in hierarchical hypercube networks
4208 -- 4215Bih-Sheue Shieh. Solutions of fuzzy relation equations based on continuous t-norms
4216 -- 4229Yan-Kuen Wu. Optimization of fuzzy relational equations with max-av composition
4230 -- 4239Daowu Pei. On definable concepts of rough set models

Volume 177, Issue 18

3639 -- 3678Julian R. Ullmann. Partition search for non-binary constraint satisfaction
3679 -- 3695Yen-Ting Chen, Ping-Yu Hsu. A grain preservation translation algorithm: From ER diagram to multidimensional model
3696 -- 3717Hyo-Jung Oh, Sung-Hyon Myaeng, Myung-Gil Jang. Semantic passage segmentation based on sentence topics for question answering
3718 -- 3730Xiaojun Wan. A novel document similarity measure based on earth mover s distance
3731 -- 3748Sang-Eon Han. The k-fundamental group of a closed k-surface
3749 -- 3763Feng Lin, Hao Ying, R. D. MacArthur, J. A. Cohn, Daniel C. Barth-Jones, L. R. Crane. Decision making in fuzzy discrete event systems
3764 -- 3781Xuesong Wang, Yuhu Cheng, Jian-Qiang Yi. A fuzzy Actor-Critic reinforcement learning network
3782 -- 3798Pawan Lingras, Cory J. Butz. Rough set based 1-v-1 and 1-v-r approaches to support vector machine multi-classification
3799 -- 3821Taeshik Shon, Jongsub Moon. A hybrid machine learning approach to network anomaly detection
3822 -- 3830Anna Kolesárová, Gaspar Mayor, Radko Mesiar. Weighted ordinal means
3831 -- 3839Dug Hun Hong, Changha Hwang, Kyung Tae Kim. T-sum of sigmoid-shaped fuzzy intervals
3840 -- 3854Xiao-Ping Yang. Minimization of axiom sets on fuzzy approximation operators
3855 -- 3870Garyfalos Papaschinopoulos, Gesthimani Stefanidou, P. Efraimidis. Existence, uniqueness and asymptotic behavior of the solutions of a fuzzy differential equation with piecewise constant argument
3871 -- 3881Seyed Mahmoud Taheri, R. Azizi. On information energy of the image fuzzy sets
3882 -- 3900Ning Wang, Wen-Xiu Zhang, Chang-Lin Mei. Fuzzy nonparametric regression based on local linear smoothing technique
3901 -- 3917Yan-Jun Liu, Wei Wang. Adaptive fuzzy control for a class of uncertain nonaffine nonlinear systems
3918 -- 3937Dong Hwa Kim, Ajith Abraham, Jae Hoon Cho. A hybrid genetic algorithm and bacterial foraging approach for global optimization

Volume 177, Issue 17

3411 -- 3437Michael D. Morse, Jignesh M. Patel, William I. Grosky. Efficient continuous skyline computation
3438 -- 3452Peyman Kouchakpour, Anthony Zaknich, Thomas Bräunl. Population variation in genetic programming
3453 -- 3476Anthony J. T. Lee, Chun-sheng Wang. An efficient algorithm for mining frequent inter-transaction patterns
3477 -- 3499Unil Yun. Efficient mining of weighted interesting patterns with a strong weight and/or support affinity
3500 -- 3518Degang Chen, Changzhong Wang, Qinghua Hu. A new approach to attribute reduction of consistent and inconsistent covering decision systems with covering rough sets
3519 -- 3538Jun-Ki Min, Myung-Jae Park, Chin-Wan Chung. XTREAM: An efficient multi-query evaluation on streaming XML data
3539 -- 3556Gen Ming Guo. A computer-aided bibliometric system to generate core article ranked lists in interdisciplinary subjects
3557 -- 3573Yiqiu Han, Wai Lam, Charles X. Ling. Customized classification learning based on query projections
3574 -- 3591Donghua Yang, Jianzhong Li. Distributed multi-join query processing in data grids
3592 -- 3612Shahar Cohen, Lior Rokach, Oded Maimon. Decision-tree instance-space decomposition with grouped gain-ratio
3613 -- 3626Baoliu Ye, Minyi Guo, Daoxu Chen, Sanglu Lu. A degree-constrained QoS-aware routing algorithm for application layer multicast
3627 -- 3635Marina Tuyako Mizukoshi, Laécio Carvalho de Barros, Yurilev Chalco-Cano, Heriberto Román-Flores, Rodney Carlos Bassanezi. Fuzzy differential equations and the extension principle
3636 -- 3638Gholam R. Amin. Note on A preemptive goal programming method for aggregating OWA operator weights in group decision making

Volume 177, Issue 16

3215 -- 3217Hung T. Nguyen, Vladik Kreinovich, Sompong Dhompongsa. Mathematical foundations for intelligent technologies
3218 -- 3227Irina Perfilieva, Vilém Novák. System of fuzzy relation equations as a continuous model of IF-THEN rules
3228 -- 3238Vladik Kreinovich, Hung T. Nguyen, Berlin Wu. On-line algorithms for computing mean and variance of interval data, and their use in intelligent systems
3239 -- 3250Ding Feng, Hung T. Nguyen. Choquet weak convergence of capacity functionals of random sets
3251 -- 3259Shoumei Li, Li Guan. Fuzzy set-valued Gaussian processes and Brownian motions
3260 -- 3270Baokun Li, Tonghui Wang. Computational aspects of the coarsening at random model and the Shapley value
3271 -- 3289T. Bag, S. K. Samanta. Some fixed point theorems in fuzzy normed linear spaces
3290 -- 3296Salih Aytar, Serpil Pehlivan. Statistical cluster and extreme limit points of sequences of fuzzy numbers
3305 -- 3313M. Bakhshi, Rajab Ali Borzooei. Lattice structure on fuzzy congruence relations of a hypergroupoid
3314 -- 3326Sang-Eon Han. Digital fundamental group and Euler characteristic of a connected sum of digital closed surfaces
3327 -- 3340John D. Angelopoulos, C. Dessauvage, Helen-Catherine Leligou, Konstantinos Kanonakis, C. Matrakidis, E. Six. Dynamic address resolution for enhanced configurability in packet-based TDMA GPONs
3341 -- 3355DaeEun Kim, Jaehong Park. Application of adaptive control to the fluctuation of engine speed at idle
3356 -- 3363Ying-Ming Wang, Ying Luo, Zhongsheng Hua. Aggregating preference rankings using OWA operator weights
3364 -- 3382Ihsan Yüksel, Metin Dagdeviren. Using the analytic network process (ANP) in a SWOT analysis - A case study for a textile firm
3383 -- 3396Che-Wei Chang, Cheng-Ru Wu, Chin-Tsai Lin, Hung-Lung Lin. Evaluating digital video recorder systems using analytic hierarchy and analytic network processes
3397 -- 3410Mahmoud A. Abo-Sinna, Ibrahim A. Baky. Interactive balance space approach for solving multi-level multi-objective programming problems

Volume 177, Issue 15

3017 -- 3037Manolis G. Vozalis, Konstantinos G. Margaritis. Using SVD and demographic data for the enhancement of generalized Collaborative Filtering
3038 -- 3059Li Chunlin, Li Layuan. Joint QoS optimization for layered computational grid
3060 -- 3073Vasilios Katos. Network intrusion detection: Evaluating cluster, discriminant, and logit analysis
3074 -- 3098Sung Jin Yoo, Jin Bae Park, Yoon Ho Choi. Indirect adaptive control of nonlinear dynamic systems using self recurrent wavelet neural networks via adaptive learning rates
3099 -- 3109Xiaoxia Li, Jianjun Wang. A steganographic method based upon JPEG and particle swarm optimization algorithm
3110 -- 3128Ling Tan, David Taniar. Adaptive estimated maximum-entropy distribution model
3129 -- 3150Danhyung Lee, Kwang Chun Lee, Sungwon Kang, Jongmoon Baik. A priori ordering protocols to support consensus-building in multiple stakeholder contexts
3151 -- 3160Jianxi Fan, Xiaohua Jia. Embedding meshes into crossed cubes
3161 -- 3177Chih-Yung Chang, Kuei-Ping Shih, Chung-Hsien Hsu, Hung-Chang Chen. A location-aware multicasting protocol for Bluetooth Location Networks
3178 -- 3185Ling Wei, Hong-Ru Li, Wen-Xiu Zhang. Knowledge reduction based on the equivalence relations defined on attribute set and its power set
3186 -- 3191Radim Belohlávek. A note on variable threshold concept lattices: Threshold-based operators are reducible to classical concept-forming operators
3192 -- 3201Heriberto Román-Flores, A. Flores-Franulic, Yurilev Chalco-Cano. A Jensen type inequality for fuzzy integrals
3202 -- 3214Gh. Khaledi, S. A. Ziaie, Mashaallah Mashinchi. Lattice structure of e-implications on L:::*:::

Volume 177, Issue 14

2821 -- 2844Xiaodi Huang, Wei Lai, A. S. M. Sajeev, Junbin Gao. A new algorithm for removing node overlapping in graph visualization
2845 -- 2866Masakazu Takahashi, Kazutoshi Hanzawa, Takashi Kawasaki. An efficient method for developing requirement specifications for plant control software using a component-based software prototype
2867 -- 2883Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ababneh. An efficient non-contiguous processor allocation strategy for 2D mesh connected multicomputers
2884 -- 2905Pedro A. Castillo Valdivieso, Juan Julián Merelo Guervós, Maribel García Arenas, Gustavo Romero. Comparing evolutionary hybrid systems for design and optimization of multilayer perceptron structure along training parameters
2906 -- 2924Glad Deschrijver. Arithmetic operators in interval-valued fuzzy set theory
2925 -- 2944Susana Díaz, Pedro Gil, J. Jiménez, Susana Montes. Compatibility of t-norms with the concept of epsilon-partition
2945 -- 2953Yao Ouyang, Jinxuan Fang, Guiling Li. On the convex combination of T::D:: and continuous triangular norms
2954 -- 2970Yun Shi, Da Ruan, Etienne E. Kerre. On the characterizations of fuzzy implications satisfying I(x, y)=I(x, I(x, y))
2971 -- 2984Nguyen Van Hop. Solving linear programming problems under fuzziness and randomness environment using attainment values
2985 -- 3004Pei Yee Ho, Kazuyuki Shimizu. Evolutionary constrained optimization using an addition of ranking method and a percentage-based tolerance value adjustment scheme
3005 -- 3015Dan Huang, Sing Kiong Nguang. Static output feedback controller design for fuzzy systems: An ILMI approach

Volume 177, Issue 13

2621 -- 2641Chih-Yung Chang, Chao-Tsun Chang, Tzung-Shi Chen, Hsu-Ruey Chang. Hierarchical management protocol for constructing a QoS communication path in wireless Ad Hoc networks
2642 -- 2654Wan-De Weng, Che-Shih Yang, Rui-Chang Lin. A channel equalizer using reduced decision feedback Chebyshev functional link artificial neural networks
2655 -- 2678Luis M. San-José-Revuelta. A new adaptive genetic algorithm for fixed channel assignment
2679 -- 2691Toru Araki, Yosuke Kikuchi. Hamiltonian laceability of bubble-sort graphs with edge faults
2692 -- 2711Salman A. Khan, Andries Petrus Engelbrecht. A new fuzzy operator and its application to topology design of distributed local area networks
2712 -- 2725Xiang-Yun Wang, Wenhui Zhang, Yong-Chao Li, Kai-Yuan Cai. A polynomial dynamic system approach to software design for attractivity requirement
2726 -- 2735Haci Aktas, Naim Çagman. Soft sets and soft groups
2736 -- 2755Fotis N. Koumboulis, Robert E. King, Anna Stathaki. Logic-based switching controllers - A stepwise safe switching approach
2756 -- 2767Shichao Zhang, Jilian Zhang, Chengqi Zhang. EDUA: An efficient algorithm for dynamic database mining
2768 -- 2786Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng, Wei-Liang Tai. Reversible hiding in DCT-based compressed images
2787 -- 2801Wei-Guo Zhang, Ying-Luo Wang, Zhi-ping Chen, Zan Kan Nie. Possibilistic mean-variance models and efficient frontiers for portfolio selection problem
2802 -- 2819George A. Papakostas, Yiannis S. Boutalis, Dimitris A. Karras, Basil G. Mertzios. A new class of Zernike moments for computer vision applications

Volume 177, Issue 12

2403 -- 2404William Chung-Kung Yen, Paul P. Wang. Guest editorial special issue on graph theory and its applications
2405 -- 2417Yin-Te Tsai, Yaw-Ling Lin, Fang-Rong Hsu. Efficient algorithms for the minimum connected domination on trapezoid graphs
2418 -- 2435Chu-Fu Wang, Rong-Hong Jan. A factoring approach for the Steiner tree problem in undirected networks
2436 -- 2447Rung-Bin Lin, Shuyu Chen. Conjugate conflict continuation graphs for multi-layer constrained via minimization
2448 -- 2458Chen-Tung Chen, Sue-Fen Huang. Applying fuzzy method for measuring criticality in project network
2459 -- 2472Ugur Dogrusöz, Konstantinos G. Kakoulis, Brendan Madden, Ioannis G. Tollis. On labeling in graph visualization
2473 -- 2479Chung-Hsien Hsu, Sheng-Lung Peng, Chong-Hui Shi. Constructing a minimum height elimination tree of a tree in linear time
2480 -- 2492Anita Saha, Madhumangal Pal, Tapan Kumar Pal. Selection of programme slots of television channels for giving advertisement: A graph theoretic approach
2493 -- 2521David Taniar, Hui Yee Khaw, Haorianto Cokrowijoyo Tjioe, Eric Pardede. The use of Hints in SQL-Nested query optimization
2522 -- 2532Feng-Hsing Wang, Kang K. Yen, Lakhmi C. Jain, Jeng-Shyang Pan. Multiuser-based shadow watermark extraction system
2533 -- 2552Chong-Yaw Wee, Paramesran Raveendran. Measure of image sharpness using eigenvalues
2553 -- 2569N. Nalini, G. Raghavendra Rao. Attacks of simple block ciphers via efficient heuristics
2570 -- 2586Francisco García, Manuel A. Serrano, José A. Cruz-Lemus, Francisco Ruiz, Mario Piattini. Managing software process measurement: A metamodel-based approach
2587 -- 2601Samantha Jenkins, Steven R. Kirk. Software architecture graphs as complex networks: A novel partitioning scheme to measure stability and evolution
2602 -- 2620Mostafa I. H. Abd-El-Barr, Salman A. Khan. Design and analysis of a fault tolerant hybrid mobile scheme

Volume 177, Issue 11

2207 -- 2237Antonio Corral, Jesús Manuel Almendros-Jiménez. A performance comparison of distance-based query algorithms using R-trees in spatial databases
2238 -- 2254Shi-Ming Huang, Tung-Hsiang Chou, Jia-Lang Seng. Data warehouse enhancement: A semantic cube model approach
2255 -- 2268Guoren Wang, Xiangmin Zhou, Bin Wang, Baiyou Qiao, Donghong Han. A hyperplane based indexing technique for high-dimensional data
2269 -- 2295Przemyslaw Kazienko, Michal Adamski. AdROSA - Adaptive personalization of web advertising
2296 -- 2307Mansoor J. Zolghadri, Eghbal G. Mansoori. Weighting fuzzy classification rules using receiver operating characteristics (ROC) analysis
2308 -- 2326Tingquan Deng, Yanmei Chen, Wenli Xu, Qionghai Dai. A novel approach to fuzzy rough sets based on a fuzzy covering
2327 -- 2335Robert Bennes, Shahram Latifi, Naoto Kimura. A comparative study of job allocation and migration in the pancake network
2336 -- 2348Victor Balopoulos, Anestis G. Hatzimichailidis, Basil K. Papadopoulos. Distance and similarity measures for fuzzy operators
2349 -- 2362Ferdinando Di Martino, Salvatore Sessa. Compression and decompression of images with discrete fuzzy transforms
2363 -- 2379Zeshui Xu. Intuitionistic preference relations and their application in group decision making
2380 -- 2401Enrique Alba, J. Francisco Chicano. Software project management with GAs

Volume 177, Issue 10

1997 -- 1998Oscar Castillo, Patricia Melin. Special Issue on Hybrid Intelligent Systems
1999 -- 2022Edgar N. Sanchez, Hector M. Becerra, Carlos M. Velez. Combining fuzzy, PID and regulation control for an autonomous mini-helicopter
2023 -- 2048Roberto Sepúlveda, Oscar Castillo, Patricia Melin, Antonio Rodríguez Díaz, Oscar Montiel. Experimental study of intelligent controllers under uncertainty using type-1 and type-2 fuzzy logic
2049 -- 2074Clodoaldo Ap. M. Lima, André L. V. Coelho, Fernando J. Von Zuben. Hybridizing mixtures of experts with support vector machines: Investigation into nonlinear dynamic systems identification
2075 -- 2098Oscar Montiel, Oscar Castillo, Patricia Melin, Antonio Rodríguez Díaz, Roberto Sepúlveda. Human evolutionary model: A new approach to optimization
2099 -- 2118Leonid I. Perlovsky. Cognitive high level information fusion
2119 -- 2129Ning Zhang, Zhixiong Chen, Guozhen Xiao. Efficient elliptic curve scalar multiplication algorithms resistant to power analysis
2130 -- 2151Kuo-Liang Chung, Yi-Luen Huang, Yau-Wen Liu. Efficient algorithms for coding Hilbert curve of arbitrary-sized image and application to window query
2152 -- 2166Guoli Ding, Jianhua Chen, Robert F. Lax, Peter P. Chen. Graph-theoretic method for merging security system specifications
2167 -- 2187Irena Koprinska, Josiah Poon, James Clark, Jason Chan. Learning to classify e-mail
2188 -- 2205Qingchun Ren, Qilian Liang. Energy and quality aware query processing in wireless sensor database systems

Volume 177, Issue 1

1 -- 2James F. Peters, Andrzej Skowron. Zdzislaw Pawlak life and work (1926-2006)
3 -- 27Zdzislaw Pawlak, Andrzej Skowron. Rudiments of rough sets
28 -- 40Zdzislaw Pawlak, Andrzej Skowron. Rough sets: Some extensions
41 -- 73Zdzislaw Pawlak, Andrzej Skowron. Rough sets and Boolean reasoning
74 -- 83Pawel Terlecki, Krzysztof Walczak 0002. On the relation between rough set reducts and jumping emerging patterns
84 -- 110Jerry M. Mendel. Advances in type-2 fuzzy sets and systems
111 -- 129Fabrizio Durante, Radko Mesiar, Pier Luigi Papini, Carlo Sempi. 2-Increasing binary aggregation operators
130 -- 149Corrado Mencar, Giovanna Castellano, Anna Maria Fanelli. Distinguishability quantification of fuzzy sets
150 -- 160Mustafa Demirci, Zeynep Eken. An introduction to vague complemented ordered sets
161 -- 169Vladimír Janis, Branimir Seselja, Andreja Tepavcevic. Non-standard cut classification of fuzzy sets
170 -- 191Stuart Harvey Rubin. On randomization and discovery
192 -- 201Shuhai Li, YuMin Wang. Exploiting randomness on continuous sets
202 -- 219Stephen Drape. Generalising the array split obfuscation
220 -- 230Karel De Loof, Bernard De Baets, Hans De Meyer. On the random generation and counting of weak order extensions of a poset with given class cardinalities
231 -- 238Alessandro Bogliolo, Valerio Freschi. Parallel comparison of run-length-encoded strings on a linear systolic array
239 -- 247Michel Neuhaus, Horst Bunke. Automatic learning of cost functions for graph edit distance
248 -- 263Zeshui Xu, Jian Chen. An interactive method for fuzzy multiple attribute group decision making
264 -- 280Chi-Yung Lee, Cheng-Jian Lin, Huei-Jen Chen. A self-constructing fuzzy CMAC model and its applications
281 -- 298Huiping Guo, Yingjiu Li, Sushil Jajodia. Chaining watermarks for detecting malicious modifications to streaming data
299 -- 311Nicoletta De Francesco, Antonella Santone, Gigliola Vaglini. A user-friendly interface to specify temporal properties of concurrent systems
312 -- 327Hongbin Dong, Jun He, Houkuan Huang, Wei Hou. Evolutionary programming using a mixed mutation strategy