Journal: Inf. Sci.

Volume 178, Issue 9

2105 -- 2127Sergio Ilarri, Eduardo Mena, Arantza Illarramendi. Using cooperative mobile agents to monitor distributed and dynamic environments
2128 -- 2149Zhen He, Byung Suk Lee, Xiaoyang Sean Wang. Aggregation in sensor networks with a user-provided quality of service goal
2150 -- 2162Javier Echanobe, Inés del Campo, Guillermo Bosque. An adaptive neuro-fuzzy system for efficient implementations
2163 -- 2175Yu Liu, Yi Zhang, Yong Gao. GNet: A generalized network model and its applications in qualitative spatial reasoning
2176 -- 2193Adriano O. Andrade, Peter Kyberd, Slawomir J. Nasuto. The application of the Hilbert spectrum to the analysis of electromyographic signals
2194 -- 2203Chuangxia Huang, Yigang He, Lihong Huang, Wenji Zhu. pth moment stability analysis of stochastic recurrent neural networks with time-varying delays
2204 -- 2214Junhua Zhang, Yuanyuan Wang. A rough margin based support vector machine
2215 -- 2223Zhonglong Zheng, Jia Jiong, Duanmu Chunjiang, XinHong Liu, Jie Yang. Facial feature localization based on an improved active shape model
2224 -- 2236Feilong Liu. An efficient centroid type-reduction strategy for general type-2 fuzzy logic system
2237 -- 2261Changzhong Wang, Congxin Wu, Degang Chen. A systematic study on attribute reduction with rough sets based on general binary relations
2262 -- 2274Massoud Hadian Dehkordi, Samaneh Mashhadi. New efficient and practical verifiable multi-secret sharing schemes
2275 -- 2281Shesheng Gao, Zhihua Feng, Yongmin Zhong, Bijan Shirinzadeh. Random weighting estimation of parameters in generalized Gaussian distribution
2282 -- 2296Guohong Fu, Chunyu Kit, Jonathan J. Webster. Chinese word segmentation as morpheme-based lexical chunking

Volume 178, Issue 8

1923 -- 1934Ibrahim Ozkan, I. Burhan Türksen, Naci Canpolat. A currency crisis and its perception with fuzzy C-means
1935 -- 1947Jun Yoneyama. Robust stability and stabilizing controller design of fuzzy systems with discrete and distributed delays
1948 -- 1960Saeid Abbasbandy, M. Otadi, M. Mosleh. Numerical solution of a system of fuzzy polynomials by fuzzy neural network
1961 -- 1967Bih-Sheue Shieh. Infinite fuzzy relation equations with continuous t-norms
1968 -- 1985Zengtai Gong, Bingzhen Sun, Degang Chen. Rough set theory for the interval-valued fuzzy information systems
1986 -- 1996Jianhua Dai. Rough 3-valued algebras
1997 -- 2006Matthias Delafontaine, Nico Van de Weghe, Peter Bogaert, Philippe De Maeyer. Qualitative relations between moving objects in a network changing its topological relations
2007 -- 2021Joseph Anderson, Lang Hong. Sensor Resource Management driven by threat projection and priorities
2022 -- 2043Jiuping Xu, Qiang Liu, Rui Wang. A class of multi-objective supply chain networks optimal model under random fuzzy environment and its application to the industry of Chinese liquor
2044 -- 2058Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen. Unconditionally secure cryptosystems based on quantum cryptography
2059 -- 2078Benlian Xu, Qinglan Chen, Zhengyi Wu, Zhiquan Wang. Analysis and approximation of performance bound for two-observer bearings-only tracking
2079 -- 2090Ran Liu, Qingsheng Zhu, Xiaoyan Xu, Liou Zhi, Hongtao Xie, Jun Yang, Xiaoyun Zhang. Stereo effect of image converted from planar
2091 -- 2104Sang-Eon Han. Comparison among digital fundamental groups and its applications

Volume 178, Issue 7

1783 -- 1802Stacie C. Petter, Vijay Vaishnavi. Facilitating experience reuse among software project managers
1803 -- 1824Wei-Yi Liu, Kun Yue, Shuang-Xian Liu, Yin-Bo Sun. Qualitative-probabilistic-network-based modeling of temporal causalities and its application to feedback loop identification
1825 -- 1835Jun-Bao Li, Jeng-Shyang Pan, Shu-Chuan Chu. Kernel class-wise locality preserving projection
1836 -- 1847Zhang Lei, Li Ren-hou. Designing of classifiers based on immune principles and fuzzy rules
1848 -- 1876Feng-Hsu Wang. On discovery of soft associations with most fuzzy quantifier for item promotion applications
1877 -- 1892Minghao Chen, Congxin Wu, Xiaoping Xue, Guoqing Liu. On fuzzy boundary value problems
1893 -- 1902Wang Huisong, Wang Jun, Du Qun, Zeng Guihua. A new approach to constructing CSS codes based on factor graphs
1903 -- 1916Yassir Nawaz, Guang Gong. WG: A family of stream ciphers with designed randomness properties
1917 -- 1922Barnabás Bede. Note on Numerical solutions of fuzzy differential equations by predictor-corrector method

Volume 178, Issue 6

1423 -- 1441Mathieu Serrurier, Henri Prade. Improving inductive logic programming by using simulated annealing
1442 -- 1460Deja Hepziba Francis, Sanjay Kumar Madria, Chaman L. Sabharwal. A scalable constraint-based Q-hash indexing for moving objects
1461 -- 1478Hyo-Sang Lim, Kyu-Young Whang, Yang-Sae Moon. Similar sequence matching supporting variable-length and variable-tolerance continuous queries on time-series data stream
1479 -- 1497Fabrizio Angiulli, Eugenio Cesario, Clara Pizzuti. Random walk biclustering for microarray data
1498 -- 1518Enhong Chen, Huanhuan Cao, Qing Li, Tieyun Qian. Efficient strategies for tough aggregate constraint-based sequential pattern mining
1519 -- 1532Ben Zhang, John C. Lusth. Computing with random quantum dot repulsion
1533 -- 1541Dongmin Choi, Okbin Lee, Ilyong Chung. A parallel routing algorithm on recursive cube of rings networks employing Hamiltonian circuit Latin square
1542 -- 1557Robert Meolic, Tatjana Kapus, Zmago Brezocnik. ACTLW - An action-based computation tree logic with unless operator
1558 -- 1597Kai-Yuan Cai, Zhao Dong, Ke Liu. Software testing processes as a linear dynamic system
1598 -- 1602Di Xiao, Xiaofeng Liao, Shaojiang Deng. Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
1603 -- 1610Yifeng Yin, Xinshe Li, Yupu Hu. Fast S-box security mechanism research based on the polymorphic cipher
1611 -- 1628S. S. Manvi, M. S. Kakkasageri. Multicast routing in mobile ad hoc networks by using a multiagent system
1629 -- 1640Shang Ming Zhou, John Q. Gan, Francisco Sepulveda. Classifying mental tasks based on features of higher-order statistics from EEG signals in brain-computer interface
1641 -- 1650Wen-Liang Hung, Miin-Shen Yang. On the J-divergence of intuitionistic fuzzy sets with its application to pattern recognition
1651 -- 1662Guilong Liu. Generalized rough sets over fuzzy lattices
1663 -- 1679Mohamed Abd El-Hady Kassem. Stability of vector optimization problems with fuzzy weights in the objective functions and fuzzy matrix parameters in the constraints
1680 -- 1695Jiuxiang Dong, Guang-Hong Yang. State feedback control of continuous-time T-S fuzzy systems via switched fuzzy controllers
1696 -- 1716Ming-Ying Hsiao, Tzuu-Hseng S. Li, Jia-Zhen Lee, Chan-Hong Chao, Shun-Hung Tsai. Design of interval type-2 fuzzy sliding-mode controller
1717 -- 1733Metin Dagdeviren, Ihsan Yüksel. Developing a fuzzy analytic hierarchy process (AHP) model for behavior-based safety management
1734 -- 1755Pankaj Gupta, Mukesh Kumar Mehlawat, Anand Saxena. Asset portfolio optimization using fuzzy mathematical programming
1756 -- 1779Rosana Rodríguez-López. Comparison results for fuzzy differential equations
1780 -- 1782Tofigh Allahviranloo, N. Ahmady, E. Ahmady. Erratum to Numerical solution of fuzzy differential equations by predictor-corrector method [Inf Sci 177 (7) (2007) 1633-1647]

Volume 178, Issue 5

1263 -- 1278Yu-Chu Tian, David Levy. Compensation for control packet dropout in networked control systems
1279 -- 1292Alexandru Mihai Bica. Error estimation in the approximation of the solution of nonlinear fuzzy Fredholm integral equations
1293 -- 1308Ali Abbasi Molai, Esmaile Khorram. An algorithm for solving fuzzy relation equations with max-T composition operator
1309 -- 1324Tofigh Allahviranloo, E. Ahmady, N. Ahmady. Nth-order fuzzy linear differential equations
1325 -- 1333Yau-Tarng Juang, Yun-Tien Chang, Chih-Peng Huang. Design of fuzzy PID controllers using modified triangular membership functions
1334 -- 1342Wenyi Zeng, Ping Guo. Normalized distance, similarity measure, inclusion measure and entropy of interval-valued fuzzy sets and their relationship
1343 -- 1354Osman Kazanci, Bijan Davvaz. On the structure of rough prime (primary) ideals and rough fuzzy prime (primary) ideals in commutative rings
1355 -- 1371Wei-Zhi Wu. Attribute reduction based on evidence theory in incomplete decision systems
1372 -- 1390Ki K. Lee, Wan C. Yoon. A classifier learning system using a coevolution method for deflection yoke misconvergence pattern classification problem
1391 -- 1406Yong Wang, Xiaofeng Liao, Di Xiao, Kwok-Wo Wong. One-way hash function construction based on 2D coupled map lattices
1407 -- 1417Hsi-Chung Lin, Sung-Ming Yen, Yi-Hsiung Huang. Security reconsideration of the Huang-Wang nominative signature
1418 -- 1421Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci. An attack on a payment scheme

Volume 178, Issue 4

931 -- 951Javier Sanchis, Miguel A. Martínez, Xavier Blasco Ferragud. Integrated multiobjective optimization and a priori preferences using genetic algorithms
952 -- 970Luciano Sánchez, José Ramón Villar. Obtaining transparent models of chaotic systems with multi-objective simulated annealing algorithms
971 -- 984Huaxiang Zhang, Jing Lu. Adaptive evolutionary programming based on reinforcement learning
985 -- 1010Theodore Dalamagas, Alexandra Meliou, Timos K. Sellis. Modeling and manipulating the structure of hierarchical schemas for the web
1011 -- 1031A. R. Tawil, Matthew Montebello, R. Bahsoon, W. A. Gray, N. J. Fiddian. Interschema correspondence establishment in a cooperative OWL-based multi-information server grid environment
1032 -- 1048Long-Sheng Chen, Fei-Hao Hsu, Mu-Chen Chen, Yuan-Chia Hsu. Developing recommender systems with the consideration of product profitability for sellers
1049 -- 1068I-En Liao, Kuo-Fong Kao. Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information
1069 -- 1077Qiang Zhu, San-yang Liu, Min Xu. On conditional diagnosability of the folded hypercubes
1078 -- 1086Tongjiang Yan, Bingjia Huang, Guozhen Xiao. Cryptographic properties of some binary generalized cyclotomic sequences with the length p:::2:::
1087 -- 1097Yu-Jie Wang, Hsuan-Shih Lee. A clustering method to identify representative financial ratios
1098 -- 1109Yan-Ping Jiang, Zhi-Ping Fan, Jian Ma. A method for group decision making with multi-granularity linguistic assessment information
1110 -- 1132Kiam Tian Seow, Kwang Mong Sim. Collaborative assignment using belief-desire-intention agent modeling and negotiation with speedup strategies
1133 -- 1140Radko Mesiar, Jana Spirková, Lucia Vavríková. Weighted aggregation operators based on minimization
1141 -- 1151Han-Liang Huang, Fu-Gui Shi. L-fuzzy numbers and their properties
1152 -- 1170Mohammad Hossein Fazel Zarandi, Adel Alaeddini, I. Burhan Türksen. A hybrid fuzzy adaptive sampling - Run rules for Shewhart control charts
1171 -- 1188Zhi-Ren Tsai, Yau-Zen Chang, Jiing-Dong Hwang, Jye Lee. Robust fuzzy stabilization of dithered chaotic systems using island-based random optimization algorithm
1189 -- 1204M. Duran Toksari. Taylor series approach to fuzzy multiobjective linear fractional programming
1205 -- 1218Yunjie Zhang, Weina Wang, Xiaona Zhang, Yi Li. A cluster validity index for fuzzy clustering
1219 -- 1234Xibei Yang, Jingyu Yang, Chen Wu, Dongjun Yu. Dominance-based rough set approach and knowledge reductions in incomplete ordered information system
1235 -- 1256Jinfu Liu, Qinghua Hu, Daren Yu. A weighted rough set based method developed for class imbalance learning
1257 -- 1262A. Bayar, S. Ekmekçi, Z. Akça. A note on fibered projective plane geometry

Volume 178, Issue 3

585 -- 587Athanasios V. Vasilakos. Special Issue: Ambient Intelligence
588 -- 611Stephen Keegan, Gregory M. P. O Hare, Michael J. O Grady. Easishop: Ambient intelligence assists everyday shopping
612 -- 630Anton Nijholt. Google home: Experience, support and re-experience of social home activities
631 -- 646Giovanni Acampora, Vincenzo Loia. A proposal of ubiquitous fuzzy computing for Ambient Intelligence
647 -- 662Steffen Pauws, Wim Verhaegh, Mark Vossen. Music playlist generation by adapted simulated annealing
663 -- 678Magy Seif El-Nasr, Athanasios V. Vasilakos. DigitalBeing - using the environment as an expressive medium for dance
679 -- 693Athanasios V. Vasilakos, Wei Liu, Ta Huynh Duy Nguyen, Tran Cong Thien Qui, Li Cheng Chen, Clara Boj Tovar, Diego J. Díaz, Adrian David Cheok, Georgios Marentakis. Interactive theatre via mixed reality and Ambient Intelligence
694 -- 713Seung-Woo Kim, Sanghyun Park, Jung-Im Won, Sang-Wook Kim. Privacy preserving data mining of sequential patterns for network traffic data
714 -- 731Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang. A discretization algorithm based on Class-Attribute Contingency Coefficient
732 -- 741Jen-der Day, Jeng-Shyang Pan. A new measure of index assignment in dynamic channels
742 -- 755Shanshan Duan. Certificateless undeniable signature scheme
756 -- 765Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, Xiaohui Liang. New (t, n) threshold directed signature scheme with provable security
766 -- 773Jianhong Zhang, Jane Mao. A novel ID-based designated verifier signature scheme
774 -- 787Jun Gao, Tengjiao Wang, Dongqing Yang. XFlat: Query-friendly encrypted XML view publishing
788 -- 801Tsung-Chi Lin, Dyi-Rong Duh. Constructing vertex-disjoint paths in (n, k)-star graphs
802 -- 806Shahram Latifi, Ebrahim Saberinia, Xialong Wu. Robustness of star graph network under link failure
807 -- 815Tongjiang Yan, Li Hong, Guozhen Xiao. The linear complexity of new generalized cyclotomic binary sequences of order four
816 -- 826Ronald R. Yager, Dimitar Filev. Summarizing data using a similarity based mountain method
827 -- 835Seyed Mahmoud Taheri. C-fuzzy numbers and a dual of extension principle
836 -- 857Qiang Luo, Wenqiang Yang, Dongyun Yi. Kernel shapes of fuzzy sets in fuzzy systems for function approximation
858 -- 870Erdal Kiliç. Diagnosability of fuzzy discrete event systems
871 -- 891Chen-Chia Chuang. Extended support vector interval regression networks for interval input-output data
892 -- 906Tong-Jun Li, Wen-Xiu Zhang. Rough fuzzy approximations on two universes of discourse
907 -- 919Fei Han, Qing-Hua Ling, De-Shuang Huang. Modified constrained learning algorithms incorporating additional functional constraints into neural networks
920 -- 930Qun-Liang Zhang, Yu-Geng Xi. An efficient model predictive controller with pole placement

Volume 178, Issue 24

4585 -- 4618Corrado Mencar, Anna Maria Fanelli. Interpretability constraints for fuzzy information granulation
4619 -- 4631Yong-Sheng Ding, Zhi-Hua Hu, Hong-Bin Sun. An antibody network inspired evolutionary framework for distributed object computing
4632 -- 4643Jui-Chung Hung. A genetic algorithm approach to the spectral estimation of time series with noise and missed observations
4644 -- 4655Josep Domingo-Ferrer, Agusti Solanas. A measure of variance for hierarchical nominal attributes
4656 -- 4669Jih-Hsin Ho, Wen-Ping Chen, Wen-Shyang Hwang, Ce-Kuen Shieh. A study of the length effect of fiber delay line based on CSMA/CP optical packet switching
4670 -- 4678Vijay Kumar, Kuldeep Kumar. On the ideal convergence of sequences of fuzzy numbers
4679 -- 4687Jywe-Fei Fang. The bipancycle-connectivity of the hypercube
4688 -- 4698Cheng Wang, Wansheng Tang, Ruiqing Zhao. Static Bayesian games with finite fuzzy types and the existence of equilibrium
4699 -- 4706Jenq-Der Chen, Chyi-Da Yang, Chang-Hua Lien, Ji-Hwei Horng. New delay-dependent non-fragile H

Volume 178, Issue 23

4419 -- 4420Uday K. Chakraborty. Genetic and evolutionary computing
4421 -- 4433Manuel Lozano, Francisco Herrera, José Ramón Cano. Replacement strategies to preserve useful diversity in steady-state genetic algorithms
4434 -- 4452John R. Koza, Matthew J. Streeter, Martin A. Keane. Routine high-return human-competitive automated problem-solving by means of genetic programming
4453 -- 4468Hitoshi Iba. Inference of differential equation models by genetic programming
4469 -- 4481Ivan Tanev, Kikuo Yuta. Epigenetic programming: Genetic programming incorporating epigenetic learning through modification of histones
4482 -- 4500Samuel Landau, Olivier Sigaud. A comparison between ATNoSFERES and Learning Classifier Systems on non-Markov problems
4501 -- 4511Chi-Hoon Lee, Osmar R. Zaïane, Ho-Hyun Park, Jiayuan Huang, Russell Greiner. Clustering high dimensional data: A graph-based relaxed optimization approach
4512 -- 4522Hai-Tao Zheng, Bo-Yeong Kang, Hong-Gee Kim. An ontology-based approach to learnable focused crawling
4523 -- 4533Vasile Lupulescu. Initial value problem for fuzzy differential equations under dissipative conditions
4534 -- 4541Fabrizio Durante, Susanne Saminger-Platz, Peter Sarkoci. On representations of 2-increasing binary aggregation functions
4542 -- 4549Kun-Lun Zhang, Dong-Hai Li, Li-Xia Song. Solution of an open problem on pseudo-Archimedean t-norms
4550 -- 4559Coskun Hamzaçebi. Improving artificial neural networks performance in seasonal time series forecasting
4560 -- 4570Jeng-Chung Chen, Wei-Hsin Chen. Diagnostic analysis of a small-scale incinerator by the Garson index
4571 -- 4582U. Rajendra Acharya, Meena Sankaranarayanan, Jagadish Nayak, Chen Xiang, Toshiyo Tamura. Automatic identification of cardiac health using modeling techniques: A comparative study
4583 -- 0A. Volgenant. An addendum on the incremental assignment problem
4584 -- 0Ismail Hakki Toroslu, Göktürk Üçoluk. Authors response to an addendum on the incremental assignment problem by Volgenant

Volume 178, Issue 22

4205 -- 4227Cao D. Nguyen, Krzysztof J. Cios. GAKREM: A novel hybrid clustering algorithm
4228 -- 4245Ming-Yen Lin, Sue-Chen Hsueh, Chia-Wen Chang. Fast discovery of sequential patterns in large databases using effective time-indexing
4246 -- 4263Antonio Sala. Encoding fuzzy possibilistic diagnostics as a constrained optimization problem
4264 -- 4279Wen Yu, Xiaoou Li. On-line fuzzy modeling via clustering and support vector machines
4280 -- 4300A. Azadeh, I. M. Fam, M. Khoshnoud, M. Nikafrouz. Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: The case of a gas refinery
4301 -- 4313Woo-Cheol Kim, Ji-Young Song, Seung-Woo Kim, Sanghyun Park. Image retrieval model based on weighted visual features determined by relevance feedback
4314 -- 4325Hui Zhou, Runsheng Wang, Cheng Wang. A novel extended local-binary-pattern operator for texture analysis
4326 -- 4340Min Wang, Bing Chen, Kefu Liu, Xiaoping Liu, Siying Zhang. Adaptive fuzzy tracking control of nonlinear time-delay systems with unknown virtual control coefficients
4341 -- 4356Xiaona Song, Shengyuan Xu, Hao Shen. Robust H
4357 -- 4374Xiang-Yun Xie, Jian Tang. Fuzzy radicals and prime fuzzy ideals of ordered semigroups
4375 -- 4381Zoran H. Peric, Olivera D. Milanovic, Aleksandra Z. Jovanovic. Optimal companding vector quantization for circularly symmetric sources
4382 -- 4395G. Alvarez, Luis Hernández Encinas, Ángel Martín del Rey. A multisecret sharing scheme for color images based on cellular automata
4396 -- 4402Yao Ouyang, Jinxuan Fang. Some results of weighted quasi-arithmetic mean of continuous triangular norms
4403 -- 4417Yuhui Deng, Frank Wang, Na Helian. EED: Energy Efficient Disk drive architecture

Volume 178, Issue 21

3989 -- 4018Sven Groppe, Jinghua Groppe. Output schemas of XSLT stylesheets and their applications
4019 -- 4037Wojciech Kotlowski, Krzysztof Dembczynski, Salvatore Greco, Roman Slowinski. Stochastic dominance-based rough set model for ordinal classification
4038 -- 4056Mario Ventresca, Hamid R. Tizhoosh. A diversity maintaining population-based incremental learning algorithm
4057 -- 4079Zuohua Ding, Kao Zhang, Jueliang Hu. A rigorous approach towards test case generation
4080 -- 4093Hongbin Yan, Van-Nam Huynh, Tetsuya Murai, Yoshiteru Nakamori. Kansei evaluation based on prioritized multi-attribute fuzzy target-oriented decision analysis
4094 -- 4104J. Recasens. The structure of decomposable indistinguishability operators
4105 -- 4113Guilong Liu, William Zhu. The algebraic structures of generalized rough set theory
4114 -- 4124Violeta Leoreanu Fotea, Bijan Davvaz. Roughness in n
4125 -- 4137Lidong Wang, Xiaodong Liu. Concept analysis via rough set and AFS algebra
4138 -- 4141Keyun Qin, Jilin Yang, Zheng Pei. Generalized rough sets based on reflexive and transitive relations
4142 -- 4151Junping Liu, Yongming Li. The relationship of controllability between classical and fuzzy discrete-event systems
4152 -- 4165K. Peeva, Zl. Zahariev. Computing behavior of finite fuzzy machines - Algorithm and its application to reduction and minimization
4166 -- 4183Jiann Liang Yang, Huan-Neng Chiu, Gwo-Hshiung Tzeng, Ruey Huei Yeh. Vendor selection by integrated fuzzy MCDM techniques with independent and interdependent relationships
4184 -- 4191Qian-Sheng Zhang, Sheng-Yi Jiang. A note on information entropy measures for vague sets and its applications
4192 -- 4203Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim. Efficient generic on-line/off-line (threshold) signatures without key exposure

Volume 178, Issue 20

3799 -- 3801Lazaros S. Iliadis. Special issue on Industrial Applications of Neural Networks
3802 -- 3812Miao Kang, Dominic Palmer-Brown. A modal learning adaptive function neural network applied to handwritten digit recognition
3813 -- 3827Gérard Bloch, Fabien Lauer, Guillaume Colin, Yann Chamaillard. Support vector regression from simulation data and few experimental samples
3828 -- 3839Lazaros S. Iliadis, S. Spartalis, S. Tachos. Application of fuzzy T
3840 -- 3859Pekka Kumpulainen, Kimmo Hätönen. Local anomaly detection for mobile network monitoring
3860 -- 3866Dimitrios H. Mantzaris, George C. Anastassopoulos, Adam Adamopoulos, Stefanos Gardikis. A non-symbolic implementation of abdominal pain estimation in childhood
3867 -- 3879Ioannis Partalas, Grigorios Tsoumakas, Evaggelos V. Hatzikos, Ioannis P. Vlahavas. Greedy regression ensemble selection: Theory and an application to water quality prediction
3880 -- 3894Athanasios K. Tsadiras. Comparing the inference capabilities of binary, trivalent and sigmoid fuzzy cognitive maps
3895 -- 3907George E. Tsekouras, Mamalis Antonios, Christos Anagnostopoulos, Damianos Gavalas, Dafne Economou. Improved batch fuzzy learning vector quantization for image compression
3908 -- 3924Xavier Blasco Ferragud, Juan Manuel Herrero Durá, Javier Sanchis, M. Martínez. A new graphical visualization of n
3925 -- 3942Gae-won You, Seung-won Hwang. Search structures and algorithms for personalized ranking
3943 -- 3956Zhanggui Zeng, Hong Yan. Supervised classification of share price trends
3957 -- 3972Sultan Yamak, Osman Kazanci, Bijan Davvaz. Applications of interval valued t
3973 -- 3988Shih-Pin Chen, Jr-Fong Dang. A variable spread fuzzy linear regression model with higher explanatory power and forecasting accuracy

Volume 178, Issue 2

287 -- 306Yue-Shi Lee, Show-Jane Yen. Incremental and interactive mining of web traversal patterns
307 -- 316Xiao Long Xin, Ti Yao Li, Jing Hua Lu. On derivations of lattices
317 -- 339Chang-Sup Park, Soyeon Park. Efficient execution of composite Web services exchanging intensional data
340 -- 351Jianxi Fan, Xiaohua Jia. Edge-pancyclicity and path-embeddability of bijective connection graphs
352 -- 362Eui-nam Huh, Hyunseung Choo. Performance enhancement of TCP in high-speed networks
363 -- 380Ronald R. Yager. Using trapezoids for representing granular objects: Applications to learning and OWA aggregation
381 -- 402Dongrui Wu, Jerry M. Mendel. A vector similarity measure for linguistic approximation: Interval type-2 and type-1 fuzzy sets
403 -- 413Xiaodong Pan, Yang Xu. Lattice implication ordered semigroups
414 -- 424Dechao Li, Zhong-Ke Shi, Yongming Li. Sufficient and necessary conditions for Boolean fuzzy systems as universal approximators
425 -- 438Jianming Zhan, Bijan Davvaz, K. P. Shum. A new view of fuzzy hypernear-rings
439 -- 451Hae Kyung Kim, Jin Hee Yoon, Ying Li. Asymptotic properties of least squares estimation with fuzzy observations
452 -- 467Zeshui Xu. Group decision making based on multiple types of linguistic preference relations
468 -- 484E. E. Ammar. On solutions of fuzzy random multiobjective quadratic programming with applications in portfolio problem
485 -- 500Dogan Özgen, Semih Önüt, Bahadir Gülsün, Umut Rifat Tuzkaya, Gülfem Tuzkaya. A two-phase possibilistic linear programming methodology for multi-objective supplier evaluation and order allocation problems
501 -- 519Amin Ghodousian, Esmaile Khorram. Fuzzy linear optimization in the presence of the fuzzy relation inequality constraints with max-min composition
520 -- 530Daowu Pei. Unified full implication algorithms of fuzzy reasoning
531 -- 549Kuo-liang Lee, Shu-Chen Lin. A fuzzy quantified SWOT procedure for environmental evaluation of an international distribution center
550 -- 561Sang-Eon Han. Equivalent (k::0::, k::1::)-covering and generalized digital lifting
562 -- 572Teimuraz Tsabadze. The reduction of binary fuzzy relations and its applications
573 -- 583Jiashun Zhang, Ruiqing Zhao, Wansheng Tang. Fuzzy age-dependent replacement policy and SPSA algorithm based-on fuzzy simulation

Volume 178, Issue 19

3645 -- 3664Pierre Loslever, P. Simon, F. Rousseau, Jean-Christophe Popieul. Using space windowing for a preliminary analysis of complex time data in human component system studies. Examples with eye-tracking in advertising and car/head movements in driving
3665 -- 3682Aziz Sözer, Adnan Yazici, Halit Oguztüzün, Osman Tas. Modeling and querying fuzzy spatiotemporal databases
3683 -- 3696Hui-Ling Hu, Yen-Liang Chen. Mining typical patterns from databases
3697 -- 3715Hsu-Sheng Tsai, Wei Kuang Lai. Improving fairness among TCP flows by stateless buffer control with early drop maximum
3716 -- 3726Serkan Gunal, Rifat Edizkan. Subspace based feature selection for pattern recognition
3727 -- 3737Wei Li, Dawu Gu, Juanru Li. Differential fault analysis on the ARIA algorithm
3738 -- 3754Xueling Ma, Jianming Zhan, Bijan Davvaz, Young Bae Jun. Some kinds of (epsilon, epsilon or q)-interval-valued fuzzy ideals of BCI-algebras
3755 -- 3765Tien-Chin Wang, Yueh-Hsiang Chen. Applying fuzzy linguistic preference relations to the improvement of consistency of fuzzy AHP
3766 -- 3774Bih-Sheue Shieh. Deriving minimal solutions for fuzzy relation equations with max-product composition
3775 -- 3790Zeshui Xu, Jian Chen, Junjie Wu. Clustering algorithm for intuitionistic fuzzy sets
3791 -- 3798Alireza Kamel Mirmostafaee, Mohammad Sal Moslehian. Fuzzy approximately cubic mappings

Volume 178, Issue 18

3491 -- 3509Yu-Chin Liu, Ping-Yu Hsu, Gwo-Ji Sheen, Steve Ku, Kai-Wen Chang. Simultaneous determination of view selection and update policy with stochastic query and response time constraints
3510 -- 3524Gae-won You, Seung-won Hwang, Hwanjo Yu. Supporting personalized ranking over categorical attributes
3525 -- 3542Biao Qin, Shan Wang, Xiaoyong Du, Qiming Chen, Qiuyue Wang. Graph-based query rewriting for knowledge sharing between peer ontologies
3543 -- 3556Chin-Chen Chang, Wen-Chuan Wu, Yi-Hui Chen. Joint coding and embedding techniques for multimedia images
3557 -- 3564Radko Mesiar, Endre Pap. Aggregation of infinite sequences
3565 -- 3576Ronald R. Yager. Level sets and the extension principle for interval valued fuzzy sets and its application to uncertainty measures
3577 -- 3594Qinghua Hu, Daren Yu, Jinfu Liu, Congxin Wu. Neighborhood rough set based heterogeneous feature subset selection
3595 -- 3604Dong Qiu, Lan Shu. Supremum metric on the space of fuzzy sets and common fixed point theorems for fuzzy mappings
3605 -- 3615Violeta Leoreanu Fotea. The lower and upper approximations in a hypergroup
3616 -- 3634Godfrey C. Onwubolu. Design of hybrid differential evolution and group method of data handling networks for modeling and prediction
3635 -- 3644Lei Guo, Xingwei Wang, Qingyang Song, Xuetao Wei, Weigang Hou, Ting Yang, Fei Yang. New insights on survivability in multi-domain optical networks

Volume 178, Issue 17

3319 -- 3332Estela Saquete, Óscar Ferrández, Sergio Ferrández, Patricio Martínez-Barco, Rafael Muñoz. Combining automatic acquisition of knowledge with machine learning approaches for multilingual temporal recognition and normalization
3333 -- 3346Joris Vertommen, Frizo A. L. Janssens, Bart De Moor, Joost R. Duflou. Multiple-vector user profiles in support of knowledge sharing
3347 -- 3355Cheng-Hsiang Liu, Long-Sheng Chen, Chun-Chin Hsu. An association-based case reduction technique for case-based reasoning
3356 -- 3373Yiyu Yao, Yan Zhao. Attribute reduction in decision-theoretic rough set models
3374 -- 3381Ruoning Xu, Xiaoyan Zhai. Optimal models for single-period supply chain problems with fuzzy demand
3382 -- 3392El Houssaine Aghezzaf, Najib M. Najid. Integrated production planning and preventive maintenance in deteriorating production systems
3393 -- 3401Seong-Jin Park, Kwang-Hyun Cho. Real-time preemptive scheduling of sporadic tasks based on supervisory control of discrete event systems
3402 -- 3414Jayadeva, Reshma Khemchandani, Suresh Chandra. Regularized least squares support vector regression for the simultaneous learning of a function and its derivatives
3415 -- 3425Hussein Alzoubi, W. David Pan. Fast and accurate global motion estimation algorithm using pixel subsampling
3426 -- 3434Ting Yi Chang. A Convertible Multi-Authenticated Encryption scheme for group communications
3443 -- 3450Xianzhong Zhao, Young Bae Jun, Fang Ren. The semiring of matrices over a finite chain
3451 -- 3464Yunqiang Yin, Hongxing Li. The characterizations of h
3465 -- 3473Zhudeng Wang, Jin-xuan Fang. On v
3474 -- 3481Jirí Rachunek, Dana Salounová. Fuzzy filters and fuzzy prime filters of bounded R
3482 -- 3490Xiao-bing Qu, Xue-ping Wang. Minimization of linear objective functions under the constraints expressed by a system of fuzzy relation equations

Volume 178, Issue 16

3161 -- 3162Daniel S. Yeung, Xizhao Wang, Degang Chen. Preface: Recent advances in granular computing
3163 -- 3176Suyun Zhao, Eric C. C. Tsang. On fuzzy approximation operators in attribute reduction with fuzzy rough sets
3177 -- 3187Degang Chen, Wenxia Yang, Fachao Li. Measures of general fuzzy rough sets on a probabilistic space
3188 -- 3202Xi-Zhao Wang, Jun-Hai Zhai, Shu-Xia Lu. Induction of multiple fuzzy decision trees based on rough set technique
3203 -- 3213Ju-Sheng Mi, Yee Leung, Hui-Yin Zhao, Tao Feng. Generalized fuzzy rough sets determined by a triangular norm
3214 -- 3227Mu-Chen Chen, Long-Sheng Chen, Chun-Chin Hsu, Wei-Rong Zeng. An information granulation based data mining approach for classifying imbalanced data
3228 -- 3239Changzhong Wang, Congxin Wu, Degang Chen, Qinghua Hu, Cong Wu. Communicating between information systems
3240 -- 3246Ming-hu Ha, Jing Tian. The theoretical foundations of statistical learning theory based on fuzzy number samples
3247 -- 3252Bijan Davvaz. A short note on algebraic T
3253 -- 3274Ciro Castiello, Giovanna Castellano, Anna Maria Fanelli. Mindful
3275 -- 3287Aybars Ugur. Path planning on a cuboid using genetic algorithms
3288 -- 3299Carlos Gomes da Silva. Time series forecasting with a non-linear model and the scatter search meta-heuristic
3300 -- 3306Xiaoni Du, Zhixiong Chen, Guozhen Xiao. On the linear complexity of some new q
3307 -- 3316Xiaoni Du, Tongjiang Yan, Guozhen Xiao. Trace representation of some generalized cyclotomic sequences of length pq

Volume 178, Issue 15

2983 -- 2984Ke Tang, Xin Yao. Special Issue on Nature Inspired Problem-Solving
2985 -- 2999Zhenyu Yang, Ke Tang, Xin Yao. Large scale evolutionary optimization using cooperative coevolution
3000 -- 3023Weishan Dong, Xin Yao. Unified eigen analysis on multivariate Gaussian based estimation of distribution algorithms
3024 -- 3042Simon T. Powers, Jun He. A hybrid artificial immune system and Self Organising Map for network intrusion detection
3043 -- 3074Min Zhang, Wenjian Luo, Xufa Wang. Differential evolution with dynamic stochastic selection for constrained optimization
3075 -- 3095Andrea Arcuri, Xin Yao. Search based software testing of object-oriented containers
3096 -- 3109Weilin Du, Bin Li. Multi-strategy ensemble particle swarm optimization for dynamic optimization
3110 -- 3117D. Manivannan, Qiangfeng Jiang, Jianchang Yang, Mukesh Singhal. A quasi-synchronous checkpointing algorithm that prevents contention for stable storage
3118 -- 3132Abbas Ghaemi Bafghi, Reza Safabakhsh, Babak Sadeghiyan. Finding the differential characteristics of block ciphers with neural networks
3133 -- 3146Umut Rifat Tuzkaya, Semih Önüt. A fuzzy analytic network process based approach to transportation-mode selection between Turkey and Germany: A case study
3147 -- 3159Bijan Davvaz, Jianming Zhan, K. P. Shum. Generalized fuzzy H

Volume 178, Issue 14

2857 -- 2869Matthew S. Gibbs, Graeme C. Dandy, Holger R. Maier. A genetic algorithm calibration method based on convergence due to genetic drift
2870 -- 2879David Shilane, Jarno Martikainen, Sandrine Dudoit, Seppo J. Ovaska. A general framework for statistical performance comparison of evolutionary computation algorithms
2880 -- 2898Tzu-Fang Sheu, Nen-Fu Huang, Hsiao Ping Lee. Hierarchical multi-pattern matching algorithm for network content inspection
2899 -- 2914Jiuping Xu, Yonggang Liu. Multi-objective decision making model under fuzzy random environment and its application to inventory problems
2915 -- 2927Ibrahim Korkmaz, Hadi Gökçen, Tahsin Çetinyokus. An analytic hierarchy process and two-sided matching based decision support system for military personnel assignment
2928 -- 2949Shihong Du, Luo Guo, Qiao Wang. A model for describing and composing direction relations between overlapping and contained regions
2950 -- 2959Fan Zhang, Zhigeng Pan, Kui Cao, Fengbin Zheng, Fangming Wu. The upper and lower bounds of the information-hiding capacity of digital images
2960 -- 2967Jeng-Jung Wang, Tung-Yang Ho, Daniela Ferrero, Ting-Yi Sung. Diameter variability of cycles and tori
2968 -- 2982YounHo Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon. An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids

Volume 178, Issue 13

2751 -- 2779Lotfi A. Zadeh. Is there a need for fuzzy logic?
2780 -- 2793Faheem Ahmed, Luiz Fernando Capretz, J. Samarabandu. Fuzzy inference system for software product family process evaluation
2794 -- 2815Bingzhen Sun, Zengtai Gong, Degang Chen. Fuzzy rough set theory for the interval-valued fuzzy information systems
2816 -- 2831Ashish Ghosh, Anindya Halder, Megha Kothari, Susmita Ghosh. Aggregation pheromone density based data clustering
2832 -- 2848Susana Díaz, José Luis García-Lapresta, Susana Montes. Consistent models of transitivity for reciprocal preferences on a finite ordinal scale
2849 -- 2856Raphael Chung-Wei Phan, Wei-Chuen Yau, Bok-Min Goi. Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)

Volume 178, Issue 12

2489 -- 2506Jean-François Bercher. On some entropy functionals derived from Rényi information divergence
2507 -- 2533Hong-Cheu Liu, Jeffrey Xu Yu, Weifa Liang. Safety, domain independence and translation of complex value database queries
2534 -- 2552Guzen Erozel, Nihan Kesim Cicekli, Ilyas Cicekli. Natural language querying for video databases
2553 -- 2563Mikyung Kang, Dong-In Kang, Jinwoo Suh, Junghoon Lee. An energy-efficient real-time scheduling scheme on dual-channel networks
2564 -- 2572Okbin Lee, Yeojin Lee, Seongyeol Kim, Sangman Moh, Ilyong Chung. Application of load balancing based on symmetric balanced incomplete block design to random networks
2573 -- 2584Jung-Sheng Fu. Hamiltonian connectivity of the WK-recursive network with faulty nodes
2585 -- 2599Lain-Chyr Hwang, Chia-Hsu Kuo, San-Yuan Wang. Concave piecewise linear service curves and deadline calculations
2600 -- 2620Mikhail Moshkov, Andrzej Skowron, Zbigniew Suraj. Maximal consistent extensions of information systems relative to their theories
2621 -- 2638S. Suresh, Narasimhan Sundararajan, Paramasivan Saratchandran. Risk-sensitive loss functions for sparse multi-category classification problems
2639 -- 2647Fathi B. Saidi, Ali Jaballah. Alternative characterizations for the representation of families of sets by fuzzy sets
2648 -- 2660Ke-Ang Fu, Li-Xin Zhang. Strong limit theorems for random sets and fuzzy random sets with slowly varying weights
2661 -- 2679Yixiang Chen, Hengyang Wu. Domain semantics of possibility computations
2680 -- 2704Yongguo Liu, Zhang Yi, Hong Wu, Mao Ye, Kefei Chen. A tabu search approach for the minimum sum-of-squares clustering problem
2705 -- 2721Ying-hui Wang, Xiao-juan Ning, Chun-xia Yang, Qiong-fang Wang. A method of illumination compensation for human face image based on quotient image
2722 -- 2733Odemir Martinez Bruno, Rodrigo de Oliveira Plotze, Mauricio Falvo, Mário de Castro. Fractal dimension applied to plant identification
2734 -- 2749Engang Tian, Dong Yue, Chen Peng. Quantized output feedback control for networked control systems

Volume 178, Issue 11

2375 -- 2388Pascual Castelló, Mateu Sbert, Miguel Chover, Miquel Feixas. Viewpoint-based simplification using f-divergences
2389 -- 2395Om Parkash, P. K. Sharma, Renuka Mahajan. New measures of weighted fuzzy entropy and their applications for the study of maximum weighted fuzzy entropy principle
2396 -- 2405Qiang Dong, Xiaofan Yang, Juan Zhao, Yuan Yan Tang. Embedding a family of disjoint 3D meshes into a crossed cube
2406 -- 2415Xuetao Wei, Lei Guo, Xingwei Wang, Qingyang Song, Lemin Li. Availability guarantee in survivable WDM mesh networks: A time perspective
2416 -- 2432Hyun-Ho Lee, Eun-Won Yun, Won Suk Lee. Attribute-based evaluation of multiple continuous queries for filtering incoming tuples of a data stream
2433 -- 2447Chin-Chen Chang, Chia-Chen Lin, Chia-Hsuan Lin, Yi-Hui Chen. A novel secret image sharing scheme in color images using small shadow images
2448 -- 2465Lei Zhou, Wei-Zhi Wu. On generalized intuitionistic fuzzy rough approximation operators
2466 -- 2475Young Bae Jun, Chul Hwan Park. Applications of soft sets in ideal theory of BCK/BCI-algebras
2476 -- 2487T. C. Edwin Cheng, Chin-Chia Wu, Wen-Chiung Lee. Some scheduling problems with sum-of-processing-times-based and job-position-based learning effects

Volume 178, Issue 10

2297 -- 2314Seungho Lee, Young Jun Son, Judy Jin. Decision field theory extensions for behavior modeling in dynamic environment using Bayesian belief network
2315 -- 2336Pradipta Maji, Parimal Pal Chaudhuri. Non-uniform cellular automata based associative memory: Evolutionary design and basins of attraction
2337 -- 2348Xiaolong Wu, Shahram Latifi. Substar Reliability Analysis in Star Networks
2349 -- 2359Osman Kazanci, Sultan Yamak, Bijan Davvaz. The lower and upper approximations in a quotient hypermodule with respect to fuzzy sets
2360 -- 2373Zuhua Shao. Certificate-based verifiably encrypted signatures from pairings

Volume 178, Issue 1

1 -- 20Yaohua Chen, Yiyu Yao. A multiview approach for intelligent data analysis based on data operators
21 -- 36Qingzhong Liu, Andrew H. Sung, Bernardete Ribeiro, Mingzhen Wei, Zhongxue Chen, Jianyun Xu. Image complexity and feature mining for steganalysis of least significant bit matching steganography
37 -- 51Hyung Jun Ahn. A new similarity measure for collaborative filtering to alleviate the new user cold-starting problem
52 -- 68Shihong Du, Qimin Qin, Qiao Wang, Haijian Ma. Evaluating structural and topological consistency of complex regions with broad boundaries in multi-resolution spatial databases
69 -- 87Tianming Hu, Sam Yuan Sung, Hui Xiong, Qian Fu. Discovery of maximum length frequent itemsets
106 -- 121Wong Li Yun, U. Rajendra Acharya, Y. V. Venkatesh, Caroline Chee, Lim Choo Min, E. Y. K. Ng. Identification of different stages of diabetic retinopathy using retinal optical images
122 -- 136Chutima Pisarn, Thanaruk Theeramunkong. Thai spelling analysis for automatic spelling speech recognition
137 -- 151Chi-Cheng Cheng, Gwo-Long Lin. Acquisition of translational motion by the parallel trinocular
152 -- 163Masaharu Munetomo, Naoya Murao, Kiyoshi Akama. Introducing assignment functions to Bayesian optimization algorithms
164 -- 180Jelena Ignjatovic, Miroslav Ciric, Stojan Bogdanovic. Determinization of fuzzy automata with membership values in complete residuated lattices
181 -- 202Yuhua Qian, Jiye Liang, Deyu Li, Haiyun Zhang, Chuangyin Dang. Measures for evaluating the decision performance of a decision table in rough set theory
203 -- 219Rogemar S. Mamon, Christina Erlwein, R. Bhushan Gopaluni. Adaptive signal processing of asset price dynamics with predictability analysis
220 -- 229Hao-Rung Chung, Wei-Chi Ku. Three weaknesses in a simple three-party key exchange protocol
230 -- 243Yu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen. Access control in user hierarchy based on elliptic curve cryptosystem
244 -- 255Li Shundong, Daoshun Wang, Dai Yiqi, Luo Ping. Symmetric cryptographic solution to Yao s millionaires problem and an evaluation of secure multiparty computations
256 -- 263Tzong-Sun Wu, Chien-Lung Hsu, Kuo-Yu Tsai, Han-Yu Lin, Tzong-Chen Wu. Convertible multi-authenticated encryption scheme
264 -- 279Wei Zhang, Pepe Siy. An efficient design of residue to binary converter for four moduli set (2:::n:::-1, 2:::n:::+1, 2:::2n:::-2, 2:::2n+1:::-3) based on new CRT II
280 -- 286Yuan Li. Results on rotation symmetric polynomials over GF(p)