585 | -- | 587 | Athanasios V. Vasilakos. Special Issue: Ambient Intelligence |
588 | -- | 611 | Stephen Keegan, Gregory M. P. O Hare, Michael J. O Grady. Easishop: Ambient intelligence assists everyday shopping |
612 | -- | 630 | Anton Nijholt. Google home: Experience, support and re-experience of social home activities |
631 | -- | 646 | Giovanni Acampora, Vincenzo Loia. A proposal of ubiquitous fuzzy computing for Ambient Intelligence |
647 | -- | 662 | Steffen Pauws, Wim Verhaegh, Mark Vossen. Music playlist generation by adapted simulated annealing |
663 | -- | 678 | Magy Seif El-Nasr, Athanasios V. Vasilakos. DigitalBeing - using the environment as an expressive medium for dance |
679 | -- | 693 | Athanasios V. Vasilakos, Wei Liu, Ta Huynh Duy Nguyen, Tran Cong Thien Qui, Li Cheng Chen, Clara Boj Tovar, Diego J. Díaz, Adrian David Cheok, Georgios Marentakis. Interactive theatre via mixed reality and Ambient Intelligence |
694 | -- | 713 | Seung-Woo Kim, Sanghyun Park, Jung-Im Won, Sang-Wook Kim. Privacy preserving data mining of sequential patterns for network traffic data |
714 | -- | 731 | Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang. A discretization algorithm based on Class-Attribute Contingency Coefficient |
732 | -- | 741 | Jen-der Day, Jeng-Shyang Pan. A new measure of index assignment in dynamic channels |
742 | -- | 755 | Shanshan Duan. Certificateless undeniable signature scheme |
756 | -- | 765 | Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, Xiaohui Liang. New (t, n) threshold directed signature scheme with provable security |
766 | -- | 773 | Jianhong Zhang, Jane Mao. A novel ID-based designated verifier signature scheme |
774 | -- | 787 | Jun Gao, Tengjiao Wang, Dongqing Yang. XFlat: Query-friendly encrypted XML view publishing |
788 | -- | 801 | Tsung-Chi Lin, Dyi-Rong Duh. Constructing vertex-disjoint paths in (n, k)-star graphs |
802 | -- | 806 | Shahram Latifi, Ebrahim Saberinia, Xialong Wu. Robustness of star graph network under link failure |
807 | -- | 815 | Tongjiang Yan, Li Hong, Guozhen Xiao. The linear complexity of new generalized cyclotomic binary sequences of order four |
816 | -- | 826 | Ronald R. Yager, Dimitar Filev. Summarizing data using a similarity based mountain method |
827 | -- | 835 | Seyed Mahmoud Taheri. C-fuzzy numbers and a dual of extension principle |
836 | -- | 857 | Qiang Luo, Wenqiang Yang, Dongyun Yi. Kernel shapes of fuzzy sets in fuzzy systems for function approximation |
858 | -- | 870 | Erdal Kiliç. Diagnosability of fuzzy discrete event systems |
871 | -- | 891 | Chen-Chia Chuang. Extended support vector interval regression networks for interval input-output data |
892 | -- | 906 | Tong-Jun Li, Wen-Xiu Zhang. Rough fuzzy approximations on two universes of discourse |
907 | -- | 919 | Fei Han, Qing-Hua Ling, De-Shuang Huang. Modified constrained learning algorithms incorporating additional functional constraints into neural networks |
920 | -- | 930 | Qun-Liang Zhang, Yu-Geng Xi. An efficient model predictive controller with pole placement |