Journal: Inf. Sci.

Volume 179, Issue 9

1217 -- 1220Janusz Szczepanski. On the distribution function of the complexity of finite sequences
1221 -- 1233Koen Maes, Andrea Mesiarová-Zemánková. Cancellativity properties for t-norms and t-subnorms
1234 -- 1248Hao Cheng, Khanh Vu, Kien A. Hua. SubSpace Projection: A unified framework for a class of partition-based dimension reduction techniques
1249 -- 1268Xueling Ma, Jianming Zhan. Generalized fuzzy h-bi-ideals and h-quasi-ideals of hemirings
1269 -- 1277Iuon-Chang Lin, Chin-Chen Chang. A countable and time-bound password-based user authentication scheme for the applications of electronic commerce
1278 -- 1297Balasubramaniam Jayaram, Radko Mesiar. I-Fuzzy equivalence relations and I-fuzzy partitions
1298 -- 1318Aydin Ulas, Murat Semerci, Olcay Taner Yildiz, Ethem Alpaydin. Incremental construction of classifier and discriminant ensembles
1319 -- 1332Shaocheng Tong, Yongming Li, Peng Shi. Fuzzy adaptive backstepping robust control for SISO nonlinear system with dynamic uncertainties
1333 -- 1347Sheshayya A. Choudum, R. Indhumathi. On embedding subclasses of height-balanced trees in hypercubes
1348 -- 1361Cheqing Jin, Bolin Ding, Jeffrey Xu Yu. Making filters smart in distributed data stream environments
1362 -- 1376Thierry Denoeux. Extending stochastic ordering to belief functions on the real line

Volume 179, Issue 8

1025 -- 1039Ricardo José Gabrielli Barreto Campello, Eduardo R. Hruschka. On comparing two sequences of numbers and its applications to clustering analysis
1040 -- 1058Cagatay Catal, Banu Diri. Investigating the effect of dataset size, metrics sets, and feature selection techniques on software fault prediction problem
1059 -- 1069B. Chandra, P. Paul Varghese. Moving towards efficient decision tree construction
1070 -- 1077X. B. Cao, Yan Wu Xu, D. Chen, Hong Qiao. Associated evolution of a support vector machine-based classifier for pedestrian detection
1078 -- 1091Peyman Kouchakpour, Anthony Zaknich, Thomas Bräunl. Dynamic population variation in genetic programming
1092 -- 1101Eddie Cheng, Linda Lesniak, Marc J. Lipman, László Lipták. Conditional matching preclusion sets
1102 -- 1115I. Reay, S. Dick, J. Miller. An analysis of privacy signals on the World Wide Web: Past, present and future
1116 -- 1133Hong Zhu, Kevin Lü, Renchao Jin. A practical mandatory access control model for XML databases
1134 -- 1148Li Li, Xiaodong Liu. New results on delay-dependent robust stability criteria of uncertain fuzzy systems with state and input delays
1149 -- 1162Leonardo A. Mozelli, Reinaldo M. Palhares, Gustavo S. C. Avellar. A systematic approach to improve multiple Lyapunov function stability and stabilization conditions for fuzzy systems
1163 -- 1168Marius Tarnauceanu. Distributivity in lattices of fuzzy subgroups
1169 -- 1192Dongrui Wu, Jerry M. Mendel. A comparative study of ranking methods, similarity measures and uncertainty measures for interval type-2 fuzzy sets
1193 -- 1206Xinwang Liu. Parameterized defuzzification with continuous weighted quasi-arithmetic means - An extension
1207 -- 1215Tofigh Allahviranloo, N. A. Kiani, M. Barkhordari Ahmadi. Toward the existence and uniqueness of solutions of second-order fuzzy differential equations

Volume 179, Issue 7

867 -- 882Yiyu Yao, Yan Zhao. Discernibility matrix simplification for constructing attribute reducts
883 -- 898Lei Zhou, Wei-Zhi Wu, Wen-Xiu Zhang. On characterization of intuitionistic fuzzy rough sets based on intuitionistic fuzzy implicators
899 -- 924Hongyan Liu, Xiaoyu Wang, Jun He, Jiawei Han, Dong Xin, Zheng Shao. Top-down mining of frequent closed patterns from very high dimensional data
925 -- 937Pavel V. Sevastjanov, Ludmila Dymova. A new method for solving interval and fuzzy equations: Linear case
938 -- 944Yung-Yih Lur, Yan-Kuen Wu, Sy-Ming Guu. Convergence of powers for a fuzzy matrix with convex combination of max-min and max-arithmetic mean operations
945 -- 955Tofigh Allahviranloo, Saeid Abbasbandy, N. Ahmady, E. Ahmady. Improved predictor-corrector method for solving fuzzy initial value problems
956 -- 966Tofigh Allahviranloo, N. A. Kiani, N. Motamedi. Solving fuzzy differential equations by differential transformation method
967 -- 979Yen-Liang Chen, Chia-Chi Wu, Kwei Tang. Building a cost-constrained decision tree with multiple condition attributes
980 -- 994Ugur Dogrusöz, Erhan Giral, Ahmet Cetintas, Ali Civril, Emek Demir. A layout algorithm for undirected compound graphs
995 -- 1006Yuyue Du, Changjun Jiang, MengChu Zhou, You Fu. Modeling and monitoring of E-commerce workflows
1007 -- 1018Jinhua Zhang, Jian Zhuang, Haifeng Du, Sunan Wang. Self-organizing genetic algorithm based tuning of PID controllers
1019 -- 1023Tongjiang Yan, Xiaoni Du, Guozhen Xiao, Xiaolong Huang. Linear complexity of binary Whiteman generalized cyclotomic sequences of order 2:::k:::

Volume 179, Issue 6

699 -- 716Cory J. Butz, Shan Hua, J. Chen, H. Yao. A simple graphical approach for understanding probabilistic inference in Bayesian networks
717 -- 728Bart Van Gasse, Chris Cornelis, Glad Deschrijver, Etienne E. Kerre. The pseudo-linear semantics of interval-valued fuzzy logics
729 -- 741José M. Merigó, Anna Maria Gil Lafuente. The induced generalized OWA operator
742 -- 757Janusz T. Starczewski. Extended triangular norms
758 -- 768K. P. Girish, Sunil Jacob John. Relations and functions in multiset context
769 -- 790Moe Thandar Wynn, H. M. W. Verbeek, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, David Edmond. Soundness-preserving reduction rules for reset workflow nets
791 -- 808Chun-Hsiang Huang, Ja-Ling Wu. Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes
809 -- 819Lizhi Peng, Bo Yang, Yuehui Chen, Ajith Abraham. Data gravitation based classification
820 -- 829Peijun Guo. Fuzzy data envelopment analysis and its application to location problems
830 -- 843Yu Ma, Xiaodong Gu, Yuanyuan Wang. Color discrimination enhancement for dichromats using self-organizing color transformation
844 -- 850Jang Hee Lee, Sung Ho Ha. Recognizing yield patterns through hybrid applications of machine learning techniques
851 -- 857Ping-Ying Tsai, Jung-Sheng Fu, Gen-Huey Chen. Embedding Hamiltonian cycles in alternating group graphs under conditional fault model
858 -- 865Bin Wang, ZhaoXia Song. A non-interactive deniable authentication scheme based on designated verifier proofs

Volume 179, Issue 5

475 -- 477Radko Mesiar, Olga Nánásiová, Zdenka Riecanová, Jan Paseka. Special issue - Quantum structures: Theory and applications
478 -- 484Olga Choustova. Quantum probability and financial market
485 -- 491Gejza Dohnal. Markov property in quantum logic: A reflection
492 -- 504Andrei Khrennikov. Nonlocality as well as rejection of realism are only sufficient (but non-necessary!) conditions for violation of Bell s inequality
505 -- 507Zhihao Ma. Note on ideals of effect algebras
508 -- 514Mirko Navara. Existence of states on quantum structures
515 -- 520Olga Nánásiová, Sylvia Pulmannová. S-map and tracial states
521 -- 528Jan Paseka, Zdenka Riecanová. Isomorphism theorems on generalized effect algebras based on atoms
529 -- 534Zdenka Riecanová. Pseudocomplemented lattice effect algebras and existence of states
535 -- 541Karl Svozil. Quantum scholasticism: On quantum contexts, counterfactuals, and the absurdities of quantum omniscience
542 -- 558David West, Scott Dellana. Diversity of ability and cognitive style for group decision processes
559 -- 583Syed Khairuzzaman Tanbeer, Chowdhury Farhan Ahmed, Byeong-Soo Jeong, Young-Koo Lee. Efficient single-pass frequent pattern mining using a prefix-tree
584 -- 599Lucas Antiqueira, Osvaldo N. Oliveira Jr., Luciano da Fontoura Costa, Maria das Graças Volpe Nunes. A complex network approach to text summarization
600 -- 612Yuncheng Jiang, Ju Wang, Suqin Tang, Bao Xiao. Reasoning with rough description logics: An approximate concepts approach
613 -- 622Ying Zhai, Zhong Yi, Peimin Deng. On behavior of two-dimensional cellular automata with an exceptional rule
623 -- 641Bin Xu, Weiguo Fang, Ruifeng Shi, Jing Yu, Lu Liu. Three-objective fuzzy chance-constrained programming model for multiproject and multi-item investment combination
642 -- 653Gil González-Rodríguez, Ana Colubi, Wolfgang Trutschnig. Simulation of fuzzy random variables
654 -- 666Bijan Davvaz, P. Corsini, Violeta Leoreanu Fotea. Atanassov s intuitionistic (S,T)-fuzzy n-ary sub-hypergroups and their properties
667 -- 681Tz-Liang Kueng, Tyne Liang, Lih-Hsing Hsu, Jimmy J. M. Tan. Long paths in hypercubes with conditional node-faults
682 -- 687Pinhui Ke, Liuling Huang, Shengyuan Zhang. Improved lower bound on the number of balanced symmetric functions over GF
688 -- 698Efendi N. Nasibov, A. Övgü Kinay. An iterative approach for estimation of student performances based on linguistic evaluations

Volume 179, Issue 4

339 -- 354Jesualdo Tomás Fernández-Breis, Dagoberto Castellanos Nieves, Rafael Valencia-García. Measuring individual learning performance in group work from a knowledge integration perspective
355 -- 370Tsung-Han Chang, Tien-Chin Wang. Using the fuzzy multi-criteria decision making approach for measuring the possibility of successful knowledge management
371 -- 381Gang Kou, Yi Peng, Zhengxin Chen, Yong Shi. Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection
382 -- 403Dilek Yaman, Seçkin Polat. A fuzzy cognitive map approach for effect-based operations: An illustrative case
404 -- 409Hai-Liang Wang, Jian-Wei Wang, Jun Ming Xu. Edge-fault-tolerant bipanconnectivity of hypercubes
410 -- 421Chia-Long Wu. An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation
422 -- 429Chien-Lung Hsu, Yu-Hao Chuang. A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks
430 -- 445Tong-Seng Quah. Estimating software readiness using predictive models
446 -- 457Badr Mansouri, Noureddine Manamanni, Kevin Guelton, Alexandre Kruszewski, Thierry-Marie Guerra. Output feedback LMI tracking control conditions with H
458 -- 470Jiye Liang, Junhong Wang, Yuhua Qian. A new measure of uncertainty based on knowledge granulation for rough sets
471 -- 473Hua-peng Zhang, Yao Ouyang, Zhudeng Wang. Note on Generalized rough sets based on reflexive and transitive relations

Volume 179, Issue 3

197 -- 209Dominik Slezak. Degrees of conditional (in)dependence: A framework for approximate Bayesian networks and examples related to the rough set-based feature selection
210 -- 225William Zhu. Relationship between generalized rough sets based on binary relation and covering
226 -- 247Guojun Wang, Hongjun Zhou. Quantitative logic
248 -- 266Faria Nassiri Mofakham, Mohammad Ali Nematbakhsh, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee. Electronic promotion to new customers using mk
267 -- 278Guanghong Sun, Chuankun Wu. The lower bounds on the second order nonlinearity of three classes of Boolean functions with high nonlinearity
279 -- 291Alessandro De Gregorio, Stefano M. Iacus. On Rényi information for ergodic diffusion processes
292 -- 302Feng Cao, Zhenfu Cao. A secure identity-based proxy multi-signature scheme
303 -- 306Kyung-Ah Shim. Breaking the short certificateless signature scheme
307 -- 318Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang. An improved identity-based key agreement protocol and its security proof
319 -- 328S. Pederson, M. Sambandham. Numerical solution of hybrid fuzzy differential equation IVPs by a characterization theorem
329 -- 337Ying-Ming Wang, Kwai-Sang Chin, Ying Luo. Aggregation of direct and indirect judgments in pairwise comparison matrices with a re-examination of the criticisms by Bana e Costa and Vansnick
338 -- 0Haci Aktas, Naim Çagman. Erratum to Soft sets and soft groups [Information Sciences 177 (2007) 2726-2735]

Volume 179, Issue 24

4089 -- 4096Michaël Rademaker, Bernard De Baets, Hans De Meyer. Loss optimal monotone relabeling of noisy multi-criteria data sets
4097 -- 4122Eitan Menahem, Lior Rokach, Yuval Elovici. Troika - An improved stacking schema for classification tasks
4123 -- 4139Damian Dudek. RMAIN: Association rules maintenance without reruns through data
4140 -- 4150Duoqian Miao, Yan Zhao, Yiyu Yao, H. X. Li, Feifei Xu. Relative reducts in consistent and inconsistent decision tables of the Pawlak rough set model
4151 -- 4173Victoria Nebot, Rafael Berlanga Llavori. Efficient retrieval of ontology fragments using an interval labeling scheme
4174 -- 4198Soonyong Park, Soohwan Kim, Mignon Park, Sung-Kee Park. Vision-based global localization for mobile robots with hybrid maps of objects and spatial layouts
4199 -- 4207Ahmed M. Al-Adilee, Olga Nánásiová. Copula and s-map on a quantum logic
4208 -- 4218Margarita Mas, Miquel Monserrat, Joan Torrens. The law of importation for discrete implications
4219 -- 4226Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios. Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range
4227 -- 4231Jeong Ok Kwon, Ik Rae Jeong, Dong-Hoon Lee. A forward-secure e-mail protocol without certificated public keys
4232 -- 4242Kitae Jeong, Changhoon Lee, Jongsung Kim, Seokhie Hong. Security analysis of the SCO-family using key schedules
4243 -- 4248Xuan Hong. Efficient threshold proxy signature protocol for mobile agents
4249 -- 4260Zhengqiang Zhang, Weisheng Chen. Adaptive output feedback control of nonlinear systems with actuator failures
4261 -- 4276Y. P. Li, Guo H. Huang. Fuzzy-stochastic-based violation analysis method for planning water resources management systems with uncertain information
4277 -- 4283Masayuki Kageyama, Kakuzo Iwamura. Discrete time credibilistic processes: Construction and convergences
4284 -- 4291Bae Jun Young. Intuitionistic fuzzy transformation semigroups

Volume 179, Issue 23

3957 -- 3963Enric Trillas, Ana Pradera, Angel Alvarez. On the reducibility of hypotheses and consequences
3964 -- 3972Wolfgang Trutschnig, Gil González-Rodríguez, Ana Colubi, María Angeles Gil. A new family of metrics for compact, convex (fuzzy) sets based on a generalized concept of mid and spread
3973 -- 3984Gracián Triviño, Luis Mengual, Albert van der Heide. Towards an architecture for semiautonomous robot telecontrol systems
3985 -- 3997Christian Borgelt. Accelerating fuzzy clustering
3998 -- 4028Óscar Ibáñez, Lucia Ballerini, Oscar Cordón, Sergio Damas, Jose Santamaría. An experimental study on the applicability of evolutionary algorithms to craniofacial superimposition in forensic identification
4029 -- 4045Pedro R. M. Inácio, Branka Lakic, Mário M. Freire, Manuela Pereira, Paulo P. Monteiro. The design and evaluation of the Simple Self-Similar Sequences Generator
4046 -- 4056Seppo J. Ovaska, Bernhard Sick, Alden H. Wright. Periodical switching between related goals for improving evolvability to a fixed goal in multi-objective problems
4057 -- 4069Shuming Wang, Junzo Watada. Fuzzy random renewal reward process and its applications
4070 -- 4082Naseem Ajmal, Aparna Jain. Some constructions of the join of fuzzy subgroups and certain lattices of fuzzy subgroups with sup property
4083 -- 4088Shuo-Yan Chou, Jennifer Shu-Jen Lin, Peterson Julian. A note on Solving linear programming problems under fuzziness and randomness environment using attainment values

Volume 179, Issue 22

3815 -- 3831Bruno Apolloni, Simone Bassis, Andrea Brega. Feature selection via Boolean independent component analysis
3832 -- 3842Jean-François Bercher, Christophe Vignat. On minimum Fisher information distributions with restricted support and fixed variance
3843 -- 3865Syed Khairuzzaman Tanbeer, Chowdhury Farhan Ahmed, Byeong-Soo Jeong, Young-Koo Lee. Sliding window-based frequent pattern mining over data streams
3866 -- 3884YounHo Lee, Heeyoul Kim, Yongsu Park. A new data hiding scheme for binary image authentication with small image distortion
3885 -- 3892Wen-Chiung Lee, Chin-Chia Wu. Some single-machine and m-machine flowshop scheduling problems with learning considerations
3893 -- 3907Yung-Chung Wang, Chwan-Lu Tseng, Ren-Guey Chu, Fu-Hsiang Tsai. Per-stream loss behavior of Sigma MAP/M/1/K queuing system with a random early detection mechanism
3908 -- 3919Ronald R. Yager. On the dispersion measure of OWA operators
3920 -- 3929Yongbing Wang, Yongming Li. Approximation of fuzzy context-free grammars
3930 -- 3943Jui-Chung Hung. A Fuzzy Asymmetric GARCH model applied to stock markets
3944 -- 3955Wen-an Zhang, Li Yu, Hongbo Song. H::infinity:: filtering of networked discrete-time systems with random packet losses

Volume 179, Issue 21

3733 -- 3744Joong Hyuk Chang, Hye-Chung (Monica) Kum. Frequency-based load shedding over a data stream of tuples
3745 -- 3762Guoliang Li, Chen Li, Jianhua Feng, Lizhu Zhou. SAIL: Structure-aware indexing for effective and progressive top-k keyword search over XML documents
3763 -- 3771Tomás Dvorák, Václav Koubek. Long paths in hypercubes with a quadratic number of faults
3772 -- 3790Jen-Ya Wang, Kuen-Fang Jea. A near-optimal database allocation for reducing the average waiting time in the grid computing environment
3791 -- 3803Agnes Vathy-Fogarassy, János Abonyi. Local and global mappings of topology representing networks
3804 -- 3813Yugang Niu, Tinggang Jia, Xingyu Wang, Fuwen Yang. Output-feedback control design for NCSs subject to quantization and dropout

Volume 179, Issue 20

3461 -- 3472Sancho Salcedo-Sanz, Maurizio Naldi, Ángel M. Pérez-Bellido, Antonio Portilla-Figueras, Emilio G. Ortíz-García. Evolutionary design of oriented-tree networks using Cayley-type encodings
3473 -- 3488Sergio Ferrández, Antonio Toral, Óscar Ferrández, Antonio Ferrández, Rafael Muñoz. Exploiting Wikipedia and EuroWordNet to solve Cross-Lingual Question Answering
3489 -- 3504Sungbo Seo, Jaewoo Kang, Keun Ho Ryu. Multivariable stream data classification using motifs and their temporal relations
3505 -- 3519Duen-Ren Liu, Chin-Hui Lai, Wang-Jung Lee. A hybrid of sequential rules and collaborative filtering for product recommendation
3520 -- 3539Siyamand Ayubi, Maybin K. Muyeba, Ahmad Baraani-Dastjerdi, John A. Keane. An algorithm to mine general association rules from tabular data
3540 -- 3560Chuan Shi, Zhenyu Yan, Kevin Lü, Zhongzhi Shi, Bai Wang. A dominance tree and its application in evolutionary multi-objective optimization
3583 -- 3602Ramiz M. Aliguliyev. Performance evaluation of density-based clustering methods
3603 -- 3618Zhi-Ping Fan, Bo Feng. A multiple attributes decision making method using individual and collaborative attribute data in a fuzzy environment
3619 -- 3633George A. Papakostas, Dimitris E. Koulouriotis, E. G. Karakasis. A unified methodology for the efficient computation of discrete orthogonal image moments
3634 -- 3644Jirí Fink, Petr Gregor. Long paths and cycles in hypercubes with faulty vertices
3645 -- 3658G. Sergioli, Antonio Ledda, Francesco Paoli, Roberto Giuntini, T. Kowalski, Franco Montagna, Hector Freytes, Claudio Marini. Two cooperative versions of the Guessing Secrets problem
3659 -- 3672Jiang Wu, D. Manivannan, Bhavani M. Thuraisingham. Necessary and sufficient conditions for transaction-consistent global checkpoints in a distributed database system
3673 -- 3684Murat Ak, Kamer Kaya, Ali Aydin Selçuk. Optimal subset-difference broadcast encryption with free riders
3685 -- 3696Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang. Certificateless Threshold Ring Signature
3697 -- 3710Jun Yang, Shouming Zhong, Guihua Li, Wenpin Luo. Robust H:: INFINITY :: filter design for uncertain fuzzy neutral systems
3711 -- 3719Tao Li, Lei Guo, Xin Xin. Improved delay-dependent bounded real lemma for uncertain time-delay systems
3720 -- 3731Osman Kazanci, Sultan Yamak. Fuzzy ideals and semiprime fuzzy ideals in semigroups
3732 -- 0Josep Domingo-Ferrer, Agusti Solanas. Erratum to A measure of variance for hierarchical nominal attributes

Volume 179, Issue 19

3199 -- 3217Daniel S. Yeung, Patrick P. K. Chan, Wing W. Y. Ng. Radial Basis Function network learning using localized generalization error bound
3218 -- 3229Min-Ling Zhang, José María Peña, Víctor Robles. Feature selection for multi-label naive Bayes classification
3230 -- 3246Sriparna Saha, Sanghamitra Bandyopadhyay. A new point symmetry based fuzzy genetic clustering technique for automatic evolution of clusters
3247 -- 3254Du-shiau Tsai, Gwoboa Horng, Tzungher Chen, Yao-Te Huang. A novel secret image sharing scheme for true-color images with size constraint
3255 -- 3267José Manuel Cadenas, M. Carmen Garrido, E. Muñoz. Using machine learning in a cooperative hybrid parallel strategy of metaheuristics
3268 -- 3285Vagelis Hristidis, Oscar Valdivia, Michail Vlachos, Philip S. Yu. Information discovery across multiple streams
3286 -- 3308Jun-Seok Heo, Kyu-Young Whang, Min-Soo Kim 0002, Yi-Reun Kim, Il-Yeol Song. The partitioned-layer index: Answering monotone top-k queries using the convex skyline and partitioning-merging technique
3309 -- 3322Angus F. M. Huang, Chi-Wei Lan, Stephen J. H. Yang. An optimal QoS-based Web service selection scheme
3323 -- 3331Abhishek Parakh, Subhash Kak. Online data storage using implicit security
3332 -- 3348Jun-Xiang Wang, Zhe-Ming Lu. A path optional lossless data hiding scheme based on VQ joint neighboring coding
3349 -- 3358Tzu-Chao Lin, Chao-Ming Lin. Wavelet-based copyright-protection scheme for digital images based on local features
3359 -- 3369Xingquan Zuo, Hongwei Mo, Jianping Wu. A robust scheduling method based on a multi-objective immune algorithm
3370 -- 3382Lizhen Wang, Lihua Zhou, Joan Lu, Jim Yip. An order-clique-based approach for mining maximal co-locations
3383 -- 3391Fabrizio Durante, José Antonio Rodríguez-Lallena, Manuel Úbeda-Flores. New constructions of diagonal patchwork copulas
3392 -- 3409S. García-Nieto, J. Salcedo, M. Martínez, D. Laurí. Air management in a diesel engine using fuzzy control techniques
3410 -- 3417Congxin Wu, Hongliang Li, Xuekun Ren. A note on the sendograph metric of fuzzy numbers
3418 -- 3431Jerry M. Mendel. On answering the question Where do I start in order to solve a new problem involving interval type-2 fuzzy sets?
3432 -- 3441Huaiqin Wu. Global stability analysis of a general class of discontinuous neural networks with linear growth activation functions
3442 -- 3450Qing Zhou, Xiaofeng Liao, Kwok-Wo Wong, Yue Hu, Di Xiao. True random number generator based on mouse movement and chaotic hash function
3451 -- 3459Tsung-Ching Lin, Trieu-Kien Truong, Hung-Peng Lee, Hsin-Chiu Chang. Algebraic decoding of the (41, 21, 9) Quadratic Residue code

Volume 179, Issue 18

3059 -- 3078Gianluigi Folino, Agostino Forestiero, Giandomenico Spezzano. An adaptive flocking algorithm for performing approximate clustering
3079 -- 3090Qinglin Guo, Ming Zhang. A novel approach for multi-agent-based Intelligent Manufacturing System
3091 -- 3109James F. Peters, Piotr Wasilewski. Foundations of near sets
3110 -- 3115Xie-Bin Chen. Many-to-many disjoint paths in faulty hypercubes
3116 -- 3121Amr M. Youssef. Cryptanalysis of a knapsack-based probabilistic encryption scheme
3122 -- 3126Shangwei Lin, Shiying Wang. Super p-restricted edge connectivity of line graphs
3127 -- 3135T. C. Edwin Cheng, Peng-Jen Lai, Chin-Chia Wu, Wen-Chiung Lee. Single-machine scheduling with sum-of-logarithm-processing-times-based learning considerations
3136 -- 3161Hongchan Roh, Woo-Cheol Kim, Seung-Woo Kim, Sanghyun Park. A B-Tree index extension to enhance response time and the life cycle of flash memory
3162 -- 3181Zhen He, Prakash Veeraraghavan. Fine-grained updates in database management systems for flash memory
3182 -- 3186Jianming Zhan, Young Bae Jun. Notes on redefined fuzzy implicative filters of lattice implication algebras
3187 -- 3197Chen Peng, Yu-Chu Tian. Delay-dependent robust H:: INFINITY :: control for uncertain systems with time-varying delay

Volume 179, Issue 17

2861 -- 2862Fabrizio Durante, Radko Mesiar, Susanne Saminger-Platz. Editorial to the special issue devoted to Copulas, measures and integrals
2863 -- 2871Piotr Jaworski. On copulas and their diagonals
2872 -- 2877Jan-Frederik Mai, Matthias Scherer. Efficiently sampling exchangeable Cuadras-Augé copulas in high dimensions
2878 -- 2890Giovanna Nappo, Fabio Spizzichino. Kendall distributions and level sets in bivariate exchangeable survival models
2891 -- 2902Antonio Boccuto, Domenico Candeloro. Integral and ideals in Riesz spaces
2903 -- 2911József Bukor, Ladislav Misík, János T. Tóth. Dependence of densities on a parameter
2912 -- 2922Dana Hlinená, Martin Kalina, Pavol Král. Choquet integral with respect to Lukasiewicz filters, and its modifications
2923 -- 2933Ivana Stajner-Papuga, Tatjana Grbic, Martina Danková. Pseudo-Riemann-Stieltjes integral
2934 -- 2947Andreas M. Hinz, Anton Kostov, Fabian Kneißl, Fatma Sürer, Adrian Danek. A mathematical model and a computer tool for the Tower of Hanoi and Tower of London puzzles
2948 -- 2963Sheng Zhong, Zhiqiang Yang, Tingting Chen. k-Anonymous data collection
2964 -- 2973Mansoor Zolghadri Jahromi, Elham Parvinnia, Robert John. A method of learning weighted similarity function to improve the performance of nearest neighbor
2974 -- 2984Yanyong Guan, Hongkai Wang, Yun Wang, Fang Yang. Attribute reduction and optimal decision rules acquisition for continuous valued information systems
2985 -- 2996Suh-Wen Chiou. Optimization for signal setting problems using non-smooth techniques
2997 -- 3017Jiuping Xu, Xiaoyang Zhou. A class of multi-objective expected value decision-making model with birandom coefficients and its application to flow shop scheduling problem
3018 -- 3025Zhitao Zhao, Congxin Wu. The equivalence of convergences of sequences of fuzzy numbers and its applications to the characterization of compact sets
3026 -- 3040Zhoujing Wang, Kevin W. Li, Weize Wang. An approach to multiattribute decision making with interval-valued intuitionistic fuzzy assessments and incomplete weights
3041 -- 3058Jiuxiang Dong, Guang-Hong Yang. H:: INFINITY :: control design for fuzzy discrete-time singularly perturbed systems via slow state variables feedback: An LMI-based approach

Volume 179, Issue 16

2719 -- 2728Yair Neuman, Ophir Nave. Metaphor-based meaning excavation
2729 -- 2739Alain Gély, Raoul Medina, Lhouari Nourine. Representing lattices using many-valued relations
2740 -- 2753Der-Chiang Li, Yao-Hwei Fang, Yung-Yao Lai, Susan C. Hu. Utilization of virtual samples to facilitate cancer identification for DNA microarray data in the early stages of an investigation
2754 -- 2761Ibrahim Ozkan, Lutfi Erden, I. Burhan Türksen. A fuzzy analysis of country-size argument for the Feldstein-Horioka puzzle
2762 -- 2773Huan Huang, Congxin Wu. Approximation capabilities of multilayer fuzzy neural networks on the set of fuzzy-valued functions
2774 -- 2793Zuqiang Meng, Zhongzhi Shi. A fast approach to attribute reduction in incomplete decision systems with tolerance relation-based rough sets
2794 -- 2808Xing Jiang, Ah-Hwee Tan. Learning and inferencing in user ontology for personalized Semantic Web search
2809 -- 2832Yuhua Qian, Chuangyin Dang, Jiye Liang, Dawei Tang. Set-valued ordered information systems
2833 -- 2850Jun-Ki Min, Chun-Hee Lee, Chin-Wan Chung. AMID: Approximation of MultI-measured Data using SVD
2851 -- 2860Bing Chen, Hongyi Li, Peng Shi, Chong Lin, Qi Zhou. Delay-dependent stability analysis and controller synthesis for Markovian jump systems with state and input delays

Volume 179, Issue 15

2513 -- 2514Jianming Yong, Weiming Shen, Yun Yang. Special Issue on Computer-Supported Cooperative Work: Techniques and applications
2515 -- 2523Debbie Richards. A social software/Web 2.0 approach to collaborative knowledge engineering
2524 -- 2537Rafael Studart Monclar, Alessandro Tecla, Jonice Oliveira, Jano Moreira de Souza. MEK: Using spatial-temporal information to improve social networks and knowledge dissemination
2538 -- 2554Vanessa Tavares Nunes, Flávia Maria Santoro, Marcos R. S. Borges. A context-based model for Knowledge Management embodied in work processes
2555 -- 2561Nazaraf Shah, Rahat Iqbal, Anne E. James, Kashif Iqbal. Exception representation and management in open multi-agent systems
2562 -- 2575Yingchun Yuan, Xiaoping Li, Qian Wang, Xia Zhu. Deadline division-based heuristic for cost optimization in workflow scheduling
2576 -- 2590David W. Hsiao, Amy J. C. Trappey, Lin Ma, Pei-Shun Ho. An integrated platform of collaborative project management and silicon intellectual property management for IC design industry
2591 -- 2605Qiang He, Jun Yan, Ryszard Kowalczyk, Hai Jin, Yun Yang. Lifetime service level agreement management with autonomous agents for services provision
2606 -- 2617Donglai Zhu, Yinsheng Li, Junshuai Shi, Yingxiao Xu, Weiming Shen. A service-oriented city portal framework and collaborative development platform
2618 -- 2628Junzhou Luo, Xudong Ni, Jianming Yong. A trust degree based access control in grid environments
2629 -- 2642Yuqing Sun, Bin Gong, Xiangxu Meng, Zongkai Lin, Elisa Bertino. Specification and enforcement of flexible security policy for active cooperation
2643 -- 2655Sergio F. Ochoa, Valeria Herskovic, Edgard Pineda, José A. Pino. A transformational model for Organizational Memory Systems management with privacy concerns
2656 -- 2661Radim Belohlávek, Michal Krupka. Grouping fuzzy sets by similarity
2662 -- 2675Yu-lung Lo, Chu-Hui Lee, Chun-Hsiung Wang. Scalable multi-feature index structure for music databases
2676 -- 2688Chaio-Shiung Chen. Dynamic structure adaptive neural fuzzy control for MIMO uncertain nonlinear systems
2689 -- 2694Fabrizio Durante, Roberto Ghiselli Ricci. Supermigrative semi-copulas and triangular norms
2695 -- 2709Lavinia Corina Ciungu. The radical of a perfect residuated structure
2710 -- 2718Violeta Leoreanu Fotea. A new type of fuzzy n-ary hyperstructures

Volume 179, Issue 14

2297 -- 2298Luis Martínez, Da Ruan, Francisco Herrera, Enrique Herrera-Viedma, Paul P. Wang. Linguistic decision making: Tools and applications
2299 -- 2308Guangquan Zhang, Jie Lu. A linguistic intelligent user guide for method selection in multi-objective decision support systems
2309 -- 2316José Luis García-Lapresta, M. Martínez-Panero, Luis Carlos Meneses. Defining the Borda count in a linguistic decision making context
2317 -- 2324Isis Truck, Herman Akdag. A tool for aggregation with words
2325 -- 2332Zheng Pei, Yang Xu, Da Ruan, Keyun Qin. Extracting complex linguistic data summaries from personnel database via simple linguistic aggregations
2333 -- 2341P. J. Sánchez, Luis Martínez, Carlos García-Martínez, Francisco Herrera, Enrique Herrera-Viedma. A fuzzy model to evaluate the suitability of installing an enterprise resource planning system
2342 -- 2352Klaas Bosteels, Etienne E. Kerre. On a reflexivity-preserving family of cardinality-based fuzzy comparison measures
2353 -- 2361Xin Gao, Cuilian You. Maximum entropy membership functions for discrete fuzzy variables
2362 -- 2378Yuncheng Jiang, Yong Tang, Ju Wang, Suqin Tang. Reasoning within intuitionistic fuzzy rough description logics
2379 -- 2389Qian Yin, Zhi-yong Yuan, Ping Guo. Studies on the distribution of the shortest linear recurring sequences
2390 -- 2402Antonio Sala, Ángel Cuenca, Julián Salt. A retunable PID multi-rate controller for a networked control system
2403 -- 2415Chen-Fang Tsai, Kuo-Ming Chao. Chromosome refinement for optimising multiple supply chains
2416 -- 2425Yunqiang Yin, Dehua Xu, Kaibiao Sun, Hongxing Li. Some scheduling problems with general position-dependent and time-dependent learning effects
2426 -- 2433Leila Golshani, Einollah Pasha, Gholamhossein Yari. Some properties of Rényi entropy and Rényi entropy rate
2434 -- 2441Suh-Wen Chiou. A bi-level programming for logistics network design with system-optimized flows
2442 -- 2452Fan Min, Qihe Liu. A hierarchical model for test-cost-sensitive decision systems
2453 -- 2459Lei Guo, Xingwei Wang, Jiannong Cao, Yu Zhang, Xiaobing Zheng, Xuekui Wang, Weigang Hou. A survivable routing algorithm with differentiated domain protection based on a virtual topology graph in multi-domain optical networks
2460 -- 2469Hsien-Wen Tseng, Chi-Pin Hsieh. Prediction-based reversible data hiding
2470 -- 2477Yan-Haw Chen, Trieu-Kien Truong, Chien Hsiang Huang, Chih-Hua Chien. A Lookup Table Decoding of systematic (47, 24, 11) quadratic residue code
2478 -- 2486William Zhu. Relationship among basic concepts in covering-based rough sets
2487 -- 2493Pao-Lien Lai, Hong-Chun Hsu. Constructing the nearly shortest path in crossed cubes
2494 -- 2511Yuhui Deng. Exploiting the performance gains of modern disk drives by enhancing data locality

Volume 179, Issue 13

2053 -- 2054Oscar Castillo, Patricia Melin. Editorial to the special issue on high order fuzzy sets
2055 -- 2069Sarah Greenfield, Francisco Chiclana, Simon Coupland, Robert John. The collapsing method of defuzzification for discretised interval type-2 fuzzy sets
2070 -- 2077Zhong-Xing Wang, Yong-jun Liu, Zhi-Ping Fan, Bo Feng. Ranking L-R fuzzy number based on deviation degree
2078 -- 2101Olivia Mendoza, Patricia Melin, Guillermo Licea. A hybrid approach for image recognition combining type-2 fuzzy logic, modular neural networks and the Sugeno integral
2102 -- 2122Byung-In Choi, Frank Chung-Hoon Rhee. Interval type-2 fuzzy membership function generation methods for pattern recognition
2123 -- 2145Denisse Hidalgo, Oscar Castillo, Patricia Melin. Type-1 and type-2 fuzzy inference systems as integration methods in modular neural networks for multimodal biometry and its optimization with genetic algorithms
2146 -- 2157Gerardo M. Mendez, María de los Angeles Hernandez M.. Hybrid learning for interval type-2 fuzzy logic systems based on orthogonal least-squares and back-propagation methods
2158 -- 2174Ricardo Martínez-Marroquín, Oscar Castillo, Luis T. Aguilar. Optimization of interval type-2 fuzzy logic controllers for a perturbed autonomous wheeled mobile robot using genetic algorithms
2175 -- 2193Juan R. Castro, Oscar Castillo, Patricia Melin, Antonio Rodríguez Díaz. A hybrid learning algorithm for a class of interval type-2 fuzzy neural networks
2194 -- 2207Gwanggil Jeon, Marco Anisetti, Valerio Bellandi, Ernesto Damiani, Jechang Jeong. Designing of a type-2 fuzzy logic filter for improving edge-preserving restoration of interlaced-to-progressive conversion
2208 -- 2217Sebastián Maldonado, Richard Weber. A wrapper method for feature selection using Support Vector Machines
2218 -- 2231Anthony J. T. Lee, Yi-An Chen, Weng-Chong Ip. Mining frequent trajectory patterns in spatial-temporal databases
2232 -- 2248Esmat Rashedi, Hossein Nezamabadi-pour, Saeid Saryazdi. GSA: A Gravitational Search Algorithm
2249 -- 2262Hai-Tao Zheng, Bo-Yeong Kang, Hong-Gee Kim. Exploiting noun phrases and semantic relationships for text document clustering
2263 -- 2272Kuo-Fong Kao, I-En Liao. An index selection method without repeated optimizer estimations
2273 -- 2282Donghai Guan, Weiwei Yuan, Young-Koo Lee, Sungyoung Lee. Nearest neighbor editing aided by unlabeled data
2283 -- 2293Chin-Chen Chang, Pei-Yu Lin, Jieh-Shan Yeh. Preserving robustness and removability for digital watermarks using subsampling and difference correlation
2294 -- 2295Tsung-Han Chang, Tien-Chin Wang. Erratum to Using the fuzzy multi-criteria decision making approach for measuring the possibility of successful knowledge management [Information Sciences 179 (4) (2009) 355-370]

Volume 179, Issue 12

1795 -- 0Amanda Spink, Bernard J. Jansen. Web search
1796 -- 1812Nadine Höchstötter, Dirk Lewandowski. What users see - Structures in search engine results pages
1813 -- 1821Alexander Hubmann-Haidvogel, Arno Scharl, Albert Weichselbraun. Multiple coordinated views for searching and navigating Web content repositories
1822 -- 1843Daniel Gayo-Avello. A survey on session detection methods in query logs and a proposal for future evaluation
1844 -- 1858David J. Brenes, Daniel Gayo-Avello. Stratified analysis of AOL query log
1859 -- 1869Masaya Murata, Hiroyuki Toda, Yumiko Matsuura, Ryoji Kataoka. Access concentration detection in click logs to improve mobile Web-IR
1870 -- 1880Kerstin Denecke, Wolfgang Nejdl. How valuable is medical social media data? Content analysis of the medical web
1881 -- 1892Carlos M. Lorenzetti, Ana Gabriela Maguitman. A semi-supervised incremental algorithm to automatically formulate topical queries
1893 -- 1902Gerasimos G. Rigatos. Fault detection and isolation based on fuzzy automata
1903 -- 1928Kai-Yuan Cai, Bei-Bei Yin. Software execution processes as an evolving complex network
1929 -- 1943Bao-Gang Hu, Han-Bing Qu, Yong Wang, Shuang-Hong Yang. A generalized-constraint neural network model: Associating partially known relationships for nonlinear regressions
1944 -- 1959Yujia Wang, Yupu Yang. Particle swarm optimization with preference order ranking for multi-objective optimization
1960 -- 1969Hong Chen, Luoqing Li, Jiangtao Peng. Error bounds of multi-graph regularized semi-supervised classification
1970 -- 1983Minqiang Li, Zhichun Wang. A hybrid coevolutionary algorithm for designing fuzzy classifiers
1984 -- 2001Hyun-Ho Lee, Won Suk Lee. Selectivity-sensitive shared evaluation of multiple continuous XPath queries over XML streams
2002 -- 2013Zhu Jiang, YongXuan Huang. Parametric calibration of speed-density relationships in mesoscopic traffic simulator with data mining
2014 -- 2021Rafael Álvarez, Leandro Tortosa, José-Francisco Vicent, Antonio Zamora. Analysis and design of a secure key exchange scheme
2022 -- 2027Gia Sirbiladze, Bezhan Ghvaberidze, Temur Latsabidze, Bidzina Matsaberidze. Using a minimal fuzzy covering in decision-making problems
2028 -- 2048Yong Chan Kim, Young Sun Kim. (L, (.))-approximation spaces and (L, (.))-fuzzy quasi-uniform spaces
2049 -- 2051Tofigh Allahviranloo, M. Shafiee, Y. Nejatbakhsh. A note on Fuzzy differential equations and the extension principle

Volume 179, Issue 11

1567 -- 1569Yukio Ohsawa, Katsutoshi Yada. Special issue on chance discovery - Discovery of significant events for decision making
1570 -- 1583Chao-Fu Hong. Qualitative Chance Discovery - Extracting competitive advantages
1584 -- 1591Hironori Takeuchi, L. Venkata Subramaniam, Tetsuya Nasukawa, Shourya Roy. Getting insights from the voices of customers: Conversation mining at a contact center
1592 -- 1598Yoko Nishihara, Wataru Sunayama. Estimation of friendship and hierarchy from conversation records
1608 -- 1614Vladimir V. Rybakov. Logic of knowledge and discovery via interacting agents - Decision algorithm for true and satisfiable statements
1615 -- 1627Shusaku Tsumoto. Contingency matrix theory: Statistical dependence in a contingency table
1628 -- 1638Lorenzo Magnani. Abducing chances in hybrid humans as decision makers
1639 -- 1646Jun Nakamura, Yukio Ohsawa. A shift of mind - Introducing a concept creation model
1647 -- 1656Javier Herranz. On the transferability of private signatures
1657 -- 1662Ángel Martín del Rey, Gerardo Rodríguez Sánchez. Selling multiple secrets to a single buyer
1663 -- 1677Jordi Nin, Vicenç Torra. Towards the evaluation of time series protection methods
1678 -- 1693A. Tripathi, T. Suman Kumar Reddy, Sanjay Kumar Madria, Hrushikesha Mohanty, R. K. Ghosh. Algorithms for validating E-tickets in mobile computing environment
1694 -- 1704Fei Li, Yunqiang Yin. Approaches to knowledge reduction of covering decision systems based on information theory
1705 -- 1723Ben-Jye Chang, Ying-Hsin Liang, Yan-Min Lin. Distributed route repair for increasing reliability and reducing control overhead for multicasting in wireless MANET
1724 -- 1737Yuh-Jiuan Tsay, Tain-Jung Hsu, Jing-Rung Yu. FIUT: A new method for mining frequent itemsets
1738 -- 1750Juan Luis Castro, Maria Navarro, J. M. Sánchez, Jose Manuel Zurita. Loss and gain functions for CBR retrieval
1751 -- 1759Young Bae Jun, Hee Sik Kim, J. Neggers. Pseudo d-algebras
1760 -- 1768Sunil Mathew, M. S. Sunitha. Types of arcs in a fuzzy graph
1769 -- 1784Adel Alaeddini, Mehdi Ghazanfari, Majid Amin Nayeri. A hybrid fuzzy-statistical clustering approach for estimating the time of changes in fixed and variable sampling control charts
1785 -- 1791Jianxi Fan, Jiwen Yang, Guodong Zhou, Lei Zhao, Wenzhe Zhang. Diagnosable evaluation of DCC linear congruential graphs under the PMC diagnostic model

Volume 179, Issue 10

1377 -- 1378Tadeusz Burczynski. Information Sciences Special Issue on Artificial Immune Systems
1379 -- 1389Amy L. Bauer, Catherine Beauchemin, Alan S. Perelson. Agent-based modeling of host-pathogen systems: The successes and challenges
1390 -- 1406Zhou Ji, Dipankar Dasgupta. V-detector: An efficient negative selection algorithm with probably adequate detector coverage
1407 -- 1425Michal Bereta, Tadeusz Burczynski. Immune K-means and negative selection algorithms for data analysis
1426 -- 1440Pablo Alberto Dalbem de Castro, Fernando J. Von Zuben. BAIS: A Bayesian Artificial Immune System for the effective handling of building blocks
1441 -- 1453Rodrigo Pasti, Leandro Nunes de Castro. Bio-inspired and gradient-based algorithms to train MLPs: The influence of diversity
1454 -- 1468Thiago A. S. Masutti, Leandro Nunes de Castro. A self-organizing neural network using ideas from the immune system to solve the traveling salesman problem
1469 -- 1482Adriel Lau, Petr Musílek. Immune programming models of Cryptosporidium parvum inactivation by ozone and chlorine dioxide
1483 -- 1494Erkan Ãœlker, Ahmet Arslan. Automatic knot adjustment using an artificial immune system for B-spline curve approximation
1495 -- 1515Krzysztof Trojanowski, Slawomir T. Wierzchon. Immune-based algorithms for dynamic optimization
1516 -- 1532Guan-Chun Luh, Chung-Huei Chueh. A multi-modal immune algorithm for the job-shop scheduling problem
1533 -- 1541Özer Uygun, Ercan Öztemel, Cemalettin Kubat. Scenario based distributed manufacturing simulation using HLA technologies
1542 -- 1551Sevil Senturk, Nihal Erginel. Development of fuzzy X-R and X-S control charts using alpha-cuts
1552 -- 1566Ihsan Kaya. A genetic algorithm approach to determine the sample size for attribute control charts

Volume 179, Issue 1-2

1 -- 15Cristina Alcalde, Ana Burusco, Ramón Fuentes-González, Itziar Zubia. Treatment of L-Fuzzy contexts with absent values
16 -- 32Francesca Carmagnola, Federica Cena. User identification for cross-system personalisation
33 -- 40David Pelta, Ronald R. Yager. On the conflict between inducing confusion and attaining payoff in adversarial decision making
41 -- 52Tsuen-Ho Hsu, Tsung-Nan Tsai, Pei-Ling Chiang. Selection of the optimum promotion mix by integrating a fuzzy linguistic decision model with genetic algorithms
53 -- 69Fatma Tiryaki, Beyza Ahlatcioglu. Fuzzy portfolio selection using fuzzy analytic hierarchy process
70 -- 88Yijun Bei, Gang Chen, Lidan Shou, Xiaoyan Li, Jinxiang Dong. Bottom-up discovery of frequent rooted unordered subtrees
89 -- 108Hui Li, Jie Sun. Gaussian case-based reasoning for business failure prediction with empirical data in China
109 -- 119Suh-Wen Chiou. Optimization of limited network capacity with toll settings
120 -- 129Vladan Batanovic, Dobrila Petrovic, Radivoj Petrovic. Fuzzy logic based algorithms for maximum covering location problems
130 -- 139Jordi Recasens. Maximal fuzzy maps
140 -- 149Ching-Chiuan Lin, Shih-Chieh Chen, Nien-Lin Hsueh. Adaptive embedding techniques for VQ-compressed images
150 -- 160Vahid Amirzadeh, Mashaallah Mashinchi, Abbas Parchami. Construction of p
161 -- 168Jiqiang Lv, Kui Ren, Xiaofeng Chen, Kwangjo Kim. The ring authenticated encryption scheme - How to provide a clue wisely
169 -- 179Ying Xiong, Jie Zhu, Hao Huang, Haihua Xu. Minimum tag error for discriminative training of conditional random fields
180 -- 195Chih-Yang Chen, Tzuu-Hseng S. Li, Ying-Chieh Yeh. EP-based kinematic control and adaptive fuzzy sliding-mode dynamic control for wheeled mobile robots