Journal: Inf. Sci.

Volume 180, Issue 9

1519 -- 1554James S. Albus. A model of computation and representation in the brain
1555 -- 1570Hyung Jun Ahn. Evaluating customer aid functions of online stores with agent-based models of customer behavior and evolution strategy
1571 -- 1581Rammohan Mallipeddi, Ponnuthurai N. Suganthan. Ensemble strategies with adaptive evolutionary programming
1582 -- 1590S. Ghazinoory, A. Esmail Zadeh, A. S. Kheirkhah. Application of fuzzy calculations for improving portfolio matrices
1591 -- 1609Deng-Feng Li, Guo-Hong Chen, Zhi-Gang Huang. Linear programming method for multiattribute group decision making using IF sets
1610 -- 1629Ching-Hsue Cheng, Tai-Liang Chen, Liang-Ying Wei. A hybrid model based on rough sets theory and genetic algorithms for stock price forecasting
1630 -- 1642Wei Wu, Long Li, Jie Yang, Yan Liu. A modified gradient-based neuro-fuzzy learning algorithm and its convergence
1643 -- 1655Qingzhong Liu, Andrew H. Sung, Mengyu Qiao, Zhongxue Chen, Bernardete Ribeiro. An improved approach to steganalysis of JPEG images
1656 -- 1670Changsoo Ok, Seokcheon Lee, Prasenjit Mitra, Soundar R. T. Kumara. Distributed routing in wireless sensor networks using energy welfare metric
1671 -- 1680Eddie Cheng, Jerrold W. Grossman, László Lipták, Ke Qiu, Zhizhang Shen. Distance formula and shortest paths for the (n, k)-star graphs
1681 -- 1689Jin Li, Kwangjo Kim. Hidden attribute-based signatures without anonymity revocation
1690 -- 1701Tzungher Chen, Chang-Sian Wu. Compression-unimpaired batch-image encryption combining vector quantization and index compression
1702 -- 1714Tian-Fu Lee, Tzonelih Hwang. Simple password-based three-party authenticated key exchange without server public keys
1715 -- 1724Hong-Bo Xie, Yong-Ping Zheng, Jing-Yi Guo, Xin Chen. Cross-fuzzy entropy: A new method to test pattern synchrony of bivariate time series
1725 -- 1737Jinling Liang, Zidong Wang, Xiaohui Liu. Robust passivity and passification of stochastic fuzzy time-delay systems
1738 -- 1758Shaocheng Tong, Xianglei He, Yongming Li. Direct adaptive fuzzy backstepping robust control for single input and single output uncertain nonlinear systems using small-gain approach
1759 -- 1768Sultan Yamak, Osman Kazanci, Bijan Davvaz. Generalized lower and upper approximations in a ring
1769 -- 1777Dug Hun Hong. Blackwell s Theorem for T-related fuzzy variables

Volume 180, Issue 8

1183 -- 1200Francisco José Berlanga, Antonio Jesús Rivera Rivas, María José del Jesús, Francisco Herrera. GP-COACH: Genetic Programming-based learning of COmpact and ACcurate fuzzy rule-based classification systems for High-dimensional problems
1201 -- 1217Huan Xu, Jianjun Wang, Hyoung Joong Kim. Near-optimal solution to pair-wise LSB matching via an immune programming strategy
1218 -- 1236Maoguo Gong, Licheng Jiao, Lining Zhang. Baldwinian learning in clonal selection algorithm for optimization
1237 -- 1256Swagatam Das, Sudeshna Sil. Kernel-induced fuzzy clustering of image pixels with an improved differential evolution algorithm
1257 -- 1267P. Ravisankar, V. Ravi, I. Bose. Failure prediction of dotcom companies using neural network-genetic programming hybrids
1268 -- 1291Alberto Fernández, María José del Jesús, Francisco Herrera. On the 2-tuples based genetic tuning performance for fuzzy rule based classification systems in imbalanced data-sets
1292 -- 1312Hyun Back, Jung-Im Won, Jeehee Yoon, Sanghyun Park, Sang-Wook Kim. Efficient processing of spatial joins with DOT-based indexing
1313 -- 1325Guodong Zhou, Longhua Qian, Jianxi Fan. Tree kernel-based semantic relation extraction with rich syntactic and semantic information
1326 -- 1344Humberto Bustince Sola, Edurne Barrenechea Tartas, Javier Fernández, Miguel Pagola, Javier Montero, Carlos Guerra. Contrast of a fuzzy relation
1345 -- 1353Ivan Chajda, Radek Halas, Ivo G. Rosenberg. On the role of logical connectives for primality and functional completeness of algebras of logics
1354 -- 1372Carles Noguera, Francesc Esteva, Lluis Godo. Generalized continuous and left-continuous t-norms arising from algebraic semantics for fuzzy logics
1373 -- 1389Benjamín C. Bedregal, Graçaliz Pereira Dimuro, Regivan H. Nunes Santiago, Renata Hax Sander Reiser. On interval fuzzy S-implications
1390 -- 1406Ronald R. Yager. A framework for reasoning with soft information
1407 -- 1417Enrique Miranda, Inés Couso, Pedro Gil. Approximations of upper and lower probabilities by measurable selections
1418 -- 1433Murat Diker. Textural approach to generalized rough sets based on relations
1434 -- 1457Sohrab Effati, Morteza Pakdaman. Artificial neural network approach for solving fuzzy differential equations
1458 -- 1476Woong-Kee Loh, Yang-Sae Moon, Jaideep Srivastava. Distortion-free predictive streaming time-series matching
1477 -- 1485Ali Emrouznejad, Gholam R. Amin. Improving minimax disparity model to determine the OWA operator weights
1486 -- 1491Leila Golshani, Einollah Pasha. Rényi entropy rate for Gaussian processes
1492 -- 1505Gur Mosheiov, Assaf Sarig. Scheduling with a common due-window: Polynomially solvable cases
1506 -- 1517Irina Cristea, Bijan Davvaz. Atanassov s intuitionistic fuzzy grade of hypergroups

Volume 180, Issue 7

1075 -- 1089R. O. Parreiras, Petr Ekel, J. S. C. Martini, Reinaldo M. Palhares. A flexible consensus scheme for multicriteria group decision making under linguistic assessments
1090 -- 1103Gayathri Tambaram Kailasam, Jinseung Lee, Jae-Won Rhee, Jaewoo Kang. Efficient skycube computation using point and domain-based filtering
1104 -- 1120Jelena Ignjatovic, Miroslav Ciric. Formal power series and regular operations on fuzzy languages
1121 -- 1133Anton Bardera, Miquel Feixas, Imma Boada, Mateu Sbert. Image registration by compression
1134 -- 1137Vladimír Janis. t-Norm based cuts of intuitionistic fuzzy sets
1138 -- 1158Dariusz Malyszko, Jaroslaw Stepaniuk. Adaptive multilevel rough entropy evolutionary thresholding
1159 -- 1166Jianming Zhan, Bijan Davvaz, K. P. Shum. On probabilistic n-ary hypergroups
1167 -- 1181Yu Long, Kefei Chen. Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism

Volume 180, Issue 6

799 -- 802Javier Montero, Da Ruan. Modelling uncertainty
803 -- 812G. Mayor, Oscar Valero. Aggregation of asymmetric distances in Computer Science
813 -- 819Hui Wang, Jun Liu, Juan Carlos Augusto. Mass function derivation and combination in multivariate data spaces
820 -- 833Elena Castiñeira, Susana Cubillo, Wilmer Montilla. Measuring incompatibility between Atanassov s intuitionistic fuzzy sets
834 -- 845Carmen Torres-Blanc, Susana Cubillo, Elena Castiñeira. An axiomatic model for measuring contradiction and N-contradiction between two AIFSs
846 -- 860José Antonio Martin H., Matilde Santos, Javier de Lope Asiaín. Orthogonal variant moments features in image analysis
861 -- 872Ihsan Kaya, Cengiz Kahraman. Development of fuzzy process accuracy index for decision making problems
873 -- 885Xiaoxiao Kong, Qiang Wei, Guoqing Chen. An approach to discovering multi-temporal patterns and its application to financial databases
886 -- 895Selçuk Çebi, Metin Celik, Cengiz Kahraman. Structuring ship design project approval mechanism towards installation of operator-system interfaces via fuzzy axiomatic design principles
896 -- 910Fernando Alonso Zotes, Matilde Santos Peñas. Multi-criteria genetic optimisation of the manoeuvres of a two-stage launcher
911 -- 927María Lourdes Borrajo Diz, Juan M. Corchado, Emilio S. Corchado, María A. Pellicer, Javier Bajo. Multi-agent neural business control system
928 -- 948Ki Yong Lee, Yon Dohn Chung, Myoung-Ho Kim. An efficient method for maintaining data cubes incrementally
949 -- 970Yuhua Qian, Jiye Liang, Yiyu Yao, Chuangyin Dang. MGRS: A multi-granulation rough set
971 -- 983Radomír Halas, Judita Lihová. On weakly cut-stable maps
984 -- 994Jianwei Dian. A meaning based information theory - informalogical space: Basic concepts and convergence of information sequences
995 -- 1009Yi-Chun Chang, Chih-Ping Chu. Applying learning behavioral Petri nets to the analysis of learning behavior in web-based learning environments
1010 -- 1019Nung-Yue Shi, Chih-Ping Chu. A molecular solution to the hitting-set problem in DNA-based supercomputing
1020 -- 1030Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Domingo-Ferrer. Simulatable certificateless two-party authenticated key agreement protocol
1031 -- 1039Wang Chen, Yan-jun Shi, Hong-fei Teng, Xiao-ping Lan, Li-chen Hu. An efficient hybrid algorithm for resource-constrained project scheduling
1040 -- 1050Rza Bashirov, Tolgay Karanfiller. On path dependent loss and switch crosstalk reduction in optical networks
1051 -- 1059Mohammad Saber Fallah Nezhad, Seyed Taghi Akhavan Niaki. A new monitoring design for uni-variate statistical quality control charts
1060 -- 1072Murat Ak, Kamer Kaya, Kaan Onarlioglu, Ali Aydin Selçuk. Efficient broadcast encryption with user profiles
1073 -- 0Wen-Chiung Lee, Peng-Jen Lai, Chin-Chia Wu. Erratum to Some single-machine and m-machine flowshop scheduling problems with learning considerations [Inform. Sci. 179(2009) 3885-3892]

Volume 180, Issue 5

561 -- 583Emilio Serrano, Arnaud Quirin, Juan A. Botía, Oscar Cordón. Debugging complex software systems by means of pathfinder networks
584 -- 601Jesús Pardillo, Jose-Norberto Mazón, Juan Trujillo. Extending OCL for OLAP querying on conceptual multidimensional models of data warehouses
602 -- 612Buhwan Jeong, Jaewook Lee, Hyunbo Cho. Improving memory-based collaborative filtering via similarity updating and prediction modulation
613 -- 630Yi Guo, Zhiqing Shao, Nan Hua. Automatic text categorization based on content analysis with cognitive situation models
631 -- 639A. S. Salama. Topological solution of missing attribute values problem in incomplete information tables
640 -- 652Quan Yuan, Feng Qian, Wenli Du. A hybrid genetic algorithm with the Baldwin effect
653 -- 663Paulo Sérgio Sausen, Marco Aurélio Spohn, Angelo Perkusich. Broadcast routing in wireless sensor networks with dynamic power management and multi-coverage backbones
664 -- 678Farshad Safaei, Ahmad Khonsari, Mohammad Mahdi Gilak. A new performance measure for characterizing fault rings in interconnection networks
679 -- 696Jiuping Xu, Lihui Zhao. A multi-objective decision-making model with fuzzy rough coefficients and its application to the inventory problem
697 -- 711Jein-Shan Chen, Chun-Hsu Ko, Shaohua Pan. A neural network based on the generalized Fischer-Burmeister function for nonlinear complementarity problems
712 -- 725Jesús Medina, Manuel Ojeda-Aciego. Multi-adjoint t-concept lattices
726 -- 736Zeshui Xu. Choquet integrals of weighted intuitionistic fuzzy information
737 -- 747Saeed Rasouli, Bijan Davvaz. Roughness in MV-algebras
748 -- 764Shihong Yue, Jeen-Shing Wang, Teresa Wu, Huaxiang Wang. A new separation measure for improving the effectiveness of validity indices
765 -- 775Malrey Lee, Nam-deok Cho, Thomas M. Gatton. A function-based user authority delegation model
776 -- 792Bing Chen, Xiaoping Liu, Kefu Liu, Peng Shi, Chong Lin. Direct adaptive fuzzy control for nonlinear systems with time-varying delays
793 -- 798Lavinia Corina Ciungu, Beloslav Riecan. Representation theorem for probabilities on IFS-events

Volume 180, Issue 4

481 -- 492Guangquan Zhang, Jie Lu, Javier Montero, Yi Zeng. Model, solution concept, and Kth-best algorithm for linear trilevel programming
493 -- 505Ferdinando Di Martino, Vincenzo Loia, Salvatore Sessa. Fuzzy transforms method and attribute dependency in data analysis
506 -- 518Kit Yan Chan, C. K. Kwong, Terence C. Fogarty. Modeling manufacturing processes using a genetic programming-based fuzzy regression with detection of outliers
519 -- 531Sunil Mathew, M. S. Sunitha. Node connectivity and arc connectivity of a fuzzy graph
532 -- 542Yao Ouyang, Zhudeng Wang, Hua-peng Zhang. On fuzzy rough sets based on tolerance relations
543 -- 548Endre Pap, Mirjana Strboja. Generalization of the Jensen inequality for pseudo-integral
549 -- 559Chung Ki Li, Duncan S. Wong. Signcryption from randomness recoverable public key encryption

Volume 180, Issue 3

325 -- 340Sang Wan Lee, Yong-Soo Kim, Kwang-Hyun Park, Zeungnam Bien. Iterative Bayesian fuzzy clustering toward flexible icon-based assistive software for the disabled
341 -- 353Yiyu Yao. Three-way decisions with probabilistic rough sets
354 -- 365Yingjie Yang, Chris J. Hinde. A new extension of fuzzy sets using rough sets: R-fuzzy sets
366 -- 383Gabriel Cardona, Mercè Llabrés, Francesc Rosselló, Gabriel Valiente. Path lengths in tree-child time consistent hybridization networks
384 -- 398Elías F. Combarro, Pedro Miranda. Characterizing isometries on the order polytope with an application to the theory of fuzzy measures
399 -- 413Wei Wang, Xiaohong Guan, Beizhan Wang, Yaping Wang. A novel mobility model based on semi-random circular movement in mobile ad hoc networks
414 -- 431Kweku-Muata Osei-Bryson. Towards supporting expert evaluation of clustering results using a data mining process model
432 -- 440Feng Lin, Xinguang Chen. Estimation of transitional probabilities of discrete event systems from cross-sectional survey and its application in tobacco control
441 -- 451Gülçin Büyüközkan, Da Ruan. Choquet integral based aggregation approach to software development risk assessment
452 -- 464Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma. Certificateless signcryption scheme in the standard model
465 -- 480Dan Huang, Sing Kiong Nguang. Robust fault estimator design for uncertain networked control systems with random time delays: An ILMI approach

Volume 180, Issue 24

4737 -- 4762Pierpaolo D Urso, Riccardo Massari, Adriana Santoro. A class of fuzzy clusterwise regression models
4763 -- 4771Stijn Lievens, Bernard De Baets. Supervised ranking in the weka environment
4772 -- 4783Shyi-Ming Chen, Yu-Chuan Chang. Multi-variable fuzzy forecasting based on fuzzy clustering and fuzzy rule interpolation techniques
4784 -- 4805Ricardo de A. Araújo. Swarm-based translation-invariant morphological prediction method for financial time series forecasting
4806 -- 4817Yonghun Park, Dongmin Seo, Jonghyeon Yun, Christopher T. Ryu, Jun Kim, Jaesoo Yoo. An efficient data-centric storage method using time parameter for sensor networks
4818 -- 4833Chuan-Kang Ting, Chien-Chih Liao. A memetic algorithm for extending wireless sensor network lifetime
4834 -- 4864Zhi-Jie Zhou, Chang-Hua Hu, Dong-Ling Xu, Jian-Bo Yang, Dong Hua Zhou. New model for system behavior prediction based on belief rule based systems
4865 -- 4876Lidong Wang, Xiaodong Liu, Jiannong Cao. A new algebraic structure for formal concept analysis
4877 -- 4891Serkan Genç, Fatih Emre Boran, Diyar Akay, Zeshui Xu. Interval multiplicative transitivity for consistency, missing values and priority weights of interval fuzzy preference relations
4892 -- 4908Tzu-Chao Lin. Switching-based filter based on Dempster s combination rule for image processing
4909 -- 4928Rafiullah Chamlawi, Asifullah Khan. Digital image authentication and recovery: Employing integer transform based information embedding and extraction
4929 -- 4939Qing Li, Jia Wang, Yuanzhu Peter Chen, Zhangxi Lin. User comments for news recommendation in forum-based social media
4940 -- 4957Anthony Lo, Tansel Özyer, Radwan Tahboob, Keivan Kianmehr, Jamal Jida, Reda Alhajj. XML materialized views and schema evolution in VIREX
4958 -- 4974Nuno Homem, João Paulo Carvalho. Finding top-k elements in data streams
4975 -- 4998Alsayed Algergawy, Richi Nayak, Gunter Saake. Element similarity measures in XML schema matching
4999 -- 5007Shesheng Gao, Yongmin Zhong, Bijan Shirinzadeh. Random weighting estimation for fusion of multi-dimensional position data
5008 -- 5028Nimmy Ravindran, Yao Liang, Xu Liang. A labeled-tree approach to semantic and structural data interoperability applied in hydrology domain
5029 -- 5040Yongfu Wang, Tianyou Chai, Yimin Zhang. State observer-based adaptive fuzzy output-feedback control for a class of uncertain nonlinear systems
5041 -- 5059Abdesselem Boulkroune, Mohammed M Saad, Hachemi Chekireb. Design of a fuzzy adaptive controller for MIMO nonlinear time-delay systems with unknown actuator nonlinearities and unknown control direction
5060 -- 5076Stelios E. Papadakis, Vassilis G. Kaburlasos. Piecewise-linear approximation of non-linear models based on probabilistically/possibilistically interpreted intervals numbers (INs)
5077 -- 5089Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen. Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
5090 -- 5100Chia-Jui Lai, Chang-Hsiung Tsai, Hong-Chun Hsu, Tseng-Kuei Li. A dynamic programming algorithm for simulation of a multi-dimensional torus in a crossed cube
5101 -- 5114Thomas Vetterlein. Pseudo-BCK algebras as partial algebras
5115 -- 5124Shan Zhao, Xue-ping Wang. Invertible matrices and semilinear spaces over commutative semirings
5125 -- 5129Babington B. Makamba, Venkat Murali. Preferential normal fuzzy subgroups
5130 -- 5145Qiansheng Zhang, Shengyi Jiang, Baoguo Jia, Shihua Luo. Some information measures for interval-valued intuitionistic fuzzy sets

Volume 180, Issue 23

4459 -- 4476Rudolf Seising. Cybernetics, system(s) theory, information theory and Fuzzy Sets and Systems in the 1950s and 1960s
4477 -- 4495Sergio Alonso, Enrique Herrera-Viedma, Francisco Chiclana, Francisco Herrera. A web based consensus support system for group decision making problems and incomplete preferences
4496 -- 4513Amelia Zafra, Sebastián Ventura. G3P-MI: A genetic programming algorithm for multiple instance learning
4514 -- 4528Qi Wu, Rob Law. Complex system fault diagnosis based on a fuzzy robust wavelet support vector classifier and an adaptive Gaussian particle swarm optimization
4529 -- 4542Wen-Hsien Ho, Shinn-Horng Chen, Tung-Kuan Liu, Jyh-Horng Chou. Design of robust-optimal output feedback controllers for linear uncertain systems using LMI-based approach and genetic algorithm
4543 -- 4556Guiyi Wei, Yun Ling, Athanasios V. Vasilakos, Bin Xiao, Yao Zheng. PIVOT: An adaptive information discovery framework for computational grids
4557 -- 4571V. Alba Fernández, M. D. Jiménez-Gamero, B. Lagos-Álvarez. Divergence statistics for testing uniform association in cross-classifications
4582 -- 4594Choon Ki Ahn. Passive learning and input-to-state stability of switched Hopfield neural networks with time-delay
4595 -- 4605Yi-Kuei Lin. A method to evaluate routing policy through p minimal paths for stochastic case
4606 -- 4618M. Arun Kumar, Reshma Khemchandani, Madan Gopal, Suresh Chandra. Knowledge based Least Squares Twin support vector machines
4619 -- 4640Shaocheng Tong, Yongming Li. Fuzzy adaptive robust backstepping stabilization for SISO nonlinear systems with unknown virtual control direction
4641 -- 4660Tzuu-Hseng S. Li, Yun-Cheng Huang. MIMO adaptive fuzzy terminal sliding-mode controller for robotic manipulators
4661 -- 4671Jiancheng Zhang, Xiyang Yang. Some properties of fuzzy reasoning in propositional fuzzy logic systems
4672 -- 4684Bin Zhao, Weidong Kou, Hui Li, Lanjun Dang, Jun Zhang. Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
4685 -- 4694Tao Zhang, Wenxiang Li, Yan Zhang, Ergong Zheng, Xijian Ping. Steganalysis of LSB matching based on statistical modeling of pixel difference distributions
4695 -- 4705Yi Guo, Zhiqing Shao, Nan Hua. A cognitive interactionist sentence parser with simple recurrent networks
4706 -- 4713Zengfeng Tian, Liangjian Hu, David Greenhalgh. Perturbation analysis of fuzzy linear systems
4714 -- 4728Hong Yuan, Futai Zhang, Xinyi Huang, Yi Mu, Willy Susilo, Lei Zhang 0009. Certificateless threshold signature scheme from bilinear maps
4729 -- 4736Tsung-Ching Lin, Hsin-Chiu Chang, Hung-Peng Lee, Trieu-Kien Truong. On the decoding of the (24, 12, 8) Golay code

Volume 180, Issue 22

4223 -- 4262Efrén Mezura-Montes, Mariana Edith Miranda-Varela, Rubí del Carmen Gómez-Ramón. Differential evolution in constrained numerical optimization: An empirical study
4263 -- 4289Frank S. C. Tseng, Yen-Hung Kuo, Yueh-Min Huang. Toward boosting distributed association rule mining by data de-clustering
4290 -- 4311Ana Belén Barragáns-Martínez, Enrique Costa-Montenegro, Juan C. Burguillo-Rial, Marta Rey-López, Fernando A. Mikic-Fonte, Ana Peleteiro-Ramallo. A hybrid content-based and item-based collaborative filtering approach to recommend TV programs enhanced with singular value decomposition
4312 -- 4322Stefano Moretti, Athanasios V. Vasilakos. An overview of recent applications of Game Theory to bioinformatics
4323 -- 4335Inma P. Cabrera, Pablo Cordero, Gloria Gutiérrez, Javier Martínez, Manuel Ojeda-Aciego. A coalgebraic approach to non-determinism: Applications to multilattices
4336 -- 4352Kai Liu, Victor C. S. Lee. On-demand broadcast for multiple-item requests in a multiple-channel environment
4353 -- 4369Junjie Wu, Hua Yuan, Hui Xiong, Guoqing Chen. Validation of overlapping clustering: A random clustering perspective
4370 -- 4383Min Gan, Hui Peng, Xiaoyan Peng, Xiaohong Chen, Garba Inoussa. A locally linear RBF network-based state-dependent AR model for nonlinear time series modeling
4384 -- 4400Qinghua Hu, Shuang An, Daren Yu. Soft fuzzy rough sets for robust feature evaluation and selection
4401 -- 4411Qiang Shen, Ruiqing Zhao. Risk assessment of serious crime with fuzzy random theory
4412 -- 4419Zhihui Li, Ting Xue, Hong Lai. Secret sharing schemes from binary linear codes
4420 -- 4429Peng Xu, Guo-Hua Cui, Feng-Yu Lei, Jing-Fang Xu. One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity
4430 -- 4435Lingye Wu, Erfang Shan, Zengrong Liu. On the k-tuple domination of generalized de Brujin and Kautz digraphs
4436 -- 4458Xiaojuan Cai. A pure labeled transition semantics for the applied pi calculus

Volume 180, Issue 21

4099 -- 4117Willem Waegeman, Bernard De Baets. A transitivity analysis of bipartite rankings in pairwise multi-class classification
4118 -- 4135Wook-Shin Han, Woong-Kee Loh, Kyu-Young Whang. Type-level access pattern view: Enhancing prefetching performance using the iterative and recursive patterns
4136 -- 4152Marcos Eduardo Valle. Permutation-based finite implicative fuzzy associative memories
4153 -- 4163Giuseppe Calcagno, Antonino Staiano, Giuliana Fortunato, Vincenzo Brescia-Morra, Elena Salvatore, Rosario Liguori, Silvana Capone, Alessandro Filla, Giuseppe Longo, Lucia Sacchetti. A multilayer perceptron neural network-based approach for the identification of responsiveness to interferon therapy in multiple sclerosis patients
4164 -- 4188Sergio Guadarrama, Antonio Ruiz-Mayor. Approximate robotic mapping from sonar data by modeling perceptions with antonyms
4189 -- 4194Marian Grendár Jr., Robert K. Niven. The Pólya information divergence
4195 -- 4206S. Zarezadeh, M. Asadi. Results on residual Rényi entropy of order statistics and record values
4207 -- 4222Ting-Yu Chen, Chia-Hang Li. Determining objective weights with intuitionistic fuzzy entropy measures: A comparative analysis

Volume 180, Issue 20

3817 -- 3836Fatma Nasoz, Christine L. Lisetti, Athanasios V. Vasilakos. Affectively intelligent and adaptive car interfaces
3837 -- 3862Luis Reynoso, M. Esperanza Manso, Marcela Genero, Mario Piattini. Assessing the influence of import-coupling on OCL expression maintainability: A cognitive theory-based perspective
3863 -- 3875Xinjun Peng. A nu-twin support vector machine (nu-TSVM) classifier and its geometric algorithms
3876 -- 3893Hengjian Li, Jiashu Zhang, Zutao Zhang. Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes
3894 -- 3913Shuaiqiang Wang, Jun Ma, Qiang He, Jiancheng Wan. Formal behavior modeling and effective automatic refinement
3914 -- 3931Ferdinando Di Martino, Vincenzo Loia, Salvatore Sessa. Fuzzy transforms for compression and decompression of color videos
3932 -- 3954Silvia Abrahão, Jaime Gómez, Emilio Insfrán. Validating a size measure for effort estimation in model-driven Web development
3955 -- 3973Rosfuzah Roslan, Razib M. Othman, Zuraini A. Shah, Shahreen Kasim, Hishammuddin Asmuni, Jumail Taliba, Rohayanti Hassan, Zalmiyah Zakaria. Incorporating multiple genomic features with the utilization of interacting domain patterns to improve the prediction of protein-protein interactions
3974 -- 3979Mehmet Gulek, Ismail Hakki Toroslu. A dynamic programming algorithm for tree-like weighted set packing problem
3980 -- 3991Rodrigo Rodrigues Sumar, Antonio Augusto Rodrigues Coelho, Leandro dos Santos Coelho. Computational intelligence approach to PID controller design using the universal model
3992 -- 4005Isabel Aguiló, Jaume Suñer, Joan Torrens. A characterization of residual implications derived from left-continuous uninorms
4006 -- 4014Branka Budimirovic, Vjekoslav Budimirovic, Andreja Tepavcevic. Fuzzy epsilon-subgroups
4015 -- 4021Jun Li, Radko Mesiar, Peter Struk. Pseudo-optimal measures
4022 -- 4030Yingwei Li, Huaiqin Wu. Global stability analysis in Cohen-Grossberg neural networks with delays and inverse Hölder neuron activation functions
4031 -- 4041Liu Wenyin, Xiaojun Quan, Min Feng, Bite Qiu. A short text modeling method combining semantic and statistical information
4042 -- 4059Hongbing Wang, Zhenfu Cao, Licheng Wang. Multi-use and unidirectional identity-based proxy re-encryption schemes
4060 -- 4068Tsung-Ching Lin, Hung-Peng Lee, Hsin-Chiu Chang, Shao-I Chu, Trieu-Kien Truong. High speed decoding of the binary (47, 24, 11) quadratic residue code
4069 -- 4074Xianfeng Guo, Jiashu Zhang. Secure group key agreement protocol based on chaotic Hash
4075 -- 4083Ming-Chien Yang. Constructing edge-disjoint spanning trees in twisted cubes
4084 -- 4098Mehmet Koç, Atalay Barkana, Ömer Nezih Gerek. A fast method for the implementation of common vector approach

Volume 180, Issue 2

209 -- 224Chris Cornelis, Richard Jensen, Germán Hurtado Martín, Dominik Slezak. Attribute selection with fuzzy decision reducts
225 -- 240Guoyin Jiang, Bin Hu, Youtian Wang. Agent-based simulation of competitive and collaborative mechanisms for mobile service chains
241 -- 255Babak Rezaee, Mohammad Hossein Fazel Zarandi. Data-driven fuzzy modeling for Takagi-Sugeno-Kang fuzzy system
256 -- 265Yu Zhou, Min Xie, Guozhen Xiao. On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity
266 -- 273Sugata Gangopadhyay, Sumanta Sarkar, Ruchi Telang. On the lower bounds of the second order nonlinearities of some Boolean functions
274 -- 287Yan-Lan Zhang, Jinjin Li, Wei-Zhi Wu. On axiomatic characterizations of three pairs of covering based approximation operators
288 -- 300Ahmed H. Abdel-Gawad, Amir F. Atiya, Nevin M. Darwish. Solution of systems of Boolean equations via the integer domain
301 -- 311Jia Zeng, Wei Feng, Lei Xie, Zhi-Qiang Liu. Cascade Markov random fields for stroke extraction of Chinese characters
312 -- 324Bo Huang, Jinsong Wu, David Zhang, Naimin Li. Tongue shape classification by geometric features

Volume 180, Issue 19

3573 -- 3588Enric Trillas, Itziar García-Honrado, Ana Pradera. Consequences and conjectures in preordered sets
3589 -- 3613Esra Kirci Ozorhan, Esat Kaan Kuban, Nihan Kesim Cicekli. Automated composition of web services with the abductive event calculus
3614 -- 3632Yiquan Zhu, Yang Xu. On filter theory of residuated lattices
3633 -- 3646Guido Fiorino. Fast decision procedure for propositional Dummett logic based on a multiple premise tableau calculus
3647 -- 3652Chaoyi Pang, Rui Zhang, Qing Zhang, Junhu Wang. Dominating sets in directed graphs
3653 -- 3673Amory Bisserier, Reda Boukezzoula, Sylvie Galichet. A revisited approach to linear fuzzy regression using trapezoidal fuzzy intervals
3674 -- 3685José Antonio Sanz, Alberto Fernández, Humberto Bustince Sola, Francisco Herrera. Improving the performance of fuzzy rule-based classification systems with interval-valued fuzzy sets and genetic amplitude tuning
3686 -- 3702Ali Gürkan, Luca Iandoli, Mark Klein, Giuseppe Zollo. Mediating debate through on-line large-scale argumentation: Evidence from the field
3703 -- 3717Sung Ho Ha. Behavioral assessment of recoverable credit of retailer s customers
3718 -- 3727Chul-Ho Park, Seong-Moo Yoo, W. David Pan. LSM: A layer subdivision method for deformable object matching
3728 -- 3744L. Shaw, W. Spears, L. Billings, P. Maxim. Effective vaccination policies
3745 -- 3763Zhanhong Shi, Zengtai Gong. The further investigation of covering-based rough sets: Uncertainty characterization, similarity measure and generalized models
3764 -- 3780Xiaohong Zhang, Yiyu Yao, Hong Yu. Rough implication operator based on strong topological rough algebras
3781 -- 3793Tzu-Liang Kung, Yuan-Hsiang Teng, Lih-Hsing Hsu. The panpositionable panconnectedness of augmented cubes
3794 -- 3805Yuejuan Han, Jianxi Fan, Shukui Zhang, Jiwen Yang, Peide Qian. Embedding meshes into locally twisted cubes
3806 -- 3813Huan Huang. Some notes on Zadeh s extensions
3814 -- 3816Wen-Hung Kuo, Dar-Li Yang. Note on Single-machine and flowshop scheduling with a general learning effect model and Some single-machine and m-machine flowshop scheduling problems with learning considerations

Volume 180, Issue 18

3381 -- 3401Dominik Fisch, Bernhard Kühbeck, Bernhard Sick, Seppo J. Ovaska. So near and yet so far: New insight into properties of some well-known classifier paradigms
3402 -- 3421Jin Xiao, Changzheng He, Xiaoyi Jiang, Dunhu Liu. A dynamic classifier ensemble selection approach for noise data
3422 -- 3433Hong Tang, Henri Maitre, Nozha Boujemaa, Weiguo Jiang. On the relevance of linear discriminative features
3434 -- 3443Qing Guo, Siyue Chen, Henry Leung, Shutian Liu. Covariance intersection based image fusion technique with application to pansharpening in remote sensing
3444 -- 3464Haiping Ma. An analysis of the equilibrium of migration models for biogeography-based optimization
3465 -- 3487Manuel Chica, Oscar Cordón, Sergio Damas, Joaquín Bautista. Multiobjective constructive heuristics for the 1/3 variant of the time and space assembly line balancing problem: ACO and random greedy search
3488 -- 3496Anna Kolesárová, Radko Mesiar. Lipschitzian De Morgan triplets of fuzzy connectives
3497 -- 3520Miroslav Ciric, Manfred Droste, Jelena Ignjatovic, Heiko Vogler. Determinization of weighted finite automata over strong bimonoids
3521 -- 3531Ping Zhu, Qiaoyan Wen. Some improved results on communication between information systems
3532 -- 3545Haixia Wu, Xiaofeng Liao, Wei Feng, Songtao Guo, Wei Zhang. Robust stability for uncertain genetic regulatory networks with interval time-varying delays
3546 -- 3561Lu Zhen, Zuhua Jiang, Haitao Song. Distributed recommender for peer-to-peer knowledge sharing
3562 -- 3571Irfan Siap, Hasan Akin, Ferhat Sah. Garden of eden configurations for 2-D cellular automata with rule 2460 N

Volume 180, Issue 17

3065 -- 3066Jason J. Jung, Ngoc Thanh Nguyen. Virtual agent and organization modeling: Theory and applications
3067 -- 3085Longbing Cao. In-depth behavior understanding and use: The behavior informatics approach
3086 -- 3107Jianxin Li, Jinpeng Huai, Chunming Hu, Yanmin Zhu. A secure collaboration service for dynamic virtual organizations
3108 -- 3116Tien Van Do. Modeling a resource contention in the management of virtual organizations
3117 -- 3139Beishui Liao, Huaxin Huang. ANGLE: An autonomous, normative and guidable agent with changing knowledge
3140 -- 3156Guofu Zhang, Jianguo Jiang, Zhaopin Su, Meibin Qi, Hua Fang. Searching for overlapping coalitions in multiple virtual organizations
3157 -- 3169Markus Gärtner, Ingo Seidel, Josef Froschauer, Helmut Berger. The formation of virtual organizations by means of electronic institutions in a 3D e-Tourism environment
3170 -- 3181Boyang Y. Qu, Ponnuthurai N. Suganthan. Multi-objective evolutionary algorithms based on the summation of normalized objectives and diversified selection
3182 -- 3191Shyam Sundar, Alok Singh. A swarm intelligence approach to the quadratic minimum spanning tree problem
3192 -- 3209Els Lefever, Timur Fayruzov, Véronique Hoste, Martine De Cock. Clustering web people search results using fuzzy ants
3210 -- 3231Nen-Fu Huang, Yih-Jou Tzang, Hong-Yi Chang, Chia-Wen Ho. Enhancing P2P overlay network architecture for live multimedia streaming
3232 -- 3247Hajime Nobuhara, Dang Ba Khac Trieu, Tsutomu Maruyama, Barnabás Bede. Max-plus algebra-based wavelet transforms and their FPGA implementation for image coding
3248 -- 3257Jason J. Jung. Reusing ontology mappings for query routing in semantic peer-to-peer environment
3258 -- 3272Kudret Demirli, Sujikumar Vijayakumar. Fuzzy logic based assignable cause diagnosis using control chart patterns
3273 -- 3287Xiao-Heng Chang, Guang-Hong Yang. Relaxed stabilization conditions for continuous-time Takagi-Sugeno fuzzy control systems
3288 -- 3303Radim Belohlávek, Tomas Kuhr, Vilém Vychodil. Confluence and termination of fuzzy relations
3304 -- 3315Irina Perfilieva, Bernard De Baets. Fuzzy transforms of monotone functions with application to image compression
3335 -- 3347Bahram Karimi, Mohammad Bagher Menhaj. Non-affine nonlinear adaptive control of decentralized large-scale systems using neural networks
3348 -- 3361Babushri Srinivas Kedukodi, Syam Prasad Kuncham, Satyanarayana Bhavanari. Reference points and roughness
3362 -- 3372M. H. Shahzamanian, M. Shirmohammadi, B. Davvaz. Roughness in Cayley graphs
3373 -- 3379Meijie Ma. The spanning connectivity of folded hypercubes

Volume 180, Issue 16

2915 -- 2924Ying Zhao, Yanyu Lu, Yukun Tian, Liming Li, QiuShi Ren, Xinyu Chai. Image processing based recognition of images with a limited number of pixels using simulated prosthetic vision
2925 -- 2939Shao-Hu Peng, Deok-Hwan Kim, Seok-Lyong Lee, Chin-Wan Chung. A visual shape descriptor using sectors and shape context of contour lines
2940 -- 2959Sun Zheng. An intensive restraint topology adaptive snake model and its application in tracking dynamic image sequence
2960 -- 2978Tongyan Li, Xingming Li. Novel alarm correlation analysis system based on association rules mining in telecommunication networks
2979 -- 2990Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee, Murad Khalid, Ravi Sankar. Activity-oriented access control to ubiquitous hospital information and services
2991 -- 3005Zuqiang Long, Ximing Liang, Lirong Yang. Some approximation properties of adaptive fuzzy systems with variable universe of discourse
3006 -- 3020Bart Van Gasse, Glad Deschrijver, Chris Cornelis, Etienne E. Kerre. Filters of residuated lattices and triangle algebras
3021 -- 3032Bijan Davvaz, M. Fathi, A. R. Salleh. Fuzzy hyperrings (H::v::-rings) based on fuzzy universal sets
3033 -- 3044Mohammad Hossein Fazel Zarandi, Adel Alaeddini. A general fuzzy-statistical clustering approach for estimating the time of change in variable sampling control charts
3045 -- 3058Chin-Chen Chang, The Duc Kieu. A reversible data hiding scheme using complementary embedding strategy
3059 -- 3064Lein Harn, Changlu Lin. Strong (n, t, n) verifiable secret sharing scheme

Volume 180, Issue 15

2815 -- 2833E. L. Yu, Ponnuthurai N. Suganthan. Ensemble of niching algorithms
2834 -- 2844Josep Domingo-Ferrer, Úrsula González-Nicolás. Hybrid microdata using microaggregation
2845 -- 2855Tareq Z. Ahram, Pamela McCauley-Bush, Waldemar Karwowski. Estimating intrinsic dimensionality using the multi-criteria decision weighted model and the average standard estimator
2856 -- 2874Daisuke Kitakoshi, Hiroyuki Shioya, Ryohei Nakano. Empirical analysis of an on-line adaptive system using a mixture of Bayesian networks
2875 -- 2888Lei-Da Li, Xiaoping Yuan, Zhaolin Lu, Jeng-Shyang Pan. Rotation invariant watermark embedding based on scale-adapted characteristic regions
2889 -- 2894Z. Eslami, Jamal Zarepour-Ahmadabadi. A verifiable multi-secret sharing scheme based on cellular automata
2895 -- 2903Xuefei Cao, Weidong Kou, Xiaoni Du. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
2904 -- 2914Che-Nan Kuo, Sun-Yuan Hsieh. Pancyclicity and bipancyclicity of conditional faulty folded hypercubes

Volume 180, Issue 14

2633 -- 2634Emilio Corchado, Ajith Abraham, André Carlos Ponce Leon Ferreira de Carvalho. Hybrid intelligent algorithms and applications
2635 -- 2648Richard J. Duro, M. Graña, Javier de Lope Asiaín. On the potential contributions of hybrid intelligent approaches to Multicomponent Robotic System development
2649 -- 2662Hujun Yin, Weilin Huang. Adaptive nonlinear manifolds and their applications to pattern recognition
2663 -- 2673Yan Zhang, Xindong Wu. Integrating induction and deduction for noisy data mining
2674 -- 2695Crina Grosan, Ajith Abraham. Approximating Pareto frontier using a hybrid line search approach
2696 -- 2720Nissim Matatov, Lior Rokach, Oded Maimon. Privacy-preserving data mining: A feature set partitioning approach
2721 -- 2742Maria Isabel Sánchez Segura, Fuensanta Medina-Domínguez, Antonio de Amescua Seco, Arturo Mora-Soto. Improving the efficiency of use of software engineering practices using product patterns
2743 -- 2762Engin Demir, Cevdet Aykanat. Efficient successor retrieval operations for aggregate query processing on clustered road networks
2763 -- 2776Georgios Paltoglou, Michail Salampasis, Maria Satratzemi. Collection-integral source selection for uncooperative distributed information retrieval environments
2777 -- 2792Rodolfo E. Haber, Raúl M. del Toro, Agustín Gajate. Optimal fuzzy control system using the cross-entropy method. A case study of a drilling process
2793 -- 2801Yao Ouyang, Radko Mesiar, Hamzeh Agahi. An inequality related to Minkowski type for Sugeno integrals
2802 -- 2813Navid Imani, Hamid Sarbazi-Azad. Properties of a hierarchical network based on the star graph

Volume 180, Issue 13

2499 -- 2513Hemant Kumar Singh, Tapabrata Ray, Warren Smith. C-PSA: Constrained Pareto simulated annealing for constrained multi-objective optimization
2514 -- 2527Yaodong Ni, Lei Xie, Zhi-Qiang Liu. Minimizing the expected complete influence time of a social network
2528 -- 2539Yi-Chung Hu. Analytic network process for pattern classification problems using genetic algorithms
2540 -- 2559S. Geetha, N. Ishwarya, N. Kamaraj. Evolving decision tree rule based system for audio stego anomalies detection based on Hausdorff distance statistics
2560 -- 2570Shuqin Zhang, Wai-Ki Ching, Xi Chen, Nam-Kiu Tsing. Generating probabilistic Boolean networks from a prescribed stationary distribution
2571 -- 2575David Walker, Shahram Latifi. Improving bounds on link failure tolerance of the star graph
2576 -- 2587Jun Shao, Zhenfu Cao, Xiaohui Liang, Huang Lin. Proxy re-encryption with keyword search
2588 -- 2595Yi-Ching Chen, Dyi-Rong Duh. Two-node-Hamiltonicity of enhanced pyramid networks
2596 -- 2617Sun-Yuan Hsieh, Yi-Ru Cian. Conditional edge-fault Hamiltonicity of augmented cubes
2618 -- 2632Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao. Secure threshold multi authority attribute based encryption without a central authority

Volume 180, Issue 12

2341 -- 2358Joris D hondt, Joris Vertommen, Paul-Armand Verhaegen, Dirk Cattrysse, Joost R. Duflou. Pairwise-adaptive dissimilarity measure for document clustering
2359 -- 2374Flora S. Tsai, Wenyin Tang, Kap Luk Chan. Evaluation of novelty metrics for sentence-level novelty mining
2375 -- 2389Nam Hun Park, Sang Hyun Oh, Won Suk Lee. Anomaly intrusion detection by clustering transactional audit streams in a host computer
2390 -- 2404C. Twomey, Thomas Stützle, Marco Dorigo, Max Manfrin, Mauro Birattari. An analysis of communication policies for homogeneous multi-colony ACO algorithms
2405 -- 2420Yu Wang, Bin Li, Thomas Weise. Estimation of distribution and differential evolution cooperation for large scale economic load dispatch optimization of power systems
2421 -- 2439Dominik Fisch, Alexander Hofmann, Bernhard Sick. On the versatility of radial basis function neural networks: A case study in the field of intrusion detection
2440 -- 2447Sergiu Rudeanu. Boolean sets and most general solutions of Boolean equations
2448 -- 2457Petr Gregor, Riste Skrekovski. On generalized middle-level problem
2458 -- 2475Fabien Laguillaumie, Damien Vergnaud. Time-selective convertible undeniable signatures with short conversion receipts
2476 -- 2486Yongjian Xie, Yongming Li, Aili Yang. The pasting constructions of lattice ordered effect algebras
2487 -- 2497Aifang Xie, Feng Qin. Solutions to the functional equation I(x, y)=I(x, I(x, y)) for a continuous D-operation
2498 -- 0José Antonio Martin H., Matilde Santos, Javier de Lope Asiaín. Erratum to Orthogonal variant moments features in image analysis [Information Sciences 180 (2010) 846-860]

Volume 180, Issue 11

2065 -- 2084Werner Groissboeck, Edwin Lughofer, Stefan Thumfart. Associating visual textures with human perceptions using genetic algorithms
2085 -- 2094José M. Merigó, Anna Maria Gil Lafuente. New decision-making techniques and their application in the selection of financial products
2095 -- 2123François Fouss, Youssef Achbany, Marco Saerens. A probabilistic reputation model based on transaction ratings
2124 -- 2133Shu-Hsien Liao, Shiu-Hwei Ho. Investment project valuation based on a fuzzy binomial approach
2134 -- 2141Yen Hung Chen, Chuan Yi Tang. On the bottleneck tree alignment problems
2142 -- 2155Seok Kee Lee, Yoon Ho Cho, Soung Hie Kim. Collaborative filtering with ordinal scale-based implicit ratings for mobile music recommendations
2156 -- 2175Sozon Papavlasopoulos, Marios Poulos, Nikolaos Korfiatis, George Bokos. A non-linear index to evaluate a journal s scientific impact
2176 -- 2195Yunjun Gao, Baihua Zheng, Gencai Chen, Qing Li, Chun Chen, Gang Chen. Efficient mutual nearest neighbor query processing for moving object trajectories
2196 -- 2208H. J. Shiu, Ka-Lok Ng, Jywe-Fei Fang, Richard C. T. Lee, Chien-Hung Huang. Data hiding methods based upon DNA sequences
2209 -- 2220José A. Cruz-Lemus, Ann Maes, Marcela Genero, Geert Poels, Mario Piattini. The impact of structural complexity on the understandability of UML statechart diagrams
2221 -- 2229Guilong Liu, Ying Sai. Invertible approximation operators of generalized rough sets and fuzzy rough sets
2230 -- 2238James J. H. Liou, Gwo-Hshiung Tzeng. A Dominance-based Rough Set Approach to customer behavior in the airline market
2239 -- 2248Mahdi Zarghami, Ferenc Szidarovszky. On the relation between Compromise Programming and Ordered Weighted Averaging operator
2249 -- 2263Naixue Xiong, Athanasios V. Vasilakos, Laurence Tianruo Yang, Cheng-Xiang Wang, Rajgopal Kannan, Chin-Chen Chang, Yi Pan. A novel self-tuning feedback controller for active queue management supporting TCP flows
2264 -- 2285Pankaj Gupta, Mukesh Kumar Mehlawat, Anand Saxena. A hybrid approach to asset allocation with simultaneous consideration of suitability and optimality
2286 -- 2298Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Yeh, Yung-Kuan Chan. A high payload frequency-based reversible image hiding method
2299 -- 2313Khalid M. Hosny. A systematic method for efficient computation of full and subsets Zernike moments
2314 -- 2327Chang-Ho Hyun, Chang-Woo Park, Seungwoo Kim. Takagi-Sugeno fuzzy model based indirect adaptive fuzzy observer and controller design
2328 -- 2339S. Razavi, H. Sarbazi-Azad. The triangular pyramid: Routing and topological properties

Volume 180, Issue 10

1779 -- 1780Costin Badica, Giuseppe Mangioni, Shahram Rahimi. Intelligent distributed information systems
1781 -- 1792Doina Bein, Si-Qing Zheng. Energy efficient all-to-all broadcast in all-wireless networks
1793 -- 1801Yukiko Yamauchi, Doina Bein, Toshimitsu Masuzawa, Linda Morales, Ivan Hal Sudborough. Calibrating embedded protocols on asynchronous systems
1802 -- 1816Yukiko Yamauchi, Sayaka Kamei, Fukuhito Ooshita, Yoshiaki Katayama, Hirotsugu Kakugawa, Toshimitsu Masuzawa. Timer-based composition of fault-containing self-stabilizing protocols
1817 -- 1836Ales Wojnar, Irena Mlýnková, Jirí Dokulil. Structural and semantic aspects of similarity of Document Type Definitions and XML schemas
1837 -- 1849Michael Hartung, Frank Loebe, Heinrich Herre, Erhard Rahm. Management of evolving semantic grid metadata within a collaborative platform
1850 -- 1864Mariano Rico, David Camacho, Óscar Corcho. A contribution-based framework for the creation of semantically-enabled web applications
1865 -- 1875Ognen Paunovski, George Eleftherakis, Konstantinos Dimopoulos, Tony Cowling. Evaluation of a selective distributed discovery strategy in a fully decentralized biologically inspired environment
1876 -- 1892Mirko Viroli, Franco Zambonelli. A biochemical approach to adaptive service ecosystems
1893 -- 1907Vincenza Carchiolo, Alessandro Longheu, Michele Malgeri. Reliable peers and useful resources: Searching for the best personalised learning path in a trust- and recommendation-aware environment
1908 -- 1923Maria Ganzha, Marcin Paprzycki, Jakub Stadnik. Combining information from multiple search engines - Preliminary comparison
1924 -- 1941Francesco Marcelloni, Massimo Vecchio. Enabling energy-efficient and lossy-aware data compression in wireless sensor networks by multi-objective evolutionary optimization
1942 -- 1954GuoSheng Yang, Yingzi Lin, Prabir Bhattacharya. A driver fatigue recognition model based on information fusion and dynamic Bayesian network
1955 -- 1966Rosario Toscano, Patrick Lyonnet. A new heuristic approach for non-convex optimization problems
1967 -- 1976Radko Mesiar, Humberto Bustince Sola, Javier Fernández. On the alpha-migrativity of semicopulas, quasi-copulas, and copulas
1977 -- 1989Humberto Bustince Sola, Tomasa Calvo, Bernard De Baets, János C. Fodor, Radko Mesiar, Javier Montero, Daniel Paternain, Ana Pradera. A class of aggregation functions encompassing two-dimensional OWA operators
1990 -- 2002Jiajun Lai, Yang Xu. Linguistic truth-valued lattice-valued propositional logic system ::::l::::P(X) based on linguistic truth-valued lattice implication algebra
2003 -- 2022Qinghua Hu, Daren Yu, Maozu Guo. Fuzzy preference based rough sets
2023 -- 2028Rosario Toscano, Patrick Lyonnet. Robust static output feedback controller synthesis using Kharitonov s theorem and evolutionary algorithms
2029 -- 2043Bruno Baruque, Emilio Corchado, Aitor Mata, Juan M. Corchado. A forecasting solution to the oil spill problem based on a hybrid intelligent system
2044 -- 2064Salvador García, Alberto Fernández, Julián Luengo, Francisco Herrera. Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining: Experimental analysis of power

Volume 180, Issue 1

1 -- 3Epaminondas Kapetanios, Georgia Koutrika. Guest editorial: Special issue on collective intelligence
4 -- 17Vasco Furtado, Leonardo Ayres, Marcos De Oliveira, Eurico Vasconcelos Filho, Carlos Caminha, Johnatas D Orleans, Mairon Belchior. Collective intelligence in law enforcement - The WikiCrimes system
18 -- 38Ioanna Lykourentzou, Katerina Papadaki, Dimitrios J. Vergados, Despina Polemi, Vassilis Loumos. CorpWiki: A self-regulating wiki to promote corporate collective intelligence through expert peer matching
39 -- 61Nitin Agarwal, Magdiel Galan Oliveras, Huan Liu, Shankara B. Subramanya. WisColl: Collective wisdom based blog clustering
62 -- 70Wei-Hsun Lee, Shian-Shyong Tseng, Wern-Yarng Shieh. Collaborative real-time traffic information generation and sharing framework for the intelligent transportation system
71 -- 94Pierre Lévy. From social computing to reflexive collective intelligence: The IEML research program
95 -- 112James Caverlee, Ling Liu, Steve Webb. The SocialTrust framework for trusted social information management: Architecture and algorithms
113 -- 131Ja-Hwung Su, Bo-Wen Wang, Chin-Yuan Hsiao, Vincent S. Tseng. Personalized rough-set-based recommendation by integrating multiple contents and collaborative information
132 -- 155Martijn C. Schut. On model design for simulation of collective intelligence
156 -- 166Manfred Droste, Torsten Stüber, Heiko Vogler. Weighted finite automata over strong bimonoids
167 -- 180Jian Fu, H. John Caulfield, Seong-Moo Yoo, Dongsheng Wu. Fuzzy Aggregation with Artificial Color filters
181 -- 190Zeshui Xu. A method based on distance measure for interval-valued intuitionistic fuzzy group decision making
191 -- 197Shiying Wang, Shangwei Lin. Path embeddings in faulty 3-ary n-cubes
198 -- 208Qiang Dong, Xiaofan Yang, Dajin Wang. Embedding paths and cycles in 3-ary n-cubes with faulty nodes and links