Journal: Inf. Sci.

Volume 181, Issue 9

1503 -- 1516Jesús Serrano-Guerrero, Enrique Herrera-Viedma, José Angel Olivas, Andres Cerezo, Francisco P. Romero. A google wave-based fuzzy recommender system to disseminate information in University Digital Libraries 2.0
1517 -- 1537Dagoberto Castellanos Nieves, Jesualdo Tomás Fernández-Breis, Rafael Valencia-García, Rodrigo Martínez-Béjar, Miguela Iniesta-Moreno. Semantic Web Technologies for supporting learning assessment
1538 -- 1551Bolanle Adefowoke Ojokoh, Ming Zhang, Jian Tang. A trigram hidden Markov model for metadata extraction from heterogeneous references
1552 -- 1572Duen-Ren Liu, Pei-Yun Tsai, Po-Huan Chiu. Personalized recommendation of popular blog articles for mobile applications
1573 -- 1590Matthias Delafontaine, Peter Bogaert, Anthony G. Cohn, Frank Witlox, Philippe De Maeyer, Nico Van de Weghe. Inferring additional knowledge from QTC::N:: relations
1591 -- 1608Rafik A. Aliev, Witold Pedrycz, Babek Guirimov, Rashad R. Aliev, Umit Ilhan, Mustafa Babagil, Sadik Mammadli. Type-2 fuzzy neural networks with fuzzy clustering and differential evolution optimization
1609 -- 1622Jacqueline Christmas, Edward Keedwell, Timothy M. Frayling, John R. B. Perry. Ant colony optimisation to identify genetic variant association with type 2 diabetes
1623 -- 1640Kit Yan Chan, Tharam Singh Dillon, Che Kit Kwong. Polynomial modeling for time-varying systems based on a particle swarm optimization algorithm
1641 -- 1650Hideki Katagiri, Masatoshi Sakawa. Interactive multiobjective fuzzy random programming through the level set-based probability model
1651 -- 1670Yuh-Jen Chen. Structured methodology for supplier selection and evaluation in a supply chain
1671 -- 1685Ngo Anh Vien, Hwanjo Yu, TaeChoong Chung. Hessian matrix distribution for Bayesian policy gradient reinforcement learning
1686 -- 1699Dan Ye, Guang-Hong Yang. Robust switching-type H::∞:: filter design for linear uncertain systems with time-varying delay
1700 -- 1721Zhi-gang Su, Pei-Hong Wang, Xiang-jun Yu, Zhen-zhong Lv. Maximal confidence intervals of the interval-valued belief structure and applications
1722 -- 1734Jim Z. C. Lai, Tsung-Jen Huang. An agglomerative clustering algorithm using a dynamic k-nearest-neighbor list
1735 -- 1740Ziqiu Yun, Xun Ge, Xiaole Bai. Axiomatization and conditions for neighborhoods in a covering to form a partition
1741 -- 1758Kamal Zuhairi Zamli, Mohammad F. J. Klaib, Mohammed I. Younis, Nor Ashidi Mat Isa, Rusli Abdullah. Design and implementation of a t-way test data generation strategy with automated execution tool support
1759 -- 1770Bijan Davvaz, Asghar Khan. Characterizations of regular ordered semigroups in terms of (α, β)-fuzzy generalized bi-ideals

Volume 181, Issue 8

1411 -- 1425Prithwish Chakraborty, Swagatam Das, Gourab Ghosh Roy, Ajith Abraham. On convergence of the multi-objective particle swarm optimizers
1426 -- 1439Eduard Bartl, Radim Belohlávek. Knowledge spaces with graded knowledge states
1440 -- 1453József Dombi. DeMorgan systems with an infinitely many negations in the strict monotone operator case
1454 -- 1462Valery M. Kirzhner, S. Frenkel, Abraham B. Korol. Minimal-dot plot: Old tale in new skin about sequence comparison
1463 -- 1483Pei-Yan Pai, Chin-Chen Chang, Yung-Kuan Chan, Meng-Hsiun Tsai. An adaptable threshold detector
1484 -- 1492Chenglong Yu, Mo Deng, Stephen S.-T. Yau. DNA sequence comparison by a novel probabilistic method
1493 -- 1502Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, Kwangjo Kim. New receipt-free voting scheme using double-trapdoor commitment

Volume 181, Issue 7

1187 -- 1211Elizabeth Ann Maharaj, Pierpaolo D Urso. Fuzzy clustering of time series in the frequency domain
1212 -- 1223Jun Zhao, Quanli Liu, Wei Wang, Zhuoqun Wei, Peng Shi. A parallel immune algorithm for traveling salesman problem and its application on cold rolling scheduling
1224 -- 1248Dan Simon, Richard Allen Rarick, Mehmet Ergezer, Dawei Du. Analytical and numerical comparisons of biogeography-based optimization and genetic algorithms
1249 -- 1263M. Tariq Mahmood, Abdul Majid, Tae-Sun Choi. Optimal depth estimation by combining focus measures using genetic programming
1264 -- 1284Ling Chen, Mingqi Lv, Qian Ye, Gencai Chen, John Woodward. A personal route prediction system based on trajectory data mining
1285 -- 1305Pasquale De Meo, Antonino Nocera, Giorgio Terracina, Domenico Ursino. Recommendation of similar users, resources and social networks in a Social Internetworking Scenario
1306 -- 1324Francesca Arcelli Fontana, Marco Zanoni. A tool for design pattern detection and software architecture reconstruction
1325 -- 1347Mohammad Biglarbegian, William W. Melek, Jerry M. Mendel. On the robustness of Type-1 and Interval Type-2 fuzzy logic systems in modeling
1348 -- 1357B. Farhadinia. Necessary optimality conditions for fuzzy variational problems
1358 -- 1368Zorana Jancic, Jelena Ignjatovic, Miroslav Ciric. An improved algorithm for determinization of weighted and fuzzy automata
1369 -- 1383Lianzhen Liu. States on finite monoidal t-norm based algebras
1384 -- 1402Badong Chen, Yu Zhu, Jinchun Hu, José C. Pri ncipe. Δ-Entropy: Definition, properties and applications in system identification with quantized data
1403 -- 1409Ching-Fang Hsu, Qi Cheng, Xueming Tang, Bing Zeng. An ideal multi-secret sharing scheme based on MSP

Volume 181, Issue 6

1045 -- 1059Rafik A. Aliev, Alex Tserkovny. Systemic approach to fuzzy logic formalization for approximate reasoning
1060 -- 1071Peng-Gang Sun, Lin Gao, Shan Shan Han. Identification of overlapping and non-overlapping community structure by fuzzy clustering in complex networks
1072 -- 1079Hamzeh Agahi, Heriberto Román-Flores, A. Flores-Franulic. General Barnes-Godunova-Levin type inequalities for Sugeno integral
1080 -- 1096Yiyu Yao. The superiority of three-way decisions in probabilistic rough set models
1097 -- 1115A. Mani. Choice inclusive general rough semantics
1116 -- 1124Gleb Beliakov, Humberto Bustince Sola, D. P. Goswami, U. K. Mukherjee, N. R. Pal. On averaging operators for Atanassov s intuitionistic fuzzy sets
1125 -- 1137Feng Feng, Xiaoyan Liu, Violeta Leoreanu Fotea, Young Bae Jun. Soft sets and soft rough sets
1138 -- 1152Rui Xia, Chengqing Zong, Shoushan Li. Ensemble of feature sets and classification algorithms for sentiment classification
1153 -- 1163Chao-li Sun, Jian-Chao Zeng, Jeng-Shyang Pan. An improved vector particle swarm optimization for constrained optimization problems
1164 -- 1170Wen-Chiung Lee, Peng-Jen Lai. Scheduling problems with general effects of deterioration and learning
1171 -- 1186Zhiliang Zhu, Wei Zhang, Kwok-Wo Wong, Hai Yu. A chaos-based symmetric image encryption scheme using a bit-level permutation

Volume 181, Issue 5

935 -- 953Mario G. C. A. Cimino, Francesco Marcelloni. Autonomic tracing of production processes with mobile and agent-based computing
954 -- 971Rodrigo C. Barros, Duncan D. Ruiz, Márcio P. Basgalupp. Evolutionary model trees for handling continuous classes in machine learning
972 -- 986Chao-Ton Su, Hung-Chun Lin. Applying electromagnetism-like mechanism for feature selection
987 -- 1002Jerzy Blaszczynski, Roman Slowinski, Marcin Szelag. Sequential covering rule induction algorithm for variable consistency rough set approaches
1003 -- 1017Yongming Li. Finite automata theory with membership values in lattices
1018 -- 1027Zhongfeng Qin, Manying Bai, Dan A. Ralescu. A fuzzy control system with application to production planning problems
1028 -- 1043Ahmet Zengin. Modeling discrete event scalable network systems

Volume 181, Issue 4

699 -- 715Ashish Ghosh, Niladri Shekhar Mishra, Susmita Ghosh. Fuzzy clustering algorithms for unsupervised change detection in remote sensing images
716 -- 731Ming-Chao Chiang, Chun-Wei Tsai, Chu-Sing Yang. A time-efficient pattern reduction algorithm for k-means clustering
732 -- 746Jong-Seok Lee, Sigurdur Ólafsson. Data clustering by minimizing disconnectivity
747 -- 757Michaël Rademaker, Bernard De Baets. Optimal restoration of stochastic monotonicity with respect to cumulative label frequency loss functions
758 -- 778Fernando Bobillo, Umberto Straccia. Reasoning with the finitely many-valued Lukasiewicz fuzzy Description Logic SROIQ
779 -- 791Shaosheng Zhou, Wenyan Ren, James Lam. Stabilization for T-S model based uncertain stochastic systems
792 -- 811Zhengxia Wang, Xiaofeng Liao, Songtao Guo, Haixia Wu. Mean square exponential stability of stochastic genetic regulatory networks with time-varying delays
812 -- 831Biao Qin, Shan Wang. Combining intensional with extensional query evaluation in tuple independent probabilistic databases
832 -- 841Bih-Sheue Shieh. Minimizing a linear objective function under a fuzzy max-t norm relation equation constraint
842 -- 854Tien-Fu Liang. Application of fuzzy sets to manufacturing/distribution planning decisions in supply chains
855 -- 868José J. Pazos Arias, Ana Fernández Vilas, Rebeca P. Díaz Redondo, Alberto Gil-Solla, Manuel Ramos Cabrer, Jorge García Duque. Making the most of TV on the move: My newschannel
869 -- 882Weifa Liang, Baichen Chen, Jeffrey Xu Yu. Top-k query evaluation in sensor networks under query response time constraint
883 -- 902Ivana Turnu, Giulio Concas, Michele Marchesi, Sandro Pinna, Roberto Tonelli. A modified Yule process to model the evolution of some object-oriented system properties
903 -- 916I. Álvarez Illán, J. M. Górriz, Javier Ramírez, Diego Salas-Gonzalez, M. M. López, Fermín Segovia, Rosa Chaves, Manuel Gómez-Río, Carlos García Puntonet. :::18:::F-FDG PET imaging analysis for computer aided Alzheimer s diagnosis
917 -- 925Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu. An efficient key assignment scheme for access control in a large leaf class hierarchy
926 -- 934Mu Han, Youpei Ye, Shixin Zhu, Chungen Xu, Bennian Dou. Cyclic codes over R = F::p:: + uF::p:: ++ u:::k-1:::F::p:: with length p:::s:::n

Volume 181, Issue 3

379 -- 397Stéphane Zieba, Philippe Polet, Frédéric Vanderhaegen. Using adjustable autonomy and human-machine cooperation to make a human-machine system resilient - Application to a ground robotic system
398 -- 418Yen-Liang Chen, Shin-yi Wu, Yu-Cheng Wang. Discovering multi-label temporal patterns in sequence databases
419 -- 434Gunjan Mansingh, Kweku-Muata Osei-Bryson, Han Reichgelt. Using ontologies to facilitate post-processing of association rules by domain experts
435 -- 449Jaegyoon Ahn, Youngmi Yoon, Sanghyun Park. Noise-robust algorithm for identifying functionally associated biclusters from gene expression data
450 -- 465Santi P. Maity, Malay K. Kundu. Perceptually adaptive spread transform image watermarking scheme using Hadamard transform
466 -- 478Bernard De Baets, Hans De Meyer, Radko Mesiar. Piecewise linear aggregation functions based on triangulation
479 -- 502Ting-Yu Chen. Optimistic and pessimistic decision making with dissonance reduction using interval-valued fuzzy sets
503 -- 518Daoyuan Zhai, Jerry M. Mendel. Uncertainty measures for general Type-2 fuzzy sets
519 -- 535Cecilia Leal Ramírez, Oscar Castillo, Patricia Melin, Antonio Rodríguez Díaz. Simulation of the bird age-structured population growth based on an interval type-2 fuzzy cellular structure
536 -- 546Przemyslaw Grzegorzewski. The inclusion-exclusion principle for IF-events
547 -- 551Frank Markham Brown. Comments on a numerical method for solving Boolean equations
552 -- 566Elizabeth Montero, María-Cristina Riff. On-the-fly calibrating strategies for evolutionary algorithms
567 -- 581Yun Wen, Hua Xu, Jiadong Yang. A heuristic-based hybrid genetic-variable neighborhood search algorithm for task scheduling in heterogeneous multiprocessor system
582 -- 599Yi-Kuei Lin, Cheng-Ta Yeh. Computer network reliability optimization under double-resource assignments subject to a transmission budget
600 -- 619Ana Cristina Vieira de Melo, Paulo Silveira. Improving data perturbation testing techniques for Web services
620 -- 627Jheng-Cheng Chen, Chang-Hsiung Tsai. Conditional edge-fault-tolerant Hamiltonicity of dual-cubes
628 -- 647Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang. Provably secure identity-based authenticated key agreement protocols with malicious private key generators
648 -- 660Jia Yu, Rong Hao, Fanyu Kong, Xiangguo Cheng, Jianxi Fan, Yangkui Chen. Forward-secure identity-based signature: Security notions and construction
661 -- 667Jian Weng, Guoxiang Yao, Robert H. Deng, Min-Rong Chen, Xiangxue Li. Cryptanalysis of a certificateless signcryption scheme in the standard model
668 -- 685Quan-ke Pan, Ling Wang, Liang Gao, W. D. Li. An effective hybrid discrete differential evolution algorithm for the flow shop scheduling with intermediate buffers
686 -- 696Hongbo Song, Li Yu, Wen-an Zhang. Networked H::infinity:: filtering for linear discrete-time systems
697 -- 0V. Alba Fernández, M. D. Jiménez-Gamero, B. Lagos-Álvarez. Erratum to Divergence statistics for testing uniform association in cross-classifications [Inform. Sci. 180 (2010) 4557-4571]

Volume 181, Issue 24

5349 -- 5363Frédéric Vanderhaegen, Patrice Caulier. A multi-viewpoint system to support abductive reasoning
5364 -- 5386Wenyin Gong, Álvaro Fialho, Zhihua Cai, Hui Li. Adaptive strategy selection in differential evolution for numerical optimization: An empirical study
5387 -- 5411Miguel A. Martínez-Prieto, Joaquín Adiego, Pablo de la Fuente. Natural Language Compression on Edge-Guided text preprocessing
5412 -- 5434Oleksandr Kolomiyets, Marie-Francine Moens. A survey on question answering technology from an information retrieval perspective
5435 -- 5456João Roberto Bertini Jr., Liang Zhao, Robson Motta, Alneu de Andrade Lopes. A nonparametric classification method based on K-associated graphs
5457 -- 5467Yong Du, Qinghua Hu, Pengfei Zhu, Peijun Ma. Rule learning for classification based on neighborhood covering reduction
5468 -- 5484Haifeng Liu, Zhaohui Wu, Milenko Petrovic, Hans-Arno Jacobsen. Optimized cluster-based filtering algorithm for graph metadata
5485 -- 5500David Mercier, Eric Lefevre, Daniel Jolly. Object association with belief functions, an application with vehicles
5501 -- 5514Jun Wang 0013, Hong Peng, Peng Shi. An optimal image watermarking approach based on a multi-objective genetic algorithm
5515 -- 5522Wen-Chiung Lee. Scheduling with general position-based learning curves
5523 -- 5533Ying-Ming Wang, Kwai-Sang Chin. A linear goal programming approach to determining the relative importance weights of customer requirements in quality function deployment
5534 -- 5547Zhengguang Wu, Peng Shi, Hongye Su, Jian Chu. ∞ filter design for discrete-time singular Markovian jump systems with time-varying delays
5548 -- 5564Muhammad Akram. Bipolar fuzzy graphs

Volume 181, Issue 23

5123 -- 5142Edwin Lughofer, Bogdan Trawinski, Krzysztof Trawinski, Olgierd Kempa, Tadeusz Lasota. On employing fuzzy modeling algorithms for the valuation of residential premises
5143 -- 5157Yung-Ming Li, Cheng-Yang Lai, Ching-Wen Chen. Discovering influencers for marketing in the blogosphere
5158 -- 5168Basilio Sierra, Elena Lazkano, Itziar Irigoien, Ekaitz Jauregi, Iñigo Mendialdua. K Nearest Neighbor Equality: Giving equal chance to all existing classes
5169 -- 5179Degang Chen, Qinghua Hu, Yongping Yang. Parameterized attribute reduction with Gaussian kernel based fuzzy rough sets
5180 -- 5193Yan Ren, Xiaodong Liu, Jiannong Cao. A parsimony fuzzy rule-based classifier using axiomatic fuzzy set theory and support vector machines
5194 -- 5213Miguel Delgado, M. Dolores Ruiz, Daniel Sánchez, José-María Serrano. A formal model for mining fuzzy rules using the RL representation theory
5214 -- 5226Olcay Taner Yildiz. Model selection in omnivariate decision trees using Structural Risk Minimization
5227 -- 5239Amir Hossein Gandomi, Amir Hossein Alavi. Multi-stage genetic programming: A new strategy to nonlinear system modeling
5240 -- 5248Ying-Ming Wang, Kwai-Sang Chin. A linear programming approximation to the eigenvector method in the analytic hierarchy process
5249 -- 5266Farooq Ahmad, Hejiao Huang, Xiaolong Wang. Analysis of the Petri net model of parallel manufacturing processes with shared resources
5267 -- 5277Rohayanti Hassan, Razib M. Othman, Puteh Saad, Shahreen Kasim. A compact hybrid feature vector for an accurate secondary structure prediction
5278 -- 5290Xiaohong Zhang, Chengliang Wang, Dong Li, Xiaolong Zhou, Dan Yang. Robust stability of impulsive Takagi-Sugeno fuzzy systems with parametric uncertainties
5291 -- 5303Zhi-Zhong Mao, Xiao-Shi Xiao. Decentralized adaptive tracking control of nonaffine nonlinear large-scale systems with time delays
5304 -- 5320Zijing Tan, Liyong Zhang. Repairing XML functional dependency violations
5321 -- 5332Pao-Lien Lai. Geodesic pancyclicity of twisted cubes
5333 -- 5347Chun-Ta Li, Min-Shiang Hwang. A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks

Volume 181, Issue 22

4909 -- 4927Wei Chu, Xiaogang Gao, Soroosh Sorooshian. A new evolutionary search strategy for global optimization of high-dimensional problems
4928 -- 4942Fan Min, Huaping He, Yuhua Qian, William Zhu. Test-cost-sensitive attribute reduction
4943 -- 4958Gianluigi Ciocca, Claudio Cusano, Simone Santini, Raimondo Schettini. Halfway through the semantic gap: Prosemantic features for image retrieval
4959 -- 4968Yi-Chung Hu, Chiung-Jung Chen. A PROMETHEE-based classification method using concordance and discordance relations and its application to bankruptcy prediction
4969 -- 4992Ondrej Pavlacka. Modeling uncertain variables of the weighted average operation by fuzzy vectors
4993 -- 5009Latifa Ben Arfa Rabai, Yanzhi Bai, Ali Mili. A quantitative model for software engineering trends
5010 -- 5028Woong-Kee Loh, Sandeep Mane, Jaideep Srivastava. Mining temporal patterns in popularity of web items
5029 -- 5041Hong Yan, Quanling Wei. Data envelopment analysis classification machine
5042 -- 5052Chuanfei Dong, Carol S. Paty. Application of adaptive weights to intelligent information systems: An intelligent transportation system as a case study
5053 -- 5066Tzer-jen Wei. Communication efficient shuffle for mental poker protocols
5067 -- 5083Thomas W. Cusick. Affine equivalence of cubic homogeneous rotation symmetric functions
5084 -- 5101Po-Jen Chuang, Yu-Shian Chiu. Efficient cache invalidation schemes for mobile data accesses
5102 -- 5109Young Bae Jun, Seok-Zun Song. Codes based on BCK-algebras
5110 -- 5118Fei Chen, Xiaofeng Liao, Tao Xiang, Hongying Zheng. Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring Z::N::
5119 -- 5122Alexandra Siposová. A note on continuity in scalarization for multicriteria optimization problems

Volume 181, Issue 21

4823 -- 4846Yolanda Blanco-Fernández, Martín López Nores, Alberto Gil-Solla, Manuel Ramos Cabrer, José J. Pazos Arias. Exploring synergies between content-based filtering and Spreading Activation techniques in knowledge-based recommender systems
4847 -- 4859Ronaldo Vigo. Representational information: a new general notion and measure of information
4860 -- 4866János C. Fodor, Imre J. Rudas. Migrative t-norms with respect to continuous ordinal sums
4867 -- 4877Cagatay Catal, Oral Alan, Kerime Balkan. Class noise detection based on software metrics and ROC curves
4878 -- 4894Chowdhury Farhan Ahmed, Syed Khairuzzaman Tanbeer, Byeong-Soo Jeong, Ho-Jin Choi. A framework for mining interesting high utility patterns with a strong frequency affinity
4895 -- 4907Wen Yu, Marco A. Moreno-Armendariz, Floriberto Ortiz Rodriguez. Stable adaptive compensation with fuzzy CMAC for an overhead crane

Volume 181, Issue 20

4331 -- 4339José M. Alonso, Luis Magdalena. Special issue on interpretable fuzzy systems
4340 -- 4360María José Gacto, Rafael Alcalá, Francisco Herrera. Interpretability of linguistic fuzzy rule-based systems: An overview of interpretability measures
4361 -- 4377Corrado Mencar, Ciro Castiello, Raffaele Cannone, Anna Maria Fanelli. Design of fuzzy rule-based classifiers with semantic cointension
4378 -- 4393Andri Riid, Ennu Rüstern. Identification of transparent, compact, accurate and reliable linguistic fuzzy models
4394 -- 4408Adolfo R. de Soto. A hierarchical model of a linguistic variable
4409 -- 4427Serge Guillaume, Brigitte Charnomordic. Learning interpretable fuzzy inference systems with FisPro
4428 -- 4459Carlos M. Fernandes, Juan Julián Merelo Guervós, Agostinho C. Rosa. A comparative study on the performance of dissortative mating and immigrants-based strategies for evolutionary dynamic optimization
4460 -- 4493Yang Shi, Hongcheng Liu, Liang Gao, Guohui Zhang. Cellular particle swarm optimization
4494 -- 4514Eduardo Mendel, Renato A. Krohling, Mauro Campos. Swarm algorithms with chaotic jumps applied to noisy optimization problems
4515 -- 4538Yu Wang, Bin Li, Thomas Weise, Jianyu Wang, Bo Yuan, Qiongjie Tian. Self-adaptive learning based particle swarm optimization
4539 -- 4549Yau-Tarng Juang, Shen-Lung Tung, Hung-Chih Chiu. Adaptive fuzzy particle swarm optimization for global optimization of multimodal functions
4550 -- 4568Chenggong Zhang, Zhang Yi. Scale-free fully informed particle swarm optimization algorithm
4569 -- 4581Wei Chu, Xiaogang Gao, Soroosh Sorooshian. Handling boundary constraints for particle swarm optimization in high-dimensional search space
4582 -- 4596Shih-An Li, Chen-Chien Hsu, Ching-Chang Wong, Chia-Jun Yu. Hardware/software co-design for particle swarm optimization algorithm
4597 -- 4624Muhammad Saleem, Gianni A. Di Caro, Muddassar Farooq. Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions
4625 -- 4641Alper Unler, Alper Murat, Ratna Babu Chinnam. mr:::2:::PSO: A maximum relevance minimum redundancy feature selection method based on swarm intelligence for support vector machine classification
4642 -- 4657Luca Mussi, Fabio Daolio, Stefano Cagnoni. Evaluation of parallel particle swarm optimization algorithms within the CUDA™ architecture
4658 -- 4672Lei Zhang, Qixin Cao. A novel ant-based clustering algorithm using the kernel method
4673 -- 4683Jui-Chung Hung. Adaptive Fuzzy-GARCH model applied to forecasting the volatility of stock markets using particle swarm optimization
4684 -- 4698Yannis Marinakis, Magdalene Marinaki, Georgios Dounias. Honey bees mating optimization algorithm for the Euclidean traveling salesman problem
4699 -- 4714Hui Wang 0002, Zhijian Wu, Shahryar Rahnamayan, Yong Liu, Mario Ventresca. Enhancing particle swarm optimization using generalized opposition-based learning
4715 -- 4732Yang Tang, Zidong Wang, Jian-An Fang. Controller design for synchronization of an array of delayed neural networks using a controllable probabilistic PSO
4733 -- 4753Jianghai Li, Qing-Shan Jia, Xiaohong Guan, Xi Chen. Tracking a moving object via a sensor network with a partial information broadcasting scheme
4754 -- 4764De-chao Li, Yong-Ming Li, Yong-jian Xie. Robustness of interval-valued fuzzy inference
4765 -- 4779Omid Solaymani Fard, Nima Ghal-Eh. Numerical solutions for linear system of first-order fuzzy differential equations with fuzzy constant coefficients
4780 -- 4798Yoel Caises, Antonio González, Enrique Leyva, Raúl Pérez. Combining instance selection methods based on data characterization: An approach to increase their effectiveness
4799 -- 4803Chou-Jung Hsu, T. C. Edwin Cheng, Dar-Li Yang. Unrelated parallel-machine scheduling with rate-modifying activities to minimize the total completion time
4804 -- 4822Ling Wang, Chen Fang. An effective shuffled frog-leaping algorithm for multi-mode resource-constrained project scheduling problem

Volume 181, Issue 2

257 -- 283Steven Schockaert, Philip D. Smart, Florian A. Twaroch. Generating approximate region boundaries from heterogeneous spatial information: An evolutionary approach
284 -- 307Yu-Chi Chung, I-Fang Su, Chiang Lee. An efficient mechanism for processing similarity search queries in sensor networks
308 -- 328Hao Luo, Fa-Xin Yu, Hua Chen, Zheng-Liang Huang, Hui Li, Ping-Hui Wang. Reversible data hiding based on block median preservation
329 -- 334A. Younes. Enhancing the security of quantum communication by hiding the message in a superposition
335 -- 341Abhishek Parakh, Subhash Kak. Space efficient secret sharing for implicit data security
342 -- 350Przemyslaw Grzegorzewski. On possible and necessary inclusion of intuitionistic fuzzy sets
351 -- 361Je Yeon Oh, Nam Wook Cho, Hoontae Kim, Yunhong Min, Suk-Ho Kang. Dynamic execution planning for reliable collaborative business processes
362 -- 378Vikas K. Sharma, Manju Agarwal, Kanwar Sen. Reliability evaluation and optimal design in heterogeneous multi-state series-parallel systems

Volume 181, Issue 19

4061 -- 4074Itziar García-Honrado, Enric Trillas. An essay on the linguistic roots of fuzzy sets
4075 -- 4100Gianpiero Cattaneo, Davide Ciucci, Didier Dubois. Algebraic models of deviant modal operators based on de Morgan and Kleene lattices
4101 -- 4111Erich-Peter Klement, Maddalena Manzi, Radko Mesiar. Ultramodular aggregation functions
4112 -- 4123Adam Pedrycz, Fangyan Dong, Kaoru Hirota. Nonlinear mappings in problem solving and their PSO-based development
4124 -- 4138Dun-Wei Gong, Na-na Qin, Xiao-yan Sun. Evolutionary algorithms for optimization problems with uncertainties and hybrid indices
4139 -- 4153Yang Liu, Zhi-Ping Fan, Yao Zhang. A method for stochastic multiple criteria decision making based on dominance degrees
4154 -- 4174Pierpaolo D Urso, Riccardo Massari, Adriana Santoro. Robust fuzzy regression analysis
4175 -- 4196Mi Zhou, Man Hon Wong. Boundary-based lower-bound functions for dynamic time warping and their indexing
4197 -- 4213Huan-Bo Luan, Yan-Tao Zheng, Meng Wang, Tat-Seng Chua. VisionGo: Towards video retrieval with joint exploration of human and computer
4214 -- 4229Jan Faigl. On the performance of self-organizing maps for the non-Euclidean Traveling Salesman Problem in the polygonal domain
4230 -- 4252Xizhao Wang, Yu-Lin He, Ling-Cai Dong, Huan-Yu Zhao. Particle swarm optimization for determining fuzzy measures from data
4253 -- 4272Chun-Cheng Lin, Yi-Yi Lee, Hsu-Chun Yen. Mental map preserving graph drawing using simulated annealing
4273 -- 4286Cui-Ping Wei, Pei Wang, Yu-Zhong Zhang. Entropy, similarity measure of interval-valued intuitionistic fuzzy sets and their applications
4287 -- 4299Chen Peng, Qing-Long Han. Delay-range-dependent robust stabilization for uncertain T-S fuzzy control systems with interval time-varying delays
4300 -- 4308Eddie Cheng, László Lipták, Weihua Yang, Zhao Zhang, Xiaofeng Guo. A kind of conditional vertex connectivity of Cayley graphs generated by 2-trees
4309 -- 4317Zihui Liu, Xin-Wen Wu, Yuan Luo, Wende Chen. New code equivalence based on relative generalized Hamming weights
4318 -- 4329Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer. Provably secure one-round identity-based authenticated asymmetric group key agreement protocol

Volume 181, Issue 18

3749 -- 3765Arnob Ghosh, Swagatam Das, Aritra Chowdhury, Ritwik Giri. An improved differential evolution algorithm with fitness-based adaptation of the control parameters
3766 -- 3782Thiago F. Covoes, Eduardo R. Hruschka. Towards improving cluster-based feature selection with a simplified silhouette filter
3783 -- 3797Joris D hondt, Paul-Armand Verhaegen, Joris Vertommen, Dirk Cattrysse, Joost R. Duflou. Topic identification based on document coherence and spectral analysis
3798 -- 3815César A. Astudillo, B. John Oommen. Imposing tree-based topologies onto self organizing maps
3816 -- 3827Xiaoyan Cai, Wenjie Li. A spectral analysis approach to document summarization: Clustering and ranking sentences simultaneously
3828 -- 3845Wei-Yi Liu, Kun Yue, Ming-Hai Gao. Constructing probabilistic graphical model from predicate formulas for fusing logical and probabilistic knowledge
3846 -- 3860Guixiang Wang, Peng Shi, Chenglin Wen. Fuzzy approximation relations on fuzzy n-cell number space and their applications in classification
3861 -- 3877Mu-Yen Chen, Chia-Chen Chen. Options analysis and knowledge management: Implications for theory and practice
3878 -- 3897Wei-Zhi Wu, Yee Leung. Theory and applications of granular labelled partitions in multi-scale decision tables
3898 -- 3916Graçaliz Pereira Dimuro, Benjamín René Callejas Bedregal, Regivan H. Nunes Santiago, Renata Hax Sander Reiser. Interval additive generators of interval t-norms and interval t-conorms
3917 -- 3924Jiachao Wu, Maokang Luo. Some properties of weak uninorms
3925 -- 3945Sébastien Destercke, Didier Dubois. Idempotent conjunctive combination of belief functions: Extending the minimum rule of possibility theory
3946 -- 3966Min An, Yao Chen, Chris J. Baker. A fuzzy reasoning and fuzzy-analytical hierarchy process based approach to the process of railway risk information: A railway risk management system
3967 -- 3980Xinjun Peng. Building sparse twin support vector machine classifiers in primal space
3981 -- 3994Ali Akbar Estaji, Somayeh Khodaii, Solmaz Bahrami. On rough set and fuzzy sublattice
3995 -- 4008Hyunjin Kim, Sungho Kang. Communication-aware task scheduling and voltage selection for total energy minimization in a multiprocessor system using Ant Colony Optimization
4009 -- 4023Masato Uchida, Jim Kurose. An information-theoretic characterization of weighted α-proportional fairness in network resource allocation
4024 -- 4040Bor-Jiunn Hwang, I-Shyan Hwang, Wei-Ren Chen. Adaptive radio resource management for interactive user-centric IPTV services in mobile WiMAX networks
4041 -- 4050Mingwu Zhang, Bo Yang, Tsuyoshi Takagi. Group-oriented setting s multisigncryption scheme with threshold designcryption
4051 -- 4060Heeseok Kim, Dong-Guk Han, Seokhie Hong. First-order side channel attacks on Zhang s countermeasures

Volume 181, Issue 17

3535 -- 3550Mosé Galluzzo, Bartolomeo Cosenza. Control of a non-isothermal continuous stirred tank reactor by a feedback-feedforward structure using type-2 fuzzy logic controllers
3570 -- 3580Lingyun Yang, Luoshan Xu. Topological properties of generalized approximation spaces
3581 -- 3600Mohammadreza Razzazi, Mehdy Roayaei. Using sticker model of DNA computing to solve domatic partition, kernel and induced path problems
3601 -- 3613Sushmita Mitra, Partha Pratim Kundu. Satellite image segmentation with Shadowed C-Means
3614 -- 3637Victoria S. Aragón, Susana C. Esquivel, Carlos A. Coello Coello. A T-cell algorithm for solving dynamic optimization problems
3638 -- 3651Chern-Loon Lim, Barmak Honarvar, Kim-Han Thung, Paramesran Raveendran. Fast computation of exact Zernike moments using cascaded digital filters
3652 -- 3676Ting-Yu Chen. A comparative analysis of score functions for multiple criteria decision making in intuitionistic fuzzy settings
3677 -- 3692Haiquan Zhao, Xiangping Zeng, Jiashu Zhang, Tian-rui Li, Yangguang Liu, Da Ruan. Pipelined functional link artificial recurrent neural network with the decision feedback structure for nonlinear channel equalization
3693 -- 3708Yi-Hong Tseng, Ching-Torng Lin. Enhancing enterprise agility by deploying agile drivers, capabilities and providers
3709 -- 3722Dun Liu, Tian-rui Li, Da Ruan. Probabilistic model criteria with decision-theoretic rough sets
3723 -- 3734M. H. Ghanim, H. I. Mustafa, S. Abd El Aziz. On lower and upper intension order relations by different cover concepts
3735 -- 3748O. M. Kwon, S. M. Lee, Ju H. Park. On the reachable set bounding of uncertain dynamic systems with time-varying delays and disturbances

Volume 181, Issue 16

3267 -- 3283Qiong Huang, Duncan S. Wong, Willy Susilo. Group-oriented fair exchange of signatures
3284 -- 3307Yaping Huang, Jiali Zhao, Yunhui Liu, Siwei Luo, Qi Zou, Mei Tian. Nonlinear dimensionality reduction using a temporal coherence principle
3308 -- 3322Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang. Discrete logarithm based additively homomorphic encryption and secure data aggregation
3323 -- 3335Shi-Zheng Zhao, M. Willjuice Iruthayarajan, S. Baskar, Ponnuthurai N. Suganthan. Multi-objective robust PID controller tuning using two lbests multi-objective particle swarm optimization
3336 -- 3355Yu Chen, Xiufen Zou, Weicheng Xie. Convergence of multi-objective evolutionary algorithms to a uniformly distributed representation of the Pareto front
3356 -- 3378Silvia Abrahão, Emilio Insfrán, José A. Carsí, Marcela Genero. Evaluating requirements modeling methods based on user perceptions: A family of experiments
3379 -- 3396Hsiang-Cheh Huang, Shu-Chuan Chu, Jeng-Shyang Pan, Chun-Yen Huang, Bin-Yih Liao. Tabu search based multi-watermarks embedding algorithm with multiple description coding
3397 -- 3410Caiming Zhong, Duoqian Miao, Pasi Fränti. Minimum spanning tree based split-and-merge: A hierarchical clustering method
3411 -- 3426Maria Fasli, Yevgeniya Kovalchuk. Learning approaches for developing successful seller strategies in dynamic supply chain management
3427 -- 3442Seung-Eun Yu, DaeEun Kim. Image-based homing navigation with landmark arrangement matching
3443 -- 3458Jun-Ki Min, Heejung Yang, Chin-Wan Chung. Cost based in-network join strategy in tree routing sensor networks
3459 -- 3475Mehmet Fatih Tasgetiren, Quan-ke Pan, Ponnuthurai N. Suganthan, Angela Hsiang-Ling Chen. A discrete artificial bee colony algorithm for the total flowtime minimization in permutation flow shops
3476 -- 3490Hassan B. Kazemian. Two neuro-fuzzy control schemes for a traffic-regulating buffer in wireless technology
3491 -- 3507Carles Martínez-García, Guillermo Navarro-Arribas, Simon N. Foley, Vicenç Torra, Joan Borrell. Flexible secure inter-domain interoperability through attribute conversion
3508 -- 3531Fei Kang, Junjie Li, Zhenyue Ma. Rosenbrock artificial bee colony algorithm for accurate global optimization of numerical functions
3532 -- 0Izhar Ahmad, Z. Husain. Erratum to Second order (F, α, ρ, d)-convexity and duality in multiobjective programming [Inform. Sci 176 (2006) 3094-3103]
3533 -- 0Prithwish Chakraborty, Swagatam Das, Gourab Ghosh Roy, Ajith Abraham. Erratum to On convergence of the multi-objective particle swarm optimizers [Inform. Sci 181 (2011) 1411-1425]

Volume 181, Issue 15

3101 -- 3129Alfredo García Hernández-Díaz, Luis V. Santana-Quintero, Carlos A. Coello Coello, Julián Molina Luque, Rafael Caballero. Improving the efficiency of ϵ-dominance based grids
3130 -- 3142Ahmed M. Khedr, Walid Osamy. Minimum perimeter coverage of query regions in a heterogeneous wireless sensor network
3143 -- 3161Christopher Durugbo, Windo Hutabarat, Ashutosh Tiwari, Jeffrey R. Alcock. Modelling collaboration using complex networks
3162 -- 3174Nguyen Duc Thang, Tahir Rasheed, Young-Koo Lee, Sungyoung Lee, Tae-Seong Kim. Content-based facial image retrieval using constrained independent component analysis
3175 -- 3187Dongli Jia, Guoxin Zheng, Muhammad Khurram Khan. An effective memetic differential evolution algorithm based on chaotic local search
3188 -- 3198Yen-Shing Tsai, Piyu Tsai. Adaptive data hiding for vector quantization images based on overlapping codeword clustering
3199 -- 3209Ronald R. Yager. On the fusion of imprecise uncertainty measures using belief structures
3210 -- 3224Roxana Jiménez Contreras, Marley Maria Bernardes Rebuzzi Vellasco, Ricardo Tanscheit. Hierarchical type-2 neuro-fuzzy BSP model
3225 -- 3245Chen-Sheng Ting, Yong-Nong Chang. Robust anti-windup controller design of time-delay fuzzy systems with actuator saturations
3246 -- 3266Shyong Jian Shyu, Kun Chen. Visual multiple secret sharing based upon turning and flipping

Volume 181, Issue 14

2923 -- 2932Lotfi A. Zadeh. A Note on Z-numbers
2933 -- 2950Ondrej Linda, Milos Manic. Interval Type-2 fuzzy voter design for fault tolerant systems
2951 -- 2963Jun-Lin Lin, Yan-Kuen Wu, Sy-Ming Guu. On fuzzy relational equations and the covering problem
2964 -- 2988Xiaofeng Zhang, William K. Cheung, C. H. Li. Learning latent variable models from distributed and abstracted data
2989 -- 2999Jui-Fang Chang, Peng Shi. Using investment satisfaction capability index based particle swarm optimization to construct a stock portfolio
3000 -- 3016Liwei Wei, Zhenyu Chen, Jianping Li. Evolution strategies based adaptive L::p:: LS-SVM
3017 -- 3031Ben He, Jimmy Xiangji Huang, Xiaofeng Zhou. Modeling term proximity for probabilistic information retrieval models
3032 -- 3042Yan-Lan Zhang, Mao-Kang Luo. On minimization of axiom sets characterizing covering-based approximation operators
3043 -- 3053Aleksandra Z. Jovanovic, Zoran H. Peric. Geometric piecewise uniform lattice vector quantization of the memoryless Gaussian source
3054 -- 3065Shiying Wang, Jing Li, Ruixia Wang. Hamiltonian paths and cycles with prescribed edges in the 3-ary n-cube
3066 -- 3072Hyang-Sook Lee, Seongan Lim. An efficient incomparable public key encryption scheme
3073 -- 3084Chin-Chen Chang, Yi-Hui Chen, Hsin-Chi Wang. Meaningful secret sharing technique with authentication and remedy abilities
3085 -- 3099Xi Wang, Jianxi Fan, Xiaohua Jia, Shukui Zhang, Jia Yu. Embedding meshes into twisted-cubes

Volume 181, Issue 13

2597 -- 2599Sandra de Amo, Manoel G. Mendonça. Guest editorial: Special issue on Databases and Software Engineering
2600 -- 2607Enzo Seraphim, Thatyana F. Piola Seraphim, Edmilson M. Moreira, Fábio C. M. Ricotta, Caetano Traina Jr.. Paged similarity queries
2608 -- 2625Fabiano C. Botelho, Anísio Lacerda, Guilherme Vale Menezes, Nivio Ziviani. Minimal perfect hashing: A competitive method for indexing internal memory
2626 -- 2655Joubert de Castro Lima, Celso Massaki Hirata. Multidimensional cyclic graph approach: Representing a data cube without common sub-graphs
2656 -- 2670Adriano Veloso, Wagner Meira Jr., Marcos André Gonçalves, Humberto Mossri de Almeida, Mohammed Javeed Zaki. Calibrated lazy associative classification
2671 -- 2684J. A. dos Santos, Cristiano D. Ferreira, Ricardo da Silva Torres, Marcos André Gonçalves, Rubens A. C. Lamparelli. A relevance feedback method based on genetic programming for classification of remote sensing images
2685 -- 2699Juliana Bonato dos Santos, Carlos A. Heuser, Viviane Pereira Moreira, Leandro Krug Wives. Automatic threshold estimation for data matching applications
2700 -- 2720Roberta Coelho, Arndt von Staa, Uirá Kulesza, Awais Rashid, Carlos José Pereira de Lucena. Unveiling and taming liabilities of aspects in the presence of exceptions: A static analysis based approach
2721 -- 2746Otávio Augusto Lazzarini Lemos, Paulo Cesar Masiero. A pointcut-based coverage analysis approach for aspect-oriented programs
2747 -- 2760Ali Afzal Malik, Barry W. Boehm. Quantifying requirements elaboration to improve early software cost estimation
2761 -- 2786Aline Vasconcelos, Cláudia Werner. Evaluating reuse and program understanding in ArchMine architecture recovery approach
2787 -- 2796Daren Yu, Xiao Yu, Qinghua Hu, Jinfu Liu, Anqi Wu. Dynamic time warping constraint learning for large margin nearest neighbor classification
2797 -- 2812Dongdong Yang, Licheng Jiao, Maoguo Gong, Fang Liu. Artificial immune multi-objective SAR image segmentation with fused complementary features
2813 -- 2822Kao-Shing Hwang, Hsin-Yi Lin, Yuan-Pao Hsu, Hung-Hsiu Yu. Self-organizing state aggregation for architecture design of Q-learning
2823 -- 2840Wang Wei, Payam M. Barnaghi, Andrzej Bargiela. Rational Research model for ranking semantic entities
2841 -- 2857Lidan Shou, Xiaolong Zhang, Ping Wang, Gang Chen, Jinxiang Dong. Supporting multi-dimensional queries in mobile P2P network
2858 -- 2872Jiri Kupka. On fuzzifications of discrete dynamical systems
2873 -- 2891L. Xie, Y. L. Yang, Z. Q. Liu. On the effectiveness of subwords for lexical cohesion based story segmentation of Chinese broadcast news
2892 -- 2905Jong-Seok Kim, Hyeong-Ok Lee, Eddie Cheng, László Lipták. Independent spanning trees on even networks
2906 -- 2921Taekyoung Kwon. Privacy preservation with X.509 standard certificates

Volume 181, Issue 12

2441 -- 2454Debarati Kundu, Kaushik Suresh, Sayan Ghosh, Swagatam Das, Bijaya K. Panigrahi, Sanjoy Das. Multi-objective optimization with artificial weed colonies
2455 -- 2468Quan-ke Pan, Mehmet Fatih Tasgetiren, Ponnuthurai N. Suganthan, Tay Jin Chua. A discrete artificial bee colony algorithm for the lot-streaming flow shop scheduling problem
2469 -- 2487Ferrante Neri, Giovanni Iacca, Ernesto Mininno. Disturbed Exploitation compact Differential Evolution for limited memory optimization problems
2488 -- 2511Matthieu Weber, Ferrante Neri, Ville Tirronen. A study on scale factor in distributed differential evolution
2512 -- 2528Tsung-Ting Kuo, Shou-de Lin. Learning-based concept-hierarchy refinement through exploiting topology, content and social information
2529 -- 2549Cees H. Elzinga, Hui Wang 0001, Zhiwei Lin 0002, Yash Kumar. Concordance and consensus
2550 -- 2570Daniel Lemire, Owen Kaser. Reordering columns for smaller indexes
2571 -- 2575Costas S. Iliopoulos, Manal Mohamed, William F. Smyth. New complexity results for the k-covers problem
2576 -- 2586Ming-Jheng Li, Justie Su-tzu Juan, Jennifer Hui-Chan Tsai. Practical electronic auction scheme with strong anonymity and bidding privacy
2587 -- 2596E. A. Abo-Tabl. A comparison of two kinds of definitions of rough approximations based on a similarity relation

Volume 181, Issue 11

2061 -- 2070Jeremy Bolton, Paul D. Gader, Hichem Frigui, Peter Torrione. Random set framework for multiple instance learning
2071 -- 2085Shaoning Pang, Tao Ban, Youki Kadobayashi, Nikola Kasabov. Personalized mode transductive spanning SVM classification tree
2086 -- 2110Yi Cheng, Duoqian Miao, Qinrong Feng. Positive approximation and converse approximation in interval-valued fuzzy rough sets
2111 -- 2127Sebastià Massanet, Joan Torrens. On a new class of fuzzy implications: h-Implications and generalizations
2128 -- 2138Zeshui Xu, Meimei Xia. Distance and similarity measures for hesitant fuzzy sets
2139 -- 2165Ting-Yu Chen. Bivariate models of optimism and pessimism in multi-criteria decision-making based on intuitionistic fuzzy sets
2166 -- 2176Fujun Hou. A Semiring-based study of judgment matrices: properties and models
2177 -- 2188Yurilev Chalco-Cano, Heriberto Román-Flores, María-Dolores Jiménez-Gamero. Generalized derivative and π-derivative for set-valued functions
2189 -- 2208Daoshun Wang, Feng Yi, Xiaobo Li. Probabilistic visual secret sharing schemes for grey-scale images and color images
2209 -- 2217Yunqiang Yin, Dehua Xu, Xiaokun Huang. Notes on some single-machine scheduling problems with general position-dependent and time-dependent learning effects
2218 -- 2230Cheng-Hsing Yang, Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang. Reversible steganography based on side match and hit pattern for VQ-compressed images
2231 -- 2246Bingli Xu, Hui Lin 0002, Longsang Chiu, Ya Hu, Jun Zhu, Mingyuan Hu, Weining Cui. Collaborative virtual geographic environments: A case study of air pollution simulation
2247 -- 2259Eva-María Ortega. Stochastic comparisons for rooted butterfly networks and tree networks, with random environments
2260 -- 2267Jing Li, Shiying Wang, Di Liu, Shangwei Lin. Edge-bipancyclicity of the k-ary n-cubes with faulty nodes and edges
2268 -- 2277Xirong Xu, Wenhua Zhai, Jun Ming Xu, Aihua Deng, Yuansheng Yang. Fault-tolerant edge-pancyclicity of locally twisted cubes
2278 -- 2292Tatjana Grbic, Ivana Stajner-Papuga, Mirjana Strboja. An approach to pseudo-integration of set-valued functions
2293 -- 2302Xiaodi Huang, Xiaodong Zheng, Wei Yuan, Fei Wang, Shanfeng Zhu. Enhanced clustering of biomedical documents using ensemble non-negative matrix factorization
2303 -- 2315Jianxi Fan, Xiaohua Jia, Xin Liu, Shukui Zhang, Jia Yu. Efficient unicast in bijective connection networks with the restricted faulty node set
2316 -- 2339Bakir Lacevic, Edoardo Amaldi. Ectropy of diversity measures for populations in Euclidean space
2340 -- 2355Li-Vang Lozada-Chang, Roberto Santana. Univariate marginal distribution algorithm dynamics for a class of parametric functions with unitation constraints
2356 -- 2369Yan Zhao, Huijun Gao, James Lam. New results on H::∞:: filtering for fuzzy systems with interval time-varying delays
2370 -- 2391Liang Huang, Il Hong Suh, Ajith Abraham. Dynamic multi-objective optimization based on membrane computing for control of time-varying unstable plants
2392 -- 2404Yi-Shao Huang, Min Wu. Robust decentralized direct adaptive output feedback fuzzy control for a class of large-sale nonaffine nonlinear systems
2405 -- 2421Changying Li, Shaocheng Tong, Wei Wang. Fuzzy adaptive high-gain-based observer backstepping control for SISO nonlinear systems
2422 -- 2435Junzuo Lai, Weidong Kou, Kefei Chen. Self-generated-certificate public key encryption without pairing and its application
2436 -- 2440Shengli Liu, Yu Long, Kefei Chen. Key updating technique in identity-based encryption

Volume 181, Issue 10

1771 -- 1773Vassilis G. Kaburlasos. Special issue: Information engineering applications based on lattices
1774 -- 1786Radim Belohlávek, Erik Sigmund, Jiri Zacpal. Evaluation of IPAQ questionnaires supported by formal concept analysis
1787 -- 1803Gerhard X. Ritter, Gonzalo Urcid. A lattice matrix method for hyperspectral image unmixing
1804 -- 1817Jan Konecny. Isotone fuzzy Galois connections with hedges
1818 -- 1835Xinde Li, Jean Dezert, Florentin Smarandache, Xinhan Huang. Evidence supporting measure of similarity for reducing the complexity in information fusion
1836 -- 1862Yang Xu, Jun Liu, Da Ruan, Xiaobing Li. Determination of α-resolution in lattice-valued first-order logic LF(X)
1863 -- 1873Athanasios Kehagias. Some remarks on the lattice of fuzzy intervals
1874 -- 1887Vassilis Syrris, Vassilios Petridis. A lattice-based neuro-computing methodology for real-time human action recognition
1888 -- 1909Francisco J. Valverde-Albacete, Carmen Peláez-Moreno. Extending conceptualisation modes for generalised Formal Concept Analysis
1910 -- 1928Manuel Graña, Darya Chyzhyk, Maite García-Sebastián, Carmen Hernández. Lattice independent component analysis for functional magnetic resonance imaging
1929 -- 1950Peter Sussner, Estevão Laureano Esmi. Morphological perceptrons with competitive learning: Lattice-theoretical framework and constructive learning algorithm
1951 -- 1970Susana Muñoz-Hernández, Victor Pablos Ceruelo, Hannes Strass. RFuzzy: Syntax, semantics and implementation details of a simple and expressive fuzzy tool over Prolog
1971 -- 1988Mike Nachtegael, Peter Sussner, Tom Mélange, Etienne E. Kerre. On the role of complete lattices in mathematical morphology: From tool to uncertainty model
1989 -- 2001Mehdi Kaytoue, Sergei O. Kuznetsov, Amedeo Napoli, Sébastien Duplessis. Mining gene expression data with pattern structures in formal concept analysis
2002 -- 2015Isabelle Bloch. Lattices of fuzzy sets and bipolar fuzzy sets, and mathematical morphology
2016 -- 2035Boris Galitsky, Josep Lluís de la Rosa. Concept-based learning of human behavior for customer relationship management
2036 -- 2059Sébastien Nedjar, Rosine Cicchetti, Lotfi Lakhal. Extracting semantics in OLAP databases using emerging cubes

Volume 181, Issue 1

1 -- 22Michel Grabisch, Jean-Luc Marichal, Radko Mesiar, Endre Pap. Aggregation functions: Means
23 -- 43Michel Grabisch, Jean-Luc Marichal, Radko Mesiar, Endre Pap. Aggregation functions: Construction methods, conjunctive, disjunctive and mixed classes
44 -- 56Eduardo Fernandez, Edy Lopez, Fernando Lopez, Carlos A. Coello Coello. Increasing selective pressure towards the best compromise in evolutionary multiobjective optimization: The extended NOSGA method
57 -- 78Matthias Dehmer, Abbe Mowshowitz. A history of graph entropy measures
79 -- 91Nizar Hachicha, Bassem Jarboui, Patrick Siarry. A fuzzy logic control using a differential evolution algorithm aimed at modelling the financial market dynamics
92 -- 105Laihong Hu, Fuchun Sun, Hualong Xu, Huaping Liu, Xuejun Zhang. Mutation Hopfield neural network and its applications
106 -- 114Yuehui Chen, Bin Yang, Qingfang Meng, Yaou Zhao, Ajith Abraham. Time-series forecasting using a system of ordinary differential equations
115 -- 128Sebastián Maldonado, Richard Weber, Jayanta Basak. Simultaneous feature selection and classification using kernel-penalized support vector machines
129 -- 149S. J. Overbeek, Patrick van Bommel, Henderik Alex Proper. Statics and dynamics of cognitive and qualitative matchmaking in task fulfillment
150 -- 162Zeshui Xu, Xiaoqiang Cai. Group consensus algorithms based on preference relations
163 -- 183Hai Zhao, Chunyu Kit. Integrating unsupervised and supervised word segmentation: The role of goodness measures
184 -- 200Z. M. Ma, Jian Liu, Li Yan. Matching twigs in fuzzy XML
201 -- 216Kelvin Sim, Guimei Liu, Vivekanand Gopalkrishnan, Jinyan Li. A case study on financial ratios via cross-graph quasi-bicliques
217 -- 226Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang. A communication-efficient three-party password authenticated key exchange protocol
227 -- 233Ercan Solak, Cahit Çokal. Algebraic break of image ciphers based on discretized chaotic map lattices
234 -- 238Junghyun Nam, Juryon Paik, Dongho Won. A security weakness in Abdalla et al. s generic construction of a group key exchange protocol
239 -- 256Yonghong Xiang, Iain A. Stewart. Augmented k-ary n-cubes