default search action
Information Sciences, Volume 276
Volume 276, August 2014
- Saeran Kwon:
An identity-based strongly unforgeable signature without random oracles from bilinear pairings. 1-9 - Özer Talo, Celal Çakan:
The extension of the Knopp core theorem to the sequences of fuzzy numbers. 10-20 - Hongzhen Du, Qiaoyan Wen:
Certificateless proxy multi-signature. 21-30 - Liwen Ma:
Classification of coverings in the finite approximation spaces. 31-41 - Seyed Mohsen Mousavi, Javad Sadeghi, Seyed Taghi Akhavan Niaki, Najmeh Alikar, Ardeshir Bahreininejad, Hendrik Simon Cornelis Metselaar:
Two parameter-tuned meta-heuristics for a discounted inventory control problem in a fuzzy environment. 42-62 - María José Gacto, Marta Galende, Rafael Alcalá, Francisco Herrera:
METSK-HDe: A multiobjective evolutionary algorithm to learn accurate TSK-fuzzy systems in high-dimensional and large-scale regression problems. 63-79 - Youngbin Park, Il Hong Suh:
Oriented edge-selective band-pass filtering. 80-103 - Anis Farihan Mat Raffei, Hishammuddin Asmuni, Rohayanti Hassan, Razib M. Othman:
Fusing the line intensity profile and support vector machine for removing reflections in frontal RGB color eye images. 104-122 - Tarique Anwar, Muhammad Abulaish:
Namesake alias mining on the Web and its role towards suspect tracking. 123-145 - Frédéric Vanderhaegen, Stéphane Zieba:
Reinforced learning systems based on merged and cumulative knowledge to predict human actions. 146-159 - Fuyuan Cao, Joshua Zhexue Huang, Jiye Liang:
Trend analysis of categorical data streams with a concept change method. 160-173 - Diego Viejo, José García Rodríguez, Miguel Cazorla:
Combining visual features and Growing Neural Gas networks for robotic 3D SLAM. 174-185 - Decui Liang, Dun Liu:
Systematic studies on three-way decisions with interval-valued decision-theoretic rough sets. 186-203 - Adil Baykasoglu, Alper Hamzadayi, Simge Yelkenci Köse:
Testing the performance of teaching-learning based optimization (TLBO) algorithm on combinatorial problems: Flow shop and job shop scheduling cases. 204-218 - Min Han, Chuang Liu, Jun Xing:
An evolutionary membrane algorithm for global numerical optimization problems. 219-241 - Sungchul Kim, Tao Qin, Tie-Yan Liu, Hwanjo Yu:
Advertiser-centric approach to understand user click behavior in sponsored search. 242-254 - Sheng-Sheng Wang, Dong Liu, Chen Zhang, Dayou Liu:
Representation, reasoning and similar matching for detailed topological relations with DTString. 255-277 - Ke-Chung Lin, I-En Liao, Tsui-Ping Chang, Shu-Fan Lin:
A frequent itemset mining algorithm based on the Principle of Inclusion-Exclusion and transaction mapping. 278-289 - Xiangxue Li, Haifeng Qian, Yuan Zhou:
Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption. 290-294 - Mostafa I. H. Abd-El-Barr, Fayez Gebali:
Reliability analysis and fault tolerance for hypercube multi-computer networks. 295-318 - María Isabel González Vasco, Angel L. Pérez del Pozo, Pedro Taborda Duarte, Jorge L. Villar:
Cryptanalysis of a key exchange scheme based on block matrices. 319-331 - Pei Fang Guo, Prabir Bhattacharya:
An evolutionary framework for detecting protein conformation defects. 332-342 - Zhan-He Ou, Ling-Hwei Chen:
A steganographic method based on tetris games. 343-353 - A. Balu, Kuppusamy Krishnamoorthy:
An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption. 354-362 - Xiu-Bo Chen, Yuan Su, Gang Xu, Ying Sun, Yixian Yang:
Quantum state secure transmission in network communications. 363-376 - M. Nesibe Kesicioglu, Radko Mesiar:
Ordering based on implications. 377-386 - Martin Víta:
Why are papers about filters on residuated structures (usually) trivial? 387-391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.