default search action
Information Sciences, Volume 295
Volume 295, February 2015
- Caiming Zhong, Mikko I. Malinen, Duoqian Miao, Pasi Fränti:
A fast minimum spanning tree algorithm based on K-means. 1-17 - Rafal Drezewski, Jan Sepielak, Wojciech Filipkowski:
The application of social network analysis algorithms in a system supporting money laundering detection. 18-32 - Yuan Jiang, Zeshui Xu, Xiaohan Yu:
Group decision making based on incomplete intuitionistic multiplicative preference relations. 33-52 - Lu Tan, Mingyuan Hu, Hui Lin:
Agent-based simulation of building evacuation: Combining human behavior with predictable spatial accessibility in a fire emergency. 53-66 - Shubhajeet Chatterjee, Swagatam Das:
Ant colony optimization based enhanced dynamic source routing algorithm for mobile Ad-hoc network. 67-90 - RajeshKanna Ala, Dong Hwan Kim, Sung Yul Shin, ChangHwan Kim, Sung-Kee Park:
A 3D-grasp synthesis algorithm to grasp unknown objects based on graspable boundary and convex segments. 91-106 - Majid Abdollahzade, Arash Miranian, Hossein Hassani, Hossein Iranmanesh:
A new hybrid enhanced local linear neuro-fuzzy model based on the optimized singular spectrum analysis and its application for nonlinear and chaotic time series forecasting. 107-125 - Mansoor Davoodi, Ali Mohades, Farnaz Sheikhi, Payam Khanteimouri:
Data imprecision under λ-geometry model. 126-144 - Hacene Habbi, Yassine Boudouaoui, Dervis Karaboga, Celal Öztürk:
Self-generated fuzzy systems design using artificial bee colony optimization. 145-159 - Enrique Bermejo Nievas, Oscar Cordón, Sergio Damas, José Santamaría:
A comparative study on the application of advanced bacterial foraging models to image registration. 160-181 - Zengtai Gong, Lu Zhang, Xinyun Zhu:
The statistical convergence for sequences of fuzzy-number-valued functions. 182-195 - Changming Zhu, Zhe Wang, Daqi Gao, Xiang Feng:
Double-fold localized multiple matrixized learning machine. 196-220 - Yanfeng Shi, Qingji Zheng, Jiqiang Liu, Zhen Han:
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. 221-231 - Jun Liu, Ting-Zhu Huang, Ivan W. Selesnick, Xiao-Guang Lv, Po-Yu Chen:
Image restoration using total variation with overlapping group sparsity. 232-246 - Effat Farhana, M. Sohel Rahman:
Constrained sequence analysis algorithms in computational biology. 247-257 - Joe Tekli, Richard Chbeir, Agma J. M. Traina, Caetano Traina Jr., Renato Fileto:
Approximate XML structure validation based on document-grammar tree similarity. 258-302 - Ting-Yu Chen:
Likelihoods of interval type-2 trapezoidal fuzzy preference relations and their application to multiple criteria decision analysis. 303-322 - Kun Sun, Peiran Li, Wenbing Tao, Yuanyan Tang:
Feature Guided Biased Gaussian Mixture Model for image matching. 323-336 - Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou:
Cryptanalysis and improvement of a certificateless aggregate signature scheme. 337-346 - Jana Borzová-Molnárová, Lenka Halcinová, Ondrej Hutník:
Probabilistic-valued decomposable set functions with respect to triangle functions. 347-357 - Ana Maria Palacios, José Luis Palacios, Luciano Sánchez, Jesús Alcalá-Fdez:
Genetic learning of the membership functions for mining fuzzy association rules from low quality data. 358-378 - Jinglei Liu, Shizhong Liao:
Expressive efficiency of two kinds of specific CP-nets. 379-394 - Xuezhi Wen, Ling Shao, Yu Xue, Wei Fang:
A rapid learning algorithm for vehicle classification. 395-406 - Sedigheh Mahdavi, Mohammad Ebrahim Shiri, Shahryar Rahnamayan:
Metaheuristics in large-scale global continues optimization: A survey. 407-428 - Manzoor Ahmad Zahid, Harrie C. M. de Swart:
The Borda Majority Count. 429-440 - Farman Ali, Eun Kyoung Kim, Yong-Gi Kim:
Type-2 fuzzy ontology-based semantic knowledge for collision avoidance of autonomous underwater vehicles. 441-464 - Ali Rezaei Divroodi, Linh Anh Nguyen:
On bisimulations for description logics. 465-493 - Shahin Rostami, Dean O'Reilly, Alex Shenfield, Nicholas J. Bowring:
A novel preference articulation operator for the Evolutionary Multi-Objective Optimisation of classifiers in concealed weapons detection. 494-520 - Lingxia Du, Cuiping Li, Hong Chen, Liwen Tan, Yinglong Zhang:
Probabilistic SimRank computation over uncertain graphs. 521-535 - Guoliang Wang, Haizhong Shi, Feifei Hou, Yalan Bai:
Some conditional vertex connectivities of complete-transposition graphs. 536-543 - Qian Wang, D. Marc Kilgour, Keith W. Hipel:
Facilitating risky project negotiation: An integrated approach using fuzzy real options, multicriteria analysis, and conflict analysis. 544-557 - Xavier Sevillano, Xavier Valero, Francesc Alías:
Look, listen and find: A purely audiovisual approach to online videos geotagging. 558-572 - Saif Kifah, Salwani Abdullah:
An adaptive non-linear great deluge algorithm for the patient-admission problem. 573-585 - Nouman Azam, Jingtao Yao:
Interpretation of equilibria in game-theoretic rough sets. 586-599 - Robab Alikhani, Fariba Bahrami:
Global solutions of fuzzy integro-differential equations under generalized differentiability by the method of upper and lower solutions. 600-608 - Victoria S. Aragón, Susana C. Esquivel, Carlos A. Coello Coello:
An immune algorithm with power redistribution for solving economic dispatch problems. 609-632 - Simon Andrews:
A 'Best-of-Breed' approach for designing a fast algorithm for computing fixpoints of Galois Connections. 633-649 - Jack Brimberg, Nenad Mladenovic, Dragan Urosevic:
Solving the maximally diverse grouping problem by skewed general variable neighborhood search. 650-675
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.