default search action
Information Sciences, Volume 188
Volume 188, April 2012
- Ludovic Liétard:
A functional interpretation of linguistic summaries of data. 1-16 - Giovanni Iacca, Ferrante Neri, Ernesto Mininno, Yew-Soon Ong, Meng-Hiot Lim:
Ockham's Razor in memetic computing: Three stage optimal memetic exploration. 17-43 - Kemal Bicakci, Ibrahim Ethem Bagci, Bülent Tavli:
Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures. 44-63 - HaRim Jung, Yon Dohn Chung, Ling Liu:
Processing generalized k-nearest neighbor queries on a wireless broadcast stream. 64-79 - Wei-Po Lee, Yu-Ting Hsiao:
Inferring gene regulatory networks using a hybrid GA-PSO approach with numerical constraints and network decomposition. 80-99 - Ngoc Hoang Luong, Hai Thanh Thi Nguyen, Chang Wook Ahn:
Entropy-based efficiency enhancement techniques for evolutionary algorithms. 100-120 - Francesco Buccafurri, Filippo Furfaro, Domenico Saccà:
A probabilistic framework for estimating the accuracy of aggregate range queries evaluated over histograms. 121-150 - Hyeonseung Im, Sungwoo Park:
Group skyline computation. 151-169 - Ren-Der Lin, Chao-Tsun Chang:
A compact covering method to exploit embedding capacity for matrix encoding. 170-181 - Elmano Ramalho Cavalcanti, Marco Aurélio Spohn:
On improving temporal and spatial mobility metrics for wireless ad hoc networks. 182-197 - Fethi Ferjani, Samir Elloumi, Ali Jaoua, Sadok Ben Yahia, Sahar Ahmad Ismail, Sheikha Ravan:
Formal context coverage based on isolated labels: An efficient solution for text feature extraction. 198-214 - Zhimiao Tao, Jiuping Xu:
A class of rough multiple objective programming and its application to solid transportation problem. 215-235 - Rui Zhang, Cheng Wu:
Bottleneck machine identification method based on constraint transformation for job shop scheduling with genetic algorithm. 236-252 - Chieh-Feng Chiang, Guo-Huang Hsu, Lun-Min Shih, Jimmy J. M. Tan:
Diagnosability of star graphs with missing edges. 253-259 - Dongye Wang, Mei Lu:
Edge fault tolerance of super edge connectivity for three families of interconnection networks. 260-268 - Xiao Liu, Amol Ghorpade, Y. L. Tu, Wen-Jun Zhang:
A novel approach to probability distribution aggregation. 269-275 - Zengtai Gong, Liangliang Wang:
The Henstock-Stieltjes integral for fuzzy-number-valued functions. 276-297 - K. P. Girish, Sunil Jacob John:
Multiset topologies induced by multiset relations. 298-313 - Jinquan Li, Guannan Deng, Hongxing Li, Wenyi Zeng:
The relationship between similarity measure and entropy of intuitionistic fuzzy sets. 314-321 - Seung-Hyun Seo, Kyu Young Choi, Jung Yeon Hwang, Seungjoo Kim:
Efficient certificateless proxy signature scheme with provable security. 322-337 - Qingkuan Dong, Xiaoping Li, Yanming Liu:
Two extensions of the ring signature scheme of Rivest-Shamir-Taumann. 338-345 - Der-Chyuan Lou, Chen-Hao Hu:
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. 346-358
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.