


default search action
Information Sciences, Volume 275
Volume 275, August 2014
- Gang Kou
, Yi Peng, Guoxun Wang:
Evaluation of clustering algorithms for financial risk analysis using MCDM methods. 1-12 - Junhua Zhao, Yan Xu
, Fengji Luo, Zhao Yang Dong
, Yaoyao Peng:
Power system fault diagnosis based on history driven differential evolution and stochastic time domain simulation. 13-29 - Umarani Jayaraman
, Aman Kishore Gupta, Phalguni Gupta:
Boosted geometric hashing based indexing technique for finger-knuckle-print database. 30-44 - Carlos M. Travieso
, Jaime Roberto Ticay-Rivas
, Juan Carlos Briceño, Marcos del Pozo-Baños
, Jesús B. Alonso
:
Hand shape identification on multirange images. 45-56 - Jianhong Chen, Yu Long, Kefei Chen, Jie Guo:
Attribute-based key-insulated signature and its applications. 57-67 - Sungmin Yi, Hyoseok Ryu, Jihoon Son, Yon Dohn Chung:
View field nearest neighbor: A novel type of spatial queries. 68-82 - James N. K. Liu, Yan-Xing Hu, Yu-Lin He:
A set covering based approach to find the reduct of variable precision rough set. 83-100 - Masoud Mahootchi, Hamid R. Tizhoosh, Kumaraswamy Ponnambalam:
Oppositional extension of reinforcement learning techniques. 101-114 - Miguel Ángel Gómez-Villegas, Paloma Main
, Paola Viviani
:
Sensitivity to evidence in Gaussian Bayesian networks using mutual information. 115-126 - Sara Moein, Rajasvaran Logeswaran
:
KGMO: A swarm optimization algorithm based on the kinetic energy of gas molecules. 127-144 - Alireza Khastan
, Juan J. Nieto
, Rosana Rodríguez-López
:
Fuzzy delay differential equations under generalized differentiability. 145-167 - Aleksandar Stamenkovic, Miroslav Ciric
, Jelena Ignjatovic:
Reduction of fuzzy automata by means of fuzzy quasi-orders. 168-198 - Bijan Davvaz:
Construction of n-ary F-polygroups. 199-212 - Yu-Chieh Wu:
A top-down information theoretic word clustering algorithm for phrase recognition. 213-225 - Ji-Bo Wang, Jian-Jun Wang
:
Single machine group scheduling with time dependent processing times and ready times. 226-231 - Francesco Bonchi, Aristides Gionis, Tamir Tassa:
Identity obfuscation in graphs through the information theoretic lens. 232-256 - Jung-Sheng Fu:
Vertex-pancyclicity of augmented cubes with maximal faulty edges. 257-266 - Juan J. Nieto
, Rosana Rodríguez-López
:
Cauchy-Peano theorem for Metric Dynamical Systems. 267-283 - Jung Yeon Hwang, Hyoung Joong Kim, Dong Hoon Lee, Boyeon Song:
An enhanced (t, n) threshold directed signature scheme. 284-292 - Ling Chen, Qiang Yu, Bolun Chen:
Anti-modularity and anti-community detecting in complex networks. 293-313 - C. L. Philip Chen
, Chun-Yang Zhang:
Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. 314-347 - Mu-En Wu, Shih-Ying Chang, Chi-Jen Lu, Hung-Min Sun:
A communication-efficient private matching scheme in Client-Server model. 348-359 - Deli Jia, Caihao Cui
, Siqi Wang:
Propagation properties of acoustic waves inside periodic pipelines. 360-369 - Hua Deng, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer
, Lei Zhang, Jianwei Liu
, Wenchang Shi:
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. 370-384 - Guotao Hui, Huaguang Zhang, Zhenning Wu, Yingchun Wang:
Control synthesis problem for networked linear sampled-data control systems with band-limited channels. 385-399 - Marta R. Costa-jussà
, Jens Grivolla
, Bart Mellebeek, Francesc Benavent, Joan Codina, Rafael E. Banchs:
Using annotations on Mechanical Turk to perform supervised polarity classification of Spanish customer comments. 400-412

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.