Volume 176,
Number 1,
6 January 2006
- Trieu-Kien Truong, Pei-Ding Chen, Lung-Jen Wang, Y. W. Chang, Irving S. Reed:
Fast, prime factor, discrete Fourier transform algorithms over GF(2m) for 8 leq m leq 10.
1-26
- Asok K. Nanda, Prasanta Paul:
Some results on generalized residual entropy.
27-47
- Siwoo Byun, In-Kwon Lee:
Proxy agent based replication control model for wireless internet.
48-66
- Chun-Jen Lee, Jason S. Chang, Jyh-Shing Roger Jang:
Extraction of transliteration pairs from parallel corpora using a statistical transliteration model.
67-90
Volume 176,
Number 2,
20 January 2006
Erratum
- Sang-Eon Han:
Erratum to "Non-product property of the digital fundamental group" [Informat. Sci. 171(1-3) (2005) 73-91].
215-216
Volume 176,
Number 3,
6 February 2006
Volume 176,
Number 4,
22 February 2006
Recent advancements of fuzzy sets:
theory and practice
- Francisco Herrera, Enrique Herrera-Viedma, Luis Martínez, Paul P. Wang:
Recent advancements of fuzzy sets: Theory and practice.
349-351
- José Luis García-Lapresta:
A general class of simple majority decision rules based on linguistic opinions.
352-365
- Gloria Bordogna, Sergio Chiesa, Davide Geneletti:
Linguistic modelling of imperfect spatial information as a basis for simplifying spatial analysis.
366-389
- Gabriella Pasi, Ronald R. Yager:
Modeling the concept of majority opinion in group decision making.
390-414
- Slawomir Zadrozny, Janusz Kacprzyk:
Computing with words for text processing: An approach to the text categorization.
415-437
- Nicholas J. Randon, Jonathan Lawry:
Classification and query evaluation using modelling with words.
438-464
- Vicenç Torra, Josep Domingo-Ferrer, Josep Maria Mateo-Sanz, Michael Ng:
Regression for ordinal variables without underlying continuous variables.
465-474
Volume 176,
Number 5,
6 March 2006
- Marco Ronchetti, Giancarlo Succi, Witold Pedrycz, Barbara Russo:
Early estimation of software size in object-oriented environments a case study in a CMM level 3 software firm.
475-489
- Ilias Sakellariou, Ioannis P. Vlahavas, Ivan Futó, Zoltán Pásztor, János Szeredi:
Communicating sequential processes for distributed constraint satisfaction.
490-521
- Ben-Jye Chang, Ren-Hung Hwang:
Modeling and analyzing the performance of adaptive hierarchical networks.
522-549
- Dong-Her Shih, Hsin-Yi Huang, David C. Yen:
A secure reverse Vickrey auction scheme with bid privacy.
550-564
- Ashok Samal, James R. Brandle, Dongsheng Zhang:
Texture as the basis for individual tree identification.
565-576
- Ronald R. Yager:
An extension of the naive Bayesian classifier.
577-588
- Michiro Kondo:
On the structure of generalized rough sets.
589-600
Volume 176,
Number 6,
March 2006
- Matt Duckham, Jenny Lingham, Keith T. Mason, Michael F. Worboys:
Qualitative reasoning about consistency in geographic information.
601-627
- Jun-Rong Chen, Yong-Feng Lin, Jason Jen-Yen Chen:
Component-based Web page management environment.
628-639
- Hui-Hua Tsai, Iuan-Yuan Lu:
The evaluation of service quality using generalized Choquet integral.
640-663
- Vishwanath P. Baligar, Lalit M. Patnaik, G. R. Nagabhushana:
Low complexity, and high fidelity image compression using fixed threshold method.
664-675
- Ming-Chien Yang, Tseng-Kuei Li, Jimmy J. M. Tan, Lih-Hsing Hsu:
On embedding cycles into faulty twisted cubes.
676-690
- Athanasios Tsakonas:
A comparison of classification accuracy of four genetic programming-evolved intelligent structures.
691-724
- Qi-Mei Xiao, Zhen-Liang Zhang:
Rough prime ideals and rough fuzzy prime ideals in semigroups.
725-733
- Salih Aytar, Serpil Pehlivan:
Statistically monotonic and statistically bounded sequences of fuzzy numbers.
734-744
- S. E. Abbas, Halis Aygün:
Intuitionistic fuzzy semiregularization spaces.
745-757
Volume 176,
Number 7,
April 2006
Volume 176,
Number 8,
April 2006
- F. Van den Bergh, Andries Petrus Engelbrecht:
A study of particle swarm optimization particle trajectories.
937-971
- Petr Musílek, Adriel Lau, Marek Reformat, Loren Wyard-Scott:
Immune programming.
972-1002
- Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia:
Looking into the seeds of time: Discovering temporal patterns in large transaction sets.
1003-1031
- Hyunseung Choo, Young Jae Lee, Seong-Moo Yoo:
DIG: Degree of inter-reference gap for a dynamic buffer cache management.
1032-1044
- Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers:
Standards and verification for fair-exchange and atomicity in e-commerce transactions.
1045-1066
- Tahsin A. Yanar, Zuhal Akyürek:
The enhancement of the cell-based GIS analyses with fuzzy processing capabilities.
1067-1085
- Sang Yeol Joo, Yun Kyong Kim, Joong Sung Kwon:
Strong convergence for weighted sums of fuzzy random sets.
1086-1099
Volume 176,
Number 9,
May 2006
Softcomputing meets agents
- Vincenzo Loia:
Soft computing meets agents.
1101-1102
- Carmine Grelle, Lucio Ippolito, Vincenzo Loia, Pierluigi Siano:
Agent-based architecture for designing hybrid control systems.
1103-1130
- Chang-Shing Lee, Chun-Chih Jiang, Tung-Cheng Hsieh:
A genetic fuzzy agent using ontology model for meeting scheduling system.
1131-1155
- Tieju Ma, Yoshiteru Nakamori, Wei Huang:
An agent-based approach for predictions based on multi-dimensional complex data.
1156-1174
- Shahram Rahimi, Johan Bjursell, Marcin Paprzycki, Maria Cobb, Dia Ali:
Performance evaluation of SDIAGENT, a multi-agent system for distributed fuzzy geospatial data conflation.
1175-1189
- Mihaela Ulieru, Maja Hadzic, Elizabeth Chang:
Soft computing agents for e-Health in application to the research and control of unknown diseases.
1190-1214
Regular articles
Volume 176,
Number 10,
May 2006
- Claus-Peter Schnorr:
Enhancing the security of perfect blind DL-signatures.
1305-1320
- Enrico Nardelli, Guido Proietti:
Efficient unbalanced merge-sort.
1321-1337
- Hui-Feng Huang, Chin-Chen Chang:
A novel efficient (t, n) threshold proxy signature scheme.
1338-1349
- Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia:
A fragile watermarking scheme for detecting malicious modifications of database relations.
1350-1378
- Wai-Tak Wong, Frank Y. Shih, Te-Feng Su:
Thinning algorithms based on quadtree and octree representations.
1379-1394
- Bruno Apolloni, Simone Bassis, Sabrina Gaito, Dario Malchiodi, Italo Zoppis:
Controlling the losing probability in a monotone game.
1395-1416
- Gopal Lakhani:
Reducing coding redundancy in LZW.
1417-1434
- Yair Neuman:
A theory of meaning.
1435-1449
- Bilâl Altay, Feyzi Basar, Mohammad Mursaleen:
On the Euler sequence spaces which include the spaces lp and linfinity I.
1450-1462
Volume 176,
Number 11,
June 2006
- Enric Trillas:
On the use of words and fuzzy sets, .
1463-1487
- Mustafa Demirci:
The generalized associative law in vague groups and its applications - II.
1488-1530
- Andrea Mesiarová:
H-transformation of t-norms.
1531-1545
- Hisao Hirakawa, Katsushi Inoue, Akira Ito:
Three-way two-dimensional alternating finite automata with rotated inputs.
1546-1569
- Kevin Burns:
Bayesian inference in disputed authorship: A case study of cognitive errors and a new system for decision support.
1570-1589
- Yongchuan Tang, Jiacheng Zheng:
Generalized Jeffrey's rule of conditioning and evidence combining rule for a priori probabilistic knowledge in conditional evidence theory.
1590-1606
- Jie Lu, Chenggen Shi, Guangquan Zhang:
On bilevel multi-follower decision making: General framework and solutions.
1607-1627
Volume 176,
Number 12,
June 2006
- Stephan Rein, Martin Reisslein:
Identifying the classical music composition of an unknown performance with wavelet dispersion vector and neural nets.
1629-1655
- Luis Rueda, B. John Oommen:
A fast and efficient nearly-optimal adaptive Fano coding scheme.
1656-1683
- Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Enforcing the security of a time-bound hierarchical key assignment scheme.
1684-1694
- Yun Ji Na, Choon Seong Leem, Il Seok Ko:
ACASH: an adaptive web caching method based on the heterogeneity of web object and reference characteristics.
1695-1711
- Verayuth Lertnattee, Thanaruk Theeramunkong:
Class normalization in centroid-based text categorization.
1712-1738
- Wu Jigang, Thambipillai Srikanthan:
An efficient algorithm for the collapsing knapsack problem.
1739-1751
- Ching-Yao Wang, Shian-Shyong Tseng, Tzung-Pei Hong:
Flexible online association rule mining based on multidimensional pattern relations.
1752-1780
- Rasit Köker:
Design and performance of an intelligent predictive controller for a six-degree-of-freedom robot using the Elman network.
1781-1799
Volume 176,
Number 13,
July 2006
- Nikos I. Karacapilidis, Alexis Lazanas, George Megalokonomos, Pavlos Moraitis:
On the development of a web-based system for transportation services.
1801-1828
- Degang Chen, Wenxiu Zhang, Daniel S. Yeung, Eric C. C. Tsang:
Rough approximations on a complete completely distributive lattice with applications to generalized rough sets.
1829-1848
- David A. Pelta, Alejandro Sancho-Royo, Carlos Cruz, José L. Verdegay:
Using memory and fuzzy rules in a co-operative multi-thread strategy for optimization.
1849-1868
- Zheng Pei, Germano Resconi, Ariën J. van der Wal, Keyun Qin, Yang Xu:
Interpreting and extracting fuzzy decision rules from fuzzy information systems and their inference.
1869-1897
- Eduardo R. Hruschka, Ricardo J. G. B. Campello, Leandro Nunes de Castro:
Evolving clusters in gene-expression data.
1898-1927
- Jae-Gil Lee, Kyu-Young Whang:
Secure query processing against encrypted XML data using Query-Aware Decryption.
1928-1947
Volume 176,
Number 14,
July 2006
Streaming Data Mining
- Jianping Zhang, Huan Liu, Paul P. Wang:
Some current issues of streaming data mining.
1949-1951
- Sanghamitra Bandyopadhyay, Chris Giannella, Ujjwal Maulik, Hillol Kargupta, Kun Liu, Souptik Datta:
Clustering distributed data streams in peer-to-peer environments.
1952-1985
- Jeffrey Xu Yu, Zhihong Chong, Hongjun Lu, Zhenjie Zhang, Aoying Zhou:
A false negative approach to mining frequent itemsets from high speed transactional data streams.
1986-2015
- David Littau, Daniel Boley:
Streaming data reduction using low-memory factored representations.
2016-2041
- Jun Yan, Benyu Zhang, Shuicheng Yan, Ning Liu, Qiang Yang, QianSheng Cheng, Hua Li, Zheng Chen, Wei-Ying Ma:
A scalable supervised algorithm for dimensionality reduction on streaming data.
2042-2065
Regular papers
Volume 176,
Number 15,
August 2006
- Jangmin O, Jongwoo Lee, Jae Won Lee, Byoung-Tak Zhang:
Adaptive stock trading with dynamic asset allocation using reinforcement learning.
2121-2147
- Okbin Lee, Seongjin Yoo, Byungjeon Park, Ilyong Chung:
The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design.
2148-2160
- Sing Kiong Nguang, Peng Shi:
Robust Hinfinity output feedback control design for fuzzy dynamic systems with quadratic D stability constraints: An LMI approach.
2161-2191
- Izhar Ahmad:
Symmetric duality for multiobjective fractional variational problems with generalized invexity.
2192-2207
- Zhihui Li, Ping Li, Yongming Li:
The relationships among several types of fuzzy automata.
2208-2226
- Nihan Kesim Cicekli, Ilyas Cicekli:
Formalizing the specification and execution of workflows using the event calculus.
2227-2267
- Mikail Et, Hifsi Altinok, Rifat Çolak:
On lambda-statistical convergence of difference sequences of fuzzy numbers.
2268-2278
Volume 176,
Number 16,
August 2006
Volume 176,
Number 17,
September 2006
Volume 176,
Number 18,
September 2006
- Jun Kiniwa:
Request-based token passing for self-stabilizing mutual exclusion.
2603-2623
- Anna Formica:
Ontology-based concept similarity in Formal Concept Analysis.
2624-2641
- Jianwen Chen, Yan Zhang:
A rule based knowledge transaction model for mobile environments.
2642-2672
- Elena Tsiporkova, Veselka Boeva:
Multi-step ranking of alternatives in a multi-criteria and multi-expert decision making environment.
2673-2697
- Xiaoxia Huang:
Credibility-based chance-constrained integer programming models for capital budgeting with fuzzy parameters.
2698-2712
- Anna Pankowska, Maciej Wygralak:
General IF-sets with triangular norms and their applications to group decision making.
2713-2754
- Yasemin Claire Erensal, Temel Öncan, Murat Levent Demircan:
Determining key capabilities in technology management using fuzzy analytic hierarchy process: A case study of Turkey.
2755-2770
Volume 176,
Number 19,
October 2006
Volume 176,
Number 20,
October 2006
- Ronald R. Yager:
OWA trees and their role in security modeling using attack trees.
2933-2959
- Hui Li, Scott Dick:
A similarity measure for fuzzy rulebases based on linguistic gradients.
2960-2987
- Hajime Nobuhara, Barnabás Bede, Kaoru Hirota:
On various eigen fuzzy sets and their application to image reconstruction.
2988-3010
- Funda Karaçal:
On the direct decomposability of strong negations and S-implication operators on product lattices.
3011-3025
- Ewa Straszecka:
Combining uncertainty and imprecision in models of medical diagnosis.
3026-3059
- Jun Zhang, Yu Zhou, Fanyuan Ma, Gu Dawu, Yingcai Bai:
An extension of secure group communication using key graph.
3060-3078
- Young Bae Jun, Seok-Zun Song:
Generalized fuzzy interior ideals in semigroups.
3079-3093
- I. Ahmad, Z. Husain:
Second order (F, alpha, rho, d)-convexity and duality in multiobjective programming.
3094-3103
Volume 176,
Number 21,
November 2006
- Danilo Ardagna, Chiara Francalanci, Marco Trubian:
A multi-model algorithm for the cost-oriented design of Internet-based systems.
3105-3131
- Youngjoo Cho, Ilyong Chung:
A parallel routing algorithm on circulant networks employing the Hamiltonian circuit latin square.
3132-3142
- Rza Bashirov, Valentino Crespi:
Analyzing permutation capability of multistage interconnection networks with colored Petri nets.
3143-3165
- Taigun Lee, Sung-Kee Park, Mignon Park:
An effective method for detecting facial features and face in human-robot interaction.
3166-3189
- Humberto Bustince Sola, Maria Victoria Mohedano Salillas, Edurne Barrenechea Tartas, Miguel Pagola:
Definition and construction of fuzzy DI-subsethood measures.
3190-3231
- Ping Li, Yongming Li:
Algebraic properties of LA-languages.
3232-3255
- Yingjie Yang, Robert John:
Roughness bounds in rough set operations.
3256-3267
Volume 176,
Number 22,
November 2006
- Csilla Farkas, Alexander Brodsky, Sushil Jajodia:
Unauthorized inferences in semistructured databases.
3269-3299
- Jongik Kim:
Advanced structural joins using element distribution.
3300-3331
- Jianxi Fan, Xiaohua Jia, Xiaola Lin:
Complete path embeddings in crossed cubes.
3332-3346
- Jin-Wook Baek, Heon Young Yeom:
A timed mobile agent planning approach for distributed information retrieval in dynamic network environments.
3347-3378
- Lei Qian, H. John Caulfield:
What can we do with a linear optical logic gate?
3379-3392
- Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang:
New image steganographic methods using run-length approach.
3393-3408
- Nen-Chung Wang, Tzung-Shi Chen:
Task migration in all-port wormhole-routed 2D mesh multicomputers.
3409-3425
- Chien-Yuan Chen:
An efficient parity detection technique using the two-moduli set {2h - 1, 2h + 1}.
3426-3430
Volume 176,
Number 23,
December 2006
Volume 176,
Number 24,
December 2006
- Guanling Lee, Wenpo Yang, Jia-Min Lee:
A parallel algorithm for mining multiple partial periodic patterns.
3591-3609
- Yoshiteru Nakamori, Mina Ryoke:
Treating fuzziness in subjective evaluation data.
3610-3644
- Daniel Gómez, Javier Montero, Javier Yáñez:
A coloring fuzzy graph approach for image classification.
3645-3657
- Bijan Davvaz, M. Mahdavipour:
Roughness in modules.
3658-3674
- Niovi Kehayopulu, Michael Tsingelis:
Regular ordered semigroups in terms of fuzzy subsets.
3675-3693
- Gesthimani Stefanidou, Garyfalos Papaschinopoulos:
The periodic nature of the positive solutions of a nonlinear fuzzy max-difference equation.
3694-3710
- Andrea Janes, Marco Scotto, Witold Pedrycz, Barbara Russo, Milorad Stefanovic, Giancarlo Succi:
Identification of defect-prone classes in telecommunication software systems using design metrics.
3711-3734
- Khaled Salah:
On the accuracy of two analytical models for evaluating the performance of Gigabit Ethernet hosts.
3735-3756
Copyright © Fri Mar 12 17:29:13 2010
by Michael Ley (ley@uni-trier.de)