The SCEAS System
Navigation Menu

Journals in DBLP

Inf. Sci.
2007, volume: 177, number: 23

  1. Paul P. Wang
    Guest Editorial. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5141-5142 [Journal]
  2. Ibrahim Ozkan, I. Burhan Türksen
    Upper and lower values for the level of fuzziness in FCM. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5143-5152 [Journal]
  3. Kemal Kilic, Özge Uncu, I. Burhan Türksen
    Comparison of different strategies of utilizing fuzzy clustering in structure identification. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5153-5162 [Journal]
  4. Asli Çelikyilmaz, I. Burhan Türksen
    Fuzzy functions with support vector machines. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5163-5177 [Journal]
  5. Weiyin Fei
    Optimal consumption and portfolio choice with ambiguity and anticipation. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5178-5190 [Journal]
  6. Feyzan Arikan, Zülal Güngör
    A two-phase approach for multi-objective programming problems with fuzzy coefficients. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5191-5202 [Journal]
  7. Mirza Mohd. Sufyan Beg, Nesar Ahmad
    Web search enhancement by mining user actions. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5203-5218 [Journal]
  8. Rifat Gürcan Özdemir, Günes Gençyilmaz, Tülin Aktin
    The modified fuzzy art and a two-stage clustering approach to cell design. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5219-5236 [Journal]
  9. Yildiray Turhan, Sezai Tokat, Recep Eren
    Statistical and computational intelligence tools for the analyses of warp tension in different back-rest oscillations. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5237-5252 [Journal]
  10. Adem Göleç, Harun Taskin
    Novel methodologies and a comparative study for manufacturing systems performance evaluations. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5253-5274 [Journal]
  11. Challa S. Sastry, Sanjay Rawat, Arun K. Pujari, Ved Prakash Gulati
    Network traffic analysis using singular value decomposition and multiscale transforms. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5275-5291 [Journal]
  12. Christos Riziotis, Athanasios V. Vasilakos
    Computational intelligence in photonics technology and optical networks: A survey and future perspectives. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5292-5315 [Journal]
  13. Jia-Hwa Wu, Chih-Ping Chu
    An exact data dependence testing method for quadratic expressions. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5316-5328 [Journal]
  14. G. Peter Zhang
    A neural network ensemble method with jittered training data for time series forecasting. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5329-5346 [Journal]
  15. Rafael Álvarez, José-Vicente Noguera, Leandro Tortosa, Antonio Zamora
    A mesh optimization algorithm based on neural networks. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5347-5364 [Journal]
  16. Jianmin Ma, Wen-Xiu Zhang, Yee Leung, Xiaoxue Song
    Granular computing and dual Galois connection. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5365-5377 [Journal]
  17. Dongrui Wu, Jerry M. Mendel
    Uncertainty measures for interval type-2 fuzzy sets. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5378-5393 [Journal]
  18. Y. Chalco-Cano, Heriberto Román-Flores, M. Rojas-Medar, O. R. Saavedra, María-Dolores Jiménez-Gamero
    The extension principle and a decomposition of fuzzy sets. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5394-5403 [Journal]
  19. Xiaoxia Huang
    A new perspective for optimal portfolio selection with random fuzzy returns. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5404-5414 [Journal]
  20. Yang-Sae Moon, Jinho Kim
    Efficient moving average transform-based subsequence matching algorithms in time-series databases. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5415-5431 [Journal]
  21. Zuhua Shao
    A provably secure short signature scheme based on discrete logarithms. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5432-5440 [Journal]
  22. Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
    Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5441-5467 [Journal]
  23. Divyesh Shah, Sheng Zhong
    Two methods for privacy preserving data mining with malicious participants. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5468-5483 [Journal]
  24. San-Yih Hwang, Haojun Wang, Jian Tang, Jaideep Srivastava
    A probabilistic approach to modeling and estimating the QoS of web-services-based workflows. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5484-5503 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002