


default search action
Information Fusion, Volume 13
Volume 13, Number 1, January 2012
- Belur V. Dasarathy:
Information fusion in the realm of medical applications - A bibliographic glimpse at its growing appeal. 1-9
- Bin Yang, Shutao Li:
Pixel-level image fusion with simultaneous orthogonal matching pursuit. 10-19 - Jesús Maudes
, Juan J. Rodríguez Diez
, César Ignacio García-Osorio
, Nicolás García-Pedrajas:
Random feature weights for decision tree ensemble construction. 20-30 - Meimei Xia, Zeshui Xu
:
Entropy/cross entropy-based group decision making under intuitionistic fuzzy environment. 31-47 - Davy Sannen, Hendrik Van Brussel:
A multilevel information fusion approach for visual quality inspection. 48-59 - Maria Nilsson, Joeri van Laere
, Tarja Susi, Tom Ziemke
:
Information fusion in practice: A distributed cognition perspective on the active role of users. 60-78 - Marco A. Solano, Stephen Ekwaro-Osire
, Murat M. Tanik:
High-Level fusion for intelligence applications using Recombinant Cognition Synthesis. 79-98
Volume 13, Number 2, April 2012
- Belur V. Dasarathy:
A Special Issue on Information Fusion Applications to Human Health and Safety. 101
- Al Ozonoff, Fabio Cuzzolin, Paul Snow:
Special Issue on Information Fusion Applications to Human Health and Safety. 102-104
- David Banks, Gauri Datta, Alan F. Karr, James Lynch, Jarad Niemi
, Francisco Vera
:
Bayesian CAR models for syndromic surveillance on multiple data streams: Theory and practice. 105-116 - Ronald D. Fricker Jr., David Banschbach:
Optimizing biosurveillance systems that use threshold-based event detection methods. 117-128 - Zaruhi R. Mnatsakanyan, Howard S. Burkom
, Mohammad R. Hashemian, Michael A. Coletta:
Distributed information fusion models for regional public health surveillance. 129-136 - Wen Ye, Deanna J. M. Isaman, Jacob Barhak:
Use of secondary data to estimate instantaneous model parameters of diabetic heart disease: Lemonade Method. 137-145 - Bruno Marhic
, Laurent Delahoche, Clément Solau, Anne-Marie Jolly-Desodt, Vincent Ricquebourg:
An evidential approach for detection of abnormal behaviour in the presence of unreliable sensors. 146-160 - Hichem Frigui, Lijun Zhang, Paul D. Gader, Joseph N. Wilson, K. C. Ho, Andres Mendez-Vazquez:
An evaluation of several fusion algorithms for anti-tank landmine detection and discrimination. 161-174
Volume 13, Number 3, July 2012
- Shuyuan Yang, Min Wang, Licheng Jiao
:
Fusion of multispectral and panchromatic images based on support value transform and adaptive principal component analysis. 177-184 - Antigoni Panagiotopoulou, Vassilis Anastassopoulos:
Super-resolution image reconstruction techniques: Trade-offs between the data-fidelity and regularization terms. 185-195 - Jianwen Hu, Shutao Li:
The multiscale directional bilateral filter and its application to multisensor image fusion. 196-206 - Tomasz Woloszynski
, Marek Kurzynski, Pawel Podsiadlo, Gwidon W. Stachowiak:
A measure of competence based on random classification for dynamic ensemble selection. 207-213 - Hugh L. Kennedy
:
Fusion of possibly biased location estimates using Gaussian mixture models. 214-222 - Debiao He
, Jianhua Chen, Jin Hu:
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. 223-230
Volume 13, Number 4, October 2012
- Belur V. Dasarathy:
A Special Issue on information fusion in data privacy. 233
- Elizabeth Durham, Yuan Xue, Murat Kantarcioglu, Bradley A. Malin
:
Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage. 245-259 - Javier Herranz
, Jordi Nin
, Marc Solé:
Kd-trees and the real disclosure risks of large statistical databases. 260-273 - Daniel Abril, Guillermo Navarro-Arribas
, Vicenç Torra
:
Improving record linkage with supervised learning for disclosure risk assessment. 274-284 - Alexandre Viejo
, Qianhong Wu, Josep Domingo-Ferrer
:
Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios. 285-295 - Junbeom Hur, Chanil Park, Seongoun Hwang:
Privacy-preserving identity-based broadcast encryption. 296-303 - Sergio Martínez
, David Sánchez
, Aïda Valls
, Montserrat Batet
:
Privacy protection of textual attributes through a semantic-based masking method. 304-314

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.