


default search action
Information Sciences, Volume 270
Volume 270, June 2014
- Antonio Gracia Berná, Santiago González, Victor Robles
, Ernestina Menasalvas Ruiz
:
A methodology to compare Dimensionality Reduction algorithms in terms of loss of quality. 1-27 - Yang-Sae Moon, Byung Suk Lee:
Safe MBR-transformation in similar sequence matching. 28-40 - Francesca Carmagnola, Francesco Osborne
, Ilaria Torre
:
User data discovery and aggregation: The CS-UDD algorithm. 41-72 - Yu Sang, Heng Qi, Keqiu Li, Yingwei Jin, Deqin Yan, Shusheng Gao:
An effective discretization method for disposing high-dimensional data. 73-91 - Yong-Ping Zhao, Kang-Kang Wang, Jie Liu, Ramón Huerta:
Incremental kernel minimum squared error (KMSE). 92-111 - Weifeng Gao, San-Yang Liu, Lingling Huang:
Enhancing artificial bee colony algorithm using more information-based search equations. 112-133 - Tuan D. Pham:
Pattern recognition by active visual information processing in birds. 134-142 - Fevrier Valdez
, Patricia Melin
, Oscar Castillo
:
Modular Neural Networks architecture optimization with a new nature inspired method using a fuzzy combination of Particle Swarm Optimization and Genetic Algorithms. 143-153 - Cheng-Hung Chen
, Sheng-Yen Yang:
Neural fuzzy inference systems with knowledge-based cultural differential evolution for nonlinear system control. 154-171 - Malgorzata Przybyla-Kasperek
, Alicja Wakulicz-Deja:
Global decision-making system with dynamically generated clusters. 172-191 - Eugene Rex Jalao, Teresa Wu, Dan L. Shunk:
A stochastic AHP decision making methodology for imprecise preferences. 192-203 - Hsuan-Ming Feng, Kuo-Lung Liao:
Hybrid evolutionary fuzzy learning scheme in the applications of traveling salesman problems. 204-225 - Qianhong Zhang, Lihui Yang, Daixi Liao:
On first order fuzzy Ricatti difference equation. 226-236 - Boutheina A. Fessi, Salah Benabdallah
, Noureddine Boudriga, Mohamed Hamdi:
A multi-attribute decision model for intrusion response system. 237-254 - Yuming Xu, Kenli Li, Jingtong Hu
, Keqin Li:
A genetic algorithm for task scheduling on heterogeneous computing systems using multiple priority queues. 255-287 - Massimiliano Zanin
, Alexander N. Pisarchik
:
Gray code permutation algorithm for high-dimensional data encryption. 288-297

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.