default search action
Information Sciences, Volume 271
Volume 271, July 2014
- Zdenko Takác:
Aggregation of fuzzy truth values. 1-13 - Qingjun Luo, Guojun Wang:
Roughness and fuzziness in quantales. 14-30 - Christopher S. Withers, Saralees Nadarajah:
Negentropy as a function of cumulants. 31-44 - Robert Susmaga:
Reducts and constructs in classic and dominance-based rough sets approach. 45-64 - Yong Liu, Wenliang Huang, Yunliang Jiang, Zhiyong Zeng:
Quick attribute reduct algorithm for neighborhood rough set model. 65-81 - Qimei Xiao, Qingguo Li, Lankun Guo:
Rough sets induced by ideals in lattices. 82-92 - Wen Sheng Du, Bao Qing Hu:
Approximate distribution reducts in inconsistent interval-valued ordered decision tables. 93-114 - Paul Poncet:
The idempotent Radon-Nikodym theorem has a converse statement. 115-124 - Huchang Liao, Zeshui Xu, Xiao-Jun Zeng:
Distance and similarity measures for hesitant fuzzy linguistic term sets and their application in multi-criteria decision making. 125-142 - Tao Feng, Ju-Sheng Mi, Shao-Pu Zhang:
Belief functions on general intuitionistic fuzzy information systems. 143-158 - De-Chao Li, Sheng-Ling Geng:
Optimal solution of multi-objective linear programming with inf-→ fuzzy relation equations constraint. 159-178 - Jie Huang, Ting-Zhu Huang, Xi-Le Zhao, Zongben Xu, Xiao-Guang Lv:
Two soft-thresholding based iterative algorithms for image deblurring. 179-195 - Tsung-Han Chang:
Fuzzy VIKOR method: A case study of the hospital service evaluation in Taiwan. 196-212 - Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He:
On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives. 213-223 - Ming Duan, Mohan Yang, Xiaorui Sun, Bo Zhu, Xuejia Lai:
Distinguishing properties and applications of higher order derivatives of Boolean functions. 224-235 - Tung-Yang Ho, Cheng-Kuan Lin, Jimmy J. M. Tan, Lih-Hsing Hsu:
Fault-tolerant hamiltonian connectivity of the WK-recursive networks. 236-245 - Ching-Nung Yang, Yao-Yu Yang:
New extended visual cryptography schemes with clearer shadow images. 246-263
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.