Inside Front Cover - Editorial Board
A functional interpretation of linguistic summaries of data
Ockham’s Razor in memetic computing: Three stage optimal memetic exploration
Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures
Processing generalized k-nearest neighbor queries on a wireless broadcast stream
Inferring gene regulatory networks using a hybrid GA–PSO approach with numerical constraints and network decomposition
Entropy-based efficiency enhancement techniques for evolutionary algorithms
A probabilistic framework for estimating the accuracy of aggregate range queries evaluated over histograms
Group skyline computation
A compact covering method to exploit embedding capacity for matrix encoding
On improving temporal and spatial mobility metrics for wireless ad hoc networks
Formal context coverage based on isolated labels: An efficient solution for text feature extraction
A class of rough multiple objective programming and its application to solid transportation problem
Bottleneck machine identification method based on constraint transformation for job shop scheduling with genetic algorithm
Diagnosability of star graphs with missing edges
Edge fault tolerance of super edge connectivity for three families of interconnection networks
A novel approach to probability distribution aggregation
The Henstock–Stieltjes integral for fuzzy-number-valued functions
Multiset topologies induced by multiset relations
The relationship between similarity measure and entropy of intuitionistic fuzzy sets
Efficient certificateless proxy signature scheme with provable security
Two extensions of the ring signature scheme of Rivest–Shamir–Taumann
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis