0020-0255

Information Sciences (ISCI) - Volume 258 论文列表

本期论文列表
Inside Front Cover - Editorial Board

QAR-CIP-NSGA-II: A new multi-objective evolutionary algorithm to mine quantitative association rules

General framework for localised multi-objective evolutionary algorithms

CAPSO: Centripetal accelerated particle swarm optimization

Integrating the artificial bee colony and bees algorithm to face constrained optimization problems

A discrete gravitational search algorithm for solving combinatorial optimization problems

Hybridising harmony search with a Markov blanket for gene selection problems

Assisting in search heuristics selection through multidimensional supervised classification: A case study on software testing

Adaptive generalized crowding for genetic algorithms

Evolving decision trees with beam search-based initialization and lexicographic multi-objective evaluation

Vector-valued function estimation by grammatical evolution for autonomous robot control

Using Bayesian networks for selecting classifiers in GP ensembles

Corrigendum to ‘Human-inspired model for norm compliance decision making’ [Inform. Sci. 245 (2013) 218–239]

Challenges of computing with words in decision making

A fuzzy envelope for hesitant fuzzy linguistic term set and its application to multicriteria decision making

An ordinal approach to computing with words and the preference–aversion model

Allowing agents to be imprecise: A proposal using multiple linguistic terms

A linguistic multi-criteria decision making approach based on logical reasoning

A new linguistic computational model based on discrete fuzzy numbers for computing with words

A method based on shape-similarity for detecting similar opinions in group decision-making

A linguistic decision making approach to assess the quality of volunteer geographic information for citizen science

Linguistic multi-criteria decision making for energy and environmental corporate policy

Segmentation of color images using a linguistic 2-tuples model

Editorial: Cloud computing service and architecture models

Time-based proxy re-encryption scheme for secure data sharing in a cloud environment

Security and privacy for storage and computation in cloud computing

DocCloud: A document recommender system on cloud computing with plausible deniability

Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications

Behavior modeling and automated verification of Web services

Architecture and protocol for intercloud communication

Optimizing Energy Consumption with Task Consolidation in Clouds