Inside Front Cover - Editorial Board
An identity-based strongly unforgeable signature without random oracles from bilinear pairings
The extension of the Knopp core theorem to the sequences of fuzzy numbers
Certificateless proxy multi-signature
Classification of coverings in the finite approximation spaces
Two parameter-tuned meta-heuristics for a discounted inventory control problem in a fuzzy environment
METSK-HDe: A multiobjective evolutionary algorithm to learn accurate TSK-fuzzy systems in high-dimensional and large-scale regression problems
Oriented edge-selective band-pass filtering
Fusing the line intensity profile and support vector machine for removing reflections in frontal RGB color eye images
Namesake alias mining on the Web and its role towards suspect tracking
Reinforced learning systems based on merged and cumulative knowledge to predict human actions
Trend analysis of categorical data streams with a concept change method
Combining visual features and Growing Neural Gas networks for robotic 3D SLAM
Systematic studies on three-way decisions with interval-valued decision-theoretic rough sets
Testing the performance of teaching–learning based optimization (TLBO) algorithm on combinatorial problems: Flow shop and job shop scheduling cases
An evolutionary membrane algorithm for global numerical optimization problems
Advertiser-centric approach to understand user click behavior in sponsored search
Representation, reasoning and similar matching for detailed topological relations with DTString
A frequent itemset mining algorithm based on the Principle of Inclusion–Exclusion and transaction mapping
Notes on a group-oriented setting’s multisigncryption scheme with threshold designcryption
Reliability analysis and fault tolerance for hypercube multi-computer networks
Cryptanalysis of a key exchange scheme based on block matrices
An evolutionary framework for detecting protein conformation defects
A steganographic method based on tetris games
An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
Quantum state secure transmission in network communications
Ordering based on implications
Why are papers about filters on residuated structures (usually) trivial?