0020-0255

Information Sciences (ISCI) - Volume 276 论文列表

本期论文列表
Inside Front Cover - Editorial Board

An identity-based strongly unforgeable signature without random oracles from bilinear pairings

The extension of the Knopp core theorem to the sequences of fuzzy numbers

Certificateless proxy multi-signature

Classification of coverings in the finite approximation spaces

Two parameter-tuned meta-heuristics for a discounted inventory control problem in a fuzzy environment

METSK-HDe: A multiobjective evolutionary algorithm to learn accurate TSK-fuzzy systems in high-dimensional and large-scale regression problems

Oriented edge-selective band-pass filtering

Fusing the line intensity profile and support vector machine for removing reflections in frontal RGB color eye images

Namesake alias mining on the Web and its role towards suspect tracking

Reinforced learning systems based on merged and cumulative knowledge to predict human actions

Trend analysis of categorical data streams with a concept change method

Combining visual features and Growing Neural Gas networks for robotic 3D SLAM

Systematic studies on three-way decisions with interval-valued decision-theoretic rough sets

Testing the performance of teaching–learning based optimization (TLBO) algorithm on combinatorial problems: Flow shop and job shop scheduling cases

An evolutionary membrane algorithm for global numerical optimization problems

Advertiser-centric approach to understand user click behavior in sponsored search

Representation, reasoning and similar matching for detailed topological relations with DTString

A frequent itemset mining algorithm based on the Principle of Inclusion–Exclusion and transaction mapping

Notes on a group-oriented setting’s multisigncryption scheme with threshold designcryption

Reliability analysis and fault tolerance for hypercube multi-computer networks

Cryptanalysis of a key exchange scheme based on block matrices

An evolutionary framework for detecting protein conformation defects

A steganographic method based on tetris games

An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption

Quantum state secure transmission in network communications

Ordering based on implications

Why are papers about filters on residuated structures (usually) trivial?