0950-7051

Knowledge Based Systems (KBS) - Volume 52 论文列表

本期论文列表
Editors, Aims & Scope

Group decision making under hesitant fuzzy environment with application to personnel evaluation

MAR: Maximum Attribute Relative of soft set for clustering attribute selection

A context aware sound classifier applied to prawn feed monitoring and energy disaggregation

Chance-constrained DEA models with random fuzzy inputs and outputs

Hesitant fuzzy multi-attribute decision making based on TOPSIS with incomplete weight information

The extended VIKOR method for multi-attribute group decision making with triangular intuitionistic fuzzy numbers

Trust-based role coordination in task-oriented multiagent systems

Towards semantic comparison of multi-granularity process traces

On the interrelation between Dempster–Shafer Belief Structures and their Belief Cumulative Distribution Functions

Enhancing learning algorithms to support data with short sequence features by automated feature discovery

An entropy-based query expansion approach for learning researchers’ dynamic information needs

Decision making matters: A better way to evaluate trust models

Integrating textual analysis and evidential reasoning for decision making in Engineering design

An opposite direction searching algorithm for calculating the type-1 ordered weighted average

Knowledge-collector agents: Applying intelligent agents in marketing decisions with knowledge management approach

Distributivity equations and Mayor’s aggregation operators

Care more about customers: Unsupervised domain-independent aspect detection for sentiment analysis of customer reviews

Self-advising support vector machine

A fast algorithm for kernel 1-norm support vector machines

A low-cost screening method for the detection of the carotid artery diseases

Evidential classifier for imprecise data based on belief functions

Balancing accuracy, complexity and interpretability in consumer credit decision making: A C-TOPSIS classification approach

Efficient community detection with additive constrains on large networks

Analysis of pattern recognition and dimensionality reduction techniques for odor biometrics

Security similarity based trust in cyber space

A two-stage approach for formulating fuzzy regression models