default search action
Information Sciences, Volume 269
Volume 269, June 2014
- Jeonil Kang, DaeHun Nyang, KyungHee Lee:
Two-factor face authentication using matrix permutation transformation and a user password. 1-20 - Sara Tedmori, Nijad Al-Najdawi:
Image cryptographic algorithm based on the Haar wavelet transform. 21-34 - Moumita Roy, Susmita Ghosh, Ashish Ghosh:
A novel approach for change detection of remotely sensed images using semi-supervised multiple classifier system. 35-47 - Shuyuan Yang, Yuan Lv, Yu Ren, Lixia Yang, Licheng Jiao:
Unsupervised images segmentation via incremental dictionary learning based sparse representation. 48-59 - Muwei Jian, Kin-Man Lam, Junyu Dong:
Illumination-insensitive texture discrimination based on illumination compensation and enhancement. 60-72 - Francisco R. Feito, Juan Ruiz de Miras, Marilina Rivero, Rafael Jesús Segura, Juan Carlos Torres:
From theoretical graphic objects to real free-form solids. 73-93 - Sasan Golabi, Mohammad Sadegh Helfroush, Habibollah Danyali, Mehri Owjimehr:
Robust watermarking against geometric attacks using partial calculation of radial moments and interval phase modulation. 94-105 - Chia-Hung Yeh, Chih-Yang Lin, Kahlil Muchtar, Li-Wei Kang:
Real-time background modeling based on a multi-level texture description. 106-127 - Yiwei Jiang, Jueliang Hu, Longcheng Liu, Yuqing Zhu, T. C. E. Cheng:
Competitive ratios for preemptive and non-preemptive online scheduling with nondecreasing concave machine cost. 128-141 - Wei-Chang Yeh, Peng-Jen Lai, Wen-Chiung Lee, Mei-Chi Chuang:
Parallel-machine scheduling to minimize makespan with fuzzy processing times and learning effects. 142-158 - Kuo-Liang Chung, Wei-Jen Yang, Wei-Ning Yang:
Reversible data hiding for depth maps using the depth no-synthesis-error model. 159-175 - Billy Peralta, Alvaro Soto:
Embedded local feature selection within mixture of experts. 176-187 - Seyedali Mirjalili, Seyed Mohammad Mirjalili, Andrew Lewis:
Let a biogeography-based optimizer train your Multi-Layer Perceptron. 188-209 - Muhammad Aslam, Nasrullah Khan, Muhammad Azam, Chi-Hyuck Jun:
Designing of a new monitoring t-chart using repetitive sampling. 210-216 - Gajaruban Kandavanam, Rammohan Mallipeddi, Dmitri Botvich, Sasitharan Balasubramaniam, Ponnuthurai N. Suganthan:
Achieving high robustness and performance in QoS-aware route planning for IPTV networks. 217-237 - Jun Li, Xiaolin Zheng, Song-Tao Chen, William Wei Song, Deren Chen:
An efficient and reliable approach for quality-of-service-aware service composition. 238-254 - Marta Fort, Joan Antoni Sellarès:
Solving the k-influence region problem with the GPU. 255-269 - Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. 270-285 - Weidong Chen, Zaixin Lu, Weili Wu:
Dominating problems in swapped networks. 286-299 - Huanqing Wang, Bing Chen, Xiaoping Liu, Kefu Liu, Chong Lin:
Adaptive neural tracking control for stochastic nonlinear strict-feedback systems with unknown input saturation. 300-315 - Yanling Wei, Jianbin Qiu, Hamid Reza Karimi, Mao Wang:
Filtering design for two-dimensional Markovian jump systems with state-delays and deficient mode information. 316-331 - Yu-Long Wang, Qing-Long Han:
Modelling and controller design for discrete-time networked control systems with limited channels and data drift. 332-348 - Shuli Sun, Jing Ma:
Linear estimation for networked control systems with random transmission delays and packet dropouts. 349-365 - Olivier A. Heubo-Kwegna:
Fuzzy semistar operations of finite character on integral domains. 366-377 - Ning Lin Zhou, Bao Qing Hu:
Rough sets based on complete completely distributive lattice. 378-387 - Shaojing Fu, Chao Li, Longjiang Qu:
A recursive construction of highly nonlinear resilient vectorial functions. 388-396
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.