History

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 570 total

Handling context in lexicon-based sentiment analysis. (English)
Greco, Salvatore (ed.) et al., Advances in computational intelligence. 14th international conference on information processing and management of uncertainty in knowledge-based systems, IPMU 2012, Catania, Italy, July 9‒13, 2012. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-31714-9/pbk; 978-3-642-31715-6/ebook). Communications in Computer and Information Science 298, 245-254 (2012).
1
Balancing interpretability against accuracy in fuzzy modeling by means of ACO. (English)
Greco, Salvatore (ed.) et al., Advances in computational intelligence. 14th international conference on information processing and management of uncertainty in knowledge-based systems, IPMU 2012, Catania, Italy, July 9‒13, 2012. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-31708-8/pbk; 978-3-642-31709-5/ebook). Communications in Computer and Information Science 297, 71-80 (2012).
2
Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. (English)
Int. J. Found. Comput. Sci. 23, No. 2, 543-553 (2012).
3
On the key schedule strength of PRESENT. (English)
Garcia-Alfaro, Joaquin (ed.) et al., Data privacy management and autonomous spontaneus security. 6th international workshop, DPM 2011, and 4th international workshop, SETOP 2011, Leuven, Belgium, September 15‒16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28878-4/pbk). Lecture Notes in Computer Science 7122, 253-263 (2012).
4
A complex discrete warm standby system with loss of units. (English)
Eur. J. Oper. Res. 218, No. 2, 456-469 (2012).
5
Improving an interior-point algorithm for multicommodity flows by quadratic regularizations. (English)
Networks 59, No. 1, 117-131 (2012).
6
A distributed system for learning programming on-line (English)
Computers & Education 58, No. 1, 1-10 (2012).
7
Using the analytic center in the feasibility pump. (English)
Oper. Res. Lett. 39, No. 5, 310-317 (2011).
8
Assessment of uncertainty in the projective tree test using an ANFIS learning approach. (English)
Batyrshin, Ildar (ed.) et al., Advances in soft computing. 10th Mexican international conference on artificial intelligence, MICAI 2011, Puebla, Mexico, November 26‒December 4, 2011. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-25329-4/pbk). Lecture Notes in Computer Science 7095. Lecture Notes in Artificial Intelligence, 46-57 (2011).
9
Algorithm for a general discrete $k$-out-of-$n$: $G$ system subject to several types of failure with an indefinite number of repairpersons. (English)
Eur. J. Oper. Res. 211, No. 1, 97-111 (2011).
10
Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol. (English)
Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20‒24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 427-442 (2011).
11
Eigen-model projections for protected on-line signature recognition. (English)
Vielhauer, Claus (ed.) et al., Biometrics and ID management. COST 2101 European workshop, BioID 2011, Brandenburg (Havel), Germany, March 8‒10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19529-7/pbk). Lecture Notes in Computer Science 6583, 49-60 (2011).
12
A heuristic block coordinate descent approach for controlled tabular adjustment. (English)
Comput. Oper. Res. 38, No. 12, 1826-1835 (2011).
13
An adaptive neural network-based method for tile replacement in a web map cache. (English)
Murgante, Beniamino (ed.) et al., Computational science and its applications ‒ ICCSA 2011. International conference, Santander, Spain, June 20‒23, 2011. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-21927-6/pbk). Lecture Notes in Computer Science 6782, 76-91 (2011).
14
Flaws on RFID grouping-proofs. Guidelines for future sound protocols. (English)
J. Netw. Comput. Appl. 34, No. 3, 833-845 (2011).
15
Cryptanalysis of an EPC class-1 generation-2 standard compliant authentication protocol (English)
Eng. Appl. of AI 24, No. 6, 1061-1069 (2011).
16
An expert fuzzy system for predicting object collisions. Its application for avoiding pedestrian accidents (English)
Expert Syst. Appl. 38, No. 1, 486-494 (2011).
17
Intelligent surveillance system with integration of heterogeneous information for intrusion detection (English)
Expert Syst. Appl. 38, No. 9, 11182-11192 (2011).
18
Corrigendum to "an expert fuzzy system for predicting object collisions. Its application for avoiding pedestrian accidents" [Expert systems with applications 38 (2011) 486-494] (English)
Expert Syst. Appl. 38, No. 8, 10718 (2011).
19
Cryptanalysis of cho {\it et al.}’s protocol, A hash-based mutual authentication protocol for RFID systems (English)
IACR Cryptology ePrint Archive 2011, 331 (2011).
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 570 total