default search action
Information Sciences, Volume 515
Volume 515, April 2020
- Hyun Ahn, Kwanghoon Pio Kim:
Formal approach for discovering work transference networks from workflow logs. 1-25 - Jasashwi Mandal, Adrijit Goswami, Junwei Wang, Manoj Kumar Tiwari:
Optimization of vehicle speed for batches to minimize supply chain cost under uncertain demand. 26-43 - Pengpeng Chen, Hailong Sun, Yili Fang, Xudong Liu:
CONAN: A framework for detecting and handling collusion in crowdsourcing. 44-63 - Leonardo F. S. Scabini, Lucas Correia Ribas, Odemir M. Bruno:
Spatio-spectral networks for color-texture analysis. 64-79 - Yanshan Xiao, Xiaozhou Yang, Bo Liu:
A new self-paced method for multiple instance boosting learning. 80-90 - Lianyong Qi, Xuyun Zhang, Shancang Li, Shaohua Wan, Yiping Wen, Wenwen Gong:
Spatial-temporal data-driven service recommendation with privacy-preservation. 91-102 - Shuqi Xu, Qian-Ming Zhang, Linyuan Lü, Manuel Sebastian Mariani:
Recommending investors for new startups by integrating network diffusion and investors' domain preference. 103-115 - Antonín Dvorák, Michal Holcapek:
New construction of an ordinal sum of t-norms and t-conorms on bounded lattices. 116-131 - Yaliang Zhao, Samwel K. Tarus, Laurence T. Yang, Jiayu Sun, Yunfei Ge, Jinke Wang:
Privacy-preserving clustering for big data in cyber-physical-social systems: Survey and perspectives. 132-155 - Lucas Correia Ribas, Jeaneth Machicao, Odemir M. Bruno:
Life-Like Network Automata descriptor based on binary patterns for network classification. 156-168 - Lu Zhang, Zhu Sun, Jie Zhang, Horst Kloeden, Felix Klanner:
Modeling hierarchical category transition for next POI recommendation with uncertain check-ins. 169-190 - Nestor Tsafack, Jacques Kengne, Bassem Abd-El-Atty, Abdullah M. Iliyasu, Kaoru Hirota, Ahmed A. Abd El-Latif:
Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. 191-217 - Shaoqing Wang, Cuiping Li, Zheng Wang, Hong Chen, Kai Zheng:
BPF++: A Unified Factorization model for predicting retweet behaviors. 218-232 - Xiaobin Zhu, Zhuangzi Li, Xianbo Li, Shanshan Li, Feng Dai:
Attention-aware perceptual enhancement nets for low-resolution image classification. 233-247 - Yi Hua, Feng Chen, Shuwei Deng, Shukai Duan, Lidan Wang:
Secure distributed estimation against false data injection attack. 248-262 - Xiaonan Li, Qianqian Sun, Hongmei Chen, Huangjian Yi:
Three-way decision on two universes. 263-279 - Guangxia Xu, Linghao Zhang, Chuang Ma, Yanbing Liu:
A mixed attributes oriented dynamic SOM fuzzy cluster algorithm for mobile user classification. 280-293 - Patryk Koziel, Malgorzata Sulkowska:
Uniform random posets. 294-301 - Tin C. Truong, Hai V. Duong, Bac Le, Philippe Fournier-Viger:
EHAUSM: An efficient algorithm for high average utility sequence mining. 302-323 - Zhiru Cao, Yugang Niu, Hamid Reza Karimi:
Sliding mode control of automotive electronic valve system under weighted try-once-discard protocol. 324-340 - Yiqi Chen, Tieyun Qian:
Relation constrained attributed network embedding. 341-351 - Yi-Gang Li, Guang-Hong Yang:
Worst-case ϵ-stealthy false data injection attacks in cyber-physical systems. 352-364 - Shouyong Jiang, Hongru Li, Jinglei Guo, Mingjun Zhong, Shengxiang Yang, Marcus Kaiser, Natalio Krasnogor:
AREA: An adaptive reference-set based evolutionary algorithm for multiobjective optimisation. 365-387 - Mahboob Qaosar, Asif Zaman, Md. Anisuzzaman Siddique, Chen Li, Yasuhiko Morimoto:
Secure k-skyband computation framework in distributed multi-party databases. 388-403 - Xuan Chen:
Security-preserving social data sharing methods in modern social big knowledge systems. 404-416
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.