


default search action
Fundamenta Informaticae, Volume 98
Volume 98, Number 1, 2010
- Jesús Alcalá-Fdez
, Nicolò Flugy Papè, Andrea Bonarini
, Francisco Herrera
:
Analysis of the Effectiveness of the Genetic Algorithms based on Extraction of Association Rules. 1-14 - Kun-Che Lu, Don-Lin Yang
:
Scalable Clustering for Mining Local-Correlated Clusters in High Dimensions and Large Datasets. 15-32 - Wei-Hsun Lee, Shian-Shyong Tseng, Ching-Hung Wang, Shen-Lung Tung:
Discovering the Radio Signal Coverage Hole and Weak Coverage Area in Mobile Network by Spatiotemporal Data Mining on Location-Based Services. 33-47 - Koen W. De Bock
, Dirk Van den Poel
:
Predicting Website Audience Demographics forWeb Advertising Targeting Using Multi-Website Clickstream Data. 49-70 - Jinsong Leng, Tzung-Pei Hong:
Mining Outliers in Correlated Subspaces for High Dimensional Data Sets. 71-86 - Oliver Kramer:
Covariance Matrix Self-Adaptation and Kernel Regression - Perspectives of Evolutionary Optimization in Kernel Machines. 87-106 - Shusaku Tsumoto, Shoji Hirano:
Risk Mining in Medicine: Application of Data Mining to Medical Risk Management. 107-121 - Akinori Abe, Yukio Ohsawa, Hiromi Itoh Ozaku, Kaoru Sagara, Noriaki Kuwahara, Kiyoshi Kogure:
Communication Error Determination System for Multi-layered or Chained Situations. 123-142
Volume 98, Numbers 2-3, 2010
- Marcella Anselmo, Dora Giammarresi, Maria Madonia:
Deterministic and Unambiguous Families within Recognizable Two-dimensional Languages. 143-166 - Qinghua Hu, Pengfei Zhu, Jinfu Liu, Yongbin Yang, Daren Yu:
Feature Selection via Maximizing Fuzzy Dependency. 167-181 - Bala Kalyanasundaram, Mahe Velauthapillai:
Learning Behaviors of Functions. 183-198 - Dariusz Malyszko, Jaroslaw Stepaniuk
:
Adaptive Rough Entropy Clustering Algorithms in Image Segmentation. 199-231 - Zoran H. Peric
, Milan R. Dincic
, Marko D. Petkovic:
Design of a Hybrid Quantizer with Variable Length Code. 233-256 - Piyu Tsai:
Tree Structure Based Data Hiding for Progressive Transmission Images. 257-275 - Xu An Wang
, Xiaoyuan Yang:
On the Insecurity of an Identity Based Proxy Re-encryption Scheme. 277-281 - Joachim Wehler:
Free-Choice Petri Nets without Frozen Tokens, and Bipolar Synchronization Systems. 283-320 - Cheng-Hsing Yang, Shiuh-Jeng Wang, Chi-Yao Weng:
Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations. 321-336
Volume 98, Number 4, 2010
- Mikolaj Bojanczyk, Damian Niwinski, Alexander Rabinovich
, Adam Radziwonczyk-Syta, Michal Skrzypczak:
On the Borel Complexity of MSO Definable Sets of Branches. 337-349 - Anuj Dawar
, Erich Grädel:
Properties of Almost All Graphs and Generalized Quantifiers. 351-372 - Christian Hoffmann:
A Most General Edge Elimination Polynomial - Thickening of Edges. 373-378 - Michael Kaminski, Tony Tan:
A Note on Two-pebble Automata Over Infinite Alphabets. 379-390 - Klaus Meer:
Tree-width in Algebraic Complexity. 391-409

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.