Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICMLC
ICMLC 2003
Generate Citations
Proceedings of the 2003 International Conference on Machine Learning and Cybernetics
Nov. 5 2003 to Nov. 5 2003
Xi'an
Volume:
2
3
3
4
5
Table of Contents
2003 International Conference On Machine Learning And Cybernetics [front matter]
Freely available from IEEE.
pp. 0_1-xxxiv
A multistage support vector machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 1305,1306,1307,1308
by
Xiao-Peng Liu
,
Hong-Jie Xing
,
Xi-Zhao Wang
Content based texture image classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1309,1310,1311,1312,1313
by
Xiao-Qing Shang
,
Guo-Xiang Song
,
Biao Hou
A new method of SAR image segmentation based on fuzzy ART
Full-text access may be available. Sign in or learn about subscription options.
pp. 1314,1315,1316,1317
by
Xiao-Rong Xue
,
Yan-Ning Zhang
,
Rong-Chun Zhao
The design and application of neural network controller based on genetic algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 1318,1319,1320,1321
by
Xue-Mei Sun
,
Chang-Ming Ren
,
Yan-Wei Wu
,
Lu-Qiao Ning
,
Jian-Rong Wang
A method of fingerprint identification based on space invariant transforms and support vector machines
Full-text access may be available. Sign in or learn about subscription options.
pp. 1322,1323,1324,1325,1326,1327
by
Yang He
,
Zong-Ying Ou
,
Hao Guo
Dynamically forecasting timeouts for group membership in WANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1328,1329,1330,1331,1332
by
Yang Jia
,
Ji-Zhou Sun
A load balance service based on probabilistic neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1333,1334,1335,1336
by
Yang Jia
,
Ji-Zhou Sun
ANNIDS: intrusion detection system based on artificial neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1337,1338,1339,1340,1341,1342
by
Yan-Heng Liu
,
Da-Xin Tian
,
Ai-Min Wang
Application of binary neural networks for classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1343,1344,1345,1346,1347,1348
by
Yi Xu
,
N.S. Chaudhari
Sensitivity of Madalines to input and weight perturbations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1349,1350,1351,1352,1353,1354
by
Ying-Feng Wang
,
Xiao-Qin Zeng
,
Li-Xin Han
Center selection for RBF neural network in prediction of nonlinear time series
Full-text access may be available. Sign in or learn about subscription options.
pp. 1355,1356,1357,1358,1359
by
Ying-Hua Lu
,
Chun-Guo Wu
,
Yan-Chun Liang
Design of auto-classifying system and its application in Raman spectroscopy diagnosis of gastric carcinoma
Full-text access may be available. Sign in or learn about subscription options.
pp. 1360,1361,1362,1363
by
Yi-Yong Tan
,
Ai-Guo Shen
,
Jing-Wei Zhang
,
Nan Wu
,
Liang Feng
,
Qiao-Feng Wu
,
Yong Ye
,
Ji-Ming Hu
A method to establish a neural network based on the whole knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 1364,1365,1366,1367,1368,1369
by
Yuan-Zhuo Wang
,
Mei-Sheng Yu
,
Jing Yu
The robust backpropagation training of MLP's: an optimal rapid restart method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1370,1371,1372,1373
by
Yue-Xian Hou
,
Cong-Jin Yu
Sensor-based navigation system using a modified ART-2 network and fuzzy controller for an indoor mobile robot
Full-text access may be available. Sign in or learn about subscription options.
pp. 1374,1375,1376,1377,1378,1379
by
Yu-Hu Cheng
,
Jian-Qiang Yi
,
Dong-Bin Zhao
Information geometry on extendable hierarchical large scale neural network model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1380,1381,1382,1383,1384
by
Yun-Hui Liu
,
Si-Wei Luo
,
Ai-Jun Li
,
Hua Huang
,
Jin-Wei Wen
Research of time series pattern finding based on artificial neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1385,1386,1387,1388
by
Yu-Qing Peng
,
Yu Zhang
,
Hai-Shan Tian
A fault diagnosis method of the main transformer in the power train using compound data fusion method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1389,1390,1391,1392,1393
by
Ze-Ming Fan
,
Li Tong
,
Ding Liu
,
Wen-Sheng Wang
The equivalence between a clause set and a kind of extension multi-layer perceptron
Full-text access may be available. Sign in or learn about subscription options.
pp. 1394,1395,1396,1397,1398,1399
by
Zheng Pei
,
Tian-Ming Huang
,
Ming Qing
,
Ke-Yun Qin
Asymptotic normality of posterior in consistent Bayesian learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1400,1401,1402,1403
by
Zhen-Yu
,
Shi-Min Lin
,
Yu-Chang Lu
Mathematical model of thermocouple characteristic based on neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1404,1405,1406,1407
by
Zhe-Ying Song
,
Chao-Ying Liu
,
Xue-Ling Song
One kind of establishing method for Hopfield neural network model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1408,1409,1410,1411,1412
by
Zhi-Qiang He
,
Rong-Mei Zhang
,
Xiao-Qing Wong
,
Zhi-Qiang Li
A modular neural network based on genetic algorithm for FMS reliability optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1413,1414,1415,1416,1417,1418
by
Zu-Yu He
,
Yu-Qi Han
,
Hua-Wei Wang
,
Hua-Wen Wang
Generalized multilayer granulation and approximations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1419,1420,1421,1422,1423
by
Bao-Xin Xiu
,
Wei-Ming Zhang
,
Shuang Wang
,
Jiu-Yang Tang
A hybrid algorithm for nesting problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1424,1425,1426,1427,1428,1429
by
Bo Li
,
Zhi-Yan Zhao
,
Ju-Dong Li
Study on discretization in rough set based on genetic algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1430,1431,1432,1433,1434
by
Cai-Yun Chen
,
Zhi-Guo Li
,
Sheng-Yong Qiao
,
Shuo-Pin Wen
A comparative study of incomplete and complete information systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1435,1436,1437
by
Chang-Zhong Wang
,
De-Gang Chen
,
E.C.C. Tsang
Ordinal fuzzy sets and rough sets
Full-text access may be available. Sign in or learn about subscription options.
pp. 1438,1439,1440,1441
by
Da-Zhong Liu
,
Xi-Zhao Wang
,
J.W.T. Lee
Some notes on the parameterization reduction of soft sets
Full-text access may be available. Sign in or learn about subscription options.
pp. 1442,1443,1444,1445
by
De-Gang Chen
,
E.C.C. Tsang
,
D.S. Yeung
Induction of decision tree with fuzzy number-valued attribute
Full-text access may be available. Sign in or learn about subscription options.
pp. 1446,1447,1448,1449,1450
by
Dong-Mei Huang
,
Jie Yang
,
Xi-Zhao Wang
,
Ming-Hu Ha
Local convergence of general genetic algorithms using dynamical method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1451,1452,1453,1454,1455,1456
by
Dong-Wei Guo
,
Zhong-Ming Zhang
Analysis on the fuzzy filter in fuzzy decision trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 1457,1458,1459,1460,1461,1462
by
Fa-Chao Li
,
Juan Su
,
Xi-Zhao Wang
Designing neural networks ensembles based on the evolutionary programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1463,1464,1465,1466
by
Fang Liu
,
Ren-Hou Li
,
Shi-Chun Mei
Errors of fuzzy reasoning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1467,1468,1469,1470,1471,1472
by
Guo-Sheng Cheng
,
Yu-Xi Fu
,
Jian-Wen Luo
Nonlinear blind separation algorithm using multiobjective evolutionary algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1473,1474,1475,1476
by
Hai-Lin Liu
,
Sheng-Li Xie
,
Shen-Shan Qiu
Design and implementation of examination and approval system based on CBR
Full-text access may be available. Sign in or learn about subscription options.
pp. 1477,1478,1479,1480,1481
by
Hao Lin
,
Guo-Ji Zhang
,
Shi-Jin Li
,
Yong-Can Qiu
Factorization of Gaussian mixtures densities for hidden Markov models
Full-text access may be available. Sign in or learn about subscription options.
pp. 1482,1483,1484,1485,1486,1487
by
Hao-Zheng Li
,
Zhi-Qiang Liu
,
Xiang-Hua Zhu
An analysis of temporal and spatial relations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1488,1489,1490
by
He Hu
,
Da-You Liu
,
Sheng-Sheng Wang
The application of ant colony system to image textute classification [textute read texture]
Full-text access may be available. Sign in or learn about subscription options.
pp. 1491,1492,1493,1494,1495
by
Hong Zheng
,
Zhaobao Zheng
,
Yong Xiang
Using mutual information for selecting continuous-valued attribute in decision tree learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1496,1497,1498,1499
by
Hua Li
,
Xi-Zhao Wang
,
Yong Li
An algorithm based on improved Bayesian inference network model for prediction protein secondary structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 1500,1501,1502,1503,1504
by
Guo-Hui Yang
,
Chun-Guang Zhou
,
Cheng-Quan Hu
,
Zhe-Zhou Yu
An uncertain information fusion method for fault diagnosis of complex system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1505,1506,1507,1508,1509,1510
by
Hua-Wei Wang
,
Jing-Lun Zhou
,
Zu-Yu He
,
Ji-Chang Sha
Some properties of fuzzy logic with similarity
Full-text access may be available. Sign in or learn about subscription options.
pp. 1511,1512,1513,1514,1515
by
Jia-Bing Wang
,
Wei-Qing Wang
,
Zheng-Quan Xu
,
Neng-Chao Wang
Knowledge markup and XML-based distributed automated reasoning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1516,1517,1518,1519,1520,1521,1522
by
Zheng-Quan Xu
,
Jia-Bing Wang
,
Neng-Chao Wang
A novel approach to computing rule confidence in rough sets theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 1523,1524,1525,1526
by
Jia-Cheng Wang
,
Hua-Ping Dai
,
You-Xian Sun
Methods for meta-information maintenance in rough set theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 1527,1528,1529,1530,1531,1532
by
Jian Su
,
Ji Gao
A new reduction algorithm - difference-similitude matrix
Full-text access may be available. Sign in or learn about subscription options.
pp. 1533,1534,1535,1536,1537
by
Hao Jiang
,
Pu-Liu Yan
,
De-Lin Xia
A CBR model for knowledge sharing in supply chain based on generalized rough set
Full-text access may be available. Sign in or learn about subscription options.
pp. 1538,1539,1540,1541,1542
by
Jiang-Hong Man
,
Qing-Li Da
Study on integrated monitor and control of the apparatus quality based on the multi-parameter analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1543,1544,1545,1546,1547,1548
by
Jie Zhao
,
Jiao-Min Liu
,
Sheng chang
,
Yan Zhao
,
Xiang Wang
A lazy algorithm for decision tree induction based on importance of attributes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1549,1550,1551,1552
by
Jin-Feng Wang
,
Xi-Zhao Wang
Application of an EACS algorithm to obstacle detour routing in VLSI physical design
Full-text access may be available. Sign in or learn about subscription options.
pp. 1553,1554,1555,1556,1557,1558
by
Jing Li
,
He-Zhou Liu
,
Bo Yang
,
Jue-Bang Yu
,
Ning Xu
,
Chun-Hui Li
A fast approach to building rough data model through G-K fuzzy clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1559,1560,1561,1562,1563,1564
by
Jin-Jie Huang
,
Shi-Yong Li
,
Xiao-Jun Ban
Fuzzy accumulation points and convergence of molecular net
Full-text access may be available. Sign in or learn about subscription options.
pp. 1565,1566,1567,1568
by
Ji-Shu Cheng
A fuzzy matching method of fuzzy decision trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 1569,1570,1571,1572,1573
by
J.W.T. Lee
,
Juan Sun
,
Lan-Zhen Yang
A rough set approach to selecting attributes for ordinal prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1574,1575,1576,1577
by
J.W.T. Lee
,
D.S. Yeung
,
E.C.C. Tsang
Uncertainty reasoning based on filter of lattice implication algebra
Full-text access may be available. Sign in or learn about subscription options.
pp. 1578,1579,1580,1581,1582
by
Jun Ma
,
Tian-Rui Li
,
Ya Gao
Particle swarm optimization for traveling salesman problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 1583,1584,1585
by
Kang-Ping Wang
,
Lan Huang
,
Chun-Guang Zhou
,
Wei Pang
A genetic algorithm for the unbounded knapsack problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 1586,1587,1588,1589,1590
by
Ken-Li Li
,
Guang-Ming Dai
,
Qing-Hua Li
Diversity-based case base maintenance
Full-text access may be available. Sign in or learn about subscription options.
pp. 1591,1592,1593,1594,1595,1596
by
Lan-Zhen Yang
,
Ming-Hu Ha
,
Xi-Zhao Wang
An approach to constraint inductive logic programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1597,1598,1599,1600,1601
by
Lei Zheng
,
Dong Jia
,
Chun-Nian Liu
Off-line signature verification incorporating the prior model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1602,1603,1604,1605,1606
by
Liang Wan
,
Zhou-Chen Lin
,
Rong-Chun Zhao
Hypothesis-test based simulated annealing for stochastic flow shop scheduling
Full-text access may be available. Sign in or learn about subscription options.
pp. 1607,1608,1609,1610,1611,1612
by
Liang Zhang
,
Ling Wang
,
Fang Tang
Principles and algorithms of semantic analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1613,1614,1615,1616,1617,1618
by
Liang-Yan Li
,
Zhong-Shi He
,
Yong Yi
A heuristic algorithm for reduction of knowledge in probabilistic decision table based on fuzzy entropy
Full-text access may be available. Sign in or learn about subscription options.
pp. 1619,1620,1621,1622,1623
by
Li-Li Wei
,
Wen-Xiu Zhang
Adjusting backup-length automatically in reinforcement learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1624,1625,1626,1627,1628,1629
by
M. Ohta
,
I. Noda
ISITL: intrusion signatures in augmented interval temporal logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1630,1631,1632,1633,1634,1635
by
Ming-Guang Ouyang
,
Feng Pan
,
Yun-Tao Zhang
Using regressive graph as a novel paradigm in plan recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1636,1637,1638,1639,1640,1641
by
Ming-Hao Yin
,
Wen-Xiang Gu
,
Ri-Xian Liu
,
Xiao-Long Liu
Research on the relationship between 4-intersection and classifying invariant based on the simple regions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1642,1643,1644,1645,1646,1647
by
Ping Guo
,
Huang-Fu Tao
,
Ya Luo
Particle swarm optimization based hybrid intelligent algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1648,1649,1650
by
Qian-Lizhang
,
Xing Li
,
Quang-Anh Tran
An overview of genetic algorithms applied to control engineering problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1651,1652,1653,1654,1655,1656
by
Qing Wang
,
P. Spronck
,
R. Tracht
A further study on simplification of decision tables
Full-text access may be available. Sign in or learn about subscription options.
pp. 1657,1658,1659,1660,1661
by
Qun-Feng Zhang
,
Xi-Zhao Wang
,
Jing-Hong Wang
A further discussion on the saddle point programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1662,1663,1664,1665,1666
by
Rui-Sheng Wang
,
Ming-Hu Ha
,
Xi-Zhao Wang
Research and application of structure learning algorithm for Bayesian networks from distributed data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1667,1668,1669,1670,1671
by
Shao-Zhong Zhang
,
Hua Ding
,
Xiu-Kun Wang
,
Hong-Bo Liu
Combining representations of topology and distance
Full-text access may be available. Sign in or learn about subscription options.
pp. 1672,1673,1674,1675,1676
by
Sheng-Sheng Wang
,
Da-You Liu
,
Yan Zheng
,
Xin-Ying Wang
,
Zhao-Huizhang
Spatio-temporal representation for multi-dimensional occlusion relation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1677,1678,1679,1680,1681
by
Sheng-Sheng Wang
,
Da-You Liu
,
Xiao-Dong Liu
,
Bo Yang
Neural network resolution on horn clause set
Full-text access may be available. Sign in or learn about subscription options.
pp. 1682,1683,1684,1685,1686
by
Shi-Fen Xia
,
Ming Qing
,
Tian-Min Huang
,
Yang Xu
A fuzzy model of rough sets
Full-text access may be available. Sign in or learn about subscription options.
pp. 1687,1688,1689,1690,1691
by
Su-Yun Zhao
,
Xi-Zhao Wang
Matrix computation for dynamic modification of rough set information system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1692,1693,1694,1695,1696,1697
by
Tian-Le Tan
,
Ping Li
,
Zhi-Huan Song
An approach to attribute generalization in incomplete information systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1698,1699,1700,1701,1702,1703
by
Tian-Rui Li
,
Jun Ma
,
Yang Xu
,
Ning Yang
An application of multipopulation genetic algorithm for optimization of adversaries' tactics and strategies in battlefield simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1704,1705,1706,1707
by
Wei Zhang
,
D. Ma
,
Hong-Jun Zhang
,
B.-L. Wang
,
Yun-Tao Chen
Research on evaluating method of projects for complex system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1708,1709,1710,1711,1712
by
Wei-Xiang Xu
,
Xu-Min Liu
A new rough set approach to knowledge discovery in incomplete information systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1713,1714,1715,1716,1717,1718
by
Wei-Zhi Wu
,
Ju-Sheng Mi
,
Wen-Xiu Zhang
An approach for the use of negative examples for grammar learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1719,1720,1721,1722
by
Xiang-Rui Wang
,
N.S. Chaudhari
A method of constructing fuzzy neural network based on rough set theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 1723,1724,1725,1726,1727,1728
by
Xian-Ming Huang
,
Ji-Kai Yi
,
Yan-Hong Zhang
A new application of rough set to ECG recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1729,1730,1731,1732,1733,1734
by
Xian-Ming Huang
,
Yan-Hong Zhang
An improved genetic algorithm with variable population-size and a PSO-GA based hybrid evolutionary algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1735,1736,1737,1738,1739,1740
by
X.H. Shi
,
L.M. Wan
,
H.P. Lee
,
X.W. Yang
,
L.M. Wang
,
Y.C. Liang
A synthetic computational-intelligence-based method and its application in identifying water-flooded zones in oil field
Full-text access may be available. Sign in or learn about subscription options.
pp. 1741,1742,1743,1744,1745
by
X.H. Shi
,
S.M. Wang
,
X.G. Sui
,
Y.C. Gao
,
H.P. Lee
,
Y.C. Liang
Sparse model selection and parameter identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1746,1747,1748,1749,1750,1751
by
Xiao-Jun Duan
,
Zheng-Ming Wang
Improving the ability of function approximation of neural network using patulous cross section method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1752,1753,1754,1755,1756
by
Xiao-Jun Tang
,
Jun-Hua Liu
Data clustering algorithm based on digital search tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 1757,1758,1759,1760,1761
by
Xiao-Heng Zhou
,
Hong-Bin Wang
,
Dong-Ru Zhou
,
Bo Meng
Closure operators in lattice-valued propositional logics
Full-text access may be available. Sign in or learn about subscription options.
pp. 1762,1763,1764,1765,1766,1767
by
Xue-Fang Wang
,
Ming Qing
,
Yang Xu
,
Ke-Yun Qin
Case-base maintenance using soft computing techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 1768,1769,1770,1771,1772,1773
by
Yan Li
,
S.C.-K. Shiu
,
S.K. Pal
,
J.N.-K. Liu
A genetic algorithm for solving flow shop scheduling problems with parallel machine and special procedure constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 1774,1775,1776,1777,1778,1779
by
Yi Wu
,
Min Liu
,
Cheng Wu
A new method for edge detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1780,1781,1782,1783,1784
by
Ying Li
,
Yan-Ning Zhang
,
Rong-Chun Zhao
,
Li-Cheng Jiao
A genetic algorithm for tasks scheduling in parallel multiprocessor systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1785,1786,1787,1788,1789,1790
by
Yi-Wen Zhong
,
Jian-Gang Yang
Using BP-network to construct fuzzy decision tree with composite attributes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1791,1792,1793,1794,1795
by
Yong Li
,
Xi-Zhong Wang
,
Qiang Hua
Combining evidence and its application in synthesis decision
Full-text access may be available. Sign in or learn about subscription options.
pp. 1796,1797,1798,1799,1800,1801
by
Yong-Jie Wang
,
Ying Qiao
,
Zheng Pei
On the convergence analysis and parameter selection in particle swarm optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1802,1803,1804,1805,1806,1807
by
Yong-Ling Zheng
,
Long-Hua Ma
,
Li-Yan Zhang
,
Ji-Xin Qian
An adaptive QoS route selection algorithm based on genetic approach in combination with neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1808,1809,1810,1811,1812,1813
by
You-Wei Yuan
,
Han-Hui Zhan
,
La-Mei Yan
Showing 100 out of 130
Load More
Load All