skip to main content
Skip header Section
A Mathematical Theory of CommunicationOctober 1963
Publisher:
  • University of Illinois Press
  • 54 E. Gregory Dr. Champaign, IL
  • United States
ISBN:978-0-252-72548-7
Published:01 October 1963
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Xiong P, Tegegn M, Sarin J, Pal S and Rubin J (2024). It Is All about Data: A Survey on the Effects of Data on Adversarial Robustness, ACM Computing Surveys, 56:7, (1-41), Online publication date: 31-Jul-2024.
  2. Harangi V, Niu X and Bai B (2024). Conditional Graph Entropy as an Alternating Minimization Problem, IEEE Transactions on Information Theory, 70:2, (904-919), Online publication date: 1-Feb-2024.
  3. Vasilyev K, Krasheninnikov V and Tashlinskii A (2023). Research Overview on Statistical Image Analysis Conducted at Ulyanovsk State Technical University, Pattern Recognition and Image Analysis, 33:4, (1624-1656), Online publication date: 1-Dec-2023.
  4. Cross I (2023). Music in the digital age: commodity, community, communion, AI & Society, 38:6, (2387-2400), Online publication date: 1-Dec-2023.
  5. Xu J, Tung T, Ai B, Chen W, Sun Y and Deniz Gündüz D (2023). Deep Joint Source-Channel Coding for Semantic Communications, IEEE Communications Magazine, 61:11, (42-48), Online publication date: 1-Nov-2023.
  6. Zheng G, Ni Q, Navaie K, Pervaiz H and Zarakovitis C (2023). A Distributed Learning Architecture for Semantic Communication in Autonomous Driving Networks for Task Offloading, IEEE Communications Magazine, 61:11, (64-68), Online publication date: 1-Nov-2023.
  7. Zhang X, Sun M, Liu J and Li X Improve the Diversity and Novelty for Open-Ended Neural Text Generation via Inverse Probability Weighting Natural Language Processing and Chinese Computing, (774-785)
  8. Yao Y and Yao J Cognitive and Social Decision Making: Three-Way Decision Perspectives Rough Sets, (259-269)
  9. Lei S and Gratch J (2023). Emotional Expressivity is a Reliable Signal of Surprise, IEEE Transactions on Affective Computing, 14:4, (2913-2924), Online publication date: 1-Oct-2023.
  10. Shi Y, Lian L, Shi Y, Wang Z, Zhou Y, Fu L, Bai L, Zhang J and Zhang W (2023). Machine Learning for Large-Scale Optimization in 6G Wireless Networks, IEEE Communications Surveys & Tutorials, 25:4, (2088-2132), Online publication date: 1-Oct-2023.
  11. Halvorsrud R, Sanchez O, Boletsis C and Skjuve M (2023). Involving users in the development of a modeling language for customer journeys, Software and Systems Modeling (SoSyM), 22:5, (1589-1618), Online publication date: 1-Oct-2023.
  12. Watson R, Plangger K, Pitt L and Tiwana A (2023). A Theory of Information Compression, Information Systems Research, 34:3, (1089-1108), Online publication date: 1-Sep-2023.
  13. Weng Z, Qin Z, Tao X, Pan C, Liu G and Li G (2023). Deep Learning Enabled Semantic Communications With Speech Recognition and Synthesis, IEEE Transactions on Wireless Communications, 22:9, (6227-6240), Online publication date: 1-Sep-2023.
  14. Seo S, Park J, Ko S, Choi J, Bennis M and Kim S (2023). Toward Semantic Communication Protocols: A Probabilistic Logic Perspective, IEEE Journal on Selected Areas in Communications, 41:8, (2670-2686), Online publication date: 1-Aug-2023.
  15. He G, Feng M, Zhang Y, Liu G, Dai Y and Jiang T (2023). Deep Reinforcement Learning Based Task-Oriented Communication in Multi-Agent Systems, IEEE Wireless Communications, 30:3, (112-119), Online publication date: 1-Jun-2023.
  16. Yu X, He J, Li Q, Zhang B, Wang X, Yang L, Ye T, Wang Q and Huo Z (2023). LIAD: A Method for Extending the Effective Time of 3-D TLC NAND Flash Hard Decision, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 42:5, (1705-1717), Online publication date: 1-May-2023.
  17. Maatouk A, Assaad M and Ephremides A (2023). The Age of Incorrect Information: An Enabler of Semantics-Empowered Communication, IEEE Transactions on Wireless Communications, 22:4, (2621-2635), Online publication date: 1-Apr-2023.
  18. Reed C, Tan H and Jones L (2023). Haptic Communication of Language, IEEE Transactions on Haptics, 16:2, (134-153), Online publication date: 1-Apr-2023.
  19. Wang C, You X, Gao X, Zhu X, Li Z, Zhang C, Wang H, Huang Y, Chen Y, Haas H, Thompson J, Larsson E, Renzo M, Tong W, Zhu P, Shen X, Poor H and Hanzo L (2023). On the Road to 6G: Visions, Requirements, Key Technologies, and Testbeds, IEEE Communications Surveys & Tutorials, 25:2, (905-974), Online publication date: 1-Apr-2023.
  20. Bobadilla J, Ortega F, Gutiérrez A and González-Prieto Á (2023). Deep variational models for collaborative filtering-based recommender systems, Neural Computing and Applications, 35:10, (7817-7831), Online publication date: 1-Apr-2023.
  21. Martínez-Comeche J and Ruthven I (2023). Informational features of WhatsApp in everyday life in Madrid, Journal of Information Science, 49:1, (122-132), Online publication date: 1-Feb-2023.
  22. Emadi Kouchak M, Safaei F and Reshadi M (2023). Graph entropies-graph energies indices for quantifying network structural irregularity, The Journal of Supercomputing, 79:2, (1705-1749), Online publication date: 1-Feb-2023.
  23. Zou L, Ren S, Sun Y and Yang X (2023). Attribute reduction algorithm of neighborhood rough set based on supervised granulation and its application, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 27:3, (1565-1582), Online publication date: 1-Feb-2023.
  24. ACM
    Qi S, Zhang Y, Wang C, Zhou J and Cao X (2021). A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation, ACM Computing Surveys, 55:1, (1-35), Online publication date: 31-Jan-2023.
  25. ACM
    Mena J, Pujol O and Vitrià J (2021). A Survey on Uncertainty Estimation in Deep Learning Classification Systems from a Bayesian Perspective, ACM Computing Surveys, 54:9, (1-35), Online publication date: 31-Dec-2022.
  26. Reddy S, Levine S and Dragan A First contact Proceedings of the 36th International Conference on Neural Information Processing Systems, (31542-31556)
  27. Sitorus F and Brito-Parada P (2022). The selection of renewable energy technologies using a hybrid subjective and objective multiple criteria decision making method, Expert Systems with Applications: An International Journal, 206:C, Online publication date: 15-Nov-2022.
  28. Yao Y Three-way Decision, Three-World Conception, and Explainable AI Rough Sets, (39-53)
  29. Sipple J and Youssef A A General-Purpose Method for Applying Explainable AI for Anomaly Detection Foundations of Intelligent Systems, (162-174)
  30. Regler B, Scheffler M and Ghiringhelli L (2022). TCMI: a non-parametric mutual-dependence estimator for multivariate continuous distributions, Data Mining and Knowledge Discovery, 36:5, (1815-1864), Online publication date: 1-Sep-2022.
  31. Pokhrel S (2022). Learning from data streams for automation and orchestration of 6G industrial IoT: toward a semantic communication framework, Neural Computing and Applications, 34:18, (15197-15206), Online publication date: 1-Sep-2022.
  32. Araneda C (2022). Jaime Garretón’s cybernetic theory of the city and its system: a missing link in contemporary urban theory, AI & Society, 37:3, (1179-1189), Online publication date: 1-Sep-2022.
  33. Espejo R (2022). Cybersyn, big data, variety engineering and governance, AI & Society, 37:3, (1163-1177), Online publication date: 1-Sep-2022.
  34. Wolfson N (2022). After the “new aesthetic”: a short history of the cybernetic turn in Brazil, AI & Society, 37:3, (1059-1069), Online publication date: 1-Sep-2022.
  35. Oswald D (2022). Cybernetics, operations research and information theory at the Ulm School of Design and its influence on Latin America, AI & Society, 37:3, (1045-1057), Online publication date: 1-Sep-2022.
  36. Leopold C (2022). On the relationships between philosophy of technology, cybernetics, and aesthetics with their impacts on Latin America, AI & Society, 37:3, (1027-1044), Online publication date: 1-Sep-2022.
  37. Nieto Larrain I, Mariátegui J and Maulén de los Reyes D (2022). Back and forth: cybernetics interrelations and how it spread in Latin America, AI & Society, 37:3, (1001-1012), Online publication date: 1-Sep-2022.
  38. Tong W and Li G (2022). Nine Challenges in Artificial Intelligence and Wireless Communications for 6G, IEEE Wireless Communications, 29:4, (140-145), Online publication date: 1-Aug-2022.
  39. Koçak Ö and Puranam P (2022). Separated by a Common Language, Management Science, 68:7, (5287-5310), Online publication date: 1-Jul-2022.
  40. Pelegrina G, Duarte L, Grabisch M and Romano J (2022). Dealing with redundancies among criteria in multicriteria decision making through independent component analysis, Computers and Industrial Engineering, 169:C, Online publication date: 1-Jul-2022.
  41. Paramanik A, Sarkar S and Sarkar B (2022). OSWMI, Computers and Industrial Engineering, 169:C, Online publication date: 1-Jul-2022.
  42. Rupesh Kumar S and Bharathi B (2022). Generative and Discriminative Modelling of Linear Energy Sub-bands for Spoof Detection in Speaker Verification Systems, Circuits, Systems, and Signal Processing, 41:7, (3811-3831), Online publication date: 1-Jul-2022.
  43. Arunganesh K, Selvaraju V, Sivakumaran N, Kumaravel S and Karthick P Analysis of Corticomuscular Coherence between Motor Cortex Region and Tibialis Anterior Muscle Using Symbolic Transfer Entropy 2022 IEEE International Symposium on Medical Measurements and Applications (MeMeA), (1-6)
  44. Tounkara T and Daidj N (2022). Designing a Serious Game for Scrum Learning, International Journal of Knowledge-Based Organizations, 12:2, (1-22), Online publication date: 1-Apr-2022.
  45. Sambhwani S, Bharadwaj A, Drewes C, Hamidouche K, Naguib A, Nickisch D, Roessel S, Sauer M, Schoinas Y, Tabet T, Vallath S and Yu Y (2022). Transitioning to 6G: Part 2-Systems and Network Technology Areas, IEEE Wireless Communications, 29:2, (6-8), Online publication date: 1-Apr-2022.
  46. Mehta R (2022). Performance Analysis of Fuzzy Logic-Based Digital Library Architecture Using n-ary Huffman Coding, Regression and Fairness Measures, SN Computer Science, 3:2, Online publication date: 1-Mar-2022.
  47. de Fremery W and Buckland M (2022). Copy theory, Journal of the Association for Information Science and Technology, 73:3, (407-418), Online publication date: 7-Feb-2022.
  48. Maltseva S, Kornilov V, Barakhnin V, Gorbunov A and Song Y (2022). Self-Organization in Network Sociotechnical Systems, Complexity, 2022, Online publication date: 1-Jan-2022.
  49. Liu N, Ma C, Xu M, Ge Y, Gan D and G T (2022). Physiological Status Prediction Based on a Novel Hybrid Intelligent Scheme, Computational Intelligence and Neuroscience, 2022, Online publication date: 1-Jan-2022.
  50. Letaief K, Shi Y, Lu J and Lu J (2022). Edge Artificial Intelligence for 6G: Vision, Enabling Technologies, and Applications, IEEE Journal on Selected Areas in Communications, 40:1, (5-36), Online publication date: 1-Jan-2022.
  51. Yadav P, Kumar S and Kumar R (2022). A Review of Transmission Rate over Wireless Fading Channels: Classifications, Applications, and Challenges, Wireless Personal Communications: An International Journal, 122:2, (1709-1765), Online publication date: 1-Jan-2022.
  52. Weng Z, Qin Z and Li G Semantic Communications for Speech Recognition 2021 IEEE Global Communications Conference (GLOBECOM), (1-6)
  53. ACM
    Pibiri G and Venturini R (2020). Techniques for Inverted Index Compression, ACM Computing Surveys, 53:6, (1-36), Online publication date: 30-Nov-2021.
  54. Sheneamer A (2022). Multiple Similarity-based Features Blending for Detecting Code Clones using Consensus-Driven Classification, Expert Systems with Applications: An International Journal, 183:C, Online publication date: 30-Nov-2021.
  55. Got A, Moussaoui A and Zouache D (2022). Hybrid filter-wrapper feature selection using whale optimization algorithm, Expert Systems with Applications: An International Journal, 183:C, Online publication date: 30-Nov-2021.
  56. Lindén D, Cinelli M, Spada M, Becker W, Gasser P and Burgherr P (2021). A framework based on statistical analysis and stakeholders’ preferences to inform weighting in composite indicators, Environmental Modelling & Software, 145:C, Online publication date: 1-Nov-2021.
  57. ACM
    Kiesel J, Meyer L, Potthast M and Stein B (2021). Meta-Information in Conversational Search, ACM Transactions on Information Systems, 39:4, (1-44), Online publication date: 31-Oct-2021.
  58. ACM
    Tiku S, Kale P and Pasricha S (2021). QuickLoc: Adaptive Deep-Learning for Fast Indoor Localization with Mobile Devices, ACM Transactions on Cyber-Physical Systems, 5:4, (1-30), Online publication date: 31-Oct-2021.
  59. Yang Y, Hou X and Ren H (2021). Accurate and efficient image segmentation and bias correction model based on entropy function and level sets, Information Sciences: an International Journal, 577:C, (638-662), Online publication date: 1-Oct-2021.
  60. Carrasco J, Marmo G and Tempesta P (2021). New computable entanglement monotones from formal group theory, Quantum Information Processing, 20:10, Online publication date: 1-Oct-2021.
  61. ACM
    Li Y Construction and Practice of Blended Learning Mode of English Writing Course Based on Information Technology 2021 4th International Conference on Information Systems and Computer Aided Education, (1032-1037)
  62. Dix A Qualitative–Quantitative Reasoning: Thinking Informally About Formal Things Theoretical Aspects of Computing – ICTAC 2021, (18-35)
  63. Yao Y (2021). The geometry of three-way decision, Applied Intelligence, 51:9, (6298-6325), Online publication date: 1-Sep-2021.
  64. Carabantes M (2021). The Internet as a Heideggerian paradigm of modern technology: an argument against mythinformation, AI & Society, 36:3, (695-703), Online publication date: 1-Sep-2021.
  65. ACM
    Petke J, Clark D and Langdon W Software robustness: a survey, a theory, and prospects Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (1475-1478)
  66. ACM
    Kang W, Cheng D, Yao T, Yi X, Chen T, Hong L and Chi E Learning to Embed Categorical Features without Embedding Tables for Recommendation Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, (840-850)
  67. Sarwar M, Akram M and Liu P (2021). An integrated rough ELECTRE II approach for risk evaluation and effects analysis in automatic manufacturing process, Artificial Intelligence Review, 54:6, (4449-4481), Online publication date: 1-Aug-2021.
  68. ACM
    Aka O, Burke K, Bauerle A, Greer C and Mitchell M Measuring Model Biases in the Absence of Ground Truth Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society, (327-335)
  69. ACM
    Fernandes N, McIver A and Morgan C The laplace mechanism has optimal utility for differential privacy over continuous queries Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science, (1-12)
  70. ACM
    Al Batayneh A, Qasaimeh M and Al-Qassas R (2021). A Scoring System for Information Security Governance Framework Using Deep Learning Algorithms: A Case Study on the Banking Sector, Journal of Data and Information Quality, 13:2, (1-34), Online publication date: 25-Jun-2021.
  71. ACM
    Teixeira D, Viana A, Almeida J and Alvim M (2021). The Impact of Stationarity, Regularity, and Context on the Predictability of Individual Human Mobility, ACM Transactions on Spatial Algorithms and Systems, 7:4, (1-24), Online publication date: 21-Jun-2021.
  72. Olgun A, Patel M, Yağlikçi A, Luo H, Kim J, Bostanci F, Vijaykumar N, Ergin O and Mutlu O QUAC-TRNG Proceedings of the 48th Annual International Symposium on Computer Architecture, (944-957)
  73. Yachongka V, Yagi H and Oohama Y Biometric Identification Systems With Noisy Enrollment for Gaussian Source 2020 IEEE Information Theory Workshop (ITW), (1-5)
  74. ACM
    White R, Nouri E, Woffinden-Luey J, EncarnacióN M and Jauhar S (2021). Microtask Detection, ACM Transactions on Information Systems, 39:2, (1-29), Online publication date: 1-Mar-2021.
  75. Kosciejew M (2020). The information manifold, Journal of the Association for Information Science and Technology, 72:3, (357-361), Online publication date: 15-Feb-2021.
  76. Chen L, Gao R, Bian Y and Di H (2021). Elliptic entropy of uncertain random variables with application to portfolio selection, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 25:3, (1925-1939), Online publication date: 1-Feb-2021.
  77. ACM
    Liu D, Li Y, Lin J, Li H and Wu F (2020). Deep Learning-Based Video Coding, ACM Computing Surveys, 53:1, (1-35), Online publication date: 31-Jan-2021.
  78. Smaal N, Piqueira J and Messias M (2021). Complexity Measures for Maxwell–Boltzmann Distribution, Complexity, 2021, Online publication date: 1-Jan-2021.
  79. Yang B, Wang X, Ding Z and Zhao L (2021). Understanding Service Providers’ Competency in Knowledge-Intensive Crowdsourcing Platforms, Complexity, 2021, Online publication date: 1-Jan-2021.
  80. Mesner O and Shalizi C (2020). Conditional Mutual Information Estimation for Mixed, Discrete and Continuous Data, IEEE Transactions on Information Theory, 67:1, (464-484), Online publication date: 1-Jan-2021.
  81. ACM
    Paudel R and Eberle W (2020). An Approach For Concept Drift Detection in a Graph Stream Using Discriminative Subgraphs, ACM Transactions on Knowledge Discovery from Data, 14:6, (1-25), Online publication date: 31-Dec-2021.
  82. ACM
    Das S and Paul G (2020). A New Error-Modeling of Hardy’s Paradox for Superconducting Qubits and Its Experimental Verification, ACM Transactions on Quantum Computing, 1:1, (1-24), Online publication date: 9-Dec-2020.
  83. ACM
    Zhang C, Hu N, Cheng X and Zhao Y ADTM Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies, (387-393)
  84. Schultz C (2018). The impact of ad positioning in search engine advertising: a multifaceted decision problem, Electronic Commerce Research, 20:4, (945-968), Online publication date: 1-Dec-2020.
  85. ACM
    Aires V, da Silva A, Nakamura F and Nakamura E An Evaluation of Structural Characteristics of Networks to Identify Media Bias in News Portals Proceedings of the Brazilian Symposium on Multimedia and the Web, (225-232)
  86. Ishii N, Odagiri K, Iwamoto H, Takahashi S, Iwata K and Matsuo T Tourists Movement Analysis Based on Entropies of Markov Process Hybrid Artificial Intelligent Systems, (573-584)
  87. ACM
    Zhang X, Shiely J and Young E Layout pattern generation and legalization with generative learning models Proceedings of the 39th International Conference on Computer-Aided Design, (1-9)
  88. Kondo M, Oliva G, Jiang Z, Hassan A and Mizuno O (2020). Code cloning in smart contracts: a case study on verified contracts from the Ethereum blockchain platform, Empirical Software Engineering, 25:6, (4617-4675), Online publication date: 1-Nov-2020.
  89. Camarena-Ibarrola A, Figueroa K and García J Speaker Identification Using Entropygrams and Convolutional Neural Networks Advances in Soft Computing, (23-34)
  90. Bica M, Weinberg J and Palen L (2020). Achieving Accuracy through Ambiguity: the Interactivity of Risk Communication in Severe Weather Events, Computer Supported Cooperative Work, 29:5, (587-623), Online publication date: 1-Oct-2020.
  91. ACM
    Amato F, Guignard F, Humphrey V and Kanevski M Spatio-temporal evolution of global surface temperature distributions Proceedings of the 10th International Conference on Climate Informatics, (37-43)
  92. ACM
    Englbrecht L and Pernul G A privacy-aware digital forensics investigation in enterprises Proceedings of the 15th International Conference on Availability, Reliability and Security, (1-10)
  93. Kim J, Cho Y and Kim A (2020). Proactive Camera Attribute Control Using Bayesian Optimization for Illumination-Resilient Visual Navigation, IEEE Transactions on Robotics, 36:4, (1256-1271), Online publication date: 1-Aug-2020.
  94. Jiang W, Cao Y and Deng X (2020). A Novel Z-Network Model Based on Bayesian Network and Z-Number, IEEE Transactions on Fuzzy Systems, 28:8, (1585-1599), Online publication date: 1-Aug-2020.
  95. Parmentier D, Van Acker B, Detand J and Saldien J (2019). Design for assembly meaning: a framework for designers to design products that support operator cognition during the assembly process, Cognition, Technology and Work, 22:3, (615-632), Online publication date: 1-Aug-2020.
  96. ACM
    Moffat A (2019). Huffman Coding, ACM Computing Surveys, 52:4, (1-35), Online publication date: 31-Jul-2020.
  97. ACM
    Antonini A and Brooker S Mediation as Calibration Proceedings of the 31st ACM Conference on Hypertext and Social Media, (17-25)
  98. ACM
    Jia Y, Shao Z and Chen F (2020). SlimCache, ACM Transactions on Storage, 16:2, (1-34), Online publication date: 13-Jun-2020.
  99. Achermann G, De Luca G and Simoni M An Information-Theoretic and Dissipative Systems Approach to the Study of Knowledge Diffusion and Emerging Complexity in Innovation Systems Computational Science – ICCS 2020, (252-265)
  100. Joshi R (2020). A novel decision-making method using R-Norm concept and VIKOR approach under picture fuzzy environment, Expert Systems with Applications: An International Journal, 147:C, Online publication date: 1-Jun-2020.
  101. ACM
    Liu W, Gori J, Rioul O, Beaudouin-Lafon M and Guiard Y How Relevant is Hick's Law for HCI? Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, (1-11)
  102. ACM
    Fang Z, Wang G, Wang S, Zuo C, Zhang F and Zhang D CellRep: Usage Representativeness Modeling and Correction Based on Multiple City-Scale Cellular Networks Proceedings of The Web Conference 2020, (584-595)
  103. Cheng Z, Sun H, Takeuchi M and Katto J (2020). Energy Compaction-Based Image Compression Using Convolutional AutoEncoder, IEEE Transactions on Multimedia, 22:4, (860-873), Online publication date: 1-Apr-2020.
  104. Akbulut M, Tonta Y and White H (2019). Related records retrieval and pennant retrieval: an exploratory case study, Scientometrics, 122:2, (957-987), Online publication date: 1-Feb-2020.
  105. Kadian R and Kumar S (2020). Renyi’s-Tsallis fuzzy divergence measure and its applications to pattern recognition and fault detection, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 39:1, (731-752), Online publication date: 1-Jan-2020.
  106. Malarvel M and Nayak S (2020). Edge and region segmentation in high-resolution aerial images using improved kernel density estimation, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 39:1, (543-560), Online publication date: 1-Jan-2020.
  107. Wu K, Nan Q, Wu T and Innocenti G (2020). Philosophical Analysis of the Meaning and Nature of Entropy and Negative Entropy Theories, Complexity, 2020, Online publication date: 1-Jan-2020.
  108. Roffe J, Zohren S, Horsman D and Chancellor N (2019). Quantum Codes From Classical Graphical Models, IEEE Transactions on Information Theory, 66:1, (130-146), Online publication date: 1-Jan-2020.
  109. Babar Z, Kaykac Egilmez Z, Xiang L, Chandra D, Maunder R, Ng S and Hanzo L (2020). Polar Codes and Their Quantum-Domain Counterparts, IEEE Communications Surveys & Tutorials, 22:1, (123-155), Online publication date: 1-Jan-2020.
  110. Leibfried F, Pascual-Díaz S and Grau-Moya J A unified bellman optimality principle combining reward maximization and empowerment Proceedings of the 33rd International Conference on Neural Information Processing Systems, (7869-7880)
  111. Chaudhuri R and Fiete I Bipartite expander Hopfield networks as self-decoding high-capacity error correcting codes Proceedings of the 33rd International Conference on Neural Information Processing Systems, (7688-7699)
  112. Li Z, Zhang P, Ge X, Xie N, Zhang G and Wen C (2019). Uncertainty Measurement for a Fuzzy Relation Information System, IEEE Transactions on Fuzzy Systems, 27:12, (2338-2352), Online publication date: 1-Dec-2019.
  113. ACM
    Zhang M, Peng B and Chen Y An Efficient Image Encryption Scheme for Industrial Internet-of-Things Devices Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, (38-43)
  114. ACM
    Velikorossov V, Rechinskiy A, Chernenkaya L, Filin S and Chernenkii A Digital Economy as a Tool for Reducing of Uncertainty in Strategic Managerial Decisions Proceedings of the XI International Scientific Conference Communicative Strategies of the Information Society, (1-6)
  115. Ni X, Gao T, Wu T, Fan J and Chen C Learning Human Cognition via fMRI Analysis Using 3D CNN and Graph Neural Network Multimodal Brain Image Analysis and Mathematical Foundations of Computational Anatomy, (93-101)
  116. ACM
    Rudolph S, Tomforde S and Hähner J (2019). Mutual Influence-aware Runtime Learning of Self-adaptation Behavior, ACM Transactions on Autonomous and Adaptive Systems, 14:1, (1-37), Online publication date: 18-Sep-2019.
  117. Ivakhiv O, Nakonechnyi M, Viter O, Hladiy G, Shylinska I and Lendyuk T Optimization of Complex Dynamic Objects Survey Procedure 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), (747-751)
  118. Zhao Y, Adjallah K, Sava A and Wang Z Online Incipient Chatter Detection Based on Once-Per-Revolution Sampling and Dynamic Threshold Variant 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), (662-667)
  119. Leydesdorff L, Wagner C, Porto‐Gomez I, Comins J and Phillips F (2019). Synergy in the knowledge base of U.S. innovation systems at national, state, and regional levels, Journal of the Association for Information Science and Technology, 70:10, (1108-1123), Online publication date: 2-Sep-2019.
  120. Dey B, Jaggi S and Langberg M (2019). Sufficiently Myopic Adversaries Are Blind, IEEE Transactions on Information Theory, 65:9, (5718-5736), Online publication date: 1-Sep-2019.
  121. Vigneaux J (2019). Information Theory With Finite Vector Spaces, IEEE Transactions on Information Theory, 65:9, (5674-5687), Online publication date: 1-Sep-2019.
  122. Mower C, Merkt W, Davies A and Vijayakumar S Comparing Alternate Modes of Teleoperation for Constrained Tasks 2019 IEEE 15th International Conference on Automation Science and Engineering (CASE), (1497-1504)
  123. Lin C, Huynh T and Le T (2019). Adaptive TOPSIS fuzzy CMAC back-stepping control system design for nonlinear systems, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:16, (6947-6966), Online publication date: 1-Aug-2019.
  124. Markechová D and Ebrahimzadeh A (2019). R-norm entropy and R-norm divergence in product MV-algebras, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:15, (6085-6095), Online publication date: 1-Aug-2019.
  125. Pregowska A, Casti A, Kaplan E, Wajnryb E and Szczepanski J (2019). Information processing in the LGN, Biological Cybernetics, 113:4, (453-464), Online publication date: 1-Aug-2019.
  126. ACM
    Xingzhou L, Hong R and Yujun Z Predictive Modeling of Stock Indexes Using Machine Learning and Information Theory Proceedings of the 2019 10th International Conference on E-business, Management and Economics, (175-179)
  127. Li Z, Zhang P, Ge X, Xie N and Zhang G (2019). Uncertainty measurement for a covering information system, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:14, (5307-5325), Online publication date: 1-Jul-2019.
  128. Dalman H (2019). Entropy-based multi-item solid transportation problems with uncertain variables, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:14, (5931-5943), Online publication date: 1-Jul-2019.
  129. ACM
    Fan X Facilitating the Deployment of Next Billion IoT Devices with Distributed Antenna Systems The ACM MobiSys 2019 on Rising Stars Forum, (1-6)
  130. ACM
    Zhang M, Zhai S and Wobbrock J Text Entry Throughput Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, (1-13)
  131. Hu B, Li L and Qian J (2019). Internal generative mechanism driven blind quality index for deblocked images, Multimedia Tools and Applications, 78:9, (12583-12605), Online publication date: 1-May-2019.
  132. Jaffal Y and Abou-Faycal I Achievable rates using PAM time-limited pulses over band-limited channels: From Nyquist to FTN 2019 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  133. Shao H (2019). Query by diverse committee in transfer active learning, Frontiers of Computer Science: Selected Publications from Chinese Universities, 13:2, (280-291), Online publication date: 1-Apr-2019.
  134. ACM
    Ge Y, Li B, Zhao Y and Yan W HH-Net Proceedings of the 2019 9th International Conference on Biomedical Engineering and Technology, (180-185)
  135. ACM
    Eskandarian L, Akdoğan D, Karaoğlan Altop D and Levi A SKA-CaNPT Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, (351-362)
  136. ACM
    Babik D, Stevens S and Waters A Comparison of Ranking and Rating Scales in Online Peer Assessment Proceedings of the 9th International Conference on Learning Analytics & Knowledge, (205-209)
  137. Flom O, Yahalom A, Zilberberg H, Horwitz L and Levitan J (2019). Quantum complexity associated with tunneling, Quantum Information & Computation, 19:3-4, (222-236), Online publication date: 1-Mar-2019.
  138. Fernandes G, Rodrigues J, Carvalho L, Al-Muhtadi J and Proença M (2019). A comprehensive survey on network anomaly detection, Telecommunications Systems, 70:3, (447-489), Online publication date: 1-Mar-2019.
  139. Tomă?Ala J (2019). Acceleration of time series entropy algorithms, The Journal of Supercomputing, 75:3, (1443-1454), Online publication date: 1-Mar-2019.
  140. Zieliński C, Figat M and Hexel R (2019). Communication Within Multi-FSM Based Robotic Systems, Journal of Intelligent and Robotic Systems, 93:3-4, (787-805), Online publication date: 1-Mar-2019.
  141. D'oliveira R and Firer M (2019). A distance between channels, Designs, Codes and Cryptography, 87:2-3, (481-493), Online publication date: 1-Mar-2019.
  142. Östergård P (2019). The sextuply shortened binary Golay code is optimal, Designs, Codes and Cryptography, 87:2-3, (341-347), Online publication date: 1-Mar-2019.
  143. Beskow D and Carley K (2019). Its all in a name, Computational & Mathematical Organization Theory, 25:1, (24-35), Online publication date: 1-Mar-2019.
  144. Barraza N, Moro S, Ferreyra M and de la Peña A (2020). Mutual information and sensitivity analysis for feature selection in customer targeting, Journal of Information Science, 45:1, (53-67), Online publication date: 1-Feb-2019.
  145. Khan R, Meyer A, Konik H and Bouakaz S (2019). Saliency-based framework for facial expression recognition, Frontiers of Computer Science: Selected Publications from Chinese Universities, 13:1, (183-198), Online publication date: 1-Feb-2019.
  146. Mishra A and Rani P (2019). Shapley divergence measures with VIKOR method for multi-attribute decision-making problems, Neural Computing and Applications, 31:2, (1299-1316), Online publication date: 1-Feb-2019.
  147. ACM
    Ariffin S and Jamil N Illumination Classification based on No-Reference Image Quality Assessment (NR-IQA) Proceedings of the 2019 Asia Pacific Information Technology Conference, (70-74)
  148. ACM
    ChanLin L ESL Live broadcast teaching service in a university library Proceedings of the 2019 Asia Pacific Information Technology Conference, (31-36)
  149. Parker E (2019). Entropy, the Information Processing Cycle, and the Forecasting of Bull and Bear Market Peaks and Troughs, International Journal of Productivity Management and Assessment Technologies, 7:1, (77-90), Online publication date: 1-Jan-2019.
  150. Wolff J and Volchenkov D (2019). Mathematics as Information Compression via the Matching and Unification of Patterns, Complexity, 2019, Online publication date: 1-Jan-2019.
  151. Wolff J and Amancio D (2019). Information Compression as a Unifying Principle in Human Learning, Perception, and Cognition, Complexity, 2019, Online publication date: 1-Jan-2019.
  152. Varshney L (2019). Mathematical limit theorems for computational creativity, IBM Journal of Research and Development, 63:1, (2:1-2:12), Online publication date: 1-Jan-2019.
  153. Ynnerman A (2018). The 2018 Visualization Technical Achievement Award, IEEE Transactions on Visualization and Computer Graphics, 25:1, (xxix-xxix), Online publication date: 1-Jan-2019.
  154. Chen M, Gaither K, John N and Mccann B (2018). An Information-Theoretic Approach to the Cost-benefit Analysis of Visualization in Virtual Environments, IEEE Transactions on Visualization and Computer Graphics, 25:1, (32-42), Online publication date: 1-Jan-2019.
  155. Wu X, Barnes L and Özgür A (2018). “The Capacity of the Relay Channel”: Solution to Cover’s Problem in the Gaussian Case, IEEE Transactions on Information Theory, 65:1, (255-275), Online publication date: 1-Jan-2019.
  156. Yang L, Hyde D, Grujic O, Scheidt C and Caers J (2019). Assessing and visualizing uncertainty of 3D geological surfaces using level sets with stochastic motion, Computers & Geosciences, 122:C, (54-67), Online publication date: 1-Jan-2019.
  157. ACM
    Matsumori S, Fukuchi Y, Osawa M and Imai M Do Others Believe What I Believe? Proceedings of the 6th International Conference on Human-Agent Interaction, (301-309)
  158. Cho C, Chung K and Won Y (2018). Detection of damaged files and measurement of similarity to originals using entropy graph characteristics, The Journal of Supercomputing, 74:12, (6719-6728), Online publication date: 1-Dec-2018.
  159. Golan A (2018). Info-Metrics for Modeling and Inference, Minds and Machines, 28:4, (787-793), Online publication date: 1-Dec-2018.
  160. ACM
    Torreño A, Onaindia E, Komenda A and Štolba M (2017). Cooperative Multi-Agent Planning, ACM Computing Surveys, 50:6, (1-32), Online publication date: 30-Nov-2018.
  161. Beheshti M, Nayyar S, Magtibay K, Massé S, Porta-Sanchez A, Haldar S, Bhaskaran A, Vigmond E and Nanthakumar K (2018). Quantifying the determinants of decremental response in critical ventricular tachycardia substrate, Computers in Biology and Medicine, 102:C, (260-266), Online publication date: 1-Nov-2018.
  162. ACM
    Gori J, Rioul O and Guiard Y (2018). Speed-Accuracy Tradeoff, ACM Transactions on Computer-Human Interaction, 25:5, (1-33), Online publication date: 31-Oct-2018.
  163. ACM
    Tavares R, Carvalho M, Vieira M, Vieira L and Krishnamachari B FWB Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, (9-16)
  164. ACM
    Munoz-Mendez F, Han K, Klemmer K and Jarvis S Community Structures, Interactions and Dynamics in London's Bicycle Sharing Network Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, (1015-1023)
  165. Kim C (2018). Recognition dynamics in the brain under the free energy principle, Neural Computation, 30:10, (2616-2659), Online publication date: 1-Oct-2018.
  166. ACM
    Kraft K, Mathew D, Sudarshan C, Jung M, Weis C, Wehn N and Longnos F Efficient coding scheme for DDR4 memory subsystems Proceedings of the International Symposium on Memory Systems, (148-157)
  167. Wang W, Kishore V, Koens L, Lauga E and Sitti M Collectives of Spinning Mobile Microrobots for Navigation and Object Manipulation at the Air-Water Interface 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (1-9)
  168. Ni X, Yan Z, Wu T, Fan J and Chen C A Region-of-Interest-Reweight 3D Convolutional Neural Network for the Analytics of Brain Information Processing Medical Image Computing and Computer Assisted Intervention – MICCAI 2018, (302-310)
  169. Araújo M, Ekenberg L and Confraria J Rural networks cost comparison between 5G (mobile) and FTTx (fixed) scenarios 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), (259-264)
  170. Guigourès R, Boullé M and Rossi F (2018). Discovering patterns in time-varying graphs, Advances in Data Analysis and Classification, 12:3, (509-536), Online publication date: 1-Sep-2018.
  171. Dai W (2018). Quadratic entropy of uncertain variables, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 22:17, (5699-5706), Online publication date: 1-Sep-2018.
  172. Mesleh R and Younis A (2018). Capacity analysis for LOS millimeter---wave quadrature spatial modulation, Wireless Networks, 24:6, (1905-1914), Online publication date: 1-Aug-2018.
  173. Merigó J, Zhou L, Yu D, Alrajeh N and Alnowibet K (2018). Probabilistic OWA distances applied to asset management, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 22:15, (4855-4878), Online publication date: 1-Aug-2018.
  174. Brödner P (2018). "Super-intelligent" machine, AI & Society, 33:3, (335-346), Online publication date: 1-Aug-2018.
  175. Hammami M, Bechikh S, Hung C and Ben Said L A Multi-Objective Hybrid Filter-Wrapper Evolutionary Approach for Feature Construction on High-Dimensional Data 2018 IEEE Congress on Evolutionary Computation (CEC), (1-8)
  176. Villaverde A, Becker K and Banga J (2018). PREMER, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 15:4, (1193-1202), Online publication date: 1-Jul-2018.
  177. Jaouadi R, Andrieux G, Baudais J and Diouris J (2018). On the Spectral Efficiency of Energy Constrained Short-Range Communicating Systems, Wireless Personal Communications: An International Journal, 101:2, (1101-1122), Online publication date: 1-Jul-2018.
  178. Valavanis K (2018). The Entropy Based Approach to Modeling and Evaluating Autonomy and Intelligence of Robotic Systems, Journal of Intelligent and Robotic Systems, 91:1, (7-22), Online publication date: 1-Jul-2018.
  179. Wang L, Chen S and Mammadov M Target Learning: A Novel Framework to Mine Significant Dependencies for Unlabeled Data Advances in Knowledge Discovery and Data Mining, (106-117)
  180. George J, Gupta M, Giordano G, Mills A, Tennant V and Lewis C (2018). The effects of communication media and culture on deception detection accuracy, MIS Quarterly, 42:2, (551-576), Online publication date: 1-Jun-2018.
  181. Amiri F, Yazdani N and Shakery A (2018). Bottom-up sequential anonymization in the presence of adversary knowledge, Information Sciences: an International Journal, 450:C, (316-335), Online publication date: 1-Jun-2018.
  182. Khordad R, Rastegar Sedehi H and Bahramiyan H (2018). Effects of impurity and cross-sectional shape on entropy of quantum wires, Journal of Computational Electronics, 17:2, (551-561), Online publication date: 1-Jun-2018.
  183. ACM
    Han H, Kuai K and Fei G Player Experience Information Evaluation in 3D Virtual Environments Proceedings of the 31st International Conference on Computer Animation and Social Agents, (23-26)
  184. Guido R (2018). A tutorial review on entropy-based handcrafted feature extraction for information fusion, Information Fusion, 41:C, (161-175), Online publication date: 1-May-2018.
  185. Chen Y, Wu D, Sung T and Shih K DBS: A dynamic bandwidth selection MAC protocol for channel bonding in IEEE 802.11ac WLANs 2018 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  186. Vafashoar R and Meybodi M (2018). Multi swarm optimization algorithm with adaptive connectivity degree, Applied Intelligence, 48:4, (909-941), Online publication date: 1-Apr-2018.
  187. Das B and Turkoglu I (2018). A novel numerical mapping method based on entropy for digitizing DNA sequences, Neural Computing and Applications, 29:8, (207-215), Online publication date: 1-Apr-2018.
  188. Gao R and Ralescu D (2018). Elliptic entropy of uncertain set and its applications, International Journal of Intelligent Systems, 33:4, (836-857), Online publication date: 23-Feb-2018.
  189. Abelln J, Mantas C and Castellano J (2018). AdaptativeCC4.5, Expert Systems with Applications: An International Journal, 92:C, (363-379), Online publication date: 1-Feb-2018.
  190. Majumdar K and Jayachandran S (2018). A geometric analysis of time series leading to information encoding and a new entropy measure, Journal of Computational and Applied Mathematics, 328:C, (469-484), Online publication date: 15-Jan-2018.
  191. Hossain I, Khosravi A, Hettiarachchi I, Nahavandi S and Alonso-Betanzos A (2018). Multiclass Informative Instance Transfer Learning Framework for Motor Imagery-Based Brain-Computer Interface, Computational Intelligence and Neuroscience, 2018, Online publication date: 1-Jan-2018.
  192. Gohari F, Aliee F and Haghighi H (2018). A new confidence-based recommendation approach, Information Sciences: an International Journal, 422:C, (21-50), Online publication date: 1-Jan-2018.
  193. Stanley-Marbell P and Rinard M (2017). Error-Efficient Computing Systems, Foundations and Trends in Electronic Design Automation, 11:4, (362-461), Online publication date: 18-Dec-2017.
  194. Raghu S and Sriraam N (2017). Optimal configuration of multilayer perceptron neural network classifier for recognition of intracranial epileptic seizures, Expert Systems with Applications: An International Journal, 89:C, (205-221), Online publication date: 15-Dec-2017.
  195. ACM
    Kawamura T, Watanabe K, Matsumoto N, Egami S and Jibu M Science Graph for characterizing the recent scientific landscape using Paragraph Vectors Proceedings of the Knowledge Capture Conference, (1-8)
  196. Yu J, Chiou W, Lee W and Yu K (2017). Does entropy model with return forecasting enhance portfolio performance?, Computers and Industrial Engineering, 114:C, (175-182), Online publication date: 1-Dec-2017.
  197. Lazov I (2017). An Uncertainty Quantification methodology for Broadband Wireless Access systems, Pervasive and Mobile Computing, 42:C, (151-165), Online publication date: 1-Dec-2017.
  198. Gomes R, Hammoudeh A, Caldeirinha R, Al-Daher Z, Fernandes T and Reis J (2017). Towards 5G, Physical Communication, 25:P2, (527-538), Online publication date: 1-Dec-2017.
  199. Gvenkaya E, Hamamreh J and Arslan H (2017). On physical-layer concepts and metrics in secure signal transmission, Physical Communication, 25:P1, (14-25), Online publication date: 1-Dec-2017.
  200. Yu D, Xu Z, Pedrycz W and Wang W (2017). Information sciences 19682016, Information Sciences: an International Journal, 418:C, (619-634), Online publication date: 1-Dec-2017.
  201. Schubert J (2017). Counter-deception in information fusion, International Journal of Approximate Reasoning, 91:C, (152-159), Online publication date: 1-Dec-2017.
  202. Arafat A, Al-Hourani A, Nafi N and Gregory M (2017). A Survey on Dynamic Spectrum Access for LTE-Advanced, Wireless Personal Communications: An International Journal, 97:3, (3921-3941), Online publication date: 1-Dec-2017.
  203. Fraj O, Ghozi R and Jaïdane-Saïdane M (2017). Audio texturedness indicator based on a direct and reverse short listening time analysis, Multimedia Tools and Applications, 76:24, (26177-26200), Online publication date: 1-Dec-2017.
  204. Björnson E, Hoydis J and Sanguinetti L (2017). Massive MIMO Networks, Foundations and Trends in Signal Processing, 11:3-4, (154-655), Online publication date: 15-Nov-2017.
  205. Dutta A, Jha A and Nandi M (2017). A New Look at Counters: Don’t Run Like Marathon in a Hundred Meter Race, IEEE Transactions on Computers, 66:11, (1851-1864), Online publication date: 1-Nov-2017.
  206. Rogers C and Popescu D Fluctuating extended target detection in clutter environment compressed sensing MIMO radar MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM), (507-512)
  207. (2017). Measuring the class-imbalance extent of multi-class problems, Pattern Recognition Letters, 98:C, (32-38), Online publication date: 15-Oct-2017.
  208. Lin X, Xu J, Hu H and Fan Z (2017). Reducing Uncertainty of Probabilistic Top-$k$ Ranking via Pairwise Crowdsourcing, IEEE Transactions on Knowledge and Data Engineering, 29:10, (2290-2303), Online publication date: 1-Oct-2017.
  209. Ortakaya A (2017). Independently weighted value difference metric, Pattern Recognition Letters, 97:C, (61-68), Online publication date: 1-Oct-2017.
  210. Ding S, Du M, Sun T, Xu X and Xue Y (2017). An entropy-based density peaks clustering algorithm for mixed type data employing fuzzy neighborhood, Knowledge-Based Systems, 133:C, (294-313), Online publication date: 1-Oct-2017.
  211. Lourenzutti R, Krohling R and Reformat M (2017). Choquet based TOPSIS and TODIM for dynamic and heterogeneous decision making with criteria interaction, Information Sciences: an International Journal, 408:C, (41-69), Online publication date: 1-Oct-2017.
  212. Salliou N, Barnaud C, Vialatte A and Monteil C (2017). A participatory Bayesian Belief Network approach to explore ambiguity among stakeholders about socio-ecological systems, Environmental Modelling & Software, 96:C, (199-209), Online publication date: 1-Oct-2017.
  213. Acharya U, Fujita H, Sudarshan V, Lih Oh S, Muhammad A, Koh J, Hong Tan J, Chua C, Poo Chua K and San Tan R (2017). Application of empirical mode decomposition (EMD) for automated identification of congestive heart failure using heart rate signals, Neural Computing and Applications, 28:10, (3073-3094), Online publication date: 1-Oct-2017.
  214. ACM
    Abani N, Braun T and Gerla M Proactive caching with mobility prediction under uncertainty in information-centric networks Proceedings of the 4th ACM Conference on Information-Centric Networking, (88-97)
  215. ACM
    Videla A (2017). Metaphors we compute by, Communications of the ACM, 60:10, (42-45), Online publication date: 25-Sep-2017.
  216. Paul B, Chapman C, Chiriyath A and Bliss D (2017). Bridging Mixture Model Estimation and Information Bounds Using I-MMSE, IEEE Transactions on Signal Processing, 65:18, (4821-4832), Online publication date: 15-Sep-2017.
  217. Jian Y, Pfister H and Narayanan K (2017). Approaching Capacity at High Rates With Iterative Hard-Decision Decoding, IEEE Transactions on Information Theory, 63:9, (5752-5773), Online publication date: 1-Sep-2017.
  218. Sharma A, Jagannathan K and Varshney L (2017). Queuing Approaches to Principal-Agent Communication Under Information Overload, IEEE Transactions on Information Theory, 63:9, (6041-6058), Online publication date: 1-Sep-2017.
  219. Sengupta N and Kasabov N (2017). Spike-time encoding as a data compression technique for pattern recognition of temporal data, Information Sciences: an International Journal, 406:C, (133-145), Online publication date: 1-Sep-2017.
  220. Yu S and Huang T (2017). Exponential weighted entropy and exponential weighted mutual information, Neurocomputing, 249:C, (86-94), Online publication date: 2-Aug-2017.
  221. Sabharwal C and Anjum B (2017). An SVD-Entropy and bilinearity based product ranking algorithm using heterogeneous data, Journal of Visual Languages and Computing, 41:C, (133-141), Online publication date: 1-Aug-2017.
  222. Laleye F, Ezin E and Motamed C (2017). Automatic boundary detection based on entropy measures for text-independent syllable segmentation, Multimedia Tools and Applications, 76:15, (16347-16368), Online publication date: 1-Aug-2017.
  223. Boonchuay K, Sinapiromsaran K and Lursinsap C (2017). Decision tree induction based on minority entropy for the class imbalance problem, Pattern Analysis & Applications, 20:3, (769-782), Online publication date: 1-Aug-2017.
  224. ACM
    Stein A, Maier R and Hähner J Toward curious learning classifier systems Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1349-1356)
  225. N. A, K. R, V. V, Abdulhay E, Lawrence Fernandes S, Kadry S and Segal S (2017). Classification of focal and non focal EEG using entropies, Pattern Recognition Letters, 94:C, (112-117), Online publication date: 15-Jul-2017.
  226. Gudigar A, Chokkadi S, Raghavendra U and Acharya U (2017). Local texture patterns for traffic sign recognition using higher order spectra, Pattern Recognition Letters, 94:C, (202-210), Online publication date: 15-Jul-2017.
  227. Dasgupta S, Saha S and Das S (2017). Malware Detection in Android Using Data Mining, International Journal of Natural Computing Research, 6:2, (1-17), Online publication date: 1-Jul-2017.
  228. Nissen M (2017). Working Toward a System for Measuring Dynamic Knowledge, International Journal of Knowledge Management, 13:3, (1-19), Online publication date: 1-Jul-2017.
  229. Li F, Miao D and Pedrycz W (2017). Granular multi-label feature selection based on mutual information, Pattern Recognition, 67:C, (410-423), Online publication date: 1-Jul-2017.
  230. Yager R, Elmore P and Petry F (2017). Soft likelihood functions in combining evidence, Information Fusion, 36:C, (185-190), Online publication date: 1-Jul-2017.
  231. Rocchini D, Petras V, Petrasova A, Chemin Y, Ricotta C, Frigeri A, Landa M, Marcantonio M, Bastin L, Metz M, Delucchi L and Neteler M (2017). Spatio-ecological complexity measures in GRASS GIS, Computers & Geosciences, 104:C, (166-176), Online publication date: 1-Jul-2017.
  232. Bender S, Dörpinghaus M and Fettweis G On the achievable rate of bandlimited continuous-time 1-bit quantized AWGN channels 2017 IEEE International Symposium on Information Theory (ISIT), (2083-2087)
  233. ACM
    Dagan Y, Filmus Y, Gabizon A and Moran S Twenty (simple) questions Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, (9-21)
  234. Boyadjiev L and Luchko Y (2017). Multi-dimensional -fractional diffusionwave equation and some properties of its fundamental solution, Computers & Mathematics with Applications, 73:12, (2561-2572), Online publication date: 15-Jun-2017.
  235. ACM
    Han Y, Sun W and Zheng B (2017). COMPRESS, ACM Transactions on Database Systems, 42:2, (1-49), Online publication date: 1-Jun-2017.
  236. Feng T, Fan H and Mi J (2017). Uncertainty and reduction of variable precision multigranulation fuzzy rough sets based on three-way decisions, International Journal of Approximate Reasoning, 85:C, (36-58), Online publication date: 1-Jun-2017.
  237. Esmaeili A, Mozayani N, Jahed Motlagh M and Matson E (2017). A socially-based distributed self-organizing algorithm for holonic multi-agent systems, Cognitive Systems Research, 43:C, (21-44), Online publication date: 1-Jun-2017.
  238. Tang J and Mat Isa N (2017). Bi-histogram equalization using modified histogram bins, Applied Soft Computing, 55:C, (31-43), Online publication date: 1-Jun-2017.
  239. Yang W, Wang G, Bhuiyan M and Choo K (2017). Hypergraph partitioning for social networks based on information entropy modularity, Journal of Network and Computer Applications, 86:C, (59-71), Online publication date: 15-May-2017.
  240. ACM
    Zaad L, Lenior D, van der Geest T and van der Pool E (2017). Analyzing information in complex collaborative tasks, Communication Design Quarterly, 5:1, (26-42), Online publication date: 4-May-2017.
  241. Baechler G, Scholefield A, Baboulaz L and Vetterli M (2017). Sampling and Exact Reconstruction of Pulses with Variable Width, IEEE Transactions on Signal Processing, 65:10, (2629-2644), Online publication date: 1-May-2017.
  242. Lu D (2017). Information-theoretic exploration for texture-based visualization, Journal of Visualization, 20:2, (393-404), Online publication date: 1-May-2017.
  243. źAhin R (2017). Cross-entropy measure on interval neutrosophic sets and its applications in multicriteria decision making, Neural Computing and Applications, 28:5, (1177-1187), Online publication date: 1-May-2017.
  244. Zuo Z, Zhao K and Eichmann D (2017). The state and evolution of U.S. iSchools, Journal of the Association for Information Science and Technology, 68:5, (1266-1277), Online publication date: 1-May-2017.
  245. Alvim M, Mardziel P and Hicks M Quantifying Vulnerability of Secret Generation Using Hyper-Distributions Proceedings of the 6th International Conference on Principles of Security and Trust - Volume 10204, (26-48)
  246. rje J, Krkkinen S, Meissner K, Iosifidis A, Ince T, Gabbouj M and Kiranyaz S (2017). The effect of automated taxa identification errors on biological indices, Expert Systems with Applications: An International Journal, 72:C, (108-120), Online publication date: 15-Apr-2017.
  247. Moulin P (2017). The Log-Volume of Optimal Codes for Memoryless Channels, Asymptotically Within a Few Nats, IEEE Transactions on Information Theory, 63:4, (2278-2313), Online publication date: 1-Apr-2017.
  248. Brown M, Windridge D and Guillemaut J (2017). A generalised framework for saliency-based point feature detection, Computer Vision and Image Understanding, 157:C, (117-137), Online publication date: 1-Apr-2017.
  249. Chen Y, Xue Y, Ma Y and Xu F (2017). Measures of uncertainty for neighborhood rough sets, Knowledge-Based Systems, 120:C, (226-235), Online publication date: 15-Mar-2017.
  250. Ravi K and Ravi V (2017). A novel automatic satire and irony detection using ensembled feature selection and data mining, Knowledge-Based Systems, 120:C, (15-33), Online publication date: 15-Mar-2017.
  251. Boukhelifa N, Bezerianos A, Cancino W and Lutton E (2017). Evolutionary visual exploration, Evolutionary Computation, 25:1, (55-86), Online publication date: 1-Mar-2017.
  252. Grossberg S (2017). Towards solving the hard problem of consciousness, Neural Networks, 87:C, (38-95), Online publication date: 1-Mar-2017.
  253. Wu H, Gu X and Gu Y (2017). Balancing between over-weighting and under-weighting in supervised term weighting, Information Processing and Management: an International Journal, 53:2, (547-557), Online publication date: 1-Mar-2017.
  254. Lee J, Jung S and Park J (2017). The role of entropy of review text sentiments on online WOM and movie box office sales, Electronic Commerce Research and Applications, 22:C, (42-52), Online publication date: 1-Mar-2017.
  255. Verma M and Rajasankar J (2017). A thermodynamical approach towards group multi-criteria decision making (GMCDM) and its application to human resource selection, Applied Soft Computing, 52:C, (323-332), Online publication date: 1-Mar-2017.
  256. Hafezalkotob A and Hafezalkotob A (2017). Risk-based material selection process supported on information theory, Applied Soft Computing, 52:C, (1116-1129), Online publication date: 1-Mar-2017.
  257. Suleman A (2017). Measuring the congruence of fuzzy partitions in fuzzy c-means clustering, Applied Soft Computing, 52:C, (1285-1295), Online publication date: 1-Mar-2017.
  258. Fang H, Xu L and Choo K (2017). Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks, Applied Mathematics and Computation, 296:C, (153-167), Online publication date: 1-Mar-2017.
  259. Carpita M and Ciavolino E (2017). A generalized maximum entropy estimator to simple linear measurement error model with a composite indicator, Advances in Data Analysis and Classification, 11:1, (139-158), Online publication date: 1-Mar-2017.
  260. Kumar S and Sharma R (2017). Securing color images using Two-square cipher associated with Arnold map, Multimedia Tools and Applications, 76:6, (8757-8779), Online publication date: 1-Mar-2017.
  261. Sileno G, Boer A and Engers T (2017). Reading agendas between the lines, an exercise, Artificial Intelligence and Law, 25:1, (89-106), Online publication date: 1-Mar-2017.
  262. Boro D and Bhattacharyya D (2017). DyProSD, Microsystem Technologies, 23:3, (593-611), Online publication date: 1-Mar-2017.
  263. Verma O and Parihar A (2017). An Optimal Fuzzy System for Edge Detection in Color Images Using Bacterial Foraging Algorithm, IEEE Transactions on Fuzzy Systems, 25:1, (114-127), Online publication date: 1-Feb-2017.
  264. Xu W and Yu J (2017). A novel approach to information fusion in multi-source datasets, Information Sciences: an International Journal, 378:C, (410-423), Online publication date: 1-Feb-2017.
  265. Xu J, Zhang W, Jiang R and Yu N (2017). Unified entropy-based sorting for reversible data hiding, Multimedia Tools and Applications, 76:3, (3829-3850), Online publication date: 1-Feb-2017.
  266. Teng S, Liao F, Ma Y, He M and Nian Y (2017). Uncertainty measures of rough sets based on discernibility capability in information systems, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 21:4, (1081-1096), Online publication date: 1-Feb-2017.
  267. Hsieh J (2017). Author publication preferences and journal competition, Journal of the Association for Information Science and Technology, 68:2, (365-377), Online publication date: 1-Feb-2017.
  268. López-Benítez M, Drysdale T, Hadfield S and Maricar M (2017). Prototype for multidisciplinary research in the context of the Internet of Things, Journal of Network and Computer Applications, 78:C, (146-161), Online publication date: 15-Jan-2017.
  269. (2017). Results related to exponential entropy, International Journal of Information and Coding Theory, 4:4, (258-275), Online publication date: 1-Jan-2017.
  270. Liu W and Tsang I (2017). Making decision trees feasible in ultrahigh feature and label dimensions, The Journal of Machine Learning Research, 18:1, (2814-2849), Online publication date: 1-Jan-2017.
  271. Cannon J (2017). Analytical calculation of mutual information between weakly coupled poisson-spiking neurons in models of dynamically gated communication, Neural Computation, 29:1, (118-145), Online publication date: 1-Jan-2017.
  272. Wu C, Wu T, Fu K, Zhu Y, Li Y, He W, Tang S and Hernández-Pérez J (2017). AMOBH, Computational Intelligence and Neuroscience, 2017, Online publication date: 1-Jan-2017.
  273. Morzy M, Kajdanowicz T, Kazienko P and De Meo P (2017). On Measuring the Complexity of Networks, Complexity, 2017, Online publication date: 1-Jan-2017.
  274. He L, Li S and Silva T (2017). Network Entropy and Systemic Risk in Dynamic Banking Systems, Complexity, 2017, Online publication date: 1-Jan-2017.
  275. Psarrakos G and Toomaj A (2017). On the generalized cumulative residual entropy with applications in actuarial science, Journal of Computational and Applied Mathematics, 309:C, (186-199), Online publication date: 1-Jan-2017.
  276. Merigó J, Palacios-Marqués D and Soto-Acosta P (2017). Distance measures, weighted averages, OWA operators and Bonferroni means, Applied Soft Computing, 50:C, (356-366), Online publication date: 1-Jan-2017.
  277. Ermoliev Y, Ermolieva T, Havlík P, Mosnier A, Leclere D, Fritz S, Obersteiner M, Kyryzyuk S and Borodina O (2017). Robust Downscaling Approaches to Disaggregation of Data and Projections Under Uncertainties, Cybernetics and Systems Analysis, 53:1, (26-33), Online publication date: 1-Jan-2017.
  278. Leydesdorff L and Nooy W (2017). Can "hot spots" in the sciences be mapped using the dynamics of aggregated journal-journal citation Relations?, Journal of the Association for Information Science and Technology, 68:1, (197-213), Online publication date: 1-Jan-2017.
  279. ACM
    Smith L, Zhu L, Lerman K and Percus A (2016). Partitioning Networks with Node Attributes by Compressing Information Flow, ACM Transactions on Knowledge Discovery from Data, 11:2, (1-26), Online publication date: 26-Dec-2016.
  280. Kumar B and Ravi V (2016). A survey of the applications of text mining in financial domain, Knowledge-Based Systems, 114:C, (128-147), Online publication date: 15-Dec-2016.
  281. Basole R, Huhtamäki J, Still K and Russell M (2016). Visual decision support for business ecosystem analysis, Expert Systems with Applications: An International Journal, 65:C, (271-282), Online publication date: 15-Dec-2016.
  282. Onken A and Panzeri S Mixed vine copulas as joint models of spike counts and local field potentials Proceedings of the 30th International Conference on Neural Information Processing Systems, (1333-1341)
  283. Pregowska A, Szczepanski J and Wajnryb E (2016). Temporal code versus rate code for binary Information Sources, Neurocomputing, 216:C, (756-762), Online publication date: 5-Dec-2016.
  284. Fuertinger S and Simonyan K (2016). Stability of network communities as a function of task complexity, Journal of Cognitive Neuroscience, 28:12, (2030-2043), Online publication date: 1-Dec-2016.
  285. Ahlheim C, Schiffer A and Schubotz R (2016). Prefrontal cortex activation reflects efficient exploitation of higher-order statistical structure, Journal of Cognitive Neuroscience, 28:12, (1909-1922), Online publication date: 1-Dec-2016.
  286. Kim K (2016). A hybrid classification algorithm by subspace partitioning through semi-supervised decision tree, Pattern Recognition, 60:C, (157-163), Online publication date: 1-Dec-2016.
  287. Ngan S (2016). A u-map representation of general type-2 fuzzy sets via concepts from activation detection, Expert Systems with Applications: An International Journal, 64:C, (169-193), Online publication date: 1-Dec-2016.
  288. Sirovich L (2016). A new structural approach to genomic discovery of disease, Biological Cybernetics, 110:6, (383-391), Online publication date: 1-Dec-2016.
  289. Dang Z, Fischer T, Hutton W, Ibarra O and Li Q (2016). Quantifying communication in synchronized languages, Theoretical Computer Science, 654:C, (33-44), Online publication date: 22-Nov-2016.
  290. ACM
    Li Y and Liang Y (2016). Temporal Lossless and Lossy Compression in Wireless Sensor Networks, ACM Transactions on Sensor Networks, 12:4, (1-35), Online publication date: 17-Nov-2016.
  291. Fatemi M, Amini A and Vetterli M (2016). Sampling and Reconstruction of Shapes With Algebraic Boundaries, IEEE Transactions on Signal Processing, 64:22, (5807-5818), Online publication date: 15-Nov-2016.
  292. Biondi F, Given-Wilson T and Legay A (2016). Attainable unconditional security for shared-key cryptosystems, Information Sciences: an International Journal, 369:C, (80-99), Online publication date: 10-Nov-2016.
  293. Dessimoz J (2016). Cognition, cognitics, and team action-Overview, foundations, and five theses for a better world, Robotics and Autonomous Systems, 85:C, (73-82), Online publication date: 1-Nov-2016.
  294. Xiao G, Wang H, Yan Y and Zhang L (2016). Mode seeking on graphs for geometric model fitting via preference analysis, Pattern Recognition Letters, 83:P3, (294-302), Online publication date: 1-Nov-2016.
  295. Lewis A, Smith R, Williams B and Figueroa V (2016). An information theoretic approach to use high-fidelity codes to calibrate low-fidelity codes, Journal of Computational Physics, 324:C, (24-43), Online publication date: 1-Nov-2016.
  296. Mantas C, Abellán J and Castellano J (2016). Analysis of Credal-C4.5 for classification in noisy domains, Expert Systems with Applications: An International Journal, 61:C, (314-326), Online publication date: 1-Nov-2016.
  297. Panniello U, Hill S and Gorgoglione M (2016). The impact of profit incentives on the relevance of online recommendations, Electronic Commerce Research and Applications, 20:C, (87-104), Online publication date: 1-Nov-2016.
  298. Stevens J, Benz A, Reue S and Klabunde R (2016). Pragmatic question answering, Data & Knowledge Engineering, 106:C, (52-69), Online publication date: 1-Nov-2016.
  299. Parvees M, Samath J and Bose B (2016). Secured Medical Images - a Chaotic Pixel Scrambling Approach, Journal of Medical Systems, 40:11, (1-11), Online publication date: 1-Nov-2016.
  300. ACM
    Silva R, Gomes G, Alvim M and Gonçalves M Compression-Based Selective Sampling for Learning to Rank Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, (247-256)
  301. Guedes G, Ogasawara E, Bezerra E and Xexeo G (2016). Discovering top-k non-redundant clusterings in attributed graphs, Neurocomputing, 210:C, (45-54), Online publication date: 19-Oct-2016.
  302. Meymandpour R and Davis J (2016). A semantic similarity measure for linked data, Knowledge-Based Systems, 109:C, (276-293), Online publication date: 1-Oct-2016.
  303. Alawneh L, Hamou-Lhadj A and Hassine J (2016). Segmenting large traces of inter-process communication with a focus on high performance computing systems, Journal of Systems and Software, 120:C, (1-16), Online publication date: 1-Oct-2016.
  304. Costa D, Almeida N and Villas-Boas C (2016). Secure quantum communication using classical correlated channel, Quantum Information Processing, 15:10, (4303-4311), Online publication date: 1-Oct-2016.
  305. Ponzanelli L, Bavota G, Di Penta M, Oliveto R and Lanza M (2016). Prompter, Empirical Software Engineering, 21:5, (2190-2231), Online publication date: 1-Oct-2016.
  306. Yun Y and Gu I (2016). Human fall detection in videos by fusing statistical features of shape and motion dynamics on Riemannian manifolds, Neurocomputing, 207:C, (726-734), Online publication date: 26-Sep-2016.
  307. Oosthuizen D and Hanekom J (2016). Information transmission analysis for continuous speech features, Speech Communication, 82:C, (53-66), Online publication date: 1-Sep-2016.
  308. Acharya U, Chowriappa P, Fujita H, Bhat S, Dua S, Koh J, Eugene L, Kongmebhol P and Ng K (2016). Thyroid lesion classification in 242 patient population using Gabor transform features from high resolution ultrasound images, Knowledge-Based Systems, 107:C, (235-245), Online publication date: 1-Sep-2016.
  309. (2016). Efficient and resilient micro air vehicle flapping wing gait evolution for hover and trajectory control, Engineering Applications of Artificial Intelligence, 54:C, (1-16), Online publication date: 1-Sep-2016.
  310. Xu R, Frey R, Fleisch E and Ilic A (2016). Understanding the impact of personality traits on mobile app adoption - Insights from a large-scale field study, Computers in Human Behavior, 62:C, (244-256), Online publication date: 1-Sep-2016.
  311. Mouakher A and Ben Yahia S (2016). QualityCover, Information Sciences: an International Journal, 355:C, (58-73), Online publication date: 10-Aug-2016.
  312. Samaha J, Sprague T and Postle B (2016). Decoding and reconstructing the focus of spatial attention from the topography of alpha-band oscillations, Journal of Cognitive Neuroscience, 28:8, (1090-1097), Online publication date: 1-Aug-2016.
  313. Chellappan V, Sivalingam K and Krithivasan K (2016). A Centrality Entropy Maximization Problem in Shortest Path Routing Networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 104:C, (1-15), Online publication date: 20-Jul-2016.
  314. Wang L, Zhou Z and Wu W (2016). Game theory-based model for maximizing SSP utility in cognitive radio networks, Computer Communications, 86:C, (29-39), Online publication date: 15-Jul-2016.
  315. Liu Y, Zhu H, Zeng Y and Dai Z Learning predictive state representations via Monte-Carlo tree search Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (3192-3198)
  316. Yun Y and Gu I (2016). Human fall detection in videos via boosting and fusing statistical features of appearance, shape and motion dynamics on Riemannian manifolds with applications to assisted living, Computer Vision and Image Understanding, 148:C, (111-122), Online publication date: 1-Jul-2016.
  317. Park Y, Teiken W, Rao J and Chari S (2016). Data classification and sensitivity estimation for critical asset discovery, IBM Journal of Research and Development, 60:4, (2:1-2:12), Online publication date: 1-Jul-2016.
  318. Lopez-de-Ipiña K, Bergareche A, de la Riva P, Faundez-Zanuy M, Calvo P, Roure J and Sesa-Nogueras E (2016). Automatic non-linear analysis of non-invasive writing signals, applied to essential tremor, Journal of Applied Logic, 16:C, (50-59), Online publication date: 1-Jul-2016.
  319. Zhang X, Yang S, Tang Y and Zhang W (2016). A thermodynamics-inspired feature for anomaly detection on crowd motions in surveillance videos, Multimedia Tools and Applications, 75:14, (8799-8826), Online publication date: 1-Jul-2016.
  320. Shah C, Hendahewa C and González-Ibáñez R (2016). Rain or shine? Forecasting search process performance in exploratory search tasks, Journal of the Association for Information Science and Technology, 67:7, (1607-1623), Online publication date: 1-Jul-2016.
  321. Yan Y, Zhang Y, Chen J and Zhang Y (2016). Incomplete data classification with voting based extreme learning machine, Neurocomputing, 193:C, (167-175), Online publication date: 12-Jun-2016.
  322. ACM
    Chang C, Cheng J, Huang T, Lee D and Chen C (2016). Coding Rate Analysis of Forbidden Overlap Codes in High-Speed Buses, ACM Transactions on Modeling and Performance Evaluation of Computing Systems, 1:2, (1-25), Online publication date: 7-Jun-2016.
  323. Clemens J, Reineking T and Kluth T (2016). An evidential approach to SLAM, path planning, and active exploration, International Journal of Approximate Reasoning, 73:C, (1-26), Online publication date: 1-Jun-2016.
  324. Ma H, Huang P, Bao W and Zeng G (2016). Continuous-variable quantum identity authentication based on quantum teleportation, Quantum Information Processing, 15:6, (2605-2620), Online publication date: 1-Jun-2016.
  325. Datta N, Tomamichel M and Wilde M (2016). On the second-order asymptotics for entanglement-assisted communication, Quantum Information Processing, 15:6, (2569-2591), Online publication date: 1-Jun-2016.
  326. Karademir S, Prokopyev O and Mailloux R (2016). Irregular polyomino tiling via integer programming with application in phased array antenna design, Journal of Global Optimization, 65:2, (137-173), Online publication date: 1-Jun-2016.
  327. Phillips-Grafflin C, Suay H, Mainprice J, Alunni N, Lofaro D, Berenson D, Chernova S, Lindeman R and Oh P (2016). From Autonomy to Cooperative Traded Control of Humanoid Manipulation Tasks with Unreliable Communication, Journal of Intelligent and Robotic Systems, 82:3-4, (341-361), Online publication date: 1-Jun-2016.
  328. Tomaru T, Murakami H, Niizato T, Nishiyama Y, Sonoda K, Moriyama T and Gunji Y (2016). Information transfer in a swarm of soldier crabs, Artificial Life and Robotics, 21:2, (177-180), Online publication date: 1-Jun-2016.
  329. Tang K, Tsai L and Hwang S (2016). The development and validation of a one-bit comparison for evaluating the maturity of tag distributions in a Web 2.0 environment, Journal of the Association for Information Science and Technology, 67:6, (1430-1445), Online publication date: 1-Jun-2016.
  330. ACM
    Kiefer F and Manulis M Blind Password Registration for Verifier-based PAKE Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, (39-48)
  331. Imani M and Ghassemian H (2016). Binary coding based feature extraction in remote sensing high dimensional data, Information Sciences: an International Journal, 342:C, (191-208), Online publication date: 10-May-2016.
  332. Gao Y, Toni F, Wang H and Xu F Argumentation-Based Multi-Agent Decision Making with Privacy Preserved Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (1153-1161)
  333. Isaeva E, Suvorova V and Bakhtin V (2016). Supervized machine learning, Automatic Documentation and Mathematical Linguistics, 50:3, (104-111), Online publication date: 1-May-2016.
  334. Burgos A and Polani D (2016). An informational study of the evolution of codes and of emerging concepts in populations of agents, Artificial Life, 22:2, (196-210), Online publication date: 1-May-2016.
  335. Chaaban A, Rezki Z and Alouini M (2016). On the Capacity of the Intensity-Modulation Direct-Detection Optical Broadcast Channel, IEEE Transactions on Wireless Communications, 15:5, (3114-3130), Online publication date: 1-May-2016.
  336. Receveur S, Weiß R and Fingscheidt T (2016). Turbo automatic speech recognition, IEEE/ACM Transactions on Audio, Speech and Language Processing, 24:5, (846-862), Online publication date: 1-May-2016.
  337. Acharya U, Fujita H, Sudarshan V, Oh S, Adam M, Koh J, Tan J, Ghista D, Martis R, Chua C, Poo C and Tan R (2016). Automated detection and localization of myocardial infarction using electrocardiogram, Knowledge-Based Systems, 99:C, (146-156), Online publication date: 1-May-2016.
  338. ACM
    Bartolini D, Miedl P and Thiele L On the capacity of thermal covert channels in multicores Proceedings of the Eleventh European Conference on Computer Systems, (1-16)
  339. Schwartz G, Shokoufandeh A, Ontañón S and Hershberg U (2016). Using a novel clumpiness measure to unite data with metadata, Pattern Recognition Letters, 74:C, (24-29), Online publication date: 15-Apr-2016.
  340. Yu F (2016). Science and the myth of information, Optical Memory and Neural Networks, 25:2, (102-113), Online publication date: 1-Apr-2016.
  341. Elishco O, Meyerovitch T and Schwartz M (2016). Semiconstrained Systems, IEEE Transactions on Information Theory, 62:4, (1688-1702), Online publication date: 1-Apr-2016.
  342. Abdul-Rauf S, Schwenk H, Lambert P and Nawaz M (2016). Empirical use of information retrieval to build synthetic data for SMT domain adaptation, IEEE/ACM Transactions on Audio, Speech and Language Processing, 24:4, (745-754), Online publication date: 1-Apr-2016.
  343. Campos M and Krohling R (2016). Entropy-based bare bones particle swarm for dynamic constrained optimization, Knowledge-Based Systems, 97:C, (203-223), Online publication date: 1-Apr-2016.
  344. Parvege M, Rahman M, Nibir Y and Hossain M (2016). Two highly similar LAEDDTNAQKT and LTDKIGTEI epitopes in G glycoprotein may be useful for effective epitope based vaccine design against pathogenic Henipavirus, Computational Biology and Chemistry, 61:C, (270-280), Online publication date: 1-Apr-2016.
  345. Aronov B, de Berg M, Eppstein D, Roeloffzen M and Speckmann B (2016). Distance-sensitive planar point location, Computational Geometry: Theory and Applications, 54:C, (17-31), Online publication date: 1-Apr-2016.
  346. (2016). Assessing quality of urban underground spaces by coupling 3D geological models, Computers & Geosciences, 89:C, (1-11), Online publication date: 1-Apr-2016.
  347. Khan M, Shah T and Batool S (2016). Construction of S-box based on chaotic Boolean functions and its application in image encryption, Neural Computing and Applications, 27:3, (677-685), Online publication date: 1-Apr-2016.
  348. Javid M, Blackwell T, Zimmer R and Al-Rifaie M Correlation Between Human Aesthetic Judgement and Spatial Complexity Measure Proceedings of the 5th International Conference on Evolutionary and Biologically Inspired Music, Sound, Art and Design - Volume 9596, (79-91)
  349. Szulanski G, Ringov D and Jensen R (2016). Overcoming Stickiness, Organization Science, 27:2, (304-322), Online publication date: 1-Mar-2016.
  350. Pennisi A, Bloisi D and Iocchi L (2016). Online real-time crowd behavior detection in video sequences, Computer Vision and Image Understanding, 144:C, (166-176), Online publication date: 1-Mar-2016.
  351. Myers J and Madjid F (2016). Unpredictability and the transmission of numbers, Quantum Information Processing, 15:3, (1057-1067), Online publication date: 1-Mar-2016.
  352. Wilde M, Renes J and Guha S (2016). Second-order coding rates for pure-loss bosonic channels, Quantum Information Processing, 15:3, (1289-1308), Online publication date: 1-Mar-2016.
  353. ACM
    Raitza M, Vogt M, Hochberger C and Pionteck T (2015). RAW 2014, ACM Transactions on Reconfigurable Technology and Systems, 9:2, (1-21), Online publication date: 3-Feb-2016.
  354. Farnoud Hassanzadeh F, Schwartz M and Bruck J (2016). The Capacity of String-Duplication Systems, IEEE Transactions on Information Theory, 62:2, (811-824), Online publication date: 1-Feb-2016.
  355. Arikan E (2016). On the Origin of Polar Coding, IEEE Journal on Selected Areas in Communications, 34:2, (209-223), Online publication date: 1-Feb-2016.
  356. Squillero G and Tonda A (2016). Divergence of character and premature convergence, Information Sciences: an International Journal, 329:C, (782-799), Online publication date: 1-Feb-2016.
  357. Borelli L, Aguiar L, Roversi J and Vidiella-Barranco A (2016). Quantum key distribution using continuous-variable non-Gaussian states, Quantum Information Processing, 15:2, (893-904), Online publication date: 1-Feb-2016.
  358. Bhattacharyya A, Dvir Z, Saraf S and Shpilka A (2016). Tight lower bounds for linear 2-query LCCs over finite fields, Combinatorica, 36:1, (1-36), Online publication date: 1-Feb-2016.
  359. Florindo J, Assirati L and Bruno O (2016). Locally enhancing fractal descriptors by using the non-additive entropy, Pattern Recognition Letters, 70:C, (32-37), Online publication date: 15-Jan-2016.
  360. ACM
    Tyagi H, Venkatakrishnan S, Viswanath P and Watanabe S Information Complexity Density and Simulation of Protocols Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, (381-391)
  361. Kim M, Newth D and Christen P (2016). Macro-level information transfer in social media, Neurocomputing, 172:C, (84-99), Online publication date: 8-Jan-2016.
  362. Pham T, Xiao Z and Li K (2016). Quantifying visual perception of texture with fuzzy metric entropy, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 31:2, (1089-1097), Online publication date: 1-Jan-2016.
  363. Cha H, Yoo S, Lee T, Park J and Kim K (2016). An entropy-based clustering algorithm for load balancing in WSN, International Journal of Sensor Networks, 22:3, (188-196), Online publication date: 1-Jan-2016.
  364. Rios R and Mello R (2016). Applying Empirical Mode Decomposition and mutual information to separate stochastic and deterministic influences embedded in signals, Signal Processing, 118:C, (159-176), Online publication date: 1-Jan-2016.
  365. Wang W, Chen C and Ng M (2016). An image pixel based variational model for histogram equalization, Journal of Visual Communication and Image Representation, 34:C, (118-134), Online publication date: 1-Jan-2016.
  366. Lin Y, Hu Q, Liu J, Chen J and Duan J (2016). Multi-label feature selection based on neighborhood mutual information, Applied Soft Computing, 38:C, (244-256), Online publication date: 1-Jan-2016.
  367. Carlet C and Mesnager S (2016). Four decades of research on bent functions, Designs, Codes and Cryptography, 78:1, (5-50), Online publication date: 1-Jan-2016.
  368. Vijayalakshmi R, Nandagopal D, Dasari N, Cocks B, Dahal N and Thilaga M (2015). Minimum connected component - A novel approach to detection of cognitive load induced changes in functional brain networks, Neurocomputing, 170:C, (15-31), Online publication date: 25-Dec-2015.
  369. Javaheri Javid M, Zimmer R, Ursyn A and Al-Rifaie M A Quantitative Approach for Detecting Symmetries and Complexity in 2D Plane Proceedings of the Fourth International Conference on Theory and Practice of Natural Computing - Volume 9477, (150-160)
  370. Ha J, Seok S and Lee J (2015). A precise ranking method for outlier detection, Information Sciences: an International Journal, 324:C, (88-107), Online publication date: 10-Dec-2015.
  371. Andrezza I, Borges E and Batista L (2015). Heart arrhythmia classification using the prediction by partial matching algorithm, International Journal of Computer Applications in Technology, 52:4, (285-291), Online publication date: 1-Dec-2015.
  372. Toscani G (2015). A Strengthened Entropy Power Inequality for Log-Concave Densities, IEEE Transactions on Information Theory, 61:12, (6550-6559), Online publication date: 1-Dec-2015.
  373. Hayashi M and Tan V (2015). Asymmetric Evaluations of Erasure and Undetected Error Probabilities, IEEE Transactions on Information Theory, 61:12, (6560-6577), Online publication date: 1-Dec-2015.
  374. Naval S, Laxmi V, Rajarajan M, Gaur M and Conti M (2015). Employing Program Semantics for Malware Detection, IEEE Transactions on Information Forensics and Security, 10:12, (2591-2604), Online publication date: 1-Dec-2015.
  375. Cheng-Shang Chang , Jay Cheng , Tien-Ke Huang , Xuan-Chao Huang , Duan-Shin Lee and Chao-Yi Chen (2015). Bit-Stuffing Algorithms for Crosstalk Avoidance in High-Speed Switching, IEEE Transactions on Computers, 64:12, (3404-3416), Online publication date: 1-Dec-2015.
  376. Fornells A, Rodrigo Z, Rovira X, Sánchez M, Santomà R, Teixidó-Navarro F and Golobardes E (2015). Promoting consensus in the concept mapping methodology, Pattern Recognition Letters, 67:P1, (39-48), Online publication date: 1-Dec-2015.
  377. Yang J, Xiang T and Xiao D (2015). Cryptanalysis of a secure chaotic map based block cryptosystem with application to camera sensor networks, Multimedia Tools and Applications, 74:23, (10873-10881), Online publication date: 1-Dec-2015.
  378. Masmoudi A, Puech W and Masmoudi A (2015). An improved lossless image compression based arithmetic coding using mixture of non-parametric distributions, Multimedia Tools and Applications, 74:23, (10605-10619), Online publication date: 1-Dec-2015.
  379. Own H and Yahyaoui H (2015). Rough set based classification of real world Web services, Information Systems Frontiers, 17:6, (1301-1311), Online publication date: 1-Dec-2015.
  380. Gottron T, Knauf M and Scherp A (2015). Analysis of schema structures in the Linked Open Data graph based on unique subject URIs, pay-level domains, and vocabulary usage, Distributed and Parallel Databases, 33:4, (515-553), Online publication date: 1-Dec-2015.
  381. Lin Y, Hu Q, Liu J and Duan J (2015). Multi-label feature selection based on max-dependency and min-redundancy, Neurocomputing, 168:C, (92-103), Online publication date: 30-Nov-2015.
  382. Wu X, Matsumoto Y, Duh K and Shindo H An Improved Hierarchical Word Sequence Language Model Using Word Association Proceedings of the Third International Conference on Statistical Language and Speech Processing - Volume 9449, (275-287)
  383. ACM
    Cho J, Chan K and Adali S (2015). A Survey on Trust Modeling, ACM Computing Surveys, 48:2, (1-40), Online publication date: 21-Nov-2015.
  384. Petry F, Elmore P and Yager R (2015). Combining uncertain information of differing modalities, Information Sciences: an International Journal, 322:C, (237-256), Online publication date: 20-Nov-2015.
  385. Yang W, Wang G and Bhuiyan M Partitioning of Hypergraph Modeled Complex Networks Based on Information Entropy Proceedings, Part II, of the 15th International Conference on Algorithms and Architectures for Parallel Processing - Volume 9529, (678-690)
  386. ACM
    Hsieh Y, Bai M, Huang S and Chen K (2015). Correcting Chinese Spelling Errors with Word Lattice Decoding, ACM Transactions on Asian and Low-Resource Language Information Processing, 14:4, (1-23), Online publication date: 11-Nov-2015.
  387. Acharya U, Fujita H, Sudarshan V, Bhat S and Koh J (2015). Application of entropies for automated diagnosis of epilepsy using EEG signals, Knowledge-Based Systems, 88:C, (85-96), Online publication date: 1-Nov-2015.
  388. (2015). Normality in non-integer bases and polynomial time randomness, Journal of Computer and System Sciences, 81:7, (1059-1087), Online publication date: 1-Nov-2015.
  389. Benedetto F, Giunta G and Mastroeni L (2015). A maximum entropy method to assess the predictability of financial and commodity prices, Digital Signal Processing, 46:C, (19-31), Online publication date: 1-Nov-2015.
  390. Zhao K, Greer G, Yen J, Mitra P and Portier K (2015). Leader identification in an online health community for cancer survivors, Information Systems and e-Business Management, 13:4, (629-645), Online publication date: 1-Nov-2015.
  391. Soukup D, Štolc S and Huber-Mörk R On Optimal Illumination for DOVID Description Using Photometric Stereo Proceedings of the 16th International Conference on Advanced Concepts for Intelligent Vision Systems - Volume 9386, (553-565)
  392. Schmitz R, Li S, Grecos C and Zhang X Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy Proceedings of the 16th International Conference on Advanced Concepts for Intelligent Vision Systems - Volume 9386, (474-485)
  393. ACM
    Kholghi M, Sitbon L, Zuccon G and Nguyen A External Knowledge and Query Strategies in Active Learning Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, (143-152)
  394. Yu F (2015). Light and information, Optical Memory and Neural Networks, 24:4, (249-259), Online publication date: 1-Oct-2015.
  395. Yi Fang , Guoan Bi , Yong Liang Guan and Lau F (2015). A Survey on Protograph LDPC Codes and Their Applications, IEEE Communications Surveys & Tutorials, 17:4, (1989-2016), Online publication date: 1-Oct-2015.
  396. Kiani A and Sahebi M (2015). Edge detection based on the Shannon Entropy by piecewise thresholding on remote sensing images, IET Computer Vision, 9:5, (758-768), Online publication date: 1-Oct-2015.
  397. Sharma S and Sahu O (2015). A low complexity based spectrum management algorithm for 'Near-Far' problem in VDSL environment, Journal of King Saud University - Computer and Information Sciences, 27:4, (430-436), Online publication date: 1-Oct-2015.
  398. Mariethoz G, Linde N, Jougnot D and Rezaee H (2015). Feature-preserving interpolation and filtering of environmental time series, Environmental Modelling & Software, 72:C, (71-76), Online publication date: 1-Oct-2015.
  399. Wang C, Kubota A and Hatori Y (2015). A Novel Encoding Method for P-frames, Journal of Signal Processing Systems, 81:1, (1-10), Online publication date: 1-Oct-2015.
  400. Wu H, Li K, Shi W, Clarke K, Zhang J and Li H (2015). A wavelet-based hybrid approach to remove the flicker noise and the white noise from GPS coordinate time series, GPS Solutions, 19:4, (511-523), Online publication date: 1-Oct-2015.
  401. Bawden D and Robinson L (2015). "A few exciting words", Journal of the Association for Information Science and Technology, 66:10, (1965-1987), Online publication date: 1-Oct-2015.
  402. Hrabia C, Masuch N and Albayrak S A Metrics Framework for Quantifying Autonomy in Complex Systems Revised Selected Papers of the 13th German Conference on Multiagent System Technologies - Volume 9433, (22-41)
  403. Biondi F, Legay A, Malacaria P and Wasowski A (2015). Quantifying information leakage of randomized protocols, Theoretical Computer Science, 597:C, (62-87), Online publication date: 13-Sep-2015.
  404. ACM
    Benenson Z, Lenzini G, Oliveira D, Parkin S and Uebelacker S Maybe Poor Johnny Really Cannot Encrypt Proceedings of the 2015 New Security Paradigms Workshop, (85-99)
  405. ACM
    Goswami R, Banerjee S, Dutta M and Bhunia C Absolute key variation technique of automatic variable key in cryptography Proceedings of the 8th International Conference on Security of Information and Networks, (65-67)
  406. Avestimehr A, Diggavi S, Tian C and Tse D (2015). An Approximation Approach to Network Information Theory, Foundations and Trends in Communications and Information Theory, 12:1-2, (1-183), Online publication date: 1-Sep-2015.
  407. Tanaka-Ishii K and Aihara S (2015). Computational constancy measures of texts-yule's k and rényi's entropy, Computational Linguistics, 41:3, (481-502), Online publication date: 1-Sep-2015.
  408. Dasgupta A, Poco J, Yaxing Wei , Cook R, Bertini E and Silva C (2015). Bridging Theory with Practice: An Exploratory Study of Visualization Use and Design for Climate Model Comparison, IEEE Transactions on Visualization and Computer Graphics, 21:9, (996-1014), Online publication date: 1-Sep-2015.
  409. Ke Gu , Guangtao Zhai , Xiaokang Yang , Wenjun Zhang and Chang Wen Chen (2015). Automatic Contrast Enhancement Technology With Saliency Preservation, IEEE Transactions on Circuits and Systems for Video Technology, 25:9, (1480-1494), Online publication date: 1-Sep-2015.
  410. Hino H, Koshijima K and Murata N (2015). Non-parametric entropy estimators based on simple linear regression, Computational Statistics & Data Analysis, 89:C, (72-84), Online publication date: 1-Sep-2015.
  411. Atighehchi K, Bonnecaze A and Risterucci G (2015). New models for efficient authenticated dictionaries, Computers and Security, 53:C, (203-214), Online publication date: 1-Sep-2015.
  412. Lv Z, Lu Z and Wang P (2015). A new learning function for Kriging and its applications to solve reliability problems in engineering, Computers & Mathematics with Applications, 70:5, (1182-1197), Online publication date: 1-Sep-2015.
  413. Dehmer M, Li X and Shi Y (2015). Connections between generalized graph entropies and graph energy, Complexity, 21:1, (35-41), Online publication date: 1-Sep-2015.
  414. Li X, Ruan Q, An G, Jin Y and Zhao R (2015). Multiple strategies to enhance automatic 3D facial expression recognition, Neurocomputing, 161:C, (89-98), Online publication date: 5-Aug-2015.
  415. Leibfried F and Braun D (2015). A reward-maximizing spiking neuron as a bounded rational decision maker, Neural Computation, 27:8, (1686-1720), Online publication date: 1-Aug-2015.
  416. Tatli E (2015). Cracking More Password Hashes With Patterns, IEEE Transactions on Information Forensics and Security, 10:8, (1656-1665), Online publication date: 1-Aug-2015.
  417. (2015). Local linear estimation of residual entropy function of conditional distributions, Computational Statistics & Data Analysis, 88:C, (1-14), Online publication date: 1-Aug-2015.
  418. Buda R (2015). Data Checking and Econometric Software Development, Computational Economics, 46:2, (325-357), Online publication date: 1-Aug-2015.
  419. Belling P, Suss J and Ward P (2015). The effect of time constraint on anticipation, decision making, and option generation in complex and dynamic environments, Cognition, Technology and Work, 17:3, (355-366), Online publication date: 1-Aug-2015.
  420. Taylor Z, Nieto J and Johnson D (2015). Multi-Modal Sensor Calibration Using a Gradient Orientation Measure, Journal of Field Robotics, 32:5, (675-695), Online publication date: 1-Aug-2015.
  421. Hjørland B (2015). Classical databases and knowledge organization, Journal of the Association for Information Science and Technology, 66:8, (1559-1575), Online publication date: 1-Aug-2015.
  422. Smith G Recent Developments in Quantitative Information Flow (Invited Tutorial) Proceedings of the 2015 30th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (23-31)
  423. Seo B, Maeng S, Lee J and Seo E (2015). DRACO: A Deduplicating FTL for Tangible Extra Capacity, IEEE Computer Architecture Letters, 14:2, (123-126), Online publication date: 1-Jul-2015.
  424. Echavarria-Gregory M and Englehardt J (2015). A predictive Bayesian data-derived multi-modal Gaussian model of sunken oil mass, Environmental Modelling & Software, 69:C, (1-13), Online publication date: 1-Jul-2015.
  425. Jehel P and Cottereau R (2015). On damping created by heterogeneous yielding in the numerical analysis of nonlinear reinforced concrete frame elements, Computers and Structures, 154:C, (192-203), Online publication date: 1-Jul-2015.
  426. Meng F and Chen X (2015). Interval-valued intuitionistic fuzzy multi-criteria group decision making based on cross entropy and 2-additive measures, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 19:7, (2071-2082), Online publication date: 1-Jul-2015.
  427. ACM
    Hasan S and Curry E Tackling variety in event-based systems Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems, (256-265)
  428. Chang W and Koh J Dynamic Facet Hierarchy Constructing for Browsing Web Search Results Efficiently Proceedings of the 28th International Conference on Current Approaches in Applied Artificial Intelligence - Volume 9101, (293-304)
  429. Foster P, Dixon S and Klapuri A (2015). Identifying cover songs using information-theoretic measures of similarity, IEEE/ACM Transactions on Audio, Speech and Language Processing, 23:6, (993-1005), Online publication date: 1-Jun-2015.
  430. Legg P, Rosin P, Marshall D and Morgan J (2015). Feature Neighbourhood Mutual Information for multi-modal image registration, Pattern Recognition, 48:6, (1937-1946), Online publication date: 1-Jun-2015.
  431. Lai K, Topaz M, Goss F and Zhou L (2015). Automated misspelling detection and correction in clinical free-text records, Journal of Biomedical Informatics, 55:C, (188-195), Online publication date: 1-Jun-2015.
  432. Beynon-Davies P (2015). Securing significant patterns, International Journal of Information Management: The Journal for Information Professionals, 35:3, (309-321), Online publication date: 1-Jun-2015.
  433. (2015). On the entropy of couplings, Information and Computation, 242:C, (369-382), Online publication date: 1-Jun-2015.
  434. Weinmann M, Urban S, Hinz S, Jutzi B and Mallet C (2015). Distinctive 2D and 3D features for automated large-scale scene analysis in urban areas, Computers and Graphics, 49:C, (47-57), Online publication date: 1-Jun-2015.
  435. Ke W (2015). Information-theoretic term weighting schemes for document clustering and classification, International Journal on Digital Libraries, 16:2, (145-159), Online publication date: 1-Jun-2015.
  436. Lui L, Terrazas G, Zenil H, Alexander C and Krasnogor N (2015). Complexity measurement based on information theory and kolmogorov complexity, Artificial Life, 21:2, (205-224), Online publication date: 1-May-2015.
  437. Jiantao Jiao , Venkat K, Yanjun Han and Weissman T (2015). Minimax Estimation of Functionals of Discrete Distributions, IEEE Transactions on Information Theory, 61:5, (2835-2885), Online publication date: 1-May-2015.
  438. Butucea C, Delmas J, Dutfoy A and Fischer R (2015). Maximum entropy copula with given diagonal section, Journal of Multivariate Analysis, 137:C, (61-81), Online publication date: 1-May-2015.
  439. Mamta and Hanmandlu M (2015). Multimodal biometric system built on the new entropy function for feature extraction and the Refined Scores as a classifier, Expert Systems with Applications: An International Journal, 42:7, (3702-3723), Online publication date: 1-May-2015.
  440. De I and Sil J (2015). No-reference image quality assessment using interval type 2 fuzzy sets, Applied Soft Computing, 30:C, (441-453), Online publication date: 1-May-2015.
  441. ACM
    Krotofil M, Larsen J and Gollmann D The Process Matters Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, (133-144)
  442. ACM
    Guedes G, Bezerra E, Ogasawara E and Xexéo G Exploring multiple clusterings in attributed graphs Proceedings of the 30th Annual ACM Symposium on Applied Computing, (915-918)
  443. Yu F (2015). Time, space, entropy and life, Optical Memory and Neural Networks, 24:2, (159-164), Online publication date: 1-Apr-2015.
  444. Grover P, Wagner A and Sahai A (2015). Information Embedding and the Triple Role of Control, IEEE Transactions on Information Theory, 61:4, (1539-1549), Online publication date: 1-Apr-2015.
  445. Serratosa F and Cortés X (2015). Interactive graph-matching using active query strategies, Pattern Recognition, 48:4, (1364-1373), Online publication date: 1-Apr-2015.
  446. Lin S and Tomamichel M (2015). Investigating properties of a family of quantum Rényi divergences, Quantum Information Processing, 14:4, (1501-1512), Online publication date: 1-Apr-2015.
  447. Simpson S (2015). Symbolic Dynamics, Theory of Computing Systems, 56:3, (527-543), Online publication date: 1-Apr-2015.
  448. Tang J, Wang H and Yan Y (2015). Learning Hough regression models via bridge partial least squares for object detection, Neurocomputing, 152:C, (236-249), Online publication date: 25-Mar-2015.
  449. Wang Y and Chuang C (2015). Efficient eNB deployment strategy for heterogeneous cells in 4G LTE systems, Computer Networks: The International Journal of Computer and Telecommunications Networking, 79:C, (297-312), Online publication date: 14-Mar-2015.
  450. ACM
    Dutta M, Banerjee S and Bhunia C Two New Schemes to Generate Automatic Variable Key (AVK) to achieve the Perfect Security in Insecure Communication Channel Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015), (1-4)
  451. Reeb D and Wolf M (2015). Tight Bound on Relative Entropy by Entropy Difference, IEEE Transactions on Information Theory, 61:3, (1458-1473), Online publication date: 1-Mar-2015.
  452. Zezhong Xu , Bok-Suk Shin and Klette R (2015). Accurate and Robust Line Segment Extraction Using Minimum Entropy With Hough Transform, IEEE Transactions on Image Processing, 24:3, (813-822), Online publication date: 1-Mar-2015.
  453. Almulla M, Yahyaoui H and Al-Matori K (2015). A new fuzzy hybrid technique for ranking real world Web services, Knowledge-Based Systems, 77:C, (1-15), Online publication date: 1-Mar-2015.
  454. White S and Herbei R (2015). A Monte Carlo approach to quantifying model error in Bayesian parameter estimation, Computational Statistics & Data Analysis, 83:C, (168-181), Online publication date: 1-Mar-2015.
  455. Yang J (2015). Generalized key player problem, Computational & Mathematical Organization Theory, 21:1, (24-47), Online publication date: 1-Mar-2015.
  456. Zadeh L (2015). The Information Principle, Information Sciences: an International Journal, 294:C, (540-549), Online publication date: 10-Feb-2015.
  457. Assecondi S, Ostwald D and Bagshaw A (2015). Reliability of information-based integration of eeg and fmri data, Neural Computation, 27:2, (281-305), Online publication date: 1-Feb-2015.
  458. Skrøvseth S, Augestad K and Ebadollahi S (2015). Data-driven approach for assessing utility of medical tests using electronic medical records, Journal of Biomedical Informatics, 53:C, (270-276), Online publication date: 1-Feb-2015.
  459. Verma R and Sharma B (2015). R-norm entropy on intuitionistic fuzzy sets, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 28:1, (327-335), Online publication date: 1-Jan-2015.
  460. Saha Roy R, Katare R, Ganguly N, Laxman S and Choudhury M (2015). Discovering and understanding word level user intent in Web search queries, Web Semantics: Science, Services and Agents on the World Wide Web, 30:C, (22-38), Online publication date: 1-Jan-2015.
  461. Chłopkowski M and Walkowiak R (2015). A general purpose lossless data compression method for GPU, Journal of Parallel and Distributed Computing, 75:C, (40-52), Online publication date: 1-Jan-2015.
  462. Yamamoto K, Ninomiya S, Kimura Y, Hashimoto A, Yoshioka Y and Kameoka T (2015). Strawberry cultivar identification and quality evaluation on the basis of multiple fruit appearance features, Computers and Electronics in Agriculture, 110:C, (233-240), Online publication date: 1-Jan-2015.
  463. Li Z, Gu J, Zhuang H, Kang L, Zhao X and Guo Q (2015). Adaptive molecular docking method based on information entropy genetic algorithm, Applied Soft Computing, 26:C, (299-302), Online publication date: 1-Jan-2015.
  464. Zavadskas E, Turskis Z and Bagočius V (2015). Multi-criteria selection of a deep-water port in the Eastern Baltic Sea, Applied Soft Computing, 26:C, (180-192), Online publication date: 1-Jan-2015.
  465. Tian J (2014). New property of a generalized Hölder's inequality and its applications, Information Sciences: an International Journal, 288:C, (45-54), Online publication date: 20-Dec-2014.
  466. Garg A, Ma T and Nguyên H On communication cost of distributed statistical estimation and dimensionality Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2, (2726-2734)
  467. ACM
    Wang Y and Chuang C A Two-Phase Heuristic for Base Station Placement in Long Term Evolution (LTE) Networks with Cell Heterogeneity Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, (407-412)
  468. ACM
    Hasan S and Curry E Thematic event processing Proceedings of the 15th International Middleware Conference, (109-120)
  469. Wu Z (2014). Analysis of correlation structures in the Synechocystis PCC6803 genome, Computational Biology and Chemistry, 53:PA, (49-58), Online publication date: 1-Dec-2014.
  470. Wang W, Fan Y and Li R (2014). Optimal binary codes and binary construction of quantum codes, Frontiers of Computer Science: Selected Publications from Chinese Universities, 8:6, (1024-1031), Online publication date: 1-Dec-2014.
  471. Kornai A (2014). Resolving the Infinitude Controversy, Journal of Logic, Language and Information, 23:4, (481-492), Online publication date: 1-Dec-2014.
  472. Katz D and Bommarito M (2014). Measuring the complexity of the law, Artificial Intelligence and Law, 22:4, (337-374), Online publication date: 1-Dec-2014.
  473. ACM
    Bogomolov A, Lepri B, Staiano J, Oliver N, Pianesi F and Pentland A Once Upon a Crime Proceedings of the 16th International Conference on Multimodal Interaction, (427-434)
  474. ACM
    Liakos P, Papakonstantinopoulou K and Sioutis M Pushing the Envelope in Graph Compression Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, (1549-1558)
  475. Chen Y, Wu Y and Tzeng W (2014). Preserving user query privacy in cloud-based security services, Journal of Computer Security, 22:6, (997-1024), Online publication date: 1-Nov-2014.
  476. Karbasi A, Salavati A, Shokrollahi A and Varshney L (2014). Noise facilitation in associative memories of exponential capacity, Neural Computation, 26:11, (2493-2526), Online publication date: 1-Nov-2014.
  477. Zhang Z and Grabchak M (2014). Nonparametric estimation of küllback-leibler divergence, Neural Computation, 26:11, (2570-2593), Online publication date: 1-Nov-2014.
  478. Kasarapu P, De La Banda M and Konagurthu A (2014). On representing protein folding patterns using non-linear parametric curves, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 11:6, (1218-1228), Online publication date: 1-Nov-2014.
  479. Xu J and Wu D (2014). Gamma rate theory for causal rate control in source coding and video coding, Journal of Visual Communication and Image Representation, 25:8, (1886-1893), Online publication date: 1-Nov-2014.
  480. Mamta and Hanmandlu M (2014). A new entropy function and a classifier for thermal face recognition, Engineering Applications of Artificial Intelligence, 36:C, (269-286), Online publication date: 1-Nov-2014.
  481. (2014). Reducing the gap between experts' knowledge and data, Data & Knowledge Engineering, 94:PA, (1-37), Online publication date: 1-Nov-2014.
  482. Tang J and Mat Isa N (2014). Adaptive Image Enhancement based on Bi-Histogram Equalization with a clipping limit, Computers and Electrical Engineering, 40:8, (86-103), Online publication date: 1-Nov-2014.
  483. Merigó J, Casanovas M and Palacios-Marqués D (2014). Linguistic group decision making with induced aggregation operators and probabilistic information, Applied Soft Computing, 24:C, (669-678), Online publication date: 1-Nov-2014.
  484. Hadj Taieb M, Ben Aouicha M and Ben Hamadou A (2014). A new semantic relatedness measurement using WordNet features, Knowledge and Information Systems, 41:2, (467-497), Online publication date: 1-Nov-2014.
  485. ACM
    Kell S In Search of Types Proceedings of the 2014 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, (227-241)
  486. ACM
    Christensen J Imagined time Proceedings of the 9th Audio Mostly: A Conference on Interaction With Sound, (1-8)
  487. Lucia A, Penta M, Oliveto R, Panichella A and Panichella S (2014). Labeling source code with information retrieval methods, Empirical Software Engineering, 19:5, (1383-1420), Online publication date: 1-Oct-2014.
  488. ACM
    Jin H, Sakai T and Yatani K ReviewCollage Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services, (349-358)
  489. ACM
    Sen S and Maitra S (2014). Three levels three dimensional compact coding, ACM SIGARCH Computer Architecture News, 42:2, (9-14), Online publication date: 15-Sep-2014.
  490. Dubois E, Bortolaso C, Appert D and Gauffre G (2014). An MDE-based framework to support the development of Mixed Interactive Systems, Science of Computer Programming, 89:PB, (199-221), Online publication date: 1-Sep-2014.
  491. El Makhtari S, Moussaoui M and Samadi H (2014). Improved Turbo Decoding Using Soft Combining Principle, Wireless Personal Communications: An International Journal, 78:2, (1115-1127), Online publication date: 1-Sep-2014.
  492. ACM
    Xu J, Wickramarathne T, Chawla N, Grey E, Steinhaeuser K, Keller R, Drake J and Lodge D Improving management of aquatic invasions by integrating shipping network, ecological, and environmental data Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, (1699-1708)
  493. Schaefer C, Hienert D and Gottron T Normalized relevance distance - a stable metric for computing semantic relatedness over reference corpora Proceedings of the Twenty-first European Conference on Artificial Intelligence, (789-794)
  494. ACM
    Srirangam Narashiman A, Vasirani M, Prasad R and Aberer K A cost-benefit analysis of data processing architectures for the smart grid Proceedings of the 2014 ACM international workshop on Wireless and mobile technologies for smart cities, (91-100)
  495. Huang Y and Kou G (2014). A kernel entropy manifold learning approach for financial data analysis, Decision Support Systems, 64:C, (31-42), Online publication date: 1-Aug-2014.
  496. Toscani G (2014). Rényi Entropies and Nonlinear Diffusion Equations, Acta Applicandae Mathematicae: an international survey journal on applying mathematics and mathematical applications, 132:1, (595-604), Online publication date: 1-Aug-2014.
  497. ACM
    Ferreira L, Pereira L and Toledo C A multi-population genetic algorithm for procedural generation of levels for platform games Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation, (45-46)
  498. ACM
    de Lira V, Rinzivillo S, Renso C, Times V and Tedesco P Investigating semantic regularity of human mobility lifestyle Proceedings of the 18th International Database Engineering & Applications Symposium, (314-317)
  499. Verma R and Sharma B (2014). A new measure of inaccuracy with its application to multi-criteria decision making under intuitionistic fuzzy environment, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 27:4, (1811-1824), Online publication date: 1-Jul-2014.
  500. Li Q, Zhao X, Lin R and Chen B (2014). Relative entropy method for fuzzy multiple attribute decision making and its application to software quality evaluation, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 26:4, (1687-1693), Online publication date: 1-Jul-2014.
  501. Wang Y and Wiebe V (2014). Big Data Analytics on the Characteristic Equilibrium of Collective Opinions in Social Networks, International Journal of Cognitive Informatics and Natural Intelligence, 8:3, (29-44), Online publication date: 1-Jul-2014.
  502. Gu Y, Yang Z, Xu G, Nakano M, Toyoda M and Kitsuregawa M (2014). Exploration on efficient similar sentences extraction, World Wide Web, 17:4, (595-626), Online publication date: 1-Jul-2014.
  503. García-Vergara S and Howard A Three-Dimensional Fitt's Law Model Used to Predict Movement Time in Serious Games for Rehabilitation Proceedings of the 6th International Conference on Virtual, Augmented and Mixed Reality. Applications of Virtual and Augmented Reality - Volume 8526, (287-297)
  504. ACM
    Langer F and Oswald E A self-learning approach for validation of communication in embedded systems Proceedings of the 3rd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, (38-44)
  505. Ivanova I and Leydesdorff L (2014). A simulation model of the Triple Helix of university---industry---government relations and the decomposition of the redundancy, Scientometrics, 99:3, (927-948), Online publication date: 1-Jun-2014.
  506. Affeldt R, Hagiwara M and Sénizergues J (2014). Formalization of Shannon's Theorems, Journal of Automated Reasoning, 53:1, (63-103), Online publication date: 1-Jun-2014.
  507. Salto C, Luna F and Alba E (2014). Enhancing distributed EAs by a proactive strategy, Cluster Computing, 17:2, (219-229), Online publication date: 1-Jun-2014.
  508. Fattah M (2014). A hybrid machine learning model for multi-document summarization, Applied Intelligence, 40:4, (592-600), Online publication date: 1-Jun-2014.
  509. Ignatova I, French A, Immonen E, Frolov R and Weckström M (2014). Equilibrating errors, Biological Cybernetics, 108:3, (305-320), Online publication date: 1-Jun-2014.
  510. Simpson J and Simpson M (2014). Entropy Metrics for System Identification and Analysis, Systems Engineering, 17:2, (140-156), Online publication date: 1-Jun-2014.
  511. Varshney L Engineering for problems of excess Proceedings of the IEEE 2014 International Symposium on Ethics in Engineering, Science, and Technology, (1-5)
  512. Thompson E and Anderson T (2014). A CUDA implementation of the Continuous Space Language Model, The Journal of Supercomputing, 68:1, (65-86), Online publication date: 1-Apr-2014.
  513. Park H (2014). Mapping election campaigns through negative entropy, Scientometrics, 99:1, (187-197), Online publication date: 1-Apr-2014.
  514. Swar B and Khan G (2014). Mapping ICT knowledge infrastructure in South Asia, Scientometrics, 99:1, (117-137), Online publication date: 1-Apr-2014.
  515. Leydesdorff L, Park H and Lengyel B (2014). A routine for measuring synergy in university---industry---government relations, Scientometrics, 99:1, (27-35), Online publication date: 1-Apr-2014.
  516. Wu G, Chang H, Wang L and Truong T (2014). Constructing rate 1/p systematic binary quasi-cyclic codes based on the matroid theory, Designs, Codes and Cryptography, 71:1, (47-56), Online publication date: 1-Apr-2014.
  517. Hilbert M (2014). How much of the global information and communication explosion is driven by more, and how much by better technology?, Journal of the Association for Information Science and Technology, 65:4, (856-861), Online publication date: 1-Apr-2014.
  518. Hilbert M (2014). Technological information inequality as an incessantly moving target, Journal of the Association for Information Science and Technology, 65:4, (821-835), Online publication date: 1-Apr-2014.
  519. Tamvakis A, Trygonis V, Miritzis J, Tsirtsis G and Spatharis S (2014). Optimizing biodiversity prediction from abiotic parameters, Environmental Modelling & Software, 53:C, (112-120), Online publication date: 1-Mar-2014.
  520. Vallim R, Filho J, de Mello R, de Carvalho A and Gama J (2014). Unsupervised density-based behavior change detection in data streams, Intelligent Data Analysis, 18:2, (181-201), Online publication date: 1-Mar-2014.
  521. Leydesdorff L and Zhou P (2014). Measuring the knowledge-based economy of China in terms of synergy among technological, organizational, and geographic attributes of firms, Scientometrics, 98:3, (1703-1719), Online publication date: 1-Mar-2014.
  522. Ngo T and Huisman M Quantitative Security Analysis for Programs with Low Input and Noisy Output Proceedings of the 6th International Symposium on Engineering Secure Software and Systems - Volume 8364, (77-94)
  523. ACM
    Brown C, Efstratiou C, Leontiadis I, Quercia D and Mascolo C Tracking serendipitous interactions Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, (1072-1081)
  524. ACM
    Hörr C, Lindinger E and Brunnett G (2014). Machine learning based typology development in archaeology, Journal on Computing and Cultural Heritage , 7:1, (1-23), Online publication date: 13-Feb-2014.
  525. Golan A (2014). Information Dynamics, Minds and Machines, 24:1, (19-36), Online publication date: 1-Feb-2014.
  526. Canfora G, Cerulo L, Cimitile M and Di Penta M (2014). How changes affect software entropy, Empirical Software Engineering, 19:1, (1-38), Online publication date: 1-Feb-2014.
  527. Leydesdorff L and Ivanova I (2014). Mutual redundancies in interhuman communication systems, Journal of the Association for Information Science and Technology, 65:2, (386-399), Online publication date: 1-Feb-2014.
  528. ACM
    Haramaty E and Sudan M Deterministic compression with uncertain priors Proceedings of the 5th conference on Innovations in theoretical computer science, (377-386)
  529. Kaleli C (2014). An entropy-based neighbor selection approach for collaborative filtering, Knowledge-Based Systems, 56:C, (273-280), Online publication date: 1-Jan-2014.
  530. Morie J Avatar appearance as prima facie non-verbal communication Nonverbal Communication in Virtual Worlds, (77-102)
  531. Teitsma M, Sandberg J, Schreiber G, Wielinga B and van Hage W (2014). Engineering ontologies for question answering, Applied Ontology, 9:1, (1-25), Online publication date: 1-Jan-2014.
  532. Muggleton S (2014). Alan Turing and the development of Artificial Intelligence, AI Communications, 27:1, (3-10), Online publication date: 1-Jan-2014.
  533. Heisz J, Vakorin V, Ross B, Levine B and McIntosh A (2014). A trade-off between local and distributed information processing associated with remote episodic versus semantic memory, Journal of Cognitive Neuroscience, 26:1, (41-53), Online publication date: 1-Jan-2014.
  534. Hamann H, Schmickl T and Crailsheim K (2014). Analysis of swarm behaviors based on an inversion of the fluctuation theorem, Artificial Life, 20:1, (77-93), Online publication date: 1-Jan-2014.
  535. Sachdeva M and Kumar K (2014). A traffic cluster entropy based approach to distinguish DDoS attacks from flash event using DETER testbed, ISRN Communications and Networking, 2014, (2-2), Online publication date: 1-Jan-2014.
  536. Taghia J and Martin R (2014). Objective Intelligibility Measures Based on Mutual Information for Speech Subjected to Speech Enhancement Processing, IEEE/ACM Transactions on Audio, Speech and Language Processing, 22:1, (6-16), Online publication date: 1-Jan-2014.
  537. Chen Q, Li L and Wang Y (2014). Amplitudes of mono-component signals and the generalized sampling functions, Signal Processing, 94, (255-263), Online publication date: 1-Jan-2014.
  538. Yiakoumettis C, Doulamis N, Miaoulis G and Ghazanfarpour D (2014). Active learning of user's preferences estimation towards a personalized 3D navigation of geo-referenced scenes, Geoinformatica, 18:1, (27-62), Online publication date: 1-Jan-2014.
  539. Galindo C and Monserrat F (2014). Evaluation codes defined by finite families of plane valuations at infinity, Designs, Codes and Cryptography, 70:1-2, (189-213), Online publication date: 1-Jan-2014.
  540. Hoang T, McIver A, Meinicke L, Morgan C, Sloane A and Susatyo E (2012). Abstractions of non-interference security: probabilistic versus possibilistic, Formal Aspects of Computing, 26:1, (169-194), Online publication date: 1-Jan-2014.
  541. Kiayias A, Raekow Y, Russell A and Shashidhar N (2014). A One-Time Stegosystem and Applications to Efficient Covert Communication, Journal of Cryptology, 27:1, (23-44), Online publication date: 1-Jan-2014.
  542. Mukherjee S, Majumder B, Piplai A and Das S An Adaptive Differential Evolution Based Fuzzy Approach for Edge Detection in Color and Grayscale Images 4th International Conference on Swarm, Evolutionary, and Memetic Computing - Volume 8297, (260-273)
  543. Moioli R and Husbands P (2013). Neuronal assembly dynamics in supervised and unsupervised learning scenarios, Neural Computation, 25:11, (2934-2975), Online publication date: 1-Nov-2013.
  544. Beusekom J, Shafait F and Breuel T (2013). Automatic authentication of color laser print-outs using machine identification codes, Pattern Analysis & Applications, 16:4, (663-678), Online publication date: 1-Nov-2013.
  545. Graening L and Ramsay T Quantifying Flow Field Distances Based on a Compact Streamline Representation Proceedings of the 14th International Conference on Intelligent Data Engineering and Automated Learning --- IDEAL 2013 - Volume 8206, (445-454)
  546. Li S, Zhao Y, Qu B and Wang J (2013). Image scrambling based on chaotic sequences and Veginère cipher, Multimedia Tools and Applications, 66:3, (573-588), Online publication date: 1-Oct-2013.
  547. ACM
    Tomasi F, Bartolini I, Condello F, Esposti M, Garulli V and Viale M Towards a taxonomy of suspected forgery in authorship attribution field Proceedings of the 1st International Workshop on Collaborative Annotations in Shared Environment: metadata, vocabularies and techniques in the Digital Humanities, (1-8)
  548. Li W and Feng M (2013). Solution attractor of local search in travelling salesman problem, International Journal of Metaheuristics, 2:3, (201-233), Online publication date: 1-Sep-2013.
  549. Leydesdorff L (2013). Statistics for the dynamic analysis of scientometric data, Scientometrics, 96:3, (731-741), Online publication date: 1-Sep-2013.
  550. Marstaller L, Hintze A and Adami C (2013). The evolution of representation in simple cognitive networks, Neural Computation, 25:8, (2079-2107), Online publication date: 1-Aug-2013.
  551. López-Pérez D, Chu X, Vasilakos A and Claussen H (2013). On distributed and coordinated resource allocation for interference mitigation in self-organizing LTE networks, IEEE/ACM Transactions on Networking, 21:4, (1145-1158), Online publication date: 1-Aug-2013.
  552. ACM
    Ke W Information-theoretic term weighting schemes for document clustering Proceedings of the 13th ACM/IEEE-CS joint conference on Digital libraries, (143-152)
  553. ACM
    Salto C, Luna F and Alba E Enhancing distributed EAs using proactivity Proceedings of the 15th annual conference companion on Genetic and evolutionary computation, (1747-1748)
  554. Curto C, Itskov V, Morrison K, Roth Z and Walker J (2013). Combinatorial neural codes from a mathematical coding theory perspective, Neural Computation, 25:7, (1891-1925), Online publication date: 1-Jul-2013.
  555. ACM
    Yoo S, Harman M and Clark D (2013). Fault localization prioritization, ACM Transactions on Software Engineering and Methodology, 22:3, (1-29), Online publication date: 1-Jul-2013.
  556. ACM
    Walden J, Doyle M, Garns R and Hart Z An informatics perspective on computational thinking Proceedings of the 18th ACM conference on Innovation and technology in computer science education, (4-9)
  557. Stranieri A, Abawajy J, Kelarev A, Huda S, Chowdhury M and Jelinek H (2013). An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy, Artificial Intelligence in Medicine, 58:3, (185-193), Online publication date: 1-Jul-2013.
  558. Niu G, Jitkrittum W, Dai B, Hachiya H and Sugiyama M Squared-loss mutual information regularization Proceedings of the 30th International Conference on International Conference on Machine Learning - Volume 28, (III-10-III-18)
  559. Goerg G Forecastable component analysis Proceedings of the 30th International Conference on International Conference on Machine Learning - Volume 28, (II-64-II-72)
  560. ACM
    Ben-Sasson E, Gabizon A, Kaplan Y, Kopparty S and Saraf S A new family of locally correctable codes based on degree-lifted algebraic geometry codes Proceedings of the forty-fifth annual ACM symposium on Theory of Computing, (833-842)
  561. Livi L and Rizzi A (2013). Graph ambiguity, Fuzzy Sets and Systems, 221, (24-47), Online publication date: 1-Jun-2013.
  562. Koegel M, Radig M, Hyko E and Mauve M (2013). A Detailed View on the Spatio-Temporal Information Content and the Arithmetic Coding of Discrete Trajectories, Mobile Networks and Applications, 18:3, (373-388), Online publication date: 1-Jun-2013.
  563. Szalapski T and Madria S (2013). On compressing data in wireless sensor networks for energy efficiency and real time delivery, Distributed and Parallel Databases, 31:2, (151-182), Online publication date: 1-Jun-2013.
  564. Serin E, Sumengen S and Balcisoy S (2013). Representational image generation for 3D objects, The Visual Computer: International Journal of Computer Graphics, 29:6-8, (675-684), Online publication date: 1-Jun-2013.
  565. ACM
    Petkov V, Rajagopal R and Obraczka K (2013). Characterizing per-application network traffic using entropy, ACM Transactions on Modeling and Computer Simulation, 23:2, (1-25), Online publication date: 1-May-2013.
  566. ACM
    Valecha R, Sharman R, Rao H and Upadhyaya S (2013). A Dispatch-Mediated Communication Model for Emergency Response Systems, ACM Transactions on Management Information Systems, 4:1, (1-25), Online publication date: 1-Apr-2013.
  567. Zhu W, Ma J and Faust O (2013). A Comparative Study of Different Entropies for Spectrum Sensing Techniques, Wireless Personal Communications: An International Journal, 69:4, (1719-1733), Online publication date: 1-Apr-2013.
  568. García J, Rodriguez-Sánchez R, Fdez-Valdivia J, Robinson-García N and Torres-Salinas D (2013). Benchmarking research performance at the university level with information theoretic measures, Scientometrics, 95:1, (435-452), Online publication date: 1-Apr-2013.
  569. Guo Y, Lee M and Zeng G (2013). Polar quantum channel coding with optical multi-qubit entangling gates for capacity-achieving channels, Quantum Information Processing, 12:4, (1659-1676), Online publication date: 1-Apr-2013.
  570. Wang R, Miao D, Xu F and Zhang H (2013). Information interpretation of knowledge granularity, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 24:2, (395-404), Online publication date: 1-Mar-2013.
  571. Prettico G and Acin A (2013). Can bipartite classical information be activated?, Quantum Information & Computation, 13:3-4, (245-265), Online publication date: 1-Mar-2013.
  572. ACM
    Waterhouse T Pay by the bit Proceedings of the 2013 conference on Computer supported cooperative work, (623-638)
  573. ACM
    Hailpern J, Danilevsky M, Harris A, Suh S, LaBotz R and Karahalios K ACES Proceedings of the 2013 conference on Computer supported cooperative work, (515-526)
  574. Harnik D, Kat R, Margalit O, Sotnikov D and Traeger A To Zip or not to Zip Proceedings of the 11th USENIX conference on File and Storage Technologies, (229-242)
  575. ACM
    Craswell N, Billerbeck B, Fetterly D and Najork M Robust query rewriting using anchor data Proceedings of the sixth ACM international conference on Web search and data mining, (335-344)
  576. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan J and Natarajan P (2013). Local Shannon entropy measure with statistical tests for image randomness, Information Sciences: an International Journal, 222, (323-342), Online publication date: 1-Feb-2013.
  577. Guo H, Brown R and Rasmussen R Workflow resource pattern modelling and visualization Proceedings of the Thirty-Sixth Australasian Computer Science Conference - Volume 135, (31-40)
  578. Almlöf J and Björk G (2013). Fidelity as a figure of merit in quantum error correction, Quantum Information & Computation, 13:1-2, (9-20), Online publication date: 1-Jan-2013.
  579. Mahmoudzadeh A and Kashou N (2013). Evaluation of interpolation effects on upsampling and accuracy of cost functions-based optimized automatic image registration, Journal of Biomedical Imaging, 2013, (16-16), Online publication date: 1-Jan-2013.
  580. ACM
    Han B, Cook P and Baldwin T (2013). Lexical normalization for social media text, ACM Transactions on Intelligent Systems and Technology, 4:1, (1-27), Online publication date: 1-Jan-2013.
  581. Gupta P, Mehlawat M and Saxena A (2013). Hybrid optimization models of portfolio selection involving financial and ethical considerations, Knowledge-Based Systems, 37, (318-337), Online publication date: 1-Jan-2013.
  582. Xu S and Wilde M (2013). Sequential, successive, and simultaneous decoders for entanglement-assisted classical communication, Quantum Information Processing, 12:1, (641-683), Online publication date: 1-Jan-2013.
  583. Mampaey M and Vreeken J (2013). Summarizing categorical data by clustering attributes, Data Mining and Knowledge Discovery, 26:1, (130-173), Online publication date: 1-Jan-2013.
  584. Shah S and Reddy S Context aware ontology based information extraction Proceedings of the 18th International Conference on Management of Data, (32-43)
  585. Tolk A, Diallo S and Padilla J Semiotics, entropy, and interoperability of simulation systems Proceedings of the Winter Simulation Conference, (1-12)
  586. Giggins H and Brankovic L VICUS Proceedings of the Tenth Australasian Data Mining Conference - Volume 134, (139-148)
  587. Pao H, Chou Y and Lee Y Malicious URL Detection Based on Kolmogorov Complexity Estimation Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01, (380-387)
  588. Chou C, Kampa K, Mehta S, Tungaraza R, Chaovalitwongse W and Grabowski T Information-Theoretic based feature selection for multi-voxel pattern analysis of fMRI data Proceedings of the 2012 international conference on Brain Informatics, (196-208)
  589. Maull K, Saldivar M and Sumner T (2012). Automated approaches to characterizing educational digital library usage, International Journal on Digital Libraries, 13:1, (51-64), Online publication date: 1-Dec-2012.
  590. ACM
    Harman M, Mansouri S and Zhang Y (2012). Search-based software engineering, ACM Computing Surveys, 45:1, (1-61), Online publication date: 1-Nov-2012.
  591. ACM
    Zhou D, Truran M, Brailsford T, Wade V and Ashman H (2012). Translation techniques in cross-language information retrieval, ACM Computing Surveys, 45:1, (1-44), Online publication date: 1-Nov-2012.
  592. ACM
    Duan H, Kiciman E and Zhai C Click patterns Proceedings of the 21st ACM international conference on Information and knowledge management, (1035-1044)
  593. ACM
    Naval S, Laxmi V, Gaur M and Vinod P ESCAPE Proceedings of the Fifth International Conference on Security of Information and Networks, (197-200)
  594. ACM
    Le Thi H and Safavi-Naini R An information theoretic framework for web inference detection Proceedings of the 5th ACM workshop on Security and artificial intelligence, (25-36)
  595. ACM
    Albers M Communication as reducing uncertainty Proceedings of the 30th ACM international conference on Design of communication, (1-8)
  596. ACM
    Crandall J and Oliveira D Holographic vulnerability studies Proceedings of the 2012 New Security Paradigms Workshop, (141-152)
  597. Foix S, Kriegel S, Fuchs S, Alenyà G and Torras C Information-gain view planning for free-form object reconstruction with a 3d ToF camera Proceedings of the 14th international conference on Advanced Concepts for Intelligent Vision Systems, (36-47)
  598. Neme A, Hernández S, Nido A and Islas C Multilayer perceptrons as classifiers guided by mutual information and trained with genetic algorithms Proceedings of the 13th international conference on Intelligent Data Engineering and Automated Learning, (176-183)
  599. Bandi C and Bertsimas D (2012). Tractable stochastic analysis in high dimensions via robust optimization, Mathematical Programming: Series A and B, 134:1, (23-70), Online publication date: 1-Aug-2012.
  600. Howell J, Anisimov P, Dowling J and Boyd R (2012). Single and biphoton imaging and high dimensional quantum communication, Quantum Information Processing, 11:4, (925-948), Online publication date: 1-Aug-2012.
  601. Špelič D and Žalik B (2012). Lossless Compression of Threshold-Segmented Medical Images, Journal of Medical Systems, 36:4, (2349-2357), Online publication date: 1-Aug-2012.
  602. Naïja Y and Sinaoui K (2012). Interpretability-based validity methods for clustering results evaluation, Journal of Intelligent Information Systems, 39:1, (109-139), Online publication date: 1-Aug-2012.
  603. Pang B and Ravi S Revisiting the predictability of language Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, (1489-1499)
  604. ACM
    Mendoza M, Lopes F and Bazzan A Reverse engineering of GRNs Proceedings of the 14th annual conference on Genetic and evolutionary computation, (185-192)
  605. Yarrow S, Challis E and Seriès P (2012). Fisher and shannon information in finite neural populations, Neural Computation, 24:7, (1740-1780), Online publication date: 1-Jul-2012.
  606. Noto K, Brodley C and Slonim D (2012). FRaC, Data Mining and Knowledge Discovery, 25:1, (109-133), Online publication date: 1-Jul-2012.
  607. McIver A, Meinicke L and Morgan C A Kantorovich-Monadic Powerdomain for Information Hiding, with Probability and Nondeterminism Proceedings of the 2012 27th Annual IEEE/ACM Symposium on Logic in Computer Science, (461-470)
  608. Hartmanis J Turing machine-inspired computer science results Proceedings of the 8th Turing Centenary conference on Computability in Europe: how the world computes, (276-282)
  609. Pérez-Rodríguez J, Arroyo-Peña A and García-Pedrajas N A comparative study of content statistics of coding regions in an evolutionary computation framework for gene prediction Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence, (206-215)
  610. Gouws S Deep unsupervised feature learning for natural language processing Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: Student Research Workshop, (48-53)
  611. Gärtner S and Schneider K A method for prioritizing end-user feedback for requirements engineering Proceedings of the 5th International Workshop on Co-operative and Human Aspects of Software Engineering, (47-49)
  612. Zhang Z (2012). Entropy estimation in turing's perspective, Neural Computation, 24:5, (1368-1389), Online publication date: 1-May-2012.
  613. ACM
    Wagstaff K, Panetta J, Ansar A, Greeley R, Pendleton Hoffer M, Bunte M and Schörghofer N (2012). Dynamic Landmarking for Surface Feature Identification and Change Detection, ACM Transactions on Intelligent Systems and Technology, 3:3, (1-22), Online publication date: 1-May-2012.
  614. Christensen J and Paşca M Instance-driven attachment of semantic annotations over conceptual hierarchies Proceedings of the 13th Conference of the European Chapter of the Association for Computational Linguistics, (503-513)
  615. Kawano Y, Ohshima H and Tanaka K On-the-Fly generation of facets as navigation signs for web objects Proceedings of the 17th international conference on Database Systems for Advanced Applications - Volume Part I, (382-396)
  616. Ballatore A, Wilson D and Bertolotto M A holistic semantic similarity measure for viewports in interactive maps Proceedings of the 11th international conference on Web and Wireless Geographical Information Systems, (151-166)
  617. ACM
    Goldreich O, Juba B and Sudan M (2012). A theory of goal-oriented communication, Journal of the ACM, 59:2, (1-65), Online publication date: 1-Apr-2012.
  618. He W, Hu G and Zhou Y (2012). Large-scale IP network behavior anomaly detection and identification using substructure-based approach and multivariate time series mining, Telecommunications Systems, 50:1, (1-13), Online publication date: 1-Apr-2012.
  619. Chavez-Alvarez R, Chavoya A and Lopez-Martin C Finding the minimal gene regulatory function in the presence of undefined transitional states using a genetic algorithm Proceedings of the 9th international conference on Information Processing in Cells and Tissues, (238-249)
  620. ACM
    Kristensson P and Vertanen K The potential of dwell-free eye-typing for fast assistive gaze communication Proceedings of the Symposium on Eye Tracking Research and Applications, (241-244)
  621. ACM
    Holmqvist K, Nyström M and Mulvey F Eye tracker data quality Proceedings of the Symposium on Eye Tracking Research and Applications, (45-52)
  622. Larrauri J A new algorithm for lossless compression applied to two-dimensional static images Proceedings of the 6th international conference on Communications and Information Technology, and Proceedings of the 3rd World conference on Education and Educational Technologies, (56-60)
  623. Vigila S and Muneeswaran K (2012). Key generation based on elliptic curve over finite prime field, International Journal of Electronic Security and Digital Forensics, 4:1, (65-81), Online publication date: 1-Feb-2012.
  624. Mahmood A and Kuppa M (2012). A novel pruning approach using expert knowledge for data-specific pruning, Engineering with Computers, 28:1, (21-30), Online publication date: 1-Jan-2012.
  625. Zhang X, Ding Z, Zhu C, Chen W and Peng Q View-Dependent line drawings for 3d scenes Transactions on Edutainment VII, (151-160)
  626. Rabbi A and Fazel-Rezai R (2012). A fuzzy logic system for seizure onset detection in intracranial EEG, Computational Intelligence and Neuroscience, 2012, (1-1), Online publication date: 1-Jan-2012.
  627. Qin Y, Ji J and Liu C (2012). An entropy-based multiobjective evolutionary algorithm with an enhanced elite mechanism, Applied Computational Intelligence and Soft Computing, 2012, (17-17), Online publication date: 1-Jan-2012.
  628. Kapodistria S and Psarrakos G (2012). Some extensions of the residual lifetime and its connection to the cumulative residual entropy, Probability in the Engineering and Informational Sciences, 26:1, (129-146), Online publication date: 1-Jan-2012.
  629. Kwon K, Park H, So M and Leydesdorff L (2012). Has globalization strengthened South Korea's national research system? National and international dynamics of the Triple Helix of scientific co-authorship relationships in South Korea, Scientometrics, 90:1, (163-176), Online publication date: 1-Jan-2012.
  630. Khan G, Cho S and Park H (2012). A comparison of the Daegu and Edinburgh musical industries, Scientometrics, 90:1, (85-99), Online publication date: 1-Jan-2012.
  631. Wang Z (2012). Entropy on covers, Data Mining and Knowledge Discovery, 24:1, (288-309), Online publication date: 1-Jan-2012.
  632. Takada T (2012). Mining local and tail dependence structures based on pointwise mutual information, Data Mining and Knowledge Discovery, 24:1, (78-102), Online publication date: 1-Jan-2012.
  633. Wiggins A and Sawyer S (2012). Intellectual diversity and the faculty composition of ischools, Journal of the American Society for Information Science and Technology, 63:1, (8-21), Online publication date: 1-Jan-2012.
  634. ACM
    Lau R, Liao S, Kwok R, Xu K, Xia Y and Li Y (2012). Text mining and probabilistic language modeling for online review spam detection, ACM Transactions on Management Information Systems, 2:4, (1-30), Online publication date: 1-Dec-2011.
  635. Ulltveit-Moe N and Oleshchuk V (2011). A Composite Privacy Leakage Indicator, Wireless Personal Communications: An International Journal, 61:3, (511-526), Online publication date: 1-Dec-2011.
  636. Khan G, Moon J and Park H (2011). Network of the core, Scientometrics, 89:3, (759-779), Online publication date: 1-Dec-2011.
  637. Senthilvelan M, Yu M, Iancu D, Sima M and Schulte M (2011). CORDIC instructions for LDPC decoding on SDR platforms, Analog Integrated Circuits and Signal Processing, 69:2-3, (191-206), Online publication date: 1-Dec-2011.
  638. Herrera Alcántara O and González Mendoza M Optimization of parameterized compactly supported orthogonal wavelets for data compression Proceedings of the 10th international conference on Artificial Intelligence: advances in Soft Computing - Volume Part II, (510-521)
  639. Yasuoka H and Terauchi T (2011). On bounding problems of quantitative information flow, Journal of Computer Security, 19:6, (1029-1082), Online publication date: 1-Nov-2011.
  640. ACM
    Secord A, Lu J, Finkelstein A, Singh M and Nealen A (2011). Perceptual models of viewpoint preference, ACM Transactions on Graphics, 30:5, (1-12), Online publication date: 1-Oct-2011.
  641. ACM
    Maiti S, Mandal D and Mitra P Tackling content spamming with a term weighting scheme Proceedings of the 2011 Joint Workshop on Multilingual OCR and Analytics for Noisy Unstructured Text Data, (1-5)
  642. Ramamoorthy V, Silaghi M, Matsui T, Hirayama K and Yokoo M The design of cryptographic S-boxes using CSPs Proceedings of the 17th international conference on Principles and practice of constraint programming, (54-68)
  643. Weiss A, Mirnig N, Buchner R, Förster F and Tscheligi M Transferring human-human interaction studies to HRI scenarios in public space Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part II, (230-247)
  644. Adami C, Qian J, Rupp M and Hintze A (2011). Information content of colored motifs in complex networks, Artificial Life, 17:4, (375-390), Online publication date: 1-Sep-2011.
  645. Bush S (2011). Toward in vivo nanoscale communication networks, Frontiers of Computer Science in China, 5:3, (316-326), Online publication date: 1-Sep-2011.
  646. ACM
    Korshunov P and Ooi W (2011). Video quality for face detection, recognition, and tracking, ACM Transactions on Multimedia Computing, Communications, and Applications, 7:3, (1-21), Online publication date: 1-Aug-2011.
  647. Asnar A, Magaña M and Felhauer T (2011). Wireless Network Coding with Cooperative Diversity, Wireless Personal Communications: An International Journal, 59:4, (765-788), Online publication date: 1-Aug-2011.
  648. Leydesdorff L (2011). "Structuration" by intellectual organization, Scientometrics, 88:2, (499-520), Online publication date: 1-Aug-2011.
  649. Harré M, Bossomaier T and Snyder A (2011). The Development of Human Expertise in a Complex Environment, Minds and Machines, 21:3, (449-464), Online publication date: 1-Aug-2011.
  650. VanderKraats N and Banerjee A (2011). A finite-sample, distribution-free, probabilistic lower bound on mutual information, Neural Computation, 23:7, (1862-1898), Online publication date: 1-Jul-2011.
  651. Yang L, Dang Z and Fischer T (2011). Information gain of black-box testing, Formal Aspects of Computing, 23:4, (513-539), Online publication date: 1-Jul-2011.
  652. Hehner E (2011). A probability perspective, Formal Aspects of Computing, 23:4, (391-419), Online publication date: 1-Jul-2011.
  653. Han B and Baldwin T Lexical normalisation of short text messages Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1, (368-378)
  654. ACM
    Iacono J A static optimality transformation with applications to planar point location Proceedings of the twenty-seventh annual symposium on Computational geometry, (21-26)
  655. Brasselet R, Johansson R and Arleo A Isometric coding of spiking haptic signals by peripheral somatosensory neurons Proceedings of the 11th international conference on Artificial neural networks conference on Advances in computational intelligence - Volume Part I, (528-536)
  656. ACM
    Goldreich O, Juba B and Sudan M A theory of goal-oriented communication Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing, (299-300)
  657. ACM
    Meng Z and Smith G Calculating bounds on information leakage using two-bit patterns Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security, (1-12)
  658. Rao R, Patel B and Parnichkun M (2011). Industrial robot selection using a novel decision making method considering objective and subjective preferences, Robotics and Autonomous Systems, 59:6, (367-375), Online publication date: 1-Jun-2011.
  659. Saleem W, Belyaev A, Wang D and Seidel H (2011). SMI 2011, Computers and Graphics, 35:3, (580-585), Online publication date: 1-Jun-2011.
  660. Razlighi Q, Rahman M and Kehtarnavaz N (2011). Fast computation methods for estimation of image spatial entropy, Journal of Real-Time Image Processing, 6:2, (137-142), Online publication date: 1-Jun-2011.
  661. Shinzato P and Wolf D (2011). A Road Following Approach Using Artificial Neural Networks Combinations, Journal of Intelligent and Robotic Systems, 62:3-4, (527-546), Online publication date: 1-Jun-2011.
  662. Birdsall W (2011). Human capabilities and information and communication technology, Ethics and Information Technology, 13:2, (93-106), Online publication date: 1-Jun-2011.
  663. Le Treust M and Lasaulce S The price of re-establishing perfect, almost perfect or public monitoring in games with arbitrary monitoring Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (548-557)
  664. Naïja Y and Blibech K HS-measure Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (274-280)
  665. ACM
    Paek T and Hsu B Sampling representative phrase sets for text entry experiments Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (2477-2480)
  666. Villmann T and Haase S (2011). Divergence-based vector quantization, Neural Computation, 23:5, (1343-1392), Online publication date: 1-May-2011.
  667. Sun J, Xu Z, Liu J and Yao Y (2011). An objective visual security assessment for cipher-images based on local entropy, Multimedia Tools and Applications, 53:1, (75-95), Online publication date: 1-May-2011.
  668. Dorfinger P, Panholzer G and John W Entropy estimation for real-time encrypted traffic identification Proceedings of the Third international conference on Traffic monitoring and analysis, (164-171)
  669. Brasselet R, Johansson R and Arleo A (2011). Quantifying neurotransmission reliability through metrics-based information analysis, Neural Computation, 23:4, (852-881), Online publication date: 1-Apr-2011.
  670. ACM
    Backes M, Berg M and Köpf B Non-uniform distributions in quantitative information-flow Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, (367-375)
  671. ACM
    Largeron C, Moulin C and Géry M Entropy based feature selection for text categorization Proceedings of the 2011 ACM Symposium on Applied Computing, (924-928)
  672. ACM
    Phithakkitnukoon S and Dantu R (2011). Towards ubiquitous computing with call prediction, ACM SIGMOBILE Mobile Computing and Communications Review, 15:1, (52-64), Online publication date: 7-Mar-2011.
  673. ACM
    Mirnig N, Weiss A and Tscheligi M A communication structure for human-robot itinerary requests Proceedings of the 6th international conference on Human-robot interaction, (205-206)
  674. ACM
    Rytting C, Zajic D, Rodrigues P, Wayland S, Hettick C, Buckwalter T and Blake C (2011). Spelling Correction for Dialectal Arabic Dictionary Lookup, ACM Transactions on Asian Language Information Processing, 10:1, (1-15), Online publication date: 1-Mar-2011.
  675. Cohen S, Simmons R and Smith N (2011). Products of weighted logic programs, Theory and Practice of Logic Programming, 11:2-3, (263-296), Online publication date: 1-Mar-2011.
  676. Lima M, Machado J and Crisóstomo M (2011). Experimental backlash study in mechanical manipulators, Robotica, 29:2, (211-219), Online publication date: 1-Mar-2011.
  677. Khan S (2011). Mosaic-Net, The Journal of Supercomputing, 55:3, (321-366), Online publication date: 1-Mar-2011.
  678. Maity S and Kundu M (2011). Perceptually adaptive spread transform image watermarking scheme using Hadamard transform, Information Sciences: an International Journal, 181:3, (450-465), Online publication date: 1-Feb-2011.
  679. Dimitrov A, Lazar A and Victor J (2011). Information theory in neuroscience, Journal of Computational Neuroscience, 30:1, (1-5), Online publication date: 1-Feb-2011.
  680. Vicente R, Wibral M, Lindner M and Pipa G (2011). Transfer entropy--a model-free measure of effective connectivity for the neurosciences, Journal of Computational Neuroscience, 30:1, (45-67), Online publication date: 1-Feb-2011.
  681. Dimitrov A, Cummins G, Baker A and Aldworth Z (2011). Characterizing the fine structure of a neural sensory code through information distortion, Journal of Computational Neuroscience, 30:1, (163-179), Online publication date: 1-Feb-2011.
  682. Grudin J (2011). Human-computer interaction, Annual Review of Information Science and Technology, 45:1, (367-430), Online publication date: 1-Jan-2011.
  683. Alvim M, Andrés M, Chatzikokolakis K and Palamidessi C Quantitative information flow and applications to differential privacy Foundations of security analysis and design VI, (211-230)
  684. Köpf B and Basin D (2011). Automatically deriving information-theoretic bounds for adaptive side-channel attacks, Journal of Computer Security, 19:1, (1-31), Online publication date: 1-Jan-2011.
  685. Souihli O and Ohtsuki T (2011). Typical set cognitive sensing, ISRN Communications and Networking, 2011, (1-10), Online publication date: 1-Jan-2011.
  686. Dwyer P (2011). Measuring Collective Cognition in Online Collaboration Venues, International Journal of e-Collaboration, 7:1, (47-61), Online publication date: 1-Jan-2011.
  687. Chew P, Bader B, Helmreich S, Abdelali A and Verzi S (2011). An information-theoretic, vector-space-model approach to cross-language information retrieval*, Natural Language Engineering, 17:1, (37-70), Online publication date: 1-Jan-2011.
  688. Kabamba P, Owens P and Ulsoy A (2011). The von neumann threshold of self-reproducing systems, Robotica, 29:1, (123-135), Online publication date: 1-Jan-2011.
  689. Doran D and Gokhale S (2011). Web robot detection techniques, Data Mining and Knowledge Discovery, 22:1-2, (183-210), Online publication date: 1-Jan-2011.
  690. Batenburg R and Koopman G (2010). The conditional benefits of early user involvement at employee self-service applications in four Dutch ministries, International Journal of Business Information Systems, 5:2, (162-174), Online publication date: 1-Dec-2010.
  691. Rao R, Yadav N, Vahia M, Joglekar H, Adhikari R and Mahadevan I (2010). Entropy, the indus script, and language, Computational Linguistics, 36:4, (795-805), Online publication date: 1-Dec-2010.
  692. Lee R, Jonathan P and Ziman P (2010). A response to richard sproat on random systems, writing, and entropy, Computational Linguistics, 36:4, (791-794), Online publication date: 1-Dec-2010.
  693. ACM
    Bacon D (2010). Ubiquity symposium 'What is computation?', Ubiquity, 2010:December, Online publication date: 1-Dec-2010.
  694. Shim W, Kim G and Kim S (2010). A distributed sinkhole detection method using cluster analysis, Expert Systems with Applications: An International Journal, 37:12, (8486-8491), Online publication date: 1-Dec-2010.
  695. Tavana M, Sodenkamp M and Pirdashti M (2010). A fuzzy opportunity and threat aggregation approach in multicriteria decision analysis, Fuzzy Optimization and Decision Making, 9:4, (455-492), Online publication date: 1-Dec-2010.
  696. Azoulay-Schwartz R and Dor-Shiffer D (2010). The impact of available information on negotiation results, Annals of Mathematics and Artificial Intelligence, 60:3-4, (311-340), Online publication date: 1-Dec-2010.
  697. Petingi L New reliability model and its application to assess the performance of sensor networks Proceedings of the 2010 international conference on Mathematical models for engineering science, (259-266)
  698. Petingi L Reliability study of mesh networks modeled as random graphs Proceedings of the 2010 international conference on Mathematical models for engineering science, (85-93)
  699. Estrada O, Arrazola J and Osorio M A possibilistic intuitionistic logic Proceedings of the 9th Mexican international conference on Advances in artificial intelligence: Part I, (362-373)
  700. Scharrenbach T, d'Amato C, Fanizzi N, Grütter R, Waldvogel B and Bernstein A Default logics for plausible reasoning with controversial axioms Proceedings of the 6th International Conference on Uncertainty Reasoning for the Semantic Web - Volume 654, (105-109)
  701. ACM
    Yang L, Dang Z, Fischer T, Kim M and Tan L Entropy and software systems Proceedings of the FSE/SDP workshop on Future of software engineering research, (427-432)
  702. ACM
    Denning P (2010). Ubiquity symposium 'What is computation?', Ubiquity, 2010:November, Online publication date: 1-Nov-2010.
  703. Micali S, Peikert C, Sudan M and Wilson D (2010). Optimal error correction for computationally bounded noise, IEEE Transactions on Information Theory, 56:11, (5673-5680), Online publication date: 1-Nov-2010.
  704. Kim S (2010). Cooperative concatenated coding in multi-hop multiple access relay networks, IEEE Transactions on Communications, 58:11, (3305-3315), Online publication date: 1-Nov-2010.
  705. Ma L Information as discursive construct Proceedings of the 73rd ASIS&T Annual Meeting on Navigating Streams in an Information Ecosystem - Volume 47, (1-4)
  706. ACM
    Weir M, Aggarwal S, Collins M and Stern H Testing metrics for password creation policies by attacking large sets of revealed passwords Proceedings of the 17th ACM conference on Computer and communications security, (162-175)
  707. Tanik U (2010). SYNERGISTIC VALIDATION METHODOLOGY FOR KNOWLEDGE-BASED ENGINEERING SYSTEMS, Journal of Integrated Design & Process Science, 14:4, (1-24), Online publication date: 1-Oct-2010.
  708. Huang A, Abugharbieh R and Tam R (2010). A novel rotationally invariant region-based hidden Markov model for efficient 3-D image segmentation, IEEE Transactions on Image Processing, 19:10, (2737-2748), Online publication date: 1-Oct-2010.
  709. Clarkson M and Schneider F (2010). Hyperproperties, Journal of Computer Security, 18:6, (1157-1210), Online publication date: 21-Sep-2010.
  710. Zhang L, He C and He W Characterization of cerebral infarction in multiple channel EEG recordings based on quantifications of time-frequency representation Proceedings of the 2010 international conference on Life system modeling and simulation and intelligent computing, and 2010 international conference on Intelligent computing for sustainable energy and environment: Part III, (84-90)
  711. Wang T, Heinzelman W and Seyedi A (2010). Link energy minimization in IR-UWB based wireless networks, IEEE Transactions on Wireless Communications, 9:9, (2800-2811), Online publication date: 1-Sep-2010.
  712. Hsieh M and Wilde M (2010). Entanglement-assisted communication of classical and quantum information, IEEE Transactions on Information Theory, 56:9, (4682-4704), Online publication date: 1-Sep-2010.
  713. Sarwate A and Gastpar M (2010). A little feedback can simplify sensor network cooperation, IEEE Journal on Selected Areas in Communications, 28:7, (1159-1168), Online publication date: 1-Sep-2010.
  714. ACM
    May M The semantic level in HMS design Proceedings of the 28th Annual European Conference on Cognitive Ergonomics, (67-74)
  715. ACM
    van der Sluis F and van den Broek E Using complexity measures in information retrieval Proceedings of the third symposium on Information interaction in context, (383-388)
  716. Lee I (2010). Sample-spacings-based density and entropy estimators for spherically invariant multidimensional data, Neural Computation, 22:8, (2208-2227), Online publication date: 1-Aug-2010.
  717. Doshi V, Shah D, Médard M and Effros M (2010). Functional compression through graph coloring, IEEE Transactions on Information Theory, 56:8, (3901-3917), Online publication date: 1-Aug-2010.
  718. Wu Y and Verdú S (2010). Rényi information dimension, IEEE Transactions on Information Theory, 56:8, (3721-3748), Online publication date: 1-Aug-2010.
  719. Ong L and Motani M (2010). Optimal routing for decode-forward in cooperative wireless networks, IEEE Transactions on Communications, 58:8, (2345-2355), Online publication date: 1-Aug-2010.
  720. ACM
    Liang G and Vaidya N Brief announcement Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing, (396-397)
  721. ACM
    Zhang D, Wang J, Cai D and Lu J Self-taught hashing for fast similarity search Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval, (18-25)
  722. ACM
    Milton J and Kennedy P Entropy profiles of ranked and random populations Proceedings of the 12th annual conference companion on Genetic and evolutionary computation, (1843-1850)
  723. Effros M, Goldsmith A and Liang Y (2010). Generalizing capacity, IEEE Transactions on Information Theory, 56:7, (3069-3087), Online publication date: 1-Jul-2010.
  724. Song Q, Yang X, Chai Soh Y and Min Wang Z (2010). An information-theoretic fuzzy C-spherical shells clustering algorithm, Fuzzy Sets and Systems, 161:13, (1755-1773), Online publication date: 1-Jul-2010.
  725. Sun Z and Hoogs A (2010). Image Comparison by Compound Disjoint Information with Applications to Perceptual Visual Quality Assessment, Image Registration and Tracking, International Journal of Computer Vision, 88:3, (461-488), Online publication date: 1-Jul-2010.
  726. Colombo M (2010). How "Authentic Intentionality" can be Enabled, Minds and Machines, 20:2, (183-202), Online publication date: 1-Jul-2010.
  727. Medeiros C, Joliveau M, Jomier G and Vuyst F (2010). Managing sensor traffic data and forecasting unusual behaviour propagation, Geoinformatica, 14:3, (279-305), Online publication date: 1-Jul-2010.
  728. ACM
    Gao S, Fu H and Anyanwu K An agglomerative query model for discovery in linked data Procceedings of the 13th International Workshop on the Web and Databases, (1-6)
  729. ACM
    Köhler H, Zhou X, Sadiq S, Shu Y and Taylor K Sampling dirty data for matching attributes Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, (63-74)
  730. Skory A and Eskenazi M Predicting cloze task quality for vocabulary training Proceedings of the NAACL HLT 2010 Fifth Workshop on Innovative Use of NLP for Building Educational Applications, (49-56)
  731. Ibrahim F and Zaki M (2010). Design and implementation of a block-based lossless watermarking scheme, International Journal of Electronic Security and Digital Forensics, 3:2, (164-185), Online publication date: 1-Jun-2010.
  732. Scaglione A, Moxon K and Foffani G (2010). General poisson exact breakdown of the mutual information to study the role of correlations in populations of neurons, Neural Computation, 22:6, (1445-1467), Online publication date: 1-Jun-2010.
  733. ACM
    Jordà S, Julià C and Gallardo D (2010). Interactive surfaces and tangibles, XRDS: Crossroads, The ACM Magazine for Students, 16:4, (21-28), Online publication date: 1-Jun-2010.
  734. Madiman M and Tetali P (2010). Information inequalities for joint distributions, with interpretations and applications, IEEE Transactions on Information Theory, 56:6, (2699-2713), Online publication date: 1-Jun-2010.
  735. Minh T, Wolters L and Epema D A Realistic Integrated Model of Parallel System Workloads Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, (464-473)
  736. ACM
    Brun Y Improving impact of self-adaptation and self-management research through evaluation methodology Proceedings of the 2010 ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems, (1-9)
  737. Karray M (2010). Analytical evaluation of QoS in the downlink of OFDMA wireless cellular networks serving streaming and elastic traffic, IEEE Transactions on Wireless Communications, 9:5, (1799-1807), Online publication date: 1-May-2010.
  738. Polyanskiy Y, Poor H and Verdú S (2010). Channel coding rate in the finite blocklength regime, IEEE Transactions on Information Theory, 56:5, (2307-2359), Online publication date: 1-May-2010.
  739. Sanchez-Cruz H (2010). Proposing a new code by considering pieces of discrete straight lines in contour shapes, Journal of Visual Communication and Image Representation, 21:4, (311-324), Online publication date: 1-May-2010.
  740. Toftegaard T (2010). Next Generation Wireless Infrastructure, Wireless Personal Communications: An International Journal, 53:3, (465-479), Online publication date: 1-May-2010.
  741. ACM
    Sundar S, Xu Q and Bellur S Designing interactivity in media interfaces Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (2247-2256)
  742. Saoudi S, Derham T, Ait-Idir T and Coupe P (2010). A fast soft bit error rate estimation method, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Apr-2010.
  743. Somaraju R and Trumpf J (2010). Degrees of freedom of a communication channel, IEEE Transactions on Information Theory, 56:4, (1560-1573), Online publication date: 1-Apr-2010.
  744. Yang E and He D (2010). Interactive encoding and decoding for one way learning, IEEE Transactions on Information Theory, 56:4, (1808-1824), Online publication date: 1-Apr-2010.
  745. Zhong P, Yang W and Liang P (2010). The asymptotic equipartition property for asymptotic circular markov chains, Probability in the Engineering and Informational Sciences, 24:2, (279-288), Online publication date: 1-Apr-2010.
  746. Chang C, Cheng J, Huang T, Huang X and Lee D A bit-stuffing algorithm for crosstalk avoidance in high speed switching Proceedings of the 29th conference on Information communications, (839-847)
  747. Goodfellow I, Koenig N, Muja M, Pantofaru C, Sorokin A and Takayama L Help me help you Proceedings of the 5th ACM/IEEE international conference on Human-robot interaction, (187-188)
  748. Li D and Kwong C (2010). Understanding latent semantic indexing: A topological structure analysis using Q-analysis, Journal of the American Society for Information Science and Technology, 61:3, (592-608), Online publication date: 1-Mar-2010.
  749. Schwartz M and Bruck J (2010). On the capacity of the precision-resolution system, IEEE Transactions on Information Theory, 56:3, (1028-1037), Online publication date: 1-Mar-2010.
  750. Rudra A Algorithmic coding theory Algorithms and theory of computation handbook, (27-27)
  751. D'Amico G and Di Biase G (2010). Generalized concentration/inequality indices of economic systems evolving in time, WSEAS Transactions on Mathematics, 9:2, (140-149), Online publication date: 1-Feb-2010.
  752. Cai K, Immink K, Lee Y, Qin Z and Chong T (2010). Distance-enhancing constrained codes with parity-check constraints for data storage channels, IEEE Journal on Selected Areas in Communications, 28:2, (208-217), Online publication date: 1-Feb-2010.
  753. Jamieson C and Fair I (2010). Construction of constrained codes for state-independent decoding, IEEE Journal on Selected Areas in Communications, 28:2, (193-199), Online publication date: 1-Feb-2010.
  754. Knoblauch A, Palm G and Sommer F (2010). Memory capacities for synaptic and structural plasticity, Neural Computation, 22:2, (289-341), Online publication date: 1-Feb-2010.
  755. McDonnell M, Burkitt A, Grayden D, Meffin H and Grant A (2010). A channel model for inferring the optimal number of electrodes for future cochlear implants, IEEE Transactions on Information Theory, 56:2, (928-940), Online publication date: 1-Feb-2010.
  756. Galas D, Nykter M, Carter G, Price N and Shmulevich I (2010). Biological information as set-based complexity, IEEE Transactions on Information Theory, 56:2, (667-677), Online publication date: 1-Feb-2010.
  757. Pu Y, Zhou J and Yuan X (2010). Fractional differential mask, IEEE Transactions on Image Processing, 19:2, (491-511), Online publication date: 1-Feb-2010.
  758. Soofi E, Zhao H and Nazareth D (2010). Information measures, WIREs Computational Statistics, 2:1, (75-86), Online publication date: 19-Jan-2010.
  759. Demirezen Z, Bryant B, Skjellum A and Tanik M (2010). DESIGN SPACE ANALYSIS IN MODEL-DRIVEN ENGINEERING, Journal of Integrated Design & Process Science, 14:1, (1-15), Online publication date: 1-Jan-2010.
  760. Wilczyński B and Hvidsten T (2010). A Computer Scientist's Guide to the Regulatory Genome, Fundamenta Informaticae, 103:1-4, (323-332), Online publication date: 1-Jan-2010.
  761. Seddiqui M and Aono M Metric of intrinsic information content for measuring semantic similarity in an ontology Proceedings of the Seventh Asia-Pacific Conference on Conceptual Modelling - Volume 110, (89-96)
  762. Turney P and Pantel P (2010). From frequency to meaning, Journal of Artificial Intelligence Research, 37:1, (141-188), Online publication date: 1-Jan-2010.
  763. Salvail L, Peev M, Diamanti E, Alléaume R, Lütkenhaus N and Länger T (2010). Security of trusted repeater quantum key distribution networks, Journal of Computer Security, 18:1, (61-87), Online publication date: 1-Jan-2010.
  764. Denkowski M and Chlebiej M (2010). Image Sequence Stabilization Through Model Based Registration, Annales UMCS, Informatica, 10:1, (79-86), Online publication date: 1-Jan-2010.
  765. Weir M and Rice M (2010). TRII, EURASIP Journal on Bioinformatics and Systems Biology, 2010, (1-14), Online publication date: 1-Jan-2010.
  766. Wo T, Noemm M, Hao D and Hoeher P (2010). Iterative processing for superposition mapping, Journal of Electrical and Computer Engineering, 2010, (1-13), Online publication date: 1-Jan-2010.
  767. Capra E, Francalanci C and Merlo F (2010). The economics of community open source software projects, Advances in Software Engineering, 2010, (1-17), Online publication date: 1-Jan-2010.
  768. He G, Cottatellucci L and Debbah M (2010). The waterfilling game-theoretical framework for distributed wireless network information flow, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Jan-2010.
  769. Chen S, Hu R and Xiong N (2010). A multimedia application, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Jan-2010.
  770. Schlegel C, Burnashev M and Truhachev D (2010). Generalized superposition modulation and iterative demodulation, Journal of Electrical and Computer Engineering, 2010, (1-9), Online publication date: 1-Jan-2010.
  771. Ma X, Choi G and Zhang W (2010). Network modulation, EURASIP Journal on Wireless Communications and Networking, 2010, (1-15), Online publication date: 1-Jan-2010.
  772. Meng T and Buck J (2010). Rate distortion bounds on passive sonar performance, IEEE Transactions on Signal Processing, 58:1, (326-336), Online publication date: 1-Jan-2010.
  773. Pehkonen P, Wong G and Toronen P (2010). Heuristic Bayesian Segmentation for Discovery of Coexpressed Genes within Genomic Regions, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 7:1, (37-49), Online publication date: 1-Jan-2010.
  774. Liang C (2010). Downward communications enhancement using a robust broadcasting mechanism, Expert Systems with Applications: An International Journal, 37:1, (741-755), Online publication date: 1-Jan-2010.
  775. Furner J (2010). Philosophy and information studies, Annual Review of Information Science and Technology, 44:1, (159-200), Online publication date: 1-Jan-2010.
  776. Kanan H and Moin M Face recognition using entropy weighted patch PCA array under variation of lighting conditions from a single sample image per person Proceedings of the 7th international conference on Information, communications and signal processing, (391-395)
  777. Onken A, Grünewälder S and Obermayer K Correlation coefficients are insufficient for analyzing spike count dependencies Proceedings of the 22nd International Conference on Neural Information Processing Systems, (1383-1391)
  778. Chen H and Malacaria P The optimum leakage principle for analyzing multi-threaded programs Proceedings of the 4th international conference on Information theoretic security, (177-193)
  779. Wang Y, Zhang D and Tsumoto S (2009). Preface: Cognitive Informatics, Cognitive Computing, and Their Denotational Mathematical Foundations (II), Fundamenta Informaticae, 90:4, (.1-.7), Online publication date: 1-Dec-2009.
  780. Risku H, Mayr E and Smuc M (2009). Situated interaction and cognition in the wild, wild world, Journal of Mobile Multimedia, 5:4, (287-300), Online publication date: 1-Dec-2009.
  781. Lucio-Arias D and Leydesdorff L (2009). An indicator of research front activity: Measuring intellectual organization as uncertainty reduction in document sets, Journal of the American Society for Information Science and Technology, 60:12, (2488-2498), Online publication date: 1-Dec-2009.
  782. ACM
    Fisher C, Lauria E and Matheus C (2009). An Accuracy Metric, Journal of Data and Information Quality, 1:3, (1-21), Online publication date: 1-Dec-2009.
  783. Borade S, Nakiboǧlu B and Zheng L (2009). Unequal error protection, IEEE Transactions on Information Theory, 55:12, (5511-5539), Online publication date: 1-Dec-2009.
  784. Razlighi Q, Kehtarnavaz N and Nosratinia A (2009). Computation of image spatial entropy using quadrilateral Markov random field, IEEE Transactions on Image Processing, 18:12, (2629-2639), Online publication date: 1-Dec-2009.
  785. Raiesdana S, Golpayegani S, Firoozabadi S and Mehvari Habibabadi J (2009). On the discrimination of patho-physiological states in epilepsy by means of dynamical measures, Computers in Biology and Medicine, 39:12, (1073-1082), Online publication date: 1-Dec-2009.
  786. Stine R (2009). Coding theory, WIREs Computational Statistics, 1:3, (261-270), Online publication date: 1-Dec-2009.
  787. Bellaïche M and Grégoire J SYN flooding attack detection based on entropy computing Proceedings of the 28th IEEE conference on Global telecommunications, (1079-1084)
  788. ACM
    Park Y and Gates S Towards real-time measurement of customer satisfaction using automatically generated call transcripts Proceedings of the 18th ACM conference on Information and knowledge management, (1387-1396)
  789. El Moucary C and El Hassan B (2009). A novel blind digital watermarking technique for Stegano-encrypting information using nine-ac-coefficient prediction algorithm with an innovative security strategy, WSEAS Transactions on Signal Processing, 5:11, (359-368), Online publication date: 1-Nov-2009.
  790. ACM
    Dang E, Wu H, Luk R and Wong K (2009). Building a framework for the probability ranking principle by a family of expected weighted rank, ACM Transactions on Information Systems, 27:4, (1-37), Online publication date: 1-Nov-2009.
  791. Khandoker A, Gubbi J and Palaniswami M (2009). Automated scoring of obstructive sleep apnea and hypopnea events using short-term electrocardiogram recordings, IEEE Transactions on Information Technology in Biomedicine, 13:6, (1057-1067), Online publication date: 1-Nov-2009.
  792. Yard J and Devetak I (2009). Optimal quantum source coding with quantum side information at the encoder and decoder, IEEE Transactions on Information Theory, 55:11, (5339-5351), Online publication date: 1-Nov-2009.
  793. Hayashi M (2009). Information spectrum approach to second-order coding rate in channel coding, IEEE Transactions on Information Theory, 55:11, (4947-4966), Online publication date: 1-Nov-2009.
  794. He G, Betz S and Debbah M Game-theoretic deployment design of small-cell OFDM networks Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, (1-6)
  795. Kuriyama T and Kuniyoshi Y Co-creation of human-robot interaction rules through response prediction and habituation/dishabituation Proceedings of the 2009 IEEE/RSJ international conference on Intelligent robots and systems, (4990-4995)
  796. Li Y, Bitsakos K, Fermuller C and Aloimonos Y Real-time shape retrieval for robotics using skip Tri-grams Proceedings of the 2009 IEEE/RSJ international conference on Intelligent robots and systems, (4731-4738)
  797. ACM
    Retzinger K Confounding definitions Proceedings of the 27th ACM international conference on Design of communication, (245-250)
  798. ACM
    Guha S, McGregor A and Venkatasubramanian S (2009). Sublinear estimation of entropy and information distances, ACM Transactions on Algorithms, 5:4, (1-16), Online publication date: 1-Oct-2009.
  799. Tchamkerten A, Chandar V and Wornell G (2009). Communication under strong asynchronism, IEEE Transactions on Information Theory, 55:10, (4508-4528), Online publication date: 1-Oct-2009.
  800. Lim Y, Zou Y, Lee J and Chan S (2009). Time-interleaved analog-to-digital-converter compensation using multichannel filters, IEEE Transactions on Circuits and Systems Part I: Regular Papers, 56:10, (2234-2247), Online publication date: 1-Oct-2009.
  801. Li K, Zhao M and Fu X (2009). Projective synchronization of driving-response systems and its application to secure communication, IEEE Transactions on Circuits and Systems Part I: Regular Papers, 56:10, (2280-2291), Online publication date: 1-Oct-2009.
  802. Goldstein I and Uzuner Ö (2009). Specializing for predicting obesity and its co-morbidities, Journal of Biomedical Informatics, 42:5, (873-886), Online publication date: 1-Oct-2009.
  803. Kripakaran P and Smith I (2009). Configuring and enhancing measurement systems for damage identification, Advanced Engineering Informatics, 23:4, (424-432), Online publication date: 1-Oct-2009.
  804. Lu L and Wen-an Z QoE-based busy time management structure for data services Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (4216-4219)
  805. Karami A, Attari M and Tavakoli H Multi layer perceptron neural networks decoder for LDPC codes Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (476-479)
  806. Qureshi T and Zighed D A soft discretization technique for fuzzy decision trees using resampling Proceedings of the 10th international conference on Intelligent data engineering and automated learning, (586-593)
  807. Mason J, Shepherd M and Duffy J Classifying Web Pages by Genre Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01, (458-465)
  808. Grinshpoun T, Gal-Oz N, Meisels A and Gudes E CCR Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01, (34-41)
  809. Lamy-Bergot C, Fracchia R, Vehkaperä J, Sutinen T, Piri E, Mazzotti M, Panza G, Feher G, Jeney G and Amon P Optimisation of multimedia over wireless IP links via X-layer design Proceedings of the 5th International ICST Mobile Multimedia Communications Conference, (1-5)
  810. Kuhnapfel T, Tan T, Venkatesh S and Igel B Distributed Audio Network for Speech Enhancement in Challenging Noise Backgrounds Proceedings of the 2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, (308-313)
  811. Dembski W and Marks R (2009). Conservation of information in search, IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 39:5, (1051-1061), Online publication date: 1-Sep-2009.
  812. Piantanida P, Matz G and Duhamel P (2009). Outage behavior of discrete memoryless channels under channel estimation errors, IEEE Transactions on Information Theory, 55:9, (4221-4239), Online publication date: 1-Sep-2009.
  813. Ryabko B (2009). Compression-based methods for nonparametric prediction and estimation of some characteristics of time series, IEEE Transactions on Information Theory, 55:9, (4309-4315), Online publication date: 1-Sep-2009.
  814. König R, Renner R and Schaffner C (2009). The operational meaning of min- and max-entropy, IEEE Transactions on Information Theory, 55:9, (4337-4347), Online publication date: 1-Sep-2009.
  815. Axvig N, Dreher D, Morrison K, Psota E, Pérez L and Walker J (2009). Analysis of connections between pseudocodewords, IEEE Transactions on Information Theory, 55:9, (4099-4107), Online publication date: 1-Sep-2009.
  816. Haenggi M, Andrews J, Baccelli F, Dousse O and Franceschetti M (2009). Stochastic geometry and random graphs for the analysis and design of wireless networks, IEEE Journal on Selected Areas in Communications, 27:7, (1029-1046), Online publication date: 1-Sep-2009.
  817. Son J and Alves-Foss J (2009). A formal framework for real-time information flow analysis, Computers and Security, 28:6, (421-432), Online publication date: 1-Sep-2009.
  818. Cruz-Ramírez N, Acosta-Mesa H, Carrillo-Calvet H and Barrientos-Martínez R (2009). Discovering interobserver variability in the cytodiagnosis of breast cancer using decision trees and Bayesian networks, Applied Soft Computing, 9:4, (1331-1342), Online publication date: 1-Sep-2009.
  819. Delicado P and Smrekar M (2009). Measuring non-linear dependence for two random variables distributed along a curve, Statistics and Computing, 19:3, (255-269), Online publication date: 1-Sep-2009.
  820. Fang X Are you becoming a diabetic? a data mining approach Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 5, (18-22)
  821. Ochoa X and Duval E (2009). Automatic evaluation of metadata quality in digital repositories, International Journal on Digital Libraries, 10:2-3, (67-91), Online publication date: 1-Aug-2009.
  822. Wang Y, Kinsner W, Anderson J, Zhang D, Yao Y, Sheu P, Tsai J, Pedrycz W, Latombe J, Zadeh L, Patel D and Chan C (2009). A Doctrine of Cognitive Informatics (CI), Fundamenta Informaticae, 90:3, (203-228), Online publication date: 1-Aug-2009.
  823. Wang Y, Zhang D and Tsumoto S (2009). Preface: Cognitive Informatics, Cognitive Computing, and Their Denotational Mathematical Foundations (I), Fundamenta Informaticae, 90:3, (.1-.7), Online publication date: 1-Aug-2009.
  824. Saerens M, Achbany Y, Fouss F and Yen L (2009). Randomized shortest-path problems, Neural Computation, 21:8, (2363-2404), Online publication date: 1-Aug-2009.
  825. Mouton A, De Baets B and Goethals P (2009). Knowledge-based versus data-driven fuzzy habitat suitability models for river management, Environmental Modelling & Software, 24:8, (982-993), Online publication date: 1-Aug-2009.
  826. Poocharoen P and Magaña M (2009). Euclidean Geometry LDPC-VBLAST System Design and Performance Evaluation, Wireless Personal Communications: An International Journal, 50:3, (401-416), Online publication date: 1-Aug-2009.
  827. Mokhtar M Study the performance of mobile WiMAX convolutional turbo code Proceedings of the 13th WSEAS international conference on Communications, (168-171)
  828. ACM
    Just M and Aspinall D Personal choice and challenge questions Proceedings of the 5th Symposium on Usable Privacy and Security, (1-11)
  829. Adami D, Callegari C, Giordano S, Pagano M and Russo F On the use of compression algorithms for the classification of IP flows Proceedings of the 12th international conference on Symposium on Performance Evaluation of Computer & Telecommunication Systems, (355-360)
  830. ACM
    Goudelis G, Tefas A and Pitas I Using mutual information to indicate facial poses in video sequences Proceedings of the ACM International Conference on Image and Video Retrieval, (1-4)
  831. ACM
    Yorukoglu D, Bakis Y and Sezerman U An entropy based heuristic model for predicting functional sub-type divisions of protein families Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers, (2173-2178)
  832. ACM
    Park W and Oh J New entropy model for extraction of structural information from XCS population Proceedings of the 11th Annual conference on Genetic and evolutionary computation, (1283-1290)
  833. Giannakakis G, Tsiaparas N, Papageorgiou C and Nikita K Spectral entropy of dyslexic erp signal by means of adaptive optimal kernel Proceedings of the 16th international conference on Digital Signal Processing, (81-86)
  834. ACM
    Eppstein D (2009). Squarepants in a tree, ACM Transactions on Algorithms, 5:3, (1-24), Online publication date: 1-Jul-2009.
  835. Annapureddy V and Veeravalli V (2009). Gaussian interference networks, IEEE Transactions on Information Theory, 55:7, (3032-3050), Online publication date: 1-Jul-2009.
  836. Arikan E (2009). Channel polarization, IEEE Transactions on Information Theory, 55:7, (3051-3073), Online publication date: 1-Jul-2009.
  837. Ostrovsky R, Rabani Y and Schulman L (2009). Error-correcting codes for automatic control, IEEE Transactions on Information Theory, 55:7, (2931-2941), Online publication date: 1-Jul-2009.
  838. Hanafizadeh P, Hanafizadeh M and Khodabakhshi M (2009). Extracting Core ICT Indicators Using Entropy Method, The Information Society, 25:4, (236-247), Online publication date: 1-Jul-2009.
  839. Wang T and Lee H (2009). Developing a fuzzy TOPSIS approach based on subjective weights and objective weights, Expert Systems with Applications: An International Journal, 36:5, (8980-8985), Online publication date: 1-Jul-2009.
  840. ACM
    Naïja Y and Sinaoui K A novel measure for validating clustering results applied to road traffic Proceedings of the Third International Workshop on Knowledge Discovery from Sensor Data, (105-113)
  841. ACM
    Prakash B, Valler N, Andersen D, Faloutsos M and Faloutsos C BGP-lens Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (1315-1324)
  842. Elnaggar M and Kempf A On a generic entropy measure in physics and information Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (495-499)
  843. Golshani L, Pasha E and Yari G (2009). Some properties of Rényi entropy and Rényi entropy rate, Information Sciences: an International Journal, 179:14, (2426-2433), Online publication date: 15-Jun-2009.
  844. He F, Man H, Kivanc D and McNair B EPSON Proceedings of the 2009 IEEE international conference on Communications, (824-828)
  845. Callegari C, Giordano S and Pagano M On the use of compression algorithms for network anomaly detection Proceedings of the 2009 IEEE international conference on Communications, (636-640)
  846. ACM
    Smith R and Jiang M MILCS in protein structure prediction with default hierarchies Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, (953-956)
  847. Ikeda S and Manton J (2009). Capacity of a single spiking neuron channel, Neural Computation, 21:6, (1714-1748), Online publication date: 1-Jun-2009.
  848. Permuter H, Weissman T and Chen J (2009). Capacity region of the finite-state multiple-access channel with and without feedback, IEEE Transactions on Information Theory, 55:6, (2455-2477), Online publication date: 1-Jun-2009.
  849. Arboretti Giancristofaro R, Bonnini S and Pesarin F (2009). A permutation approach for testing heterogeneity in two-sample categorical variables, Statistics and Computing, 19:2, (209-216), Online publication date: 1-Jun-2009.
  850. Brito I, Meisels A, Meseguer P and Zivan R (2009). Distributed constraint satisfaction with partially known constraints, Constraints, 14:2, (199-234), Online publication date: 1-Jun-2009.
  851. Cockburn D and Kobti Z The effect of social influence on agent specialization in small-world social networks Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (3172-3175)
  852. Mazzapioda M, Cangelosi A and Nolfi S Evolving morphology and control Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (2217-2224)
  853. Marano S, Matta V and Willett P (2009). Distributed detection with censoring sensors under physical layer secrecy, IEEE Transactions on Signal Processing, 57:5, (1976-1986), Online publication date: 1-May-2009.
  854. Sun G, Samarawickrama U, Liang J, Tian C, Tu C and Tran T (2009). Multiple description coding with prediction compensation, IEEE Transactions on Image Processing, 18:5, (1037-1047), Online publication date: 1-May-2009.
  855. Standaert F, Malkin T and Yung M A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks Proceedings of the 28th Annual International Conference on Advances in Cryptology - EUROCRYPT 2009 - Volume 5479, (443-461)
  856. ACM
    Kamvar M, Kellar M, Patel R and Xu Y Computers and iphones and mobile phones, oh my! Proceedings of the 18th international conference on World wide web, (801-810)
  857. ACM
    Guiard Y The problem of consistency in the design of Fitts' law experiments Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (1809-1818)
  858. Wang Y, Zhang D and Tsumoto S (2009). Preface: Cognitive Informatics, Cognitive Computing, and Their Denotational Mathematical Foundations (II), Fundamenta Informaticae, 90:4, (.1-.7), Online publication date: 1-Apr-2009.
  859. Tanaka T, Kaneko T and Aoyagi T (2009). Recurrent infomax generates cell assemblies, neuronal avalanches, and simple cell-like selectivity, Neural Computation, 21:4, (1038-1067), Online publication date: 1-Apr-2009.
  860. Yang Z, Hennig M, Postlethwaite M, Forsythe I and Graham B (2009). Wide-band information transmission at the calyx of held, Neural Computation, 21:4, (991-1017), Online publication date: 1-Apr-2009.
  861. Dai J, Wang L and Jain F (2009). Analysis of defect tolerance in molecular crossbar electronics, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 17:4, (529-540), Online publication date: 1-Apr-2009.
  862. Blumensath T and Davies M (2009). Sampling theorems for signals from the union of finite-dimensional linear subspaces, IEEE Transactions on Information Theory, 55:4, (1872-1882), Online publication date: 1-Apr-2009.
  863. Wang Y, Alajaji F and Linder T (2009). Hybrid digital-analog coding with bandwidth compression for Gaussian source-channel pairs, IEEE Transactions on Communications, 57:4, (997-1012), Online publication date: 1-Apr-2009.
  864. Kumar A and Immink K (2009). Design of close-to-capacity constrained codes for multi-level optical recording, IEEE Transactions on Communications, 57:4, (954-959), Online publication date: 1-Apr-2009.
  865. Shin H and Win M (2009). Gallager's exponent for MIMO channels, IEEE Transactions on Communications, 57:4, (972-985), Online publication date: 1-Apr-2009.
  866. Li Y, Xie M and Goh T (2009). A study of mutual information based feature selection for case based reasoning in software cost estimation, Expert Systems with Applications: An International Journal, 36:3, (5921-5931), Online publication date: 1-Apr-2009.
  867. Topsøe F (2009). Game theoretical optimization inspired by information theory, Journal of Global Optimization, 43:4, (553-564), Online publication date: 1-Apr-2009.
  868. Crandall J, Brevik J, Ye S, Wassermann G, Oliveira D, Su Z, Wu S and Chong F Putting Trojans on the Horns of a Dilemma Transactions on Computational Science IV, (244-262)
  869. Schlotthauer G, Torres M and Rufiner H Pathological voice analysis and classification based on empirical mode decomposition Proceedings of the Second international conference on Development of Multimodal Interfaces: active Listening and Synchrony, (364-381)
  870. Smith G On the Foundations of Quantitative Information Flow Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures - Volume 5504, (288-302)
  871. ACM
    Chen H and Malacaria P Quantifying maximal loss of anonymity in protocols Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, (206-217)
  872. Vu V, Yu B and Kass R (2009). Information in the nonstationary case, Neural Computation, 21:3, (688-703), Online publication date: 1-Mar-2009.
  873. Luo Z and Devetak I (2009). Channel simulation with quantum side information, IEEE Transactions on Information Theory, 55:3, (1331-1342), Online publication date: 1-Mar-2009.
  874. Feng J and Wang Y (2009). 'No representation without information flow', WSEAS Transactions on Computers, 8:3, (494-505), Online publication date: 1-Mar-2009.
  875. Wang Y, Kinsner W, Anderson J, Zhang D, Yao Y, Sheu P, Tsai J, Pedrycz W, Latombe J, Zadeh L, Patel D and Chan C (2009). A Doctrine of Cognitive Informatics (CI), Fundamenta Informaticae, 90:3, (203-228), Online publication date: 1-Mar-2009.
  876. Wang Y, Zhang D and Tsumoto S (2009). Preface: Cognitive Informatics, Cognitive Computing, and Their Denotational Mathematical Foundations (I), Fundamenta Informaticae, 90:3, (.1-.7), Online publication date: 1-Mar-2009.
  877. ACM
    Sudan M (2009). Probabilistically checkable proofs, Communications of the ACM, 52:3, (76-84), Online publication date: 1-Mar-2009.
  878. Afshar P, Wang H and Chai T (2009). An ILC-based adaptive control for general stochastic systems with strictly decreasing entropy, IEEE Transactions on Neural Networks, 20:3, (471-482), Online publication date: 1-Mar-2009.
  879. ACM
    Ikeda Y and Kitamura Y Development of cross-cultural communication tool for Japanese UN volunteers Proceedings of the 2009 international workshop on Intercultural collaboration, (245-248)
  880. Lee G, Odoyo W, Yeom J and Cho B Extraction of key postures using shape contexts Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2, (1311-1314)
  881. Feng J and Xu K A correctness criterion for schema dominance centred on the notion of 'information carrying' Proceedings of the 3rd WSEAS international conference on Computer engineering and applications, (110-116)
  882. ACM
    Anil G and Wiegand R Black-box search by elimination of fitness functions Proceedings of the tenth ACM SIGEVO workshop on Foundations of genetic algorithms, (67-78)
  883. Borruso G Geographical analysis of foreign immigration and spatial patterns in urban areas Transactions on Computational Science VI, (301-323)
  884. Wysotzki F and Geibel P (2009). A new information measure based on example-dependent misclassification costs and its application in decision tree learning, Advances in Artificial Intelligence, 2009, (1-1), Online publication date: 1-Jan-2009.
  885. Tatikonda S and Mitter S (2009). The capacity of channels with feedback, IEEE Transactions on Information Theory, 55:1, (323-349), Online publication date: 1-Jan-2009.
  886. Sabir M, Heath R and Bovik A (2009). Joint source-hannel distortion modeling for MPEG-4 video, IEEE Transactions on Image Processing, 18:1, (90-105), Online publication date: 1-Jan-2009.
  887. Holzer R, Meer H and Bettstetter C On Autonomy and Emergence in Self-Organizing Systems Proceedings of the 3rd International Workshop on Self-Organizing Systems, (157-169)
  888. Faulin J, Gilibert M, Juan A, Vilajosana X and Ruiz R SR-1 Proceedings of the 40th Conference on Winter Simulation, (2708-2716)
  889. ACM
    Yeh J, Wu C, Yu L and Lai Y (2008). Extended probabilistic HAL with close temporal association for psychiatric query document retrieval, ACM Transactions on Information Systems, 27:1, (1-30), Online publication date: 1-Dec-2008.
  890. Xu K, Zhang Z and Bhattacharyya S (2008). Internet traffic behavior profiling for network security monitoring, IEEE/ACM Transactions on Networking, 16:6, (1241-1252), Online publication date: 1-Dec-2008.
  891. ACM
    Kelly D, Raines R, Grimaila M, Baldwin R and Mullins B A survey of state-of-the-art in anonymity metrics Proceedings of the 1st ACM workshop on Network data anonymization, (31-40)
  892. ACM
    Jiang M, Munawar M, Reidemeister T and Ward P Information-theoretic modeling for tracking the health of complex software systems Proceedings of the 2008 conference of the center for advanced studies on collaborative research: meeting of minds, (236-247)
  893. ACM
    Fischer L, Katzenbeisser S and Eckert C Measuring unlinkability revisited Proceedings of the 7th ACM workshop on Privacy in the electronic society, (105-110)
  894. Settles B and Craven M An analysis of active learning strategies for sequence labeling tasks Proceedings of the Conference on Empirical Methods in Natural Language Processing, (1070-1079)
  895. Ravi S and Knight K Attacking decipherment problems optimally with low-order N-gram models Proceedings of the Conference on Empirical Methods in Natural Language Processing, (812-819)
  896. Teßmann M, Eisenacher C, Enders F, Stamminger M and Hastreiter P GPU accelerated normalized mutual information and B-spline transformation Proceedings of the First Eurographics conference on Visual Computing for Biomedicine, (117-124)
  897. Haidacher M, Bruckner S, Kanitsar A and Gröller M Information-based transfer functions for multimodal visualization Proceedings of the First Eurographics conference on Visual Computing for Biomedicine, (101-108)
  898. ACM
    Al-Fedaghi S Modeling communication Proceedings of the 26th annual ACM international conference on Design of communication, (103-110)
  899. ACM
    Dymek M Content strategies of the future Proceedings of the 3rd international conference on Digital Interactive Media in Entertainment and Arts, (420-426)
  900. Gatto R (2008). Some computational aspects of the generalized von Mises distribution, Statistics and Computing, 18:3, (321-331), Online publication date: 1-Sep-2008.
  901. Martinet J, Satoh S, Chiaramella Y and Mulhem P (2008). Media objects for user-centered similarity matching, Multimedia Tools and Applications, 39:2, (263-291), Online publication date: 1-Sep-2008.
  902. Cheng R, Chen J and Xie X (2008). Cleaning uncertain data with quality guarantees, Proceedings of the VLDB Endowment, 1:1, (722-735), Online publication date: 1-Aug-2008.
  903. Lin C, Wang Y, Chen J, Liou Y, Bai Y, Lai I, Chen T, Chiu H and Li Y (2008). Artificial neural network prediction of clozapine response with combined pharmacogenetic and clinical data, Computer Methods and Programs in Biomedicine, 91:2, (91-99), Online publication date: 1-Aug-2008.
  904. ACM
    Tait J Noise and information Proceedings of the second workshop on Analytics for noisy unstructured text data, (1-2)
  905. Wyatt D, Choudhury T and Bilmes J Learning hidden curved exponential family models to infer face-to-face interaction networks from situated speech data Proceedings of the 23rd national conference on Artificial intelligence - Volume 2, (732-738)
  906. ACM
    Kowaliw T Measures of complexity for artificial embryogeny Proceedings of the 10th annual conference on Genetic and evolutionary computation, (843-850)
  907. Chen J and Cheng R Quality-Aware Probing of Uncertain Data with Resource Constraints Proceedings of the 20th international conference on Scientific and Statistical Database Management, (491-508)
  908. ACM
    Basci D and Misra S (2008). Entropy metric for XML DTD documents, ACM SIGSOFT Software Engineering Notes, 33:4, (1-6), Online publication date: 1-Jul-2008.
  909. ACM
    Cowley B, Charles D, Black M and Hickey R (2008). Toward an understanding of flow in video games, Computers in Entertainment, 6:2, (1-27), Online publication date: 1-Jul-2008.
  910. Benayadi N and Le Goc M Discovering Temporal Knowledge from a Crisscross of Timed Observations Proceedings of the 2008 conference on ECAI 2008: 18th European Conference on Artificial Intelligence, (745-746)
  911. Pankov S A computational approximation to the AIXI model Proceedings of the 2008 conference on Artificial General Intelligence 2008: Proceedings of the First AGI Conference, (256-267)
  912. ACM
    Malacaria P and Chen H Lagrange multipliers and maximum information leakage in different observational models Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security, (135-146)
  913. ACM
    Abbasi A, Chen H and Salem A (2008). Sentiment analysis in multiple languages, ACM Transactions on Information Systems, 26:3, (1-34), Online publication date: 1-Jun-2008.
  914. ACM
    Juba B and Sudan M Universal semantic communication I Proceedings of the fortieth annual ACM symposium on Theory of computing, (123-132)
  915. Gilchrist J and Cuhadar A (2008). Parallel lossless data compression using the Burrows-Wheeler Transform, International Journal of Web and Grid Services, 4:1, (117-135), Online publication date: 1-May-2008.
  916. Sayrafi B, Van Gucht D and Gyssens M (2008). The implication problem for measure-based constraints, Information Systems, 33:2, (221-239), Online publication date: 1-Apr-2008.
  917. Windt K, Philipp T and Böse F (2008). Complexity cube for the characterization of complex production systems, International Journal of Computer Integrated Manufacturing, 21:2, (195-200), Online publication date: 1-Mar-2008.
  918. Chen Y, Chen Y, Chu H and Kao H (2008). On technology for functional requirement-based reference design retrieval in engineering knowledge management, Decision Support Systems, 44:4, (798-816), Online publication date: 1-Mar-2008.
  919. Gupta A, Grossi R and Vitter J Nearly tight bounds on the encoding length of the Burrows-Wheeler transform Proceedings of the Meeting on Analytic Algorithmics and Combinatorics, (191-202)
  920. Chlebiej M, Nowiński K, Ścisło P and Bała P (2008). Development of heart motion reconstruction framework based on the 4D echocardiographic data, Annales UMCS, Informatica, 8:2, (43-50), Online publication date: 1-Jan-2008.
  921. Guillén i Fàbregas A, Martinez A and Caire G (2008). Bit-Interleaved Coded Modulation, Foundations and Trends in Communications and Information Theory, 5:1-2, (1-153), Online publication date: 1-Jan-2008.
  922. Drissi N, Chonavel T and Boucher J (2008). Generalized cumulative residual entropy for distributions with unrestricted supports, Research Letters in Signal Processing, 2008, (1-5), Online publication date: 1-Jan-2008.
  923. Madiman M (2008). Cores of cooperative games in information theory, EURASIP Journal on Wireless Communications and Networking, 2008, (1-12), Online publication date: 1-Jan-2008.
  924. Liu J, Tu G, Zhang C and Yang Y (2008). Joint source and channel decoding for variable length encoded turbo codes, EURASIP Journal on Advances in Signal Processing, 2008, (3), Online publication date: 1-Jan-2008.
  925. Rauwerda G, Heysters P and Smit G (2008). Towards software defined radios using coarse-grained reconfigurable hardware, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 16:1, (3-13), Online publication date: 1-Jan-2008.
  926. Ko S and Lee K (2008). Structural Object Recognition Using Entropy Correspondence Measure of Line Features, IEICE - Transactions on Information and Systems, E91-D:1, (78-85), Online publication date: 1-Jan-2008.
  927. Hwang H, Chang I, Chen F and Wu S (2008). Investigation of the application of KMS for diseases classifications, Expert Systems with Applications: An International Journal, 34:1, (725-733), Online publication date: 1-Jan-2008.
  928. Dukkipati A, Bhatnagar S and Narasimha Murty M (2007). Gelfand-Yaglom-Perez theorem for generalized relative entropy functionals, Information Sciences: an International Journal, 177:24, (5707-5714), Online publication date: 20-Dec-2007.
  929. dos Santos M, de Mello R and Yang L Extraction and classification of user behavior Proceedings of the 2007 international conference on Embedded and ubiquitous computing, (493-506)
  930. Li L, Zhou J and Xiao N DDoS attack detection algorithms based on entropy computing Proceedings of the 9th international conference on Information and communications security, (452-466)
  931. Nejad H, Zhu D and Mosleh A Hierarchical planning and multi-level scheduling for simulation-based probabilistic risk assessment Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come, (1189-1197)
  932. Romanelli M, Buitelaar P and Sintek M Modeling linguistic facets of multimedia content for semantic annotation Proceedings of the semantic and digital media technologies 2nd international conference on Semantic Multimedia, (240-251)
  933. Mochihashi D and Sumita E The infinite Markov model Proceedings of the 20th International Conference on Neural Information Processing Systems, (1017-1024)
  934. Guo C and Li H Multilevel thresholding method for image segmentation based on an adaptive particle swarm optimization algorithm Proceedings of the 20th Australian joint conference on Advances in artificial intelligence, (654-658)
  935. Zimmer J, Henry R and Butler B (2007). Determinants of the Use of Relational and Nonrelational Information Sources, Journal of Management Information Systems, 24:3, (297-331), Online publication date: 1-Dec-2007.
  936. Maes A and Poels G (2007). Evaluating quality of conceptual modelling scripts based on user perceptions, Data & Knowledge Engineering, 63:3, (701-724), Online publication date: 1-Dec-2007.
  937. Himma K (2007). The concept of information overload, Ethics and Information Technology, 9:4, (259-272), Online publication date: 1-Dec-2007.
  938. Proença H and Alexandre L Iris recognition Proceedings of the 3rd international conference on Advances in visual computing - Volume Part I, (621-632)
  939. Vo B and Vo K (2007). Compressing table data with column dependency, Theoretical Computer Science, 387:3, (273-283), Online publication date: 20-Nov-2007.
  940. ACM
    Raynal M and Serrurier M Loi de fitts Proceedings of the 19th Conference on l'Interaction Homme-Machine, (3-10)
  941. ACM
    Benbasat A and Paradiso J A framework for the automated generation of power-efficient classifiers for embedded sensor nodes Proceedings of the 5th international conference on Embedded networked sensor systems, (219-232)
  942. ACM
    Christensen L Practices of stigmergy in architectural work Proceedings of the 2007 ACM International Conference on Supporting Group Work, (11-20)
  943. Ridder A and Rubinstein R (2007). Minimum Cross-entropy Methods for Rare-event Simulation, Simulation, 83:11, (769-784), Online publication date: 1-Nov-2007.
  944. Grottel S, Reina G, Vrabec J and Ertl T (2007). Visual Verification and Analysis of Cluster Detection for Molecular Dynamics, IEEE Transactions on Visualization and Computer Graphics, 13:6, (1384-1391), Online publication date: 1-Nov-2007.
  945. Rutkowski T, Mandic D and Barros A (2007). A Multimodal Approach to Communicative Interactivity Classification, Journal of VLSI Signal Processing Systems, 49:2, (317-328), Online publication date: 1-Nov-2007.
  946. ACM
    Kirkels B, Maas M and Roelse P A security architecture for pay-per-view business models in conditional access systems Proceedings of the 2007 ACM workshop on Digital Rights Management, (1-9)
  947. ACM
    Köpf B and Basin D An information-theoretic model for adaptive side-channel attacks Proceedings of the 14th ACM conference on Computer and communications security, (286-296)
  948. ACM
    Bellare M and Rogaway P Robust computational secret sharing and a unified account of classical secret-sharing goals Proceedings of the 14th ACM conference on Computer and communications security, (172-184)
  949. Uchida M Information theoretic aspects of fairness criteria in network resource allocation problems Proceedings of the 2nd international conference on Performance evaluation methodologies and tools, (1-9)
  950. ACM
    Anand S, Kearney P and Shapcott M (2007). Generating semantically enriched user profiles for Web personalization, ACM Transactions on Internet Technology, 7:4, (22-es), Online publication date: 1-Oct-2007.
  951. Sornlertlamvanich V, Charoenporn T, Tongchim S, Kruengkrai C and Isahara H (2007). Statistical-Based Approach to Non-segmented Language Processing, IEICE - Transactions on Information and Systems, E90-D:10, (1565-1573), Online publication date: 1-Oct-2007.
  952. Saha P, Das B and Wehrli F (2007). An object class-uncertainty induced adaptive force and its application to a new hybrid snake, Pattern Recognition, 40:10, (2656-2671), Online publication date: 1-Oct-2007.
  953. Eickhoff R and Rückert U (2007). Robustness of radial basis functions, Neurocomputing, 70:16-18, (2758-2767), Online publication date: 1-Oct-2007.
  954. Zhang L, Li T, Liu S and Pan Y (2007). An integrated system for building enterprise taxonomies, Information Retrieval, 10:4-5, (365-391), Online publication date: 1-Oct-2007.
  955. ACM
    Kell S Rethinking software connectors International workshop on Synthesis and analysis of component connectors: in conjunction with the 6th ESEC/FSE joint meeting, (1-12)
  956. Clark T, Jones M and Armstrong C (2007). The dynamic structure of management support systems, MIS Quarterly, 31:3, (579-615), Online publication date: 1-Sep-2007.
  957. Klyubin A, Polani D and Nehaniv C (2007). Representations of Space and Time in the Maximization of Information Flow in the Perception-Action Loop, Neural Computation, 19:9, (2387-2432), Online publication date: 1-Sep-2007.
  958. ACM
    Stavrianou A, Andritsos P and Nicoloyannis N (2007). Overview and semantic issues of text mining, ACM SIGMOD Record, 36:3, (23-34), Online publication date: 1-Sep-2007.
  959. Kida Y and Kida T (2007). Theory of the Optimum Interpolation Approximation in a Shift-Invariant Wavelet and Scaling Subspace, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A:9, (1885-1903), Online publication date: 1-Sep-2007.
  960. Langs G, Peloschek P, Donner R and Bischof H (2007). Multiple appearance models, Pattern Recognition, 40:9, (2485-2495), Online publication date: 1-Sep-2007.
  961. Chlebiej M, Nowiński K, Ścisło P and Bała P Reconstruction of heart motion from 4D echocardiographic images Proceedings of the 12th international conference on Computer analysis of images and patterns, (245-252)
  962. Leonard K (2007). Efficient Shape Modeling, International Journal of Computer Vision, 74:2, (183-199), Online publication date: 15-Aug-2007.
  963. Wiesner K and Crutchfield J Computation in sofic quantum dynamical systems Proceedings of the 6th international conference on Unconventional Computation, (214-225)
  964. ACM
    Cheng J On the expected codeword length per symbol of optimal prefix codes for extended sources Proceedings of the 2007 international conference on Wireless communications and mobile computing, (325-328)
  965. Hjørland B (2007). Information: Objective or subjective-situational?, Journal of the American Society for Information Science and Technology, 58:10, (1448-1456), Online publication date: 1-Aug-2007.
  966. Feng W and Greene J (2007). Post-placement interconnect entropy, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 15:8, (945-948), Online publication date: 1-Aug-2007.
  967. Salvetti F, Patelli P and Nicolo S (2007). Chaotic time series prediction for the game, Rock-Paper-Scissors, Applied Soft Computing, 7:4, (1188-1196), Online publication date: 1-Aug-2007.
  968. Chen J, Liou C and Tu W Applying the correlated gamma statistics in channel capacity evaluation for dual-branch MRC diversity over correlated-fading channels Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11, (173-177)
  969. Bubb H Future applications of DHM in ergonomic design Proceedings of the 1st international conference on Digital human modeling, (779-793)
  970. Liang S An axiomatic method for cross cultural usability analysis Proceedings of the 2nd international conference on Usability and internationalization, (355-364)
  971. de Greef T and Arciszewski H A closed-loop adaptive system for command and control Proceedings of the 3rd international conference on Foundations of augmented cognition, (276-285)
  972. ACM
    Peterson M, Lamont G, Moore F and Marshall P Targeted filter evolution for improved image reconstruction resolution Proceedings of the 9th annual conference on Genetic and evolutionary computation, (2137-2144)
  973. ACM
    Smith R and Jiang M MILCS Proceedings of the 9th annual conference on Genetic and evolutionary computation, (1877-1877)
  974. ACM
    Smith R and Jiang M MILCS Proceedings of the 9th annual conference companion on Genetic and evolutionary computation, (2945-2952)
  975. Delon J and Rougé B (2007). Small Baseline Stereovision, Journal of Mathematical Imaging and Vision, 28:3, (209-223), Online publication date: 1-Jul-2007.
  976. ACM
    Mylonakis M, Sima'an K and Hwa R Unsupervised estimation for noisy-channel models Proceedings of the 24th international conference on Machine learning, (665-672)
  977. Jenkins S and Kirk S (2007). Software architecture graphs as complex networks, Information Sciences: an International Journal, 177:12, (2587-2601), Online publication date: 20-Jun-2007.
  978. Martín H. J and Lope J Concepts and Models for the Future Generation of Emotional and Intelligent Systems Proceedings of the 2nd international work-conference on The Interplay Between Natural and Artificial Computation, Part I: Bio-inspired Modeling of Cognitive Tasks, (41-50)
  979. Pinto A Comparing Notions of Computational Entropy Proceedings of the 3rd conference on Computability in Europe: Computation and Logic in the Real World, (606-620)
  980. Ghosh I, Basu K and Kundu S A cross-layer approach for evaluating the impact of single NEXT interferer in DMT based ADSL systems Proceedings of the 20th international teletraffic conference on Managing traffic performance in converged networks, (398-409)
  981. ACM
    Chen H and Malacaria P Quantitative analysis of leakage for multi-threaded programs Proceedings of the 2007 workshop on Programming languages and analysis for security, (31-40)
  982. ACM
    Yokota T, Ootsu K and Baba T Introducing entropies for representing program behavior and branch predictor performance Proceedings of the 2007 workshop on Experimental computer science, (17-es)
  983. Zhou H, Wen Y and Zhao H Detecting early worm propagation based on entropy Proceedings of the 2nd international conference on Scalable information systems, (1-2)
  984. Seo D and Moon B (2007). An Information-Theoretic Analysis on the Interactions of Variables in Combinatorial Optimization Problems, Evolutionary Computation, 15:2, (169-198), Online publication date: 1-Jun-2007.
  985. Sinanović S and Johnson D (2007). Toward a theory of information processing, Signal Processing, 87:6, (1326-1344), Online publication date: 1-Jun-2007.
  986. Hogg T (2007). Coordinating microscopic robots in viscous fluids, Autonomous Agents and Multi-Agent Systems, 14:3, (271-305), Online publication date: 1-Jun-2007.
  987. Kołaczek G Multiagent Approach to Network Traffic Anomalies Uncertainty Level Assessment in Distributed Intrusion Detection System Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications, (486-495)
  988. Jagadeesh J, Pingali P and Varma V Capturing sentence prior for query-based multi-document summarization Large Scale Semantic Access to Content (Text, Image, Video, and Sound), (798-809)
  989. Harman M The Current State and Future of Search Based Software Engineering 2007 Future of Software Engineering, (342-357)
  990. Hsiao C, Lu C and Reyzin L Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility Proceedings of the 26th annual international conference on Advances in Cryptology, (169-186)
  991. ACM
    Arya S, Malamatos T and Mount D (2007). A simple entropy-based algorithm for planar point location, ACM Transactions on Algorithms, 3:2, (17-es), Online publication date: 1-May-2007.
  992. Pan Z and Breuer M (2007). Estimating Error Rate in Defective Logic Using Signature Analysis, IEEE Transactions on Computers, 56:5, (650-661), Online publication date: 1-May-2007.
  993. ACM
    Cockburn A, Gutwin C and Greenberg S A predictive model of menu performance Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (627-636)
  994. ACM
    Hoffmann C, Jumpertz S and Marquet B On nurturing strong-tie distant relationships CHI '07 Extended Abstracts on Human Factors in Computing Systems, (2411-2416)
  995. Wang T, Lee H and Wu C A fuzzy TOPSIS approach with subjective weights and objective weights Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6, (1-6)
  996. ACM
    Willis S Protein CorreLogo Proceedings of the twelfth international conference on 3D web technology, (71-80)
  997. Martinet J and Satoh S Using visual-textual mutual information and entropy for inter-modal document indexing Proceedings of the 29th European conference on IR research, (549-556)
  998. Masegosa A, Joho H and Jose J Evaluating query-independent object features for relevancy prediction Proceedings of the 29th European conference on IR research, (283-294)
  999. Kramer G (2008). Topics in Multi-User Information Theory, Foundations and Trends in Communications and Information Theory, 4:4-5, (265-444), Online publication date: 1-Apr-2007.
  1000. ACM
    Borden A Classification using conditional probabilities and Shannon's definition of information Proceedings of the 2007 International Lisp Conference, (1-7)
  1001. ACM
    Rocchi P How 'unused' codewords make a redundant code Proceedings of the 45th annual southeast regional conference, (407-412)
  1002. Henkel D and Brown T Optimizing the Use of Relays for Link Establishment in Wireless Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3586-3591)
  1003. Lyda R and Hamrock J (2007). Using Entropy Analysis to Find Encrypted and Packed Malware, IEEE Security and Privacy, 5:2, (40-45), Online publication date: 1-Mar-2007.
  1004. Joshi K, Sarker S and Sarker S (2007). Knowledge transfer within information systems development teams, Decision Support Systems, 43:2, (322-335), Online publication date: 1-Mar-2007.
  1005. Anderson N (2007). Quantum Subspace Measurements, Open Systems & Information Dynamics, 14:1, (117-126), Online publication date: 1-Mar-2007.
  1006. Bainbridge W and Bainbridge W (2007). Creative Uses of Software Errors, Social Science Computer Review, 25:1, (61-77), Online publication date: 1-Feb-2007.
  1007. Kaza S, Wang Y and Chen H (2007). Enhancing border security, Decision Support Systems, 43:1, (199-210), Online publication date: 1-Feb-2007.
  1008. ACM
    Weber J and Pollack M Entropy-Driven online active learning for interactive calendar management Proceedings of the 12th international conference on Intelligent user interfaces, (141-150)
  1009. Shankar B Novel classification and segmentation techniques with application to remotely sensed images Transactions on rough sets VII, (295-380)
  1010. Esposito A The amount of information on emotional states conveyed by the verbal and nonverbal channels Progress in nonlinear speech processing, (249-268)
  1011. Rabiner L and Schafer R (2007). Introduction to digital speech processing, Foundations and Trends in Signal Processing, 1:1, (1-194), Online publication date: 1-Jan-2007.
  1012. Guruswami V (2007). Algorithmic results in list decoding, Foundations and Trends® in Theoretical Computer Science, 2:2, (107-195), Online publication date: 1-Jan-2007.
  1013. Ozturk M, Xu D and Príncipe J (2007). Analysis and design of echo state networks, Neural Computation, 19:1, (111-138), Online publication date: 1-Jan-2007.
  1014. Suzuki H, Saito R and Tomita M (2007). Variation in the correlation of G + C composition with synonymous codon usage bias among bacteria, EURASIP Journal on Bioinformatics and Systems Biology, 2007, (7-7), Online publication date: 1-Jan-2007.
  1015. Benedetto D, Caglioti E and Chica C (2007). Compressing proteomes, EURASIP Journal on Bioinformatics and Systems Biology, 2007, (1-8), Online publication date: 1-Jan-2007.
  1016. Kannan R and Eswaran C (2007). Lossless compression schemes for ECG signals using neural network predictors, EURASIP Journal on Advances in Signal Processing, 2007:1, (102-102), Online publication date: 1-Jan-2007.
  1017. Coughlan J, Macredie R and Patel N (2007). Evaluating the effectiveness of customers' communication experiences with online retailers - A study of e-mortgages, Interacting with Computers, 19:1, (83-95), Online publication date: 1-Jan-2007.
  1018. Gupta S, Goyal R, Shubham K, Dey L, Malik A, Chaudhury S and Bhattacharya S Knowledge Discovery from Semi-Structured Data for Conceptual Organization Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, (291-294)
  1019. Oztoprak K and Kilic H Protocol and Connectivity Based Overlay Level Capacity Calculation of P2P Networks Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, (447-450)
  1020. ACM
    Cheng D, Kannan R, Vempala S and Wang G (2006). A divide-and-merge methodology for clustering, ACM Transactions on Database Systems, 31:4, (1499-1525), Online publication date: 1-Dec-2006.
  1021. Shaban K, Basir O and Kamel M Document mining based on semantic understanding of text Proceedings of the 11th Iberoamerican conference on Progress in Pattern Recognition, Image Analysis and Applications, (834-843)
  1022. Cox I, Doërr G and Furon T Watermarking is not cryptography Proceedings of the 5th international conference on Digital Watermarking, (1-15)
  1023. ACM
    Danninger M, Kluge T and Stiefelhagen R MyConnector Proceedings of the 8th international conference on Multimodal interfaces, (12-19)
  1024. He H, Jin H, Chen J, McAullay D, Li J and Fallon T Analysis of breast feeding data using data mining methods Proceedings of the fifth Australasian conference on Data mining and analystics - Volume 61, (47-52)
  1025. Nadarajah S and Kotz S (2006). The Linear Combination of Logistic and Gumbel Random Variables, Fundamenta Informaticae, 74:2,3, (341-350), Online publication date: 1-Nov-2006.
  1026. Schwartz O, Sejnowski T and Dayan P (2006). Soft Mixer Assignment in a Hierarchical Generative Model of Natural Scene Statistics, Neural Computation, 18:11, (2680-2718), Online publication date: 1-Nov-2006.
  1027. Creager D and Simpson A Towards a fully generic theory of data Proceedings of the 8th international conference on Formal Methods and Software Engineering, (304-323)
  1028. ACM
    Schultz C A trust framework model for situational contexts Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-7)
  1029. ACM
    Mason J, Watkins K, Eisner J and Stubblefield A A natural language approach to automated cryptanalysis of two-time pads Proceedings of the 13th ACM conference on Computer and communications security, (235-244)
  1030. Davis C, Haas Z and Milner S On how to circumvent the MANET scalability curse Proceedings of the 2006 IEEE conference on Military communications, (1954-1960)
  1031. Sridharan S, Vishwanath S and Wu W Enabling source channel separation for communication networks Proceedings of the 2006 IEEE conference on Military communications, (1123-1128)
  1032. ACM
    Harada S, Landay J, Malkin J, Li X and Bilmes J The vocal joystick: Proceedings of the 8th international ACM SIGACCESS conference on Computers and accessibility, (197-204)
  1033. ACM
    Isokoski P Variability of throughput in pointing device tests Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles, (68-77)
  1034. Seising R and Bradley J Is soft computing in technology and medicine human-friendly? Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III, (366-373)
  1035. Cai K, Bu J, Chen C and Huang P An automatic approach for efficient text segmentation Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I, (417-424)
  1036. Villmann T, Hammer B, Schleif F, Geweniger T, Fischer T and Cottrell M Prototype based classification using information theoretic learning Proceedings of the 13th international conference on Neural Information Processing - Volume Part II, (40-49)
  1037. Kamimura R Self-organizing by information maximization Proceedings of the 13 international conference on Neural Information Processing - Volume Part I, (925-934)
  1038. Martins D, Cesar R and Barrera J (2006). W-operator window design by minimization of mean conditional entropy, Pattern Analysis & Applications, 9:2-3, (139-153), Online publication date: 1-Oct-2006.
  1039. Salzberg C (2006). From Machine and Tape to Structure and Function: Formulation of a Reflexively Computing System, Artificial Life, 12:4, (487-512), Online publication date: 1-Oct-2006.
  1040. Jaramaz B and Eckman K 2D/3D registration for measurement of implant alignment after total hip replacement Proceedings of the 9th international conference on Medical Image Computing and Computer-Assisted Intervention - Volume Part II, (653-661)
  1041. Ribeiro A, Este R, Lloyd-Price J and Kauffman S Measuring information propagation and retention in boolean networks and its implications to a model of human organizations Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization, (391-398)
  1042. Heegaard P and Wittner O Self-tuned refresh rate in a swarm intelligence path management system Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems, (148-162)
  1043. Langdon W Mapping non-conventional extensions of genetic programming Proceedings of the 5th international conference on Unconventional Computation, (166-180)
  1044. Jansen B (2006). Review of "Theories of information science behavior", by Karen E. Fisher, Sanda Erdelez, Lynn (E.F.) MeKechine, ASIST monograph series, 2005, Information Processing and Management: an International Journal, 42:5, (1392-1395), Online publication date: 1-Sep-2006.
  1045. Huang J, Lv N and Li W A novel feature selection approach by hybrid genetic algorithm Proceedings of the 9th Pacific Rim international conference on Artificial intelligence, (721-729)
  1046. Nadarajah S and Kotz S (2006). The Linear Combination of Logistic and Gumbel Random Variables, Fundamenta Informaticae, 74:2,3, (341-350), Online publication date: 1-Aug-2006.
  1047. ACM
    Barr K and Asanović K (2006). Energy-aware lossless data compression, ACM Transactions on Computer Systems, 24:3, (250-291), Online publication date: 1-Aug-2006.
  1048. Faconti G and Massink M Analysis of pointing tasks on a white board Proceedings of the 13th international conference on Interactive systems: Design, specification, and verification, (185-198)
  1049. Dagli C, Rajaram S and Huang T Leveraging active learning for relevance feedback using an information theoretic diversity measure Proceedings of the 5th international conference on Image and Video Retrieval, (123-132)
  1050. Chakinala R, Kumarasubramanian A, Manokaran R, Noubir G, Rangan C and Sundaram R Steganographic communication in ordered channels Proceedings of the 8th international conference on Information hiding, (42-57)
  1051. ACM
    Nannen V and Eiben A A method for parameter calibration and relevance estimation in evolutionary algorithms Proceedings of the 8th annual conference on Genetic and evolutionary computation, (183-190)
  1052. ACM
    Cheng J and Huang T Upper bounds on exponentiated expected length of optimal one-to-one codes Proceedings of the 2006 international conference on Wireless communications and mobile computing, (1207-1212)
  1053. Gagie T Dynamic asymmetric communication Proceedings of the 13th international conference on Structural Information and Communication Complexity, (310-318)
  1054. Katarzyniak R and Pieczynska-Kuchtiak A (2006). An approach to resolving semantic inconsistency of multiple prepositional attitudes, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 17:3, (231-238), Online publication date: 1-Jul-2006.
  1055. Kamimura R (2006). Cooperative Information Maximization with Gaussian Activation Functions for Self-Organizing Maps, IEEE Transactions on Neural Networks, 17:4, (909-918), Online publication date: 1-Jul-2006.
  1056. Puthpongsiriporn T, Porter J, Bidanda B, Wang M and Billo R (2006). Attribute-Level Neighbor Hierarchy Construction Using Evolved Pattern-Based Knowledge Induction, IEEE Transactions on Knowledge and Data Engineering, 18:7, (917-929), Online publication date: 1-Jul-2006.
  1057. Angryk R On interpretation of non-atomic values and induction of decision rules in fuzzy relational databases Proceedings of the 8th international conference on Artificial Intelligence and Soft Computing, (170-181)
  1058. Dang T, Marsala C, Bouchon-Meunier B and Boucher A Discrimination-Based criteria for the evaluation of classifiers Proceedings of the 7th international conference on Flexible Query Answering Systems, (552-563)
  1059. Hafner V and Kaplan F Interpersonal maps Proceedings of the 2006 international conference on Towards affordance-based robot control, (1-15)
  1060. Djoudi M (2006). Listening comprehension of English second language with mobile devices, Journal of Mobile Multimedia, 2:2, (146-166), Online publication date: 1-Jun-2006.
  1061. Gursoy M, Poor H and Verdú S (2006). On-off frequency-shift keying for wideband fading channels, EURASIP Journal on Wireless Communications and Networking, 2006:3, (1-15), Online publication date: 1-Jun-2006.
  1062. Wang J and Wu X (2006). Kernel design for RNA classification using Support Vector Machines, International Journal of Data Mining and Bioinformatics, 1:1, (57-76), Online publication date: 1-Jun-2006.
  1063. ACM
    Haigh T (2006). "A veritable bucket of facts" origins of the data base management system, ACM SIGMOD Record, 35:2, (33-49), Online publication date: 1-Jun-2006.
  1064. Beamish D, Scott MacKenzie I and Wu J (2006). Speed-accuracy trade-off in planned arm movements with delayed feedback, Neural Networks, 19:5, (582-599), Online publication date: 1-Jun-2006.
  1065. Jang S, Wong D and Chen J Intelligent Experimental Design Using an Artificial Neural Network Meta Model and Information Theory Proceedings of the 2006 conference on Integrated Intelligent Systems for Engineering Design, (258-273)
  1066. McCurley K Language modeling and encryption on packet switched networks Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques, (359-372)
  1067. Wolf S and Wullschleger J Oblivious transfer is symmetric Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques, (222-232)
  1068. Chryssolouris G, Vassiliou E and Mavrikios D Application of Information Theory to the Quantification of Concurrent Engineering Processes Proceedings of the 2006 conference on Leading the Web in Concurrent Engineering: Next Generation Concurrent Engineering, (679-695)
  1069. Gulyas L, Laufer L and Szabo R Measuring stigmergy Proceedings of the 4th international conference on Engineering self-organising systems, (50-65)
  1070. Chlebiej M, Mikołajczak P, Nowiński K, Ścisło P and Bała P Generation of dynamic heart model based on 4d echocardiographic images Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V, (394-403)
  1071. ACM
    Stoyanov E, Wischy M and Roller D Using managed communication channels in software components Proceedings of the 3rd conference on Computing frontiers, (177-186)
  1072. Lowe G and Ouaknine J (2006). On Timed Models and Full Abstraction, Electronic Notes in Theoretical Computer Science (ENTCS), 155, (497-519), Online publication date: 1-May-2006.
  1073. Danninger M, Robles E, Takayama L, Wang Q, Kluge T, Stiefelhagen R and Nass C The connector service-predicting availability in mobile contexts Proceedings of the Third international conference on Machine Learning for Multimodal Interaction, (129-141)
  1074. Eslambolchilar P and Murray-Smith R Model-Based, multimodal interaction in document browsing Proceedings of the Third international conference on Machine Learning for Multimodal Interaction, (1-12)
  1075. Özmen A An entropy-based algorithm for time-driven software instrumentation in parallel systems Proceedings of the 20th international conference on Parallel and distributed processing, (331-331)
  1076. Zheng Y and Kwoh C Informative MicroRNA expression patterns for cancer classification Proceedings of the 2006 international conference on Data Mining for Biomedical Applications, (143-154)
  1077. Krämer N Theory of mind as a theoretical prerequisite to model communication with virtual humans Proceedings of the Embodied communication in humans and machines, 2nd ZiF research group international conference on Modeling communication with robots and virtual humans, (222-240)
  1078. Gratch J True emotion vs. social intentions in nonverbal communication Proceedings of the Embodied communication in humans and machines, 2nd ZiF research group international conference on Modeling communication with robots and virtual humans, (181-197)
  1079. ACM
    Burgess M (2006). A control theory perspective on configuration management and Cfengine, ACM SIGBED Review, 3:2, (12-16), Online publication date: 1-Apr-2006.
  1080. Chen C, Lu Y and Hong C (2006). Minimal Structure of Self-Organizing HCMAC Neural Network Classifier, Neural Processing Letters, 23:2, (201-228), Online publication date: 1-Apr-2006.
  1081. Schwartz M and Vardy A New bounds on the capacity of multi-dimensional RLL-Constrained systems Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, (225-234)
  1082. Debenham J Automated trading Proceedings of the 24th IASTED international conference on Artificial intelligence and applications, (1-6)
  1083. Li G, Zhang L, Li Y, Xie B and Shao W (2006). Shortening retrieval sequences in browsing-based component retrieval using information entropy, Journal of Systems and Software, 79:2, (216-230), Online publication date: 1-Feb-2006.
  1084. Ahlswede R On concepts of performance parameters for channels General Theory of Information Transfer and Combinatorics, (639-663)
  1085. Chiu D and Wang Y (2006). Multipattern consensus regions in multiple aligned protein sequences and their segmentation, EURASIP Journal on Bioinformatics and Systems Biology, 2006, (2-2), Online publication date: 1-Jan-2006.
  1086. Iwata K, Ikeda K and Sakai H (2006). The asymptotic equipartition property in reinforcement learning and its relation to return maximization, Neural Networks, 19:1, (62-75), Online publication date: 1-Jan-2006.
  1087. Savkin A (2006). Analysis and synthesis of networked control systems, Automatica (Journal of IFAC), 42:1, (51-62), Online publication date: 1-Jan-2006.
  1088. Suzuki Y, Hatano K, Yoshikawa M, Uemura S and Kawagoe K A relevant score normalization method using shannon's information measure Proceedings of the 8th international conference on Asian Digital Libraries: implementing strategies and sharing experiences, (311-316)
  1089. Christandl M and Wehner S Quantum anonymous transmissions Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security, (217-235)
  1090. Wang H and Benham C Annotation of promoter regions in microbial genomes based on DNA structural and sequence properties Proceedings of the 2005 joint annual satellite conference on Systems biology and regulatory genomics, (212-224)
  1091. Blanchard J, Guillet F, Gras R and Briand H Using Information-Theoretic Measures to Assess Association Rule Interestingness Proceedings of the Fifth IEEE International Conference on Data Mining, (66-73)
  1092. Martins D, Cesar R and Barrera J Automatic window design for gray-scale image processing based on entropy minimization Proceedings of the 10th Iberoamerican Congress conference on Progress in Pattern Recognition, Image Analysis and Applications, (813-824)
  1093. Zhu X and Wu X (2005). Cost-Constrained Data Acquisition for Intelligent Data Preparation, IEEE Transactions on Knowledge and Data Engineering, 17:11, (1542-1556), Online publication date: 1-Nov-2005.
  1094. Galland F, Bertaux N and Réfrégier P (2005). Multi-component image segmentation in homogeneous regions based on description length minimization, Pattern Recognition, 38:11, (1926-1936), Online publication date: 1-Nov-2005.
  1095. ACM
    Kang J, Han T, Lee D and Mitra P Establishing value mappings using statistical models and user feedback Proceedings of the 14th ACM international conference on Information and knowledge management, (68-75)
  1096. Medel J, López P and Pérez D Matricial estimation for start times with stochastic behaivor by periodic real time tasks in a concurrent system Proceedings of the 7th WSEAS International Conference on Mathematical Methods and Computational Techniques In Electrical Engineering, (214-217)
  1097. Fischer M Cultural agents Proceedings of the 6th international conference on Engineering Societies in the Agents World, (259-274)
  1098. Luan H, Qi F and Shen D Multi-modal image registration by quantitative-qualitative measure of mutual information (Q-MI) Proceedings of the First international conference on Computer Vision for Biomedical Image Applications, (378-387)
  1099. ACM
    Xu K, Zhang Z and Bhattacharyya S (2005). Profiling internet backbone traffic, ACM SIGCOMM Computer Communication Review, 35:4, (169-180), Online publication date: 1-Oct-2005.
  1100. Frank M (2005). On the Interpretation of Energy as the Rate of Quantum Computation, Quantum Information Processing, 4:4, (283-334), Online publication date: 1-Oct-2005.
  1101. Buell D Calibrating entropy functions applied to computer networks Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security, (76-87)
  1102. Sabin M, Augsdörfer U and Dodgson N Artifacts in box-spline surfaces Proceedings of the 11th IMA international conference on Mathematics of Surfaces, (350-363)
  1103. Seow S (2005). Information theoretic models of HCI, Human-Computer Interaction, 20:3, (315-352), Online publication date: 1-Sep-2005.
  1104. Liu X and Wang H (2005). A Discretization Algorithm Based on a Heterogeneity Criterion, IEEE Transactions on Knowledge and Data Engineering, 17:9, (1166-1173), Online publication date: 1-Sep-2005.
  1105. Wang S, Schuurmans D, Peng F and Zhao Y (2005). Combining Statistical Language Models via the Latent Maximum Entropy Principle, Machine Language, 60:1-3, (229-250), Online publication date: 1-Sep-2005.
  1106. Bertino E, Fovino I and Provenza L (2005). A Framework for Evaluating Privacy Preserving Data Mining Algorithms*, Data Mining and Knowledge Discovery, 11:2, (121-154), Online publication date: 1-Sep-2005.
  1107. Markl V, Megiddo N, Kutsch M, Tran T, Haas P and Srivastava U Consistently estimating the selectivity of conjuncts of predicates Proceedings of the 31st international conference on Very large data bases, (373-384)
  1108. Doty D, Gu X, Lutz J, Mayordomo E and Moser P Zeta-Dimension Proceedings of the 30th international conference on Mathematical Foundations of Computer Science, (283-294)
  1109. ACM
    Xu K, Zhang Z and Bhattacharyya S Profiling internet backbone traffic Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, (169-180)
  1110. Golin M and Liu Z The structure of optimal prefix-free codes in restricted languages Proceedings of the 9th international conference on Algorithms and Data Structures, (372-384)
  1111. Yun Z and Keong K Identifying Simple Discriminatory Gene Vectors with an Information Theory Approach Proceedings of the 2005 IEEE Computational Systems Bioinformatics Conference, (13-24)
  1112. Stay M (2005). Very Simple Chaitin Machines for Concrete AIT, Fundamenta Informaticae, 68:3, (231-247), Online publication date: 1-Aug-2005.
  1113. ACM
    Andersen E (2005). The cucumber season, Ubiquity, 2005:August, (1-1), Online publication date: 1-Aug-2005.
  1114. De Greef T and Van Maanen P Automated adaptive support for task and information prioritizing Proceedings of the 19th international joint conference on Artificial intelligence, (1713-1714)
  1115. ACM
    Nunnink J and Pavlin G A probabilistic approach to resource allocation in distributed fusion systems Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, (846-852)
  1116. Brueckner S and Parunak H Information-Driven phase changes in multi-agent coordination Proceedings of the Third international conference on Engineering Self-Organising Systems, (104-119)
  1117. Pon R and Critchlow T Performance-oriented privacy-preserving data integration Proceedings of the Second international conference on Data Integration in the Life Sciences, (240-256)
  1118. Twining C, Cootes T, Marsland S, Petrovic V, Schestowitz R and Taylor C A unified information-theoretic approach to groupwise non-rigid registration and model building Proceedings of the 19th international conference on Information Processing in Medical Imaging, (1-14)
  1119. Legrand G and Nicoloyannis N Feature selection method using preferences aggregation Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition, (203-217)
  1120. Hu B, Liu J and Jin X (2005). Multiagent RoboNBA Simulation, Simulation, 81:7, (465-485), Online publication date: 1-Jul-2005.
  1121. Stiber M (2005). Spike Timing Precision and Neural Error Correction: Local Behavior, Neural Computation, 17:7, (1577-1601), Online publication date: 1-Jul-2005.
  1122. ACM
    Harman M, Swift S and Mahdavi K An empirical study of the robustness of two module clustering fitness functions Proceedings of the 7th annual conference on Genetic and evolutionary computation, (1029-1036)
  1123. ACM
    Chen Z, Kalashnikov D and Mehrotra S Exploiting relationships for object consolidation Proceedings of the 2nd international workshop on Information quality in information systems, (47-58)
  1124. ACM
    Sayrafi B and Van Gucht D Differential constraints Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (348-357)
  1125. Thiel C, Schwenker F and Palm G Using dempster-shafer theory in MCF systems to reject samples Proceedings of the 6th international conference on Multiple Classifier Systems, (118-127)
  1126. Eickhoff R and Rückert U Robustness of radial basis functions Proceedings of the 8th international conference on Artificial Neural Networks: computational Intelligence and Bioinspired Systems, (264-271)
  1127. Pereira Coutinho D and Figueiredo M Information theoretic text classification using the ziv-merhav method Proceedings of the Second Iberian conference on Pattern Recognition and Image Analysis - Volume Part II, (355-362)
  1128. Kojadinovic I, Marichal J and Roubens M (2005). An axiomatic approach to the definition of the entropy of a discrete Choquet capacity, Information Sciences: an International Journal, 172:1-2, (131-153), Online publication date: 1-Jun-2005.
  1129. Xu P and Abshire P (2005). 2005 Special issue, Neural Networks, 18:5-6, (479-487), Online publication date: 1-Jun-2005.
  1130. Stay M (2005). Very Simple Chaitin Machines for Concrete AIT, Fundamenta Informaticae, 68:3, (231-247), Online publication date: 1-May-2005.
  1131. Leydesdorff L (2005). Similarity measures, author cocitation analysis, and information theory, Journal of the American Society for Information Science and Technology, 56:7, (769-772), Online publication date: 1-May-2005.
  1132. ACM
    Jones A and Deshmukh A (2005). Test beds for complex systems, Communications of the ACM, 48:5, (45-50), Online publication date: 1-May-2005.
  1133. Vrins F and Verleysen M (2005). On the entropy minimization of a linear mixture of variables for source separation, Signal Processing, 85:5, (1029-1044), Online publication date: 1-May-2005.
  1134. Aiazzi B, Baronti S, Santurri L, Selva M and Alparone L (2005). Information-theoretic assessment of multi-dimensional signals, Signal Processing, 85:5, (903-916), Online publication date: 1-May-2005.
  1135. Steiner N and Athanas P Hardware-Software Interaction Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 3 - Volume 04
  1136. Kohno T, Broido A and Claffy K (2005). Remote Physical Device Fingerprinting, IEEE Transactions on Dependable and Secure Computing, 2:2, (93-108), Online publication date: 1-Apr-2005.
  1137. Nelson R and Todd P (2005). Antecedents of Information and System Quality, Journal of Management Information Systems, 21:4, (199-235), Online publication date: 1-Apr-2005.
  1138. Langdon W and Banzhaf W Repeated patterns in tree genetic programming Proceedings of the 8th European conference on Genetic Programming, (190-202)
  1139. Richert W, Kleinjohann B and Kleinjohann L Learning action sequences through imitation in behavior based architectures Proceedings of the 18th international conference on Architecture of Computing Systems conference on Systems Aspects in Organic and Pervasive Computing, (93-107)
  1140. Garud R and Kumaraswamy A (2005). Vicious and virtuous circles in the management of knowledge, MIS Quarterly, 29:1, (9-33), Online publication date: 1-Mar-2005.
  1141. Thomas C, Howie C and Smith L (2005). A New Singly Connected Network Classifier based on Mutual Information, Intelligent Data Analysis, 9:2, (189-205), Online publication date: 1-Mar-2005.
  1142. ACM
    Arenas M and Libkin L (2005). An information-theoretic approach to normal forms for relational and XML data, Journal of the ACM, 52:2, (246-283), Online publication date: 1-Mar-2005.
  1143. Ruiz O, Cadavid C, Granados M, Peña S and Vásquez E (2005). Technical Section, Computers and Graphics, 29:1, (81-94), Online publication date: 1-Feb-2005.
  1144. Brueckner S and Gerth R Applying distributed adaptive optimization to digital car body development Engineering Self-Organising Systems, (267-279)
  1145. Panchev C A spiking neural network model of multi-modal language processing of robot instructions Biomimetic Neural Learning for Intelligent Robots, (182-210)
  1146. Tanik U, Grimes G, Gurupur V and Sherman C (2005). AN INTELLIGENT DESIGN FRAMEWORK PROPOSAL LEVERAGING AXIOMATIC DESIGN AND THE SEMANTIC WEB, Journal of Integrated Design & Process Science, 9:1, (41-53), Online publication date: 1-Jan-2005.
  1147. Wu Y and Takatsuka M The Geodesic Self-Organizing Map and its error analysis Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38, (343-351)
  1148. Smith E and Lewicki M (2005). Efficient Coding of Time-Relative Structure Using Spikes, Neural Computation, 17:1, (19-45), Online publication date: 1-Jan-2005.
  1149. Coyle D, Prasad G and McGinnity T (2005). A time-frequency approach to feature extraction for a brain-computer interface with a comparative analysis of performance measures, EURASIP Journal on Advances in Signal Processing, 2005, (3141-3151), Online publication date: 1-Jan-2005.
  1150. Allison L (2005). Models for machine learning and data mining in functional programming, Journal of Functional Programming, 15:1, (15-32), Online publication date: 1-Jan-2005.
  1151. ACM
    Zhang L, Liu S, Pan Y and Yang L InfoAnalyzer Proceedings of the thirteenth ACM international conference on Information and knowledge management, (477-483)
  1152. ACM
    Corndorf E, Liang C, Kanter G, Kumar P and Yuen H (2004). Quantum-noise, ACM SIGCOMM Computer Communication Review, 34:5, (21-30), Online publication date: 15-Oct-2004.
  1153. Delone W and Mclean E (2004). Measuring e-Commerce Success, International Journal of Electronic Commerce, 9:1, (31-47), Online publication date: 1-Oct-2004.
  1154. ACM
    Ji Z, Yang Y, Zhou J, Takai M and Bagrodia R Exploiting medium access diversity in rate adaptive wireless LANs Proceedings of the 10th annual international conference on Mobile computing and networking, (345-359)
  1155. Lowe D and Kong X NavOptim Coding Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence, (91-97)
  1156. ACM
    Allwein G A qualitative framework for Shannon information theories Proceedings of the 2004 workshop on New security paradigms, (23-31)
  1157. Lavenda B (2004). Information and Coding Discrimination of Pseudo-Additive Entropies (PAE), Open Systems & Information Dynamics, 11:3, (257-266), Online publication date: 19-Aug-2004.
  1158. Smola A and Schölkopf B (2004). A tutorial on support vector regression, Statistics and Computing, 14:3, (199-222), Online publication date: 1-Aug-2004.
  1159. Kern-Isberner G and Lukasiewicz T (2004). Combining probabilistic logic programming with the power of maximum entropy, Artificial Intelligence, 157:1-2, (139-202), Online publication date: 1-Aug-2004.
  1160. Balch T Communication, diversity and learning Proceedings of the 2004 international conference on Swarm Robotics, (21-30)
  1161. Zitnick C and Kanade T Maximum entropy for collaborative filtering Proceedings of the 20th conference on Uncertainty in artificial intelligence, (636-643)
  1162. ACM
    Vicente J, Lanchares J and Hermida R (2004). Annealing placement by thermodynamic combinatorial optimization, ACM Transactions on Design Automation of Electronic Systems, 9:3, (310-332), Online publication date: 1-Jul-2004.
  1163. Golin M, Yong X, Zhang Y and Sheng L (2004). New upper and lower bounds on the channel capacity of read/write isolated memory, Discrete Applied Mathematics, 140:1-3, (35-48), Online publication date: 15-May-2004.
  1164. Daucé E (2004). Short term memory in recurrent networks of spiking neurons, Natural Computing: an international journal, 3:2, (135-157), Online publication date: 13-May-2004.
  1165. Lowe G (2004). Defining information flow quantity, Journal of Computer Security, 12:3,4, (619-653), Online publication date: 1-May-2004.
  1166. Floridi L (2004). Outline of a Theory of Strongly Semantic Information, Minds and Machines, 14:2, (197-221), Online publication date: 1-May-2004.
  1167. Bharati P and Chaudhury A (2004). An empirical investigation of decision-making satisfaction in web-based decision support systems, Decision Support Systems, 37:2, (187-197), Online publication date: 1-May-2004.
  1168. Boldareva L, de Vries A and Hiemstra D Monitoring user-system performance in interactive retrieval tasks Coupling approaches, coupling media and coupling languages for information retrieval, (474-483)
  1169. ACM
    Campbell C and Tarasewich P Designing visual notification cues for mobile devices CHI '04 Extended Abstracts on Human Factors in Computing Systems, (1199-1202)
  1170. Ruhe G and Ngo A (2004). Hybrid Intelligence in Software Release Planning, International Journal of Hybrid Intelligent Systems, 1:1-2, (99-110), Online publication date: 1-Apr-2004.
  1171. ACM
    Gonçalves M, Fox E, Watson L and Kipp N (2004). Streams, structures, spaces, scenarios, societies (5s), ACM Transactions on Information Systems, 22:2, (270-312), Online publication date: 1-Apr-2004.
  1172. Grim P, St. Denis P and Kokalis T (2004). Information and Meaning, Minds and Machines, 14:1, (43-66), Online publication date: 1-Feb-2004.
  1173. Bohan Broderick P (2004). On Communication and Computation, Minds and Machines, 14:1, (1-19), Online publication date: 1-Feb-2004.
  1174. Hunter A and Konieczny S Approaches to measuring inconsistent information Inconsistency Tolerance, (191-236)
  1175. Bertossi L, Hunter A and Schaub T Introduction to inconsistency tolerance Inconsistency Tolerance, (1-14)
  1176. Guo Y, Weng F and Wu L Grammar induction by MDL-based distributional classification New developments in parsing technology, (291-306)
  1177. Ji H and Abshire P Fundamentals of Silicon-based phototransduction CMOS imagers, (1-51)
  1178. Mannoni V, Declercq D and Gelle G (2004). Optimized irregular low-density parity-check codes for multicarrier modulations over frequency-selective channels, EURASIP Journal on Advances in Signal Processing, 2004, (1546-1556), Online publication date: 1-Jan-2004.
  1179. Shor P (2004). The adaptive classical capacity of a quantum channel, or Information capacities of three symmetric pure states in three dimensions, IBM Journal of Research and Development, 48:1, (115-137), Online publication date: 1-Jan-2004.
  1180. Buyarov V, Dehesa J, Martínez-Finkelshtein A and Sánchez-Lara J (2005). Computation of the Entropy of Polynomials Orthogonal on an Interval, SIAM Journal on Scientific Computing, 26:2, (488-509), Online publication date: 1-Jan-2004.
  1181. Mcnamee P and Mayfield J (2004). Character N-Gram Tokenization for European Language Text Retrieval, Information Retrieval, 7:1-2, (73-97), Online publication date: 1-Jan-2004.
  1182. Aguirre A and Coello Coello C (2003). Evolutionary Synthesis of LogicCircuits Using Information Theory, Artificial Intelligence Review, 20:3-4, (445-471), Online publication date: 1-Dec-2003.
  1183. Bremer M (2003). Do Logical Truths Carry Information?, Minds and Machines, 13:4, (567-575), Online publication date: 1-Nov-2003.
  1184. Adams F (2003). The Informational Turn in Philosophy, Minds and Machines, 13:4, (471-501), Online publication date: 1-Nov-2003.
  1185. Hilderman R and Hamilton H (2003). Measuring the interestingness of discovered knowledge: A principled approach, Intelligent Data Analysis, 7:4, (347-382), Online publication date: 1-Sep-2003.
  1186. Davison M and Shiner J (2003). Many Entropies, Many Disorders, Open Systems & Information Dynamics, 10:3, (281-296), Online publication date: 1-Sep-2003.
  1187. Van Rooy R (2003). Quality and Quantity of Information Exchange, Journal of Logic, Language and Information, 12:4, (423-451), Online publication date: 1-Sep-2003.
  1188. Grünwald P and Vitányi P (2003). Kolmogorov Complexity and Information Theory.With an Interpretation in Terms of Questions and Answers, Journal of Logic, Language and Information, 12:4, (497-529), Online publication date: 1-Sep-2003.
  1189. Chiew V and Wang Y From Cognitive Psychology to Cognitive Informatics Proceedings of the 2nd IEEE International Conference on Cognitive Informatics
  1190. Van Akkeren M (2003). An Information Theoretic Approach to Estimation in the Case ofMulticollinearity, Computational Economics, 22:1, (1-22), Online publication date: 1-Aug-2003.
  1191. ACM
    Khmelev D and Teahan W A repetition based measure for verification of text collections and for text categorization Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval, (104-110)
  1192. ACM
    Brueckner S and Van Dyke Parunak H Resource-aware exploration of the emergent dynamics of simulated systems Proceedings of the second international joint conference on Autonomous agents and multiagent systems, (781-788)
  1193. Seo D, Kim Y and Moon B New entropy-based measures of gene significance and epistasis Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII, (1345-1356)
  1194. ACM
    Comber T and Maltby J User operations as language elements Proceedings of the 4th Annual Conference of the ACM Special Interest Group on Computer-Human Interaction, (57-62)
  1195. James R (2003). Knowledge and the mathematical properties of communication, International Journal of Information Technology and Management, 2:1-2, (100-110), Online publication date: 1-Jul-2003.
  1196. Chechik G (2003). Spike-timing-dependent plasticity and relevant mutual information maximization, Neural Computation, 15:7, (1481-1510), Online publication date: 1-Jul-2003.
  1197. Hollnagel E (2003). Commentary, International Journal of Human-Computer Studies, 59:1-2, (65-70), Online publication date: 1-Jul-2003.
  1198. te Boekhorst R, Lungarella M and Pfeifer R Dimensionality reduction through sensory-motor coordination Proceedings of the 2003 joint international conference on Artificial neural networks and neural information processing, (496-503)
  1199. ACM
    Katov M, Nomura N and Ito K The visual information load as a parameter for designing pleasurable environment Proceedings of the 2003 international conference on Designing pleasurable products and interfaces, (144-145)
  1200. Cohen S and Intrator N A study of ensemble of hybrid networks with strong regularization Proceedings of the 4th international conference on Multiple classifier systems, (227-235)
  1201. ACM
    Cheng R, Kalashnikov D and Prabhakar S Evaluating probabilistic queries over imprecise data Proceedings of the 2003 ACM SIGMOD international conference on Management of data, (551-562)
  1202. ACM
    Arenas M and Libkin L An information-theoretic approach to normal forms for relational and XML data Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (15-26)
  1203. ACM
    Qin W and Malik S Automated synthesis of efficient binary decoders for retargetable software toolkits Proceedings of the 40th annual Design Automation Conference, (764-769)
  1204. Paninski L (2003). Estimation of entropy and mutual information, Neural Computation, 15:6, (1191-1253), Online publication date: 1-Jun-2003.
  1205. Guiaşu R and Guiaşu S (2003). Conditional and weighted measures of ecological diversity, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 11:3, (283-300), Online publication date: 1-Jun-2003.
  1206. Dalli A Adaptation of the F-measure to cluster based lexicon quality evaluation Proceedings of the EACL 2003 Workshop on Evaluation Initiatives in Natural Language Processing: are evaluation methods, metrics and resources reusable?, (51-56)
  1207. Kulesza K and Kotulski Z Addressing new challenges by building security protocols around graphs Proceedings of the 11th international conference on Security Protocols, (301-306)
  1208. Delone W and McLean E (2003). The DeLone and McLean Model of Information Systems Success, Journal of Management Information Systems, 19:4, (9-30), Online publication date: 1-Apr-2003.
  1209. Aguirre A, Equihua E and Coello C Synthesis of boolean functions using information theory Proceedings of the 5th international conference on Evolvable systems: from biology to hardware, (218-227)
  1210. ACM
    Dechter R and Rish I (2003). Mini-buckets, Journal of the ACM, 50:2, (107-153), Online publication date: 1-Mar-2003.
  1211. Rodriguez G and Weisbin C (2003). A New Method to Evaluate Human-Robot System Performance, Autonomous Robots, 14:2-3, (165-178), Online publication date: 1-Mar-2003.
  1212. Nagaraja K, Krishnan N, Bianchini R, Martin R and Nguyen T Evaluating the Impact of Communication Architecture on the Performability of Cluster-Based Services Proceedings of the 9th International Symposium on High-Performance Computer Architecture
  1213. Vandecappelle A, Bougard B, Shashidhar K and Catthoor F Low-power design of turbo decoder with exploration of energy-throughput trade-off Compilers and operating systems for low power, (173-191)
  1214. Hast A, Barrera T and Bengtsson E Antialiasing for bump maps and a fast normalization trick Graphics programming methods, (291-298)
  1215. Wilkins D, Lee T and Berry P (2003). Interactive execution monitoring of agent teams, Journal of Artificial Intelligence Research, 18:1, (217-261), Online publication date: 1-Jan-2003.
  1216. Westerveld T, de Vries A, van Ballegooij A, de Jong F and Hiemstra D (2003). A probabilistic multimedia retrieval model and its evaluation, EURASIP Journal on Advances in Signal Processing, 2003, (186-198), Online publication date: 1-Jan-2003.
  1217. Al-Aomar R General methodology 1 Proceedings of the 34th conference on Winter simulation: exploring new frontiers, (1931-1939)
  1218. Chen Z and Haykin S (2002). On different facets of regularization theory, Neural Computation, 14:12, (2791-2846), Online publication date: 1-Dec-2002.
  1219. ACM
    Evfimievski A (2002). Randomization in privacy preserving data mining, ACM SIGKDD Explorations Newsletter, 4:2, (43-48), Online publication date: 1-Dec-2002.
  1220. Adami C (2002). Sequence complexity in Darwinian evolution, Complexity, 8:2, (49-56), Online publication date: 1-Nov-2002.
  1221. Dagli I, Brost M and Breuel G Action recognition and prediction for driver assistance systems using dynamic belief networks Proceedings of the NODe 2002 agent-related conference on Agent technologies, infrastructures, tools, and applications for E-services, (179-194)
  1222. Rosca D, Greenspan S and Wild C (2002). Enterprise Modeling and Decision-Support for Automating the Business Rules Lifecycle, Automated Software Engineering, 9:4, (361-404), Online publication date: 1-Oct-2002.
  1223. Podgorelec V, Kokol P, Stiglic B and Rozman I (2002). Decision Trees, Journal of Medical Systems, 26:5, (445-463), Online publication date: 1-Oct-2002.
  1224. Liu H, Hussain F, Tan C and Dash M (2002). Discretization, Data Mining and Knowledge Discovery, 6:4, (393-423), Online publication date: 1-Oct-2002.
  1225. Parker H, Chignell M and Ruppenthal L Measurement of technology mediated communication style Proceedings of the 2002 conference of the Centre for Advanced Studies on Collaborative research
  1226. ACM
    Ahamad M, Mark L, Lee W, Omicienski E, Santos A, Liu L and Pu C Guarding the next Internet frontier Proceedings of the 2002 workshop on New security paradigms, (136-143)
  1227. Bod R A General Parsing Model for Music and Language Proceedings of the Second International Conference on Music and Artificial Intelligence, (5-17)
  1228. Rao R (2002). Book reviews: Awakening a sleeping cat: A review of "information theory and the brain", Neural Networks, 15:7, (927-929), Online publication date: 1-Sep-2002.
  1229. ACM
    Carmel D, Farchi E, Petruschka Y and Soffer A Automatic query wefinement using lexical affinities with maximal information gain Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval, (283-290)
  1230. Ślezak D (2002). Approximate Entropy Reducts, Fundamenta Informaticae, 53:3-4, (365-390), Online publication date: 1-Aug-2002.
  1231. Korepin V and Terilla J (2002). Thermodynamic Interpretation of the Quantum Error Correcting Criterion, Quantum Information Processing, 1:4, (225-242), Online publication date: 1-Aug-2002.
  1232. Rish I, Brodie M and Ma S Accuracy vs. efficiency trade-offs in probabilistic diagnosis Eighteenth national conference on Artificial intelligence, (560-566)
  1233. ACM
    Lin S and Ho J Discovering informative content blocks from Web documents Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, (588-593)
  1234. Bod R (2002). A unified model of structural organization in language and music, Journal of Artificial Intelligence Research, 17:1, (289-308), Online publication date: 1-Jul-2002.
  1235. Lowe G Quantifying Information Flow Proceedings of the 15th IEEE workshop on Computer Security Foundations
  1236. ACM
    Wu X and Barbará D (2002). Learning missing values from summary constraints, ACM SIGKDD Explorations Newsletter, 4:1, (21-30), Online publication date: 1-Jun-2002.
  1237. Şlȩzak D (2002). Approximate entropy reducts, Fundamenta Informaticae, 53:3,4, (365-390), Online publication date: 30-May-2002.
  1238. Davies R, Twining C, Cootes T, Waterton J and Taylor C 3D Statistical Shape Models Using Direct Optimisation of Description Length Proceedings of the 7th European Conference on Computer Vision-Part III, (3-20)
  1239. Luca A A Survey of Some Quantitative Approaches to the Notion of Information Formal and Natural Computing - Essays Dedicated to Grzegorz Rozenberg [on occasion of his 60th birthday, March 14, 2002], (77-95)
  1240. Gokcay E and Principe J (2002). Information Theoretic Clustering, IEEE Transactions on Pattern Analysis and Machine Intelligence, 24:2, (158-171), Online publication date: 1-Feb-2002.
  1241. Apostolico A and Crochemore M String pattern matching for a deluge survival kit Handbook of massive data sets, (151-194)
  1242. Tuzhilin A Knowledge evaluation: Other evaluations Handbook of data mining and knowledge discovery, (490-496)
  1243. Calvo T, Kolesárová A, Komorníková M and Mesiar R Aggregation operators Aggregation operators, (3-104)
  1244. de Luca A A survey of some quantitative approaches to the notion of information Formal and natural computing, (77-95)
  1245. Heegard C, Coffey J, Gummadi S, Murphy P, Provencio R, Rossin E, Schrum S and Shoemake M Evolution of 2.4-GHz wireless LANs Wireless local area networks, (17-72)
  1246. Nissen H Challenging traditions of inquiry in software practice Social thinking, (69-89)
  1247. Turpin A and Smyth W (2002). An approach to phrase selection for offline data compression, Australian Computer Science Communications, 24:1, (267-273), Online publication date: 1-Jan-2002.
  1248. Turpin A and Smyth W An approach to phrase selection for offline data compression Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4, (267-273)
  1249. Papadias C and Foschini G (2002). On the capacity of certain space-time coding schemes, EURASIP Journal on Advances in Signal Processing, 2002:1, (447-458), Online publication date: 1-Jan-2002.
  1250. Romanowski C and Nagi R Analyzing maintenance data using data mining methods Data mining for design and manufacturing, (235-254)
  1251. ACM
    Johnson-Eilola J (2001). Little machines, ACM Journal of Computer Documentation, 25:4, (119-127), Online publication date: 1-Nov-2001.
  1252. ACM
    Barford P, Bestavros A, Byers J and Crovella M On the marginal utility of network topology measurements Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (5-17)
  1253. Franchini L, Spagnolo C, Rossini D, Smeraldi E, Bellodi L and Politi E (2001). A neural network approach to the outcome definition on first treatment with sertraline in a psychiatric population, Artificial Intelligence in Medicine, 23:3, (239-248), Online publication date: 1-Nov-2001.
  1254. ACM
    Mayer M What i learned about user support from bartending Proceedings of the 29th annual ACM SIGUCCS conference on User services, (97-100)
  1255. Nambiar K (2001). Shannon's communication channels and word spaces, Mathematical and Computer Modelling: An International Journal, 34:7-8, (757-759), Online publication date: 1-Oct-2001.
  1256. Sauvage S MAS Oriented Patterns Revised Papers from the Second International Workshop of Central and Eastern Europe on Multi-Agent Systems: From Theory to Practice in Multi-Agent Systems, (283-292)
  1257. ACM
    Mittermeir R Software evolution Proceedings of the 4th International Workshop on Principles of Software Evolution, (114-121)
  1258. Saha P and Udupa J (2001). Optimum Image Thresholding via Class Uncertainty and Region Homogeneity, IEEE Transactions on Pattern Analysis and Machine Intelligence, 23:7, (689-706), Online publication date: 1-Jul-2001.
  1259. Picó D and Casacuberta F (2001). Some Statistical-Estimation Methods for Stochastic Finite-State Transducers, Machine Language, 44:1-2, (121-141), Online publication date: 1-Jul-2001.
  1260. Khoshgoftaar T and Allen E (2001). Empirical Assessment of a Software Metric, Software Quality Journal, 9:2, (99-112), Online publication date: 1-Jun-2001.
  1261. Benson S and Standing C (2001). Effective Knowledge Management, Information Systems Frontiers, 3:2, (227-238), Online publication date: 1-Jun-2001.
  1262. Newman J (2001). Some Observations on the Semantics of “Information”, Information Systems Frontiers, 3:2, (155-167), Online publication date: 1-Jun-2001.
  1263. ACM
    Van Dyke Parunak H and Brueckner S Entropy and self-organization in multi-agent systems Proceedings of the fifth international conference on Autonomous agents, (124-130)
  1264. ACM
    Agrawal D and Aggarwal C On the design and quantification of privacy preserving data mining algorithms Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (247-255)
  1265. Kazakov D and Manandhar S (2001). Unsupervised Learning of Word Segmentation Rules with Genetic Algorithms and Inductive Logic Programming, Machine Language, 43:1-2, (121-162), Online publication date: 1-Apr-2001.
  1266. Viikki K, Juhola M, Pyykkö I and Honkavaara P (2001). Evaluating Training Data Suitability for Decision Tree Induction, Journal of Medical Systems, 25:2, (133-144), Online publication date: 1-Apr-2001.
  1267. Teahan W and Harper D Combining PPM Models Using A Text Mining Approach Proceedings of the Data Compression Conference
  1268. Venkataramani R, Kramer G and Goyal V Successive Refinement on Trees Proceedings of the Data Compression Conference
  1269. March L Foreword Formal engineering design synthesis, (.11-.13)
  1270. Panzeri S, Rolls E, Battaglia F and Lavis R Simulation studies of the speed of recurrent processing Emergent neural computational architectures based on neuroscience, (320-332)
  1271. Chachoua M and Pacholczyk D (2000). A Symbolic Approach To Uncertainty Management, Applied Intelligence, 13:3, (265-283), Online publication date: 29-Nov-2000.
  1272. Son S, Mukkamala R and David R (2000). Integrating Security and Real-Time Requirements Using Covert Channel Capacity, IEEE Transactions on Knowledge and Data Engineering, 12:6, (865-879), Online publication date: 1-Nov-2000.
  1273. Yang-Peláez J and Flowers W Information Content Measures of Visual Displays Proceedings of the IEEE Symposium on Information Vizualization 2000
  1274. Kanfer A, Haythornthwaite C, Bruce B, Bowker G, Burbules N, Porac J and Wade J (2000). Modeling Distributed Knowledge Processes in Next Generation Multidisciplinary Alliances*, Information Systems Frontiers, 2:3-4, (317-331), Online publication date: 1-Oct-2000.
  1275. Furnas G (2000). Future design mindful of the MoRAS, Human-Computer Interaction, 15:2, (205-261), Online publication date: 1-Sep-2000.
  1276. Roy A, Steinmetz P and Niebur E (2000). Rate Limitations of Unitary Event Analysis, Neural Computation, 12:9, (2063-2082), Online publication date: 1-Sep-2000.
  1277. Principe J, Xu D, Zhao Q and Fisher J (2000). Learning from Examples with Information Theoretic Criteria, Journal of VLSI Signal Processing Systems, 26:1-2, (61-77), Online publication date: 1-Aug-2000.
  1278. Sornlertlamvanich V, Potipiti T and Charoenporn T Automatic corpus-based Thai word extraction with the c4.5 learning algorithm Proceedings of the 18th conference on Computational linguistics - Volume 2, (802-807)
  1279. Bod R Parsing with the shortest derivation Proceedings of the 18th conference on Computational linguistics - Volume 1, (69-75)
  1280. Lukasiewicz T Credal networks under maximum entropy Proceedings of the Sixteenth conference on Uncertainty in artificial intelligence, (363-370)
  1281. Spiegler I (2000). Knowledge management, Communications of the AIS, 3:4es, (2-es), Online publication date: 1-Jun-2000.
  1282. Balch T (2000). Hierarchic Social Entropy, Autonomous Robots, 8:3, (209-238), Online publication date: 1-Jun-2000.
  1283. Teahan W Text classification and segmentation using minimum cross-entropy Content-Based Multimedia Information Access - Volume 2, (943-961)
  1284. ACM
    Stevenson D Exploring an information-based approach to computation and computational complexity Proceedings of the 38th annual on Southeast regional conference, (42-50)
  1285. Ragowsky A, Stern M and Adams D (2000). Relating benefits from using IS to an organization's operating characteristics, Journal of Management Information Systems, 16:4, (175-194), Online publication date: 1-Mar-2000.
  1286. Lorette A, Descombes X and Zerubia J (2000). Texture Analysis through a Markovian Modelling and FuzzyClassification, International Journal of Computer Vision, 36:3, (221-236), Online publication date: 1-Feb-2000.
  1287. Borovoy R, Martin F and Resnick M Revealing common ground Proceedings of the 1999 conference on Computer support for collaborative learning, (5-es)
  1288. Manwani A and Koch C (1999). Detecting and Estimating Signals in Noisy Cable Structures, II: Information Theoretical Analysis, Neural Computation, 11:8, (1831-1873), Online publication date: 1-Nov-1999.
  1289. Wang J and Sun W (1999). On the Characteristics of Growing Cell Structures (GCS) Neural Network, Neural Processing Letters, 10:2, (139-149), Online publication date: 1-Oct-1999.
  1290. Girard J, Koschke R and Schied G (1999). A Metric-Based Approach to Detect Abstract Data Types and State Encapsulations, Automated Software Engineering, 6:4, (357-386), Online publication date: 1-Oct-1999.
  1291. Chang T and Yih Y (1999). Constructing a Fuzzy Rule System from Examples, Integrated Computer-Aided Engineering, 6:3, (213-222), Online publication date: 1-Aug-1999.
  1292. ACM
    Bhattacharya A and Das S LeZi-update Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, (1-12)
  1293. Lange M and Content A The grapho-phonological system of written French Proceedings of the 37th annual meeting of the Association for Computational Linguistics on Computational Linguistics, (436-442)
  1294. ACM
    Balch T The impact of diversity on performance in multi-robot foraging Proceedings of the third annual conference on Autonomous Agents, (92-99)
  1295. ACM
    Quigley E and Debons A Interrogative theory of information and knowledge Proceedings of the 1999 ACM SIGCPR conference on Computer personnel research, (4-10)
  1296. Oluyede B (1999). ON INEQUALITIES AND SELECTION OF EXPERIMENTS FOR LENGTH BIASED DISTRIBUTIONS, Probability in the Engineering and Informational Sciences, 13:2, (169-185), Online publication date: 1-Apr-1999.
  1297. Salvail L The Search for the Holy Grail in Quantum Cryptography Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998, (183-216)
  1298. Wolf S Unconditional Security in Cryptography Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998, (217-250)
  1299. Nehaniv C The second person Computation for metaphors, analogy, and agents, (380-388)
  1300. Burgess M Computer Immunology Proceedings of the 12th USENIX conference on System administration, (283-298)
  1301. Rowley J (1998). What is information?, Information Services and Use, 18:4, (243-254), Online publication date: 1-Dec-1998.
  1302. Brunel N and Nadal J (1998). Mutual information, Fisher information, and population coding, Neural Computation, 10:7, (1731-1757), Online publication date: 1-Oct-1998.
  1303. Korb K (1998). The Frame Problem, Minds and Machines, 8:3, (317-351), Online publication date: 1-Aug-1998.
  1304. Rish I, Kask K and Dechter R Empirical evaluation of approximation algorithms for probabilistic decoding Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence, (455-463)
  1305. ACM
    McGuire E and Randall K Process improvement competencies for IS professionals Proceedings of the 1998 ACM SIGCPR conference on Computer personnel research, (1-8)
  1306. Grimm C and Waldschmidt K Repartitioning and technology mapping of electronic hybrid systems Proceedings of the conference on Design, automation and test in Europe, (52-58)
  1307. Hutchins J (1998). From First Conception to First Demonstration, Machine Translation, 12:3, (195-252), Online publication date: 21-Jan-1998.
  1308. Powers D Reconciliation of unsupervised clustering, segmentation and cohesion Proceedings of the Joint Conferences on New Methods in Language Processing and Computational Natural Language Learning, (307-310)
  1309. Hutchens J and Alder M Introducing MegaHAL Proceedings of the Joint Conferences on New Methods in Language Processing and Computational Natural Language Learning, (271-274)
  1310. Powers D Applications and explanations of Zipf's law Proceedings of the Joint Conferences on New Methods in Language Processing and Computational Natural Language Learning, (151-160)
  1311. Juola P Cross-entropy and linguistic typology Proceedings of the Joint Conferences on New Methods in Language Processing and Computational Natural Language Learning, (141-149)
  1312. Hutchens J and Alder M Finding structure via compression Proceedings of the Joint Conferences on New Methods in Language Processing and Computational Natural Language Learning, (79-82)
  1313. ACM
    Chang L and Moskowitz I Parsimonious downgrading and decision trees applied to the inference problem Proceedings of the 1998 workshop on New security paradigms, (82-89)
  1314. Alter-Gartenberg R (1998). Multiresolution Imaging, Journal of Mathematical Imaging and Vision, 8:1, (59-77), Online publication date: 1-Jan-1998.
  1315. Chater N and Pickering M (1997). Two Projects for Understanding the Mind, Minds and Machines, 7:4, (553-569), Online publication date: 1-Nov-1997.
  1316. Mookerjee V and Mannino M (1997). Sequential Decision Models for Expert System Optimization, IEEE Transactions on Knowledge and Data Engineering, 9:5, (675-687), Online publication date: 1-Sep-1997.
  1317. Lin J, Grier D and Cowan J (1997). Faithful representation of separable distributions, Neural Computation, 9:6, (1305-1320), Online publication date: 15-Aug-1997.
  1318. Debuse J and Rayward-Smith V (1997). Feature Subset Selection within a Simulated Annealing DataMining Algorithm, Journal of Intelligent Information Systems, 9:1, (57-81), Online publication date: 1-Jul-1997.
  1319. Rao R and Ballard D (1997). Dynamic model of visual recognition predicts neural response properties in the visual cortex, Neural Computation, 9:4, (721-763), Online publication date: 15-May-1997.
  1320. Boahen K (1997). The Retinomorphic Approach, Analog Integrated Circuits and Signal Processing, 13:1-2, (53-68), Online publication date: 1-May-1997.
  1321. ACM
    Karadimitriou K and Tyler J (1997). Min-max compression methods for medical image databases, ACM SIGMOD Record, 26:1, (47-52), Online publication date: 1-Mar-1997.
  1322. Rödder W and Kern-Isberner G (1997). Léa Sombé und entropie-optimale Informationsverarbeitung mit der Expertensystem-Shell SPIRIT, OR Spectrum, 19:1, (41-46), Online publication date: 1-Mar-1997.
  1323. ACM
    Chu W, Chiang K, Hsu C and Yau H (1996). An error-based conceptual clustering method for providing approximate query answers, Communications of the ACM, 39:12es, (216-es), Online publication date: 1-Dec-1996.
  1324. ACM
    Wand Y and Wang R (1996). Anchoring data quality dimensions in ontological foundations, Communications of the ACM, 39:11, (86-95), Online publication date: 1-Nov-1996.
  1325. Myung I, Ramamoorti S and Bailey A (1996). Maximum Entropy Aggregation of Expert Predictions, Management Science, 42:10, (1420-1436), Online publication date: 1-Oct-1996.
  1326. ACM
    Shepard T (1996). A channel access scheme for large dense packet radio networks, ACM SIGCOMM Computer Communication Review, 26:4, (219-230), Online publication date: 1-Oct-1996.
  1327. ACM
    Shepard T A channel access scheme for large dense packet radio networks Conference proceedings on Applications, technologies, architectures, and protocols for computer communications, (219-230)
  1328. Johansson C Good bigrams Proceedings of the 16th conference on Computational linguistics - Volume 2, (592-597)
  1329. Kramer S and Pfahringer B Efficient search for strong partial determinations Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, (371-374)
  1330. Dusseau A, Culler D, Schauser K and Martin R (1996). Fast Parallel Sorting Under LogP, IEEE Transactions on Parallel and Distributed Systems, 7:8, (791-805), Online publication date: 1-Aug-1996.
  1331. Kang M, Moskowitz I and Lee D (1996). A Network Pump, IEEE Transactions on Software Engineering, 22:5, (329-338), Online publication date: 1-May-1996.
  1332. ACM
    Mandviwalla M and Hovav A Redesigning the questioning, discussion, and document processes Proceedings of the 1996 ACM SIGCPR/SIGMIS conference on Computer personnel research, (326-337)
  1333. Smadja F, McKeown K and Hatzivassiloglou V (1996). Translating collocations for bilingual lexicons, Computational Linguistics, 22:1, (1-38), Online publication date: 1-Mar-1996.
  1334. Karimi J, Gupta Y and Somers T (1996). Impact of competitive strategy and information technology maturity on firms' strategic response to globalization, Journal of Management Information Systems, 12:4, (55-88), Online publication date: 1-Mar-1996.
  1335. (1995). Improving the Performance Stability of Inductive Expert Systems Under Input Noise, Information Systems Research, 6:4, (328-356), Online publication date: 1-Dec-1995.
  1336. Sellen A (1995). Remote conversations, Human-Computer Interaction, 10:4, (401-444), Online publication date: 1-Dec-1995.
  1337. Muggleton S (1995). Inverse entailment and progol, New Generation Computing, 13:3-4, (245-286), Online publication date: 1-Dec-1995.
  1338. Pfahringer B and Kramer S Compression-based evaluation of partial determinations Proceedings of the First International Conference on Knowledge Discovery and Data Mining, (234-239)
  1339. Pitt L, Watson R and Kavan C (1995). Service quality, MIS Quarterly, 19:2, (173-187), Online publication date: 1-Jun-1995.
  1340. Wolff J (1995). Computing as compression: An overview of the SP theory and system, New Generation Computing, 13:2, (187-214), Online publication date: 1-Jun-1995.
  1341. Darrell T and Pentland A (1995). Cooperative Robust Estimation Using Layers of Support, IEEE Transactions on Pattern Analysis and Machine Intelligence, 17:5, (474-487), Online publication date: 1-May-1995.
  1342. McKeen J, Guimaraes T and Wetherbe J (1994). The relationship between user participation and user satisfaction, MIS Quarterly, 18:4, (427-451), Online publication date: 1-Dec-1994.
  1343. Poon W Modelling a distributed database system Proceedings of the 1994 conference of the Centre for Advanced Studies on Collaborative research
  1344. Whittaker J and Thomason M (1994). A Markov Chain Model for Statistical Software Testing, IEEE Transactions on Software Engineering, 20:10, (812-824), Online publication date: 1-Oct-1994.
  1345. Thong J, Yap C and Raman K (1994). Engagement of external expertise in information systems implementation, Journal of Management Information Systems, 11:2, (209-231), Online publication date: 1-Sep-1994.
  1346. ACM
    Malone T and Crowston K (1994). The interdisciplinary study of coordination, ACM Computing Surveys, 26:1, (87-119), Online publication date: 1-Mar-1994.
  1347. Tang Y, Yan C and Suen C (1994). Document Processing for Automatic Knowledge Acquisition, IEEE Transactions on Knowledge and Data Engineering, 6:1, (3-21), Online publication date: 1-Feb-1994.
  1348. ACM
    Kang M and Moskowitz I A pump for rapid, reliable, secure communication Proceedings of the 1st ACM conference on Computer and communications security, (119-129)
  1349. Daugman J (1993). High Confidence Visual Recognition of Persons by a Test of Statistical Independence, IEEE Transactions on Pattern Analysis and Machine Intelligence, 15:11, (1148-1161), Online publication date: 1-Nov-1993.
  1350. ACM
    Ganzha V and Vorozhtsov E A probabilistic symbolic-numerical method for the stability analyses of difference schemes for PDEs Proceedings of the 1993 international symposium on Symbolic and algebraic computation, (9-13)
  1351. Rose K, Gurewitz E and Fox G (1993). Constrained Clustering as an Optimization Method, IEEE Transactions on Pattern Analysis and Machine Intelligence, 15:8, (785-794), Online publication date: 1-Aug-1993.
  1352. Mookerjee V and Dos Santos B (1993). Inductive Expert System Design, Information Systems Research, 4:2, (111-140), Online publication date: 1-Jun-1993.
  1353. ACM
    Wiederhold G (1993). Intelligent integration of information, ACM SIGMOD Record, 22:2, (434-437), Online publication date: 1-Jun-1993.
  1354. ACM
    Wiederhold G Intelligent integration of information Proceedings of the 1993 ACM SIGMOD international conference on Management of data, (434-437)
  1355. Tessmer A, Shaw M and Gentry J (1993). Inductive learning for international financial analysis, Journal of Management Information Systems, 9:4, (17-36), Online publication date: 1-Mar-1993.
  1356. Collins J and Ruefli T (1992). Strategic Risk, Management Science, 38:12, (1707-1731), Online publication date: 1-Dec-1992.
  1357. Thearling K and Smith S An improved supercomputer sorting benchmark Proceedings of the 1992 ACM/IEEE conference on Supercomputing, (14-19)
  1358. Staib L and Duncan J (1992). Boundary Finding with Parametrically Deformable Models, IEEE Transactions on Pattern Analysis and Machine Intelligence, 14:11, (1061-1075), Online publication date: 1-Nov-1992.
  1359. ACM
    Creecy R, Masand B, Smith S and Waltz D (1992). Trading MIPS and memory for knowledge engineering, Communications of the ACM, 35:8, (48-64), Online publication date: 1-Aug-1992.
  1360. Gu J and Wang W (1992). A Novel Discrete Relaxation Architecture, IEEE Transactions on Pattern Analysis and Machine Intelligence, 14:8, (857-865), Online publication date: 1-Aug-1992.
  1361. ACM
    Sellen A Speech patterns in video-mediated conversations Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (49-59)
  1362. ACM
    Tague-Sutcliffe J Measuring the informativeness of a retrieval process Proceedings of the 15th annual international ACM SIGIR conference on Research and development in information retrieval, (23-36)
  1363. Atmanspacher H, Kurths J, Scheingraber H, Wackerbauer R and Witt A (1992). Complexity and meaning in nonlinear dynamical systems, Open Systems & Information Dynamics, 1:2, (269-289), Online publication date: 1-Jun-1992.
  1364. Moses Y Knowledge and communication Proceedings of the 4th conference on Theoretical aspects of reasoning about knowledge, (1-14)
  1365. MacKenzie I (1992). Fitts' law as a research and design tool in human-computer interaction, Human-Computer Interaction, 7:1, (91-139), Online publication date: 1-Mar-1992.
  1366. Gan K and Lua K (1991). Representing word context effect in Chinese character perception -- an application of information theory, Biological Cybernetics, 65:6, (479-485), Online publication date: 1-Oct-1991.
  1367. Optican L, Gawne T, Richmond B and Joseph P (1991). Unbiased measures of transmitted information and channel capacity from multivariate neuronal data, Biological Cybernetics, 65:5, (305-310), Online publication date: 1-Sep-1991.
  1368. Alfa A and Chen M (1991). Approximating queue lengths inM(t)/G/1 queue using the maximum entropy principle, Acta Informatica, 28:8, (801-815), Online publication date: 1-Aug-1991.
  1369. ACM
    Pittman J Recognizing handwritten text Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (271-275)
  1370. Boyd C Enhancing secrecy by data compression Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques, (266-280)
  1371. Maurer U and Massey J (1991). Local randomness in pseudorandom sequences, Journal of Cryptology, 4:2, (135-149), Online publication date: 1-Jan-1991.
  1372. Li D and Cellier F Fuzzy measures in inductive reasoning Proceedings of the 22nd conference on Winter simulation, (527-538)
  1373. Ward M, Coggins J, Herman I, Pavlidis T and Wittels N Graphics and imaging Proceedings of the 1st conference on Visualization '90, (407-410)
  1374. ACM
    Stepp R Virtual man-machine systems: a perspective on the social integration of AI technologies Proceedings of the 1990 ACM SIGBDP conference on Trends and directions in expert systems, (33-51)
  1375. Maurer U A Universal Statistical Test for Random Bit Generators Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology, (409-420)
  1376. Maurer U and Massey J Perfect local randomness in pseudo-random sequences Proceedings on Advances in cryptology, (100-112)
  1377. ACM
    LeClair S (1989). Interactive learning: a multiexpert paradigm for acquiring new knowledge, ACM SIGART Bulletin:108, (34-44), Online publication date: 1-Apr-1989.
  1378. ACM
    Guinier D (1989). A fast uniform astronomical random number generator, ACM SIGSAC Review, 7:1, (1-12), Online publication date: 1-Feb-1989.
  1379. Howell T (1989). Statistical properties of selected recording codes, IBM Journal of Research and Development, 33:1, (60-73), Online publication date: 3-Jan-1989.
  1380. Zigurs I, Poole M and DeSanctis G (1988). A study of influence in computer-mediated group decision making, MIS Quarterly, 12:4, (625-644), Online publication date: 1-Dec-1988.
  1381. Pennebaker W, Mitchell J, Langdon G and Arps R (1988). An overview of the basic principles of the Q-Coder adaptive binary arithmetic coder, IBM Journal of Research and Development, 32:6, (717-726), Online publication date: 1-Nov-1988.
  1382. Yannakoudakis E and Angelidakis G (1988). An Insight into the Entropy and Redundancy of the English Dictionary, IEEE Transactions on Pattern Analysis and Machine Intelligence, 10:6, (960-970), Online publication date: 1-Nov-1988.
  1383. ACM
    Kantabutra V (1988). A lower bound on the path length of binary trees, ACM SIGACT News, 19:2, (48-50), Online publication date: 1-Jun-1988.
  1384. ACM
    Danaher M, Munson J and Coulter N The experimental validation of a programmer productivity measure Proceedings of the ACM SIGCPR conference on Management of information systems personnel, (153-156)
  1385. Ben-Tal A and Teboulle M (1988). Extension of some results for channel capacity using a generalized information measure, Applied Mathematics and Optimization, 17:1, (121-132), Online publication date: 1-Jan-1988.
  1386. Daft R, Lengel R and Trevino L (1987). Message equivocality, media selection and manager performance: implications for information systems, MIS Quarterly, 11:3, (355-366), Online publication date: 1-Sep-1987.
  1387. ACM
    Witten I, Neal R and Cleary J (1987). Arithmetic coding for data compression, Communications of the ACM, 30:6, (520-540), Online publication date: 1-Jun-1987.
  1388. Adler R (1987). The torus and the disk, IBM Journal of Research and Development, 31:2, (224-234), Online publication date: 1-Mar-1987.
  1389. Abu-Mostafa Y (1987). On the Time-Bandwidth Proof in VLSI Complexity, IEEE Transactions on Computers, 36:2, (239-240), Online publication date: 1-Feb-1987.
  1390. ACM
    Kleinrock L (1985). Distributed systems, Communications of the ACM, 28:11, (1200-1213), Online publication date: 1-Nov-1985.
  1391. Aya K, Nakahama H and Fujii H (1985). A maximum entropy criterion of filtering and coding for stationary autoregressive signals, Biological Cybernetics, 52:6, (357-366), Online publication date: 1-Oct-1985.
  1392. Bennett C and Brassard G An update on quantum cryptography Proceedings of CRYPTO 84 on Advances in cryptology, (475-480)
  1393. Eckhorn R and Querfurth H (1985). Information transmission by isolated frog muscle spindle, Biological Cybernetics, 52:3, (165-176), Online publication date: 1-Jul-1985.
  1394. ACM
    Ghaffar K and McEliece R (1984). Soft error correction for increased densities in VLSI memories, ACM SIGARCH Computer Architecture News, 12:3, (248-250), Online publication date: 1-Jun-1984.
  1395. Langdon G (1984). An introduction to arithmetic coding, IBM Journal of Research and Development, 28:2, (135-149), Online publication date: 1-Mar-1984.
  1396. ACM
    Ghaffar K and McEliece R Soft error correction for increased densities in VLSI memories Proceedings of the 11th annual international symposium on Computer architecture, (248-250)
  1397. Todd S, Langdon G and Martin G (1983). A general fixed rate arithmetic coding method for constrained channels, IBM Journal of Research and Development, 27:2, (107-115), Online publication date: 1-Mar-1983.
  1398. Martin G, Langdon G and Todd S (1983). Arithmetic codes for constrained channels, IBM Journal of Research and Development, 27:2, (94-106), Online publication date: 1-Mar-1983.
  1399. ACM
    Kriebel C and Moore J (1982). Economics and management information systems, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 14:1, (30-40), Online publication date: 1-Sep-1982.
  1400. ACM
    Misek-Falkoff L The new field of “Software Linguistics” Selected papers of the 1982 ACM SIGMETRICS workshop on Software Metrics: part 1, (35-51)
  1401. ACM
    Misek-Falkoff L (1982). The new field of “Software Linguistics”, ACM SIGMETRICS Performance Evaluation Review, 11:2, (35-51), Online publication date: 1-Aug-1982.
  1402. Franaszek P (1982). Construction of bounded delay codes for discrete noiseless channels, IBM Journal of Research and Development, 26:4, (506-514), Online publication date: 1-Jul-1982.
  1403. ACM
    Sweet R and Sandman J (1982). Empirical analysis of the mesa instruction set, ACM SIGPLAN Notices, 17:4, (158-166), Online publication date: 1-Apr-1982.
  1404. ACM
    Sweet R and Sandman J (1982). Empirical analysis of the mesa instruction set, ACM SIGARCH Computer Architecture News, 10:2, (158-166), Online publication date: 1-Mar-1982.
  1405. ACM
    Sweet R and Sandman J Empirical analysis of the mesa instruction set Proceedings of the first international symposium on Architectural support for programming languages and operating systems, (158-166)
  1406. ACM
    Belzer J On foundations of information science Proceedings of the ACM '82 conference, (161-162)
  1407. Agrawal V (1981). An Information Theoretic Approach to Digital Fault Testing, IEEE Transactions on Computers, 30:8, (582-587), Online publication date: 1-Aug-1981.
  1408. Ahituv N (1980). A systematic approach toward assessing the value of an information system, MIS Quarterly, 4:4, (61-75), Online publication date: 1-Dec-1980.
  1409. Blin J and Dodson J (1980). The Relationship between Attributes, Brand Preference, and Choice, Management Science, 26:6, (606-619), Online publication date: 1-Jun-1980.
  1410. ACM
    Mitchell J Facsimile image coding Proceedings of the May 19-22, 1980, national computer conference, (423-426)
  1411. ACM
    Dominick W and Penniman W Automated monitoring to support the analysis and evaluation of information systems Proceedings of the 2nd annual international ACM SIGIR conference on Information storage and retrieval: information implications into the eighties, (2-9)
  1412. ACM
    Dominick W and Penniman W (1979). Automated monitoring to support the analysis and evaluation of information systems, ACM SIGIR Forum, 14:2, (2-9), Online publication date: 1-Sep-1979.
  1413. Wernecke S and D'Addario L (1977). Maximum Entropy Image Reconstruction, IEEE Transactions on Computers, 26:4, (351-364), Online publication date: 1-Apr-1977.
  1414. Wegner P Research paradigms in computer science Proceedings of the 2nd international conference on Software engineering, (322-330)
  1415. Longo G (1976). A Noiseless Coding Theorem for Sources Having Utilities, SIAM Journal on Applied Mathematics, 30:4, (739-748), Online publication date: 1-Jun-1976.
  1416. ACM
    Coulter N Using semantic information measures to evaluate learning strategies Proceedings of the 14th annual Southeast regional conference, (257-263)
  1417. Philippatos G and Gressis N (1975). Conditions of Equivalence Among E-V, SSD, and E-H Portfolio Selection Criteria, Management Science, 21:6, (617-625), Online publication date: 1-Feb-1975.
  1418. Garey M and Graham R (1974). Performance bounds on the splitting algorithm for binary testing, Acta Informatica, 3:4, (347-355), Online publication date: 1-Dec-1974.
  1419. Butler G and Ritea H (1974). Estimation of Mutual Information in Two-Class Pattern Recognition, IEEE Transactions on Computers, 23:4, (410-420), Online publication date: 1-Apr-1974.
  1420. Bahl L and Kobayashi H (1974). Image data compression by predictive coding II, IBM Journal of Research and Development, 18:2, (172-179), Online publication date: 1-Mar-1974.
  1421. Kümmel P An algorithm of limited syntax based on language universals Proceedings of the 5th conference on Computational linguistics - Volume 2, (225-247)
  1422. ACM
    Halstead M and Bayer R Algorithm dynamics Proceedings of the ACM annual conference, (126-135)
  1423. ACM
    Reed I Information theory and privacy in data banks Proceedings of the June 4-8, 1973, national computer conference and exposition, (581-587)
  1424. ACM
    Rozwadowski R and Kolence K A measure for the quantity of computation Proceedings of the 1973 ACM SIGME symposium, (100-111)
  1425. ACM
    Wilner W Burroughs B1700 memory utilization Proceedings of the December 5-7, 1972, fall joint computer conference, part I, (579-586)
  1426. ACM
    Halstead M (1972). Natural laws controlling algorithm structure?, ACM SIGPLAN Notices, 7:2, (19-26), Online publication date: 1-Feb-1972.
  1427. ACM
    van Emden M (1970). Increasing the efficiency of quicksort, Communications of the ACM, 13:9, (563-567), Online publication date: 1-Sep-1970.
  1428. Duncan T (1970). On the Calculation of Mutual Information, SIAM Journal on Applied Mathematics, 19:1, (215-220), Online publication date: 1-Jul-1970.
  1429. Munis J More A than I: Why Artificial Intelligence Isn't, but You Are 2015 IEEE International Conference on Systems, Man, and Cybernetics, (2429-2434)
  1430. Nguyen L, Wells R, Nguyen D and Tran N Outage Probability and Performance of Moderate-Length Codes under Partial-Band Noise Jamming (PBNJ) MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), (23-27)
  1431. Sharma P and Raglin A IoT: Smart City Parking Solutions with Metric-Chisini-Jensen-Shannon Divergence based Kernels MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), (324-330)
  1432. Ram E and Sason I On Rényi entropy power inequalities 2016 IEEE International Symposium on Information Theory (ISIT), (2289-2293)
  1433. Güler B, Gündüz D and Yener A On lossy transmission of correlated sources over a multiple access channel 2016 IEEE International Symposium on Information Theory (ISIT), (2009-2013)
  1434. Takeishi Y and Takeuchi J An improved upper bound on block error probability of least squares superposition codes with unbiased Bernoulli dictionary 2016 IEEE International Symposium on Information Theory (ISIT), (1168-1172)
  1435. Dey B, Jaggi S, Langberg M and Sarwate A A bit of delay is sufficient and stochastic encoding is necessary to overcome online adversarial erasures 2016 IEEE International Symposium on Information Theory (ISIT), (880-884)
  1436. Kamath S and Verdú S Estimation of entropy rate and Rényi entropy rate for Markov chains 2016 IEEE International Symposium on Information Theory (ISIT), (685-689)
  1437. Bai S, Wang J, Chen F and Englot B Information-theoretic exploration with Bayesian optimization 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (1816-1822)
  1438. Kim Y, Koh Y, Lee C, Kim S and Kim C Dark image enhancement based onpairwise target contrast and multi-scale detail boosting 2015 IEEE International Conference on Image Processing (ICIP), (1404-1408)
  1439. Liu Z and Huang J Adaptive matrix pencil method for mixed rotor faults diagnosis 2016 XXII International Conference on Electrical Machines (ICEM), (2158-2164)
  1440. Sun T and Jung C Readability enhancement of low light images based on dual-tree complex wavelet transform 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (1741-1745)
  1441. Zhang Z and Guo C New operations of hesitant fuzzy linguistic term sets with applications in multi-attribute group decision making 2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1-8)
  1442. DINU A, VLAD A, HANU B and MITREA A The Statistical Independence for Words in Printed Romanian Language 2020 13th International Conference on Communications (COMM), (319-324)
  1443. McKeown G Humor as an Ostensive Challenge that Displays Mind-Reading Ability Distributed, Ambient and Pervasive Interactions, (627-639)
  1444. ACM
    Kuno S and Oettinger A (1968). Computational linguistics in a Ph.D. computer science program, Communications of the ACM, 11:12, (831-836), Online publication date: 1-Dec-1968.
  1445. ACM
    Zara R A semantic model for a language processor Proceedings of the 1967 22nd national conference, (323-339)
  1446. Kotz S (2006). Some Inequalities for Convex Functions Useful in Information Theory, SIAM Review, 7:3, (395-402), Online publication date: 1-Jul-1965.
  1447. Reza F (1963). A note on the capacity of discrete noiseless channels, Zeitschrift für Angewandte Mathematik und Physik (ZAMP), 14:2, (175-178), Online publication date: 1-Mar-1963.
  1448. ACM
    Ashby W What is an intelligent machine? Papers presented at the May 9-11, 1961, western joint IRE-AIEE-ACM computer conference, (275-280)
  1449. ACM
    Buchholz W (1959). Fingers or fists? (the choice of decimal or binary representation), Communications of the ACM, 2:12, (3-11), Online publication date: 1-Dec-1959.
  1450. ACM
    Prosser R Applications of Boolean matrices to the analysis of flow diagrams Papers presented at the December 1-3, 1959, eastern joint IRE-AIEE-ACM computer conference, (133-138)
  1451. Elias P (1958). Computation in the presence of noise, IBM Journal of Research and Development, 2:4, (346-353), Online publication date: 1-Oct-1958.
  1452. ACM
    Kirsch R, Cahn L, Ray C and Urban G Experiments in processing pictorial information with a digital computer Papers and discussions presented at the December 9-13, 1957, eastern joint computer conference: Computers with deadlines to meet, (221-229)
  1453. Peterson W (1957). Addressing for random-access storage, IBM Journal of Research and Development, 1:2, (130-146), Online publication date: 1-Apr-1957.
Contributors

Recommendations