


default search action
IEEE Transactions on Systems, Man, and Cybernetics, Part A, Volume 34
Volume 34, Number 1, January 2004
- Maria Pia Fanti

, MengChu Zhou:
Deadlock control methods in automated manufacturing systems. 5-22 - Jonathan Billington, Guy Edward Gallasch, Lars Michael Kristensen, Thomas Mailund

:
Exploiting equivalence reduction and the sweep-line method for detecting terminal states. 23-37 - ZhiWu Li, MengChu Zhou:

Elementary siphons of Petri nets and their application to deadlock prevention in flexible manufacturing systems. 38-51 - Elzbieta Roszkowska:

Supervisory control for deadlock avoidance in compound processes. 52-64 - Fu-Shiung Hsieh:

Fault-tolerant deadlock avoidance algorithm for assembly processes. 65-79 - Maria Pia Fanti

:
Deadlock resolution strategy for automated manufacturing systems including conjunctive resource service. 80-92 - Joaquin Ezpeleta

, Laura Recalde:
A deadlock avoidance approach for nonsequential resource allocation systems. 93-101 - MuDer Jeng, Xiaolan Xie, Sheng-Luen Chung:

ERCN* merged nets for modeling degraded behavior and parallel processes in semiconductor manufacturing systems. 102-112 - Gang Xu, Zhiming Wu:

Deadlock-free scheduling strategy for automated production cell. 113-122 - Jonghun Park:

A deadlock and livelock free protocol for decentralized Internet resource coallocation. 123-131 - Ching-Torng Lin, Chen-Tung Chen:

A fuzzy-logic-based approach for new product Go/NoGo decision at the front end. 132-142 - Kwok-Wai Cheung

, Kwok Ching Tsui, Jiming Liu
:
Extended latent class models for collaborative recommendation. 143-148 - Jin Hou, Yuko Aoki:

A real-time interactive nonverbal communication system through semantic feature extraction as an interlingua. 148-154 - Chrysostomos D. Stylios, Petros P. Groumpos:

Modeling complex systems using fuzzy cognitive maps. 155-162
Volume 34, Number 2, March 2004
- Ali E. Abbas:

Entropy methods for adaptive utility elicitation. 169-178 - Leonard Adelman, Sheryl L. Miller, Cedric Yeo:

Testing the effectiveness of icons for supporting distributed team decision making under time pressure. 179-189 - Giorgos Akrivas, Giorgos B. Stamou, Stefanos D. Kollias

:
Semantic association of multimedia document descriptions through fuzzy relational algebra and fuzzy reasoning. 190-196 - A. Terry Bahill:

The ideal moment of inertia for a baseball or softball bat. 197-204 - Samuel W. K. Chan:

Extraction of salient textual patterns: synergy between lexical cohesion and contextual coherence. 205-218 - Lawrence E. Holloway, A. S. Khare, Yu Gong:

Computing bounds for forbidden State reachability functions for controlled Petri nets. 219-228 - Jianqiang Li, Yushun Fan, MengChu Zhou:

Performance modeling and analysis of workflow. 229-242 - Srinivas Peeta

, J. W. Yu:
Adaptability of a hybrid route choice model to incorporating driver behavior dynamics under information provision. 243-256 - Raj Subbu, Arthur C. Sanderson:

Network-based distributed planning using coevolutionary agents: architecture and evaluation. 257-269 - Qianhua He, Sam Kwong

, Q. Y. Hong:
Adaptation of hidden Markov models using maximum model distance algorithm. 270-276 - Keng L. Siau

, Hock Chuan Chan, Kwok Kee Wei
:
Effects of query complexity and learning on novice user query performance with conceptual and logical database interfaces. 276-281 - Benjamin P.-C. Yen, O. Q. Wu:

Internet scheduling environment with market-driven agents. 281-289
Volume 34, Number 3, May 2004
- Michael Diehl, Yacov Y. Haimes:

Influence diagrams with multiple objectives and tradeoff analysis. 293-304 - Gaolin Fang, Wen Gao, Debin Zhao:

Large vocabulary sign language recognition based on fuzzy decision trees. 305-314 - Marco Farina, Paolo Amato:

A fuzzy definition of "optimality" for many-criteria optimization problems. 315-326 - J. R. Hoffman, Ronald P. S. Mahler:

Multitarget miss distance via optimal assignment. 327-336 - Georgiy M. Levchuk, Yuri N. Levchuk, Candra Meirina, Krishna R. Pattipati, David L. Kleinman:

Normative design of project-based organizations-Part III: modeling congruent, robust, and adaptive organizations. 337-350 - Zhengping Ma, Deguang Cui, Peng Cheng:

Dynamic network flow model for short-term air traffic flow management. 351-358 - Rubén Medina

, Mireille Garreau, Javier Toro, Jean-Louis Coatrieux, D. Jugo:
Three-dimensional reconstruction of the left ventricle from two angiographic views: an evidence combination approach. 359-370 - James Moffat, I. Campbell:

Intelligent behavior is a partly emergent process for agents in conflict. 371-375 - Woojin Park, Don B. Chaffin, B. J. Martin:

Toward memory-based human motion simulation: development and validation of a motion modification algorithm. 376-386 - Ismael E. Arciniegas Rueda, Fabio A. Arciniegas, Mark J. Embrechts:

SVM sensitivity analysis: an application to currency crises aftermaths. 387-398 - Athanasios Sfetsos

, C. Siriopoulos:
Time series forecasting with a hybrid clustering scheme and pattern recognition. 399-405 - Yansheng Yang, Gang Feng

, Junsheng Ren
:
A combined backstepping and small-gain approach to robust adaptive fuzzy control for strict-feedback nonlinear systems. 406-420 - Raymond S. T. Lee:

iJADE stock advisor: an intelligent agent based stock prediction system using hybrid RBF recurrent network. 421-428 - Lorenzo José Tardón García

, Javier Portillo-García, Carlos Alberola-López
:
A novel Markovian formulation of the correspondence problem in stereo vision. 428-436
Volume 34, Number 4, July 2004
- Ellen J. Bass

, Samuel T. Ernst-Fortin, R. L. Small, J. Hogans:
Architecture and development environment of a knowledge-based monitor that facilitate incremental knowledge-base development. 441-449 - Frank Y. Chen, Houmin Yan

, Li Yao:
A newsvendor pricing game. 450-456 - François Delmotte

, Philippe Smets:
Target identification based on the transferable belief model interpretation of dempster-shafer model. 457-471 - Stephen R. Gulliver

, George Ghinea:
Stars in their eyes: what eye-tracking reveals about multimedia perceptual quality. 472-482 - Geoffrey S. Hubona, Gregory W. Shirah, D. K. Jennings:

The effects of cast shadows and stereopsis on performing computer-generated spatial tasks. 483-493 - A. T. Langewisch, F. Fred Choobineh:

Mean and variance bounds and propagation for ill-specified random variables. 494-506 - Kevin W. Li

, Keith W. Hipel, D. Marc Kilgour, Liping Fang:
Preference uncertainty in the graph model for conflict resolution. 507-520 - Hanan Luss, Richard T. Wong:

Survivable telecommunications network design under different types of failures. 521-530 - Katya Rodríguez-Vázquez

, Carlos M. Fonseca
, Peter J. Fleming
:
'Identifying the structure of nonlinear dynamic systems using multiobjective genetic programming. 531-545 - Maria Virvou

, Katerina Kabassi
:
Adapting the human plausible reasoning theory to a graphical user interface. 546-563 - Mustafa Nazmi Kaynak, Qi Zhi, Adrian David Cheok

, Kuntal Sengupta, Jian Zhang, Chi Chung Ko:
Analysis of lip geometric features for audio-visual speech recognition. 564-570 - Zidong Wang

, Daniel W. C. Ho
, Xiaohui Liu:
A note on the robust stability of uncertain stochastic fuzzy systems with time-delays. 570-576
Volume 34, Number 5, September 2004
- Jiannong Cao

, Xinyu Feng, Jian Lu, Henry C. B. Chan
, Sajal K. Das
:
Reliable message delivery for mobile agents: push or pull? 577-587 - Shin-Hang Ho, Shinn-Ying Ho

, Li-Sun Shu:
OSA: orthogonal simulated annealing algorithm and its application to designing mixed H2/H∞ optimal controllers. 588-600 - K. S. Park

:
Mathematical programming models for characterizing dominance and potential optimality when multicriteria alternative values and weights are simultaneously incomplete. 601-614 - Shinsuk Park, Thomas B. Sheridan:

Enhanced human-machine interface in braking. 615-629 - Philippe Sardain, Guy Bessonnet:

Forces acting on a biped robot. Center of pressure-zero moment point. 630-637 - Philippe Sardain, Guy Bessonnet:

Zero moment point-measurements from a human walker wearing robot feet as shoes. 638-648 - F. S. Smith, Qiang Shen

:
Fault identification through the combination of symbolic conflict recognition and Markov chain-aided belief revision. 649-663 - Haiying Tu, Yuri N. Levchuk, Krishna R. Pattipati:

Robust action strategies to induce desired effects. 664-680 - Jianming Shi

, Hiroshi Inoue:
Convex maximization on a convex set with fuzzy constraints. 681-685
Volume 34, Number 6, November 2004
- Meghan M. Dierks, Caprice K. Christian, Emilie M. Roth, Thomas B. Sheridan:

Healthcare safety: the impact of Disabling "safety" protocols. 693-698 - Stephanie A. Guerlain, Kristen Brook Green, Marcel C. LaFollette, T. C. Mersch, B. A. Mitchell, G. R. Poole, James Forrest Calland, Jianhong Lv, E. G. Chekan:

Improving surgical pattern recognition through repetitive viewing of video clips. 699-707 - Brian Hazlehurst, Carmit K. McMullen, Paul N. Gorman:

Getting the right tools for the job: distributed planning in cardiac surgery. 708-717 - Helen Altman Klein, A. R. Meininger:

Self management of medication and Diabetes: cognitive control. 718-725 - Christopher P. Nemeth

, Richard I. Cook, Michael F. O'Connor, P. Allan Klock:
Using cognitive artifacts to understand distributed cognition. 726-735 - Mark E. Nunnally, Christopher P. Nemeth

, V. Brunetti, Richard I. Cook:
Lost in menuspace: user interactions with complex medical devices. 736-742 - Anne-Sophie Nyssen:

Integrating cognitive and collective aspects of work in evaluating technology. 743-748 - Emily S. Patterson

, Richard I. Cook, David D. Woods, Marta L. Render:
Examining the complexity behind a medication error: generic patterns in communication. 749-756 - Michelle L. Rogers

, Richard I. Cook, Robert Bower, Mark Molloy, Marta L. Render:
Barriers to implementing wrong site surgery guidelines: a cognitive work analysis. 757-763 - F. Jacob Seagull

, Yan Xiao
, Cheryl L. Plasters:
Information accuracy and sampling effort: a field study of surgical scheduling coordination. 764-771 - Yan Xiao

, F. Jacob Seagull
, Fe Nieves-Khouw, Nancy Barczak, Sherry Perkins:
Organizational-historical analysis of the "failure to respond to alarm" problems. 772-778

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














