Journal of Systems Science and Complexity, Volume 21 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 21, Number 1, March 2008

Lean Yu, Shouyang Wang
, Kin Keung Lai
:
Forecasting China's Foreign Trade Volume with a Kernel-Based Hybrid Econometric-Ai Ensemble Learning Approach. 1-19

Liang Chen, Junan Lu:
Cluster Synchronization in a Complex Dynamical Network with Two Nonidentical Clusters. 20-33

Xijin Tang, Nan Zhang, Zheng Wang:
Exploration of TCM Masters Knowledge Mining. 34-45

Hongguo Zhao, Huanshui Zhang
, Hongxia Wang, Chenghui Zhang:
Linear Quadratic Regulation for Discrete-Time Systems with Input Delay: Spectral Factorization Approach. 46-59

Shixin Zhu, Xiaoshan Kai:
The Hamming Distances of Negacyclic Codes of Length 2s over GR(2a, m). 60-66

Zeraoulia Elhadj:
Dynamical Analysis of a 3-D Chaotic System with only Two Quadratic Nonlinearities. 67-75

Xiwang Cao:
Some Results on Generalized Difference Sets. 76-84

Peihua Guo, Detong Zhu:
Nonmonotonic Reduced Projected Hessian Method Via an Affine Scaling Interior Modified Gradient Path for Bounded-Constrained Optimization. 85-113

Shoupeng Liu
, Yuzhong Zhang:
On-Line Scheduling of Unit Time Jobs with Rejection on Uniform Machines. 114-118

Jiaqi Mo, Wantao Lin:
Asymptotic Solution of Activator Inhibitor Systems for Nonlinear Reaction Diffusion Equations. 119-128

Min Yang:
A Multistep Finite Volume Method with Penalty for Thermal Convection Problems in Two or Three Dimensions. 129-143

Xueling Ma, Jianming Zhan
:
On (∈, ∈∨q)-Fuzzy Filters of _BL_-Algebras. 144-158
Volume 21, Number 2, February 2008

Yoshiharu Maeno, Yukio Ohsawa
:
Predicting relevant empty spots in social interaction. 161-171

Nevin Lianwen Zhang, Yi Wang
, Tao Chen:
Discovery of latent structures: Experience with the CoIL Challenge 2000 data set. 172-183

Jin Zhang, Shouyang Wang
, Lei Zu:
Stability of International Environmental Agreements in leadership model. 184-190

Fengjuan Chai, Xiao-Shan Gao, Chun-Ming Yuan:
A characteristic set method for solving boolean equations and applications in cryptanalysis of stream ciphers. 191-208

Sheng Chen, Lindu Zhao, Ying Han:
Multi-agent aggregation behavior analysis: The dynamic communication topology. 209-216

Jianjun Jiao, Lansun Chen, Shaohong Cai:
An SEIRS epidemic model with two delays and pulse vaccination. 217-225

Desheng Tian:
Periodic solution and persistence for a three-species ratio-dependent predator-prey model with time delays in two-patch environments. 226-238

Haifeng Yan, Jianqi Yang, Limin Liu:
Mixed hedging under additive market price information. 239-249

Junhai Ma, Yaqiang Cui, Lixia Liu:
Hopf bifurcation and chaos of financial system on condition of specific combination of parameters. 250-259

Zhaoqiang Ge, Guangtian Zhu, Dexing Feng:
Hopf bifurcation and chaos of financial system on condition of specific combination of parameters. 260-266

Xiaohua Liu, Chunyan Han:
Robust model predictive control of continuous uncertain systems. 267-275

Weiyan Mu, Shifeng Xiong, Xingzhong Xu:
Generalized confidence regions of fixed effects in the two-way ANOVA. 276-282

Yongjiang Guo:
Stability of generalized Jackson networks with infinite supply of work. 283-295

Hongluan Zhao, Guojun Li:
Unbounded batch scheduling with a common due window on a single machine. 296-303

Jinting Wang
:
On the single server retrial queue with priority subscribers and server breakdowns. 304-315
Volume 21, Number 3, September 2008

Jiangping Hu
, Xiaoming Hu
:
Optimal Target Trajectory Estimation and Filtering Using Networked Sensors. 325-336

Qin Li, Zhong-Ping Jiang:
Relaxed Conditions for Consensus in Multi-Agent Coordination. 347-361

Zhiqiang Li, Yupeng Qiao, Hongsheng Qi, Daizhan Cheng:
Stability of Switched Polynomial Systems. 362-377

Qi-jiang Song, Han-Fu Chen:
Identification for Wiener Systems with Internal Noise. 378-393

Qingwei Liu, Yi Li, Shouyang Wang
:
From Hedging to Speculation - An Explanaton Based on Prospect Theory. 394-405

Yuhong Li:
On the Almost Surely Asymptotic Bounds of a Class of Ornstein-Uhlenbeck Processes in Infinite Dimensions. 416-426

Xinzhu Meng
, Lansun Chen:
A Stage-Structured SI Eco-Epidemiological Model with Time Delay and Impulsive Controlling. 427-440

Xianjiu Huang, Xi Wen, Fanping Zeng:
Pre-Image Entropy of Nonautonomous Dynamical Systems. 441-445

Xiu-li Xu, Naishuo Tian:
The M/M/c Queue with (e, d) Setup Time. 446-455

Dongyang Shi, Xiaobin Hao:
Accuracy Analysis for Quasi-Carey Element. 456-462

Qibing Gao, Yaohua Wu, Chunhua Zhu, Zhanfeng Wang:
Asymptotic Normality of Maximum Quasi-Likelihood Estimators in Generalized Linear Models with Fixed Design. 463-473

Yongfu Su, Xiaolong Qin:
Strong Convergence of Monotone Hybrid Method for Fixed Point Iteration Processes. 474-482
Volume 21, Number 4, December 2008

Zhi Jin, Xiaoguang Yang, Hanqin Zhang:
Preface. 485-486

Tingting Xiao, Ke Liu, Kin Keung Lai:
Tax Evasion: Models with Self-Audit. 487-518

Yunhui Xu, Zhongfei Li, Ken Seng Tan:
Optimal Investment with Noise Trading Risk. 519-526

Lean Yu, Shouyang Wang, Fenghua Wen, Kin Keung Lai, Shaoyi He:
Designing a Hybrid Intelligent Mining System for Credit Risk Evaluation. 527-539

Xiaoya Li, Jinchuan Cui:
A Comprehensive Dea Approach for the Resource Allocation Problem based on Scale Economies Classification. 540-557

Ai Han
, Yongmiao Hong
, Kin Keung Lai, Shouyang Wang
:
Interval Time Series Analysis with an Application to the Sterling-Dollar Exchange Rate. 558-573

Kedian Mu, Zhi Jin, Didar Zowghi
:
A Priority-Based Negotiations Approach for Handling Inconsistencies in Multi-Perspective Software Requirements. 574-596

Jian Tang, Liwei Zheng, Zhi Jin:
Web Services Composing by Multiagent Negotiation. 597-608

Haixia Du, Terry S. Yoo, Hong Qin:
PDE-Based Medial Axis Extraction and Shape Manipulation of Arbitrary Meshes. 609-625

Jianming Zhu, Xiaodong Hu:
Improved Algorithm for Minimum Data Aggregation Time Problem in Wireless Sensor Networks. 626-636

Jiguang Wang, Yu-Qing Qiu, Rui-Sheng Wang, Xiang-Sun Zhang:
Remarks on Network Community Properties. 637-644

Lan Xiao, Guiying Yan
, Yuwen Wu, Wei Ren:
Induced Subgraph in Random Regular Graph. 645-650

Xiaoguang Yang, Jianzhong Zhang:
Inverse Center Location Problem on a Tree. 651-664

Lin Wang, Yu-Qing Qiu, Jiguang Wang
, Xiang-Sun Zhang:
Recognition of Structure Similarities in Proteins. 665-675

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







