Author of the publication

For a refoundation of Artificial Immune System research: AIS is a Design Pattern.

, , , , and . SSCI, page 1122-1129. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constraint Satisfaction Problem with Bilevel Constraint: Application to Interpretation of Over-Segmented Images., and . Artif. Intell., (1997)Temporal image fusion., , , and . ICIP, page 472-475. IEEE Computer Society, (1995)A Morphological Model for Automatic Edge Detection: Comparison with ad-hoc Hysteresis Thresholding., and . ICIP (2), page 530-534. IEEE Computer Society, (1998)EMMY: A Refutational Theorem Prover for First-Order Logic with Equation.. RTA, volume 488 of Lecture Notes in Computer Science, page 439-441. Springer, (1991)Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection., , , , and . EURASIP J. Information Security, (2018)Adaptive Pyramid and Semantic Graph: Knowledge Driven Segmentation., , , and . GbRPR, volume 3434 of Lecture Notes in Computer Science, page 213-222. Springer, (2005)Morwilog: an ACO-based system for outlining multi-step attacks., , and . SSCI, page 1-8. IEEE, (2016)Robust Reinforcement Learning for Autonomous Driving., , , and . DeepRLStructPred@ICLR, OpenReview.net, (2019)Morwilog: an ACO-based system for outlining multi-step attacks., , and . SSCI, page 1-8. IEEE, (2016)Qualitative Spatial Relationships for Image Interpretation by Using Semantic Graph., and . GbRPR, volume 4538 of Lecture Notes in Computer Science, page 240-250. Springer, (2007)