Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An online shadowed clustering algorithm applied to risk visualization in Territorial Security., , and . CISDA, page 1-8. IEEE, (2012)A mixed framework to support heterogeneous collection asset scheduling., , , , , and . GECCO (Companion), page 1606-1614. ACM, (2019)Dynamic white-box software testing using a recursive hybrid evolutionary strategy/genetic algorithm., , and . IEEE Congress on Evolutionary Computation, page 2525-2532. IEEE, (2013)A multi-objective optimization approach to Reliable Robot-Assisted Sensor Relocation., , , and . CEC, page 956-964. IEEE, (2015)Risk-driven intent assessment and response generation in maritime surveillance operations., , and . CogSIMA, page 151-157. IEEE, (2015)Maritime smuggling detection and mitigation using risk-aware hybrid robotic sensor networks., , , and . CogSIMA, page 1-7. IEEE, (2017)Soft-data-driven resource management for concurrent maritime security operations., , , , , , and . CogSIMA, page 1-7. IEEE, (2017)A Graph-based Genetic Algorithm to Solve the Virtual Constellation Multi-Satellite Collection Scheduling Problem., , , , , , , , and . CEC, page 1-10. IEEE, (2018)On the role of multi-objective optimization in risk mitigation for critical infrastructures with robotic sensor networks., , , , and . GECCO (Companion), page 1269-1276. ACM, (2014)Agent-based control for a dynamically reconfigurable mobile robotic structure., , and . ROSE, page 24-29. IEEE, (2004)