From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IDS Vulnerability Analysis Using Genertia Red Teams.. Security and Management, стр. 171-176. CSREA Press, (2003)Distributed Steady-State Neuro-Evolutionary Path Planning in Non-Stationary Environments Using Adaptive Replacement.. GECCO, стр. 58-65. Morgan Kaufmann, (2000)Solving Constraint Satisfaction Problems Using a Genetic/Systematic Search Hybrid That Realizes When to Quit., и . ICGA, стр. 122-129. Morgan Kaufmann, (1995)Solving Distributed Asymmetric CSPs via a Society of Hill-Climbers., и . IC-AI, стр. 949-953. CSREA Press, (2002)An artificial immune system for phishing detection., , , , и . IEEE Congress on Evolutionary Computation, стр. 1-7. IEEE, (2012)Genetic algorithms solution for unconstrained optimal crane control., , , и . CEC, стр. 2124-2130. IEEE, (1999)A comparison of adaptive virtual constraint identification strategies for recurrent dynamic constraint satisfaction.. IEEE Congress on Evolutionary Computation, стр. 552-557. IEEE, (2002)Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams., , , и . IEEE Congress on Evolutionary Computation, стр. 111-116. IEEE, (2004)A Transformer-Based Language Model for Sentiment Classification and Cross-Linguistic Generalization: Empowering Low-Resource African Languages., , , , и . AIBThings, стр. 1-5. IEEE, (2023)GESLIC: genetic and evolutionary-based short-length iris codes., , и . ACM Southeast Regional Conference, стр. 201-204. ACM, (2011)