Author of the publication

Meta-Learning Evolutionary Artificial Neural Networks: by Means of Cellular Automata.

, and . CIMCA/IAWTIC, page 186-192. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Meta-Learning Evolutionary Artificial Neural Networks: by Means of Cellular Automata., and . CIMCA/IAWTIC, page 186-192. IEEE Computer Society, (2005)Workshop on Enterprise Security.. WETICE, page 60-61. IEEE Computer Society, (1996)Meta-Learning Evolutionary Artificial Neural Networks Using Cellular Configurations: Experimental Works., and . ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 178-193. Springer, (2006)Security and confidentiality in health care informatics., , , , and . ACM Workshop on Role-Based Access Control, ACM, (1995)Secure Workflow Environment., and . WETICE, page 269-276. IEEE Computer Society, (1997)Summary Report on Enterprise Security Workshop., and . WETICE, page 139-140. IEEE Computer Society, (2000)A simulation study of a CSMA/CD with connected data links., , , and . Annual Simulation Symposium, page 292-300. IEEE Computer Society, (1991)Introduction.. WETICE, page 213. IEEE Computer Society, (1997)MediaWare: a distributed multimedia environment with interoperability., and . WETICE, page 128-137. IEEE Computer Society, (1995)Introduction.. WETICE, page 294. IEEE Computer Society, (1998)