Author of the publication

Fault Detection Algorithm for Telephone Systems Based on the Danger Theory.

, and . ICARIS, volume 3627 of Lecture Notes in Computer Science, page 418-431. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effects of Social Ties in Knowledge Diffusion: case study on PLOS ONE., , and . CoRR, (2016)An extended echo state network using Volterra filtering and principal component analysis., , , and . Neural Networks, (2012)Autonomous navigation system applied to collective robotics with ant-inspired communication., , and . GECCO, page 121-128. ACM, (2005)Finding a high coverage set of 5-biclusters with swarm intelligence., and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2010)Projection pursuit and the solvability condition applied to constructive learning., and . ICNN, page 1062-1067. IEEE, (1997)A Multi-Objective Multipopulation Approach for Biclustering., , and . ICARIS, volume 5132 of Lecture Notes in Computer Science, page 71-82. Springer, (2008)MOBAIS: A Bayesian Artificial Immune System for Multi-Objective Optimization., and . ICARIS, volume 5132 of Lecture Notes in Computer Science, page 48-59. Springer, (2008)Gradient-Based Algorithms for the Automatic Construction of Fuzzy Cognitive Maps., and . ICMLA (1), page 344-349. IEEE, (2012)Simultaneous capacitor placement and reconfiguration for loss reduction in distribution networks by a hybrid genetic algorithm., , , , and . IEEE Congress on Evolutionary Computation, page 2178-2185. IEEE, (2011)Enumerating all maximal biclusters in real-valued datasets., , and . CoRR, (2014)