Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Line Batch Scheduling by Similarity., , and . GECCO (Companion), page 921-927. ACM, (2016)Stratified locality-sensitive hashing for accelerated physiological time series retrieval., , and . EMBC, page 2479-2483. IEEE, (2016)Categorizing Resources and Learners for a Finer-Grained Analysis of MOOC Viewing & Doing., , , , and . LWMOOCS, page 116-121. IEEE, (2019)Using knowledge of human-generated code to bias the search in program synthesis with grammatical evolution., , , , and . GECCO Companion, page 331-332. ACM, (2021)CyberEvo: evolutionary search of knowledge-based behaviors in a cyber attack campaign., , and . GECCO Companion, page 2168-2176. ACM, (2022)Coevolutionary modeling of cyber attack patterns and mitigations using public datasets., , , , and . GECCO, page 714-722. ACM, (2021)On the Application of Danskin's Theorem to Derivative-Free Minimax Optimization., , , and . CoRR, (2018)On the use of context sensitive grammars in grammatical evolution for legal non-compliance detection., and . GECCO (Companion), page 371-372. ACM, (2019)Investigating algorithms for finding nash equilibria in cyber security problems., and . GECCO (Companion), page 1659-1667. ACM, (2019)Tracer spectrum: a visualisation method for distributed evolutionary computation., , and . Genet. Program. Evolvable Mach., 12 (2): 161-171 (2011)