Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolving Cryptographic Pseudorandom Number Generators., , , , , and . PPSN, volume 9921 of Lecture Notes in Computer Science, page 613-622. Springer, (2016)Operating System Core as Template for Embedded System Software Development., and . ICINCO (1), page 589-594. SciTePress, (2012)Comparison of schedule generation schemes for designing dispatching rules with genetic programming in the unrelated machines environment., and . Appl. Soft Comput., (2020)Comparison of ensemble learning methods for creating ensembles of dispatching rules for the unrelated machines environment., and . Genet. Program. Evolvable Mach., 19 (1-2): 53-92 (2018)Digging Deeper: Operator Analysis for Optimizing Nonlinearity of Boolean Functions., , , and . CoRR, (2023)Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography-Relevant Boolean Functions., , , and . PPSN, volume 8672 of Lecture Notes in Computer Science, page 822-831. Springer, (2014)Comparison of solution representations for scheduling in the unrelated machines environment., and . MIPRO, page 1336-1342. IEEE, (2016)On the evolution of bent (n, m) functions., , and . CEC, page 2137-2144. IEEE, (2017)On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box., , , , , and . CS2@HiPEAC, page 13-18. ACM, (2014)Analyzing gene expression data: Fuzzy decision tree algorithm applied to the classification of cancer data., , and . FUZZ-IEEE, page 1-8. IEEE, (2015)