Author of the publication

Enforcing corporate security policies via computational intelligence techniques.

, , , , and . GECCO (Companion), page 1245-1252. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An experimental study of exhaustive solutions for the Mastermind puzzle, , , and . CoRR, (2012)Self-adaptive Gossip Policies for Distributed Population-based Algorithms, , , , , , and . CoRR, (2007)FIFA World Cup 2010: A Network Analysis of the Champion Team Play, , , and . CoRR, (2011)MUSES: a corporate user-centric system which applies computational intelligence methods., , , , , , , , and . SAC, page 1719-1723. ACM, (2014)Comparing multiobjective evolutionary ensembles for minimizing type I and II errors for bankruptcy prediction., , , , , , , and . IEEE Congress on Evolutionary Computation, page 2902-2908. IEEE, (2008)CHAC, A MOACO algorithm for computation of bi-criteria military unit path in the battlefield: Presentation and first results., , , , and . Int. J. Intell. Syst., 24 (7): 818-843 (2009)Co-Evolutionary Optimization of Autonomous Agents in a Real-Time Strategy Game., , , , , and . EvoApplications, volume 8602 of Lecture Notes in Computer Science, page 374-385. Springer, (2014)Pareto-based multi-colony multi-objective ant colony optimization algorithms: an island model proposal., , , and . Soft Comput., 17 (7): 1175-1207 (2013)Evolutionary FSM-Based Agents for Playing Super Mario Game., , , , , and . LION, volume 7997 of Lecture Notes in Computer Science, page 357-363. Springer, (2013)Modelling a Human-Like Bot in a First Person Shooter Game., , , , and . Int. J. Creative Interfaces Comput. Graph., 6 (1): 21-37 (2015)