Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Genetic Algorithm for Statistical Database Security., , and . IEEE Data Eng. Bull., 13 (3): 19-26 (1990)Evolutionary Computation: Practical Issues.. International Conference on Evolutionary Computation, page 30-39. IEEE, (1996)Time Series Forecasting for Dynamic Environments: The DyFor Genetic Program Model., , , and . IEEE Trans. Evol. Comput., 11 (4): 433-452 (2007)Test-case generator for nonlinear continuous parameter optimization techniques., , , and . IEEE Trans. Evol. Comput., 4 (3): 197-215 (2000)Evolutionary approaches for supply chain optimisation: Part I: single and two-component supply chains., , , and . Int. J. Intell. Comput. Cybern., 5 (4): 444-472 (2012)Benchmarks for the Coal Processing and Blending Problem., , and . GECCO, page 1005-1012. ACM, (2016)Adapting to human game play., and . CIG, page 8-15. IEEE, (2008)The travelling thief problem: The first step in the transition from theoretical problems to realistic problems., , and . IEEE Congress on Evolutionary Computation, page 1037-1044. IEEE, (2013)Comparison of different evolutionary algorithms for global supply chain optimisation and parameter analysis., , , and . IEEE Congress on Evolutionary Computation, page 2407-2414. IEEE, (2011)Evolutionary Computation at the Edge of Feasibility., and . PPSN, volume 1141 of Lecture Notes in Computer Science, page 245-254. Springer, (1996)