From post

An Application of Causality for Representing and Providing Formal Explanations about the Behavior of the Threshold Accepting Algorithm.

, , , , , , и . ICAISC, том 5097 из Lecture Notes in Computer Science, стр. 1087-1098. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Application of Causality for Representing and Providing Formal Explanations about the Behavior of the Threshold Accepting Algorithm., , , , , , и . ICAISC, том 5097 из Lecture Notes in Computer Science, стр. 1087-1098. Springer, (2008)A Machine Learning Approach for Modeling Algorithm Performance Predictors., , , , , , и . MDAI, том 3131 из Lecture Notes in Computer Science, стр. 70-80. Springer, (2004)Topology design and bandwidth allocation in ATM nets., , и . IEEE J. Sel. Areas Commun., 7 (8): 1253-1262 (1989)A heuristic method for optimizing an intercity data transmission network.. SIGCOMM, стр. 90-97. ACM, (1981)SoapFS: A Multiplatform File System., , , , , и . ICCSA (2), том 3981 из Lecture Notes in Computer Science, стр. 18-27. Springer, (2006)Semantic representations for knowledge modeling of a Natural Language Interface to Databases using ontologies., , , , , и . Int. J. Comb. Optim. Probl. Informatics, 6 (2): 28-42 (2015)A Wizard for creating semantic views in a natural language interface to databases., , , , и . Int. J. Comb. Optim. Probl. Informatics, 13 (3): 34-42 (2022)Self-Tuning Mechanism for Genetic Algorithms Parameters, an Application to Data-Object Allocation in the Web., , , , , , и . ICCSA (4), том 3046 из Lecture Notes in Computer Science, стр. 77-86. Springer, (2004)Comparison and Selection of Exact and Heuristic Algorithms., , , , , и . ICCSA (3), том 3045 из Lecture Notes in Computer Science, стр. 415-424. Springer, (2004)Solving Large Scale Instances of the Distribution Design Problem Using Data Mining., , , , , и . Comput. Informatics, 28 (1): 29-56 (2009)