Author of the publication

Balancing safety and speed in the military path finding problem: analysis of different ACO algorithms.

, , , , , and . GECCO (Companion), page 2859-2864. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CHAC. A MOACO Algorithm for Computation of Bi-Criteria Military Unit Path in the Battlefield, , , , and . CoRR, (2006)Comparing ACO Algorithms for Solving the Bi-criteria Military Path-Finding Problem., , , , , and . ECAL, volume 4648 of Lecture Notes in Computer Science, page 665-674. Springer, (2007)Adaptive Ant Colony Optimization for Service Function Chaining in a Dynamic 5G Network., and . IWANN (1), volume 12861 of Lecture Notes in Computer Science, page 151-164. Springer, (2021)Evolving Machine Microprograms: Application to the CODE2 Microarchitecture., , , , , , and . DCAI, volume 50 of Advances in Soft Computing, page 461-470. Springer, (2008)Testing Hybrid Computational Intelligence Algorithms for General Game Playing., , , and . EvoApplications, volume 12104 of Lecture Notes in Computer Science, page 446-460. Springer, (2020)Modelling a Human-Like Bot in a First Person Shooter Game., , , , and . Int. J. Creative Interfaces Comput. Graph., 6 (1): 21-37 (2015)Testing the Intermediate Disturbance Hypothesis: Effect of Asynchronous Population Incorporation on Multi-Deme Evolutionary Algorithms., , , , , , , , and . PPSN, volume 5199 of Lecture Notes in Computer Science, page 266-275. Springer, (2008)Sleeping with ants, SVMs, multilayer perceptrons and SOMs., , , , , , and . ISDA, page 126-131. IEEE, (2010)Assessing efficiency of different evolutionary strategies playing MasterMind., , , and . CIG, page 38-45. IEEE, (2010)Detection and mitigation of DoS attacks in SDN. An experimental approach., , , , and . IoTSMS, page 575-580. IEEE, (2019)