Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Communication in Linda/Q : Datatypes and Unification., and . ICPP (2), page 219-226. CRC Press, (1991)Dynamic risk evaluation model as a security field., , , and . GCCE, page 628-629. IEEE, (2015)A Riemannian Optimization Approach to the Matrix Singular Value Decomposition., and . SIAM J. Optim., 23 (1): 188-212 (2013)Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach., , , , and . J. Inf. Process., 22 (3): 464-471 (2014)Improved S-CDAs using crossover controlling the number of crossed genes for many-objective optimization., , and . GECCO, page 753-760. ACM, (2011)Control of Crossed Genes Ratio for Directed Mating in Evolutionary Constrained Multi-Objective Optimization., , and . GECCO (Companion), page 1201-1204. ACM, (2015)Local dominance and controlling dominance area of solutions in multi and many objectives EAs., , and . GECCO (Companion), page 1811-1814. ACM, (2008)Probabilistic model building GP with Belief propagation., , , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2012)Complex-Valued-based Learning Classifier System for POMDP Environments., , , and . CEC, page 1852-1859. IEEE, (2019)Learning non-linear ranking functions for web search using probabilistic model building GP., , , and . IEEE Congress on Evolutionary Computation, page 3371-3378. IEEE, (2013)