Author of the publication

A Fast Iterative Algorithm for Improved Unsupervised Feature Selection.

, , and . ICDM, page 390-399. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic Leverage Scores for Parallelized Unsupervised Feature Selection., , and . IWANN (2), volume 10306 of Lecture Notes in Computer Science, page 722-733. Springer, (2017)Optimizing Evolution Rules Application and Communication Times in Membrane Systems Implementation., , , , , and . Workshop on Membrane Computing, volume 4860 of Lecture Notes in Computer Science, page 298-319. Springer, (2007)Towards Probabilistic Networks of Polarized Evolutionary Processors., , , , and . HPCS, page 764-771. IEEE, (2018)How Nets of Evolutionary Processors (NEPs) Could be Simulated in a Distributed Way., , , and . IWANN (1), volume 9094 of Lecture Notes in Computer Science, page 55-68. Springer, (2015)How to Search Optimal Solutions in Big Spaces with Networks of Bio-Inspired Processors., , and . IWANN (1), volume 9094 of Lecture Notes in Computer Science, page 29-39. Springer, (2015)Deep convolutional neural networks for detecting noisy neighbours in cloud infrastructure., , , , , and . ESANN, (2017)Simulating Metabolic Processes Using an Architecture Based on Networks of Bio-inspired Processors., , and . UCNC, volume 7956 of Lecture Notes in Computer Science, page 255-256. Springer, (2013)NPEPE: Massive Natural Computing Engine for Optimally Solving NP-complete Problems in Big Data Scenarios., , and . ADBIS (Short Papers and Workshops), volume 539 of Communications in Computer and Information Science, page 207-217. Springer, (2015)Massively Parallel Unsupervised Feature Selection on Spark., , and . ADBIS (Short Papers and Workshops), volume 539 of Communications in Computer and Information Science, page 186-196. Springer, (2015)Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks., , , , and . CoRR, (2021)