Author of the publication

Protein Structure Prediction by Applying an Evolutionary Algorithm.

, , and . IPDPS, page 155. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionary Computation and Convergence to a Pareto Front, and . Late Breaking Papers at the Genetic Programming 1998 Conference, University of Wisconsin, Madison, Wisconsin, USA, Stanford University Bookstore, (22-25 July 1998)Evolving Compact Decision Rule Sets, and . Late Breaking Papers at the Genetic Programming 1998 Conference, University of Wisconsin, Madison, Wisconsin, USA, Stanford University Bookstore, (22-25 July 1998)Pattern Classification using a Hybrid Genetic Program Decision Tree Approach, and . Genetic Programming 1998: Proceedings of the Third Annual Conference, page 223--231. University of Wisconsin, Madison, Wisconsin, USA, Morgan Kaufmann, (22-25 July 1998)The multi-objective constrained assignment problem., and . GECCO, page 743-744. ACM, (2006)A genetic algorithm for unmanned aerial vehicle routing., and . GECCO, page 1523-1530. ACM, (2005)Emergent architecture in self organized swarm systems for military applications., , and . GECCO (Companion), page 1913-1920. ACM, (2008)Multiobjective tuning of a multitarget tracking algorithm using an evolutionary algorithm., and . MCDM, page 51-57. IEEE, (2009)Extended Multi-objective fast messy Genetic Algorithm Solving Deception Problems., and . EMO, volume 3410 of Lecture Notes in Computer Science, page 296-310. Springer, (2005)A distributed architecture for an adaptive computer virus immune system., , and . SMC, page 3838-3843. IEEE, (1998)An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions., , , and . ICARIS, volume 4628 of Lecture Notes in Computer Science, page 420-435. Springer, (2007)