Author of the publication

Community detection in graphs based on surprise maximization using firefly heuristics.

, , , , and . CEC, page 2233-2239. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaborative Training of Heterogeneous Reinforcement Learning Agents in Environments with Sparse Rewards: What and When to Share?, , and . CoRR, (2022)Hybrid Quantum Computing - Tabu Search Algorithm for Partitioning Problems: preliminary study on the Traveling Salesman Problem., , , and . CoRR, (2020)Optimization of Image Acquisition for Earth Observation Satellites via Quantum Computing., , , , , and . IDEAL, volume 14404 of Lecture Notes in Computer Science, page 3-14. Springer, (2023)Edge intelligence secure frameworks: Current state and future challenges., , , , and . Comput. Secur., (2023)Lights and Shadows in Evolutionary Deep Learning: Taxonomy, Critical Methodological Analysis, Cases of Study, Learned Lessons, Recommendations and Challenges., , , , , , , and . CoRR, (2020)Digital Quantum Simulation and Circuit Learning for the Generation of Coherent States., , , , , and . Entropy, 24 (11): 1529 (2022)Intelligent SPARQL Endpoints: Optimizing Execution Performance by Automatic Query Relaxation and Queue Scheduling., , , and . ICA3PP, volume 10048 of Lecture Notes in Computer Science, page 3-17. Springer, (2016)Hybrid Quantum Computing - Tabu Search Algorithm for Partitioning Problems: Preliminary Study on the Traveling Salesman Problem., , , and . CEC, page 351-358. IEEE, (2021)Semantic Information Fusion of Linked Open Data and Social Big Data for the Creation of an Extended Corporate CRM Database., , , and . IDC, volume 570 of Studies in Computational Intelligence, page 211-221. Springer, (2014)On a Machine Learning Approach for the Detection of Impersonation Attacks in Social Networks., , and . IDC, volume 570 of Studies in Computational Intelligence, page 259-268. Springer, (2014)