Author of the publication

Non-Standard Parameter Adaptation for Exploratory Data Analysis

, , and . Studies in Computational Intelligence Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovery and Characterization of the Highly Active Fungal Immunomodulatory Protein Fip-vvo82., , , , , , , , , and 1 other author(s). J. Chem. Inf. Model., 56 (10): 2103-2114 (2016)Nonstationary color tracking for vision-based human-computer interaction., and . IEEE Trans. Neural Networks, 13 (4): 948-960 (2002)Analyzing and Capturing Articulated Hand Motion in Image Sequences., , and . IEEE Trans. Pattern Anal. Mach. Intell., 27 (12): 1910-1922 (2005)Towards Self-Exploring Discriminating Features., and . MLDM, volume 2123 of Lecture Notes in Computer Science, page 263-277. Springer, (2001)False Positive Reduction in Lung GGO Nodule Detection with 3D Volume Shape Descriptor., , and . ICASSP (1), page 437-440. IEEE, (2007)Direct position determination based on unitary space-time subspace data fusion., , , and . WCSP, page 1-6. IEEE, (2017)Particle Swarm Optimization Algorithm Based on Natural Selection and Simulated Annealing for PID Controller Parameters., , , and . SimuTools, volume 295 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 363-373. Springer, (2019)Comparative Studies of Common Control Schemes for Reference Tracking and Application of End-point Prediction., and . CICC, page 559-562. IEEE, (2007)Statistical Evaluations of the Reproducibility and Reliability of 3-Tesla High Resolution Magnetization Transfer Brain Images: A Pilot Study on Healthy Subjects., , , , , , , and . Int. J. Biomedical Imaging, (2010)Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem., , and . Security and Management, page 58-64. CSREA Press, (2005)