Author of the publication

Decomposition-Based Algorithms Using Pareto Adaptive Scalarizing Methods.

, , and . IEEE Trans. Evol. Comput., 20 (6): 821-837 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Virtual Cybermarketing System Using Web3D and JSR-184., , and . ICAT Workshops, page 11-15. IEEE Computer Society, (2006)Implementation and evaluation of autonomous collaborative discovery of neighboring networks., , , , , , and . ITRE, page 12-17. IEEE, (2005)Vision-Based Hand Gestures Recognition for Human-Robot Interaction., , , , , and . ICINCO (2), page 440-445. INSTICC Press, (2004)Blend-In: A Privacy-Enhancing Certificate-Selection Method for Vehicular Communication., , and . IEEE Trans. Vehicular Technology, 58 (9): 5190-5199 (2009)Lazy Slicing for State-Space Exploration., , , , and . J. Comput. Sci. Technol., 27 (4): 872-890 (2012)Metagenomic Discovery of Biomass-Degrading Genes and Genomes from Cow Rumen, , , , , , , , , and 7 other author(s). Science, 331 (6016): 463-467 (2011)SEGAN: Structure-Enhanced Generative Adversarial Network for Compressed Sensing MRI Reconstruction., , and . CoRR, (2019)Security of Direct Anonymous Authentication Using TPM 2.0 Signature - A Possible Implementation Flaw., and . Inscrypt, volume 8957 of Lecture Notes in Computer Science, page 37-48. Springer, (2014)Fog Services and Enabling Technologies., , , , and . IEEE Communications Magazine, 57 (5): 18 (2019)The existence of P≥3-factor covered graphs., , and . Discussiones Mathematicae Graph Theory, 37 (4): 1055-1065 (2017)