Author of the publication

The Omnipresent Computing Menace to Information Society.

, and . J. Adv. Comput. Intell. Intell. Informatics, 15 (7): 786-792 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Survival of the Fittest and the Reign of the Most Robust: In Biology and Elsewhere., and . Minds and Machines, 19 (3): 361-389 (2009)DNA Algorithms for Rough Set Analysis.. IDEAL, volume 2690 of Lecture Notes in Computer Science, page 498-513. Springer, (2003)Interpretation of the Richardson Plot in Time Series Representation., , and . IDEAL, volume 1983 of Lecture Notes in Computer Science, page 206-211. Springer, (2000)DNA Algorithms for Petri Net Modeling.. Informatica (Slovenia), 32 (4): 421-427 (2008)The Omnipresent Computing Menace to Information Society., and . J. Adv. Comput. Intell. Intell. Informatics, 15 (7): 786-792 (2011)Turing Test Considered Mostly Harmless., , and . New Generation Comput., 31 (4): 241-263 (2013)Application of Game Theory to Neuronal Networks., and . Adv. Artif. Intell., (2010)A Hybrid Robot Control System Based on Soft Computing Techniques.. IEA/AIE, volume 4031 of Lecture Notes in Computer Science, page 187-196. Springer, (2006)Using Chaos Theory for the Genetic Learning of Fuzzy Controllers.. IEA/AIE, volume 3029 of Lecture Notes in Computer Science, page 382-391. Springer, (2004)Towards a decision support system for automated testing of complex telecommunication networks., , , , and . SMC, page 2002-2006. IEEE, (2000)