Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Genetic Algorithm for Statistical Database Security., , and . IEEE Data Eng. Bull., 13 (3): 19-26 (1990)Evolutionary Computation: Practical Issues.. International Conference on Evolutionary Computation, page 30-39. IEEE, (1996)Evolutionary Computation: One Project, Many Directions., , and . ISMIS, volume 1079 of Lecture Notes in Computer Science, page 189-201. Springer, (1996)Evolutionary Domain Covering of an Inference System for Function Approximation., , and . Evolutionary Programming, volume 1447 of Lecture Notes in Computer Science, page 167-178. Springer, (1998)Evolutionary approaches for supply chain optimisation: Part I: single and two-component supply chains., , , and . Int. J. Intell. Comput. Cybern., 5 (4): 444-472 (2012)Pioneer: A New Tool for Coding of Multi-Level Finite State Machines Based on Evolution Programming., , , and . VLSI Design, 2 (2): 105-116 (1994)Forecasting with a Dynamic Window of Time: The DyFor Genetic Program Model., , , and . IMTCI, volume 3490 of Lecture Notes in Computer Science, page 205-215. Springer, (2004)Genetic Algorithms + Data Structures = Evolution Programs, Third Revised and Extended Edition.. Springer, (1996)The travelling thief problem: The first step in the transition from theoretical problems to realistic problems., , and . IEEE Congress on Evolutionary Computation, page 1037-1044. IEEE, (2013)Comparison of different evolutionary algorithms for global supply chain optimisation and parameter analysis., , , and . IEEE Congress on Evolutionary Computation, page 2407-2414. IEEE, (2011)