Author of the publication

A close-pair binary in a distant triple supermassive black-hole system

, , , , , , , , , , and . (2014)cite arxiv:1406.6365Comment: 21 pages, 6 figures. Published online by Nature on 25 June 2014. Extremely minor differences with published version exist.
DOI: 10.1038/nature13454

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The ALMA Observation Support Tool, , and . (2011)cite arxiv:1106.3516Comment: 6 pages, 4 figures, to appear in the proceedings of Astronomy with Megastructures: Joint Science with the E-ELT and SKA, 10-14 May 2010, Crete, Greece.A close-pair binary in a distant triple supermassive black-hole system, , , , , , , , , and 1 other author(s). (2014)cite arxiv:1406.6365Comment: 21 pages, 6 figures. Published online by Nature on 25 June 2014. Extremely minor differences with published version exist.The 1.28 GHz MeerKAT DEEP2 Image, , , , , , , , , and 94 other author(s). (2019)cite arxiv:1912.06212Comment: 20 pages, 18 figures. Accepted for publication in ApJ.Scaling Genetic Programming to Large Datasets Using Hierarchical Dynamic Subset Selection, , and . IEEE Transactions on Systems, Man, and Cybernetics: Part B - Cybernetics, 37 (4): 1065--1073 (August 2007)On the Efficient Mining of Network Audit Data using Genetic Programming, , , and . GECCO 2004 Workshop Proceedings, Seattle, Washington, USA, (26-30 June 2004)Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race., , and . Appl. Soft Comput., 11 (7): 4366-4383 (2011)Training genetic programming on half a million patterns: an example from anomaly detection., , and . IEEE Trans. Evol. Comput., 9 (3): 225-239 (2005)Digital library query clearing using clustering and fuzzy decision-making., , and . Inf. Process. Manag., 36 (4): 571-583 (2000)The effect of routing under local information using a social insect metaphor., , and . IEEE Congress on Evolutionary Computation, page 1438-1443. IEEE, (2002)Simple Efficient Evolutionary Ensemble Learning on Network Intrusion Detection Benchmarks., , and . EvoApplications@EvoStar, volume 14634 of Lecture Notes in Computer Science, page 361-376. Springer, (2024)