Author of the publication

Guest Editors' Introduction.

, , and . International Journal of Software Engineering and Knowledge Engineering, 22 (2): 157-159 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A note on teaching-learning-based optimization algorithm., , and . Inf. Sci., (2012)Parameter control in evolutionary algorithms by domain-specific scripting language PPCEA, , and . Proc. Intl. Conf. Bioinspired Optimization Methods and their Applications, page 41--50. (2004)A clustering entropy-driven approach for exploring and exploiting noisy functions., , and . SAC, page 738-742. ACM, (2007)To explore or to exploit: An entropy-driven approach for evolutionary algorithms., , and . KES Journal, 13 (3-4): 185-206 (2009)A Non-Invasive Approach to Dynamic Web Services Provisioning., , , and . ICWS, page 229-236. IEEE Computer Society, (2005)A parameter control method of evolutionary algorithms using exploration and exploitation measures with a practical application for fitting Sovova's mass transfer model., , , and . Appl. Soft Comput., 13 (9): 3792-3805 (2013)A SOA Approach for Domain-Specific Language Implementation., , , , , and . SERVICES, page 535-542. IEEE Computer Society, (2010)Automatic compiler/interpreter generation from programs for Domain-Specific Languages: Code bloat problem and performance improvement., , , and . J. Comput. Lang., (2022)Loss resilient strategy in body sensor networks., , , , , and . BODYNETS, page 99-102. ACM, (2011)A novel direct measure of exploration and exploitation based on attraction basins., , , , , , and . Expert Syst. Appl., (2021)