![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
SOCO-CISIS-ICEUTE 2014: Bilbao, Spain
- José Gaviria de la Puerta, Iván García-Ferreira, Pablo García Bringas, Fanny Klett, Ajith Abraham, André C. P. L. F. de Carvalho, Álvaro Herrero
, Bruno Baruque, Héctor Quintián, Emilio Corchado:
International Joint Conference SOCO'14-CISIS'14-ICEUTE'14 - Bilbao, Spain, June 25th-27th, 2014, Proceedings. Advances in Intelligent Systems and Computing 299, Springer 2014, ISBN 978-3-319-07994-3 - Víctor Berrocal-Plaza, Miguel Ángel Vega Rodríguez
, Juan Manuel Sánchez-Pérez:
A Strength Pareto Approach and a Novel Formulation in the Reporting Cells Planning. 1-10 - Tomás Jezowicz, Petr Gajdos, Eliska Ochodkova, Václav Snásel:
A New Iterative Approach for Finding Nearest Neighbors Using Space-Filling Curves for Fast Graphs Visualization. 11-20 - Jan Janousek, Petr Gajdos, Michal Radecký, Václav Snásel:
Classification via Nearest Prototype Classifier Utilizing Artificial Bee Colony on CUDA. 21-30 - Eneko Osaba
, Roberto Carballedo
, Fernando Díaz, Enrique Onieva
, Asier Perallos:
A Proposal of Good Practice in the Formulation and Comparison of Meta-heuristics for Solving Routing Problems. 31-40 - Julio Fernández-Ceniceros
, Javier Antoñanzas-Torres
, Rubén Urraca-Valle
, Enrique Sodupe-Ortega
, Andrés Sanz-García
:
Soft Computing Metamodels for the Failure Prediction of T-stub Bolted Connections. 41-51 - Rubén Urraca-Valle
, Enrique Sodupe-Ortega
, Javier Antoñanzas-Torres
, Fernando Antoñanzas-Torres, Francisco J. Martínez de Pisón Ascacibar:
An Overall Performance Comparative of GA-PARSIMONY Methodology with Regression Algorithms. 53-62 - Victor V. Kashirin, Sergey V. Kovalchuk
, Alexander V. Boukhanovsky
:
Evolutionary Simulation of Complex Networks' Structures with Specific Functional Properties. 63-72 - Raúl Roldán, Rosa Basagoiti
, Enrique Onieva
:
Inventory Routing Problem with Stochastic Demand and Lead Time: State of the Art. 73-82 - Denis A. Nasonov, Nikolay Butakov, Marina Balakhontseva, Konstantin V. Knyazkov, Alexander V. Boukhanovsky
:
Hybrid Evolutionary Workflow Scheduling Algorithm for Dynamic Heterogeneous Distributed Computational Environment. 83-92 - Miren Nekane Bilbao
, Javier Del Ser, Sancho Salcedo-Sanz, Sergio Gil-Lopez, José Antonio Portilla-Figueras
:
A Bi-objective Harmony Search Approach for Deploying Cost-Effective Multi-hop Communications over Large-Area Wildfires. 93-103 - Bartosz Krawczyk, Pawel Ksieniewicz
, Michal Wozniak
:
Hyperspectral Image Analysis Based on Quad Tree Decomposition. 105-113 - Ali Abusnina, Daniel Kudenko, Rolf Roth:
Gaussian Process-Based Inferential Control System. 115-124 - Borja Fernández-Gauna
, Juan Luis Osa
, Manuel Graña:
Effect of Initial Conditioning of Reinforcement Learning Agents on Feedback Control Tasks over Continuous State and Action Spaces. 125-133 - Javier Carbó
, Juanita P. Pedraza, Mar Lopez, José Manuel Molina:
Privacy Protection in Trust Models for Agent Societies. 135-144 - Amira Sayed A. Aziz, Sanaa El-Ola Hanafi, Aboul Ella Hassanien:
Multi-agent Artificial Immune System for Network Intrusion Detection and Classification. 145-154 - Yudaeva Maria, Hovanov Nikolai, Kolesov Dmitrii
:
Double Randomized Estimation of Russian Blue Chips Based on Imprecise Information. 155-164 - Rubén Lostado-Lorza, Rubén Escribano-García
, Roberto Fernández-Martínez
, Marcos Illera-Cueva, Bryan J. Mac Donald
:
Combination of the Finite Element Method and Data Mining Techniques to Design and Optimize Bearings. 165-174 - Dragan Simic
, Vasa Svircevic, Svetlana Simic:
An Approach of Fuzzy Models for Supplier Assessment and Selection. 175-184 - Jendrik Poloczek, Nils André Treiber, Oliver Kramer:
KNN Regression as Geo-Imputation Method for Spatio-Temporal Wind Data. 185-193 - Can Ulas Dogruer
:
Online Identification of Odometer Parameters of a Mobile Robot. 195-206 - Konrad Jackowski, Jan Platos
:
Application of AdaSS Ensemble Approach for Prediction of Power Plant Generator Tension. 207-216 - Pavel Brandstetter
, Martin Kuchar
, Jiri Friedrich:
Application of RBF Neural Network in Sensorless Control of A.C. Drive with Induction Motor. 217-227 - Asier Salazar-Ramirez
, Eloy Irigoyen
, Raquel Martínez-Unanue:
Enhancements for a Robust Fuzzy Detection of Stress. 229-238 - Pedro Luis Galdámez, María Angélica González Arrieta
, Miguel Ramón Ramón:
Neural Networks Using Hausdorff Distance, SURF and Fisher Algorithms for Ear Recognition. 239-249 - Sancho Salcedo-Sanz, José Antonio Portilla-Figueras
, Jesús Muñoz-Bulnes, Javier Del Ser
, Miren Nekane Bilbao
:
A Novel Harmony Search Algorithm for One-Year-Ahead Energy Demand Estimation Using Macroeconomic Variables. 251-258 - Martin Macas
, Fiorella Lauro, Fabio Moretti
, Stefano Pizzuti
, Mauro Annunziato, Alessandro Fonti, Gabriele Comodi
, Andrea Giantomassi:
Sensitivity Based Feature Selection for Recurrent Neural Network Applied to Forecasting of Heating Gas Consumption. 259-268 - Luis Martí
, Nayat Sánchez Pi
, José Manuel Molina, Ana Cristina Bicharra Garcia
:
Combining Support Vector Machines and Segmentation Algorithms for Efficient Anomaly Detection: A Petroleum Industry Application. 269-278 - Roberto Fernández-Martínez
, Rubén Lostado-Lorza, Marcos Illera-Cueva, Rubén Escribano-García
, Bryan J. Mac Donald
:
Comparison Analysis of Regression Models Based on Experimental and FEM Simulation Datasets Used to Characterize Electrolytic Tinplate Materials. 279-288 - Yonanda Adhitama, Wolfgang Rosenstiel:
Design Method for a Scalable Modular Structure Product Family. 289-299 - Rubén Escribano-García
, Rubén Lostado-Lorza, Roberto Fernández-Martínez
, Pedro Villanueva-Roldán, Bryan J. Mac Donald
:
Improvement in Manufacturing Welded Products through Multiple Response Surface Methodology and Data Mining Techniques. 301-310 - Katarzyna Grzybowska
, Gábor Kovács:
Logistics Process Modelling in Supply Chain - Algorithm of Coordination in the Supply Chain - Contracting. 311-320 - Salva Peiró
, Manuel Muñoz, Miguel Masmano, Alfons Crespo
:
Detecting Stack Based Kernel Information Leaks. 321-331 - Ruxandra F. Olimid
:
A Chain of Attacks and Countermeasures Applied to a Group Key Transfer Protocol. 333-342 - Tien Pham, Wanli Ma
, Dat Tran
, Phuoc Nguyen, Dinh Q. Phung:
EEG-Based User Authentication Using Artifacts. 343-353 - Joaquín Borrego-Díaz
, Antonia M. Chávez-González, José Luis Pro-Martín, Virginia Matos-Arana:
Specifying and Verifying Meta-Security by Means of Semantic Web Methods. 355-365 - J. David Nuñez-Gonzalez
, Manuel Graña:
Experiments on Trust Prediction Based on Reputation Features. 367-374 - Ashish Jain
, Narendra S. Chaudhari:
Cryptanalytic Results on Knapsack Cryptosystem Using Binary Particle Swarm Optimization. 375-384 - Zaki Brahmi
, Amine Lini, Mohamed Mohsen Gammoudi:
Mobile Agent Security Based on Artificial Immune System. 385-395 - Alberto Peinado, Jorge Munilla, Amparo Fúster-Sabater:
Improving the Period and Linear Span of the Sequences Generated by DLFSRs. 397-406 - Alberto Peinado, Andrés Ortiz
:
Prediction of Sequences Generated by LFSR Using Back Propagation MLP. 407-412 - Ciprian Pungila
, Viorel Negru
:
An Efficient Heterogeneous Approach to Building Compressed Automata for Malware Signature Matching. 413-422 - Adam Wójtowicz
:
Mining in Dynamically Composed Scripted 3D Scenes for Better Access Control - Computational Evaluation. 423-432 - Bartosz Krawczyk, Michal Wozniak
:
Evolutionary Cost-Sensitive Ensemble for Malware Detection. 433-442 - Iván García-Ferreira, Carlos Laorden
, Igor Santos, Pablo García Bringas
:
A Survey on Static Analysis and Model Checking. 443-452 - Jesus Diaz
, David Arroyo, Francisco de Borja Rodríguez
:
Methodological Security Verification of a Registration Protocol. 453-462 - Maurizio Aiello, Maurizio Mongelli, Gianluca Papaleo:
Supervised Learning Approaches with Majority Voting for DNS Tunneling Detection. 463-472 - Warusia Yassin
, Nur Izura Udzir
, Azizol Abdullah
, Mohd Taufik Abdullah, Zaiton Muda, Hazura Zulzalil
:
Packet Header Anomaly Detection Using Statistical Analysis. 473-482 - Marián Kühnel, Ulrike Meyer:
Highly Space Efficient Blacklisting. 483-493 - Adela Georgescu:
Vulnerabilities in a Two-Factor User Authentication in Multi-server Networks Protocol. 495-504 - Alessio Merlo, Mauro Migliardi
, Diego Raso, Elena Spadacini:
Optimizing Network Energy Consumption through Intrusion Prevention Systems. 505-515 - Jorge de-la-Peña-Sordo, Iker Pastor-López, Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas
:
Anomalous User Comment Detection in Social News Websites. 517-526 - Rafal Kozik
, Michal Choras, Rafal Renk, Witold Holubowicz
:
Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications. 527-535 - Igor Santos, Patxi Galán-García, Carlos Laorden Gómez, Javier Nieves, Borja Sanz, Pablo García Bringas
, José María Gómez Hidalgo:
An Empirical Study on Word Sense Disambiguation for Adult Content Filtering. 537-544 - Tomasz Andrysiak, Lukasz Saganowski, Michal Choras, Rafal Kozik:
Network Traffic Prediction and Anomaly Detection Based on ARFIMA Model. 545-554 - Beáta Bojda, Katalin Bubnó
, Benedek Nagy, Viktor Takács:
Visualization and Efficiency in Teaching Mathematics. 555-564 - Margarida Figueiredo
, M. Lurdes Esteves, José Neves
, Henrique Vicente
:
Lab Classes in Chemistry Learning an Artificial Intelligence View. 565-575
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.