


default search action
SOCO-CISIS-ICEUTE 2014: Bilbao, Spain
- José Gaviria de la Puerta, Iván García-Ferreira, Pablo García Bringas, Fanny Klett, Ajith Abraham, André C. P. L. F. de Carvalho, Álvaro Herrero

, Bruno Baruque, Héctor Quintián, Emilio Corchado:
International Joint Conference SOCO'14-CISIS'14-ICEUTE'14 - Bilbao, Spain, June 25th-27th, 2014, Proceedings. Advances in Intelligent Systems and Computing 299, Springer 2014, ISBN 978-3-319-07994-3 - Víctor Berrocal-Plaza, Miguel Ángel Vega Rodríguez

, Juan Manuel Sánchez-Pérez:
A Strength Pareto Approach and a Novel Formulation in the Reporting Cells Planning. 1-10 - Tomás Jezowicz, Petr Gajdos

, Eliska Ochodkova, Václav Snásel:
A New Iterative Approach for Finding Nearest Neighbors Using Space-Filling Curves for Fast Graphs Visualization. 11-20 - Jan Janousek, Petr Gajdos

, Michal Radecký, Václav Snásel:
Classification via Nearest Prototype Classifier Utilizing Artificial Bee Colony on CUDA. 21-30 - Eneko Osaba

, Roberto Carballedo
, Fernando Díaz, Enrique Onieva
, Asier Perallos:
A Proposal of Good Practice in the Formulation and Comparison of Meta-heuristics for Solving Routing Problems. 31-40 - Julio Fernández-Ceniceros

, Javier Antoñanzas-Torres
, Rubén Urraca-Valle
, Enrique Sodupe-Ortega
, Andrés Sanz-García
:
Soft Computing Metamodels for the Failure Prediction of T-stub Bolted Connections. 41-51 - Rubén Urraca-Valle

, Enrique Sodupe-Ortega
, Javier Antoñanzas-Torres
, Fernando Antoñanzas-Torres, Francisco J. Martínez de Pisón Ascacibar:
An Overall Performance Comparative of GA-PARSIMONY Methodology with Regression Algorithms. 53-62 - Victor V. Kashirin, Sergey V. Kovalchuk

, Alexander V. Boukhanovsky
:
Evolutionary Simulation of Complex Networks' Structures with Specific Functional Properties. 63-72 - Raúl Roldán, Rosa Basagoiti

, Enrique Onieva
:
Inventory Routing Problem with Stochastic Demand and Lead Time: State of the Art. 73-82 - Denis A. Nasonov, Nikolay Butakov, Marina Balakhontseva, Konstantin V. Knyazkov, Alexander V. Boukhanovsky

:
Hybrid Evolutionary Workflow Scheduling Algorithm for Dynamic Heterogeneous Distributed Computational Environment. 83-92 - Miren Nekane Bilbao

, Javier Del Ser, Sancho Salcedo-Sanz, Sergio Gil-Lopez, José Antonio Portilla-Figueras
:
A Bi-objective Harmony Search Approach for Deploying Cost-Effective Multi-hop Communications over Large-Area Wildfires. 93-103 - Bartosz Krawczyk, Pawel Ksieniewicz

, Michal Wozniak
:
Hyperspectral Image Analysis Based on Quad Tree Decomposition. 105-113 - Ali Abusnina, Daniel Kudenko, Rolf Roth:

Gaussian Process-Based Inferential Control System. 115-124 - Borja Fernández-Gauna

, Juan Luis Osa
, Manuel Graña:
Effect of Initial Conditioning of Reinforcement Learning Agents on Feedback Control Tasks over Continuous State and Action Spaces. 125-133 - Javier Carbó

, Juanita P. Pedraza, Mar Lopez, José Manuel Molina:
Privacy Protection in Trust Models for Agent Societies. 135-144 - Amira Sayed A. Aziz, Sanaa El-Ola Hanafi, Aboul Ella Hassanien:

Multi-agent Artificial Immune System for Network Intrusion Detection and Classification. 145-154 - Yudaeva Maria, Hovanov Nikolai, Kolesov Dmitrii

:
Double Randomized Estimation of Russian Blue Chips Based on Imprecise Information. 155-164 - Rubén Lostado-Lorza, Rubén Escribano-García

, Roberto Fernández-Martínez
, Marcos Illera-Cueva, Bryan J. Mac Donald
:
Combination of the Finite Element Method and Data Mining Techniques to Design and Optimize Bearings. 165-174 - Dragan Simic

, Vasa Svircevic, Svetlana Simic:
An Approach of Fuzzy Models for Supplier Assessment and Selection. 175-184 - Jendrik Poloczek, Nils André Treiber, Oliver Kramer:

KNN Regression as Geo-Imputation Method for Spatio-Temporal Wind Data. 185-193 - Can Ulas Dogruer

:
Online Identification of Odometer Parameters of a Mobile Robot. 195-206 - Konrad Jackowski, Jan Platos

:
Application of AdaSS Ensemble Approach for Prediction of Power Plant Generator Tension. 207-216 - Pavel Brandstetter

, Martin Kuchar
, Jiri Friedrich:
Application of RBF Neural Network in Sensorless Control of A.C. Drive with Induction Motor. 217-227 - Asier Salazar-Ramirez

, Eloy Irigoyen
, Raquel Martínez-Unanue:
Enhancements for a Robust Fuzzy Detection of Stress. 229-238 - Pedro Luis Galdámez, María Angélica González Arrieta

, Miguel Ramón Ramón:
Neural Networks Using Hausdorff Distance, SURF and Fisher Algorithms for Ear Recognition. 239-249 - Sancho Salcedo-Sanz, José Antonio Portilla-Figueras

, Jesús Muñoz-Bulnes, Javier Del Ser
, Miren Nekane Bilbao
:
A Novel Harmony Search Algorithm for One-Year-Ahead Energy Demand Estimation Using Macroeconomic Variables. 251-258 - Martin Macas

, Fiorella Lauro
, Fabio Moretti
, Stefano Pizzuti
, Mauro Annunziato, Alessandro Fonti, Gabriele Comodi
, Andrea Giantomassi:
Sensitivity Based Feature Selection for Recurrent Neural Network Applied to Forecasting of Heating Gas Consumption. 259-268 - Luis Martí

, Nayat Sánchez-Pi
, José Manuel Molina, Ana Cristina Bicharra Garcia
:
Combining Support Vector Machines and Segmentation Algorithms for Efficient Anomaly Detection: A Petroleum Industry Application. 269-278 - Roberto Fernández-Martínez

, Rubén Lostado-Lorza, Marcos Illera-Cueva, Rubén Escribano-García
, Bryan J. Mac Donald
:
Comparison Analysis of Regression Models Based on Experimental and FEM Simulation Datasets Used to Characterize Electrolytic Tinplate Materials. 279-288 - Yonanda Adhitama, Wolfgang Rosenstiel:

Design Method for a Scalable Modular Structure Product Family. 289-299 - Rubén Escribano-García

, Rubén Lostado-Lorza, Roberto Fernández-Martínez
, Pedro Villanueva-Roldán, Bryan J. Mac Donald
:
Improvement in Manufacturing Welded Products through Multiple Response Surface Methodology and Data Mining Techniques. 301-310 - Katarzyna Grzybowska

, Gábor Kovács:
Logistics Process Modelling in Supply Chain - Algorithm of Coordination in the Supply Chain - Contracting. 311-320 - Salva Peiró

, Manuel Muñoz, Miguel Masmano, Alfons Crespo
:
Detecting Stack Based Kernel Information Leaks. 321-331 - Ruxandra F. Olimid

:
A Chain of Attacks and Countermeasures Applied to a Group Key Transfer Protocol. 333-342 - Tien Pham, Wanli Ma

, Dat Tran
, Phuoc Nguyen, Dinh Q. Phung:
EEG-Based User Authentication Using Artifacts. 343-353 - Joaquín Borrego-Díaz

, Antonia M. Chávez-González, José Luis Pro-Martín, Virginia Matos-Arana:
Specifying and Verifying Meta-Security by Means of Semantic Web Methods. 355-365 - J. David Nuñez-Gonzalez

, Manuel Graña:
Experiments on Trust Prediction Based on Reputation Features. 367-374 - Ashish Jain

, Narendra S. Chaudhari:
Cryptanalytic Results on Knapsack Cryptosystem Using Binary Particle Swarm Optimization. 375-384 - Zaki Brahmi

, Amine Lini, Mohamed Mohsen Gammoudi
:
Mobile Agent Security Based on Artificial Immune System. 385-395 - Alberto Peinado, Jorge Munilla, Amparo Fúster-Sabater:

Improving the Period and Linear Span of the Sequences Generated by DLFSRs. 397-406 - Alberto Peinado, Andrés Ortiz

:
Prediction of Sequences Generated by LFSR Using Back Propagation MLP. 407-412 - Ciprian Pungila

, Viorel Negru
:
An Efficient Heterogeneous Approach to Building Compressed Automata for Malware Signature Matching. 413-422 - Adam Wójtowicz

:
Mining in Dynamically Composed Scripted 3D Scenes for Better Access Control - Computational Evaluation. 423-432 - Bartosz Krawczyk, Michal Wozniak

:
Evolutionary Cost-Sensitive Ensemble for Malware Detection. 433-442 - Iván García-Ferreira, Carlos Laorden

, Igor Santos, Pablo García Bringas
:
A Survey on Static Analysis and Model Checking. 443-452 - Jesus Diaz

, David Arroyo, Francisco de Borja Rodríguez
:
Methodological Security Verification of a Registration Protocol. 453-462 - Maurizio Aiello, Maurizio Mongelli, Gianluca Papaleo:

Supervised Learning Approaches with Majority Voting for DNS Tunneling Detection. 463-472 - Warusia Yassin

, Nur Izura Udzir
, Azizol Abdullah
, Mohd Taufik Abdullah, Zaiton Muda, Hazura Zulzalil
:
Packet Header Anomaly Detection Using Statistical Analysis. 473-482 - Marián Kühnel, Ulrike Meyer:

Highly Space Efficient Blacklisting. 483-493 - Adela Georgescu:

Vulnerabilities in a Two-Factor User Authentication in Multi-server Networks Protocol. 495-504 - Alessio Merlo, Mauro Migliardi

, Diego Raso, Elena Spadacini:
Optimizing Network Energy Consumption through Intrusion Prevention Systems. 505-515 - Jorge de-la-Peña-Sordo, Iker Pastor-López, Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas

:
Anomalous User Comment Detection in Social News Websites. 517-526 - Rafal Kozik

, Michal Choras, Rafal Renk, Witold Holubowicz
:
Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications. 527-535 - Igor Santos, Patxi Galán-García, Carlos Laorden Gómez, Javier Nieves, Borja Sanz, Pablo García Bringas

, José María Gómez Hidalgo:
An Empirical Study on Word Sense Disambiguation for Adult Content Filtering. 537-544 - Tomasz Andrysiak, Lukasz Saganowski, Michal Choras, Rafal Kozik:

Network Traffic Prediction and Anomaly Detection Based on ARFIMA Model. 545-554 - Beáta Bojda, Katalin Bubnó

, Benedek Nagy, Viktor Takács:
Visualization and Efficiency in Teaching Mathematics. 555-564 - Margarida Figueiredo

, M. Lurdes Esteves, José Neves
, Henrique Vicente
:
Lab Classes in Chemistry Learning an Artificial Intelligence View. 565-575

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














