![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2013
- Hisham M. Abdelsalam, Amany M. Mohamed
:
Multi-objective Simulated Annealing Algorithm for Partner Selection in Virtual Enterprises. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 751-774 - Arif Arin, Ghaith Rabadi:
Memory and Learning in Metaheuristics. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 435-476 - Susmita Bandyopadhyay
, Ranjan Bhattacharya:
On Some Aspects of Nature-Based Algorithms to Solve Multi-Objective Problems. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 477-524 - Elena N. Benderskaya
, Sofya V. Zhukova:
Multidisciplinary Trends in Modern Artificial Intelligence: Turing's Way. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 319-343 - Dalila Boughaci:
Metaheuristic Approaches for the Winner Determination Problem in Combinatorial Auction. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 775-791 - Laurentiu Bucur, Adina Florea
, Catalin-Marian Chera:
A KBRL Inference Metaheuristic with Applications. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 721-749 - Larry Bull:
Imitation Programming Unorganised Machines. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 63-81 - Mark Burgin, Eugene Eberbach
:
Recursively Generated Evolutionary Turing Machines and Evolutionary Automata. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 201-230 - Erik Cuevas, Fernando Wario
, Daniel Zaldivar, Marco Antonio Pérez Cisneros
:
Circle Detection on Images Using Learning Automata. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 545-570 - Yue Deng, Qionghai Dai, Zengke Zhang:
An Overview of Computational Sparse Models and Their Applications in Artificial Intelligence. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 345-369 - Amy Wenxuan Ding:
Towards Machine Equivalent Consciousness. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 83-108 - Alma Lilia García-Almanza, Biliana Alexandrova-Kabadjova
, Serafín Martínez-Jaramillo:
Bankruptcy Prediction for Banks: An Artificial Intelligence Approach to Improve Understandability. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 633-656 - Giovanni De Gasperis, Isabella Chiari, Niva Florio:
AIML Knowledge Base Construction from Text Corpora. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 287-318 - Loreto Gonzalez-Hernandez, Jose Torres-Jimenez
, Nelson Rangel-Valdez:
MiTS in Depth: An Analysis of Distinct Tabu Search Configurations for Constructing Mixed Covering Arrays. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 371-402 - Kieran Greer:
Turing: Then, Now and Still Key. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 43-62 - Yacine Laalaoui, R. B. Ahmad:
Decision Incorporation in Meta-heuristics to Cope with Decision Scheduling Problems. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 571-599 - Boudjelal Meftah, Olivier Lézoray, Soni Chaturvedi, Aleefia A. Khurshid, Abdelkader Benyettou:
Image Processing with Spiking Neuron Networks. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 525-544 - Abderrahmane Nitaj:
Diophantine and Lattice Cryptanalysis of the RSA Cryptosystem. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 139-168 - Wieslaw Pietruszkiewicz, Akira Imada:
Artificial Intelligence Evolved from Random Behaviour: Departure from the State of the Art. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 19-41 - Jim Prentzas
:
Artificial Intelligence Methods in Early Childhood Education. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 169-199 - Zengchang Qin, Yingsai Dong, Tao Wan:
Evolutionary Models for Agent-Based Complex Behavior Modeling. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 601-631 - Ricardo Gamelas Sousa
, Iryna Yevseyeva, Joaquim F. Pinto da Costa, Jaime S. Cardoso:
Multicriteria Models for Learning Ordinal Data: A Literature Review. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 109-138 - A. L. Tamiru, F. M. Hashim:
Application of Bat Algorithm and Fuzzy Systems to Model Exergy Changes in a Gas Turbine. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 685-719 - Vasyl Ustimenko, Urszula Romanczuk:
On Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 231-256 - Vasyl Ustimenko, Urszula Romanczuk
:
On Extremal Graph Theory, Explicit Algebraic Constructions of Extremal Graphs and Corresponding Turing Encryption Machines. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 257-285 - Flávio Henrique Teles Vieira
, Victor Hugo Teles Costa, Bruno Henrique Pereira Gonçalves:
Neural Network Based Approaches for Network Traffic Prediction. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 657-684 - Roman V. Yampolskiy:
Turing Test as a Defining Feature of AI-Completeness. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 3-17 - Xin-She Yang
:
Metaheuristic Optimization: Nature-Inspired Algorithms and Applications. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 405-420 - Xin-She Yang
:
Bat Algorithm and Cuckoo Search: A Tutorial. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 421-434 - Xin-She Yang
:
Artificial Intelligence, Evolutionary Computing and Metaheuristics - In the Footsteps of Alan Turing. Studies in Computational Intelligence 427, Springer 2013, ISBN 978-3-642-29693-2 [contents]
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-21 05:17 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint