Cellular automata rules solving the wireless sensor network coverage problem | 0 | 0.34 | 2022 |
A Learning Automata-Based Approach to Lifetime Optimization in Wireless Sensor Networks. | 0 | 0.34 | 2021 |
Cooperation Through Income Sharing. | 0 | 0.34 | 2020 |
A Probabilistic Cellular Automata Rule Forming Domino Patterns. | 0 | 0.34 | 2019 |
Collective Behavior of Large Teams of Multi-agent Systems. | 0 | 0.34 | 2019 |
Designing Conflict Free Cellular Automata-Based PRNG. | 0 | 0.34 | 2018 |
Termination and Stability Levels in Evolved CA Agents for the Black-Pattern Task. | 0 | 0.34 | 2018 |
Towards Self-organizing Sensor Networks: Game-Theoretic \epsilon -Learning Automata-Based Approach. | 0 | 0.34 | 2018 |
Heuristic and Meta-Heuristic Approaches for Energy-Efficient Coverage-Preserving Protocols in Wireless Sensor Networks. | 1 | 0.36 | 2017 |
A Sandpile cellular automata-based scheduler and load balancer. | 2 | 0.38 | 2017 |
Enhanced Multi-Parameterized Cellular Automaton Model For Crowd Evacuation: The Case Of A University Building | 1 | 0.35 | 2016 |
A Cellular Automata-Like Scheduler And Load Balancer | 0 | 0.34 | 2016 |
Graph Cellular Automata approach to the Maximum Lifetime Coverage Problem in wireless sensor networks. | 3 | 0.40 | 2016 |
Scheduling parallel batch jobs in grids with evolutionary metaheuristics | 2 | 0.41 | 2015 |
Simulated Annealing Application to Maximum Lifetime Coverage Problem in Wireless Sensor Networks. | 0 | 0.34 | 2015 |
Decentralized Job Scheduling In The Cloud Based On A Spatially Generalized Prisoner's Dilemma Game. | 1 | 0.35 | 2015 |
Cellular Automata Approach To Maximum Lifetime Coverage Problem In Wireless Sensor Networks | 2 | 0.40 | 2014 |
A Game-Theoretic Approach to Multiobjective Job Scheduling in Cloud Computing Systems | 0 | 0.34 | 2014 |
NIDISC Introduction and Committees | 0 | 0.34 | 2014 |
Multi-objective Parallel Machines Scheduling for Fault-Tolerant Cloud Systems | 5 | 0.43 | 2013 |
Multi-objective Security Driven Job Scheduling for Computational Cloud Systems | 2 | 0.37 | 2013 |
Learning cellular automata rules for binary classification problem | 5 | 0.57 | 2013 |
Application of Evolutionary Algorithms to Maximum Lifetime Coverage Problem in Wireless Sensor Networks | 2 | 0.43 | 2013 |
Reconstructing Images With Nature Inspired Algorithms | 0 | 0.34 | 2013 |
Discovering Cellular Automata Rules for Binary Classification Problem with Use of Genetic Algorithm | 0 | 0.34 | 2012 |
Image reconstruction with the use of evolutionary algorithms and cellular automata. | 0 | 0.34 | 2012 |
Searching Cellular Automata Rules For Solving Two-Dimensional Binary Classification Problem | 0 | 0.34 | 2012 |
An Effective Multiprocessor Scheduling With Use Of Geo Metaheuristic | 0 | 0.34 | 2012 |
Designing Cryptographically Strong S-Boxes with Use of 1D Cellular Automata. | 1 | 0.41 | 2011 |
Improving quality of DES S-boxes by cellular automata-based S-boxes | 0 | 0.34 | 2011 |
Cellular Automata Application in Cryptography. | 0 | 0.34 | 2011 |
A Genetic Algorithm with a Penalty Function in the Selective Travelling Salesman Problem on a Road Network | 2 | 0.37 | 2011 |
Dynamic cellular automata-based s-boxes | 4 | 0.41 | 2011 |
Learning cellular automata rules for pattern reconstruction task | 2 | 0.46 | 2010 |
CA-based generator of S-boxes for cryptography use | 1 | 0.36 | 2010 |
Application of Cellular Automata in Symmetric Key Cryptography. | 1 | 0.36 | 2010 |
Soft computing techniques for intrusion detection of SQL-based attacks | 0 | 0.34 | 2010 |
Discovery by genetic algorithm of cellular automata rules for pattern reconstruction task | 3 | 0.48 | 2010 |
Multiprocessor scheduling by generalized extremal optimization | 1 | 0.37 | 2010 |
Solving multiprocessor scheduling problem with GEO metaheuristic | 2 | 0.46 | 2009 |
Detecting web application attacks with use of gene expression programming | 0 | 0.34 | 2009 |
Multiobjective classification with moGEP: an application in the network traffic domain | 2 | 0.36 | 2009 |
Study on GEO metaheuristic for solving multiprocessor scheduling problem | 0 | 0.34 | 2009 |
Cellular Automata-Based S-Boxes vs. DES S-Boxes | 4 | 0.51 | 2009 |
Properties of safe cellular automata-based S-boxes | 0 | 0.34 | 2009 |
An approach to intrusion detection by means of idiotypic networks paradigm | 0 | 0.34 | 2008 |
Denial of service detection and analysis using idiotypic networks paradigm | 1 | 0.41 | 2008 |
Generalized Extremal Optimization for Solving Multiprocessor Task Scheduling Problem | 3 | 0.44 | 2008 |
Some Issues on Intrusion Detection in Web Applications | 1 | 0.37 | 2008 |
Designing cryptographically strong S-boxes with the use of cellular automata | 3 | 0.47 | 2008 |