Name
Papers
Collaborators
FRANCISZEK SEREDYNSKI
111
54
Citations 
PageRank 
Referers 
366
55.06
588
Referees 
References 
819
684
Search Limit
100819
Title
Citations
PageRank
Year
Cellular automata rules solving the wireless sensor network coverage problem00.342022
A Learning Automata-Based Approach to Lifetime Optimization in Wireless Sensor Networks.00.342021
Cooperation Through Income Sharing.00.342020
A Probabilistic Cellular Automata Rule Forming Domino Patterns.00.342019
Collective Behavior of Large Teams of Multi-agent Systems.00.342019
Designing Conflict Free Cellular Automata-Based PRNG.00.342018
Termination and Stability Levels in Evolved CA Agents for the Black-Pattern Task.00.342018
Towards Self-organizing Sensor Networks: Game-Theoretic \epsilon -Learning Automata-Based Approach.00.342018
Heuristic and Meta-Heuristic Approaches for Energy-Efficient Coverage-Preserving Protocols in Wireless Sensor Networks.10.362017
A Sandpile cellular automata-based scheduler and load balancer.20.382017
Enhanced Multi-Parameterized Cellular Automaton Model For Crowd Evacuation: The Case Of A University Building10.352016
A Cellular Automata-Like Scheduler And Load Balancer00.342016
Graph Cellular Automata approach to the Maximum Lifetime Coverage Problem in wireless sensor networks.30.402016
Scheduling parallel batch jobs in grids with evolutionary metaheuristics20.412015
Simulated Annealing Application to Maximum Lifetime Coverage Problem in Wireless Sensor Networks.00.342015
Decentralized Job Scheduling In The Cloud Based On A Spatially Generalized Prisoner's Dilemma Game.10.352015
Cellular Automata Approach To Maximum Lifetime Coverage Problem In Wireless Sensor Networks20.402014
A Game-Theoretic Approach to Multiobjective Job Scheduling in Cloud Computing Systems00.342014
NIDISC Introduction and Committees00.342014
Multi-objective Parallel Machines Scheduling for Fault-Tolerant Cloud Systems50.432013
Multi-objective Security Driven Job Scheduling for Computational Cloud Systems20.372013
Learning cellular automata rules for binary classification problem50.572013
Application of Evolutionary Algorithms to Maximum Lifetime Coverage Problem in Wireless Sensor Networks20.432013
Reconstructing Images With Nature Inspired Algorithms00.342013
Discovering Cellular Automata Rules for Binary Classification Problem with Use of Genetic Algorithm00.342012
Image reconstruction with the use of evolutionary algorithms and cellular automata.00.342012
Searching Cellular Automata Rules For Solving Two-Dimensional Binary Classification Problem00.342012
An Effective Multiprocessor Scheduling With Use Of Geo Metaheuristic00.342012
Designing Cryptographically Strong S-Boxes with Use of 1D Cellular Automata.10.412011
Improving quality of DES S-boxes by cellular automata-based S-boxes00.342011
Cellular Automata Application in Cryptography.00.342011
A Genetic Algorithm with a Penalty Function in the Selective Travelling Salesman Problem on a Road Network20.372011
Dynamic cellular automata-based s-boxes40.412011
Learning cellular automata rules for pattern reconstruction task20.462010
CA-based generator of S-boxes for cryptography use10.362010
Application of Cellular Automata in Symmetric Key Cryptography.10.362010
Soft computing techniques for intrusion detection of SQL-based attacks00.342010
Discovery by genetic algorithm of cellular automata rules for pattern reconstruction task30.482010
Multiprocessor scheduling by generalized extremal optimization10.372010
Solving multiprocessor scheduling problem with GEO metaheuristic20.462009
Detecting web application attacks with use of gene expression programming00.342009
Multiobjective classification with moGEP: an application in the network traffic domain20.362009
Study on GEO metaheuristic for solving multiprocessor scheduling problem00.342009
Cellular Automata-Based S-Boxes vs. DES S-Boxes40.512009
Properties of safe cellular automata-based S-boxes00.342009
An approach to intrusion detection by means of idiotypic networks paradigm00.342008
Denial of service detection and analysis using idiotypic networks paradigm10.412008
Generalized Extremal Optimization for Solving Multiprocessor Task Scheduling Problem30.442008
Some Issues on Intrusion Detection in Web Applications10.372008
Designing cryptographically strong S-boxes with the use of cellular automata30.472008
  • 1
  • 2