default search action
SOCO-CISIS-ICEUTE 2014: Bilbao, Spain
- José Gaviria de la Puerta, Iván García-Ferreira, Pablo García Bringas, Fanny Klett, Ajith Abraham, André C. P. L. F. de Carvalho, Álvaro Herrero, Bruno Baruque, Héctor Quintián, Emilio Corchado:
International Joint Conference SOCO'14-CISIS'14-ICEUTE'14 - Bilbao, Spain, June 25th-27th, 2014, Proceedings. Advances in Intelligent Systems and Computing 299, Springer 2014, ISBN 978-3-319-07994-3 - Víctor Berrocal-Plaza, Miguel Ángel Vega Rodríguez, Juan Manuel Sánchez-Pérez:
A Strength Pareto Approach and a Novel Formulation in the Reporting Cells Planning. 1-10 - Tomás Jezowicz, Petr Gajdos, Eliska Ochodkova, Václav Snásel:
A New Iterative Approach for Finding Nearest Neighbors Using Space-Filling Curves for Fast Graphs Visualization. 11-20 - Jan Janousek, Petr Gajdos, Michal Radecký, Václav Snásel:
Classification via Nearest Prototype Classifier Utilizing Artificial Bee Colony on CUDA. 21-30 - Eneko Osaba, Roberto Carballedo, Fernando Díaz, Enrique Onieva, Asier Perallos:
A Proposal of Good Practice in the Formulation and Comparison of Meta-heuristics for Solving Routing Problems. 31-40 - Julio Fernández-Ceniceros, Javier Antoñanzas-Torres, Rubén Urraca-Valle, Enrique Sodupe-Ortega, Andrés Sanz-García:
Soft Computing Metamodels for the Failure Prediction of T-stub Bolted Connections. 41-51 - Rubén Urraca-Valle, Enrique Sodupe-Ortega, Javier Antoñanzas-Torres, Fernando Antoñanzas-Torres, Francisco J. Martínez de Pisón Ascacibar:
An Overall Performance Comparative of GA-PARSIMONY Methodology with Regression Algorithms. 53-62 - Victor V. Kashirin, Sergey V. Kovalchuk, Alexander V. Boukhanovsky:
Evolutionary Simulation of Complex Networks' Structures with Specific Functional Properties. 63-72 - Raúl Roldán, Rosa Basagoiti, Enrique Onieva:
Inventory Routing Problem with Stochastic Demand and Lead Time: State of the Art. 73-82 - Denis A. Nasonov, Nikolay Butakov, Marina Balakhontseva, Konstantin V. Knyazkov, Alexander V. Boukhanovsky:
Hybrid Evolutionary Workflow Scheduling Algorithm for Dynamic Heterogeneous Distributed Computational Environment. 83-92 - Miren Nekane Bilbao, Javier Del Ser, Sancho Salcedo-Sanz, Sergio Gil-Lopez, José Antonio Portilla-Figueras:
A Bi-objective Harmony Search Approach for Deploying Cost-Effective Multi-hop Communications over Large-Area Wildfires. 93-103 - Bartosz Krawczyk, Pawel Ksieniewicz, Michal Wozniak:
Hyperspectral Image Analysis Based on Quad Tree Decomposition. 105-113 - Ali Abusnina, Daniel Kudenko, Rolf Roth:
Gaussian Process-Based Inferential Control System. 115-124 - Borja Fernández-Gauna, Juan Luis Osa, Manuel Graña:
Effect of Initial Conditioning of Reinforcement Learning Agents on Feedback Control Tasks over Continuous State and Action Spaces. 125-133 - Javier Carbó, Juanita P. Pedraza, Mar Lopez, José Manuel Molina:
Privacy Protection in Trust Models for Agent Societies. 135-144 - Amira Sayed A. Aziz, Sanaa El-Ola Hanafi, Aboul Ella Hassanien:
Multi-agent Artificial Immune System for Network Intrusion Detection and Classification. 145-154 - Yudaeva Maria, Hovanov Nikolai, Kolesov Dmitrii:
Double Randomized Estimation of Russian Blue Chips Based on Imprecise Information. 155-164 - Rubén Lostado-Lorza, Rubén Escribano-García, Roberto Fernández-Martínez, Marcos Illera-Cueva, Bryan J. Mac Donald:
Combination of the Finite Element Method and Data Mining Techniques to Design and Optimize Bearings. 165-174 - Dragan Simic, Vasa Svircevic, Svetlana Simic:
An Approach of Fuzzy Models for Supplier Assessment and Selection. 175-184 - Jendrik Poloczek, Nils André Treiber, Oliver Kramer:
KNN Regression as Geo-Imputation Method for Spatio-Temporal Wind Data. 185-193 - Can Ulas Dogruer:
Online Identification of Odometer Parameters of a Mobile Robot. 195-206 - Konrad Jackowski, Jan Platos:
Application of AdaSS Ensemble Approach for Prediction of Power Plant Generator Tension. 207-216 - Pavel Brandstetter, Martin Kuchar, Jiri Friedrich:
Application of RBF Neural Network in Sensorless Control of A.C. Drive with Induction Motor. 217-227 - Asier Salazar-Ramirez, Eloy Irigoyen, Raquel Martínez-Unanue:
Enhancements for a Robust Fuzzy Detection of Stress. 229-238 - Pedro Luis Galdámez, María Angélica González Arrieta, Miguel Ramón Ramón:
Neural Networks Using Hausdorff Distance, SURF and Fisher Algorithms for Ear Recognition. 239-249 - Sancho Salcedo-Sanz, José Antonio Portilla-Figueras, Jesús Muñoz-Bulnes, Javier Del Ser, Miren Nekane Bilbao:
A Novel Harmony Search Algorithm for One-Year-Ahead Energy Demand Estimation Using Macroeconomic Variables. 251-258 - Martin Macas, Fiorella Lauro, Fabio Moretti, Stefano Pizzuti, Mauro Annunziato, Alessandro Fonti, Gabriele Comodi, Andrea Giantomassi:
Sensitivity Based Feature Selection for Recurrent Neural Network Applied to Forecasting of Heating Gas Consumption. 259-268 - Luis Martí, Nayat Sánchez-Pi, José Manuel Molina, Ana Cristina Bicharra Garcia:
Combining Support Vector Machines and Segmentation Algorithms for Efficient Anomaly Detection: A Petroleum Industry Application. 269-278 - Roberto Fernández-Martínez, Rubén Lostado-Lorza, Marcos Illera-Cueva, Rubén Escribano-García, Bryan J. Mac Donald:
Comparison Analysis of Regression Models Based on Experimental and FEM Simulation Datasets Used to Characterize Electrolytic Tinplate Materials. 279-288 - Yonanda Adhitama, Wolfgang Rosenstiel:
Design Method for a Scalable Modular Structure Product Family. 289-299 - Rubén Escribano-García, Rubén Lostado-Lorza, Roberto Fernández-Martínez, Pedro Villanueva-Roldán, Bryan J. Mac Donald:
Improvement in Manufacturing Welded Products through Multiple Response Surface Methodology and Data Mining Techniques. 301-310 - Katarzyna Grzybowska, Gábor Kovács:
Logistics Process Modelling in Supply Chain - Algorithm of Coordination in the Supply Chain - Contracting. 311-320 - Salva Peiró, Manuel Muñoz, Miguel Masmano, Alfons Crespo:
Detecting Stack Based Kernel Information Leaks. 321-331 - Ruxandra F. Olimid:
A Chain of Attacks and Countermeasures Applied to a Group Key Transfer Protocol. 333-342 - Tien Pham, Wanli Ma, Dat Tran, Phuoc Nguyen, Dinh Q. Phung:
EEG-Based User Authentication Using Artifacts. 343-353 - Joaquín Borrego-Díaz, Antonia M. Chávez-González, José Luis Pro-Martín, Virginia Matos-Arana:
Specifying and Verifying Meta-Security by Means of Semantic Web Methods. 355-365 - J. David Nuñez-Gonzalez, Manuel Graña:
Experiments on Trust Prediction Based on Reputation Features. 367-374 - Ashish Jain, Narendra S. Chaudhari:
Cryptanalytic Results on Knapsack Cryptosystem Using Binary Particle Swarm Optimization. 375-384 - Zaki Brahmi, Amine Lini, Mohamed Mohsen Gammoudi:
Mobile Agent Security Based on Artificial Immune System. 385-395 - Alberto Peinado, Jorge Munilla, Amparo Fúster-Sabater:
Improving the Period and Linear Span of the Sequences Generated by DLFSRs. 397-406 - Alberto Peinado, Andrés Ortiz:
Prediction of Sequences Generated by LFSR Using Back Propagation MLP. 407-412 - Ciprian Pungila, Viorel Negru:
An Efficient Heterogeneous Approach to Building Compressed Automata for Malware Signature Matching. 413-422 - Adam Wójtowicz:
Mining in Dynamically Composed Scripted 3D Scenes for Better Access Control - Computational Evaluation. 423-432 - Bartosz Krawczyk, Michal Wozniak:
Evolutionary Cost-Sensitive Ensemble for Malware Detection. 433-442 - Iván García-Ferreira, Carlos Laorden, Igor Santos, Pablo García Bringas:
A Survey on Static Analysis and Model Checking. 443-452 - Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
Methodological Security Verification of a Registration Protocol. 453-462 - Maurizio Aiello, Maurizio Mongelli, Gianluca Papaleo:
Supervised Learning Approaches with Majority Voting for DNS Tunneling Detection. 463-472 - Warusia Yassin, Nur Izura Udzir, Azizol Abdullah, Mohd Taufik Abdullah, Zaiton Muda, Hazura Zulzalil:
Packet Header Anomaly Detection Using Statistical Analysis. 473-482 - Marián Kühnel, Ulrike Meyer:
Highly Space Efficient Blacklisting. 483-493 - Adela Georgescu:
Vulnerabilities in a Two-Factor User Authentication in Multi-server Networks Protocol. 495-504 - Alessio Merlo, Mauro Migliardi, Diego Raso, Elena Spadacini:
Optimizing Network Energy Consumption through Intrusion Prevention Systems. 505-515 - Jorge de-la-Peña-Sordo, Iker Pastor-López, Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas:
Anomalous User Comment Detection in Social News Websites. 517-526 - Rafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz:
Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications. 527-535 - Igor Santos, Patxi Galán-García, Carlos Laorden Gómez, Javier Nieves, Borja Sanz, Pablo García Bringas, José María Gómez Hidalgo:
An Empirical Study on Word Sense Disambiguation for Adult Content Filtering. 537-544 - Tomasz Andrysiak, Lukasz Saganowski, Michal Choras, Rafal Kozik:
Network Traffic Prediction and Anomaly Detection Based on ARFIMA Model. 545-554 - Beáta Bojda, Katalin Bubnó, Benedek Nagy, Viktor Takács:
Visualization and Efficiency in Teaching Mathematics. 555-564 - Margarida Figueiredo, M. Lurdes Esteves, José Neves, Henrique Vicente:
Lab Classes in Chemistry Learning an Artificial Intelligence View. 565-575
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.