Author of the publication

Comparing a hybrid branch and bound algorithm with evolutionary computation methods, local search and their hybrids on the TSP.

, , , , and . CIPLS, page 148-155. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Athauda, Rukshan
add a person with the name Athauda, Rukshan
 

Other publications of authors with the same name

Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital Environments., , and . ACM Trans. Internet Techn., 12 (3): 8:1-8:35 (2013)A distributed mechanism for secure collaboration in digital ecosystems., , and . MEDES, page 33-39. ACM, (2011)Comparing a hybrid branch and bound algorithm with evolutionary computation methods, local search and their hybrids on the TSP., , , , and . CIPLS, page 148-155. IEEE, (2014)A Framework to Personalise Open Learning Environments by Adapting to Learning Styles., , and . CSEDU (1), page 296-305. SciTePress, (2015)A Regional Multi-Objective Tabu Search Algorithm for a Green Heterogeneous Dial-A-Ride Problem., , , , , and . CEC, page 2082-2089. IEEE, (2019)Determining Trustworthiness and Quality of Mobile Applications., , and . MOBILWARE, volume 65 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 192-206. Springer, (2012)Semantic Access: Semantic Interface for Querying Databases., , , , , , , , and . VLDB, page 591-594. Morgan Kaufmann, (2000)Using learning styles as a basis for creating adaptive open learning environments: an evaluation., , and . IJLT, 11 (3): 198-217 (2016)Design of a Technology-Enhanced Pedagogical Framework for a Systems and Networking Administration course incorporating a Virtual Laboratory., , , , , , and . FIE, page 1-5. IEEE, (2018)A survey on the usability and effectiveness of web-based trust rating systems., , and . ICIS, page 455-460. IEEE Computer Society, (2013)