Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Physical fundamentals of external transient latch-up and corrective actions., , , , and . Microelectronics Reliability, 46 (5-6): 689-701 (2006)Transient latch-up: experimental analysis and device simulation., , , , , , , and . Microelectronics Reliability, 45 (2): 297-304 (2005)Visual routine for eye detection using hybrid genetic architectures., , , , and . ICPR, page 606-610. IEEE Computer Society, (1996)Learning to Detect Targets Using Scale-Space and Genetic Search., and . ICGA, page 516-522. Morgan Kaufmann, (1993)Ranking Cases with Classification Rules., , , and . Preference Learning, Springer, (2010)Learning with Noise in Engineering Domains., , and . ISMIS, volume 1079 of Lecture Notes in Computer Science, page 633-642. Springer, (1996)Performance Evaluation of an Agent Based Distributed Data Mining System., , and . Canadian Conference on AI, volume 3501 of Lecture Notes in Computer Science, page 25-32. Springer, (2005)Generation of feature detectors for texture discrimination by genetic search., and . TAI, page 812-818. IEEE Computer Society, (1990)Implementation of a Distributed Data Mining System., , and . International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 1016-1019. Springer, (2005)A Decision Tree Algorithm for Distributed Data Mining: Towards Network Intrusion Detection., and . ICCSA (4), volume 3046 of Lecture Notes in Computer Science, page 206-212. Springer, (2004)