Author of the publication

An Adaptive Cyberinfrastructure for Threat Management in Urban Water Distribution Systems.

, , , , , , , and . International Conference on Computational Science (3), volume 3993 of Lecture Notes in Computer Science, page 401-408. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Event Detection and Localization in Acyclic Flow Networks., , , and . IEEE Trans. Systems, Man, and Cybernetics: Systems, 43 (3): 708-723 (2013)An evolutionary algorithm approach to generate distinct sets of non-dominated solutions for wicked problems., , and . Eng. Appl. of AI, 26 (5-6): 1442-1457 (2013)Efficient traffic loss evaluation for transport backbone networks., , , , and . Computer Networks, 54 (10): 1683-1691 (2010)An Agent-based Modeling Framework for Sociotechnical Simulation of Water Distribution Contamination Events., and . CoRR, (2014)Coupling of logistic regression analysis and local search methods for characterization of water distribution system contaminant source., , , and . Eng. Appl. of AI, 25 (2): 309-316 (2012)Comparing Ant Colony Optimization and Genetic Algorithm Approaches for Solving Traffic Signal Coordination under Oversaturation Conditions., , and . Comp.-Aided Civil and Infrastruct. Engineering, 27 (1): 14-28 (2012)Are the "Best" Solutions to a Real Optimization Problem Always Found in the Noninferior Set? Evolutionary Algorithm for Generating Alternatives (EAGA)., and . GECCO, volume 2724 of Lecture Notes in Computer Science, page 1622-1623. Springer, (2003)Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems., , , , , , and . International Conference on Computational Science (1), volume 4487 of Lecture Notes in Computer Science, page 1058-1065. Springer, (2007)Towards Optimal Event Detection and Localization in Acyclic Flow Networks., , , , and . ICDCN, volume 7129 of Lecture Notes in Computer Science, page 179-196. Springer, (2012)Integrating complex adaptive system simulation and evolutionary computation to support water infrastructure threat management.. GECCO (Companion), page 1809-1816. ACM, (2010)