Abstract is missing.
- Similarity-based evolution control for fitness estimation in particle swarm optimizationChaoli Sun, Jianchao Zeng, Jeng-Shyang Pan, Yaochu Jin. 1-8 [doi]
- Indoor geo-fencing and access control for wireless networksHossein Rahimi, A. Nur Zincir-Heywood, Bharat Gadher. 1-8 [doi]
- Recurrent neural network ensembles for convergence prediction in surrogate-assisted evolutionary optimizationColin P. Smith, John Doherty, Yaochu Jin. 9-16 [doi]
- Quantifying encircling behaviour in complex networksMahendra Piraveenan, Shahadat Uddin, Kon Shing Kenneth Chung, Dharshana Kasthurirathna. 9-14 [doi]
- Evolving OWA operators for cyber security decision making problemsSimon Miller, Jonathan M. Garibaldi, Susan Appleby. 15-22 [doi]
- Issues with performance measures for dynamic multi-objective optimisationMardé Helbig, Andries Petrus Engelbrecht. 17-24 [doi]
- A novel hybrid-network intrusion detection system (H-NIDS) in cloud computingChirag Modi, Dhiren Patel. 23-30 [doi]
- Takeover time in dynamic optimization problemsYesnier Bravo, Gabriel Luque, Enrique Alba. 25-30 [doi]
- What defines an intruder? An intelligent approachHector M. Lugo-Cordero, Ratan K. Guha. 31-36 [doi]
- Surrogate enhanced interactive genetic algorithm with weighted Gaussian processShanshan Chen, Xiaoyan Sun, Dunwei Gong, Yong Zhang. 31-38 [doi]
- Evolving indigestible codes: Fuzzing interpreters with genetic programmingSanjay Rawat, Fabien Duchene, Roland Groz, Jean-Luc Richier. 37-39 [doi]
- Dynamic significant feature extraction for embedded intelligent agent implementationsKoldo Basterretxea, Inés del Campo, M. Victoria Martínez, Javier Echanobe. 39-46 [doi]
- Image visualization based malware detectionKesav Kancherla, Srinivas Mukkamala. 40-44 [doi]
- Resilient hybrid overlay model for smart grid: RHM for smart gridShubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta. 45-51 [doi]
- Co-evolutionary learning in the n-choice iterated prisoner's dilemma with PSO algorithm in a spatial environmentXiaoyang Wang, HuiYou Chang, Yang Yi, Yibin Lin. 47-53 [doi]
- Higher dimensional chaos for Audio encryptionS. Ganesh Babu, P. Ilango. 52-58 [doi]
- An incremental approach for updating approximations of rough fuzzy set under the variation of attribute valuesAnping Zeng, Tianrui Li, Chuan Luo, Junbo Zhang. 54-60 [doi]
- Applications of computational intelligence for static software checking against memory corruption vulnerabilitiesMarcos Álvares Barbosa Junior, Tshilidzi Marwala, Fernando Buarque de Lima Neto. 59-66 [doi]
- Discounted expert weighting for concept driftGregory Ditzler, Gail Rosen, Robi Polikar. 61-67 [doi]
- LDCnet: Minimizing the cost of supervision for various types of concept driftPiotr Sobolewski, Michal Wozniak. 68-75 [doi]
- A modular technique for monthly rainfall time series predictionJ. Kaiornrit, Kok Wai Wong, Chun Che Fung. 76-83 [doi]
- Benchmarks for dynamic multi-objective optimisationMardé Helbig, Andries Petrus Engelbrecht. 84-91 [doi]
- A memetic algorithm for dynamic economic load dispatch optimizationSunny Orike, David W. Corne. 92-99 [doi]
- A Bayesian network model for evacuation time analysis during a ship fireParvaneh Sarshar, Jaziar Radianti, Ole-Christoffer Granmo, Jose J. Gonzalez. 100-107 [doi]