Abstract is missing.
- A Strength Pareto Approach and a Novel Formulation in the Reporting Cells PlanningVíctor Berrocal-Plaza, Miguel Ángel Vega Rodríguez, Juan Manuel Sánchez-Pérez. 1-10 [doi]
- A New Iterative Approach for Finding Nearest Neighbors Using Space-Filling Curves for Fast Graphs VisualizationTomas Jezowicz, Petr Gajdos, Eliska Ochodkova, Václav Snásel. 11-20 [doi]
- Classification via Nearest Prototype Classifier Utilizing Artificial Bee Colony on CUDAJan Janousek, Petr Gajdos, Michal Radecký, Václav Snásel. 21-30 [doi]
- A Proposal of Good Practice in the Formulation and Comparison of Meta-heuristics for Solving Routing ProblemsEneko Osaba, Roberto Carballedo, Fernando Díaz, Enrique Onieva, Asier Perallos. 31-40 [doi]
- Soft Computing Metamodels for the Failure Prediction of T-stub Bolted ConnectionsJulio Fernández-Ceniceros, Javier Antoñanzas-Torres, Ruben Urraca-Valle, Enrique Sodupe-Ortega, Andrés Sanz-García. 41-51 [doi]
- An Overall Performance Comparative of GA-PARSIMONY Methodology with Regression AlgorithmsRuben Urraca-Valle, Enrique Sodupe-Ortega, Javier Antoñanzas-Torres, Fernando Antoñanzas-Torres, Francisco J. Martínez de Pisón Ascacibar. 53-62 [doi]
- Evolutionary Simulation of Complex Networks' Structures with Specific Functional PropertiesVictor V. Kashirin, Sergey V. Kovalchuk, Alexander V. Boukhanovsky. 63-72 [doi]
- Inventory Routing Problem with Stochastic Demand and Lead Time: State of the ArtRaúl Roldán, Rosa Basagoiti, Enrique Onieva. 73-82 [doi]
- Hybrid Evolutionary Workflow Scheduling Algorithm for Dynamic Heterogeneous Distributed Computational EnvironmentDenis A. Nasonov, Nikolay Butakov, Marina Balakhontseva, Konstantin V. Knyazkov, Alexander V. Boukhanovsky. 83-92 [doi]
- A Bi-objective Harmony Search Approach for Deploying Cost-Effective Multi-hop Communications over Large-Area WildfiresMiren Nekane Bilbao, Javier Del Ser, Sancho Salcedo-Sanz, Sergio Gil-Lopez, José Antonio Portilla-Figueras. 93-103 [doi]
- Hyperspectral Image Analysis Based on Quad Tree DecompositionBartosz Krawczyk, Pawel Ksieniewicz, Michal Wozniak. 105-113 [doi]
- Gaussian Process-Based Inferential Control SystemAli Abusnina, Daniel Kudenko, Rolf Roth. 115-124 [doi]
- Effect of Initial Conditioning of Reinforcement Learning Agents on Feedback Control Tasks over Continuous State and Action SpacesBorja Fernández-Gauna, Juan Luis Osa, Manuel Graña. 125-133 [doi]
- Privacy Protection in Trust Models for Agent SocietiesJavier Carbo, Juanita P. Pedraza, Mar Lopez, José Manuel Molina. 135-144 [doi]
- Multi-agent Artificial Immune System for Network Intrusion Detection and ClassificationAmira Sayed A. Aziz, Sanaa El-Ola Hanafi, Aboul Ella Hassanien. 145-154 [doi]
- Double Randomized Estimation of Russian Blue Chips Based on Imprecise InformationYudaeva Maria, Hovanov Nikolai, Kolesov Dmitrii. 155-164 [doi]
- Combination of the Finite Element Method and Data Mining Techniques to Design and Optimize BearingsRubén Lostado-Lorza, Rubén Escribano-García, Roberto Fernández-Martínez, Marcos Illera-Cueva, Bryan J. Mac Donald. 165-174 [doi]
- An Approach of Fuzzy Models for Supplier Assessment and SelectionDragan Simic, Vasa Svircevic, Svetlana Simic. 175-184 [doi]
- KNN Regression as Geo-Imputation Method for Spatio-Temporal Wind DataJendrik Poloczek, Nils André Treiber, Oliver Kramer. 185-193 [doi]
- Online Identification of Odometer Parameters of a Mobile RobotCan Ulas Dogruer. 195-206 [doi]
- Application of AdaSS Ensemble Approach for Prediction of Power Plant Generator TensionKonrad Jackowski, Jan Platos. 207-216 [doi]
- Application of RBF Neural Network in Sensorless Control of A.C. Drive with Induction MotorPavel Brandstetter, Martin Kuchar, Jiri Friedrich. 217-227 [doi]
- Enhancements for a Robust Fuzzy Detection of StressAsier Salazar-Ramirez, Eloy Irigoyen, Raquel Martínez. 229-238 [doi]
- Neural Networks Using Hausdorff Distance, SURF and Fisher Algorithms for Ear RecognitionPedro Luis Galdámez, María Angélica González Arrieta, Miguel Ramón Ramón. 239-249 [doi]
- A Novel Harmony Search Algorithm for One-Year-Ahead Energy Demand Estimation Using Macroeconomic VariablesSancho Salcedo-Sanz, José Antonio Portilla-Figueras, Jesús Muñoz-Bulnes, Javier Del Ser, Miren Nekane Bilbao. 251-258 [doi]
- Sensitivity Based Feature Selection for Recurrent Neural Network Applied to Forecasting of Heating Gas ConsumptionMartin Macas, Fiorella Lauro, Fabio Moretti, Stefano Pizzuti, Mauro Annunziato, Alessandro Fonti, Gabriele Comodi, Andrea Giantomassi. 259-268 [doi]
- Combining Support Vector Machines and Segmentation Algorithms for Efficient Anomaly Detection: A Petroleum Industry ApplicationLuis Martí, Nayat Sánchez Pi, José Manuel Molina, Ana Cristina Bicharra Garcia. 269-278 [doi]
- Comparison Analysis of Regression Models Based on Experimental and FEM Simulation Datasets Used to Characterize Electrolytic Tinplate MaterialsRoberto Fernández-Martínez, Rubén Lostado-Lorza, Marcos Illera-Cueva, Rubén Escribano-García, Bryan J. Mac Donald. 279-288 [doi]
- Design Method for a Scalable Modular Structure Product FamilyYonanda Adhitama, Wolfgang Rosenstiel. 289-299 [doi]
- Improvement in Manufacturing Welded Products through Multiple Response Surface Methodology and Data Mining TechniquesRubén Escribano-García, Rubén Lostado-Lorza, Roberto Fernández-Martínez, Pedro Villanueva-Roldán, Bryan J. Mac Donald. 301-310 [doi]
- Logistics Process Modelling in Supply Chain - Algorithm of Coordination in the Supply Chain - ContractingKatarzyna Grzybowska, Gábor Kovács. 311-320 [doi]
- Detecting Stack Based Kernel Information LeaksS. Peiró, M. Muñoz, Miguel Masmano, Alfons Crespo. 321-331 [doi]
- A Chain of Attacks and Countermeasures Applied to a Group Key Transfer ProtocolRuxandra F. Olimid. 333-342 [doi]
- EEG-Based User Authentication Using ArtifactsTien Pham, Wanli Ma, Dat Tran, Phuoc Nguyen, Dinh Phung. 343-353 [doi]
- Specifying and Verifying Meta-Security by Means of Semantic Web MethodsJoaquín Borrego-Díaz, Antonia M. Chávez-González, José Luis Pro-Martín, Virginia Matos-Arana. 355-365 [doi]
- Experiments on Trust Prediction Based on Reputation FeaturesJ. David Nuñez-Gonzalez, Manuel Graña. 367-374 [doi]
- Cryptanalytic Results on Knapsack Cryptosystem Using Binary Particle Swarm OptimizationAshish Jain, Narendra S. Chaudhari. 375-384 [doi]
- Mobile Agent Security Based on Artificial Immune SystemZaki Brahmi, Amine Lini, Mohamed Mohsen Gammoudi. 385-395 [doi]
- Improving the Period and Linear Span of the Sequences Generated by DLFSRsAlberto Peinado, Jorge Munilla, Amparo Fúster-Sabater. 397-406 [doi]
- Prediction of Sequences Generated by LFSR Using Back Propagation MLPAlberto Peinado, Andrés Ortiz. 407-412 [doi]
- An Efficient Heterogeneous Approach to Building Compressed Automata for Malware Signature MatchingCiprian Pungila, Viorel Negru. 413-422 [doi]
- Mining in Dynamically Composed Scripted 3D Scenes for Better Access Control - Computational EvaluationAdam Wójtowicz. 423-432 [doi]
- Evolutionary Cost-Sensitive Ensemble for Malware DetectionBartosz Krawczyk, Michal Wozniak. 433-442 [doi]
- A Survey on Static Analysis and Model CheckingIván García-Ferreira, Carlos Laorden, Igor Santos, Pablo Garcia Bringas. 443-452 [doi]
- Methodological Security Verification of a Registration ProtocolJesus Diaz, David Arroyo, Francisco B. Rodriguez. 453-462 [doi]
- Supervised Learning Approaches with Majority Voting for DNS Tunneling DetectionMaurizio Aiello, Maurizio Mongelli, Gianluca Papaleo. 463-472 [doi]
- Packet Header Anomaly Detection Using Statistical AnalysisWarusia Yassin, Nur Izura Udzir, Azizol Abdullah, Mohd Taufik Abdullah, Zaiton Muda, Hazura Zulzalil. 473-482 [doi]
- Highly Space Efficient BlacklistingMarián Kühnel, Ulrike Meyer. 483-493 [doi]
- Vulnerabilities in a Two-Factor User Authentication in Multi-server Networks ProtocolAdela Georgescu. 495-504 [doi]
- Optimizing Network Energy Consumption through Intrusion Prevention SystemsAlessio Merlo, Mauro Migliardi, Diego Raso, Elena Spadacini. 505-515 [doi]
- Anomalous User Comment Detection in Social News WebsitesJorge de-la-Peña-Sordo, Iker Pastor-López, Xabier Ugarte-Pedrero, Igor Santos, Pablo Garcia Bringas. 517-526 [doi]
- Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web ApplicationsRafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz. 527-535 [doi]
- An Empirical Study on Word Sense Disambiguation for Adult Content FilteringIgor Santos, Patxi Galán-García, Carlos Laorden Gómez, Javier Nieves, Borja Sanz, Pablo Garcia Bringas, José María Gómez Hidalgo. 537-544 [doi]
- Network Traffic Prediction and Anomaly Detection Based on ARFIMA ModelTomasz Andrysiak, Lukasz Saganowski, Michal Choras, Rafal Kozik. 545-554 [doi]
- Visualization and Efficiency in Teaching MathematicsBeáta Bojda, Katalin Bubnó, Benedek Nagy, Viktor Takács. 555-564 [doi]
- Lab Classes in Chemistry Learning an Artificial Intelligence ViewMargarida Figueiredo, M. Lurdes Esteves, José Neves, Henrique Vicente. 565-575 [doi]