Departamento
TEORÍA DE LA SEÑAL, TELEMÁTICA Y COMUNICACIONES
Artículos (19) Publicaciones en las que ha participado algún/a investigador/a
2008
-
A deterministic crowding evolutionary algorithm for optimization of a knn-based anomaly intrusion detection system
Frontiers in Artificial Intelligence and Applications, Vol. 177, Núm. 1, pp. 111-120
-
An improved masker-probe method for stimulus artifact reduction in electrically evoked compound action potentials
Journal of Neuroscience Methods, Vol. 175, Núm. 1, pp. 143-147
-
Bilinear modelling of batch processes. Part I: Theoretical discussion
Journal of Chemometrics, Vol. 22, Núm. 5, pp. 299-308
-
Bilinear modelling of batch processes. Part II: A comparison of PLS soft-sensors
Journal of Chemometrics, Vol. 22, Núm. 10, pp. 533-547
-
Characterization of artificial magnetic conductor strips for parallel plate planar antennas
Microwave and Optical Technology Letters, Vol. 50, Núm. 2, pp. 498-504
-
Emulation of MIMO nonisotropic fading environments with reverberation chambers
IEEE Antennas and Wireless Propagation Letters, Vol. 7, pp. 325-328
-
Evaluation of a low-rate DoS attack against application servers
Computers and Security, Vol. 27, Núm. 7-8, pp. 335-354
-
Evolvable agents, a fine grained approach for distributed evolutionary computing: Walking towards the peer-to-peer computing frontiers
Soft Computing, Vol. 12, Núm. 12, pp. 1145-1156
-
High performance computing for dynamic multi-objective optimisation
International Journal of High Performance Systems Architecture, Vol. 1, Núm. 4, pp. 241-250
-
Hybridizing sparse component analysis with genetic algorithms for microarray analysis
Neurocomputing, Vol. 71, Núm. 10-12, pp. 2356-2376
-
Improved Gauss-Newton optimisation methods in affine registration of SPECT brain images
Electronics Letters, Vol. 44, Núm. 22, pp. 1291-1292
-
Jointly gaussian pdf-based likelihood ratio test for voice activity detection
IEEE Transactions on Audio, Speech and Language Processing, Vol. 16, Núm. 8, pp. 1565-1578
-
La seguridad informática desde la perspectiva de la Universidad
Red seguridad: revista especializada en seguridad informática, protección de datos y comunicaciones, Núm. 35, pp. 36-38
-
Prediction of CO maximum ground level concentrations in the Bay of Algeciras, Spain using artificial neural networks
Chemosphere, Vol. 70, Núm. 7, pp. 1190-1195
-
Resilience to churn of a peer-to-peer evolutionary algorithm
International Journal of High Performance Systems Architecture, Vol. 1, Núm. 4, pp. 260-268
-
The influence of efficiency on receive diversity and MIMO capacity for Rayleigh-fading channels
IEEE Transactions on Antennas and Propagation, Vol. 56, Núm. 5, pp. 1444-1450
-
User-centred versus system-centred evaluation of a personalization system
Information Processing and Management, Vol. 44, Núm. 3, pp. 1293-1307
-
Visualizing the evolution of a web-based social network
Journal of Network and Computer Applications, Vol. 31, Núm. 4, pp. 677-698
-
hCHAC-4, an ACO algorithm for solving the four-criteria military path-finding problem
Studies in Computational Intelligence, Vol. 129, pp. 73-84