-
1
-
-
18944381088
-
Two algorithms related to the method of steepest descent
-
March
-
M.T. Whitney, R.K. Meany, Two algorithms related to the method of steepest descent, SIAM journal on Numerical Analysis 4 (March (1)) (1967) 109-118.
-
(1967)
SIAM Journal on Numerical Analysis
, vol.4
, Issue.1
, pp. 109-118
-
-
Whitney, M.T.1
Meany, R.K.2
-
2
-
-
8644265054
-
Steepest descent for singular linear operator equation
-
September
-
M.Z. Nashed, Steepest descent for singular linear operator equation, SIAM Journal on Numerical Analysis 7 (September (3)) (1970) 358-362.
-
(1970)
SIAM Journal on Numerical Analysis
, vol.7
, Issue.3
, pp. 358-362
-
-
Nashed, M.Z.1
-
5
-
-
84939004610
-
Optimality and non-scalar-valued performance criteria
-
January
-
L. Zadeh, Optimality and non-scalar-valued performance criteria, IEEE Transactions on Automatic Control 8 (January (1)) (1963) 59-60.
-
(1963)
IEEE Transactions on Automatic Control
, vol.8
, Issue.1
, pp. 59-60
-
-
Zadeh, L.1
-
6
-
-
0013254059
-
Multicriteria truss optimization
-
W. Stadler (Ed.), Plenum Press, New York
-
J. Koski, Multicriteria truss optimization, in: W. Stadler (Ed.), Multicriteria Optimization in Engineering and in the Sciences, vol. 9, Plenum Press, New York, 1988, pp. 263-306.
-
(1988)
Multicriteria Optimization in Engineering and in the Sciences
, vol.9
, pp. 263-306
-
-
Koski, J.1
-
7
-
-
0036530772
-
A fast and elitist multiobjective genetic algorithm: NSGA-II
-
April
-
K. Deb, A. Pratap, S. Agarwal, T. Meyarivan, A fast and elitist multiobjective genetic algorithm: NSGA-II, IEEE Transactions on Evolutionary Computation 6 (April (2)) (2002) 182-197.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.2
, pp. 182-197
-
-
Deb, K.1
Pratap, A.2
Agarwal, S.3
Meyarivan, T.4
-
8
-
-
0002629429
-
An overview of evolutionary algorithms in multiobjective optimization
-
Spring
-
C.M. Fonseca, P.J. Fleming, An overview of evolutionary algorithms in multiobjective optimization, IEEE Transactions on Evolutionary Computation 3 (Spring (1)) (1995) 1-16.
-
(1995)
IEEE Transactions on Evolutionary Computation
, vol.3
, Issue.1
, pp. 1-16
-
-
Fonseca, C.M.1
Fleming, P.J.2
-
9
-
-
8344257273
-
Multi-objective genetic programming optimization of decision trees for classifying medical DATA
-
Springer, Berlin/Heidelberg
-
E.M. Mugambi, A. Hunter, Multi-objective genetic programming optimization of decision trees for classifying medical DATA Knowledge-Based Intelligent Information and Engineering Systems, vol. 2773, Springer, Berlin/Heidelberg, 2003, pp. 293-299.
-
(2003)
Knowledge-Based Intelligent Information and Engineering Systems
, vol.2773
, pp. 293-299
-
-
Mugambi, E.M.1
Hunter, A.2
-
10
-
-
3142756516
-
Handling multiple objectives with particle swarm optimization
-
June
-
C.A. Coello Coello, G.T. Pulido, M.S. Lechuga, Handling multiple objectives with particle swarm optimization, IEEE Transactions on Evolutionary Computation 8 (June (3)) (2004) 256-279.
-
(2004)
IEEE Transactions on Evolutionary Computation
, vol.8
, Issue.3
, pp. 256-279
-
-
Coello Coello, C.A.1
Pulido, G.T.2
Lechuga, M.S.3
-
11
-
-
33744730797
-
Comprehensive learning particle swarm optimizer for global optimization of multimodal functions
-
June
-
J.J. Liang, A.K. Qin, P.N. Suganthan, S. Baskar, Comprehensive learning particle swarm optimizer for global optimization of multimodal functions, IEEE Transactions on Evolutionary Computation 10 (June (3)) (2006) 281-295.
-
(2006)
IEEE Transactions on Evolutionary Computation
, vol.10
, Issue.3
, pp. 281-295
-
-
Liang, J.J.1
Qin, A.K.2
Suganthan, P.N.3
Baskar, S.4
-
12
-
-
32644449879
-
Comprehensive learning particle swarm optimizer for solving multiobjective optimization problems
-
February
-
V.L. Huang, P.N. Suganthan, J.J. Liang, Comprehensive learning particle swarm optimizer for solving multiobjective optimization problems, International Journal of Intelligent Systems 21 (February (2)) (2006) 209-226.
-
(2006)
International Journal of Intelligent Systems
, vol.21
, Issue.2
, pp. 209-226
-
-
Huang, V.L.1
Suganthan, P.N.2
Liang, J.J.3
-
13
-
-
20444475398
-
Modeling network attacks: Extending the attack tree paradigm
-
J. Dawkins, C. Campbell, J. Hale, Modeling network attacks: extending the attack tree paradigm, in: Proceedings of Workshop on Statistical Machine Learning Techniques in Computer Intrusion Detection, Baltimore, MD, USA, 2002.
-
Proceedings of Workshop on Statistical Machine Learning Techniques in Computer Intrusion Detection, Baltimore, MD, USA, 2002
-
-
Dawkins, J.1
Campbell, C.2
Hale, J.3
-
14
-
-
0038226150
-
-
Carnegie Melon University, Technical Note CMU/SEI-2001-TN-001
-
A. Moore, R. Ellison, R. Linger, Attack Modeling for Information Security and Survivability, Carnegie Melon University, 2001, Technical Note CMU/SEI-2001-TN-001.
-
(2001)
Attack Modeling for Information Security and Survivability
-
-
Moore, A.1
Ellison, R.2
Linger, R.3
-
15
-
-
33646031830
-
Using attack trees to identify malicious attacks from authorized insiders
-
I. Ray, N. Poolsappasit, Using attack trees to identify malicious attacks from authorized insiders, in: Proceeding of ESORICS, Milan, Italy, 2005, pp. 231-246.
-
Proceeding of ESORICS, Milan, Italy, 2005
, pp. 231-246
-
-
Ray, I.1
Poolsappasit, N.2
-
16
-
-
0002670359
-
Attack trees
-
B. Schneier, Attack trees, Dr. Dobb's Journal 24 (12) (1999) 21-29.
-
(1999)
Dr. Dobb's Journal
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
17
-
-
0038687692
-
Scalable graph-based network vulnerability analysis
-
P. Ammann, D. Wijesekera, S. Kaushik, Scalable graph-based network vulnerability analysis, in: Proceedings of Ninth Conference on Computer and Communications Security, Washington, DC, USA, 2002, pp. 217-224.
-
Proceedings of Ninth Conference on Computer and Communications Security, Washington, DC, USA, 2002
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
18
-
-
84948760464
-
Two formal analysis of attack graphs
-
S. Jha, O. Sheyner, J.M. Wing, Two formal analysis of attack graphs, in: Proceedings of the 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, 2002, pp. 49-63.
-
Proceedings of the 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, 2002
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.M.3
-
19
-
-
84988504967
-
A graph-based system for network-vulnerability analysis
-
C. Phillips, L. Swiler, A graph-based system for network-vulnerability analysis, in: Proceedings of the 1998 New Security Paradigms Workshop, Chicago, IL, USA, 1998, pp. 71-79.
-
Proceedings of the 1998 New Security Paradigms Workshop, Chicago, IL, USA, 1998
, pp. 71-79
-
-
Phillips, C.1
Swiler, L.2
-
20
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, J.M. Wing, Automated generation and analysis of attack graphs, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2002, pp. 273-284.
-
Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2002
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
21
-
-
84964504906
-
Computer-attack graph generation tool
-
L. Swiler, C. Phillips, D. Ellis, S. Chakerian, Computer-attack graph generation tool, in: Proceedings of the DARPA Information Survivability Conference and Exposition II, Anaheim, CA, USA, 2001, pp. 307-321.
-
Proceedings of the DARPA Information Survivability Conference and Exposition II, Anaheim, CA, USA, 2001
, pp. 307-321
-
-
Swiler, L.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
-
22
-
-
84944727025
-
Efficient minimum-cost network hardening via exploit dependency graphs
-
S. Noel, S. Jajodia, B. O'Berry, M. Jacobs, Efficient minimum-cost network hardening via exploit dependency graphs, in: Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, NV, USA, 2003, pp. 86-95.
-
Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, NV, USA, 2003
, pp. 86-95
-
-
Noel, S.1
Jajodia, S.2
O'Berry, B.3
Jacobs, M.4
-
23
-
-
64749095206
-
Optimal security hardening using multi-objective optimization on attack tree models of networks
-
R. Dewri, N. Poolsappasit, I. Ray, D. Whitle, Optimal security hardening using multi-objective optimization on attack tree models of networks, in: Proceedings of 14th ACM Conference on Computer and Communications Security (CCS'07), Alexandria, VA, USA, 2007, pp. 204-213.
-
Proceedings of 14th ACM Conference on Computer and Communications Security (CCS'07), Alexandria, VA, USA, 2007
, pp. 204-213
-
-
Dewri, R.1
Poolsappasit, N.2
Ray, I.3
Whitle, D.4
-
24
-
-
84860771661
-
Optimal security hardening on attack tree models of networks: A cost-benefit analysis
-
June
-
R. Dewri, I. Ray, N. Poolsappasit, D. Whitley, Optimal security hardening on attack tree models of networks: a cost-benefit analysis, International Journal of Information Security 11 (June (3)) (2012) 167-188.
-
(2012)
International Journal of Information Security
, vol.11
, Issue.3
, pp. 167-188
-
-
Dewri, R.1
Ray, I.2
Poolsappasit, N.3
Whitley, D.4
-
25
-
-
3142781923
-
The fully informed particle swarm: Simpler, may be better
-
June
-
R. Mendes, J. Kennedy, J. Neves, The fully informed particle swarm: simpler, may be better, IEEE Transactions on Evolutionary Computation 8 (June (3)) (2004) 204-210.
-
(2004)
IEEE Transactions on Evolutionary Computation
, vol.8
, Issue.3
, pp. 204-210
-
-
Mendes, R.1
Kennedy, J.2
Neves, J.3
-
28
-
-
70349626031
-
Adaptive particle swarm optimization
-
Z.H. Zhan, J. Zhang, Y. Li, H.S. Hung Chung, Adaptive particle swarm optimization, IEEE Transactions on Systems, Man, and Cybernetics - Part B 39 (6) (2009) 1362-1381.
-
(2009)
IEEE Transactions on Systems, Man, and Cybernetics - Part B
, vol.39
, Issue.6
, pp. 1362-1381
-
-
Zhan, Z.H.1
Zhang, J.2
Li, Y.3
Hung Chung, H.S.4
-
29
-
-
79960561104
-
Scale-free fully informed particle swarm optimization algorithm
-
October
-
C. Zhang, Z. Yi, Scale-free fully informed particle swarm optimization algorithm, Information Sciences 181 (October (20)) (2011) 4550-4568.
-
(2011)
Information Sciences
, vol.181
, Issue.20
, pp. 4550-4568
-
-
Zhang, C.1
Yi, Z.2
-
30
-
-
82455205925
-
Orthogonal learning particle swarm optimization
-
December
-
Z.-H. Zhan, J. Zhang, Y. Li, Y.-H. Shi, Orthogonal learning particle swarm optimization, IEEE Transactions on Evolutionary Computation 15 (December (6)) (2011) 832-847.
-
(2011)
IEEE Transactions on Evolutionary Computation
, vol.15
, Issue.6
, pp. 832-847
-
-
Zhan, Z.-H.1
Zhang, J.2
Li, Y.3
Shi, Y.-H.4
-
31
-
-
84862688092
-
A dynamic neighborhood learning based particle swarm optimizer for global numerical optimization
-
November
-
M. Nasir, et al., A dynamic neighborhood learning based particle swarm optimizer for global numerical optimization, Information Sciences 209 (November) (2012) 16-36.
-
(2012)
Information Sciences
, vol.209
, pp. 16-36
-
-
Nasir, M.1
-
32
-
-
0036522301
-
A swarm metaphor for multiobjective design optimization
-
DOI 10.1080/03052150210915
-
T. Ray, L. KM, A swarm metaphor for multiobjective design optimization, Engineering Optimization 34 (2002) 141-153. (Pubitemid 35263146)
-
(2002)
Engineering Optimization
, vol.34
, Issue.2
, pp. 141-153
-
-
Ray, T.1
Liew, K.M.2
-
33
-
-
0036037107
-
Particle swarm optimization method in multiobjective problems
-
K.E. Parsopoulos, M.N. Vrahatis, Particle swarm optimization method in multiobjective problems, in: Proceedings of ACM Symp. on Applied Computing 2002 (SAC 2002), Madrid, Spain, 2002, pp. 603-607.
-
Proceedings of ACM Symp. on Applied Computing 2002 (SAC 2002), Madrid, Spain, 2002
, pp. 603-607
-
-
Parsopoulos, K.E.1
Vrahatis, M.N.2
-
34
-
-
84901470581
-
Multiobjective optimization using dynamic neighborhood particle swarm optimization
-
X. Hu, R.C. Eberhart, Multiobjective optimization using dynamic neighborhood particle swarm optimization, in: Proceedings of IEEE Congress on Evolutionary Computation (CEC 2002), Honolulu, HI, 2002, pp. 1677-1681.
-
Proceedings of IEEE Congress on Evolutionary Computation (CEC 2002), Honolulu, HI, 2002
, pp. 1677-1681
-
-
Hu, X.1
Eberhart, R.C.2
-
35
-
-
3142781424
-
A multi-objective algorithm based upon particle swarm optimization
-
J.E. Fieldsend, S. Singh, A multi-objective algorithm based upon particle swarm optimization, in: Proceedings of 2002 UK Workshop on Computational Intelligence, Birmingham, UK, 2002, pp. 37-44.
-
Proceedings of 2002 UK Workshop on Computational Intelligence, Birmingham, UK, 2002
, pp. 37-44
-
-
Fieldsend, J.E.1
Singh, S.2
-
36
-
-
84901406129
-
The role of e-dominance in multi-objective particle swarm optimization methods
-
S. Mostaghim, J.R. Teich, The role of e-dominance in multi-objective particle swarm optimization methods, in: Proceedings of IEEE Congress on Evolutionary Computation 2003 (CEC 2003), Canberra, Australia, 2003, pp. 1764-1771.
-
Proceedings of IEEE Congress on Evolutionary Computation 2003 (CEC 2003), Canberra, Australia, 2003
, pp. 1764-1771
-
-
Mostaghim, S.1
Teich, J.R.2
-
37
-
-
27144493162
-
Evaluation of comprehensive learning particle swarm optimizer
-
Berlin
-
J.J. Liang, A.K. Qin, P.N. Suganthan, S. Baskar, Evaluation of comprehensive learning particle swarm optimizer, in: Lecture Notes in Computer Science, vol. 3316, Berlin, 2004, pp. 230-235.
-
(2004)
Lecture Notes in Computer Science
, vol.3316
, pp. 230-235
-
-
Liang, J.J.1
Qin, A.K.2
Suganthan, P.N.3
Baskar, S.4
-
38
-
-
35248851524
-
A non-dominated sorting particle swarm optimizer for multiobjective optimization
-
X. Li, A non-dominated sorting particle swarm optimizer for multiobjective optimization, in: Proc. Genetic and Evolutionary Computation Conference (GECCO 2003), Chicago, IL, 2003, pp. 37-48.
-
Proc. Genetic and Evolutionary Computation Conference (GECCO 2003), Chicago, IL, 2003
, pp. 37-48
-
-
Li, X.1
-
39
-
-
84901433330
-
Particle swarm optimizers for Pareto optimization with enhanced archiving techniques
-
T. Bartz-Beielstein, et al., Particle swarm optimizers for Pareto optimization with enhanced archiving techniques, in: Proceedings of 2003 Congress on Evolutionary Computation (CEC'03), Canberra, Australia, 2003, pp. 1780-1787.
-
Proceedings of 2003 Congress on Evolutionary Computation (CEC'03), Canberra, Australia, 2003
, pp. 1780-1787
-
-
Bartz-Beielstein, T.1
-
40
-
-
84901438927
-
MOPSO: A proposal for multiple objective particle swarm optimization
-
C.A.C. Coello, M.S. Lechuga, MOPSO: a proposal for multiple objective particle swarm optimization, in: Proceedings of IEEE Congress on Evolutionary Computation (CEC 2002), Honolulu, HI/Piscataway, NJ, 2002, pp. 1051-1056.
-
Proceedings of IEEE Congress on Evolutionary Computation (CEC 2002), Honolulu, HI/Piscataway, NJ, 2002
, pp. 1051-1056
-
-
Coello, C.A.C.1
Lechuga, M.S.2
-
41
-
-
84884418685
-
-
Schweitzer Engineering Laboratories Inc., Pullman, WA, USA
-
A. Risley, K. Carson, Low or No-Cost Cybersecurity Solutions for Defending the Electric Power System Against Electronic Intrusions, Schweitzer Engineering Laboratories Inc., Pullman, WA, USA, 2006, pp. 1-15.
-
(2006)
Low or No-Cost Cybersecurity Solutions for Defending the Electric Power System Against Electronic Intrusions
, pp. 1-15
-
-
Risley, A.1
Carson, K.2
-
42
-
-
2542628960
-
Analysis of electric grid security under terrorist threat
-
May
-
J. Salmeron, K. Wood, R. Baldick, Analysis of electric grid security under terrorist threat, IEEE Transactions on Power Systems 19 (May (2)) (2004) 905-912.
-
(2004)
IEEE Transactions on Power Systems
, vol.19
, Issue.2
, pp. 905-912
-
-
Salmeron, J.1
Wood, K.2
Baldick, R.3
-
43
-
-
20444404422
-
The CORAS approach for model-based risk management applied to e-commerce domain
-
D. Raptis, T. Dimitrakos, B.A. Gran, K. Stølen, The CORAS approach for model-based risk management applied to e-commerce domain, in: IFIP Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, Portoroz, Slovenia, 2002, pp. 169-181.
-
IFIP Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, Portoroz, Slovenia, 2002
, pp. 169-181
-
-
Raptis, D.1
Dimitrakos, T.2
Gran, B.A.3
Stølen, K.4
-
44
-
-
57049132856
-
The CORAS approach for model-based risk management applied to a telemedicine service
-
IOS Press
-
Y. Stamatiou, et al., The CORAS approach for model-based risk management applied to a telemedicine service, in: Proceedings of Medical Informatics Europe, MIE 2003, IOS Press, 2003, pp. 206-211.
-
(2003)
Proceedings of Medical Informatics Europe, MIE 2003
, pp. 206-211
-
-
Stamatiou, Y.1
-
45
-
-
53349174368
-
Automatic security assessment of critical cyberinfrastructures
-
Springer, Anchorage, Alaska
-
Z. Anwar, R. Shankesi, R.H. Campbell, Automatic security assessment of critical cyberinfrastructures, in: Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Springer, Anchorage, Alaska, 2008, pp. 366-375.
-
(2008)
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
, pp. 366-375
-
-
Anwar, Z.1
Shankesi, R.2
Campbell, R.H.3
-
46
-
-
64749087925
-
Budget constrained optimal security hardening of control networks for critical cyber-infrastructures
-
February
-
Z. Anwar, M. Montanari, A. Gutierrez, R.H. Campbell, Budget constrained optimal security hardening of control networks for critical cyber- infrastructures, International Journal of Critical Infrastructure Protection 2 (February (1-2)) (2009) 13-25.
-
(2009)
International Journal of Critical Infrastructure Protection
, vol.2
, Issue.1-2
, pp. 13-25
-
-
Anwar, Z.1
Montanari, M.2
Gutierrez, A.3
Campbell, R.H.4
-
47
-
-
32544451794
-
Matching information security vulnerabilities to organizational security policies, a genetic algorithm approach
-
March
-
M. Gupta, J. Rees, A. Chaturvedi, J. Chi, Matching information security vulnerabilities to organizational security policies, a genetic algorithm approach, Decision Support Systems 41 (March (3)) (2006) 592-603.
-
(2006)
Decision Support Systems
, vol.41
, Issue.3
, pp. 592-603
-
-
Gupta, M.1
Rees, J.2
Chaturvedi, A.3
Chi, J.4
-
48
-
-
84861102051
-
Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization
-
July
-
H. Ali, W. Shahzad, F.A. Khan, Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization, Applied Soft Computing 12 (July (7)) (2012) 1913-1928.
-
(2012)
Applied Soft Computing
, vol.12
, Issue.7
, pp. 1913-1928
-
-
Ali, H.1
Shahzad, W.2
Khan, F.A.3
-
50
-
-
0034199979
-
Comparison of multiobjective evolutionary algorithms: Empirical results
-
Summer
-
E. Zitzler, K. Deb, L. Thiele, Comparison of multiobjective evolutionary algorithms: empirical results, IEEE Transactions on Evolutionary Computation 8 (Summer (2)) (2000) 173-195.
-
(2000)
IEEE Transactions on Evolutionary Computation
, vol.8
, Issue.2
, pp. 173-195
-
-
Zitzler, E.1
Deb, K.2
Thiele, L.3
-
51
-
-
84958962366
-
On the performance assessment and comparison of stochastic multi-objective optimizers
-
C.M. Fonseca, P.J. Fleming, On the performance assessment and comparison of stochastic multi-objective optimizers, in: Proceedings of the 4th International Conference on Parallel Problem Solving from Nature IV, London, UK, 1996, pp. 584-593.
-
Proceedings of the 4th International Conference on Parallel Problem Solving from Nature IV, London, UK, 1996
, pp. 584-593
-
-
Fonseca, C.M.1
Fleming, P.J.2
-
53
-
-
0003808325
-
-
Technical Report TR-98-03, Department of Electrical and Computer Engineering, Graduate School of Eng., Air Force Inst., Wright-Patterson AFB, OH
-
D.A.V. Veldhuizen, G.B. Lamont, Multiobjective Evolutionary Algorithm Research: A History and Analysis, Technical Report TR-98-03, Department of Electrical and Computer Engineering, Graduate School of Eng., Air Force Inst., Wright-Patterson AFB, OH, 1998.
-
(1998)
Multiobjective Evolutionary Algorithm Research: A History and Analysis
-
-
Veldhuizen, D.A.V.1
Lamont, G.B.2
-
54
-
-
0036036577
-
Security Attribute Evaluation Method: A Cost-benefit Approach
-
S. Butler, Security Attribute Evaluation Method: A Cost-benefit Approach, in: Proceedings of 24th Inter. Conf. on Software Engineering, Orlando, FL, USA, 2002, pp. 232-240.
-
Proceedings of 24th Inter. Conf. on Software Engineering, Orlando, FL, USA, 2002
, pp. 232-240
-
-
Butler, S.1
-
56
-
-
33750805606
-
A comparison of particle swarm optimization and the genetic algorithm
-
Texas, USA
-
R. Hassan, B. Cohanim, O. de Weck, G. Venter, A comparison of particle swarm optimization and the genetic algorithm, in: Structural Dynamics and Materials, Texas, USA, 2005, pp. 1-13.
-
(2005)
Structural Dynamics and Materials
, pp. 1-13
-
-
Hassan, R.1
Cohanim, B.2
De Weck, O.3
Venter, G.4
|