Buscas alternativas:
evolutionary algorithm » evolutionary algorithms (Expandir a busca)
algorithm informatica » algorithms informatics (Expandir a busca), algoritmos informatica (Expandir a busca), algorithms information (Expandir a busca)
coder evolutionary » modern evolutionary (Expandir a busca), under evolutionary (Expandir a busca), model evolutionary (Expandir a busca)
informatica in » informatica i (Expandir a busca), informatica ii (Expandir a busca), informarica in (Expandir a busca)
casting python » casting method (Expandir a busca), using python (Expandir a busca)
using casting » using resting (Expandir a busca), using cutting (Expandir a busca), using coating (Expandir a busca)
python python » pythons python (Expandir a busca), piton python (Expandir a busca), pitons python (Expandir a busca)
evolutionary algorithm » evolutionary algorithms (Expandir a busca)
algorithm informatica » algorithms informatics (Expandir a busca), algoritmos informatica (Expandir a busca), algorithms information (Expandir a busca)
coder evolutionary » modern evolutionary (Expandir a busca), under evolutionary (Expandir a busca), model evolutionary (Expandir a busca)
informatica in » informatica i (Expandir a busca), informatica ii (Expandir a busca), informarica in (Expandir a busca)
casting python » casting method (Expandir a busca), using python (Expandir a busca)
using casting » using resting (Expandir a busca), using cutting (Expandir a busca), using coating (Expandir a busca)
python python » pythons python (Expandir a busca), piton python (Expandir a busca), pitons python (Expandir a busca)
1
2
“...Tese de mestrado em Engenharia Informática, apresentada à Universidade de Lisboa, através...”
Acessar documento
Acessar documento
Dissertação
3
4
5
6
7
8
9
10
11
“... algorithm; SPEA_II; NSGA_II; and NSGA_III. The results indicate the benefits of using multi-objective...”
Acessar documento
Acessar documento
Tese
12
“... de Engenharia Informática da Faculdade de Ciências e Tecnologia da Universidade de Coimbra...”
Acessar documento
Acessar documento
13
14
“... a suspiciousness value to each command inthe code. Most methods, which use this strategy, are heuristics that use...”
Acessar documento
Acessar documento
Dissertação
15