Publicaciones (89) Publicaciones en las que ha participado algún/a investigador/a

2005

  1. A bilinear algorithm for optimizing a linear function over the efficient set of a multiple objective linear programming problem

    Journal of Global Optimization, Vol. 31, Núm. 1, pp. 1-16

  2. A deterministic approach to balancedness and run quantification in pseudorandom pattern generators

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  3. A fast and accurate tracking approach for automated visual surveillance

    Proceedings - International Carnahan Conference on Security Technology

  4. A fast and accurate tracking approach for automated visual surveillance

    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS

  5. A heuristic approach for the Travelling Purchaser Problem

    European Journal of Operational Research, Vol. 162, Núm. 1, pp. 142-152

  6. A hierarchical access control scheme in ad-hoc wireless networks

    Proceedings - International Carnahan Conference on Security Technology

  7. A hierarchical access control scheme in ad-hoc wireless networks

    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS

  8. A hybrid GRASP-Path Relinking algorithm for the capacitated p - Hub median problem

    Lecture Notes in Computer Science

  9. A large deviation approach to normality testing

    Computational Statistics and Data Analysis, Vol. 49, Núm. 3, pp. 741-756

  10. A large deviation approach to normality testing

    Quality control and applied statistics, Vol. 50, Núm. 6, pp. 677-680

  11. A new bound and an O(mn) algorithm for the undesirable 1-median problem (maxian) on networks

    Computers and Operations Research, Vol. 32, Núm. 2, pp. 309-325

  12. A simple acceptance/rejection criterium for sequence generators in symmetric cryptography

    Lecture Notes in Computer Science

  13. Acción autoadaptativa aplicada a controlador robusto en robots manipuladores

    XXVI Jornadas de Automática: 7-10 de septiembre de 2005, Alicante-Elche

  14. Actas del I Simposio sobre Seguridad Informática

    Thomson-Paraninfo

  15. Algorithm for proving the knowledge of an Independent Vertex Set

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  16. An Heuristic Search based Approach for Moving Objects Tracking

    19TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI-05)

  17. An asymptotically optimal detector for Gaussianity testing

    IEEE Transactions on Signal Processing, Vol. 53, Núm. 11, pp. 4186-4193

  18. An e-services architecture for legislative assemblies

    Proceedings - 2005 IEEE/WIC/ACM InternationalConference on Web Intelligence, WI 2005

  19. An efficient approach for solving the production/ordering planning problem with time-varying storage capacities

    Operational Research Peripatetic Post-Graduate Programme (ORP3)

  20. An heuristic search based approach for moving objects tracking

    IJCAI International Joint Conference on Artificial Intelligence