Publicaciones (51) Publicaciones en las que ha participado algún/a investigador/a

2009

  1. 3 pillars and 1 beam: Quality of river basin governance processes

    Ecological Economics, Vol. 68, Núm. 4, pp. 940-954

  2. A GRASP-VNS hybrid for the fuzzy Vehicle Routing Problem with time windows

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  3. A hybrid GRASP/VND heuristic for the one-commodity pickup-and-delivery traveling salesman problem

    Computers and Operations Research, Vol. 36, Núm. 5, pp. 1639-1645

  4. A nature inspired approach for the uncapacitated plant cycle location problem

    Studies in Computational Intelligence

  5. A simple attack on some clock-controlled generators

    Computers and Mathematics with Applications, Vol. 58, Núm. 1, pp. 179-188

  6. Acción en el mercado: una propuesta de marketing para profesionales

    [Madrid] : Bubok, [2009]

  7. Algoritmos Genéticos: una visión práctica

    Números: Revista de didáctica de las matemáticas, Núm. 71, pp. 29-47

  8. Cooperation enforcement schemes in Vehicular Ad-hoc NETworks

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  9. Cooperation requirements for packet forwarding in vehicular ad-hoc networks (VANETs)

    ACM International Conference Proceeding Series

  10. Decision making in competitive location using fuzzy sets

    2009 International Fuzzy Systems Association World Congress and 2009 European Society for Fuzzy Logic and Technology Conference, IFSA-EUSFLAT 2009 - Proceedings

  11. Designing communication-oriented node authentication for VANETs

    2009 6th Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2009

  12. Deterministic computation of pseudorandomness in sequences of cryptographic application

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  13. Deterministic cryptanalysis of some stream ciphers

    Security in Information Systems - Proceedings of the 7th International Workshop on Security in Information Systems - WOSIS 2009 In Conjunction with ICEIS 2009

  14. El acceso de terceros a las redes de transporte y distribución de electricidad

    Tratado de regulación del sector eléctrico (Thomson Reuters Aranzadi), pp. 555-579

  15. El concepto de crisis económica en la historia de Canarias

    Hacienda Canaria, Núm. 29, pp. 85-104

  16. Exploring feasible and infeasible regions in the vehicle routing problem with time windows using a multi-objective particle swarm optimization approach

    Studies in Computational Intelligence

  17. Flexible authentication in vehicular Ad hoc networks

    2009 15th Asia-Pacific Conference on Communications, APCC 2009

  18. Fuzzy Optimization in Vehicle Routing Problems

    PROCEEDINGS OF THE JOINT 2009 INTERNATIONAL FUZZY SYSTEMS ASSOCIATION WORLD CONGRESS AND 2009 EUROPEAN SOCIETY OF FUZZY LOGIC AND TECHNOLOGY CONFERENCE

  19. Fuzzy optimization in vehicle routing problems

    2009 International Fuzzy Systems Association World Congress and 2009 European Society for Fuzzy Logic and Technology Conference, IFSA-EUSFLAT 2009 - Proceedings

  20. Google Web Tolkit (G.W.T.)

    Sólo programadores, Núm. 175, pp. 48-57