Conference papers (8) Publications in which a researcher has participated

2014

  1. A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems

    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT)

  2. A domain-specific knowledge-based heuristic for the Blocks Relocation Problem

    Advanced Engineering Informatics

  3. A polynomial time attack against algebraic geometry code based public key cryptosystems

    IEEE International Symposium on Information Theory - Proceedings

  4. Decentralized cooperative metaheuristic for the dynamic berth allocation problem

    Proceedings of the 9th Workshop on Constraint Satisfaction Techniques for Planning and Scheduling Problems, COPLAS 2014

  5. Further developments with perturbation techniques to protect tabular data

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  6. On the asymmetric connected facility location polytope

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  7. Optimization Model and Heuristic Approach for Blocks Retrieval Processes in Warehouses

    TWENTY-FOURTH INTERNATIONAL CONFERENCE ON AUTOMATED PLANNING AND SCHEDULING

  8. Optimization model and heuristic approach for blocks retrieval processes in warehouses

    Proceedings International Conference on Automated Planning and Scheduling, ICAPS