Your selections:
An application of novel clustering technique for information security
- Beliakov, Gleb, Yearwood, John, Kelarev, Andrei
Application of rank correlation, clustering and classification in information security
- Beliakov, Gleb, Yearwood, John, Kelarev, Andrei
Derivative-free optimization and neural networks for robust regression
- Beliakov, Gleb, Kelarev, Andrei, Yearwood, John
Detecting K-complexes for sleep stage identification using nonsmooth optimization
- Moloney, David, Sukhorukova, Nadezda, Vamplew, Peter, Ugon, Julien, Li, Gang, Beliakov, Gleb, Philippe, Carole, Amiel, Hélène, Ugon, Adrien
Global optimization : Cutting angle method
- Bagirov, Adil, Beliakov, Gleb
Implementation of novel methods of global and nonsmooth optimization : GANSO programming library
- Beliakov, Gleb, Ugon, Julien
K-complex detection using a hybrid-synergic machine learning method
- Vu, Huy Quan, Li, Gang, Sukhorukova, Nadezda, Beliakov, Gleb, Liu, Shaowu, Philippe, Carole, Amiel, Hélène, Ugon, Adrien
Non-smooth optimization methods for computation of the conditional value-at-risk and portfolio optimization
- Beliakov, Gleb, Bagirov, Adil
Parallelization of the discrete gradient method of non-smooth optimization and its applications
- Beliakov, Gleb, Tobon, Monsalve, Bagirov, Adil
Performance evaluation of multi-tier ensemble classifiers for phishing websites
- Abawajy, Jemal, Beliakov, Gleb, Kelarev, Andrei, Yearwood, John
Solving DC programs using the cutting angle method
- Ferrer, Albert, Bagirov, Adil, Beliakov, Gleb
- Bagirov, Adil, Beliakov, Gleb
Are you sure you would like to clear your session, including search history and login status?