Bio-inspired Information and Communication Technologies: 11th EAI International Conference, BICT 2019, Pittsburgh, PA, USA, March 13–14, 2019, Proceedings
暂无分享,去创建一个
Alan Oliveira de Sá | Luiz Fernando Rust da Costa Carmo | António Casimiro | Raphael Carlos Santos Machado
[1] Kenneth Sörensen,et al. Permutation distance measures for memetic algorithms with population management , 2005 .
[2] S. Shankland,et al. A suPAR circulating factor causes kidney disease , 2011, Nature Medicine.
[3] Qingfu Zhang,et al. Stable Matching-Based Selection in Evolutionary Multiobjective Optimization , 2014, IEEE Transactions on Evolutionary Computation.
[4] Adam Prügel-Bennett,et al. On the Landscape of Combinatorial Optimization Problems , 2014, IEEE Transactions on Evolutionary Computation.
[5] John F. Bertram,et al. Glomerular Endothelial Cell Injury and Damage Precedes That of Podocytes in Adriamycin-Induced Nephropathy , 2013, PloS one.
[6] Jenna Wiens,et al. A study in transfer learning: leveraging data from multiple hospitals to enhance hospital-specific predictions , 2014, J. Am. Medical Informatics Assoc..
[7] Stratis Ioannidis,et al. Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.
[8] S. Ronald. Distance functions for order-based encodings , 1997, Proceedings of 1997 IEEE International Conference on Evolutionary Computation (ICEC '97).
[9] Hiroyuki Sato,et al. Analysis of inverted PBI and comparison with other scalarizing functions in decomposition based MOEAs , 2015, J. Heuristics.
[10] Lennart Ljung,et al. System Identification: Theory for the User , 1987 .
[11] Beata Strack,et al. Impact of HbA1c Measurement on Hospital Readmission Rates: Analysis of 70,000 Clinical Database Patient Records , 2014, BioMed research international.
[12] C. Y. Lee,et al. Some properties of nonbinary error-correcting codes , 1958, IRE Trans. Inf. Theory.
[13] T. Poggio,et al. The Mathematics of Learning: Dealing with Data , 2005, 2005 International Conference on Neural Networks and Brain.
[14] Wei Zhang,et al. Encrypted SVM for Outsourced Data Mining , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[15] H. Heerspink,et al. Glomerular Hyperfiltration in Diabetes: Mechanisms, Clinical Significance, and Treatment. , 2017, Journal of the American Society of Nephrology : JASN.
[16] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[17] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[18] Kalyanmoy Deb,et al. An Evolutionary Many-Objective Optimization Algorithm Using Reference-Point-Based Nondominated Sorting Approach, Part I: Solving Problems With Box Constraints , 2014, IEEE Transactions on Evolutionary Computation.
[19] Tobias B Huber,et al. New Insights into Podocyte Biology in Glomerular Health and Disease. , 2017, Journal of the American Society of Nephrology : JASN.
[20] Michael J. Fischer,et al. The String-to-String Correction Problem , 1974, JACM.
[21] S. Ronald. Finding multiple solutions with an evolutionary algorithm , 1995, Proceedings of 1995 IEEE International Conference on Evolutionary Computation.
[22] G. Ghiggeri,et al. Electrical charge of serum and urinary albumin in normal and diabetic humans. , 1985, Kidney international.
[23] Jiang Siwei,et al. Multiobjective optimization by decomposition with Pareto-adaptive weight vectors , 2011, 2011 Seventh International Conference on Natural Computation.
[24] R. Lyndon While,et al. A review of multiobjective test problems and a scalable test problem toolkit , 2006, IEEE Transactions on Evolutionary Computation.
[25] Andreas S. Weigend,et al. Multi-Channel Physiological Data: Description and Analysis (Data Set B) , 2018 .
[26] Nish Chaturvedi,et al. Albumin excretion rate and cardiovascular risk: could the association be explained by early microvascular dysfunction? , 2005, Diabetes.
[27] Vladimir I. Levenshtein,et al. Binary codes capable of correcting deletions, insertions, and reversals , 1965 .
[28] Qingfu Zhang,et al. MOEA/D: A Multiobjective Evolutionary Algorithm Based on Decomposition , 2007, IEEE Transactions on Evolutionary Computation.
[29] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[30] Max A. Little,et al. Accurate Telemonitoring of Parkinson's Disease Progression by Noninvasive Speech Tests , 2009, IEEE Transactions on Biomedical Engineering.
[31] Marina Meila,et al. An Exponential Model for Infinite Rankings , 2010, J. Mach. Learn. Res..
[32] Jianqiang Li,et al. A hybrid solution for privacy preserving medical data sharing in the cloud environment , 2015, Future Gener. Comput. Syst..
[33] S. Ronald,et al. More distance functions for order-based encodings , 1998, 1998 IEEE International Conference on Evolutionary Computation Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98TH8360).
[34] Jochen Reiser. Akt2 relaxes podocytes in chronic kidney disease , 2013, Nature Medicine.
[35] Kenneth Sörensen,et al. Distance measures based on the edit distance for permutation-type representations , 2007, J. Heuristics.
[36] Thomas Stützle,et al. A review of metrics on permutations for search landscape analysis , 2007, Comput. Oper. Res..
[37] Gary B. Lamont,et al. Evolutionary Algorithms for Solving Multi-Objective Problems , 2002, Genetic Algorithms and Evolutionary Computation.
[38] Isao Ono,et al. 多目的連続関数最適化の解法 Adaptive Weighted Aggregation の終了条件に関する一考察 On the Stopping Criterion of Adaptive Weighted Aggregation for Multiobjective Continuous Optimization 濱田 直希 , 2013 .
[39] Anand D. Sarwate,et al. Signal Processing and Machine Learning with Differential Privacy: Algorithms and Challenges for Continuous Data , 2013, IEEE Signal Processing Magazine.