Evaluating player strategies in the design of a hot hand game
- Williams, Paul, Nesbitt, Keith, Eidels, Ami, Washburn, Mark, Cornforth, David
Quality assessment of clusters of electrical disturbances: a case study
- Cornforth, David, Nesbitt, Keith
Simulating stable, trending and turbulent operating environments
- Blackmore, Karen, Nesbitt, Keith, Cornforth, David
Fractal analysis in clinical screening and investigation
- Jelinek, Herbert F., Cornforth, David
- Jelinek, Herbert F., Milošević, Nebojša T., Ristanović, Dušan, Cornforth, David
- Cornforth, David, Jelinek, Herbert F.
Memetic algorithms for solving job-shop scheduling problems
- Hasan, S. M. Kamrul, Sarker, Ruhul, Essam, Daryl, Cornforth, David
An evaluation of API calls hooking performance
- Marhusin, Mohd Fadzli, Larkin, Henry, Lokan, Chris, Cornforth, David
An overview of recent advances in intrusion detection
- Marhusin, Mohd Fadzli, Cornforth, David, Larkin, Henry
Establishing normative data for peripheral arterial disease using pulse wave analysis
- Thompson, Lisa, Jelinek, Herbert, Cornforth, David
GA with priority rules for solving job-shop scheduling problems
- Hasan, S. M. Kamrul, Sarker, Ruhul, Cornforth, David
Malicious code detection architecture inspired by human immune system
- Marhusin, Mohd Fadzli, Cornforth, David, Larkin, Henry
Search space reduction technique for constrained optimization with tiny feasible space
- Ullah, Abu S. S. M. Barkat, Sarker, Ruhul, Cornforth, David
Are you sure you would like to clear your session, including search history and login status?