Artículos (16) Publicaciones en las que ha participado algún/a investigador/a

1999

  1. Abelian extensions of Leibniz algebras

    Communications in Algebra, Vol. 27, Núm. 6, pp. 2833-2846

  2. Applying statistical, uncertainty-based and connectionist approaches to the prediction of fetal outcome: A comparative study

    Artificial Intelligence in Medicine, Vol. 17, Núm. 1, pp. 37-57

  3. Bipartite embeddings of trees in the plane

    Discrete Applied Mathematics, Vol. 93, Núm. 2-3, pp. 141-148

  4. Building a chemical ontology using methontology and the ontology design environment

    IEEE Intelligent Systems and Their Applications, Vol. 14, Núm. 1, pp. 37-46

  5. Computing roundness is easy if the set is almost round

    Proceedings of the Annual Symposium on Computational Geometry, pp. 307-315

  6. Derivations of crossed modules

    Extracta mathematicae, Vol. 14, Núm. 1, pp. 63-68

  7. Discrete-time backpropagation for training synaptic delay-based artificial neural networks

    IEEE Transactions on Neural Networks, Vol. 10, Núm. 4, pp. 779-789

  8. Drawing nice projections of objects in space

    Journal of Visual Communication and Image Representation, Vol. 10, Núm. 2, pp. 155-172

  9. Epistasis and unitation

    Computers and Artificial Intelligence, Vol. 18, Núm. 5, pp. 467-483

  10. Epistasis and unitation

    COMPUTERS AND ARTIFICIAL INTELLIGENCE, Vol. 18, Núm. 5, pp. 467-483

  11. Firewalls (I): conceptos teóricos

    Linux Actual: la primera revista en castellano del sistema operativo Gnu/Linux, Año 1, Núm. 8, pp. 43-47

  12. Firewalls (II): Tis firewall toolkit

    Linux Actual: la primera revista en castellano del sistema operativo Gnu/Linux, Año 1, Núm. 9, pp. 74-79

  13. Nuevos algoritmos tabulares para el análisis de LIG

    Procesamiento del lenguaje natural, Núm. 25, pp. 7-14

  14. Performance evaluation of a multithreaded RTS using a synchronous reactive model

    Control Engineering Practice, Vol. 7, Núm. 12, pp. 1533-1539

  15. Structural tolerance and Delaunay triangulation

    Information Processing Letters, Vol. 71, Núm. 5, pp. 221-227

  16. Transparent checkpointing protocol for Posix.1b applications

    Journal of Systems Architecture, Vol. 45, Núm. 9, pp. 709-730