default search action
James F. Smith III
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2008
- [c28]James F. Smith III:
Co-evolving fuzzy decision trees and scenarios. IEEE Congress on Evolutionary Computation 2008: 3167-3176 - 2007
- [j1]James F. Smith III, ThanhVu H. Nguyen:
Autonomous and cooperative robotic behavior based on fuzzy logic and genetic programming. Integr. Comput. Aided Eng. 14(2): 141-159 (2007) - [c27]James F. Smith III:
Evolutionary data mining of digital logic and the effects of uncertainty. IEEE Congress on Evolutionary Computation 2007: 39-46 - [c26]James F. Smith III, ThanhVu H. Nguyen:
Genetic program based data mining of fuzzy decision trees and methods of improving convergence and reducing bloat. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007: 65700A - 2006
- [c25]James F. Smith III, ThanhVu H. Nguyen:
Genetic program based data mining to reverse engineer digital logic. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 624103 - [c24]James F. Smith III, ThanhVu H. Nguyen:
Fuzzy logic based UAV allocation and coordination. ICINCO-ICSO 2006: 9-18 - [c23]James F. Smith III, ThanhVu H. Nguyen:
Evolutionary data mining approach to creating digital logic. ICINCO-SPSMC 2006: 107-113 - [c22]James F. Smith III, ThanhVu H. Nguyen:
Guiding Genetic Program Based Data Mining Using Fuzzy Rules. IDEAL 2006: 1337-1345 - 2005
- [c21]James F. Smith III:
Fuzzy Logic Resource Manager: Fuzzy Rules and Experiments. AI*IA 2005: 564-575 - [c20]James F. Smith III, ThanhVu H. Nguyen:
Data-mining-based automated reverse engineering and defect discovery. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 232-242 - [c19]James F. Smith III:
Evolving fuzzy decision tree structure that adapts in real-time. GECCO 2005: 1737-1744 - [c18]James F. Smith III:
Fuzzy Logic Planning and Control for Cooperative Autonomous Teams of Robots. Computational Intelligence 2005: 12-18 - [c17]James F. Smith III:
Reverse Engineering through Genetic Program based Data Mining. Computational Intelligence 2005: 304-309 - 2004
- [c16]James F. Smith III:
Genetic Program Based Data Mining for Fuzzy Decision Trees. IDEAL 2004: 464-470 - [c15]James F. Smith III:
Automating Co-evolutionary Data Mining. IDEAL 2004: 471-477 - 2003
- [c14]James F. Smith III:
Automated Resource Manager for Group Security. Security and Management 2003: 303-309 - [c13]James F. Smith III, Joseph A. Blank:
Co-evolutionary data mining for fuzzy rules: automatic fitness function creation phase space, and experiments. Data Mining and Knowledge Discovery: Theory, Tools, and Technology 2003: 59-70 - [c12]James F. Smith III:
Feasibility of Genetic Algorithms for Music Composition. IC-AI 2003: 428-433 - [c11]James F. Smith III:
Data Mining for Rules for a Multi-Agent Decision Support Algorithm. IKE 2003: 529-532 - [c10]James F. Smith III:
Co-Evolutionary Data Mining to Deal with Adaptive Adversaries. MLMTA 2003: 3-9 - 2002
- [c9]James F. Smith III, Robert D. Rhyne II, Kristin Fisher:
Data mining for multiagent rules, strategies, and fuzzy decision tree structure. Data Mining and Knowledge Discovery: Theory, Tools, and Technology 2002: 386-397 - [c8]James F. Smith III:
Decision Support for Rule, Technique and strategy Discovery in a multi-agent Environment. IC-AI 2002: 291-294 - [c7]James F. Smith III:
Evolutionary Algorithm Based Data Mining for Fuzzy Rules. ICMLA 2002: 43-49 - [c6]James F. Smith III:
Data Mining for Fuzzy Decision Tree Structure with a Genetic Program. IDEAL 2002: 13-18 - [c5]James F. Smith III:
Co-evolutionary Data Mining to Discover Rules for Fuzzy Resource Management. IDEAL 2002: 19-24 - [c4]James F. Smith III:
Multi-agent Fuzzy Logic Resource Manager. IDEAL 2002: 231-236 - 2001
- [c3]James F. Smith III, Robert D. Rhyne II:
Knowledge discovery through games and game theory. Data Mining and Knowledge Discovery: Theory, Tools, and Technology 2001: 92-103 - 2000
- [c2]James F. Smith III, Robert D. Rhyne II:
Genetic-algorithm-based optimization of a fuzzy logic resource manager for electronic attack. Data Mining and Knowledge Discovery: Theory, Tools, and Technology 2000: 62-73
1990 – 1999
- 1999
- [c1]James F. Smith III, Robert D. Rhyne II:
A Resource Manager for Distributed Resources: Fuzzy Decision Trees and Genetic Optimization. IC-AI 1999: 669-675
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint