Firefly algorithm for continuous constrained optimization tasks S Łukasik, S Żak International conference on computational collective intelligence, 97-106, 2009 | 610 | 2009 |
Parameter tuning for the artificial bee colony algorithm B Akay, D Karaboga International Conference on Computational Collective Intelligence, 608-619, 2009 | 270 | 2009 |
A survey of ADAS technologies for the future perspective of sensor fusion A Ziebinski, R Cupek, H Erdogan, S Waechter International Conference on Computational Collective Intelligence, 135-146, 2016 | 187 | 2016 |
Overview of algorithms for swarm intelligence SC Chu, HC Huang, JF Roddick, JS Pan International Conference on Computational Collective Intelligence, 28-41, 2011 | 105 | 2011 |
Comparative analysis of premises valuation models using KEEL, RapidMiner, and WEKA M Graczyk, T Lasota, B Trawiński International conference on computational collective intelligence, 800-812, 2009 | 84 | 2009 |
From fuzzy cognitive maps to granular cognitive maps W Pedrycz, W Homenda International Conference on Computational Collective Intelligence, 185-193, 2012 | 75 | 2012 |
Detection of the bee queen presence using sound analysis T Cejrowski, J Szymański, H Mora, D Gil Asian Conference on Intelligent Information and Database Systems, 297-306, 2018 | 69 | 2018 |
Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions N Park International Conference on Computational Collective Intelligence, 488-496, 2011 | 61 | 2011 |
Ant colony decision trees–a new method for constructing decision trees based on ant colony optimization U Boryczka, J Kozak International Conference on Computational Collective Intelligence, 373-382, 2010 | 61 | 2010 |
Multidimensional social network: model and analysis P Kazienko, K Musial, E Kukla, T Kajdanowicz, P Bródka International Conference on Computational Collective Intelligence, 378-387, 2011 | 59 | 2011 |
Secure information splitting using grammar schemes MR Ogiela, U Ogiela New Challenges in Computational Collective Intelligence, 327-336, 2009 | 53 | 2009 |
Harmful adult multimedia contents filtering method in mobile RFID service environment N Park, Y Kim International Conference on Computational Collective Intelligence, 193-202, 2010 | 52 | 2010 |
Automatic Lexical Alignment between Syntactically Weak Related Languages. Application for English and Romanian M Colhon International Conference on Computational Collective Intelligence, 266-275, 2013 | 51 | 2013 |
AONT encryption based application data management in mobile RFID environment N Park, Y Song International Conference on Computational Collective Intelligence, 142-152, 2010 | 49 | 2010 |
A hybrid approach based on particle swarm optimization and random forests for e-mail spam filtering H Faris, I Aljarah, B Al-Shboul International Conference on Computational Collective Intelligence, 498-508, 2016 | 48 | 2016 |
Arabic sentiment analysis using BERT model H Chouikhi, H Chniter, F Jarray International Conference on Computational Collective Intelligence, 621-632, 2021 | 47 | 2021 |
A survey of twitter rumor spreading simulations E Serrano, CA Iglesias, M Garijo Computational Collective Intelligence, 113-122, 2015 | 47 | 2015 |
A study of CAPTCHA and its application to user authentication AB Jeng, CC Tseng, DF Tseng, JC Wang International Conference on Computational Collective Intelligence, 433-440, 2010 | 46 | 2010 |
Big data: Concepts, challenges and applications I Chebbi, W Boulila, IR Farah Computational collective intelligence, 638-647, 2015 | 44 | 2015 |
Using genetic algorithms for personalized recommendation CS Hwang, YC Su, KC Tseng International Conference on Computational Collective Intelligence, 104-112, 2010 | 44 | 2010 |