共 22 条
- [1] [Anonymous], 2012, INT J COMPUTER APPL
- [2] Elhardt N., 2006, WIKIPEDIA FREE E
- [3] Venus Flytrap Optimization [J]. COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 519 - 531
- [4] Biclustering Using Venus Flytrap Optimization Algorithm [J]. COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 1, CIDM 2015, 2016, 410 : 199 - 207
- [5] Goyal P., 2010, INT J COMPUTER APPL, V9, P11, DOI DOI 10.5120/1439-1947
- [7] Hayati Pedram, 2009, 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies (DEST), P290, DOI 10.1109/DEST.2009.5276764
- [8] Ingham KennethStephanie Forrest., 2002, HIST SURVEY NETWORK
- [9] Khosravifar Babak, 2008, 2008 22nd International Conference on Advanced Information Networking and Applications - Workshops, P997, DOI 10.1109/AINA.2008.44
- [10] Kulkarni S, 2012, INT CONF INTERNET, P743