Sciweavers

1509 search results - page 274 / 302
» Computational Evolutionary Embryogeny
Sort
View
JDCTA
2010
175views more  JDCTA 2010»
13 years 3 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
TNN
2010
174views Management» more  TNN 2010»
13 years 3 months ago
Equivalences between neural-autoregressive time series models and fuzzy systems
Soft computing (SC) emerged as an integrating framework for a number of techniques that could complement one another quite well (artificial neural networks, fuzzy systems, evolutio...
José Luis Aznarte, José Manuel Ben&i...
ICST
2011
IEEE
13 years 6 days ago
It is Not the Length That Matters, It is How You Control It
—The length of test cases is a little investigated topic in search-based test generation for object oriented software, where test cases are sequences of method calls. While intui...
Gordon Fraser, Andrea Arcuri
GECCO
1999
Springer
111views Optimization» more  GECCO 1999»
14 years 23 days ago
Evolving a behavior-based control architecture- From simulations to the real world
Genetic programming makes it possible to automatically search the space of possible programs. First we evolved a behavior-based control architecture using computer simulations. Th...
Marc Ebner, Andreas Zell
RECOMB
2005
Springer
14 years 8 months ago
Improved Recombination Lower Bounds for Haplotype Data
Recombination is an important evolutionary mechanism responsible for the genetic diversity in humans and other organisms. Recently, there has been extensive research on understandi...
Vineet Bafna, Vikas Bansal