Sciweavers

2006 search results - page 278 / 402
» Heuristic Security-Testing Methods
Sort
View
GECCO
2009
Springer
133views Optimization» more  GECCO 2009»
14 years 2 months ago
Evolutionary codings and operators for the terminal assignment problem
Given a collection of terminals, each with a demand, a collection of concentrators, each with a capacity, and costs of connecting the terminals to the concentrators, the terminal ...
Bryant A. Julstrom
GECCO
2009
Springer
153views Optimization» more  GECCO 2009»
14 years 2 months ago
An evaporation mechanism for dynamic and noisy multimodal optimization
Dealing with imprecise information is a common characteristic in real-world problems. Specifically, when the source of the information are physical sensors, a level of noise in t...
Jose Luis Fernandez-Marquez, Josep Lluís Ar...
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
14 years 2 months ago
A data-based coding of candidate strings in the closest string problem
Given a set of strings S of equal lengths over an alphabet Σ, the closest string problem seeks a string over Σ whose maximum Hamming distance to any of the given strings is as s...
Bryant A. Julstrom
GECCO
2009
Springer
126views Optimization» more  GECCO 2009»
14 years 2 months ago
Improving NSGA-II with an adaptive mutation operator
The performance of a Multiobjective Evolutionary Algorithm (MOEA) is crucially dependent on the parameter setting of the operators. The most desired control of such parameters pre...
Arthur Gonçalves Carvalho, Aluizio F. R. Ar...
ICSE
2001
IEEE-ACM
14 years 2 months ago
Conceptual Modeling through Linguistic Analysis Using LIDA
Despite the advantages that object technology can provide to the software development community and its customers, the fundamental problems associated with identifying objects, th...
Scott P. Overmyer, Benoit Lavoie, Owen Rambow