Sciweavers

2006 search results - page 314 / 402
» Heuristic Security-Testing Methods
Sort
View
ER
2007
Springer
80views Database» more  ER 2007»
14 years 3 months ago
From Declarative to Imperative UML/OCL Operation Specifications
An information system maintains a representation of the state of the domain in its Information Base (IB). The state of the IB changes due to the execution of the operations defined...
Jordi Cabot
GECCO
2007
Springer
151views Optimization» more  GECCO 2007»
14 years 3 months ago
A building-block royal road where crossover is provably essential
One of the most controversial yet enduring hypotheses about what genetic algorithms (GAs) are good for concerns the idea that GAs process building-blocks. More specifically, it ha...
Richard A. Watson, Thomas Jansen
GECCO
2007
Springer
154views Optimization» more  GECCO 2007»
14 years 3 months ago
Finding critical backbone structures with genetic algorithms
This paper introduces the concept of a critical backbone as a minimal set of variables or part of the solution necessary to be within the basin of attraction of the global optimum...
Adam Prügel-Bennett
GECCO
2007
Springer
153views Optimization» more  GECCO 2007»
14 years 3 months ago
Parallel genetic algorithm: assessment of performance in multidimensional scaling
Visualization of multidimensional data by means of Multidimensional Scaling (MDS) is a popular technique of exploratory data analysis widely usable, e.g. in analysis of bio-medica...
Antanas Zilinskas, Julius Zilinskas
GECCO
2007
Springer
276views Optimization» more  GECCO 2007»
14 years 3 months ago
Meta-optimizing semantic evolutionary search
I present MOSES (meta-optimizing semantic evolutionary search), a new probabilistic modeling (estimation of distribution) approach to program evolution. Distributions are not esti...
Moshe Looks