Sciweavers

105 search results - page 2 / 21
» Secure-system design methods: evolution and future direction...
Sort
View
GECCO
2005
Springer
129views Optimization» more  GECCO 2005»
14 years 1 months ago
Morphing methods in evolutionary design optimization
Design optimization is a well established application field of evolutionary computation. However, standard recombination operators acting on the genotypic representation of the d...
Michael Nashvili, Markus Olhofer, Bernhard Sendhof...
ISPD
2003
ACM
73views Hardware» more  ISPD 2003»
14 years 22 days ago
Research directions for coevolution of rules and routers
Design rules in advanced IC manufacturing processes are increasingly problematic for modern router architectures and algorithms. This paper first reviews types and causes of “d...
Andrew B. Kahng
IH
2004
Springer
14 years 26 days ago
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes
In this paper, we introduce a new feature-based steganalytic method for JPEG images and use it as a benchmark for comparing JPEG steganographic algorithms and evaluating their embe...
Jessica J. Fridrich
PRICAI
2004
Springer
14 years 25 days ago
Creative 3D Designs Using Interactive Genetic Algorithm with Structured Directed Graph
We propose a methodology for representing artificial creatures like 3D flowers. Directed graph and Lindenmayer system (L-system) are commonly involved in AI-based creativity resear...
Hyeun-Jeong Min, Sung-Bae Cho
CEC
2007
IEEE
14 years 1 months ago
Graph design by graph grammar evolution
— Determining the optimal topology of a graph is pertinent to many domains, as graphs can be used to model a variety of systems. Evolutionary algorithms constitute a popular opti...
Martin H. Luerssen, David M. W. Powers