Sciweavers

1248 search results - page 93 / 250
» The I Test
Sort
View
GECCO
2005
Springer
183views Optimization» more  GECCO 2005»
14 years 3 months ago
802.11 network intrusion detection using genetic programming
Genetic Programming (GP) based Intrusion Detection Systems (IDS) use connection state network data during their training phase. These connection states are recorded as a set of fe...
Patrick LaRoche, A. Nur Zincir-Heywood
GECCO
2005
Springer
101views Optimization» more  GECCO 2005»
14 years 3 months ago
Measuring mobility and the performance of global search algorithms
The global search properties of heuristic search algorithms are not well understood. In this paper, we introduce a new metric, mobility, that quantifies the dispersion of local o...
Monte Lunacek, L. Darrell Whitley, James N. Knight
GECCO
2005
Springer
228views Optimization» more  GECCO 2005»
14 years 3 months ago
An effective use of crowding distance in multiobjective particle swarm optimization
In this paper, we present an approach that extends the Particle Swarm Optimization (PSO) algorithm to handle multiobjective optimization problems by incorporating the mechanism of...
Carlo R. Raquel, Prospero C. Naval Jr.
GECCO
2005
Springer
14 years 3 months ago
Using gene deletion and gene duplication in evolution strategies
Self-adaptation of the mutation strengths is a powerful mechanism in evolution strategies (ES), but it can fail. As a consequence premature convergence or ending up in a local opt...
Karlheinz Schmitt
GECCO
2005
Springer
120views Optimization» more  GECCO 2005»
14 years 3 months ago
Using predators and preys in evolution strategies
This poster presents an evolution strategy for single- and multi-objective optimization. The model uses the predatorprey approach from ecology to scale between both cases. Further...
Karlheinz Schmitt, Jörn Mehnen, Thomas Michel...