Sciweavers

548 search results - page 79 / 110
» Using the Genetic Algorithm to Find Snake-in-the-Box Codes
Sort
View
GECCO
2008
Springer
148views Optimization» more  GECCO 2008»
13 years 8 months ago
Using quotient graphs to model neutrality in evolutionary search
We introduce quotient graphs for modeling neutrality in evolutionary search. We demonstrate that for a variety of evolutionary computing problems, search can be characterized by g...
Dominic Wilson, Devinder Kaur
ICSE
2008
IEEE-ACM
14 years 8 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
CSB
2003
IEEE
113views Bioinformatics» more  CSB 2003»
14 years 1 months ago
An Optimal DNA Segmentation Based on the MDL Principle
: The biological world is highly stochastic and inhomogeneous in its behaviour. There are regions in DNA with high concentration of G or C bases; stretches of sequences with an abu...
Wojciech Szpankowski, Wenhui Ren, Lukasz Szpankows...
PPSN
2004
Springer
14 years 1 months ago
An Evolutionary Approach to Modeling Radial Brightness Distributions in Elliptical Galaxies
A reasonably good description of the luminosity profiles of galaxies is needed as it serves as a guide towards understanding the process of galaxy formation and evolution. To obtai...
Jin Li, Xin Yao, Colin Frayn, Habib G. Khosroshahi...
CORR
2008
Springer
77views Education» more  CORR 2008»
13 years 7 months ago
Optimal hash functions for approximate closest pairs on the n-cube
One way to find closest pairs in large datasets is to use hash functions [6], [12]. In recent years locality-sensitive hash functions for various metrics have been given: projecti...
Daniel M. Gordon, Victor Miller, Peter Ostapenko