Sciweavers

CEC
2008
IEEE
14 years 2 months ago
Coevolving strategic intelligence
— Strategic decision making done in parallel with the opposition makes it difficult to predict the opposition’s strategy. An important aspect in deciding a move is evaluating ...
Phillipa M. Avery, Garrison W. Greenwood, Zbigniew...
CEC
2008
IEEE
14 years 2 months ago
New evaluation criteria for the convergence of continuous evolutionary algorithms
—The first hitting time (FHT) plays an important role in convergence evaluation for evolutionary algorithms. However, the current criteria of the FHT are mostly under a hypothesi...
Ying Lin, Jian Huang, Jun Zhang
CEC
2008
IEEE
14 years 2 months ago
Evolving GeneChip correlation predictors on parallel graphics hardware
—A GPU is used to datamine five million correlations between probes within Affymetrix HG-U133A probesets across 6685 human tissue samples from NCBI’s GEO database. These conco...
William B. Langdon
CEC
2008
IEEE
14 years 2 months ago
A contour method in population-based stochastic algorithms
—Inspired by the contours in topography, this paper proposes a contour method for the population-based stochastic algorithms to solve the problems with continuous variables. Rely...
Ying Lin, Jun Zhang, Lu-kai Lan
CEC
2008
IEEE
14 years 2 months ago
A comparative study of the effect of parameter scalability in multi-objective metaheuristics
Abstract—Some real-world optimization problems have hundreds or even thousands of decision variables. However, the effect that the scalability of parameters has in modern multiob...
Juan José Durillo, Antonio J. Nebro, Carlos...
CEC
2008
IEEE
14 years 2 months ago
An investigation on evolutionary gradient search for multi-objective optimization
—Evolutionary gradient search is a hybrid algorithm that exploits the complementary features of gradient search and evolutionary algorithm to achieve a level of efficiency and r...
Chi Keong Goh, Yew-Soon Ong, Kay Chen Tan, Eu Jin ...
CEC
2008
IEEE
14 years 2 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
CEC
2008
IEEE
14 years 2 months ago
A multi-agent based evolutionary algorithm in non-stationary environments
— In this paper, a multi-agent based evolutionary algorithm (MAEA) is introduced to solve dynamic optimization problems. The agents simulate living organism features and co-evolv...
Yang Yan, Hongfeng Wang, Dingwei Wang, Shengxiang ...
CEC
2008
IEEE
14 years 2 months ago
Auto-tuning fuzzy granulation for evolutionary optimization
—Much of the computational complexity in employing evolutionary algorithms as optimization tool is due to the fitness function evaluation that may either not exist or be computat...
Mohsen Davarynejad, Mohammad R. Akbarzadeh-Totonch...