Sciweavers

GECCO
2009
Springer
164views Optimization» more  GECCO 2009»
13 years 8 months ago
Solving iterated functions using genetic programming
An iterated function f(x) is a function that when composed with itself, produces a given expression f(f(x))=g(x). Iterated functions are essential constructs in fractal theory and...
Michael D. Schmidt, Hod Lipson
GECCO
2009
Springer
192views Optimization» more  GECCO 2009»
13 years 8 months ago
Improving SMT performance: an application of genetic algorithms to configure resizable caches
Simultaneous Multithreading (SMT) is a technology aimed at improving the throughput of the processor core by applying Instruction Level Parallelism (ILP) and Thread Level Parallel...
Josefa Díaz, José Ignacio Hidalgo, F...
GECCO
2009
Springer
143views Optimization» more  GECCO 2009»
13 years 8 months ago
Coevolution of pattern generators and recognizers
Abstract. Proposed is an automatic system for creating pattern generators and recognizers that may provide new and human-independent insight into the pattern recognition problem. T...
Stewart W. Wilson
GECCO
2009
Springer
122views Optimization» more  GECCO 2009»
13 years 8 months ago
Evolutionary-based learning of generalised policies for AI planning domains
John Levine, C. Henrik Westerberg, Michelle Galea,...
GECCO
2009
Springer
174views Optimization» more  GECCO 2009»
13 years 8 months ago
Shape grammars and grammatical evolution for evolutionary design
We describe the first steps in the adoption of Shape Grammars with Grammatical Evolution for application in Evolutionary Design. Combining the concepts of Shape Grammars and Genet...
Michael O'Neill, John Mark Swafford, James McDermo...
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
13 years 8 months ago
Uncertainty handling CMA-ES for reinforcement learning
The covariance matrix adaptation evolution strategy (CMAES) has proven to be a powerful method for reinforcement learning (RL). Recently, the CMA-ES has been augmented with an ada...
Verena Heidrich-Meisner, Christian Igel
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
13 years 8 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
GECCO
2009
Springer
113views Optimization» more  GECCO 2009»
13 years 8 months ago
Single step evolution of robot controllers for sequential tasks
The generation of robot controllers for a task requiring a sequence of elementary behaviors is still a challenge. If these behaviors are known, intermediate steps can be given to ...
Stéphane Doncieux, Jean-Baptiste Mouret
GECCO
2009
Springer
150views Optimization» more  GECCO 2009»
13 years 8 months ago
Parallel shared memory strategies for ant-based optimization algorithms
This paper describes a general scheme to convert sequential ant-based algorithms into parallel shared memory algorithms. The scheme is applied to an ant-based algorithm for the ma...
Thang Nguyen Bui, ThanhVu H. Nguyen, Joseph R. Riz...