Sciweavers

Share
GECCO
2005
Springer
128views Optimization» more  GECCO 2005»
10 years 5 months ago
Collaborative interactive evolution
Interactive evolutionary computation (IEC) has proven useful in a variety of applications by combining the subjective evaluation of a user with the massive parallel search power o...
Sean R. Szumlanski, Annie S. Wu, Charles E. Hughes
GECCO
2005
Springer
108views Optimization» more  GECCO 2005»
10 years 5 months ago
Hybridizing evolutionary algorithms and clustering algorithms to find source-code clones
This paper presents a hybrid approach to detect source-code clones that combines evolutionary algorithms and clustering. A case-study is conducted on a small C++ code base. The pr...
Andrew Sutton, Huzefa H. Kagdi, Jonathan I. Maleti...
GECCO
2005
Springer
228views Optimization» more  GECCO 2005»
10 years 5 months ago
Applying metaheuristic techniques to search the space of bidding strategies in combinatorial auctions
Many non-cooperative settings that could potentially be studied using game theory are characterized by having very large strategy spaces and payoffs that are costly to compute. Be...
Ashish Sureka, Peter R. Wurman
GECCO
2005
Springer
141views Optimization» more  GECCO 2005»
10 years 5 months ago
Behavior of finite population variable length genetic algorithms under random selection
In this work we provide empirical evidence that shows how a variable-length genetic algorithm (GA) can naturally evolve shorter average size populations. This reduction in chromos...
Hal Stringer, Annie S. Wu
GECCO
2005
Springer
103views Optimization» more  GECCO 2005»
10 years 5 months ago
Validation of evolutionary activity metrics for long-term evolutionary dynamics
As artificial life systems grow in number and sophistication, it is becoming increasingly important that the field agree on principled metrics for evaluating them. This report d...
Andrew Stout, Lee Spector
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
10 years 5 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...
GECCO
2005
Springer
114views Optimization» more  GECCO 2005»
10 years 5 months ago
Exploiting disruption aversion to control code bloat
The authors employ multiple crossovers as a novel natural extension to crossovers as a mixing operator. They use this as a framework to explore the ideas of code growth. Empirical...
Jason Stevens, Robert B. Heckendorn, Terence Soule
GECCO
2005
Springer
113views Optimization» more  GECCO 2005»
10 years 5 months ago
A multi-objective algorithm for DS-CDMA code design based on the clonal selection principle
This paper proposes a new algorithm based on the clonal selection principle for the design of spreading codes for DS-CDMA. The algorithm follows a multi-objective approach, genera...
Daniel Stevens, Sanjoy Das, Balasubramaniam Natara...
GECCO
2005
Springer
10 years 5 months ago
Predicting healthcare costs using GAs
Predicting prospective healthcare costs is of increasing importance. Genetic search is used to discover attribute sets and associated posterior probability classifiers that predi...
Christopher R. Stephens, Henri Waelbroeck, S. Tall...
books