Sciweavers

732 search results - page 88 / 147
» Critical control of a genetic algorithm
Sort
View
117
Voted
GECCO
2008
Springer
186views Optimization» more  GECCO 2008»
15 years 1 months ago
A pareto following variation operator for fast-converging multiobjective evolutionary algorithms
One of the major difficulties when applying Multiobjective Evolutionary Algorithms (MOEA) to real world problems is the large number of objective function evaluations. Approximate...
A. K. M. Khaled Ahsan Talukder, Michael Kirley, Ra...
88
Voted
BMCBI
2007
117views more  BMCBI 2007»
15 years 19 days ago
DNA-based watermarks using the DNA-Crypt algorithm
Background: The aim of this paper is to demonstrate the application of watermarks based on DNA sequences to identify the unauthorized use of genetically modified organisms (GMOs) ...
Dominik Heider, Angelika Barnekow
129
Voted
KDD
2008
ACM
181views Data Mining» more  KDD 2008»
16 years 28 days ago
Fastanova: an efficient algorithm for genome-wide association study
Studying the association between quantitative phenotype (such as height or weight) and single nucleotide polymorphisms (SNPs) is an important problem in biology. To understand und...
Xiang Zhang, Fei Zou, Wei Wang 0010
95
Voted
BMCBI
2007
137views more  BMCBI 2007»
15 years 19 days ago
GEVALT: An integrated software tool for genotype analysis
Background: Genotype information generated by individual and international efforts carries the promise of revolutionizing disease studies and the association of phenotypes with al...
Ofir Davidovich, Gad Kimmel, Ron Shamir
100
Voted
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
15 years 7 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq