Sciweavers

738 search results - page 126 / 148
» Crossover can provably be useful in evolutionary computation
Sort
View
ASIACRYPT
2001
Springer
15 years 1 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
GPEM
2008
98views more  GPEM 2008»
14 years 9 months ago
Sporadic model building for efficiency enhancement of the hierarchical BOA
Efficiency enhancement techniques--such as parallelization and hybridization--are among the most important ingredients of practical applications of genetic and evolutionary algori...
Martin Pelikan, Kumara Sastry, David E. Goldberg
BMCBI
2006
159views more  BMCBI 2006»
14 years 9 months ago
EVEREST: automatic identification and classification of protein domains in all protein sequences
Background: Proteins are comprised of one or several building blocks, known as domains. Such domains can be classified into families according to their evolutionary origin. Wherea...
Elon Portugaly, Amir Harel, Nathan Linial, Michal ...
86
Voted
GECCO
2009
Springer
142views Optimization» more  GECCO 2009»
15 years 4 months ago
A stopping criterion based on Kalman estimation techniques with several progress indicators
The need for a stopping criterion in MOEA’s is a repeatedly mentioned matter in the domain of MOOP’s, even though it is usually left aside as secondary, while stopping criteri...
José Luis Guerrero, Jesús Garc&iacut...
GECCO
2007
Springer
161views Optimization» more  GECCO 2007»
15 years 3 months ago
Alternative techniques to solve hard multi-objective optimization problems
In this paper, we propose the combination of different optimization techniques in order to solve “hard” two- and threeobjective optimization problems at a relatively low comp...
Ricardo Landa Becerra, Carlos A. Coello Coello, Al...