Sciweavers

738 search results - page 35 / 148
» Crossover can provably be useful in evolutionary computation
Sort
View
70
Voted
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 3 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
EUROGP
2007
Springer
143views Optimization» more  EUROGP 2007»
15 years 1 months ago
Confidence Intervals for Computational Effort Comparisons
Abstract. When researchers make alterations to the genetic programming algorithm they almost invariably wish to measure the change in performance of the evolutionary system. No one...
Matthew Walker, Howard Edwards, Chris H. Messom
BIB
2008
109views more  BIB 2008»
14 years 9 months ago
Computational intelligence approaches for pattern discovery in biological systems
Biology, chemistry and medicine are faced by tremendous challenges caused by an overwhelming amount of data and the need for rapid interpretation. Computational intelligence (CI) ...
Gary B. Fogel
63
Voted
GECCO
2005
Springer
15 years 3 months ago
A theoretical analysis of the HIFF problem
We present a theoretical analysis of Watson’s Hierarchicalif-and-only-if (HIFF) problem using a variety of tools. These include schema theory and course graining, the concept of...
Nicholas Freitag McPhee, Ellery Fussell Crane
ICPP
1996
IEEE
15 years 1 months ago
On the Scalability of 2-D Wavelet Transform Algorithms on Fine-grained Parallel Machines
: We study the scalability of 2-D discrete wavelet transform algorithms on fine-grained parallel architectures. The principal operation in the 2-D DWT is the filtering operation us...
Jamshed N. Patel, Ashfaq A. Khokhar, Leah H. Jamie...