Sciweavers

5289 search results - page 114 / 1058
» Evolutionary Computation for Modeling and Optimization
Sort
View
116
Voted
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
15 years 10 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon
EVOW
2001
Springer
15 years 9 months ago
An Evolutionary Algorithm with Stochastic Hill-Climbing for the Edge-Biconnectivity Augmentation Problem
Augmenting an existing network with additional links to achieve higher robustness and survivability plays an important role in network design. We consider the problem of augmenting...
Ivana Ljubic, Günther R. Raidl
SEAL
1998
Springer
15 years 8 months ago
Evolutionary Programming-Based Uni-vector Field Method for Fast Mobile Robot Navigation
Most of the obstacle avoidance techniques do not consider the robot orientation or its nal angle at the target position. These techniques deal with the robot position only and are ...
Yong-Jae Kim, Dong-Han Kim, Jong-Hwan Kim
CEC
2003
IEEE
15 years 8 months ago
A modified ant colony algorithm for evolutionary design of digital circuits
Evolutionary computation presents a new paradigm shift in hardware design and synthesis. According to this paradigm, hardware design is pursued by deriving inspiration from biologi...
Mostafa Abd-El-Barr, Sadiq M. Sait, Bambang A. B. ...
123
Voted
GECCO
2007
Springer
180views Optimization» more  GECCO 2007»
15 years 10 months ago
Exploiting multiple robots to accelerate self-modeling
In previous work [8] a computational framework was demonstrated that allows a mobile robot to autonomously evolve models its own body for the purposes of adaptive behavior generat...
Josh C. Bongard