Sciweavers

9359 search results - page 124 / 1872
» Generalization Algorithms for Second-Order Terms
Sort
View
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
15 years 10 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
ATAL
2007
Springer
15 years 10 months ago
Multi-task overlapping coalition parallel formation algorithm
The issue of coalition formation has been investigated from many aspects, but until recently little attention has been paid to overlapping coalition formation. What’s more, an a...
Chao-Feng Lin, Shan-Li Hu
GECCO
2007
Springer
179views Optimization» more  GECCO 2007»
15 years 10 months ago
Evolutionary selection of minimum number of features for classification of gene expression data using genetic algorithms
Selecting the most relevant factors from genetic profiles that can optimally characterize cellular states is of crucial importance in identifying complex disease genes and biomark...
Alper Küçükural, Reyyan Yeniterzi...
GECCO
2007
Springer
138views Optimization» more  GECCO 2007»
15 years 10 months ago
A particle swarm algorithm for symbols detection in wideband spatial multiplexing systems
This paper explores the application of the particle swarm algorithm for a NP-hard problem in the area of wireless communications. The specific problem is of detecting symbols in a...
Adnan Ahmed Khan, Muhammad Naeem, Syed Ismail Shah
125
Voted
GECCO
2007
Springer
154views Optimization» more  GECCO 2007»
15 years 10 months ago
Finding critical backbone structures with genetic algorithms
This paper introduces the concept of a critical backbone as a minimal set of variables or part of the solution necessary to be within the basin of attraction of the global optimum...
Adam Prügel-Bennett