Sciweavers

3038 search results - page 134 / 608
» Industrial evolutionary computing
Sort
View
109
Voted
IJNSEC
2007
119views more  IJNSEC 2007»
15 years 3 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
ICARIS
2007
Springer
15 years 9 months ago
Immune and Evolutionary Approaches to Software Mutation Testing
We present an Immune Inspired Algorithm, based on CLONALG, for software test data evolution. Generated tests are evaluated using the mutation testing adequacy criteria, and used to...
Peter May, Jon Timmis, Keith Mander
149
Voted
GECCO
2004
Springer
120views Optimization» more  GECCO 2004»
15 years 8 months ago
Comparison of Selection Strategies for Evolutionary Quantum Circuit Design
Evolution of quantum circuits faces two major challenges: complex and huge search spaces and the high costs of simulating quantum circuits on conventional computers. In this paper ...
André Leier, Wolfgang Banzhaf
114
Voted
GECCO
2000
Springer
121views Optimization» more  GECCO 2000»
15 years 7 months ago
Metaphor for learning: an evolutionary algorithm
The organizational algorithm is examined as a computational approach to representing interpersonal learning. The structure of the algorithm is introduced and described in context ...
Jody Lee Louse, Alexander Kain, James Hines
115
Voted
BMCBI
2008
176views more  BMCBI 2008»
15 years 3 months ago
H2r: Identification of evolutionary important residues by means of an entropy based analysis of multiple sequence alignments
Background: A multiple sequence alignment (MSA) generated for a protein can be used to characterise residues by means of a statistical analysis of single columns. In addition to t...
Rainer Merkl, Matthias Zwick