Sciweavers

3038 search results - page 138 / 608
» Industrial evolutionary computing
Sort
View
102
Voted
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
15 years 9 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon
ROBIO
2006
IEEE
123views Robotics» more  ROBIO 2006»
15 years 9 months ago
Evolutionary Robotics, Anticipation and the Reality Gap
— Evolutionary Robotics provide efficient tools and approach to address automatic design of controllers for automous mobile robots. However, the computational cost of the optimi...
Cédric Hartland, Nicolas Bredeche
115
Voted
CEC
2005
IEEE
15 years 9 months ago
A hybrid model of evolutionary algorithms and branch-and-bound for combinatorial optimization problems
Abstract- Branch-and-Bound and evolutionary algorithms represent two very different approaches for tackling combinatorial optimization problems. These approaches are not incompatib...
José E. Gallardo, Carlos Cotta, Antonio J. ...
99
Voted
CEC
2005
IEEE
15 years 9 months ago
Two-layered face detection system using evolutionary algorithm
This paper proposes a novel face detection method based on Principal Component Analysis (PCA) and Evolutionary Algorithm (EA). In a view-based approach to face detection, the face ...
Jun-Su Jang, Jong-Hwan Kim
114
Voted
RISE
2005
Springer
15 years 9 months ago
Software Testing with Evolutionary Strategies
Abstract. This paper applies the Evolutionary Strategy (ES) metaheuristic to the automatic test data generation problem. The problem consists in creating automatically a set of inp...
Enrique Alba, J. Francisco Chicano