Sciweavers

1623 search results - page 158 / 325
» No Sorting
Sort
View
161
Voted
ETRICS
2006
15 years 8 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
15 years 8 months ago
Rotated test problems for assessing the performance of multi-objective optimization algorithms
This paper presents four rotatable multi-objective test problems that are designed for testing EMO (Evolutionary Multiobjective Optimization) algorithms on their ability in dealin...
Antony W. Iorio, Xiaodong Li
143
Voted
GECCO
2006
Springer
134views Optimization» more  GECCO 2006»
15 years 8 months ago
Incorporating directional information within a differential evolution algorithm for multi-objective optimization
The field of Differential Evolution (DE) has demonstrated important advantages in single objective optimization. To date, no previous research has explored how the unique characte...
Antony W. Iorio, Xiaodong Li
GECCO
2006
Springer
171views Optimization» more  GECCO 2006»
15 years 8 months ago
A hybrid genetic search for multiple sequence alignment
This paper proposes a hybrid genetic algorithm for multiple sequence alignment. The algorithm evolves guide sequences and aligns input sequences based on the guide sequences. It a...
Seung-Hyun Moon, Sung-Soon Choi, Byung Ro Moon
GECCO
2006
Springer
332views Optimization» more  GECCO 2006»
15 years 8 months ago
Multi-objective PID-controller tuning for a magnetic levitation system using NSGA-II
This paper investigates the issue of PID-controller parameter tuning for a magnetic levitation system using the nondominated sorting genetic algorithm (NSGA-II). The magnetic levi...
Gerulf K. M. Pedersen, Zhenyu Yang