The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for destructiveness with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2005-2022 (13)
Publication types (Num. hits)
article(5) inproceedings(8)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 9 occurrences of 9 keywords

Results
Found 13 publication records. Showing 13 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
170Luke Sheneman, James A. Foster Estimating the destructiveness of crossover on binary tree representations. Search on Bibsonomy GECCO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF destructiveness, robinson-foulds, trees, crossover
35Tapani Rinta-Kahila, Ida Asadi Someh, Nicole M. Gillespie, Marta Indulska, Shirley Gregor Algorithmic decision-making and system destructiveness: A case of automatic debt recovery. Search on Bibsonomy Eur. J. Inf. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
35Timo Kötzing, J. A. Gregor Lagodzinski, Johannes Lengler, Anna Melnichenko Destructiveness of lexicographic parsimony pressure and alleviation by a concatenation crossover in genetic programming. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
35Timo Kötzing, J. A. Gregor Lagodzinski, Johannes Lengler, Anna Melnichenko Destructiveness of Lexicographic Parsimony Pressure and Alleviation by a Concatenation Crossover in Genetic Programming. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
35Timo Kötzing, J. A. Gregor Lagodzinski, Johannes Lengler, Anna Melnichenko Destructiveness of Lexicographic Parsimony Pressure and Alleviation by a Concatenation Crossover in Genetic Programming. Search on Bibsonomy PPSN (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
35Chi Lin 0001, Guowei Wu, Chang-Wu Yu 0001, Lin Yao 0001 Maximizing destructiveness of node capture attack in wireless sensor networks. Search on Bibsonomy J. Supercomput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
35Chi Lin 0001, Guowei Wu, Xiaochen Lai, Tie Qiu 0001 Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks. Search on Bibsonomy ICA3PP (3) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
35John Riedl Altruism, Selfishness, and Destructiveness on the Social Web. Search on Bibsonomy AH The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25András Joó Mining Evolving Learning Algorithms. Search on Bibsonomy EuroGP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Genetic programming, perceptron, tree mining, learning rule
25Huayang Xie, Mengjie Zhang 0001, Peter Andreae An analysis of depth of crossover points in tree-based Genetic Programming. Search on Bibsonomy IEEE Congress on Evolutionary Computation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Hammad Majeed, Conor Ryan A Less Destructive, Context-Aware Crossover Operator for GP. Search on Bibsonomy EuroGP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Scott Borg Economically Complex Cyberattacks. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cyberdefense, security, cybersecurity, cyberattack
25Juan Du, Sheng-Li Xie, Ying-Lin Yu Quality assessment based on noise influencing force. Search on Bibsonomy ICIP (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #13 of 13 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license