|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 9 occurrences of 9 keywords
|
|
|
Results
Found 13 publication records. Showing 13 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
170 | Luke Sheneman, James A. Foster |
Estimating the destructiveness of crossover on binary tree representations. |
GECCO |
2006 |
DBLP DOI BibTeX RDF |
destructiveness, robinson-foulds, trees, crossover |
35 | Tapani Rinta-Kahila, Ida Asadi Someh, Nicole M. Gillespie, Marta Indulska, Shirley Gregor |
Algorithmic decision-making and system destructiveness: A case of automatic debt recovery. |
Eur. J. Inf. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
35 | Timo Kötzing, J. A. Gregor Lagodzinski, Johannes Lengler, Anna Melnichenko |
Destructiveness of lexicographic parsimony pressure and alleviation by a concatenation crossover in genetic programming. |
Theor. Comput. Sci. |
2020 |
DBLP DOI BibTeX RDF |
|
35 | Timo Kötzing, J. A. Gregor Lagodzinski, Johannes Lengler, Anna Melnichenko |
Destructiveness of Lexicographic Parsimony Pressure and Alleviation by a Concatenation Crossover in Genetic Programming. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
35 | Timo Kötzing, J. A. Gregor Lagodzinski, Johannes Lengler, Anna Melnichenko |
Destructiveness of Lexicographic Parsimony Pressure and Alleviation by a Concatenation Crossover in Genetic Programming. |
PPSN (2) |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Chi Lin 0001, Guowei Wu, Chang-Wu Yu 0001, Lin Yao 0001 |
Maximizing destructiveness of node capture attack in wireless sensor networks. |
J. Supercomput. |
2015 |
DBLP DOI BibTeX RDF |
|
35 | Chi Lin 0001, Guowei Wu, Xiaochen Lai, Tie Qiu 0001 |
Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks. |
ICA3PP (3) |
2015 |
DBLP DOI BibTeX RDF |
|
35 | John Riedl |
Altruism, Selfishness, and Destructiveness on the Social Web. |
AH |
2008 |
DBLP DOI BibTeX RDF |
|
25 | András Joó |
Mining Evolving Learning Algorithms. |
EuroGP |
2009 |
DBLP DOI BibTeX RDF |
Genetic programming, perceptron, tree mining, learning rule |
25 | Huayang Xie, Mengjie Zhang 0001, Peter Andreae |
An analysis of depth of crossover points in tree-based Genetic Programming. |
IEEE Congress on Evolutionary Computation |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Hammad Majeed, Conor Ryan |
A Less Destructive, Context-Aware Crossover Operator for GP. |
EuroGP |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Scott Borg |
Economically Complex Cyberattacks. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
cyberdefense, security, cybersecurity, cyberattack |
25 | Juan Du, Sheng-Li Xie, Ying-Lin Yu |
Quality assessment based on noise influencing force. |
ICIP (3) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #13 of 13 (100 per page; Change: )
|
|