default search action
Evolutionary Intelligence, Volume 4
Volume 4, Number 1, March 2011
- Raymond Chiong, Thomas Weise:
Special issue on modern search heuristics and applications. 1-2 - Pu Wang, Thomas Weise, Raymond Chiong:
Novel evolutionary algorithms for supervised classification problems: an experimental study. 3-16 - Giovanni Iacca, Ernesto Mininno, Ferrante Neri:
Composed compact differential evolution. 17-29 - Osama Moh'd Alia, Mandava Rajeswari, Mohd Ezane Aziz:
A hybrid harmony search algorithm for MRI brain segmentation. 31-49 - Pablo Rabanal, Ismael Rodríguez, Fernando Rubio:
Studying the application of ant colony optimization and river formation dynamics to the steiner tree problem. 51-65
Volume 4, Number 2, June 2011
- Emma Hart, Chris McEwan, Jon Timmis, Andrew Hone:
Advances in artificial immune systems. 67-68 - Alaa Abi-Haidar, Luis M. Rocha:
Collective classification of textual documents by guided self-organization in T-Cell cross-regulation dynamics. 69-80 - Heder S. Bernardino, Helio J. C. Barbosa, Leonardo Goliatt da Fonseca:
Surrogate-assisted clonal selection algorithms for expensive optimization problems. 81-97 - Thomas Jansen, Christine Zarges:
On the role of age diversity for effective aging operators. 99-125
Volume 4, Number 3, September 2011
- Alexander Scheidler, Martin Middendorf:
Learning classifier systems to evolve classification rules for systems of memory constrained components. 127-143 - Marcin Suchorzewski:
Evolving scalable and modular adaptive networks with Developmental Symbolic Encoding. 145-163 - Chrisantha Fernando:
Co-evolution of lexical and syntactic classifiers during a language game. 165-182 - Vitor Marques, Fernando A. C. Gomide:
Parameter control of metaheuristics with genetic fuzzy systems. 183-202
Volume 4, Number 4, December 2011
- Zhuhong Zhang:
Artificial immune optimization system solving constrained omni-optimization. 203-218 - Rogier Koppejan, Shimon Whiteson:
Neuroevolutionary reinforcement learning for generalized control of simulated helicopters. 219-241 - Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood:
Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing. 243-266
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.