default search action
Theoretical Computer Science, Volume 785
Volume 785, September 2019
- Lila Kari:
Editorial. iii - C. R. Noordman, Gerard A. W. Vreeswijk:
Evolving novelty strategies for the Iterated Prisoner's Dilemma in deceptive tournaments. 1-16 - Keenan Breik, Chris Thachuk, Marijn Heule, David Soloveichik:
Computing properties of stable configurations of thermodynamic binding networks. 17-29 - Patrick Spettel, Hans-Georg Beyer:
Analysis of the (1, λ)-σ-Self-Adaptation Evolution Strategy with repair by projection applied to a conically constrained problem. 30-45 - Tobias Friedrich, Timo Kötzing, Martin S. Krejca:
Unbiasedness of estimation-of-distribution algorithms. 46-59 - Jacek Waldmajer, Zbigniew Bonikowski, Sebastian Sakowski:
Theory of tailor automata. 60-82 - Felipe S. Abrahão, Klaus Wehmuth, Artur Ziviani:
Algorithmic networks: Central time to trigger expected emergent open-endedness. 83-116 - Mark N. Ellingham, Joanna A. Ellis-Monaghan:
Edge-outer graph embedding and the complexity of the DNA reporter strand problem. 117-127 - Yo-Sub Han, Hwee Kim:
Ruleset optimization on isomorphic oritatami systems. 128-139 - Liucheng Liu, Wenmei Yi, Qian Yang, Hong Peng, Jun Wang:
Numerical P systems with Boolean condition. 140-149 - Hafsteinn Einarsson, Marcelo Matheus Gauy, Johannes Lengler, Florian Meier, Asier Mujika, Angelika Steger, Felix Weissenberger:
The linear hidden subset problem for the (1 + 1) EA with scheduled and adaptive mutation rates. 150-170
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.