Advanced Techniques for Solving Optimization Problems through Evolutionary Algorithms

Size: px
Start display at page:

Download "Advanced Techniques for Solving Optimization Problems through Evolutionary Algorithms"

Transcription

1 PhD Final Presentation Advanced Techniques for Solving Optimization Problems through Evolutionary Algorithms Advisor: Giovanni Squillero PhD Candidate: Marco Gaudesi CAD Group DAUIN February 27 th, 2015

2 Outline Intro: Evolutionary Algorithms (EAs) µgp EA Theory DMAB Group Evolution Distance Metric EA Practice Q & A Test Programs Generation Test Programs Compaction Virus WetLand

3 Distance Metric DMAB Group Evolution Evolutionary Computation Test Generation EA Test Compaction Test Compaction Test of Reorder Buffer Memory Iterated Prisoner s DIlemma WetLand Virus

4 EAs Evolutionary Algorithm Useful when we know the final goal, but not how to reach it Evolution is not a random process - Random mutations afford materials - Objective evaluation: only useful mutations are preserved - The process requires to assess the final effect of modifications, not to design them - EAs are stochastic optimization techniques EAs are population based

5 MicroGP µgp 3 Framework A computational approach for pursuing a goal defined by the user First task: creation of assembly-language programs for testing microprocessors The user is required to evaluate the candidate solutions proposed by the toolkit µgp 3 characteristics were exploited and modified to implement new technologies discussed within this thesis

6 THEORY

7 EA Theory EC theory: PDMAB, operators selection The Dynamic Multi-Armed Bandit mechanism (DMAB) is used to select best operators to be applied during evolution State-of-the-art: standard MAB algorithm require a big amount of time to detect that the best operator has changed? It was proposed to use a statistical change detection test, creating the Dynamic MAB (DMAB) algorithm Activity and improvements:? Modification of the DMAB selection strategy: Allowing operator to sporadically fail No performance feedback after each application Publication [submitted]: J. Belluz, M. Gaudesi, G. Squillero, A. Tonda Operator Selection using Improved Multi-Armed Bandit, GECCO 2015.?

8 EA Theory EC theory: Group Evolution New EA technique, introducing the concept of group State-of-the-art: EAs use a single-individual solution-oriented approach Activities: New group operators New fitness function: it takes into account the overlapping of individuals within a group Example based on strings coverage presented by Banzhaf

9 PHENOTYPE GENOTYPE EA Theory EC theory: Genotype / Phenotype distance Universal Information Distance (UID): the distance between two individuals is the number of distinct symbols they do not have in common. ADD AX, BX State-of-the-art: Distance between individuals is calculated at phenotype level, or comparing also fitness Activities: Definition of symbol at genotype level Investigation on new approaches to calculate the difference among lists of symbols Results: Strong correlation with phenotype-level in two problems where individuals represent string of bits and assembly language programs Publications: M. Gaudesi, G. Squillero, A. Tonda An Efficient Distance Metric for Linear Genetic Programming, GECCO 2013 M. Gaudesi, G. Squillero, A. Tonda Universal information distance for genetic programming, GECCO SUB 55, CX JNZ individuala.s label1: ADD AX, BX SUB 55, CX JNZ label1

10 PRACTICE

11 EA Practice Automated Wetland Design Intro: Wetland: artificial ponds, able to filter water through plants State-of-the-art: Traditionally designed by expert, through a trial & error approach Activity: Proposing an automatic approach to wetland design, exploiting an evolutionary algorithm. Developed in collaboration with the University of Padova and INRA Research Center (Thiverval-Grignon, France) Publications: M. Gaudesi, A. Marion, T. Musner, G. Squillero, A. Tonda Evolutionary Optimization of Wetlands Design, 28th Annual ACM Symposium on Applied Computing, SAC 2013, Coimbra, Portugal M. Gaudesi, A. Marion, T. Musner, G. Squillero, A. Tonda An Evolutionary Approach to Wetland Design, Evo* 13

12 EA Practice Evolving malware Generation of individuals (viruses) in an hostile environment, monitored by antivirus Activities: Code Generation: starting from a database formed by code of several malicious applications, the final goal of the evolution is to create a malware not detected by anti-virus Code Integration: the EA is used to determine the optimal position for hiding malicious code inside an existing executable Evolvable routine to encrypt malware Publication: A. Cani, M. Gaudesi, E. Sanchez, G. Squillero, A. Tonda Towards Automated Malware Creation: Code Generation and Code Integration, ACM 29 th Symposium On Applied Computing (SAC 2014), 2014.

13 EA Practice Group Evolution [to minimips] Intro: Theoretical approach to a new EA technique, introducing the concept of group State-of-the-art: Currently, EAs use an approach single-individual solution-oriented Activity: Applied in CAD environment, in order to improve faults coverage of assembler programs for verifying minimips processor Publication: Ciganda L., Gaudesi M., Lutton E., Sanchez E., Squillero G., Tonda A. Automatic Generation of On-Line Test Programs through a Cooperation Scheme, 13th International Workshop on Microprocessor Testing and Verification (MTV 2012), Austin, Texas

14 EA Practice Test Programs Compaction The shorter is the execution time needed to run a test program and check the correctness of results, the better is the quality of the tests suite. Goal: Removing useless instructions within the test program, without affecting faults covered by the original one Activities: Definition of a simple approach to apply EA to compaction problem Definition of the fitness function, formed by two values: the first one is the number of non covered faults, to be minimized; the second one is the number of zeros (representing the useless instructions), to be maximized Evaluation of the effectiveness of this approach on the minimips processor core Publication: R. Cantoro, M. Gaudesi, E. Sanchez, P. Schiavone, G. Squillero, An Evolutionary Approach for Test Program Compaction, LATS 2015

15 PUBLICATIONS LIST Ciganda L., Gaudesi M., Lutton E., Sanchez E., Squillero G., Tonda A. Automatic Generation of On-Line Test Programs through a Cooperation Scheme, MTV 2012 M. Gaudesi, A. Marion, T. Musner, G. Squillero, A. Tonda Evolutionary Optimization of Wetlands Design, 28th Annual ACM Symposium on Applied Computing, SAC 2013 M. Gaudesi, A. Marion, T. Musner, G. Squillero, A. Tonda An Evolutionary Approach to Wetland Design, Evo* 13 M. Gaudesi, G. Squillero, A. Tonda An Efficient Distance Metric for Linear Genetic Programming, GECCO 2013 A. Cani, M. Gaudesi, E. Sanchez, G. Squillero, A. Tonda Towards Automated Malware Creation: Code Generation and Code Integration, SAC M. Gaudesi, M. Jenihhin, J. Raik, E. Sanchez, G. Squillero, V. Tihhomirov, R. Ubar Diagnostic Test Generation for Statistical Bug Localization using Evolutionary Computation, Evo* 14. S. Di Carlo, M. Gaudesi, E. Sanchez, M. Sonza Reorda A Functional Approach for Testing the Reorder Buffer Memory, JETTA Journal of Electronic Testing. M. Gaudesi, S. Saleem, E. Sanchez, M. Sonza Reorda, E. Tanowe, On the In-Field Test of Brench Prediction Units using the Correlated Predictor mechanism, DDECS 2014 M. Gaudesi, E. Piccolo, G. Squillero, A. Tonda, TURAN: Evolving non-deterministic players for the iterated prisoner s dilemma, CEC 2014 M. Gaudesi, G. Squillero, A. Tonda, Universal information distance for genetic programming, GECCO 2014 R. Cantoro, M. Gaudesi, E. Sanchez, P. Schiavone, G. Squillero, An Evolutionary Approach for Test Program Compaction, LATS 2015 M. Gaudesi, M. Sonza Reorda, I. Pomeranz On Test Program Compaction. In: ETS 15. [in press] N. Palermo, V. Tihhomirov, T.S. Copetti, M. Jenihhin, J. Raik, S. Kostin, M. Gaudesi, G. Squillero, M. Sonza Reorda, F. Vargas Rejuvenation of Nanoscale Logic at NBTI-Critical Paths Using Evolutionary TPG. LATS [In press] M. Gaudesi, E. Piccolo, G. Squillero, A. Tonda, Exploiting Evolutionary Modeling to Prevail in Iterated Prisoner s Dilemma Tournaments, IEEE Trans. on Computational Intelligence and AI in Games [minor review - submitted] Thanks for Your Attention

Multi-Objective Genetic Test Generation for Systems-on-Chip Hardware Verification

Multi-Objective Genetic Test Generation for Systems-on-Chip Hardware Verification Multi-Objective Genetic Test Generation for Systems-on-Chip Hardware Verification Adriel Cheng Cheng-Chew Lim The University of Adelaide, Australia 5005 Abstract We propose a test generation method employing

More information

Contribution to the Methods and Algorithms of Automatic Generation of Functional Tests for Processors

Contribution to the Methods and Algorithms of Automatic Generation of Functional Tests for Processors Contribution to the Methods and Algorithms of Automatic Generation of Functional Tests for Processors Ján Hudec Institute of Computer Systems and Networks Faculty of Informatics and Information Technologies

More information

Master's projects at ITMO University. Daniil Chivilikhin PhD Student @ ITMO University

Master's projects at ITMO University. Daniil Chivilikhin PhD Student @ ITMO University Master's projects at ITMO University Daniil Chivilikhin PhD Student @ ITMO University General information Guidance from our lab's researchers Publishable results 2 Research areas Research at ITMO Evolutionary

More information

GA as a Data Optimization Tool for Predictive Analytics

GA as a Data Optimization Tool for Predictive Analytics GA as a Data Optimization Tool for Predictive Analytics Chandra.J 1, Dr.Nachamai.M 2,Dr.Anitha.S.Pillai 3 1Assistant Professor, Department of computer Science, Christ University, Bangalore,India, chandra.j@christunivesity.in

More information

Numerical Research on Distributed Genetic Algorithm with Redundant

Numerical Research on Distributed Genetic Algorithm with Redundant Numerical Research on Distributed Genetic Algorithm with Redundant Binary Number 1 Sayori Seto, 2 Akinori Kanasugi 1,2 Graduate School of Engineering, Tokyo Denki University, Japan 10kme41@ms.dendai.ac.jp,

More information

Evolutionary Testing of PHP Web Applications with WETT

Evolutionary Testing of PHP Web Applications with WETT Evolutionary Testing of PHP Web Applications with WETT Francesco Bolis, Angelo Gargantini, Marco Guarnieri, and Eros Magri Dip. di Ing. dell'informazione e Metodi Matematici, Università di Bergamo, Italy

More information

Blind Security Testing

Blind Security Testing Blind Security Testing An Evolutionary Approach Black Hat USA 2007 Scott Stender Vice President, Blind Security Testing An Evolutionary Approach Who are you? Co-Founder and Vice President of Security consultant

More information

Evolving Multimodal Behavior Through Subtask and Switch Neural Networks

Evolving Multimodal Behavior Through Subtask and Switch Neural Networks Evolving Multimodal Behavior Through Subtask and Switch Neural Networks Xun Li 1 and Risto Miikkulainen 1 1 The University of Texas at Austin xun.bhsfer@utexas.edu Abstract While neuroevolution has been

More information

A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number

A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number 1 Tomohiro KAMIMURA, 2 Akinori KANASUGI 1 Department of Electronics, Tokyo Denki University, 07ee055@ms.dendai.ac.jp

More information

D A T A M I N I N G C L A S S I F I C A T I O N

D A T A M I N I N G C L A S S I F I C A T I O N D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.

More information

Computational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2

Computational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2 Computational Learning Theory Spring Semester, 2003/4 Lecture 1: March 2 Lecturer: Yishay Mansour Scribe: Gur Yaari, Idan Szpektor 1.1 Introduction Several fields in computer science and economics are

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013 Transistor Level Fault Finding in VLSI Circuits using Genetic Algorithm Lalit A. Patel, Sarman K. Hadia CSPIT, CHARUSAT, Changa., CSPIT, CHARUSAT, Changa Abstract This paper presents, genetic based algorithm

More information

Software Engineering and Service Design: courses in ITMO University

Software Engineering and Service Design: courses in ITMO University Software Engineering and Service Design: courses in ITMO University Igor Buzhinsky igor.buzhinsky@gmail.com Computer Technologies Department Department of Computer Science and Information Systems December

More information

Extended Finite-State Machine Inference with Parallel Ant Colony Based Algorithms

Extended Finite-State Machine Inference with Parallel Ant Colony Based Algorithms Extended Finite-State Machine Inference with Parallel Ant Colony Based Algorithms Daniil Chivilikhin PhD student ITMO University Vladimir Ulyantsev PhD student ITMO University Anatoly Shalyto Dr.Sci.,

More information

Search Algorithm in Software Testing and Debugging

Search Algorithm in Software Testing and Debugging Search Algorithm in Software Testing and Debugging Hsueh-Chien Cheng Dec 8, 2010 Search Algorithm Search algorithm is a well-studied field in AI Computer chess Hill climbing A search... Evolutionary Algorithm

More information

The Intelligent Resource Managment For Local Area Networks

The Intelligent Resource Managment For Local Area Networks Intelligent Resource Management for Local Area Networks: Approach and Evolution 1 Roger Meike Martin Marietta Denver Aerospace Space Station Program P.O. Box 179 (MS 01744) Denver, Co. 80201 Abstract The

More information

GARDA: a Diagnostic ATPG for Large Synchronous Sequential Circuits

GARDA: a Diagnostic ATPG for Large Synchronous Sequential Circuits GARDA: a Diagnostic ATPG for Large Synchronous Sequential Circuits F. Corno, P. Prinetto, M. Rebaudengo, M. Sonza Reorda Politecnico di Torino Dipartimento di Automatica e Informatica Torino, Italy Abstract

More information

Estimation of the COCOMO Model Parameters Using Genetic Algorithms for NASA Software Projects

Estimation of the COCOMO Model Parameters Using Genetic Algorithms for NASA Software Projects Journal of Computer Science 2 (2): 118-123, 2006 ISSN 1549-3636 2006 Science Publications Estimation of the COCOMO Model Parameters Using Genetic Algorithms for NASA Software Projects Alaa F. Sheta Computers

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Software Engineering Introduction & Background. Complaints. General Problems. Department of Computer Science Kent State University

Software Engineering Introduction & Background. Complaints. General Problems. Department of Computer Science Kent State University Software Engineering Introduction & Background Department of Computer Science Kent State University Complaints Software production is often done by amateurs Software development is done by tinkering or

More information

An Application of Machine Learning to Network Intrusion Detection

An Application of Machine Learning to Network Intrusion Detection An Application of Machine Learning to Network Intrusion Detection Chris Sinclair Applied Research Laboratories The University of Texas at Austin sinclair@arlututexasedu Lyn Pierce epierce@arlututexasedu

More information

Computational intelligence in intrusion detection systems

Computational intelligence in intrusion detection systems Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick Chang @ TEIL Reference The use of computational intelligence in intrusion detection systems : A review

More information

SOFTWARE TESTING STRATEGY APPROACH ON SOURCE CODE APPLYING CONDITIONAL COVERAGE METHOD

SOFTWARE TESTING STRATEGY APPROACH ON SOURCE CODE APPLYING CONDITIONAL COVERAGE METHOD SOFTWARE TESTING STRATEGY APPROACH ON SOURCE CODE APPLYING CONDITIONAL COVERAGE METHOD Jaya Srivastaval 1 and Twinkle Dwivedi 2 1 Department of Computer Science & Engineering, Shri Ramswaroop Memorial

More information

Genetic algorithms for changing environments

Genetic algorithms for changing environments Genetic algorithms for changing environments John J. Grefenstette Navy Center for Applied Research in Artificial Intelligence, Naval Research Laboratory, Washington, DC 375, USA gref@aic.nrl.navy.mil Abstract

More information

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic

More information

Optimised Realistic Test Input Generation

Optimised Realistic Test Input Generation Optimised Realistic Test Input Generation Mustafa Bozkurt and Mark Harman {m.bozkurt,m.harman}@cs.ucl.ac.uk CREST Centre, Department of Computer Science, University College London. Malet Place, London

More information

Selection Procedures for Module Discovery: Exploring Evolutionary Algorithms for Cognitive Science

Selection Procedures for Module Discovery: Exploring Evolutionary Algorithms for Cognitive Science Selection Procedures for Module Discovery: Exploring Evolutionary Algorithms for Cognitive Science Janet Wiles (j.wiles@csee.uq.edu.au) Ruth Schulz (ruth@csee.uq.edu.au) Scott Bolland (scottb@csee.uq.edu.au)

More information

Optimizing the Dynamic Composition of Web Service Components

Optimizing the Dynamic Composition of Web Service Components Optimizing the Dynamic Composition of Web Service Components Wei-Chun Chang* Department and Graduate School of Information Management, Shu-Te University, Taiwan changwc@mailstuedutw Ching-Seh Wu Department

More information

Introduction To Genetic Algorithms

Introduction To Genetic Algorithms 1 Introduction To Genetic Algorithms Dr. Rajib Kumar Bhattacharjya Department of Civil Engineering IIT Guwahati Email: rkbc@iitg.ernet.in References 2 D. E. Goldberg, Genetic Algorithm In Search, Optimization

More information

LONG BEACH CITY COLLEGE MEMORANDUM

LONG BEACH CITY COLLEGE MEMORANDUM LONG BEACH CITY COLLEGE MEMORANDUM DATE: May 5, 2000 TO: Academic Senate Equivalency Committee FROM: John Hugunin Department Head for CBIS SUBJECT: Equivalency statement for Computer Science Instructor

More information

Using a Failure Modes, Effects and Diagnostic Analysis (FMEDA) to Measure Diagnostic Coverage in Programmable Electronic Systems.

Using a Failure Modes, Effects and Diagnostic Analysis (FMEDA) to Measure Diagnostic Coverage in Programmable Electronic Systems. Using a Failure Modes, Effects and Diagnostic Analysis (FMEDA) to Measure Diagnostic Coverage in Programmable Electronic Systems. Dr. William M. Goble exida.com, 42 Short Rd., Perkasie, PA 18944 Eindhoven

More information

Alpha Cut based Novel Selection for Genetic Algorithm

Alpha Cut based Novel Selection for Genetic Algorithm Alpha Cut based Novel for Genetic Algorithm Rakesh Kumar Professor Girdhar Gopal Research Scholar Rajesh Kumar Assistant Professor ABSTRACT Genetic algorithm (GA) has several genetic operators that can

More information

Prediction of Interday Stock Prices Using Developmental and Linear Genetic Programming

Prediction of Interday Stock Prices Using Developmental and Linear Genetic Programming Prediction of Interday Stock Prices Using Developmental and Linear Genetic Programming Garnett Wilson and Wolfgang Banzhaf Memorial University of Newfoundland, St. John s, NL, Canada {gwilson,banzhaf}@cs.mun.ca

More information

Evaluation of Different Task Scheduling Policies in Multi-Core Systems with Reconfigurable Hardware

Evaluation of Different Task Scheduling Policies in Multi-Core Systems with Reconfigurable Hardware Evaluation of Different Task Scheduling Policies in Multi-Core Systems with Reconfigurable Hardware Mahyar Shahsavari, Zaid Al-Ars, Koen Bertels,1, Computer Engineering Group, Software & Computer Technology

More information

A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation

A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation Abhishek Singh Department of Information Technology Amity School of Engineering and Technology Amity

More information

Peter Mileff PhD SOFTWARE ENGINEERING. The Basics of Software Engineering. University of Miskolc Department of Information Technology

Peter Mileff PhD SOFTWARE ENGINEERING. The Basics of Software Engineering. University of Miskolc Department of Information Technology Peter Mileff PhD SOFTWARE ENGINEERING The Basics of Software Engineering University of Miskolc Department of Information Technology Introduction Péter Mileff - Department of Information Engineering Room

More information

USING THE EVOLUTION STRATEGIES' SELF-ADAPTATION MECHANISM AND TOURNAMENT SELECTION FOR GLOBAL OPTIMIZATION

USING THE EVOLUTION STRATEGIES' SELF-ADAPTATION MECHANISM AND TOURNAMENT SELECTION FOR GLOBAL OPTIMIZATION 1 USING THE EVOLUTION STRATEGIES' SELF-ADAPTATION MECHANISM AND TOURNAMENT SELECTION FOR GLOBAL OPTIMIZATION EFRÉN MEZURA-MONTES AND CARLOS A. COELLO COELLO Evolutionary Computation Group at CINVESTAV-IPN

More information

Programming Risk Assessment Models for Online Security Evaluation Systems

Programming Risk Assessment Models for Online Security Evaluation Systems Programming Risk Assessment Models for Online Security Evaluation Systems Ajith Abraham 1, Crina Grosan 12, Vaclav Snasel 13 1 Machine Intelligence Research Labs, MIR Labs, http://www.mirlabs.org 2 Babes-Bolyai

More information

Comparative Study: ACO and EC for TSP

Comparative Study: ACO and EC for TSP Comparative Study: ACO and EC for TSP Urszula Boryczka 1 and Rafa l Skinderowicz 1 and Damian Świstowski1 1 University of Silesia, Institute of Computer Science, Sosnowiec, Poland, e-mail: uboryczk@us.edu.pl

More information

New Modifications of Selection Operator in Genetic Algorithms for the Traveling Salesman Problem

New Modifications of Selection Operator in Genetic Algorithms for the Traveling Salesman Problem New Modifications of Selection Operator in Genetic Algorithms for the Traveling Salesman Problem Radovic, Marija; and Milutinovic, Veljko Abstract One of the algorithms used for solving Traveling Salesman

More information

Development and Industrial Application of Multi-Domain Security Testing Technologies. Innovation Sheet Model Inference Assisted Evolutionary Fuzzing

Development and Industrial Application of Multi-Domain Security Testing Technologies. Innovation Sheet Model Inference Assisted Evolutionary Fuzzing Development and Industrial Application of Multi-Domain Security Testing Technologies Innovation Sheet Model Inference Assisted Evolutionary Fuzzing Description The technique dynamically analyzes the application

More information

Comparison of Major Domination Schemes for Diploid Binary Genetic Algorithms in Dynamic Environments

Comparison of Major Domination Schemes for Diploid Binary Genetic Algorithms in Dynamic Environments Comparison of Maor Domination Schemes for Diploid Binary Genetic Algorithms in Dynamic Environments A. Sima UYAR and A. Emre HARMANCI Istanbul Technical University Computer Engineering Department Maslak

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

Video Game Description Language (VGDL) and the Challenge of Creating Agents for General Video Game Playing (GVGP)

Video Game Description Language (VGDL) and the Challenge of Creating Agents for General Video Game Playing (GVGP) Video Game Description Language (VGDL) and the Challenge of Creating Agents for General Video Game Playing (GVGP) Diego Perez, University of Essex (Colchester, UK) dperez@essex.ac.uk Tainan, Taiwan, 2015

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge of Computer Science

More information

On Linear Genetic Programming

On Linear Genetic Programming On Linear Genetic Programming Dissertation zur Erlangung des Grades eines Doktors der Naturwissenschaften der Universität Dortmund am Fachbereich Informatik von Markus Brameier Dortmund Feb. 2004 Date

More information

AC 2012-4561: MATHEMATICAL MODELING AND SIMULATION US- ING LABVIEW AND LABVIEW MATHSCRIPT

AC 2012-4561: MATHEMATICAL MODELING AND SIMULATION US- ING LABVIEW AND LABVIEW MATHSCRIPT AC 2012-4561: MATHEMATICAL MODELING AND SIMULATION US- ING LABVIEW AND LABVIEW MATHSCRIPT Dr. Nikunja Swain, South Carolina State University Nikunja Swain is a professor in the College of Science, Mathematics,

More information

Genetic programming with regular expressions

Genetic programming with regular expressions Genetic programming with regular expressions Børge Svingen Chief Technology Officer, Open AdExchange bsvingen@openadex.com 2009-03-23 Pattern discovery Pattern discovery: Recognizing patterns that characterize

More information

An Observability Branch Coverage Metric Based on Dynamic Factored Use-Define Chains

An Observability Branch Coverage Metric Based on Dynamic Factored Use-Define Chains An Observability Branch Coverage Metric Based on Dynamic Factored Use-Define Chains Tao Lv Ling-yi Liu Yang Zhao Hua-wei Li Xiao-wei Li Institute of Computing Technology, Chinese Academy of Sciences, Beijing,

More information

Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm

Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm Martin Hlosta, Rostislav Stríž, Jan Kupčík, Jaroslav Zendulka, and Tomáš Hruška A. Imbalanced Data Classification

More information

Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.

Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC. A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Coverage Criteria for Search Based Automatic Unit Testing of Java Programs

Coverage Criteria for Search Based Automatic Unit Testing of Java Programs ISSN (Online): 2409-4285 www.ijcsse.org Page: 256-263 Coverage Criteria for Search Based Automatic Unit Testing of Java Programs Ina Papadhopulli 1 and Elinda Meçe 2 1, 2 Department of Computer Engineering,

More information

About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013

About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013 About the Author The Role of Artificial Intelligence in Software Engineering By: Mark Harman Presented by: Jacob Lear Mark Harman is a Professor of Software Engineering at University College London Director

More information

Signal Customized Helpdesk Course

Signal Customized Helpdesk Course Signal Customized Helpdesk Course This course is a combination of modules taken from two Microsoft Courses: 50311A and 50331A. It is geared toward staff who handle helpdesk calls and troubleshoot end user

More information

Faculty of Engineering Student Number:

Faculty of Engineering Student Number: Philadelphia University Student Name: Faculty of Engineering Student Number: Dept. of Computer Engineering Final Exam, First Semester: 2012/2013 Course Title: Microprocessors Date: 17/01//2013 Course No:

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

When Machine Learning Meets AI and Game Theory

When Machine Learning Meets AI and Game Theory 1 When Machine Learning Meets AI and Game Theory Anurag Agrawal, Deepak Jaiswal Abstract We study the problem of development of intelligent machine learning applications to exploit the problems of adaptation

More information

ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT

ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT 216 ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT *P.Nirmalkumar, **J.Raja Paul Perinbam, @S.Ravi and #B.Rajan *Research Scholar,

More information

An On-Line Algorithm for Checkpoint Placement

An On-Line Algorithm for Checkpoint Placement An On-Line Algorithm for Checkpoint Placement Avi Ziv IBM Israel, Science and Technology Center MATAM - Advanced Technology Center Haifa 3905, Israel avi@haifa.vnat.ibm.com Jehoshua Bruck California Institute

More information

Evolutionary SAT Solver (ESS)

Evolutionary SAT Solver (ESS) Ninth LACCEI Latin American and Caribbean Conference (LACCEI 2011), Engineering for a Smart Planet, Innovation, Information Technology and Computational Tools for Sustainable Development, August 3-5, 2011,

More information

Advances in Smart Systems Research : ISSN 2050-8662 : http://nimbusvault.net/publications/koala/assr/ Vol. 3. No. 3 : pp.

Advances in Smart Systems Research : ISSN 2050-8662 : http://nimbusvault.net/publications/koala/assr/ Vol. 3. No. 3 : pp. Advances in Smart Systems Research : ISSN 2050-8662 : http://nimbusvault.net/publications/koala/assr/ Vol. 3. No. 3 : pp.49-54 : isrp13-005 Optimized Communications on Cloud Computer Processor by Using

More information

Feature Selection with Monte-Carlo Tree Search

Feature Selection with Monte-Carlo Tree Search Feature Selection with Monte-Carlo Tree Search Robert Pinsler 20.01.2015 20.01.2015 Fachbereich Informatik DKE: Seminar zu maschinellem Lernen Robert Pinsler 1 Agenda 1 Feature Selection 2 Feature Selection

More information

Automated Product Line Methodologies to Support Model-Based Testing

Automated Product Line Methodologies to Support Model-Based Testing Automated Product Line Methodologies to Support Model-Based Testing Shuai Wang, Shaukat Ali and Arnaud Gotlieb Certus Software V&V Center, Simula Research Laboratory, Norway {shuai, arnaud, shaukat}@simula.no

More information

USING GENETIC ALGORITHM IN NETWORK SECURITY

USING GENETIC ALGORITHM IN NETWORK SECURITY USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:

More information

An Efficient load balancing using Genetic algorithm in Hierarchical structured distributed system

An Efficient load balancing using Genetic algorithm in Hierarchical structured distributed system An Efficient load balancing using Genetic algorithm in Hierarchical structured distributed system Priyanka Gonnade 1, Sonali Bodkhe 2 Mtech Student Dept. of CSE, Priyadarshini Instiute of Engineering and

More information

EDUCATIONAL GAMES FOR LEARNING PROGRAMMING LANGUAGES. Olga Shabalina, Pavel Vorobkalov, Alexander Kataev, Alexey Tarasenko

EDUCATIONAL GAMES FOR LEARNING PROGRAMMING LANGUAGES. Olga Shabalina, Pavel Vorobkalov, Alexander Kataev, Alexey Tarasenko International Book Series "Information Science and Computing" 79 EDUCATIONAL GAMES FOR LEARNING PROGRAMMING LANGUAGES Olga Shabalina, Pavel Vorobkalov, Alexander Kataev, Alexey Tarasenko Abstract: A concept

More information

An Open Architecture through Nanocomputing

An Open Architecture through Nanocomputing 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore An Open Architecture through Nanocomputing Joby Joseph1and A.

More information

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software 1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,

More information

Update of Digital I&C Research Activities in INER

Update of Digital I&C Research Activities in INER 202 AEC/NRC Bilateral Technical Meeting 202 年 AEC/NRC 雙 邊 技 術 會 議 Update of Digital I&C Research Activities in INER Program for Software Development and Testing Research of Digital I&C Systems Hui-Wen

More information

APPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION

APPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION APPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION Harald Günther 1, Stephan Frei 1, Thomas Wenzel, Wolfgang Mickisch 1 Technische Universität Dortmund,

More information

Adaptation of the ACO heuristic for sequencing learning activities

Adaptation of the ACO heuristic for sequencing learning activities Adaptation of the ACO heuristic for sequencing learning activities Sergio Gutiérrez 1, Grégory Valigiani 2, Pierre Collet 2 and Carlos Delgado Kloos 1 1 University Carlos III of Madrid (Spain) 2 Université

More information

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National

More information

Predicting Software Complexity by Means of Evolutionary Testing

Predicting Software Complexity by Means of Evolutionary Testing Department of Informatics Engineering Faculty of Science and Technology University of Coimbra Ph.D. Thesis Proposal Doctoral Program in Information Sciences and Technologies Software Engineering Predicting

More information

A Study of Local Optima in the Biobjective Travelling Salesman Problem

A Study of Local Optima in the Biobjective Travelling Salesman Problem A Study of Local Optima in the Biobjective Travelling Salesman Problem Luis Paquete, Marco Chiarandini and Thomas Stützle FG Intellektik, Technische Universität Darmstadt, Alexanderstr. 10, Darmstadt,

More information

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet

More information

14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO)

14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) Overview Kyrre Glette kyrrehg@ifi INF3490 Swarm Intelligence Particle Swarm Optimization Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) 3 Swarms in nature Fish, birds,

More information

Community-Assisted Software Engineering Decision Making. Technical Report

Community-Assisted Software Engineering Decision Making. Technical Report Community-Assisted Software Engineering Decision Making Technical Report Department of Computer Science and Engineering University of Minnesota 4-192 Keller Hall 200 Union Street SE Minneapolis, MN 55455-0159

More information

How To Improve Autotest

How To Improve Autotest Applying Search in an Automatic Contract-Based Testing Tool Alexey Kolesnichenko, Christopher M. Poskitt, and Bertrand Meyer ETH Zürich, Switzerland Abstract. Automated random testing has been shown to

More information

Using Genetic Algorithm for Network Intrusion Detection

Using Genetic Algorithm for Network Intrusion Detection Using Genetic Algorithm for Network Intrusion Detection Wei Li Department of Computer Science and Engineering Mississippi State University, Mississippi State, MS 39762 Email: wli@cse.msstate.edu Abstract

More information

Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm

Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm Journal of Al-Nahrain University Vol.15 (2), June, 2012, pp.161-168 Science Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm Manal F. Younis Computer Department, College

More information

Evolutionary Prefetching and Caching in an Independent Storage Units Model

Evolutionary Prefetching and Caching in an Independent Storage Units Model Evolutionary Prefetching and Caching in an Independent Units Model Athena Vakali Department of Informatics Aristotle University of Thessaloniki, Greece E-mail: avakali@csdauthgr Abstract Modern applications

More information

Static Program Transformations for Efficient Software Model Checking

Static Program Transformations for Efficient Software Model Checking Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major

More information

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING JOINT DOCTORAL PROGRAM IN COMPUTER SCIENCE AND ENGINEERING Core Courses CENG 590 CENG 600 CENG

More information

Fleet Assignment Using Collective Intelligence

Fleet Assignment Using Collective Intelligence Fleet Assignment Using Collective Intelligence Nicolas E Antoine, Stefan R Bieniawski, and Ilan M Kroo Stanford University, Stanford, CA 94305 David H Wolpert NASA Ames Research Center, Moffett Field,

More information

Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog.

Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog. Computer Science Dr. Ilhyun Lee Professor Dr. Ilhyun Lee is a Professor of Computer Science. He received his Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1996). He was selected

More information

Evolutionary denoising based on an estimation of Hölder exponents with oscillations.

Evolutionary denoising based on an estimation of Hölder exponents with oscillations. Evolutionary denoising based on an estimation of Hölder exponents with oscillations. Pierrick Legrand,, Evelyne Lutton and Gustavo Olague CICESE, Research Center, Applied Physics Division Centro de Investigación

More information

Post-Class Quiz: Software Development Security Domain

Post-Class Quiz: Software Development Security Domain 1. A step-by-step implementation instruction is called A. Policy B. Standard C. Procedure D. Guideline 2. An approved configuration of software packages that describes how and what components are assembled

More information

Intelligent and Automated Software Testing Methods Classification

Intelligent and Automated Software Testing Methods Classification Intelligent and Automated Software Testing Methods Classification Seyed Reza Shahamiri Department of Software Engineering Faculty of Computer Science and Information s University Teknologi Malaysia (UTM)

More information

Master s Program in Information Systems

Master s Program in Information Systems The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems

More information

CS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139

CS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 CS91.543 MidTerm Exam 4/1/2004 Name: KEY Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 % INTRODUCTION, AI HISTORY AND AGENTS 1. [4 pts. ea.] Briefly describe the following important AI programs.

More information

Study Plan for the Master Degree In Industrial Engineering / Management. (Thesis Track)

Study Plan for the Master Degree In Industrial Engineering / Management. (Thesis Track) Study Plan for the Master Degree In Industrial Engineering / Management (Thesis Track) Plan no. 2005 T A. GENERAL RULES AND CONDITIONS: 1. This plan conforms to the valid regulations of programs of graduate

More information

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing

More information

Evolving Team Darwin United

Evolving Team Darwin United Evolving Team Darwin United David Andre and Astro Teller dandre@cs.berkeley.edu astro@cs.cmu.edu University of California at Berkeley, Berkeley, CA, 94720-1776 Carnegie Mellon University, Pittsburgh PA

More information

Firewall Verification and Redundancy Checking are Equivalent

Firewall Verification and Redundancy Checking are Equivalent Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov

More information

A Review of Evolutionary Algorithms for E-Commerce

A Review of Evolutionary Algorithms for E-Commerce A Review of Evolutionary Algorithms for E-Commerce Alex A. Freitas PUC-PR PPGIA-CCET R. Imaculada Conceicao, 1155 Curitiba PR. 80215-901. Brazil alex@ppgia.pucpr.br http://www.ppgia.pucpr.br/~alex Abstract.

More information

Projects - Neural and Evolutionary Computing

Projects - Neural and Evolutionary Computing Projects - Neural and Evolutionary Computing 2014-2015 I. Application oriented topics 1. Task scheduling in distributed systems. The aim is to assign a set of (independent or correlated) tasks to some

More information

Evolutionary robotics, neural networks, video game AI

Evolutionary robotics, neural networks, video game AI Joel Lehman Contact Information Research Interests Education Dept. of Computer Science Voice: (614) 208-9980 The University of Texas at Austin E-mail: joel@cs.utexas.edu 2317 Speedway, Stop D9500 WWW:

More information

74. Selecting Web Services with Security Compliances: A Managerial Perspective

74. Selecting Web Services with Security Compliances: A Managerial Perspective 74. Selecting Web Services with Security Compliances: A Managerial Perspective Khaled Md Khan Department of Computer Science and Engineering Qatar University k.khan@qu.edu.qa Abstract This paper proposes

More information