Advanced Techniques for Solving Optimization Problems through Evolutionary Algorithms
|
|
- Horace Flynn
- 8 years ago
- Views:
Transcription
1 PhD Final Presentation Advanced Techniques for Solving Optimization Problems through Evolutionary Algorithms Advisor: Giovanni Squillero PhD Candidate: Marco Gaudesi CAD Group DAUIN February 27 th, 2015
2 Outline Intro: Evolutionary Algorithms (EAs) µgp EA Theory DMAB Group Evolution Distance Metric EA Practice Q & A Test Programs Generation Test Programs Compaction Virus WetLand
3 Distance Metric DMAB Group Evolution Evolutionary Computation Test Generation EA Test Compaction Test Compaction Test of Reorder Buffer Memory Iterated Prisoner s DIlemma WetLand Virus
4 EAs Evolutionary Algorithm Useful when we know the final goal, but not how to reach it Evolution is not a random process - Random mutations afford materials - Objective evaluation: only useful mutations are preserved - The process requires to assess the final effect of modifications, not to design them - EAs are stochastic optimization techniques EAs are population based
5 MicroGP µgp 3 Framework A computational approach for pursuing a goal defined by the user First task: creation of assembly-language programs for testing microprocessors The user is required to evaluate the candidate solutions proposed by the toolkit µgp 3 characteristics were exploited and modified to implement new technologies discussed within this thesis
6 THEORY
7 EA Theory EC theory: PDMAB, operators selection The Dynamic Multi-Armed Bandit mechanism (DMAB) is used to select best operators to be applied during evolution State-of-the-art: standard MAB algorithm require a big amount of time to detect that the best operator has changed? It was proposed to use a statistical change detection test, creating the Dynamic MAB (DMAB) algorithm Activity and improvements:? Modification of the DMAB selection strategy: Allowing operator to sporadically fail No performance feedback after each application Publication [submitted]: J. Belluz, M. Gaudesi, G. Squillero, A. Tonda Operator Selection using Improved Multi-Armed Bandit, GECCO 2015.?
8 EA Theory EC theory: Group Evolution New EA technique, introducing the concept of group State-of-the-art: EAs use a single-individual solution-oriented approach Activities: New group operators New fitness function: it takes into account the overlapping of individuals within a group Example based on strings coverage presented by Banzhaf
9 PHENOTYPE GENOTYPE EA Theory EC theory: Genotype / Phenotype distance Universal Information Distance (UID): the distance between two individuals is the number of distinct symbols they do not have in common. ADD AX, BX State-of-the-art: Distance between individuals is calculated at phenotype level, or comparing also fitness Activities: Definition of symbol at genotype level Investigation on new approaches to calculate the difference among lists of symbols Results: Strong correlation with phenotype-level in two problems where individuals represent string of bits and assembly language programs Publications: M. Gaudesi, G. Squillero, A. Tonda An Efficient Distance Metric for Linear Genetic Programming, GECCO 2013 M. Gaudesi, G. Squillero, A. Tonda Universal information distance for genetic programming, GECCO SUB 55, CX JNZ individuala.s label1: ADD AX, BX SUB 55, CX JNZ label1
10 PRACTICE
11 EA Practice Automated Wetland Design Intro: Wetland: artificial ponds, able to filter water through plants State-of-the-art: Traditionally designed by expert, through a trial & error approach Activity: Proposing an automatic approach to wetland design, exploiting an evolutionary algorithm. Developed in collaboration with the University of Padova and INRA Research Center (Thiverval-Grignon, France) Publications: M. Gaudesi, A. Marion, T. Musner, G. Squillero, A. Tonda Evolutionary Optimization of Wetlands Design, 28th Annual ACM Symposium on Applied Computing, SAC 2013, Coimbra, Portugal M. Gaudesi, A. Marion, T. Musner, G. Squillero, A. Tonda An Evolutionary Approach to Wetland Design, Evo* 13
12 EA Practice Evolving malware Generation of individuals (viruses) in an hostile environment, monitored by antivirus Activities: Code Generation: starting from a database formed by code of several malicious applications, the final goal of the evolution is to create a malware not detected by anti-virus Code Integration: the EA is used to determine the optimal position for hiding malicious code inside an existing executable Evolvable routine to encrypt malware Publication: A. Cani, M. Gaudesi, E. Sanchez, G. Squillero, A. Tonda Towards Automated Malware Creation: Code Generation and Code Integration, ACM 29 th Symposium On Applied Computing (SAC 2014), 2014.
13 EA Practice Group Evolution [to minimips] Intro: Theoretical approach to a new EA technique, introducing the concept of group State-of-the-art: Currently, EAs use an approach single-individual solution-oriented Activity: Applied in CAD environment, in order to improve faults coverage of assembler programs for verifying minimips processor Publication: Ciganda L., Gaudesi M., Lutton E., Sanchez E., Squillero G., Tonda A. Automatic Generation of On-Line Test Programs through a Cooperation Scheme, 13th International Workshop on Microprocessor Testing and Verification (MTV 2012), Austin, Texas
14 EA Practice Test Programs Compaction The shorter is the execution time needed to run a test program and check the correctness of results, the better is the quality of the tests suite. Goal: Removing useless instructions within the test program, without affecting faults covered by the original one Activities: Definition of a simple approach to apply EA to compaction problem Definition of the fitness function, formed by two values: the first one is the number of non covered faults, to be minimized; the second one is the number of zeros (representing the useless instructions), to be maximized Evaluation of the effectiveness of this approach on the minimips processor core Publication: R. Cantoro, M. Gaudesi, E. Sanchez, P. Schiavone, G. Squillero, An Evolutionary Approach for Test Program Compaction, LATS 2015
15 PUBLICATIONS LIST Ciganda L., Gaudesi M., Lutton E., Sanchez E., Squillero G., Tonda A. Automatic Generation of On-Line Test Programs through a Cooperation Scheme, MTV 2012 M. Gaudesi, A. Marion, T. Musner, G. Squillero, A. Tonda Evolutionary Optimization of Wetlands Design, 28th Annual ACM Symposium on Applied Computing, SAC 2013 M. Gaudesi, A. Marion, T. Musner, G. Squillero, A. Tonda An Evolutionary Approach to Wetland Design, Evo* 13 M. Gaudesi, G. Squillero, A. Tonda An Efficient Distance Metric for Linear Genetic Programming, GECCO 2013 A. Cani, M. Gaudesi, E. Sanchez, G. Squillero, A. Tonda Towards Automated Malware Creation: Code Generation and Code Integration, SAC M. Gaudesi, M. Jenihhin, J. Raik, E. Sanchez, G. Squillero, V. Tihhomirov, R. Ubar Diagnostic Test Generation for Statistical Bug Localization using Evolutionary Computation, Evo* 14. S. Di Carlo, M. Gaudesi, E. Sanchez, M. Sonza Reorda A Functional Approach for Testing the Reorder Buffer Memory, JETTA Journal of Electronic Testing. M. Gaudesi, S. Saleem, E. Sanchez, M. Sonza Reorda, E. Tanowe, On the In-Field Test of Brench Prediction Units using the Correlated Predictor mechanism, DDECS 2014 M. Gaudesi, E. Piccolo, G. Squillero, A. Tonda, TURAN: Evolving non-deterministic players for the iterated prisoner s dilemma, CEC 2014 M. Gaudesi, G. Squillero, A. Tonda, Universal information distance for genetic programming, GECCO 2014 R. Cantoro, M. Gaudesi, E. Sanchez, P. Schiavone, G. Squillero, An Evolutionary Approach for Test Program Compaction, LATS 2015 M. Gaudesi, M. Sonza Reorda, I. Pomeranz On Test Program Compaction. In: ETS 15. [in press] N. Palermo, V. Tihhomirov, T.S. Copetti, M. Jenihhin, J. Raik, S. Kostin, M. Gaudesi, G. Squillero, M. Sonza Reorda, F. Vargas Rejuvenation of Nanoscale Logic at NBTI-Critical Paths Using Evolutionary TPG. LATS [In press] M. Gaudesi, E. Piccolo, G. Squillero, A. Tonda, Exploiting Evolutionary Modeling to Prevail in Iterated Prisoner s Dilemma Tournaments, IEEE Trans. on Computational Intelligence and AI in Games [minor review - submitted] Thanks for Your Attention
Multi-Objective Genetic Test Generation for Systems-on-Chip Hardware Verification
Multi-Objective Genetic Test Generation for Systems-on-Chip Hardware Verification Adriel Cheng Cheng-Chew Lim The University of Adelaide, Australia 5005 Abstract We propose a test generation method employing
More informationContribution to the Methods and Algorithms of Automatic Generation of Functional Tests for Processors
Contribution to the Methods and Algorithms of Automatic Generation of Functional Tests for Processors Ján Hudec Institute of Computer Systems and Networks Faculty of Informatics and Information Technologies
More informationMaster's projects at ITMO University. Daniil Chivilikhin PhD Student @ ITMO University
Master's projects at ITMO University Daniil Chivilikhin PhD Student @ ITMO University General information Guidance from our lab's researchers Publishable results 2 Research areas Research at ITMO Evolutionary
More informationGA as a Data Optimization Tool for Predictive Analytics
GA as a Data Optimization Tool for Predictive Analytics Chandra.J 1, Dr.Nachamai.M 2,Dr.Anitha.S.Pillai 3 1Assistant Professor, Department of computer Science, Christ University, Bangalore,India, chandra.j@christunivesity.in
More informationNumerical Research on Distributed Genetic Algorithm with Redundant
Numerical Research on Distributed Genetic Algorithm with Redundant Binary Number 1 Sayori Seto, 2 Akinori Kanasugi 1,2 Graduate School of Engineering, Tokyo Denki University, Japan 10kme41@ms.dendai.ac.jp,
More informationEvolutionary Testing of PHP Web Applications with WETT
Evolutionary Testing of PHP Web Applications with WETT Francesco Bolis, Angelo Gargantini, Marco Guarnieri, and Eros Magri Dip. di Ing. dell'informazione e Metodi Matematici, Università di Bergamo, Italy
More informationBlind Security Testing
Blind Security Testing An Evolutionary Approach Black Hat USA 2007 Scott Stender Vice President, Blind Security Testing An Evolutionary Approach Who are you? Co-Founder and Vice President of Security consultant
More informationEvolving Multimodal Behavior Through Subtask and Switch Neural Networks
Evolving Multimodal Behavior Through Subtask and Switch Neural Networks Xun Li 1 and Risto Miikkulainen 1 1 The University of Texas at Austin xun.bhsfer@utexas.edu Abstract While neuroevolution has been
More informationA Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number
A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number 1 Tomohiro KAMIMURA, 2 Akinori KANASUGI 1 Department of Electronics, Tokyo Denki University, 07ee055@ms.dendai.ac.jp
More informationD A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
More informationComputational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2
Computational Learning Theory Spring Semester, 2003/4 Lecture 1: March 2 Lecturer: Yishay Mansour Scribe: Gur Yaari, Idan Szpektor 1.1 Introduction Several fields in computer science and economics are
More informationISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013
Transistor Level Fault Finding in VLSI Circuits using Genetic Algorithm Lalit A. Patel, Sarman K. Hadia CSPIT, CHARUSAT, Changa., CSPIT, CHARUSAT, Changa Abstract This paper presents, genetic based algorithm
More informationSoftware Engineering and Service Design: courses in ITMO University
Software Engineering and Service Design: courses in ITMO University Igor Buzhinsky igor.buzhinsky@gmail.com Computer Technologies Department Department of Computer Science and Information Systems December
More informationExtended Finite-State Machine Inference with Parallel Ant Colony Based Algorithms
Extended Finite-State Machine Inference with Parallel Ant Colony Based Algorithms Daniil Chivilikhin PhD student ITMO University Vladimir Ulyantsev PhD student ITMO University Anatoly Shalyto Dr.Sci.,
More informationSearch Algorithm in Software Testing and Debugging
Search Algorithm in Software Testing and Debugging Hsueh-Chien Cheng Dec 8, 2010 Search Algorithm Search algorithm is a well-studied field in AI Computer chess Hill climbing A search... Evolutionary Algorithm
More informationThe Intelligent Resource Managment For Local Area Networks
Intelligent Resource Management for Local Area Networks: Approach and Evolution 1 Roger Meike Martin Marietta Denver Aerospace Space Station Program P.O. Box 179 (MS 01744) Denver, Co. 80201 Abstract The
More informationGARDA: a Diagnostic ATPG for Large Synchronous Sequential Circuits
GARDA: a Diagnostic ATPG for Large Synchronous Sequential Circuits F. Corno, P. Prinetto, M. Rebaudengo, M. Sonza Reorda Politecnico di Torino Dipartimento di Automatica e Informatica Torino, Italy Abstract
More informationEstimation of the COCOMO Model Parameters Using Genetic Algorithms for NASA Software Projects
Journal of Computer Science 2 (2): 118-123, 2006 ISSN 1549-3636 2006 Science Publications Estimation of the COCOMO Model Parameters Using Genetic Algorithms for NASA Software Projects Alaa F. Sheta Computers
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationSoftware Engineering Introduction & Background. Complaints. General Problems. Department of Computer Science Kent State University
Software Engineering Introduction & Background Department of Computer Science Kent State University Complaints Software production is often done by amateurs Software development is done by tinkering or
More informationAn Application of Machine Learning to Network Intrusion Detection
An Application of Machine Learning to Network Intrusion Detection Chris Sinclair Applied Research Laboratories The University of Texas at Austin sinclair@arlututexasedu Lyn Pierce epierce@arlututexasedu
More informationComputational intelligence in intrusion detection systems
Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick Chang @ TEIL Reference The use of computational intelligence in intrusion detection systems : A review
More informationSOFTWARE TESTING STRATEGY APPROACH ON SOURCE CODE APPLYING CONDITIONAL COVERAGE METHOD
SOFTWARE TESTING STRATEGY APPROACH ON SOURCE CODE APPLYING CONDITIONAL COVERAGE METHOD Jaya Srivastaval 1 and Twinkle Dwivedi 2 1 Department of Computer Science & Engineering, Shri Ramswaroop Memorial
More informationGenetic algorithms for changing environments
Genetic algorithms for changing environments John J. Grefenstette Navy Center for Applied Research in Artificial Intelligence, Naval Research Laboratory, Washington, DC 375, USA gref@aic.nrl.navy.mil Abstract
More informationIntrusion Detection: Game Theory, Stochastic Processes and Data Mining
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic
More informationOptimised Realistic Test Input Generation
Optimised Realistic Test Input Generation Mustafa Bozkurt and Mark Harman {m.bozkurt,m.harman}@cs.ucl.ac.uk CREST Centre, Department of Computer Science, University College London. Malet Place, London
More informationSelection Procedures for Module Discovery: Exploring Evolutionary Algorithms for Cognitive Science
Selection Procedures for Module Discovery: Exploring Evolutionary Algorithms for Cognitive Science Janet Wiles (j.wiles@csee.uq.edu.au) Ruth Schulz (ruth@csee.uq.edu.au) Scott Bolland (scottb@csee.uq.edu.au)
More informationOptimizing the Dynamic Composition of Web Service Components
Optimizing the Dynamic Composition of Web Service Components Wei-Chun Chang* Department and Graduate School of Information Management, Shu-Te University, Taiwan changwc@mailstuedutw Ching-Seh Wu Department
More informationIntroduction To Genetic Algorithms
1 Introduction To Genetic Algorithms Dr. Rajib Kumar Bhattacharjya Department of Civil Engineering IIT Guwahati Email: rkbc@iitg.ernet.in References 2 D. E. Goldberg, Genetic Algorithm In Search, Optimization
More informationLONG BEACH CITY COLLEGE MEMORANDUM
LONG BEACH CITY COLLEGE MEMORANDUM DATE: May 5, 2000 TO: Academic Senate Equivalency Committee FROM: John Hugunin Department Head for CBIS SUBJECT: Equivalency statement for Computer Science Instructor
More informationUsing a Failure Modes, Effects and Diagnostic Analysis (FMEDA) to Measure Diagnostic Coverage in Programmable Electronic Systems.
Using a Failure Modes, Effects and Diagnostic Analysis (FMEDA) to Measure Diagnostic Coverage in Programmable Electronic Systems. Dr. William M. Goble exida.com, 42 Short Rd., Perkasie, PA 18944 Eindhoven
More informationAlpha Cut based Novel Selection for Genetic Algorithm
Alpha Cut based Novel for Genetic Algorithm Rakesh Kumar Professor Girdhar Gopal Research Scholar Rajesh Kumar Assistant Professor ABSTRACT Genetic algorithm (GA) has several genetic operators that can
More informationPrediction of Interday Stock Prices Using Developmental and Linear Genetic Programming
Prediction of Interday Stock Prices Using Developmental and Linear Genetic Programming Garnett Wilson and Wolfgang Banzhaf Memorial University of Newfoundland, St. John s, NL, Canada {gwilson,banzhaf}@cs.mun.ca
More informationEvaluation of Different Task Scheduling Policies in Multi-Core Systems with Reconfigurable Hardware
Evaluation of Different Task Scheduling Policies in Multi-Core Systems with Reconfigurable Hardware Mahyar Shahsavari, Zaid Al-Ars, Koen Bertels,1, Computer Engineering Group, Software & Computer Technology
More informationA hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation
A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation Abhishek Singh Department of Information Technology Amity School of Engineering and Technology Amity
More informationPeter Mileff PhD SOFTWARE ENGINEERING. The Basics of Software Engineering. University of Miskolc Department of Information Technology
Peter Mileff PhD SOFTWARE ENGINEERING The Basics of Software Engineering University of Miskolc Department of Information Technology Introduction Péter Mileff - Department of Information Engineering Room
More informationUSING THE EVOLUTION STRATEGIES' SELF-ADAPTATION MECHANISM AND TOURNAMENT SELECTION FOR GLOBAL OPTIMIZATION
1 USING THE EVOLUTION STRATEGIES' SELF-ADAPTATION MECHANISM AND TOURNAMENT SELECTION FOR GLOBAL OPTIMIZATION EFRÉN MEZURA-MONTES AND CARLOS A. COELLO COELLO Evolutionary Computation Group at CINVESTAV-IPN
More informationProgramming Risk Assessment Models for Online Security Evaluation Systems
Programming Risk Assessment Models for Online Security Evaluation Systems Ajith Abraham 1, Crina Grosan 12, Vaclav Snasel 13 1 Machine Intelligence Research Labs, MIR Labs, http://www.mirlabs.org 2 Babes-Bolyai
More informationComparative Study: ACO and EC for TSP
Comparative Study: ACO and EC for TSP Urszula Boryczka 1 and Rafa l Skinderowicz 1 and Damian Świstowski1 1 University of Silesia, Institute of Computer Science, Sosnowiec, Poland, e-mail: uboryczk@us.edu.pl
More informationNew Modifications of Selection Operator in Genetic Algorithms for the Traveling Salesman Problem
New Modifications of Selection Operator in Genetic Algorithms for the Traveling Salesman Problem Radovic, Marija; and Milutinovic, Veljko Abstract One of the algorithms used for solving Traveling Salesman
More informationDevelopment and Industrial Application of Multi-Domain Security Testing Technologies. Innovation Sheet Model Inference Assisted Evolutionary Fuzzing
Development and Industrial Application of Multi-Domain Security Testing Technologies Innovation Sheet Model Inference Assisted Evolutionary Fuzzing Description The technique dynamically analyzes the application
More informationComparison of Major Domination Schemes for Diploid Binary Genetic Algorithms in Dynamic Environments
Comparison of Maor Domination Schemes for Diploid Binary Genetic Algorithms in Dynamic Environments A. Sima UYAR and A. Emre HARMANCI Istanbul Technical University Computer Engineering Department Maslak
More informationVideo Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.
More informationVideo Game Description Language (VGDL) and the Challenge of Creating Agents for General Video Game Playing (GVGP)
Video Game Description Language (VGDL) and the Challenge of Creating Agents for General Video Game Playing (GVGP) Diego Perez, University of Essex (Colchester, UK) dperez@essex.ac.uk Tainan, Taiwan, 2015
More information1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
More informationAssessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce
Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge of Computer Science
More informationOn Linear Genetic Programming
On Linear Genetic Programming Dissertation zur Erlangung des Grades eines Doktors der Naturwissenschaften der Universität Dortmund am Fachbereich Informatik von Markus Brameier Dortmund Feb. 2004 Date
More informationAC 2012-4561: MATHEMATICAL MODELING AND SIMULATION US- ING LABVIEW AND LABVIEW MATHSCRIPT
AC 2012-4561: MATHEMATICAL MODELING AND SIMULATION US- ING LABVIEW AND LABVIEW MATHSCRIPT Dr. Nikunja Swain, South Carolina State University Nikunja Swain is a professor in the College of Science, Mathematics,
More informationGenetic programming with regular expressions
Genetic programming with regular expressions Børge Svingen Chief Technology Officer, Open AdExchange bsvingen@openadex.com 2009-03-23 Pattern discovery Pattern discovery: Recognizing patterns that characterize
More informationAn Observability Branch Coverage Metric Based on Dynamic Factored Use-Define Chains
An Observability Branch Coverage Metric Based on Dynamic Factored Use-Define Chains Tao Lv Ling-yi Liu Yang Zhao Hua-wei Li Xiao-wei Li Institute of Computing Technology, Chinese Academy of Sciences, Beijing,
More informationConstrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm
Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm Martin Hlosta, Rostislav Stríž, Jan Kupčík, Jaroslav Zendulka, and Tomáš Hruška A. Imbalanced Data Classification
More informationMasao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
More informationMASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
More informationCoverage Criteria for Search Based Automatic Unit Testing of Java Programs
ISSN (Online): 2409-4285 www.ijcsse.org Page: 256-263 Coverage Criteria for Search Based Automatic Unit Testing of Java Programs Ina Papadhopulli 1 and Elinda Meçe 2 1, 2 Department of Computer Engineering,
More informationAbout the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013
About the Author The Role of Artificial Intelligence in Software Engineering By: Mark Harman Presented by: Jacob Lear Mark Harman is a Professor of Software Engineering at University College London Director
More informationSignal Customized Helpdesk Course
Signal Customized Helpdesk Course This course is a combination of modules taken from two Microsoft Courses: 50311A and 50331A. It is geared toward staff who handle helpdesk calls and troubleshoot end user
More informationFaculty of Engineering Student Number:
Philadelphia University Student Name: Faculty of Engineering Student Number: Dept. of Computer Engineering Final Exam, First Semester: 2012/2013 Course Title: Microprocessors Date: 17/01//2013 Course No:
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationWhen Machine Learning Meets AI and Game Theory
1 When Machine Learning Meets AI and Game Theory Anurag Agrawal, Deepak Jaiswal Abstract We study the problem of development of intelligent machine learning applications to exploit the problems of adaptation
More informationON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT
216 ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT *P.Nirmalkumar, **J.Raja Paul Perinbam, @S.Ravi and #B.Rajan *Research Scholar,
More informationAn On-Line Algorithm for Checkpoint Placement
An On-Line Algorithm for Checkpoint Placement Avi Ziv IBM Israel, Science and Technology Center MATAM - Advanced Technology Center Haifa 3905, Israel avi@haifa.vnat.ibm.com Jehoshua Bruck California Institute
More informationEvolutionary SAT Solver (ESS)
Ninth LACCEI Latin American and Caribbean Conference (LACCEI 2011), Engineering for a Smart Planet, Innovation, Information Technology and Computational Tools for Sustainable Development, August 3-5, 2011,
More informationAdvances in Smart Systems Research : ISSN 2050-8662 : http://nimbusvault.net/publications/koala/assr/ Vol. 3. No. 3 : pp.
Advances in Smart Systems Research : ISSN 2050-8662 : http://nimbusvault.net/publications/koala/assr/ Vol. 3. No. 3 : pp.49-54 : isrp13-005 Optimized Communications on Cloud Computer Processor by Using
More informationFeature Selection with Monte-Carlo Tree Search
Feature Selection with Monte-Carlo Tree Search Robert Pinsler 20.01.2015 20.01.2015 Fachbereich Informatik DKE: Seminar zu maschinellem Lernen Robert Pinsler 1 Agenda 1 Feature Selection 2 Feature Selection
More informationAutomated Product Line Methodologies to Support Model-Based Testing
Automated Product Line Methodologies to Support Model-Based Testing Shuai Wang, Shaukat Ali and Arnaud Gotlieb Certus Software V&V Center, Simula Research Laboratory, Norway {shuai, arnaud, shaukat}@simula.no
More informationUSING GENETIC ALGORITHM IN NETWORK SECURITY
USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:
More informationAn Efficient load balancing using Genetic algorithm in Hierarchical structured distributed system
An Efficient load balancing using Genetic algorithm in Hierarchical structured distributed system Priyanka Gonnade 1, Sonali Bodkhe 2 Mtech Student Dept. of CSE, Priyadarshini Instiute of Engineering and
More informationEDUCATIONAL GAMES FOR LEARNING PROGRAMMING LANGUAGES. Olga Shabalina, Pavel Vorobkalov, Alexander Kataev, Alexey Tarasenko
International Book Series "Information Science and Computing" 79 EDUCATIONAL GAMES FOR LEARNING PROGRAMMING LANGUAGES Olga Shabalina, Pavel Vorobkalov, Alexander Kataev, Alexey Tarasenko Abstract: A concept
More informationAn Open Architecture through Nanocomputing
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore An Open Architecture through Nanocomputing Joby Joseph1and A.
More informationReliability Guarantees in Automata Based Scheduling for Embedded Control Software
1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,
More informationUpdate of Digital I&C Research Activities in INER
202 AEC/NRC Bilateral Technical Meeting 202 年 AEC/NRC 雙 邊 技 術 會 議 Update of Digital I&C Research Activities in INER Program for Software Development and Testing Research of Digital I&C Systems Hui-Wen
More informationAPPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION
APPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION Harald Günther 1, Stephan Frei 1, Thomas Wenzel, Wolfgang Mickisch 1 Technische Universität Dortmund,
More informationAdaptation of the ACO heuristic for sequencing learning activities
Adaptation of the ACO heuristic for sequencing learning activities Sergio Gutiérrez 1, Grégory Valigiani 2, Pierre Collet 2 and Carlos Delgado Kloos 1 1 University Carlos III of Madrid (Spain) 2 Université
More informationOutline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses
Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National
More informationPredicting Software Complexity by Means of Evolutionary Testing
Department of Informatics Engineering Faculty of Science and Technology University of Coimbra Ph.D. Thesis Proposal Doctoral Program in Information Sciences and Technologies Software Engineering Predicting
More informationA Study of Local Optima in the Biobjective Travelling Salesman Problem
A Study of Local Optima in the Biobjective Travelling Salesman Problem Luis Paquete, Marco Chiarandini and Thomas Stützle FG Intellektik, Technische Universität Darmstadt, Alexanderstr. 10, Darmstadt,
More informationA SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
More information14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO)
Overview Kyrre Glette kyrrehg@ifi INF3490 Swarm Intelligence Particle Swarm Optimization Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) 3 Swarms in nature Fish, birds,
More informationCommunity-Assisted Software Engineering Decision Making. Technical Report
Community-Assisted Software Engineering Decision Making Technical Report Department of Computer Science and Engineering University of Minnesota 4-192 Keller Hall 200 Union Street SE Minneapolis, MN 55455-0159
More informationHow To Improve Autotest
Applying Search in an Automatic Contract-Based Testing Tool Alexey Kolesnichenko, Christopher M. Poskitt, and Bertrand Meyer ETH Zürich, Switzerland Abstract. Automated random testing has been shown to
More informationUsing Genetic Algorithm for Network Intrusion Detection
Using Genetic Algorithm for Network Intrusion Detection Wei Li Department of Computer Science and Engineering Mississippi State University, Mississippi State, MS 39762 Email: wli@cse.msstate.edu Abstract
More informationMemory Allocation Technique for Segregated Free List Based on Genetic Algorithm
Journal of Al-Nahrain University Vol.15 (2), June, 2012, pp.161-168 Science Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm Manal F. Younis Computer Department, College
More informationEvolutionary Prefetching and Caching in an Independent Storage Units Model
Evolutionary Prefetching and Caching in an Independent Units Model Athena Vakali Department of Informatics Aristotle University of Thessaloniki, Greece E-mail: avakali@csdauthgr Abstract Modern applications
More informationStatic Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
More informationCore Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses
İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING JOINT DOCTORAL PROGRAM IN COMPUTER SCIENCE AND ENGINEERING Core Courses CENG 590 CENG 600 CENG
More informationFleet Assignment Using Collective Intelligence
Fleet Assignment Using Collective Intelligence Nicolas E Antoine, Stefan R Bieniawski, and Ilan M Kroo Stanford University, Stanford, CA 94305 David H Wolpert NASA Ames Research Center, Moffett Field,
More informationComputer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog.
Computer Science Dr. Ilhyun Lee Professor Dr. Ilhyun Lee is a Professor of Computer Science. He received his Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1996). He was selected
More informationEvolutionary denoising based on an estimation of Hölder exponents with oscillations.
Evolutionary denoising based on an estimation of Hölder exponents with oscillations. Pierrick Legrand,, Evelyne Lutton and Gustavo Olague CICESE, Research Center, Applied Physics Division Centro de Investigación
More informationPost-Class Quiz: Software Development Security Domain
1. A step-by-step implementation instruction is called A. Policy B. Standard C. Procedure D. Guideline 2. An approved configuration of software packages that describes how and what components are assembled
More informationIntelligent and Automated Software Testing Methods Classification
Intelligent and Automated Software Testing Methods Classification Seyed Reza Shahamiri Department of Software Engineering Faculty of Computer Science and Information s University Teknologi Malaysia (UTM)
More informationMaster s Program in Information Systems
The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems
More informationCS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139
CS91.543 MidTerm Exam 4/1/2004 Name: KEY Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 % INTRODUCTION, AI HISTORY AND AGENTS 1. [4 pts. ea.] Briefly describe the following important AI programs.
More informationStudy Plan for the Master Degree In Industrial Engineering / Management. (Thesis Track)
Study Plan for the Master Degree In Industrial Engineering / Management (Thesis Track) Plan no. 2005 T A. GENERAL RULES AND CONDITIONS: 1. This plan conforms to the valid regulations of programs of graduate
More informationAutomotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri
Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing
More informationEvolving Team Darwin United
Evolving Team Darwin United David Andre and Astro Teller dandre@cs.berkeley.edu astro@cs.cmu.edu University of California at Berkeley, Berkeley, CA, 94720-1776 Carnegie Mellon University, Pittsburgh PA
More informationFirewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov
More informationA Review of Evolutionary Algorithms for E-Commerce
A Review of Evolutionary Algorithms for E-Commerce Alex A. Freitas PUC-PR PPGIA-CCET R. Imaculada Conceicao, 1155 Curitiba PR. 80215-901. Brazil alex@ppgia.pucpr.br http://www.ppgia.pucpr.br/~alex Abstract.
More informationProjects - Neural and Evolutionary Computing
Projects - Neural and Evolutionary Computing 2014-2015 I. Application oriented topics 1. Task scheduling in distributed systems. The aim is to assign a set of (independent or correlated) tasks to some
More informationEvolutionary robotics, neural networks, video game AI
Joel Lehman Contact Information Research Interests Education Dept. of Computer Science Voice: (614) 208-9980 The University of Texas at Austin E-mail: joel@cs.utexas.edu 2317 Speedway, Stop D9500 WWW:
More information74. Selecting Web Services with Security Compliances: A Managerial Perspective
74. Selecting Web Services with Security Compliances: A Managerial Perspective Khaled Md Khan Department of Computer Science and Engineering Qatar University k.khan@qu.edu.qa Abstract This paper proposes
More information