Author of the publication

Porting Estimation of Distribution Algorithms to the Cell Broadband Engine.

, , and . Parallel Comput., 36 (10-11): 618-634 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Porting Estimation of Distribution Algorithms to the Cell Broadband Engine., , and . Parallel Comput., 36 (10-11): 618-634 (2010)Modeling the availability of Cassandra., , and . J. Parallel Distributed Comput., (2015)Competition-based failure-aware scheduling for High-Throughput Computing systems on peer-to-peer networks., , and . Clust. Comput., 18 (3): 1229-1249 (2015)Evaluating the cell broadband engine as a platform to run estimation of distribution algorithms., , and . GECCO (Companion), page 2491-2498. ACM, (2009)High throughput computing over peer-to-peer networks., , and . Future Gener. Comput. Syst., 29 (1): 352-360 (2013)Measuring Independence between Statistical Randomness Tests by Mutual Information., , , , and . Entropy, 22 (7): 741 (2020)Improvements in the computing efficiency of the probabilities of the LIL test for the PRNG evaluation., , , , and . Theor. Comput. Sci., (2022)Evolving Nonlinear S-Boxes With Improved Theoretical Resilience to Power Attacks., , , , and . IEEE Access, (2020)Test for Detection of Weak Graphic Passwords in Passpoint Based on the Mean Distance between Points., , , , , and . Symmetry, 13 (5): 777 (2021)Probabilistic Evaluation of the Exploration-Exploitation Balance during the Search, Using the Swap Operator, for Nonlinear Bijective S-Boxes, Resistant to Power Attacks., , , , , and . Inf., 12 (12): 509 (2021)