Author of the publication

EvolvaWare: Genetic Programming for Optimal Design of Hardware-Based Algorithms

, , , and . Genetic Programming 1998: Proceedings of the Third Annual Conference, page 869--874. University of Wisconsin, Madison, Wisconsin, USA, Morgan Kaufmann, (22-25 July 1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Path to Optimizing the Al-Co-Cr-Cu-Fe-Ni-Ti High Entropy Alloy Family for High Temperature Applications., , , , , , and . Entropy, 18 (4): 104 (2016)EvolvaWare: Genetic Programming for Optimal Design of Hardware-Based Algorithms, , , and . Genetic Programming 1998: Proceedings of the Third Annual Conference, page 869--874. University of Wisconsin, Madison, Wisconsin, USA, Morgan Kaufmann, (22-25 July 1998)Normative framework and computational models for simulating and assessing command and control processes., , , , and . Simul. Model. Pract. Theory, 14 (4): 454-479 (2006)Countering Terrorism through Information and Privacy Protection Technologies., and . IEEE Secur. Priv., 4 (6): 18-27 (2006)Multitarget Tracking Algorithm Parallelization for Distributed-Memory Computing Systems., , , and . HPDC, page 412-421. IEEE Computer Society, (1996)Shared-Memory Parallelization of the Data Association Problem in Multitarget Tracking., , , and . IEEE Trans. Parallel Distributed Syst., 8 (10): 993-1005 (1997)Fingerprinting Leading Indicators of WMD Terrorism: An Integrated Modeling Approach., , , , , and . AAAI Spring Symposium: Technosocial Predictive Analytics, page 72-75. AAAI, (2009)Organizing Committee., and . AAAI Spring Symposium: AI Technologies for Homeland Security, AAAI, (2005)Automated hardware design using genetic programming, VHDL, and FPGAs., , , , and . SMC, page 2184-2189. IEEE, (1998)Countering terrorism through information technology., , , and . Commun. ACM, 47 (3): 36-43 (2004)