Author of the publication

A Memetic Approach to Bayesian Network Structure Learning.

, , , and . EvoApplications, volume 7835 of Lecture Notes in Computer Science, page 102-111. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation-based verification of network protocols performance., , , , , and . CHARME, volume 105 of IFIP Conference Proceedings, page 236-251. Chapman & Hall, (1997)Efficient Techniques for Automatic Verification-Oriented Test Set Optimization., , and . Int. J. Parallel Program., 34 (1): 93-109 (2006)Evolving assembly programs: how games help microprocessor validation., , and . IEEE Trans. Evol. Comput., 9 (6): 695-706 (2005)Automatic Test Program Generation: A Case Study., , , and . IEEE Des. Test Comput., 21 (2): 102-109 (2004)Code generation for functional validation of pipelined microprocessors., , and . ETW, page 113-118. IEEE Computer Society, (2003)VALIS: an evolutionary classification algorithm., , and . Genet. Program. Evolvable Mach., 19 (3): 453-471 (2018)Artificial evolution in computer aided design: from the optimization of parameters to the creation of assembly programs.. Computing, 93 (2-4): 103-120 (2011)Improving Multi-objective Evolutionary Influence Maximization in Social Networks., , , , and . EvoApplications, volume 10784 of Lecture Notes in Computer Science, page 117-124. Springer, (2018)On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator., , , and . IVSW, page 31-37. IEEE, (2018)Post-Silicon Validation of IEEE 1687 Reconfigurable Scan Networks., , , and . ETS, page 1-6. IEEE, (2019)