Author of the publication

Exploiting Evolutionary Computation in an Industrial Flow for the Development of Code-Optimized Microprocessor Test Programs.

, , , and . GECCO (Companion), page 1465-1466. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TURAN: Evolving non-deterministic players for the iterated prisoner's dilemma., , , and . IEEE Congress on Evolutionary Computation, page 21-27. IEEE, (2014)An efficient distance metric for linear genetic programming., , and . GECCO, page 925-932. ACM, (2013)Malware Obfuscation through Evolutionary Packers., , , , and . GECCO (Companion), page 757-758. ACM, (2015)Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms., , , , and . Appl. Soft Comput., (2016)Exploiting Evolutionary Modeling to Prevail in Iterated Prisoner's Dilemma Tournaments., , , and . IEEE Trans. Comput. Intellig. and AI in Games, 8 (3): 288-300 (2016)Dual-Encoder Architecture with Encoder Selection for Joint Close-Talk and Far-Talk Speech Recognition., , , , and . ASRU, page 534-540. IEEE, (2021)Rejuvenation of nanoscale logic at NBTI-critical paths using evolutionary TPG., , , , , , , , , and 1 other author(s). LATS, page 1-6. IEEE Computer Society, (2015)On the in-field test of Branch Prediction Units using the correlated predictor mechanism., , , , and . DDECS, page 286-289. IEEE Computer Society, (2014)Evolutionary optimization of wetlands design., , , , and . SAC, page 176-181. ACM, (2013)On test program compaction., , and . ETS, page 1-6. IEEE, (2015)