Author of the publication

Exploiting Evolutionary Computation in an Industrial Flow for the Development of Code-Optimized Microprocessor Test Programs.

, , , and . GECCO (Companion), page 1465-1466. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Promoting Diversity in Evolutionary Algorithms: an Updated Bibliography., and . GECCO (Companion), page 943-944. ACM, (2016)On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator., , , and . IVSW, page 31-37. IEEE, (2018)Evolving Warriors for the Nano Core., , and . CIG, page 272-278. IEEE, (2006)Post-Silicon Validation of IEEE 1687 Reconfigurable Scan Networks., , , and . ETS, page 1-6. IEEE, (2019)Automatic Test Program Generation: A Case Study., , , and . IEEE Des. Test Comput., 21 (2): 102-109 (2004)Evolving assembly programs: how games help microprocessor validation., , and . IEEE Trans. Evol. Comput., 9 (6): 695-706 (2005)The Maximum Common Subgraph Problem: A Parallel and Multi-Engine Approach., , and . Comput., 8 (2): 48 (2020)Simulation-based verification of network protocols performance., , , , , and . CHARME, volume 105 of IFIP Conference Proceedings, page 236-251. Chapman & Hall, (1997)Code generation for functional validation of pipelined microprocessors., , and . ETW, page 113-118. IEEE Computer Society, (2003)Improving Multi-objective Evolutionary Influence Maximization in Social Networks., , , , and . EvoApplications, volume 10784 of Lecture Notes in Computer Science, page 117-124. Springer, (2018)