Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting data privacy through hard-to-reverse negative databases., , , , and . Int. J. Inf. Sec., 6 (6): 403-415 (2007)Generating Biomorphs with an Aesthetic Immune System, and . 8th International Conference on the Simulation and Synthesis of Living Systems (Artificial Life VIII), page 89--92. Sydney, NSW, Australia, University of New South Wales, MIT Press, (December 2002)Learning and Programming in Classifier Systems., and . Mach. Learn., (1988)Genetic Algorithms.. ACM Comput. Surv., 28 (1): 77-80 (1996)Computer Immunology., , and . Commun. ACM, 40 (10): 88-96 (1997)Evolving Software: Combining Online Learning with Mutation-Based Stochastic Search., , and . ACM Trans. Evol. Learn. Optim., 3 (4): 13:1-13:32 (December 2023)A Study of Parallelism in the Classifier System and Its Application to Classification in Kl-One Semantic Networks (Artificial Intelligence, Fine-Grained).. University of Michigan, USA, (1985)Relative Building-Block Fitness and the Building-Block Hypothesis, and . Foundations of Genetic Algorithms 2, page 109--126. San Francisco, CA: Morgan Kaufmann, (1993)Borders and gateways: measuring and analyzing national as chokepoints., , , , and . COMPASS, page 184-194. ACM, (2019)Modeling NoC traffic locality and energy consumption with rent's communication probability distribution., , , , and . SLIP, page 3-8. ACM, (2010)