Description |
1 online resource (233 pages) |
Series |
Advances in Intelligent Systems and Computing ; v. 674 |
|
Advances in intelligent systems and computing ; v. 674.
|
Contents |
Preface -- Organization -- Executive Committee -- General Chair -- Local Chair -- Proceedings Chair -- Program Chairs -- Financial Chair -- Tutorial Chair -- Advisory Board -- Special Sessions Chairs -- Program Committee -- Series Chairs -- Referees -- Invited Speakers -- Invited Tutorials -- Sponsoring Institutions and Partners -- Contents -- Multicriteria and Set-Oriented Optimization -- Aggregate Selection in Multi-objective Biochemical Optimization via the Average Cuboid Volume Indicator -- 1 Introduction -- 2 Related Work |
|
3 The Average Cuboid Volume Indicator4 Selection Strategies for NGSA-II -- 4.1 Aggregate Selection -- 4.2 ACV-Based Selection -- 4.3 Computational Complexity -- 5 Other Components of NSGA-II -- 5.1 Individual Encoding and Search Space -- 5.2 Variation Operators -- 5.3 Fitness Functions -- 6 Experimental Results -- 6.1 Experimental Setting -- 6.2 Evaluation -- 7 Conclusion -- References -- On Gradient-Based and Swarm-Based Algorithms for Set-Oriented Bicriteria Optimization -- 1 Introduction -- 2 Background -- 2.1 Definitions and Notation |
|
2.2 Problem Definition2.3 Related Work -- 3 Optimization Algorithms -- 3.1 Multi-objective Particle Swarm Optimization Algorithm -- 3.2 Adaptive Mutation -- 3.3 Multi-objective Gradient Based Optimization Algorithm -- 4 Evaluation -- 4.1 Test Problems -- 4.2 Experiments Setup -- 4.3 Description of Results -- 4.4 Discussion of Results -- 5 Conclusion -- A Appendices -- A.1 Manual of the Application -- References -- Quadcriteria Optimization of Binary Classifiers: Error Rates, Coverage, and Complexity -- 1 Introduction |
|
2 Multiobjective Problem Formulation3 Quadcriteria Optimization Methods -- 4 Experimental Setup -- 5 Results Analysis -- 6 Conclusions and Future Work -- References -- Parameter Identification of Stochastic Gene Regulation Models by Indicator-Based Evolutionary Level Set Approximation -- 1 Evolutionary Level Set Approximation -- 1.1 Augmented Diversity Indicators -- 1.2 Theoretical Discussion -- 2 Stochastic Simulation of Gene Regulatory Networks -- 2.1 Simulation of Gene Regulatory Network by Gillespie Algorithm -- 3 Problem Definitions |
|
3.1 Monomer Problem by Ribeiro et al.3.2 Objective Function -- 4 Experimental Setup -- 4.1 Monomer Problem -- 4.2 Gene Expression Problem -- 5 Level Set Approximation Results -- 5.1 CMA-ES Evaluation -- 5.2 ELSA Evaluation -- 6 Conclusions and Outlook -- References -- Evolution in ICT Security -- On Using Cognition for Anomaly Detection in SDN -- 1 Introduction -- 2 Prototyping Cognitive Behavioral Security: Anomaly Detection -- 2.1 A Road to Cognition: Gaussian Processes Modeling -- 2.2 Learning and Building Profiles |
Summary |
This book comprises selected research papers from the 2015 edition of the EVOLVE conference, which was held on June 18-June 24, 2015 in Iași, Romania. It presents the latest research on Probability, Set Oriented Numerics, and Evolutionary Computation. The aim of the EVOLVE conference was to provide a bridge between probability, set oriented numerics and evolutionary computation and to bring together experts from these disciplines. The broad focus of the EVOLVE conference made it possible to discuss the connection between these related fields of study computational science. The selected papers published in the proceedings book were peer reviewed by an international committee of reviewers (at least three reviews per paper) and were revised and enhanced by the authors after the conference. The contributions are categorized into five major parts, which are: Multicriteria and Set-Oriented Optimization; Evolution in ICT Security; Computational Game Theory; Theory on Evolutionary Computation; Applications of Evolutionary Algorithms. The 2015 edition shows a major progress in the aim to bring disciplines together and the research on a number of topics that have been discussed in previous editions of the conference matured over time and methods have found their ways in applications. In this sense the book can be considered an important milestone in bridging and thereby advancing state-of-the-art computational methods. |
Notes |
""3 Learn2Defend: Cognitive Security in SDN Preliminary Prototype"" |
|
Includes author index |
|
Print version record |
Subject |
Combinatorial optimization -- Congresses
|
|
Evolutionary computation -- Congresses
|
|
MATHEMATICS -- Applied.
|
|
MATHEMATICS -- Probability & Statistics -- General.
|
|
Combinatorial optimization
|
|
Evolutionary computation
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Tantar, Alexandru-Adrian
|
|
Tantar, Emilia
|
|
Emmerich, Michael
|
|
Legrand, Pierrick
|
|
Alboaie, Lenuta
|
|
Luchian, Henri
|
ISBN |
9783319697109 |
|
3319697102 |
|