Balancing Accuracy and Parsimony in Genetic Programming
نویسندگان
چکیده
منابع مشابه
Balancing Accuracy and Parsimony in Genetic Programming
Genetic programming is distinguished from other evolutionary algorithms in that it uses tree representa tions of variable size instead of linear strings of xed length The exible representation scheme is very important because it allows the underlying structure of the data to be discovered automatically One primary di culty however is that the solutions may grow too big without any improvement o...
متن کاملBalancing Accuracy and Parsimony in
Genetic programming is distinguished from other evolutionary algorithms in that it uses tree representations of variable size instead of linear strings of xed length. The exible representation scheme is very important because it allows the underlying structure of the data to be discovered automatically. One primary diiculty, however, is that the solutions may grow too big without any improvemen...
متن کاملGenetic Programming, Validation Sets, and Parsimony Pressure
Fitness functions based on test cases are very common in Genetic Programming (GP). This process can be assimilated to a learning task, with the inference of models from a limited number of samples. This paper is an investigation on two methods to improve generalization in GP-based learning: 1) the selection of the best-of-run individuals using a three data sets methodology, and 2) the applicati...
متن کاملCovariant Parsimony Pressure for Genetic Programming
The parsimony pressure method is perhaps the simplest and most frequently used method to control bloat in genetic programming. In this paper we first reconsider the size evolution equation for genetic programming developed in [24] and rewrite it in a form that shows its direct relationship to Price’s theorem. We then use this new formulation to derive theoretical results that show how to practi...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Evolutionary Computation
سال: 1995
ISSN: 1063-6560,1530-9304
DOI: 10.1162/evco.1995.3.1.17