Balancing Accuracy and Parsimony in Genetic Programming

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Balancing Accuracy and Parsimony in Genetic Programming

Genetic programming is distinguished from other evolutionary algorithms in that it uses tree representa tions of variable size instead of linear strings of xed length The exible representation scheme is very important because it allows the underlying structure of the data to be discovered automatically One primary di culty however is that the solutions may grow too big without any improvement o...

متن کامل

Balancing Accuracy and Parsimony in

Genetic programming is distinguished from other evolutionary algorithms in that it uses tree representations of variable size instead of linear strings of xed length. The exible representation scheme is very important because it allows the underlying structure of the data to be discovered automatically. One primary diiculty, however, is that the solutions may grow too big without any improvemen...

متن کامل

Genetic Programming, Validation Sets, and Parsimony Pressure

Fitness functions based on test cases are very common in Genetic Programming (GP). This process can be assimilated to a learning task, with the inference of models from a limited number of samples. This paper is an investigation on two methods to improve generalization in GP-based learning: 1) the selection of the best-of-run individuals using a three data sets methodology, and 2) the applicati...

متن کامل

Covariant Parsimony Pressure for Genetic Programming

The parsimony pressure method is perhaps the simplest and most frequently used method to control bloat in genetic programming. In this paper we first reconsider the size evolution equation for genetic programming developed in [24] and rewrite it in a form that shows its direct relationship to Price’s theorem. We then use this new formulation to derive theoretical results that show how to practi...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Evolutionary Computation

سال: 1995

ISSN: 1063-6560,1530-9304

DOI: 10.1162/evco.1995.3.1.17