Open issues in genetic programming
نویسندگان
چکیده
منابع مشابه
Genetic Programming - Introduction, Applications, Theory and Open Issues
Genetic programming (GP) is an evolutionary approach that extends genetic algorithms to allow the exploration of the space of computer programs. Like other evolutionary algorithms, GP works by defining a goal in the form of a quality criterion (or fitness) and then using this criterion to evolve a set (or population) of candidate solutions (individuals) by mimicking the basic principles of Darw...
متن کاملRefactoring in Feature-Oriented Programming: Open Issues
Similar to refactoring, feature-oriented programming can be seen as a metaprogramming paradigm, in which programs are values and composition operators transform programs to programs. In this position paper we discuss open issues of applying refactoring in the context of feature-oriented programming. First, we elaborate on the role of refactoring in maintaining features and their implementations...
متن کاملLateral genetic transfer: open issues.
Lateral genetic transfer (LGT) is an important adaptive force in evolution, contributing to metabolic, physiological and ecological innovation in most prokaryotes and some eukaryotes. Genomic sequences and other data have begun to illuminate the processes, mechanisms, quantitative extent and impact of LGT in diverse organisms, populations, taxa and environments; deep questions are being posed, ...
متن کاملGenetic Programming in C++: Implementation Issues
The purpose of our current research is to investigate the design and implementation of a Genetic Programming platform in C++, with primary focus on efficiency and flexibility. In this chapter we consider the lower level implementation aspects of such a platform, specifically, the Genome Interpreter. The fact that Genetic Programming is a computationally expensive task means that the overall eff...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Genetic Programming and Evolvable Machines
سال: 2010
ISSN: 1389-2576,1573-7632
DOI: 10.1007/s10710-010-9113-2