Ignoble Trails - Where Crossover Is Provably Harmful

نویسندگان

  • J. Neal Richter
  • Alden H. Wright
  • John Paxton
چکیده

Beginning with the early days of the genetic algorithm and the schema theorem it has often been argued that the crossover operator is the more important genetic operator. The early Royal Road functions were put forth as an example where crossover would excel, yet mutation based EAs were subsequently shown to experimentally outperform GAs with crossover on these functions. Recently several new Royal Roads have been introduced and proved to require expected polynomial time for GAs with crossover, while needing exponential time to optimize for mutation-only EAs. This paper does the converse, showing proofs that GAs with crossover require exponential optimization time on new Ignoble Trail functions while mutation based EAs optimize them efficiently.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Management of Complex Technical Processes and Systems by Means of Computational Intelligence Methods Real Royal Road Functions — Where Crossover Provably Is Essential Real Royal Road Functions — Where Crossover Provably Is Essential *

Mutation and crossover are the main search operators of different variants of evolutionary algorithms. Despite the many discussions on the importance of crossover nobody has proved rigorously for some explicitly defined fitness functions fn : {0, 1} n → R that a genetic algorithm with crossover (but without idealization) can optimize fn in expected polynomial time while all evolution strategies...

متن کامل

Optimal Differential Trails in SIMON-like Ciphers

In the present paper, we propose an automatic search algorithm for optimal differential trails in SIMON-like ciphers. First, we give a more accurate upper bound on the differential probability of SIMON-like round function. It is shown that when the Hamming weight of the input difference α, which is denoted by wt(α), is less than one half of the input size, the corresponding maximum differential...

متن کامل

The Security of SIMON-like Ciphers Against Linear Cryptanalysis

In the present paper, we analyze the security of SIMON-like ciphers against linear cryptanalysis. First, an upper bound is derived on the squared correlation of SIMON-like round function. It is shown that the upper bound on the squared correlation of SIMON-like round function decreases with the Hamming weight of output mask increasing. Based on this, we derive an upper bound on the squared corr...

متن کامل

Anomalous critical behavior in the polymer collapse transition of three-dimensional lattice trails.

Trails (bond-avoiding walks) provide an alternative lattice model of polymers to self-avoiding walks, and adding self-interaction at multiply visited sites gives a model of polymer collapse. Recently a two-dimensional model (triangular lattice) where doubly and triply visited sites are given different weights was shown to display a rich phase diagram with first- and second-order collapse separa...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008