


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 162 matches
- 2010
- Sharifah Sakinah Syed Ahmad, Witold Pedrycz:
A Comparative Study of Genetic Algorithms, Particle Swarm Optimization, and Differential Evolution in Problem of Feature Selection through Structure Retention. GEM 2010: 49-54 - Hussein Al-Helal, Rose F. Gamble:
Web Service Composition with Dominance-based Filtering and Partial Unfolded Loops. GEM 2010: 71-77 - Habtemariam Alemu, Surendra Kumar:
Inverse Kinematics Solution of 6 DOF Industrial Robot Manipulator Using Neural Network. GEM 2010: 159-165 - Kartheek Atluri, Walter Potter:
Approaching the Snake-In-The-Box Problem Using Nature Inspired Search. GEM 2010: 146-152 - Faezeh Sadat Babamir, Esmaeil Amini, Seyed Mehrdad Babamir, Ali Norouzi, Burak Berk Üstündag:
Genetic Algorithm and Software Testing based on Independent Path Concept. GEM 2010: 180-186 - Waldemar Pérez Bailón, Edmundo Barrera Cardiel, Ignacio Juarez Campos, Antonio Ramos Paz:
Mechanical Energy Optimization in Trajectory Planning for Six DOF Robot Manipulators Based on Eighth-Degree Polynomial Functions, a Genetic Algorithm and a Parallel Processing Technique Based on Multithreading. GEM 2010: 203-208 - Chandradeo Bokhoree, Beenesh Motah:
Optimal Marine Resourse Planning using Fuzzy Inference System. GEM 2010: 173-179 - Andreas M. Chwatal, Günther R. Raidl:
Solving the Minimum Label Spanning Tree Problem by Ant Colony Optimization. GEM 2010: 91-97 - Anders Dahlbom, Lars Niklasson, Göran Falkman:
Evolving Petri Nets for Situation Recognition. GEM 2010: 29-25 - Gerry V. Dozier, Joshua Adams, Damon L. Woodard, Kelvin S. Bryant, Philip E. Miller:
A Comparison of Two Genetic & Evolutionary Feature Selection Strategies for Periocular-Based Biometric Recognition via X-TOOLSS. GEM 2010: 215- - Ricardo López Guevara:
Reducing the Bandwidth of a Sparse Symmetric Matrix with Genetic Algorithmic. GEM 2010: 209-214 - Oomesh Gukhool, Chandradeo Bokhoree:
Investigating Potentials of Artificial Ants When Exposed to New Solid Waste Collection Constraints. GEM 2010: 104-110 - Zia Haq, Arif A. Anwar:
Multimachine Scheduling with Setup using Genetic Algorithm. GEM 2010: 78-82 - Muhammad Shaheer Hasan, Hajra Klair:
Monarch Butterfly Inspired Migration Pattern for Multi-Population Genetic Algorithms. GEM 2010: 83-90 - David L. Hibler:
An Active Region Approach to Genetic Algorithms. GEM 2010: 23-28 - Peter Jamieson:
Revisiting Genetic Algorithms for the FPGA Placement Problem. GEM 2010: 16-22 - Fredrik Johansson, Göran Falkman:
A Suite of Metaheuristic Algorithms for Static Weapon-Target Allocation. GEM 2010: 132-138 - Oliver Kramer, Benjamin Satzger, Jörg Lässig:
Managing Energy in a Virtual Power Plant Using Learning Classifier Systems. GEM 2010: 111-117 - Sunil Pranit Lal, Koji Yamada, Satoshi Endo:
Enhanced Differential Evolution Algorithm for Dynamic Vector Space. GEM 2010: 59-64 - Fei Li, Wei Wang, Min Zhou, Baoyu Zheng:
Quantum Genetic Algorithm for Signal Detection in MIMO-OFDM Systems. GEM 2010: 55-58 - Shih-Che Lo, Ching-Yu Wang:
A PSO Approach for the Vehicle Routing Problem with Cross-docking in Logistics Management. GEM 2010: 98-103 - Fernando Martín Monar, Carla González, Luis Moreno, Dolores Blanco:
Accelerated Localization in Noisy 3D Environments using Differential Evolution. GEM 2010: 166-172 - Venu K. Murthy:
Epochal Evolution through Cooperation and Innovation: Agent-based Simulation. GEM 2010: 194-202 - Tomasz Oliwa, Khaled Rasheed:
A Machine Learning Approach for Sensitivity Inference in Genetic Algorithms. GEM 2010: 36-41 - Luis Daniel Otero, Carlos E. Otero, Adrian M. Peter:
Decision Framework for Capability Evaluations of Software Engineers Using Imprecise Parameters. GEM 2010: 139-145 - Chris Scogings, Kenneth A. Hawick:
Elucidating Soldier and Worker Caste Divisions in an Animat Artificial Life Model. GEM 2010: 187-193 - Heidar Ali Shayanfar, Reza Etemad, Reza Navabi:
Optimal Placement of Multi-Type FACTS Devices in Power Systems via Mixed Integer Non-Linear Programming. GEM 2010: 153-158 - Gurvinder Singh, Jasbir Singh:
Performance Analysis of the Task Scheduling on Heterogeneous Parallel System Using Genetic Algorithm. GEM 2010: 65-70 - Lucas A. Wilson, John A. Lockman III, Michael Scherger:
Comparing the Effects of Varying Methods of Infection Spread in an Immune System-based Scheduler. GEM 2010: 9-15 - Daniela Xhemali, Chris J. Hinde, Roger G. Stone:
Genetic Evolution of Regular Expressions for the Automated Extraction of Course Names from the Web. GEM 2010: 118-124
skipping 132 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-26 11:37 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint