Zobrazeno 1 - 10
of 74
pro vyhledávání: '"Juan-Julián Merelo Guervós"'
Publikováno v:
Symmetry, Vol 15, Iss 2, p 467 (2023)
Designing a controller is typically an iterative process during which engineers must assess the performance of a design through time-consuming simulations; this becomes even more burdensome when using a population-based metaheuristic that evaluates e
Externí odkaz:
https://doaj.org/article/4ad74857927c4b93890522438bd397d9
Publikováno v:
IEEE Transactions on Games. 14:318-327
Publikováno v:
Frontiers in Robotics and AI, Vol 4 (2018)
Cloud computing is currently the prevailing mode of designing, creating, and deploying complex applications, and it has implied a paradigm shift in all three areas; even if it taps and extends previous concepts such as service oriented, concurrent, a
Externí odkaz:
https://doaj.org/article/d3a14f30eeb84fa18c3f1e5499078d7e
Publikováno v:
Future Generation Computer Systems. 116:234-252
Splitting a population into multiple instances is a technique used extensively in recent years to help improve the performance of nature-inspired optimization algorithms. Work on those populations can be done in parallel, and they can interact asynch
Autor:
Mario García-Valdez, Amaury Hernandez-Aguila, Oscar Castillo Lopez, Manuel Castañón-Puga, Juan-Julián Merelo-Guervós
Publikováno v:
IEEE Access, Vol 9, Pp 69391-69404 (2021)
This paper presents a method for creating Forex market predictive models using multi-agent and fuzzy systems, which have the objective of simulating the interactions that provoke changes in the price. Agents in the system represent traders performing
Delivering diverse web server configuration in a moving target defense using evolutionary algorithms
Publikováno v:
GECCO Companion
Creating diverse service configurations that can be swiftly swapped is the essence of the so called Moving Target Defense: presenting a different attack surface for attackers profiling a system for further advances can be applied to many different se
Publikováno v:
GECCO Companion
Concurrency in evolutionary algorithms allow researchers to leverage the performance of powerful multi-core desktop architectures by parallelizing tasks using a high-level interface. However, concurrency also introduces additional complexity at the m
Publikováno v:
GECCO Companion
Moving target defense is a technique for protecting internet-facing systems via the creation of a variable attack surface, that is, a changing profile that, however, is able to provide the same service to legitimate users. In the case of internet ser
Autor:
Paloma de las Cuevas, Pablo García-Sánchez, Zaineb Chelly Dagdia, Juan Julián Merelo Guervós, María-Isabel García-Arenas
Publikováno v:
EvoCOP 2020-20th European Conference on Evolutionary Computation in Combinatorial Optimisation
EvoCOP 2020-20th European Conference on Evolutionary Computation in Combinatorial Optimisation, Apr 2020, Seville, Spain
Applications of Evolutionary Computation ISBN: 9783030437213
EvoApplications
EvoCOP 2020-20th European Conference on Evolutionary Computation in Combinatorial Optimisation, Apr 2020, Seville, Spain
Applications of Evolutionary Computation ISBN: 9783030437213
EvoApplications
International audience; The security policy rules in companies are generally proposed by the Chief Security Officer (CSO), who must, for instance, select by hand which access events are allowed and which ones should be forbidden. In this work we prop
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a73739d8de55e6a050389bcb17e6b858
https://hal.inria.fr/hal-02880764/document
https://hal.inria.fr/hal-02880764/document
Publikováno v:
Applications of Evolutionary Computation ISBN: 9783030437213
EvoApplications
EvoApplications
Multi-population methods can combine multiple algorithms, with different parameters, interacting with each other at the same time. For instance, a genetic algorithm could find a promising global solution that is not optimal while another algorithm, m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b180c9ad2fa6a43520e3ccf3d1fd6a76
https://doi.org/10.1007/978-3-030-43722-0_44
https://doi.org/10.1007/978-3-030-43722-0_44