no code implementations • 5 Oct 2018 • A. Maesani, G. Iacca, D. Floreano
The performance of evolutionary algorithms can be heavily undermined when constraints limit the feasible areas of the search space.
1 code implementation • 5 Oct 2018 • D. Bucur, G. Iacca, M. Gaudesi, G. Squillero, A. Tonda
This new type of configuration, however, poses new challenges to security, amongst them, assessing the effect that a group of colluding malicious participants can have on the global message delivery rate in such a network is far from trivial.