Author of the publication

An effective diversity promotion mechanism in grammatical evolution.

, , and . GECCO (Companion), page 247-248. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Completion and Refinement of Verification Sets for Microprocessor Cores., , and . EvoWorkshops, volume 3449 of Lecture Notes in Computer Science, page 205-214. Springer, (2005)Post-Silicon Validation of IEEE 1687 Reconfigurable Scan Networks., , , and . ETS, page 1-6. IEEE, (2019)Evolving Warriors for the Nano Core., , and . CIG, page 272-278. IEEE, (2006)On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator., , , and . IVSW, page 31-37. IEEE, (2018)Simulation-based verification of network protocols performance., , , , , and . CHARME, volume 105 of IFIP Conference Proceedings, page 236-251. Chapman & Hall, (1997)Automatic Test Bench Generation for Validation of RT-Level Descriptions: An Industrial Experience., , , , and . DATE, page 385-389. IEEE Computer Society / ACM, (2000)On the test of microprocessor IP cores., , , and . DATE, page 209-213. IEEE Computer Society, (2001)A genetic algorithm-based system for generating test programs for microprocessor IP cores., , , and . ICTAI, page 195-198. IEEE Computer Society, (2000)Malware Obfuscation through Evolutionary Packers., , , , and . GECCO (Companion), page 757-758. ACM, (2015)Automatic Test Program Generation from RT-Level Microprocessor Descriptions., , , and . ISQED, page 120-125. IEEE Computer Society, (2002)