Author of the publication

Emergent Tangled Program Graphs in Multi-Task Learning.

, and . IJCAI, page 5294-5298. ijcai.org, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Training genetic programming on half a million patterns: an example from anomaly detection., , and . IEEE Trans. Evol. Comput., 9 (3): 225-239 (2005)Digital library query clearing using clustering and fuzzy decision-making., , and . Inf. Process. Manag., 36 (4): 571-583 (2000)Growing recurrent self organizing map., , and . SMC, page 290-295. IEEE, (2007)Using Code Bloat to Obfuscate Evolved Network Traffic., , and . EvoApplications (2), volume 6025 of Lecture Notes in Computer Science, page 101-110. Springer, (2010)Automatically Evading IDS Using GP Authored Attacks., , and . CISDA, page 153-160. IEEE, (2007)On run time libraries and hierarchical symbiosis., , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2012)Better trade exits for foreign exchange currency trading using FXGP., , and . CEC, page 2510-2517. IEEE, (2015)Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race., , and . Appl. Soft Comput., 11 (7): 4366-4383 (2011)The effect of routing under local information using a social insect metaphor., , and . IEEE Congress on Evolutionary Computation, page 1438-1443. IEEE, (2002)Genetic programming with external memory in sequence recall tasks., and . GECCO Companion, page 518-521. ACM, (2022)