Exploration and exploitation in evolutionary algorithms: A survey
“Exploration and exploitation are the two cornerstones of problem solving by search.” For
more than a decade, Eiben and Schippers' advocacy for balancing between these two …
more than a decade, Eiben and Schippers' advocacy for balancing between these two …
Limits on fundamental limits to computation
IL Markov - Nature, 2014 - nature.com
An indispensable part of our personal and working lives, computing has also become
essential to industries and governments. Steady improvements in computer hardware have …
essential to industries and governments. Steady improvements in computer hardware have …
A rewriting system for convex optimization problems
We describe a modular rewriting system for translating optimization problems written in a
domain-specific language (DSL) to forms compatible with low-level solver interfaces …
domain-specific language (DSL) to forms compatible with low-level solver interfaces …
[HTML][HTML] Model-driven engineering: A survey supported by the unified conceptual model
AR Da Silva - Computer Languages, Systems & Structures, 2015 - Elsevier
During the last decade a new trend of approaches has emerged, which considers models
not just documentation artefacts, but also central artefacts in the software engineering field …
not just documentation artefacts, but also central artefacts in the software engineering field …
Decor: A method for the specification and detection of code and design smells
Code and design smells are poor solutions to recurring implementation and design
problems. They may hinder the evolution of a system by making it hard for software …
problems. They may hinder the evolution of a system by making it hard for software …
A graph-based methodology for constructing computational models that automates adjoint-based sensitivity analysis
The adjoint method provides an efficient way to compute sensitivities for system models with
a large number of inputs. However, implementing the adjoint method requires significant …
a large number of inputs. However, implementing the adjoint method requires significant …
The Spoofax language workbench: rules for declarative specification of languages and IDEs
Spoofax is a language workbench for efficient, agile development of textual domain-specific
languages with state-of-the-art IDE support. Spoofax integrates language processing …
languages with state-of-the-art IDE support. Spoofax integrates language processing …
Artificial intelligence driven design of catalysts and materials for ring opening polymerization using a domain-specific language
Advances in machine learning (ML) and automated experimentation are poised to vastly
accelerate research in polymer science. Data representation is a critical aspect for enabling …
accelerate research in polymer science. Data representation is a critical aspect for enabling …
Domain-specific languages: A systematic map** study
Context: In this study we report on a Systematic Map** Study (SMS) for Domain-Specific
Languages (DSLs), based on an automatic search including primary studies from journals …
Languages (DSLs), based on an automatic search including primary studies from journals …
The pochoir stencil compiler
A stencil computation repeatedly updates each point of ad-dimensional grid as a function of
itself and its near neighbors. Parallel cache-efficient stencil algorithms based on" trapezoidal …
itself and its near neighbors. Parallel cache-efficient stencil algorithms based on" trapezoidal …