Exploration and exploitation in evolutionary algorithms: A survey

M Črepinšek, SH Liu, M Mernik - ACM computing surveys (CSUR), 2013 - dl.acm.org
“Exploration and exploitation are the two cornerstones of problem solving by search.” For
more than a decade, Eiben and Schippers' advocacy for balancing between these two …

Limits on fundamental limits to computation

IL Markov - Nature, 2014 - nature.com
An indispensable part of our personal and working lives, computing has also become
essential to industries and governments. Steady improvements in computer hardware have …

A rewriting system for convex optimization problems

A Agrawal, R Verschueren, S Diamond… - Journal of Control and …, 2018 - Taylor & Francis
We describe a modular rewriting system for translating optimization problems written in a
domain-specific language (DSL) to forms compatible with low-level solver interfaces …

[HTML][HTML] Model-driven engineering: A survey supported by the unified conceptual model

AR Da Silva - Computer Languages, Systems & Structures, 2015 - Elsevier
During the last decade a new trend of approaches has emerged, which considers models
not just documentation artefacts, but also central artefacts in the software engineering field …

Decor: A method for the specification and detection of code and design smells

N Moha, YG Guéhéneuc, L Duchien… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
Code and design smells are poor solutions to recurring implementation and design
problems. They may hinder the evolution of a system by making it hard for software …

A graph-based methodology for constructing computational models that automates adjoint-based sensitivity analysis

V Gandarillas, AJ Joshy, MZ Sperry, AK Ivanov… - Structural and …, 2024 - Springer
The adjoint method provides an efficient way to compute sensitivities for system models with
a large number of inputs. However, implementing the adjoint method requires significant …

The Spoofax language workbench: rules for declarative specification of languages and IDEs

LCL Kats, E Visser - Proceedings of the ACM international conference on …, 2010 - dl.acm.org
Spoofax is a language workbench for efficient, agile development of textual domain-specific
languages with state-of-the-art IDE support. Spoofax integrates language processing …

Artificial intelligence driven design of catalysts and materials for ring opening polymerization using a domain-specific language

NH Park, M Manica, J Born, JL Hedrick… - Nature …, 2023 - nature.com
Advances in machine learning (ML) and automated experimentation are poised to vastly
accelerate research in polymer science. Data representation is a critical aspect for enabling …

Domain-specific languages: A systematic map** study

T Kosar, S Bohra, M Mernik - Information and Software Technology, 2016 - Elsevier
Context: In this study we report on a Systematic Map** Study (SMS) for Domain-Specific
Languages (DSLs), based on an automatic search including primary studies from journals …

The pochoir stencil compiler

Y Tang, RA Chowdhury, BC Kuszmaul, CK Luk… - Proceedings of the …, 2011 - dl.acm.org
A stencil computation repeatedly updates each point of ad-dimensional grid as a function of
itself and its near neighbors. Parallel cache-efficient stencil algorithms based on" trapezoidal …