


default search action
Theoretical Computer Science, Volume 785
Volume 785, September 2019
- Lila Kari:

Editorial. iii - C. R. Noordman

, Gerard A. W. Vreeswijk:
Evolving novelty strategies for the Iterated Prisoner's Dilemma in deceptive tournaments. 1-16 - Keenan Breik, Chris Thachuk, Marijn Heule, David Soloveichik

:
Computing properties of stable configurations of thermodynamic binding networks. 17-29 - Patrick Spettel

, Hans-Georg Beyer
:
Analysis of the (1, λ)-σ-Self-Adaptation Evolution Strategy with repair by projection applied to a conically constrained problem. 30-45 - Tobias Friedrich

, Timo Kötzing, Martin S. Krejca
:
Unbiasedness of estimation-of-distribution algorithms. 46-59 - Jacek Waldmajer

, Zbigniew Bonikowski, Sebastian Sakowski
:
Theory of tailor automata. 60-82 - Felipe S. Abrahão

, Klaus Wehmuth
, Artur Ziviani:
Algorithmic networks: Central time to trigger expected emergent open-endedness. 83-116 - Mark N. Ellingham, Joanna A. Ellis-Monaghan:

Edge-outer graph embedding and the complexity of the DNA reporter strand problem. 117-127 - Yo-Sub Han, Hwee Kim:

Ruleset optimization on isomorphic oritatami systems. 128-139 - Liucheng Liu, Wenmei Yi, Qian Yang, Hong Peng, Jun Wang:

Numerical P systems with Boolean condition. 140-149 - Hafsteinn Einarsson

, Marcelo Matheus Gauy, Johannes Lengler
, Florian Meier, Asier Mujika, Angelika Steger, Felix Weissenberger:
The linear hidden subset problem for the (1 + 1) EA with scheduled and adaptive mutation rates. 150-170

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














