Refine
Year of publication
Document Type
- Article (52)
- Conference Proceeding (45)
- Part of a Book (6)
- Book (5)
- Report (3)
- Working Paper (1)
Institute
- Department of Computer Science (Ende 2021 aufgelöst; Integration in die übergeordnete OE Technik) (112) (remove)
Language
- English (112) (remove)
Is part of the Bibliography
- yes (112) (remove)
Keywords
- Volatile organic compounds (5)
- Evolution strategy (4)
- Mathematical model (4)
- self-adaptation (4)
- Artificial Intelligence (incl. Robotics) (3)
- Fragmentation patterns (3)
- Humans (3)
- Information Systems Applications (incl. Internet) (3)
- convex integral functional (3)
- evolution strategies (3)
- mutation strength (3)
- Aldehydes (2)
- Algorithm Analysis and Problem Complexity (2)
- Breath gas analysis (2)
- Bregman distance (2)
- Computer Applications (2)
- Discrete Mathematics in Computer Science (2)
- Gas Chromatography-Mass Spectrometry (2)
- I-divergence (2)
- Image Processing and Computer Vision (2)
- Male (2)
- Model risk (2)
- Multiple priors (2)
- NO+ reactions (2)
- PTR-MS (2)
- Pattern Recognition (2)
- Relative entropy (2)
- SRI-TOF-MS (2)
- Stress testing (2)
- User Interfaces and Human Computer Interaction (2)
- VOCs (2)
- Vectors (2)
- f-divergence (2)
- linear programming (2)
- maximum entropy principle (2)
- meta-es (2)
- portfolio optimization (2)
- progress rate (2)
- +INC 365 EVA (1)
- +INC 371 MAL (1)
- 35P05, 34L40 (Primary) 34B20, 34B24 (Secondary) (1)
- 3D graphics (1)
- 92C35 (1)
- 92C45 (1)
- 93B07 (1)
- 93C10 (1)
- Acceptance (1)
- Acetone (1)
- Adult (1)
- Agent-based simulation testing (1)
- Aging (1)
- Air (1)
- Algorithm comparison (1)
- Algorithm design and analysis (1)
- Alkanes (1)
- Alkenes (1)
- Almost worst case densities (1)
- Alternative routing (1)
- Ambient Assisted Living (1)
- Anaesthetics (1)
- Analytical models (1)
- Anesthesia (1)
- Animals (1)
- Anonymizing recorded tracks (1)
- App usage (1)
- Applications of Mathematics (1)
- Approximation methods (1)
- Authentication (1)
- Automatic Analyse Framework (1)
- Biochemistry, general (1)
- Biomarker (1)
- Biomedical Engineering (1)
- Biomedical monitoring (1)
- Biophysics and Biological Physics (1)
- Biotechnology (1)
- Blender (1)
- Blood (1)
- Blood analysis (1)
- Brain modeling (1)
- Breath Tests (1)
- Breath analysis (1)
- Bregman ball (1)
- CMSA-ES (1)
- Cardiac Output (1)
- Cell Biology (1)
- Cell Line (1)
- Code Execution (1)
- Code testing (1)
- Computation by Abstract Devices (1)
- Computational Biology/Bioinformatics (1)
- Computer Communication Networks (1)
- Computer Graphics (1)
- Computer Imaging, Vision, Pattern Recognition and Graphics (1)
- Computer Simulation (1)
- Computer System Implementation (1)
- Computer Systems Organization and Communication Networks (1)
- Computers (1)
- Computers and Society (1)
- Computing Milieux (1)
- Constrained optimization (1)
- Constraint optimization (1)
- Constraints (1)
- Convex functions (1)
- Covariance matrix (1)
- Covariance matrix adaptation (1)
- Creativity (1)
- Credit risk (1)
- D/H isotopic exchange (1)
- Data Mining and Knowledge Discovery (1)
- Data models (1)
- Database Management (1)
- Databases (1)
- Design Thinking (1)
- Deuterated volatile organic compounds (1)
- Digital twin (1)
- Distributed computing (1)
- Dow Jones Index (1)
- Duchenne muscular dystrophy (1)
- EC2 compatible cloud infrastructures (1)
- Earthquake (1)
- Educational institutions (1)
- Ellipsoid model (1)
- Ellipsoids (1)
- Emission rate (1)
- End-stage renal disease (1)
- Entrapment (1)
- Entrapped victims (1)
- Evolution strategies (1)
- Evolutionary algorithms (1)
- Evolutionärer Algorithmus (1)
- Execution environment (1)
- Exhalation (1)
- Exhaled breath analysis (1)
- Female (1)
- GC–MS (1)
- Geriatrics/Gerontology (1)
- Gesture recognition (1)
- Graphics (1)
- HOreactions (1)
- HUVEC (1)
- Halogenated ethers (1)
- Health Gluten-free diet (1)
- Hemodialysis (1)
- Heterocyclic compounds (1)
- Human computer interaction (1)
- Human odor (1)
- Human scent (1)
- Human skin emanation (1)
- Human volatilome (1)
- Human-in-the-loop (1)
- IP networks (1)
- Influence (1)
- Information Systems and Communication Service (1)
- Information theory (1)
- Interaction (1)
- Isoflurane (1)
- Isoprene (1)
- Kerberos-based security concept (1)
- Kinect for Windows (1)
- Latency (1)
- Levenberg-Marquardt algorithm (1)
- Lighting (1)
- Limit of Detection (1)
- MCSS (1)
- Maschinelles Lernen (1)
- Mathematical Physics (1)
- Mathematical and Computational Biology (1)
- Mathematics - Spectral Theory (1)
- Maximum loss (1)
- Media Design (1)
- Meta evolution strategies (1)
- Microsoft Kinect (1)
- Middle Aged (1)
- Mindsets (1)
- Mixed reality (1)
- Mobility (1)
- Model specification (1)
- Modeling (1)
- Models and Principles (1)
- Models, Biological (1)
- Monitoring (1)
- Motion Capturing (1)
- Motion Detection (1)
- Motivation (1)
- Multimedia Information Systems (1)
- Muscle (1)
- Muscle Cells (1)
- Muscle, Skeletal (1)
- Mutation strength adaptation (1)
- Needle trap (1)
- Noisy optimization (1)
- Optimization (1)
- PTR-TOF-MS (1)
- PTR-ToF-MS (1)
- Parallel computing (1)
- Payoff function (1)
- Persuasion (1)
- Pharmacokinetics (1)
- Pharmacology/Toxicology (1)
- Pilot Projects (1)
- Portfolios (1)
- Problem Solving Environment (1)
- Protocols (1)
- Psychology (1)
- Pythagorean identity (1)
- R & D/Technology Policy (1)
- Rats (1)
- Release (1)
- Reproducibility of Results (1)
- Risk measure (1)
- Risk measures (1)
- SPME-GCMS (1)
- Scenario analysis (1)
- Scientific Data Preservation (1)
- Scientific Dataspace (1)
- Search and rescue operation (1)
- Servers (1)
- Software Engineering/Programming and Operating Systems (1)
- Software framework (1)
- Solid Phase Microextraction (1)
- Special Purpose and Application-Based Systems (1)
- Standards (1)
- Stochastic gradient approximation (1)
- Test driven development (1)
- Three-dimensional displays (1)
- Time Factors (1)
- Touch (1)
- Transportation mode detection (1)
- Travel behavior analysis (1)
- Uncertainty (1)
- Uptake (1)
- Urban environment (1)
- Uremic syndrome (1)
- User engagement (1)
- User interface (1)
- VM-instances (1)
- VOC (1)
- VR environments (1)
- Visualization (1)
- Volatile marker (1)
- Volatile organic compound (1)
- Voluntary travel behavioral change (1)
- Windows (1)
- Worst case (1)
- Worst case density (1)
- Worst case search (1)
- adaptation (1)
- adaption (1)
- algorithm engineering (1)
- algorithms and complexity (1)
- almost worst scenarios (1)
- ambiguity aversion (1)
- breath gas analysis community (1)
- cardinality constraint (1)
- classification (1)
- client authentication (1)
- cloud based analysis (1)
- cloud based e-science infrastructure (1)
- cloud computing (1)
- cloud-based code execution framework (1)
- clustering (1)
- concave programming (1)
- constraint covariance matrix self-adaptation evolution strategy design (1)
- convex integral functionals (1)
- covariance matrices (1)
- covariance matrix self-adaptation evolution strategy (1)
- cryptographic protocols (1)
- divergence preferences (1)
- dynamical systems approach (1)
- e-Science Study Reproducibility (1)
- elderly (1)
- ellipsoid model (1)
- elliptic model (1)
- evolutionary algorithms (1)
- f-divergence ball (1)
- finance (1)
- fitness noise (1)
- forward Kerberos tickets (1)
- generalized exponential family (1)
- geometric intuition (1)
- geometry (1)
- graphical user interfaces (1)
- heterogeneous distributed e-science infrastructures (1)
- human centered design (1)
- information geometry (1)
- information system (1)
- investment (1)
- large-scale collaborations (1)
- linear inequalities (1)
- machine learning (1)
- mathematical finance (1)
- medical computing (1)
- message authentication (1)
- mixed linear-nonlinear constrained optimization problem (1)
- moment constraints (1)
- motion capturing sensor systems (1)
- motion compensation (1)
- motivation stategy (1)
- natural sensor (1)
- natural user interface (1)
- noisy ellipsoid model (1)
- nonconvex optimization (1)
- nonconvex optimization problem (1)
- nonlinear programming (1)
- optimization (1)
- physical activity (1)
- pneumodynamics (1)
- population size (1)
- population size control (1)
- prediction (1)
- risk analysis (1)
- scientific private data (1)
- search engine (1)
- security credential injection (1)
- semantic technologies (1)
- sharp ridge function (1)
- soft computing (1)
- software packages (1)
- sphere model (1)
- tags (1)
- technology prototypes (1)
- time series (1)
- time series data (1)
- user authentication (1)
- virtual machines (1)
- virtual reality (1)
A modified matrix adaptation evolution strategy with restarts for constrained real-world problems
(2020)
In combination with successful constraint handling techniques, a Matrix Adaptation Evolution Strategy (MA-ES) variant (the εMAg-ES) turned out to be a competitive algorithm on the constrained optimization problems proposed for the CEC 2018 competition on constrained single objective real-parameter optimization. A subsequent analysis points to additional potential in terms of robustness and solution quality. The consideration of a restart scheme and adjustments in the constraint handling techniques put this into effect and simplify the configuration. The resulting BP-εMAg-ES algorithm is applied to the constrained problems proposed for the IEEE CEC 2020 competition on Real-World Single-Objective Constrained optimization. The novel MA-ES variant realizes improvements over the original εMAg-ES in terms of feasibility and effectiveness on many of the real-world benchmarks. The BP-εMAg-ES realizes a feasibility rate of 100% on 44 out of 57 real-world problems and improves the best-known solution in 5 cases.
With Cloud Computing and multi-core CPUs parallel computing resources are becoming more and more affordable and commonly available. Parallel programming should as well be easily accessible for everyone. Unfortunately, existing frameworks and systems are powerful but often very complex to use for anyone who lacks the knowledge about underlying concepts. This paper introduces a software framework and execution environment whose objective is to provide a system which should be easily usable for everyone who could benefit from parallel computing. Some real-world examples are presented with an explanation of all the steps that are necessary for computing in a parallel and distributed manner.