Choice Outstanding Academic Title, 2006
Evolutionary computation, the use of evolutionary systems as computational processes for solving complex problems, is a tool used by computer scientists and engineers who want to harness the power of evolution to build useful new artifacts, by biologists interested in developing and testing better models of natural evolutionary systems, and by artificial life scientists for designing and implementing new artificial evolutionary worlds. In this clear and comprehensive introduction to the field, Kenneth De Jong presents an integrated view of the state of the art in evolutionary computation. Although other books have described such particular areas of the field as genetic algorithms, genetic programming, evolution strategies, and evolutionary programming, Evolutionary Computation is noteworthy for considering these systems as specific instances of a more general class of evolutionary algorithms. This useful overview of a fragmented field is suitable for classroom use or as a reference for computer scientists and engineers.
About the Author
Kenneth A. De Jong is Professor of Computer Science at George Mason University and the founding editor of the journal Evolutionary Computation (MIT Press).
Access 2010 For Dummies
A friendly, step-by-step guide to the Microsoft Office databaseapplication
Access may be the least understood and most challengingapplication in the Microsoft Office suite. This guide is designedto help anyone who lacks experience in creating and managing adatabase learn to use Access 2010 quickly and easily.
Beyond the Bottom Line: Socially Innovative Business Owners
Quarter examines business owners who use their firms as laboratories for social innovation. After providing an introduction to this phenomenon in an historical perspective and discussing the 19th-century British industrialist Robert Owen, he provides ll case studies of contemporary innovators from six countries-the UK, US, the Netherlands,...
CCIE Security Exam Certification Guide (CCIE Self-Study)
Official self-study test preparation guide for the CCIE Security written exam
Review all CCIE Security written exam topics, including:
- Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
- DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
Model Generation for Natural Language Interpretation and Analysis Mathematical theorem proving has undergone an impressive development during the last two decades, resulting in a variety of powerful systems for applications in mathematical deduction and knowledge processing. Natural language processing has become a topic of outstanding relevance in information technology, mainly due to the explosive growth of the... Microsoft SQL Server 2012 High-Performance T-SQL Using Window Functions
Window functions, to me, are the most profound feature supported by both standard
SQL and Microsoft SQL Server’s dialect—T-SQL. They allow you to perform
calculations against sets of rows in a flexible, clear, and efficient manner. The design of
window functions is ingenious, overcoming a number of...