Tuesday, October 2 |
Invited Talk | Ponnuthurai N. Suganthan:
Differential Evolution: Recent Advances |
Session 1 |
Daniela Genova, Kalpana Mahalingam:
Generating DNA Code Words Using Forbidding and Enforcing Systems |
Invited Talk | Max H. Garzon:
Theory and Applications of DNA Codeword Design |
Poster session |
Shin Watanabe, Atsuko Takamatsu, Yasuhiro Hayashi:
Design of Electric Power Distribution Networks Using a Biologically Inspired Algorithm |
Vladimir Shpilrain, Dima Grigoriev:
Nature-Based Cryptography |
Alexander Spirov, David Holloway:
Using Evolutionary Computations to Understand the Evolutionary Design of Gene Regulatory Networks |
Ilja Kucevalovs, Ojars Krasts, Rusins Freivalds, Thomas Zeugmann:
Influence of Technology on Learning Processes |
Kaspars Balodis, Karlis Jerins, Rusins Freivalds, Agnis Skuskovniks, Ilja Kucevalovs:
Weak Computation by Frequency Finite-State Transducers |
Chu Qin, Xiao Hua Ma, Zhe Shi, Yu Zong Chen:
Evaluation of the Hit and Target Selectivity Performance of Machine Learning Multi-Target Virtual Screening Models |
Lin Tao, Feng Zhu, Yuzong Chen:
Genome-Wide Protein-Protein Interactions Prediction from Amino Acid Sequence Using Support Vector Machines |
Adam Kozaný:
Influence of Forbidding a Rule Type on the Development of PM Colony |
Alina Vasilieva, Elena Shishova:
Quantum Query Algorithms for Computing Multivalued Functions |
Wednesday, October 3 |
Invited Tutorial | Christian Blum:
Hybrid Metaheuristics |
Session 1 | Petr Sosik, Ludek Cienciala:
Tissue P Systems with Cell Separation: Upper Bound by PSPACE |
Tibor Kmet, Maria Kmetova:
Neural Netwoks Solving Free Final Time Optimal |
Darko Stefanovic:
Maze Exploration with Molecular-Scale Walkers |
Session 2 | Sergio Santander-Jiménez, Miguel A. Vega-Rodríguez, Juan A. Gómez-Pulido, Juan M. Sánchez-Pérez:
Comparing Different Operators and Models to Improve a Multiobjective Artificial Bee Colony Algorithm for Inferring Phylogenies
|
Víctor Berrocal-Plaza, Miguel A. Vega-Rodríguez, Juan M. Sánchez-Pérez, Juan A. Gómez-Pulido:
A Multi-Objective Approach to Solve the Location Areas Problem |
Michel Boyer, Ran Gelles, Tal Mor:
Attacks on QKD with Fixed Apparatus |
Ran Gelles, Tal Mor:
On the Security of Interferometric Quantum Key Distribution |