• Publications
  • Influence
Why eve and mallory love android: an analysis of android SSL (in)security
Many Android apps have a legitimate need to communicate over the Internet and are then responsible for protecting potentially sensitive data during transit. This paper seeks to better understand theExpand
  • 453
  • 57
Fitness landscape analysis and memetic algorithms for the quadratic assignment problem
In this paper, a fitness landscape analysis for several instances of the quadratic assignment problem (QAP) is performed, and the results are used to classify problem instances according to theirExpand
  • 413
  • 32
A genetic local search algorithm for solving symmetric and asymmetric traveling salesman problems
  • B. Freisleben, P. Merz
  • Mathematics, Computer Science
  • Proceedings of IEEE International Conference on…
  • 20 May 1996
The combination of local search heuristics and genetic algorithms is a promising approach for finding near-optimum solutions to the traveling salesman problem (TSP). An approach is presented in whichExpand
  • 296
  • 31
Genetic local search for the TSP: new results
The combination of local search heuristics and genetic algorithms has been shown to be an effective approach for finding near-optimum solutions to the traveling salesman problem. Previously proposedExpand
  • 269
  • 21
A comparison of memetic algorithms, tabu search, and ant colonies for the quadratic assignment problem
A memetic algorithm (MA), i.e. an evolutionary algorithm making use of local search, for the quadratic assignment problem is presented. A new recombination operator for realizing the approach isExpand
  • 172
  • 12
Greedy and Local Search Heuristics for Unconstrained Binary Quadratic Programming
In this paper, a greedy heuristic and two local search algorithms, 1-opt local search and k-opt local search, are proposed for the unconstrained binary quadratic programming problem (BQP). TheseExpand
  • 145
  • 12
ANIMAL: A System for Supporting Multiple Roles in Algorithm Animation
Abstract Many algorithm animation tools have been developed over the last years. The users of such tools can be separated into four roles: the original algorithm programmer, developers of theExpand
  • 131
  • 12
CARDWATCH: a neural network based database mining system for credit card fraud detection
CARDWATCH, a database mining system used for credit card fraud detection, is presented. The system is based on a neural network learning module, provides an interface to a variety of commercialExpand
  • 323
  • 11
Fitness Landscapes, Memetic Algorithms, and Greedy Operators for Graph Bipartitioning
The fitness landscape of the graph bipartitioning problem is investigated by performing a search space analysis for several types of graphs. The analysis shows that the structure of the search spaceExpand
  • 163
  • 11
New Genetic Local Search Operators for the Traveling Salesman Problem
In this paper, an approach is presented to incorporate problem specific knowledge into a genetic algorithm which is used to compute near-optimum solutions to traveling salesman problems (TSP). TheExpand
  • 182
  • 9