default search action
Chiou Peng Lam
Person information
- affiliation: Edith Cowan University, Perth, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c52]Luke Kelly, Martin Masek, Chiou Peng Lam:
Behaviour Discovery in Real-Time Strategy Games using Cooperative Co-evolution with Dynamic Binary Tree Decomposition. GECCO Companion 2024: 287-290 - [c51]Luke Kelly, Martin Masek, Chiou Peng Lam, Brandon Abela, Ashu Gupta:
Evolving Visual Counterfactual Medical Imagery Explanations with Cooperative Co-evolution using Dynamic Decomposition. GECCO Companion 2024: 291-294 - 2023
- [j16]Martin Masek, Chiou Peng Lam, Luke Kelly, Martin Wong:
Discovering optimal strategy in tactical combat scenarios through the evolution of behaviour trees. Ann. Oper. Res. 320(2): 901-936 (2023) - [c50]Martin Masek, Luke Kelly, Jacob Snell, Daniel Wheat, Chiou Peng Lam:
Interactive Evolutionary Computation for Strategy Discovery in Multi-Phase Operations. GECCO Companion 2023: 743-746 - 2022
- [c49]Luke Kelly, Martin Masek, Chiou Peng Lam:
Environment driven dynamic decomposition for cooperative coevolution of multi-agent systems. GECCO 2022: 1218-1226 - 2020
- [j15]Andrew Pech, Chiou Peng Lam, Martin Masek:
Quantifiable Isovist and Graph-Based Measures for Automatic Evaluation of Different Area Types in Virtual Terrain Generation. IEEE Access 8: 216491-216506 (2020)
2010 – 2019
- 2018
- [j14]Martin Masek, Chiou Peng Lam, Cameron Tranthim-Fryer, Bas Jansen, Kevin Baptist:
Sleep monitor: A tool for monitoring and categorical scoring of lying position using 3D camera data. SoftwareX 7: 341-346 (2018) - [c48]Martin Masek, Chiou Peng Lam, Lyndon Benke, Luke Kelly, Michael Papasimeon:
Discovering Emergent Agent Behaviour with Evolutionary Finite State Machines. PRIMA 2018: 19-34 - 2017
- [j13]Martin Masek, Julie Boston, Chiou Peng Lam, S. Corcoran:
Improving mastery of fractions by blending video games into the Math classroom. J. Comput. Assist. Learn. 33(5): 486-499 (2017) - 2016
- [j12]Erwin Adi, Zubair A. Baig, Philip Hingston, Chiou Peng Lam:
Distributed denial-of-service attacks against HTTP/2 services. Clust. Comput. 19(1): 79-86 (2016) - [j11]Andrew Pech, Martin Masek, Chiou Peng Lam, Philip Hingston:
Game level layout generation using evolved cellular automata. Connect. Sci. 28(1): 63-82 (2016) - [c47]Daniel Wheat, Martin Masek, Chiou Peng Lam, Philip Hingston:
Modeling perceived difficulty in game levels. ACSW 2016: 74 - [c46]Vinh Quoc Dang, Chiou Peng Lam:
Gene Selection using a Hybrid Memetic and Nearest Shrunken Centroid Algorithm. BIOINFORMATICS 2016: 190-197 - [c45]Andrew Pech, Chiou Peng Lam, Philip Hingston, Martin Masek:
Using Isovists to Evolve Terrains with Gameplay Elements. EvoApplications (1) 2016: 636-652 - [c44]Hossein Pazhoumand-Dar, Chiou Peng Lam, Martin Masek:
Automatic Generation of Fuzzy Membership Functions using Adaptive Mean-shift and Robust Statistics. ICAART (2) 2016: 160-171 - [c43]Hossein Pazhoumand-Dar, Chiou Peng Lam, Martin Masek:
An Automatic Approach for Generation of Fuzzy Membership Functions. ICAART (Revised Selected Papers) 2016: 247-264 - 2015
- [j10]Samaneh Rastegari, Philip Hingston, Chiou Peng Lam:
Evolving statistical rulesets for network intrusion detection. Appl. Soft Comput. 33: 348-359 (2015) - [j9]Hossein Pazhoumand-Dar, Chiou Peng Lam, Martin Masek:
Joint movement similarities for robust 3D action recognition using skeletal data. J. Vis. Commun. Image Represent. 30: 10-21 (2015) - [c42]Hossein Pazhoumand-Dar, Martin Masek, Chiou Peng Lam:
Unsupervised monitoring of electrical devices for detecting deviations in daily routines. ICICS 2015: 1-6 - [c41]Andrew Pech, Philip Hingston, Martin Masek, Chiou Peng Lam:
Evolving Cellular Automata for Maze Generation. ACALCI 2015: 112-124 - [c40]Erwin Adi, Zubair A. Baig, Chiou Peng Lam, Philip Hingston:
Low-Rate Denial-of-Service Attacks against HTTP/2 Services. ICITCS 2015: 1-5 - [c39]Samaneh Rastegari, Chiou Peng Lam, Philip Hingston:
A Statistical Rule Learning Approach to Network Intrusion Detection. ICITCS 2015: 1-5 - [c38]Hossein Pazhoumand-Dar, Chiou Peng Lam, Martin Masek:
A Novel Fuzzy Based Home Occupant Monitoring System Using Kinect Cameras. ICTAI 2015: 1129-1136 - [c37]Daniel Wheat, Martin Masek, Chiou Peng Lam, Philip Hingston:
Dynamic Difficulty Adjustment in 2D Platformers through Agent-Based Procedural Level Generation. SMC 2015: 2778-2785 - 2013
- [c36]Vinh Quoc Dang, Chiou Peng Lam:
NSC-NSGA2: Optimal search for finding multiple thresholds for nearest shrunken centroid. BIBM 2013: 367-372 - [c35]Vinh Quoc Dang, Chiou Peng Lam, ChangSu Lee:
NSC-GA: Search for optimal shrinkage thresholds for nearest shrunken centroid. CIBCB 2013: 44-51 - [c34]Samaneh Rastegari, Philip Hingston, Chiou Peng Lam, M. Brand:
Testing a distributed denial of service defence mechanism using red teaming. CISDA 2013: 23-29 - 2012
- [c33]Philip Hingston, Tirtha R. Ranjeet, Chiou Peng Lam, Martin Masek:
A Multimodal Problem for Competitive Coevolution. Australasian Conference on Artificial Intelligence 2012: 338-349 - [c32]Tirtha R. Ranjeet, Philip Hingston, Chiou Peng Lam, Martin Masek:
Evaluating coevolution on a multimodal problem. GECCO (Companion) 2012: 1469-1470 - 2011
- [c31]Tirtha R. Ranjeet, Philip Hingston, Chiou Peng Lam, Martin Masek:
Analysis of Key Installation Protection using Computerized Red Teaming. ACSC 2011: 137-144 - [c30]Tirtha R. Ranjeet, Martin Masek, Philip Hingston, Chiou Peng Lam:
The Effects of Diversity Maintenance on Coevolution for an Intransitive Numbers Problem. Australasian Conference on Artificial Intelligence 2011: 331-340 - [c29]ChangSu Lee, Chiou Peng Lam, Martin Masek:
Rough-Fuzzy Hybrid Approach for Identification of Bio-markers and Classification on Alzheimer's Disease Data. BIBE 2011: 84-91
2000 – 2009
- 2009
- [j8]Valerie Maxville, Jocelyn Armarego, Chiou Peng Lam:
Applying a reusable framework for software selection. IET Softw. 3(5): 369-380 (2009) - [c28]Usman Farooq, Chiou Peng Lam:
Evolving the Quality of a Model Based Test Suite. ICST Workshops 2009: 141-149 - [c27]Usman Farooq, Chiou Peng Lam:
A Max-Min Multiobjective Technique to Optimize Model Based Test Suite. SNPD 2009: 569-574 - 2008
- [c26]Savo Kordic, Peng Lam, Jitian Xiao, Huaizhong Li:
Analysis of Alarm Sequences in a Chemical Plant. ADMA 2008: 135-146 - [c25]Usman Farooq, Chiou Peng Lam, Huaizhong Li:
Towards Automated Test Sequence Generation. Australian Software Engineering Conference 2008: 441-450 - [c24]Valerie Maxville, Chiou Peng Lam, Jocelyn Armarego:
Supporting component selection with a suite of classifiers. IEEE Congress on Evolutionary Computation 2008: 3946-3953 - [c23]Usman Farooq, Chiou Peng Lam:
Mutation Analysis for the Evaluation of AD Models. CIMCA/IAWTIC/ISE 2008: 296-301 - [c22]Savo Kordic, Peng Lam, Jitian Xiao, Huaizhong Li:
A Data-Driven Approach for Finding the Threshold Relevant to the Temporal Data Context of an Alarm of Interest. PRICAI 2008: 985-990 - 2007
- [j7]Chiou Peng Lam, Huaizhong Li, Dong Xu:
A model-centric approach for the management of model evolution in chemical process modelling. Comput. Chem. Eng. 31(12): 1633-1662 (2007) - 2006
- [c21]Jitian Xiao, Chiou Peng Lam, Huaizhong Li, Jun Wang:
Reformulation of the generation of conformance testing sequences to the asymmetric travelling salesman problem. GECCO 2006: 1933-1940 - 2005
- [j6]Gareth Lee, John Morris, Kris Parker, Gary A. Bundell, Chiou Peng Lam:
Using symbolic execution to guide test generation. Softw. Test. Verification Reliab. 15(1): 41-61 (2005) - [c20]Robert Chandler, Chiou Peng Lam, Huaizhong Li:
AD2US: An Automated Approach to Generating Usage Scenarios from UML Activity Diagrams. APSEC 2005: 9-16 - [c19]Jun Wang, Jitian Xiao, Chiou Peng Lam, Huaizhong Li:
A Bipartite Graph Approach to Generate Optimal Test Sequences for Protocol Conformance Testing using the Wp-method. APSEC 2005: 307-316 - [c18]Dong Xu, Huaizhong Li, Chiou Peng Lam:
Using Adaptive Agents to Automatically Generate Test Scenarios from the UML Activity Diagrams. APSEC 2005: 385-392 - [c17]Heidi Rose, Chiou Peng Lam, Huaizhong Li:
Using XML in Version Management of Chemical Process Models. APWeb 2005: 643-654 - [c16]Huaizhong Li, Chiou Peng Lam:
Using Anti-Ant-like Agents to Generate Test Threads from the UML Diagrams. TestCom 2005: 69-80 - [c15]Huaizhong Li, Chiou Peng Lam:
An Ant Colony Optimization Approach to Test Sequence Generation for Statebased Software Testin. QSIC 2005: 255-264 - 2004
- [c14]Valerie Maxville, Jocelyn Armarego, Chiou Peng Lam:
Intelligent Component Selection. COMPSAC 2004: 244-249 - [c13]Xiaoqing Bai, Chiou Peng Lam, Huaizhong Li:
An Approach to Generate the Thin-Threads from the UML Diagrams. COMPSAC 2004: 546-552 - [c12]Kamila Bartsch, Mike Robey, Jim Ivins, Chiou Peng Lam:
Consistency checking between use case scenarios and UML sequence diagrams. IASTED Conf. on Software Engineering 2004: 581-589 - [c11]Huaizhong Li, Chiou Peng Lam:
Software Test Data Generation using Ant Colony Optimization. International Conference on Computational Intelligence 2004: 1-4 - [c10]Valerie Maxville, Chiou Peng Lam, Jocelyn Armarego:
Learning to Select Software Components. SEKE 2004: 421-426 - [c9]Xiaoqing Bai, Huaizhong Li, Chiou Peng Lam:
A Risk Analysis Approach to Prioritize UML-Based Software Testing. SNPD 2004: 112-119 - 2003
- [c8]Valerie Maxville, Chiou Peng Lam, Jocelyn Armarego:
Selecting Components: a Process for Context-Driven Evaluation. APSEC 2003: 456- - [c7]John Morris, Chiou Peng Lam, Gary A. Bundell, Gareth Lee, Kris Parker:
Setting a Framework for Trusted Component Trading. Component-Based Software Quality 2003: 128-158 - [c6]Bill Smyth, Chiou Peng Lam, Xin Chen, Valerie Maxville:
Heuristics for Image Retrieval Using Spatial Configurations. DICTA 2003: 909-918 - [c5]Huaizhong Li, Chiou Peng Lam:
An Evolutionary Approach for Optimisation of State-based Test Suites for Software Systems. SNPD 2003: 226-233 - [c4]Chiou Peng Lam, Michael C. Robey, Huaizhong Li:
Application of AI for Automation of Software Testing. SNPD 2003: 242-249 - 2002
- [c3]John Morris, Chiou Peng Lam, Gareth Lee, Kris Parker, Gary A. Bundell:
Determining Component Reliability Using a Testing Index. ACSC 2002: 167-176 - 2001
- [j5]John Morris, Gareth Lee, Kris Parker, Gary A. Bundell, Chiou Peng Lam:
Software Component Certification. Computer 34(9): 30-36 (2001) - [j4]Chiou Peng Lam, Geoff A. W. West, Svetha Venkatesh:
Obtaining functional parametric models using active vision strategies. Pattern Recognit. 34(1): 79-94 (2001)
1990 – 1999
- 1998
- [j3]Chiou Peng Lam, Geoff A. W. West, Terry M. Caelli:
Validation of machine learning techniques: decision trees and finite training set. J. Electronic Imaging 7(1): 94-103 (1998) - [j2]Chiou Peng Lam, Geoff A. W. West, Svetha Venkatesh:
Stabilising The Camera-To-Fixation Point Distance In Active Vision. Pattern Recognit. 31(10): 1431-1442 (1998) - 1997
- [j1]Chiou Peng Lam, Svetha Venkatesh, Geoff A. W. West:
Hypothesis Verification Using Parametric Models and Active Vision Strategies. Comput. Vis. Image Underst. 68(2): 209-236 (1997) - [c2]Chiou Peng Lam, Geoff A. W. West, Terry Caelli:
Data Representations and Machine Learning Techniques. IDA 1997: 161-172 - 1994
- [c1]Chiou Peng Lam, Geoff A. W. West, Svetha Venkatesh:
Emerging hypothesis verification using function-based geometric models and active vision strategies. CVPR 1994: 818-822
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint