GECCO 2009 Defense Applications of Computational Intelligence Workshop


Thursday, July 9, 2009, 8:30 AM – 6:00 PM


to be held as part of the





July 8-12, 2009 (Wednesday-Sunday)

Delta Centre-Ville Hotel
777 University Street, Montreal, Quebec, H3C 3Z7, Canada
Organized by ACM SIG-EVO


Important Dates


Submission deadline:           Wednesday, March 25, 2009

Acceptance notification:      Friday, April 3, 2009

Camera ready deadline:      Wednesday, April 22, 2009


Workshop Description

Within the last decade, the use of computational intelligence techniques for solving challenging defense related problems has achieved widespread acceptance. The genesis of this interest lies in the fact that repeated attempts of using more traditional techniques have left many important problems unsolved, and in some cases, not addressed. Additionally, new problems have emerged that are difficult to tackle with conventional methods, since social, cultural and human behavioral factors tend to be at the heart of these new types of problems (e.g. within the broad areas of the global war on terrorism, homeland security, and force protection).

The purpose of the workshop is to introduce and discuss current and ongoing efforts in using computational intelligence techniques in attacking and solving defense-related problems, with a focus on genetic and evolutionary computation techniques. These include, but are not limited to the following:


*    Genetic and evolutionary techniques in the design of military systems and sub-systems.

*    Genetic and evolutionary techniques for logistics and scheduling of military operations.

*    Genetic and evolutionary algorithms (GEAs) in strategic planning and tactical decision making.

*    Multiobjective GEAs for examining tradeoffs in military, security, and counter-terrorism procedures.

*    Automated discovery of tactics and procedures for site security, force protection, and consequence management.

*    Genetics-based knowledge discovery and data mining of large databases used to recognize patterns of individual behavior.

*    Co-evolutionary for simultaneous red-blue team strategic-tactical
simulation and gaming.

*    Other computational intelligence techniques for applications in the areas listed above.

The workshop invites completed or ongoing work in using computational intelligence techniques for addressing these or any other applications to defense related problems. It is intended to encourage communication between active researchers and practitioners to better understand the current scope of efforts within this domain. The ultimate goal is to understand, discuss, and help set future directions for computational intelligence in defense problems.

*Workshop Format*

We anticipate a full-day workshop organized according to the following schedule:

8:30 – 8:40       Workshop welcome
8:40 – 10:20     Four presentations (20 minutes + 5 minutes Q&A each)
10:20 – 10:40   Coffee break and informal discussion

10:40 – 12:20   Four presentations (20 minutes + 5 minutes Q&A each)

12:20 – 14:00   Lunch break

14:00 – 15:50   Tutorials

15:50 – 16:10   Coffee break

16:10 – 17:40   Poster session and Demonstrations

17:40 – 18:00   Brainstorming of critical needs and directions


The core of the workshop program is a total of eight presentations (20 minutes + 5 minutes Q&A each) chosen by the organizing committee on the basis of a submitted 1-2 page extended abstract OR full-length technical paper. The workshop will include a coffee break halfway through the presentations. The tutorials will provide information about current defense technology and future research directions. The poster session will provide a forum for ongoing demonstrations of defense-related computational intelligence systems, and will allow additional workshop participants to present their research. The workshop will conclude with a lightning round of brainstorming by participants regarding critical needs for defense-related research and applications of computational intelligence.




Authors are invited to submit papers not to exceed 8 pages that must strictly adhere to the ACM formatting rules; Word and LaTex templates are provided at
Papers should be submitted in PDF format only and should be submitted via email to Be sure to place the text "GECCO 2009
DACI" in the subject line of your message. For additional information, please refer to the workshop web site at



Laurence D. Merkle

        Larry Merkle served as an active duty officer in the United States Air Force from 1988 through 2002, and continued to serve as a reservist through 2007.
        He became involved in evolutionary computation in 1991, and has been involved in its application to a number of problems of interest to the military,
        including design of materials with nonlinear optical properties, design of high-power microwave sources, modeling of biochemical processes in molecular
        computing applications, and enhancing the effectiveness of compilers for polymorphous computing architectures. During the summer of 2004, he held a
        Visiting Professor position with the Air Force Research Laboratory where he studied evolvable hardware. He has published over 50 conference papers
        and journal articles.

Frank W. Moore

University of Alaska Anchorage

SSB 158 F, 3211 Providence Dr., Anchorage, AK  99508

PH: 907-786-4819

FAX: 907-786-6162


Frank Moore is an Associate Professor of Computer Science at the University of Alaska Anchorage. He has taught computer science, computer engineering, and electrical engineering courses at the undergraduate and graduate level since 1997. In addition, he has over six years of industry experience developing software for a wide variety of military research and development projects. His recent research at the Air Force Research Laboratory has used evolutionary computation to optimize transforms that outperform wavelets for signal compression and reconstruction. He has received three Visiting Faculty Research Program awards, and has published over 50 journal articles, conference papers, and technical reports.


Contact Point


Frank W. Moore