skip to main content
10.1145/1570256.1570305acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
technical-note

Extreme: dynamic multi-armed bandits for adaptive operator selection

Authors Info & Claims
Published:08 July 2009Publication History

ABSTRACT

The performance of evolutionary algorithms is highly affected by the selection of the variation operators to solve the problem at hand. This abstract presents a survey of results that have been obtained using the "Extreme - Dynamic Multi-Armed Bandit" (Ex-DMAB), a technique used to automatically select the operator to be applied between the available ones, while searching for the solution. Experiments on three well-known artificial problems of the EC community are presented, namely the OneMax, the long k-path and the Royal Road, demonstrating some improvements over both any choice of a single-operator alone, and the naive uniform choice of one operator at each application. The Ex-DMAB approach is also compared to the optimal choice of operators, whenever available. The results are discussed in the light of the new parameters that are introduced to tune the selection technique...

References

  1. ]]P. Auer, N. Cesa-Bianchi, and P. Fischer. Finite-time analysis of the multiarmed bandit problem. Machine Learning, 47(2/3):235--256, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. ]]H. J. C. Barbosa and A. M. S´a. On adaptive operator probabilities in real coded genetic algorithms. In Proc. Intl. Conf. Chilean Computer Science Society, 2000.Google ScholarGoogle Scholar
  3. ]]M. Birattari, T. Stutzle, L. Paquete, and K. Varrentrapp. A racing algorithm for configuring metaheuristics. In Proc. GECCO, pages 11--18. Morgan Kaufmann, 2002.Google ScholarGoogle Scholar
  4. ]]L. Da Costa, A. Fialho, M. Schoenauer, and M. Sebag. Adaptive operator selection with dynamic multi-armed bandits. In Proc. GECCO, pages 913--920. ACM Press, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. ]]L. Davis. Adapting operator probabilities in genetic algorithms. In Proc. ICGA, pages 61--69. Morgan Kaufmann, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. ]]A. Fialho, L. Da Costa, M. Schoenauer, and M. Sebag. Extreme value based adaptive operator selection. In Proc. PPSN X, pages 175--184. Springer, 2008.Google ScholarGoogle Scholar
  7. ]]A. Fialho, L. DaCosta, M. Schoenauer, and M. Sebag. Dynamic multi-armed bandits and extreme value-based rewards for adaptive operator selection. In Proc. LION-3. Springer-Verlag, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. ]]A. Fialho, M. Schoenauer, and M. Sebag. Analysis of adaptive operator selection techniques on the royal road and long k-path problems. In G. R. et al., editor, GECCO'09: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation. ACM, July 2009 (to appear). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. ]]D. Goldberg. Probability Matching, the Magnitude of Reinforcement, and Classifier System Bidding. Machine Learning, 5(4):407--426, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. ]]C. Hartland, N. Baskiotis, S. Gelly, O. Teytaud, and M. Sebag. Change point detection and meta-bandits for online learning in dynamic environments. In Proc. CAp'07, July 2007.Google ScholarGoogle Scholar
  11. ]]B. A. Julstrom. What have you done for me lately? Adapting Operator Probabilities in a Steady-State Genetic Algorithms. In Proc. ICGA, pages 81--87. Morgan Kaufmann, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. ]]F. Lobo and D. Goldberg. Decision making in a hybrid genetic algorithm. In Proc. ICEC'97, pages 121--125. IEEE Press, 1997.Google ScholarGoogle ScholarCross RefCross Ref
  13. ]]J. Maturana, A. Fialho, F. Saubion, M. Schoenauer, and M. Sebag. Extreme compass and dynamic multi-armed bandits for adaptive operator selection. In CEC'09: Proceedings of the IEEE International Conference on Evolutionary Computation (to appear). IEEE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. ]]J. Maturana and F. Saubion. A compass to guide genetic algorithms. In Proc. PPSN X, pages 256--265. Springer, 2008.Google ScholarGoogle Scholar
  15. ]]E. Page. Continuous inspection schemes. Biometrika, 41:100--115, 1954.Google ScholarGoogle ScholarCross RefCross Ref
  16. ]]D. Thierens. An adaptive pursuit strategy for allocating operator probabilities. In H.-G. Beyer, editor, Proc. GECCO'05, pages 1539--1546. ACM Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. ]]A. Tuson and P. Ross. Adapting operator settings in genetic algorithms. Evolutionary Computation, 6(2):161--184, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. ]]J. M. Whitacre, T. Q. Pham, and R. A. Sarker. Use of statistical outlier detection method in adaptive evolutionary algorithms. In M. Cattolico, editor, Proc. GECCO'06, pages 1345--1352. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. ]]Wong, Lee, Leung, and Ho. A novel approach in parameter adaptation and diversity maintenance for GAs. Soft Computing, 7(8):506--515, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Extreme: dynamic multi-armed bandits for adaptive operator selection

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          GECCO '09: Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers
          July 2009
          1760 pages
          ISBN:9781605585055
          DOI:10.1145/1570256

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 July 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • technical-note

          Acceptance Rates

          Overall Acceptance Rate1,669of4,410submissions,38%

          Upcoming Conference

          GECCO '24
          Genetic and Evolutionary Computation Conference
          July 14 - 18, 2024
          Melbourne , VIC , Australia

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader