skip to main content
research-article

Learning to Branch: Generalization Guarantees and Limits of Data-Independent Discretization

Published:10 April 2024Publication History
Skip Abstract Section

Abstract

Tree search algorithms, such as branch-and-bound, are the most widely used tools for solving combinatorial and non-convex problems. For example, they are the foremost method for solving (mixed) integer programs and constraint satisfaction problems. Tree search algorithms come with a variety of tunable parameters that are notoriously challenging to tune by hand. A growing body of research has demonstrated the power of using a data-driven approach to automatically optimize the parameters of tree search algorithms. These techniques use a training set of integer programs sampled from an application-specific instance distribution to find a parameter setting that has strong average performance over the training set. However, with too few samples, a parameter setting may have strong average performance on the training set but poor expected performance on future integer programs from the same application. Our main contribution is to provide the first sample complexity guarantees for tree search parameter tuning. These guarantees bound the number of samples sufficient to ensure that the average performance of tree search over the samples nearly matches its future expected performance on the unknown instance distribution. In particular, the parameters we analyze weight scoring rules used for variable selection. Proving these guarantees is challenging because tree size is a volatile function of these parameters: we prove that, for any discretization (uniform or not) of the parameter space, there exists a distribution over integer programs such that every parameter setting in the discretization results in a tree with exponential expected size, yet there exist parameter settings between the discretized points that result in trees of constant size. In addition, we provide data-dependent guarantees that depend on the volatility of these tree-size functions: our guarantees improve if the tree-size functions can be well approximated by simpler functions. Finally, via experiments, we illustrate that learning an optimal weighting of scoring rules reduces tree size.

REFERENCES

  1. Achterberg Tobias. 2007. Constraint Integer Programming. Ph.D. Dissertation. Technische Universität Berlin.Google ScholarGoogle Scholar
  2. Achterberg Tobias. 2009. SCIP: Solving constraint integer programs. Mathematical Programming Computation 1, 1 (2009), 141.Google ScholarGoogle ScholarCross RefCross Ref
  3. Achterberg Tobias, Koch Thorsten, and Martin Alexander. 2005. Branching rules revisited. Operations Research Letters 33, 1 (January2005), 4254.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ahmadi Saba, Beyhaghi Hedyeh, Blum Avrim, and Naggita Keziah. 2022. Setting fair incentives to maximize improvement. arXiv preprint arXiv:2203.00134 (2022).Google ScholarGoogle Scholar
  5. Alvarez Alejandro Marcos, Louveaux Quentin, and Wehenkel Louis. 2017. A machine learning-based approximation of strong branching. INFORMS Journal on Computing 29, 1 (2017), 185195.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ansótegui Carlos, Sellmann Meinolf, and Tierney Kevin. 2009. A gender-based genetic algorithm for the automatic configuration of algorithms. In Proceedings of the International Conference on Principles and Practice of Constraint Programming. Springer-Verlag, 142157.Google ScholarGoogle ScholarCross RefCross Ref
  7. Anthony Martin and Bartlett Peter. 2009. Neural Network Learning: Theoretical Foundations. Cambridge University Press.Google ScholarGoogle Scholar
  8. Balcan Maria-Florina. 2020. Data-driven algorithm design. In Beyond Worst Case Analysis of Algorithms, Roughgarden Tim (Ed.). Cambridge University Press. (Forthcoming).Google ScholarGoogle Scholar
  9. Balcan Maria-Florina, Dick Travis, Sandholm Tuomas, and Vitercik Ellen. 2018a. Learning to branch. In Proceedings of theInternational Conference on Machine Learning (ICML) (2018).Google ScholarGoogle Scholar
  10. Balcan Maria-Florina, Dick Travis, and Vitercik Ellen. 2018b. Dispersion for data-driven algorithm design, online learning, and private optimization. In Proceedings of the Annual Symposium on Foundations of Computer Science (FOCS’18).Google ScholarGoogle ScholarCross RefCross Ref
  11. Balcan Maria-Florina, Khodak Mikhail, Sharma Dravyansh, and Talwalkar Ameet. 2022. Provably tuning the ElasticNet across instances. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS’22).Google ScholarGoogle Scholar
  12. Balcan Maria-Florina, Nagarajan Vaishnavh, Vitercik Ellen, and White Colin. 2017. Learning-theoretic foundations of algorithm configuration for combinatorial partitioning problems. In Proceedings of the Conference on Learning Theory (COLT’17).Google ScholarGoogle Scholar
  13. Balcan Maria-Florina, Dick Travis, and Lang Manuel. 2020a. Learning to link. In Proceedings of the International Conference on Learning Representations (ICLR’20).Google ScholarGoogle Scholar
  14. Balcan Maria-Florina, Dick Travis, and Pegden Wesley. 2020b. Semi-bandit optimization in the dispersed setting. In Proceedings of the Conference on Uncertainty in Artificial Intelligence (UAI’20).Google ScholarGoogle Scholar
  15. Balcan Maria-Florina, Sandholm Tuomas, and Vitercik Ellen. 2020c. Learning to optimize computational resources: Frugal training with generalization guarantees. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’20).Google ScholarGoogle ScholarCross RefCross Ref
  16. Balcan Maria-Florina, Sandholm Tuomas, and Vitercik Ellen. 2020d. Refined bounds for algorithm configuration: The knife-edge of dual class approximability. In International Conference on Machine Learning (ICML’20).Google ScholarGoogle Scholar
  17. Balcan Maria-Florina, Sandholm Tuomas, and Vitercik Ellen. 2021a. Generalization in portfolio-based algorithm selection. In AAAI Conference on Artificial Intelligence (AAAI’21).Google ScholarGoogle ScholarCross RefCross Ref
  18. Balcan Maria-Florina F., Khodak Mikhail, Sharma Dravyansh, and Talwalkar Ameet. 2021b. Learning-to-learn non-convex piecewise-Lipschitz functions. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS’21).Google ScholarGoogle Scholar
  19. Balcan Maria-Florina F. and Sharma Dravyansh. 2021. Data driven semi-supervised learning. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS) (2021).Google ScholarGoogle Scholar
  20. Bartlett Peter, Indyk Piotr, and Wagner Tal. 2022. Generalization bounds for data-driven numerical linear algebra. In Proceedings of the Conference on Learning Theory (COLT’22).Google ScholarGoogle Scholar
  21. Beale Evelyn. 1979. Branch and bound methods for mathematical programming systems. Annals of Discrete Mathematics 5 (1979), 201219.Google ScholarGoogle ScholarCross RefCross Ref
  22. Bengio Yoshua, Frejinger Emma, Lodi Andrea, Patel Rahul, and Sankaranarayanan Sriram. 2020a. A learning-based algorithm to quickly compute good primal solutions for stochastic integer programs. In Proceedings of the International Conference on the Integration of Constraint Programming, Artificial Intelligence, and Operations Research (CPAIOR’20).Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Bengio Yoshua, Lodi Andrea, and Prouvost Antoine. 2020b. Machine learning for combinatorial optimization: A methodological tour d’horizon. European Journal of Operational Research (2020).Google ScholarGoogle Scholar
  24. Bénichou Michel, Gauthier Jean-Michel, Girodet Paul, Hentges Gerard, Ribière Gerard, and Vincent O.. 1971. Experiments in mixed-integer linear programming. Mathematical Programming 1, 1 (1971), 7694.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Bessiere Christian and Régin Jean-Charles. 1996. MAC and combined heuristics: Two reasons to forsake FC (and CBJ?) on hard problems. In Proceedings of the International Conference on Principles and Practice of Constraint Programming. Springer, 6175.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Blum Avrim, Dan Chen, and Seddighin Saeed. 2021. Learning complexity of simulated annealing. In Proceedings of the International Conference on Artificial Intelligence and Statistics (AISTATS’21).Google ScholarGoogle Scholar
  27. Bonami Pierre, Lodi Andrea, and Zarpellon Giulia. 2018. Learning a classification of mixed-integer quadratic programming problems. In Proceedings of the International Conference on the Integration of Constraint Programming, Artificial Intelligence, and Operations Research (CPAIOR’18). 595604.Google ScholarGoogle ScholarCross RefCross Ref
  28. Cohen-Addad Vincent and Kanade Varun. 2017. Online optimization of smoothed piecewise constant functions. In Proceedings of theInternational Conference on Artificial Intelligence and Statistics (AISTATS’17).Google ScholarGoogle Scholar
  29. Dey Santanu S., Dubey Yatharth, and Molinaro Marco. 2021a. Branch-and-bound solves random binary IPS in polytime. In Proceedings of theAnnual ACM-SIAM Symposium on Discrete Algorithms (SODA’21).Google ScholarGoogle ScholarCross RefCross Ref
  30. Dey Santanu S., Dubey Yatharth, and Molinaro Marco. 2021b. Lower bounds on the size of general branch-and-bound trees. arXiv preprint arXiv:2103.09807 (2021).Google ScholarGoogle Scholar
  31. Liberto Giovanni Di, Kadioglu Serdar, Leo Kevin, and Malitsky Yuri. 2016. DASH: Dynamic approach for switching heuristics. European Journal of Operational Research 248, 3 (2016), 943953.Google ScholarGoogle ScholarCross RefCross Ref
  32. Gasse Maxime, Chételat Didier, Ferroni Nicola, Charlin Laurent, and Lodi Andrea. 2019. Exact combinatorial optimization with graph convolutional neural networks. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS’19). 1555415566.Google ScholarGoogle Scholar
  33. Gauthier Jean-Michel and Ribière Gerard. 1977. Experiments in mixed-integer linear programming using pseudo-costs. Mathematical Programming 12, 1 (1977), 2647.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Gilpin Andrew and Sandholm Tuomas. 2011. Information-theoretic approaches to branching in search. Discrete Optimization 8, 2 (2011), 147159. Early version in IJCAI-07.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Gomes Carla and Selman Bart. 2001. Algorithm portfolios. Artificial Intelligence 126 (2001), 4362.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Gupta Rishi and Roughgarden Tim. 2017. A PAC approach to application-specific algorithm selection. SIAM J. Comput. 46, 3 (2017), 9921017.Google ScholarGoogle ScholarCross RefCross Ref
  37. Haralick Robert and Elliott Gordon. 1980. Increasing tree search efficiency for constraint satisfaction problems. Artificial Intelligence 14, 3 (1980), 263313.Google ScholarGoogle ScholarCross RefCross Ref
  38. He He, III Hal Daume, and Eisner Jason M.. 2014. Learning to search in branch and bound algorithms. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS’14).Google ScholarGoogle Scholar
  39. Horvitz Eric, Ruan Yongshao, Gomez Carla, Kautz Henry, Selman Bart, and Chickering Max. 2001. A Bayesian approach to tackling hard computational problems. In Proceedings of the Conference on Uncertainty in Artificial Intelligence (UAI’01).Google ScholarGoogle Scholar
  40. Hsu Chen-Yu, Indyk Piotr, Katabi Dina, and Vakilian Ali. 2019. Learning-based frequency estimation algorithms. In Proceedings of the International Conference on Learning Representations (ICLR’19).Google ScholarGoogle Scholar
  41. Hutter Frank, Hoos Holger H., and Leyton-Brown Kevin. 2010. Automated configuration of mixed integer programming solvers. In Proceedings of the International Conference on Integration of Artificial Intelligence (AI) and Operations Research (OR) Techniques in Constraint Programming. Springer, 186202.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Hutter Frank, Hoos Holger H., and Leyton-Brown Kevin. 2011. Sequential model-based optimization for general algorithm configuration. In Proc. of LION-5. 507523.Google ScholarGoogle Scholar
  43. Hutter Frank, Hoos Holger H., Leyton-Brown Kevin, and Stützle Thomas. 2009. ParamILS: An automatic algorithm configuration framework. Journal of Artificial Intelligence Research 36, 1 (2009), 267306.Google ScholarGoogle ScholarCross RefCross Ref
  44. Hutter Frank, Xu Lin, Hoos Holger H., and Leyton-Brown Kevin. 2014. Algorithm runtime prediction: Methods and evaluation. Artificial Intelligence 206 (2014), 79111. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Inc IBM ILOG. 2007. CPLEX 11.0 Release Notes.Google ScholarGoogle Scholar
  46. Inc IBM ILOG. 2017. CPLEX 12.8 Parameters Reference.Google ScholarGoogle Scholar
  47. Jeroslow Robert G.. 1974. Trivial integer programs unsolvable by branch-and-bound. Mathematical Programming 6, 1 (1974), 105109.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Kadioglu Serdar, Malitsky Yuri, Sellmann Meinolf, and Tierney Kevin. 2010. ISAC-instance-specific algorithm configuration. In Proceedings of the European Conference on Artificial Intelligence (ECAI’10).Google ScholarGoogle Scholar
  49. Khalil Elias Boutros, Bodic Pierre Le, Song Le, Nemhauser George, and Dilkina Bistra. 2016. Learning to branch in mixed integer programming. In Proceedings of theAAAI Conference on Artificial Intelligence (AAAI’16).Google ScholarGoogle ScholarCross RefCross Ref
  50. Khalil Elias Boutros, Dilkina Bistra, Nemhauser George, Ahmed Shabbir, and Shao Yufen. 2017. Learning to run heuristics in tree search. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI’17).Google ScholarGoogle ScholarCross RefCross Ref
  51. Kleinberg Robert, Leyton-Brown Kevin, and Lucier Brendan. 2017. Efficiency through procrastination: Approximately optimal algorithm configuration with runtime guarantees. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI’17).Google ScholarGoogle ScholarCross RefCross Ref
  52. Kleinberg Robert, Leyton-Brown Kevin, Lucier Brendan, and Graham Devon. 2019. Procrastinating with confidence: Near-optimal, anytime, adaptive algorithm configuration. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS) (2019).Google ScholarGoogle Scholar
  53. Kolesar Peter J.. 1967. A branch and bound algorithm for the knapsack problem. Management Science 13, 9 (1967), 723735.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Koltchinskii Vladimir. 2001. Rademacher penalties and structural risk minimization. IEEE Transactions on Information Theory 47, 5 (2001), 19021914.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Kruber Markus, Lübbecke Marco E., and Parmentier Axel. 2017. Learning when to use a decomposition. In Proceedings of the International Conference on AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems. Springer, 202210.Google ScholarGoogle ScholarCross RefCross Ref
  56. Lagoudakis Michail G. and Littman Michael L.. 2001. Learning to select branching rules in the DPLL procedure for satisfiability. Electronic Notes in Discrete Mathematics 9 (2001), 344359.Google ScholarGoogle ScholarCross RefCross Ref
  57. Land Ailsa H. and Doig Alison G.. 1960. An automatic method of solving discrete programming problems. Econometrica: Journal of the Econometric Society (1960), 497520.Google ScholarGoogle ScholarCross RefCross Ref
  58. Bodic Pierre Le and Nemhauser George. 2017. An abstract model for branching and its application to mixed integer programming. Mathematical Programming (2017), 137.Google ScholarGoogle Scholar
  59. Leyton-Brown Kevin, Milgrom Paul, and Segal Ilya. 2017. Economics and computer science of a radio spectrum reallocation. Proceedings of the National Academy of Sciences 114, 28 (2017), 72027209.Google ScholarGoogle ScholarCross RefCross Ref
  60. Leyton-Brown Kevin, Nudelman Eugene, and Shoham Yoav. 2009. Empirical hardness models: Methodology and a case study on combinatorial auctions. J. ACM 56, 4 (2009), 152.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Leyton-Brown Kevin, Pearson Mark, and Shoham Yoav. 2000. Towards a universal test suite for combinatorial auction algorithms. In Proceedings of the ACM Conference on Electronic Commerce (ACM-EC’00). Minneapolis, MN, 6676.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Liang Jia Hui, Ganesh Vijay, Poupart Pascal, and Czarnecki Krzysztof. 2016. Learning rate based branching heuristic for SAT solvers. In Proceedings of theInternational Conference on Theory and Applications of Satisfiability Testing. Springer, 123140.Google ScholarGoogle ScholarCross RefCross Ref
  63. Liberatore Paolo. 2000. On the complexity of choosing the branching literal in DPLL. Artificial Intelligence 116, 1-2 (2000), 315326.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Linderoth Jeff and Savelsbergh Martin. 1999. A computational study of search strategies for mixed integer programming. INFORMS Journal of Computing 11 (1999), 173187.Google ScholarGoogle ScholarCross RefCross Ref
  65. Lobjois L. and Lemaître M.. 1998. Branch and bound algorithm selection by performance prediction. In Proceedings of the National Conference on Artificial Intelligence (AAAI’98). San Jose, CA, 353358.Google ScholarGoogle Scholar
  66. Lykouris Thodoris and Vassilvitskii Sergei. 2018. Competitive caching with machine learned advice. In Proceedings of the International Conference on Machine Learning (ICML’18).Google ScholarGoogle Scholar
  67. Massart Pascal. 2000. Some applications of concentration inequalities to statistics. Annales de la Faculté des Sciences de Toulouse 9 (2000), 245303.Google ScholarGoogle ScholarCross RefCross Ref
  68. Mitzenmacher Michael. 2018. A model for learned bloom filters and optimizing by sandwiching. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS’18). 464473.Google ScholarGoogle Scholar
  69. Mohri Mehryar, Rostamizadeh Afshin, and Talwalkar Ameet. 2012. Foundations of Machine Learning. MIT Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Purohit Manish, Svitkina Zoya, and Kumar Ravi. 2018. Improving online algorithms via ML predictions. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS’18). 96619670.Google ScholarGoogle Scholar
  71. Pushak Yasha and Hoos Holger. 2018. Algorithm configuration landscapes. In Proceedings of the International Conference on Parallel Problem Solving from Nature. Springer, 271283.Google ScholarGoogle ScholarCross RefCross Ref
  72. Rice John R.. 1976. The algorithm selection problem. Advances in Computers 15 (1976), 65118.Google ScholarGoogle ScholarCross RefCross Ref
  73. Sabharwal Ashish, Samulowitz Horst, and Reddy Chandra. 2017. Guiding combinatorial optimization with UCT. In Proceedings of theInternational Conference on AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems. Springer.Google ScholarGoogle Scholar
  74. Sakaue Shinsaku and Oki Taihei. 2022. Sample complexity of learning heuristic functions for greedy-best-first and A* search. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS’22).Google ScholarGoogle Scholar
  75. Sandholm Tuomas. 2002. Algorithm for optimal winner determination in combinatorial auctions. Artificial Intelligence 135 (Jan.2002), 154.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Sandholm Tuomas. 2013. Very-large-scale generalized combinatorial multi-attribute auctions: Lessons from conducting $60 billion of sourcing. In Handbook of Market Design, Neeman Zvika, Roth Alvin, and Vulkan Nir (Eds.). Oxford University Press.Google ScholarGoogle Scholar
  77. Sayag Tzur, Fine Shai, and Mansour Yishay. 2006. Combining multiple heuristics. In Proceedings of the Annual Symposium on Theoretical Aspects of Computer Science. Springer, 242253.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Shalev-Shwartz Shai and Ben-David Shai. 2014. Understanding Machine Learning: From Theory to Algorithms. Cambridge University Press.Google ScholarGoogle ScholarCross RefCross Ref
  79. Sharma Dravyansh, Balcan Maria-Florina, and Dick Travis. 2020. Learning piecewise Lipschitz functions in changing environments. In Proceedings of theInternational Conference on Artificial Intelligence and Statistics (AISTATS’20).Google ScholarGoogle Scholar
  80. Song Jialin, Lanka Ravi, Yue Yisong, and Dilkina Bistra. 2020. A general large neighborhood search framework for solving integer programs. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS’20).Google ScholarGoogle Scholar
  81. Song Jialin, Lanka Ravi, Zhao Albert, Bhatnagar Aadyot, Yue Yisong, and Ono Masahiro. 2018. Learning to search via retrospective imitation. arXiv preprint arXiv:1804.00846 (2018).Google ScholarGoogle Scholar
  82. Speck David, Biedenkapp André, Hutter Frank, Mattmüller Robert, and Lindauer Marius. 2021. Learning heuristic selection with dynamic algorithm configuration. In International Conference on Automated Planning and Scheduling (ICAPS’21), Vol. 31. 597605.Google ScholarGoogle ScholarCross RefCross Ref
  83. Spielman Daniel A. and Teng Shang-Hua. 2004. Smoothed analysis of algorithms: Why the simplex algorithm usually takes polynomial time. Journal of the ACM (JACM) 51, 3 (2004), 385463.Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Streeter Matthew and Golovin Daniel. 2009. An online algorithm for maximizing submodular functions. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS’09). 15771584.Google ScholarGoogle Scholar
  85. Streeter Matthew, Golovin Daniel, and Smith Stephen F.. 2007. Combining multiple heuristics online. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’07).Google ScholarGoogle Scholar
  86. Tang Yunhao, Agrawal Shipra, and Faenza Yuri. 2020. Reinforcement learning for integer programming: Learning to cut. In Proceedings of theInternational Conference on Machine Learning (ICML) (2020).Google ScholarGoogle Scholar
  87. Weisz Gellért, György András, and Szepesvári Csaba. 2018. LeapsAndBounds: A method for approximately optimal algorithm configuration. In Proceedings of the International Conference on Machine Learning (ICML’18).Google ScholarGoogle Scholar
  88. Weisz Gellért, György András, and Szepesvári Csaba. 2019. CapsAndRuns: An improved method for approximately optimal algorithm configuration. In Proceedings of the International Conference on Machine Learning (ICML’19).Google ScholarGoogle Scholar
  89. Xia Wei and Yap Roland. 2018. Learning robust search strategies using a bandit-based approach. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’18).Google ScholarGoogle ScholarCross RefCross Ref
  90. Xu Lin, Hutter Frank, Hoos Holger H., and Leyton-Brown Kevin. 2008. SATzilla: Portfolio-based algorithm selection for SAT. Journal of Artificial Intelligence Research 32, 1 (2008), 565606.Google ScholarGoogle ScholarCross RefCross Ref
  91. Xu Lin, Hoos Holger H., and Leyton-Brown Kevin. 2010. Hydra: Automatically configuring algorithms for portfolio-based selection. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’10).Google ScholarGoogle ScholarCross RefCross Ref
  92. Xu Lin, Hutter Frank, Hoos Holger H., and Leyton-Brown Kevin. 2011. Hydra-MIP: Automated algorithm configuration and selection for mixed integer programming. In Proceedings of the RCRA Workshop on Experimental Evaluation of Algorithms for Solving Problems with Combinatorial Explosion at the International Joint Conference on Artificial Intelligence (IJCAI’11).Google ScholarGoogle Scholar

Index Terms

  1. Learning to Branch: Generalization Guarantees and Limits of Data-Independent Discretization

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Journal of the ACM
          Journal of the ACM  Volume 71, Issue 2
          April 2024
          627 pages
          ISSN:0004-5411
          EISSN:1557-735X
          DOI:10.1145/3613546
          • Editor:
          • Venkatesan Guruswami
          Issue’s Table of Contents

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 10 April 2024
          • Online AM: 25 December 2023
          • Accepted: 28 September 2023
          • Revised: 14 March 2023
          • Received: 10 October 2020
          Published in jacm Volume 71, Issue 2

          Check for updates

          Qualifiers

          • research-article
        • Article Metrics

          • Downloads (Last 12 months)444
          • Downloads (Last 6 weeks)162

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text