Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
The Cross Entropy Method: A Unified Approach To Combinatorial Optimization, Monte-carlo Simulation (Information Science and Statistics)August 2004
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-0-387-21240-1
Published:01 August 2004
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Kujanpää K, Pajarinen J and Ilin A Hybrid search for efficient planning with completeness guarantees Proceedings of the 37th International Conference on Neural Information Processing Systems, (22688-22701)
  2. Liu Z, Zhou G, He J, Marcucci T, Fei-Fei L, Wu J and Li Y Model-based control with sparse neural dynamics Proceedings of the 37th International Conference on Neural Information Processing Systems, (6280-6296)
  3. Ahn D and Zheng L Conditional Importance Sampling for Convex Rare-Event Sets Proceedings of the Winter Simulation Conference, (363-374)
  4. Reeb D, Patel K, Barsim K, Schiegg M and Gerwinn S Validation of composite systems by discrepancy propagation Proceedings of the Thirty-Ninth Conference on Uncertainty in Artificial Intelligence, (1730-1740)
  5. Rajeswar S, Mazzaglia P, Verbelen T, Piché A, Dhoedt B, Courville A and Lacoste A Mastering the unsupervised reinforcement learning benchmark from pixels Proceedings of the 40th International Conference on Machine Learning, (28598-28617)
  6. Motwani M and Brun Y Better Automatic Program Repair by Using Bug Reports and Tests Together Proceedings of the 45th International Conference on Software Engineering, (1225-1237)
  7. Guang J, Hong G, Chen X, Peng X, Chen L, Bai B and Zhang G Tail Quantile Estimation for Non-Preemptive Priority Queues Proceedings of the Winter Simulation Conference, (85-96)
  8. ACM
    Mottahedi S and Pavlak G Constrained differentiable cross-entropy method for safe model-based reinforcement learning Proceedings of the 9th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, (40-48)
  9. ACM
    Tufano R, Scalabrino S, Pascarella L, Aghajani E, Oliveto R and Bavota G Using reinforcement learning for load testing of video games Proceedings of the 44th International Conference on Software Engineering, (2303-2314)
  10. Corso A, Moss R, Koren M, Lee R and Kochenderfer M (2021). A Survey of Algorithms for Black-Box Safety Validation of Cyber-Physical Systems, Journal of Artificial Intelligence Research, 72, (377-428), Online publication date: 4-Jan-2022.
  11. Deo A and Murthy K Efficient black-box importance sampling for VaR and CVaR estimation Proceedings of the Winter Simulation Conference, (1-12)
  12. Marino J, Piché A, Ialongo A and Yue Y Iterative amortized policy optimization Proceedings of the 35th International Conference on Neural Information Processing Systems, (15667-15681)
  13. Yu S, Ahn S, Song L and Shin J RoMA Proceedings of the 35th International Conference on Neural Information Processing Systems, (4619-4631)
  14. ACM
    Li S, Li M, Su J, Chen S, Yuan Z and Ye Q (2021). PP-PG: Combining Parameter Perturbation with Policy Gradient Methods for Effective and Efficient Explorations in Deep Reinforcement Learning, ACM Transactions on Intelligent Systems and Technology, 12:3, (1-21), Online publication date: 30-Jun-2021.
  15. Merani M, Croce D and Tinnirello I (2021). Rings for Privacy: An Architecture for Large Scale Privacy-Preserving Data Mining, IEEE Transactions on Parallel and Distributed Systems, 32:6, (1340-1352), Online publication date: 1-Jun-2021.
  16. Motwani M High-quality automated program repair Proceedings of the 43rd International Conference on Software Engineering: Companion Proceedings, (309-314)
  17. Tang S, Irissappane A, Oliehoek F and Zhang J Learning Complex Policy Distribution with CEM Guided Adversarial Hypernetwork Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems, (1308-1316)
  18. ACM
    Nie X, Wang B, Yan P, Wu B and Gao C Key Point Defense and Target Threat Analysis Based on Data Fusion The 2nd International Conference on Computing and Data Science, (1-3)
  19. Pertsch K, Rybkin O, Ebert F, Finn C, Jayaraman D and Levine S Long-horizon visual planning with goal-conditioned hierarchical predictors Proceedings of the 34th International Conference on Neural Information Processing Systems, (17321-17333)
  20. Lee K, Lee B, Shin U and Kweon I An efficient asynchronous method for integrating evolutionary and gradient-based policy search Proceedings of the 34th International Conference on Neural Information Processing Systems, (10124-10135)
  21. Gangwani T, Zhou Y and Peng J Learning guidance rewards with trajectory-space smoothing Proceedings of the 34th International Conference on Neural Information Processing Systems, (822-832)
  22. ACM
    Sabbioni L, Restelli M and Prampolini A Fast direct calibration of interest rate derivatives pricing models Proceedings of the First ACM International Conference on AI in Finance, (1-8)
  23. Alawieh M, Boning D and Pan D Wafer map defect patterns classification using deep selective learning Proceedings of the 57th ACM/EDAC/IEEE Design Automation Conference, (1-6)
  24. Emara S, Li B and Chen Y Eagle: Refining Congestion Control by Learning from the Experts IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, (676-685)
  25. ACM
    Roitman H, Feigenblat G, Cohen D, Boni O and Konopnicki D Unsupervised Dual-Cascade Learning with Pseudo-Feedback Distillation for Query-Focused Extractive Summarization Proceedings of The Web Conference 2020, (2577-2584)
  26. ACM
    Chan C, Aleti A, Heger A and Smith-Miles K Evolving stellar models to find the origins of our galaxy Proceedings of the Genetic and Evolutionary Computation Conference, (1129-1137)
  27. ACM
    Chou T and Hsueh Y A Task-oriented Chatbot Based on LSTM and Reinforcement Learning Proceedings of the 2019 3rd International Conference on Natural Language Processing and Information Retrieval, (87-91)
  28. Sepehr A and Beigy H (2019). Viral Cascade Probability Estimation and Maximization in Diffusion Networks, IEEE Transactions on Knowledge and Data Engineering, 31:3, (589-600), Online publication date: 1-Mar-2019.
  29. Hu L and Andradóttir S (2018). An Asymptotically Optimal Set Approach for Simulation Optimization, INFORMS Journal on Computing, 31:1, (21-39), Online publication date: 1-Feb-2019.
  30. Dang D, Lehre P and Nguyen P (2019). Level-Based Analysis of the Univariate Marginal Distribution Algorithm, Algorithmica, 81:2, (668-702), Online publication date: 1-Feb-2019.
  31. Huang Z, Lam H and Zhao D Rare-event simulation without structural information Proceedings of the 2018 Winter Simulation Conference, (1826-1837)
  32. Gao Y, Chen L and Li B Post Proceedings of the 32nd International Conference on Neural Information Processing Systems, (9993-10002)
  33. O'Kelly M, Sinha A, Namkoong H, Duchi J and Tedrake R Scalable end-to-end autonomous vehicle testing via rare-event simulation Proceedings of the 32nd International Conference on Neural Information Processing Systems, (9849-9860)
  34. ACM
    Liu Z, Yang Y, Zhou M and Li Z A Unified Cross-entropy Based Task Scheduling Algorithm for Heterogeneous Fog Networks Proceedings of the 1st ACM International Workshop on Smart Cities and Fog Computing, (1-6)
  35. Miarnaeimi F, Azizyan G and Rashki M (2018). Multi-level cross entropy optimizer (MCEO), Engineering with Computers, 34:4, (719-739), Online publication date: 1-Oct-2018.
  36. ACM
    Katevas K, Arapakis I and Pielot M Typical phone use habits Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services, (1-13)
  37. Joseph A and Bhatnagar S (2018). An online prediction algorithm for reinforcement learning with linear function approximation using cross entropy method, Machine Language, 107:8-10, (1385-1429), Online publication date: 1-Sep-2018.
  38. ACM
    Woltmann L, Thiele M and Lehner W Modeling Customers and Products with Word Embeddings from Receipt Data Proceedings of the 22nd International Database Engineering & Applications Symposium, (246-252)
  39. Fang K, Bai Y, Hinterstoisser S, Savarese S and Kalakrishnan M Multi-Task Domain Adaptation for Deep Learning of Instance Grasping from Simulation 2018 IEEE International Conference on Robotics and Automation (ICRA), (3516-3523)
  40. Fahimnia B, Davarzani H and Eshragh A (2018). Planning of complex supply chains, Computers and Operations Research, 89:C, (241-252), Online publication date: 1-Jan-2018.
  41. Kim Y, Gur Y and Kochenderfer M Heuristics for planning with rare catastrophic events Proceedings of the 2017 Winter Simulation Conference, (1-12)
  42. Zhang Q and Hu J A two-time-scale adaptive search algorithm for global optimization Proceedings of the 2017 Winter Simulation Conference, (1-11)
  43. ACM
    Feigenblat G, Boni O, Roitman H and Konopnicki D SummIt Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, (2459-2462)
  44. Jiang S, Armaly A and McMillan C Automatically generating commit messages from diffs using neural machine translation Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, (135-146)
  45. ACM
    Gonschorek T, Rabeler B, Ortmeier F and Schomburg D On improving rare event simulation for probabilistic safety analysis Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, (15-24)
  46. źMieja M and Wiercioch M (2017). Constrained clustering with a complex cluster structure, Advances in Data Analysis and Classification, 11:3, (493-518), Online publication date: 1-Sep-2017.
  47. Lin Y, Hong Z, Liao Y, Shih M, Liu M and Sun M Tactics of adversarial attack on deep reinforcement learning agents Proceedings of the 26th International Joint Conference on Artificial Intelligence, (3756-3762)
  48. ACM
    Feigenblat G, Roitman H, Boni O and Konopnicki D Unsupervised Query-Focused Multi-Document Summarization using the Cross Entropy Method Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, (961-964)
  49. Liu Y and Hu S (2017). Renewable Energy Pricing Driven Scheduling in Distributed Smart Community Systems, IEEE Transactions on Parallel and Distributed Systems, 28:5, (1445-1456), Online publication date: 1-May-2017.
  50. ACM
    Hirosue K, Ukawa S, Itoh Y, Onoye T and Hashimoto M GPGPU-based Highly Parallelized 3D Node Localization for Real-Time 3D Model Reproduction Proceedings of the 22nd International Conference on Intelligent User Interfaces, (173-178)
  51. Omidshafiei S, Agha-Mohammadi A, Amato C, Liu S, How J and Vian J (2017). Decentralized control of multi-robot partially observable Markov decision processes using belief space macro-actions, International Journal of Robotics Research, 36:2, (231-258), Online publication date: 1-Feb-2017.
  52. Ollivier Y, Arnold L, Auger A and Hansen N (2017). Information-geometric optimization algorithms, The Journal of Machine Learning Research, 18:1, (564-628), Online publication date: 1-Jan-2017.
  53. Kalir A and Tirkel I Scheduling preventive maintenance within a queue time for maximum throughput in semiconductor manufacturing Proceedings of the 2016 Winter Simulation Conference, (2750-2761)
  54. Joseph A and Bhatnagar S A randomized algorithm for continuous optimization Proceedings of the 2016 Winter Simulation Conference, (907-918)
  55. Fan Q and Hu J Simulation optimization via promising region search and surrogate model approximation Proceedings of the 2016 Winter Simulation Conference, (649-658)
  56. Borrotti M, Minervini G, De Lucrezia D and Poli I (2016). Nave Bayes ant colony optimization for designing high dimensional experiments, Applied Soft Computing, 49:C, (259-268), Online publication date: 1-Dec-2016.
  57. Li Y and Lyons K Word representation using a deep neural network Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, (268-279)
  58. Chen X, Jiao L, Li W and Fu X (2016). Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing, IEEE/ACM Transactions on Networking, 24:5, (2795-2808), Online publication date: 1-Oct-2016.
  59. Yager R and Petry F (2016). An intelligent quality-based approach to fusing multi-source probabilistic information, Information Fusion, 31:C, (127-136), Online publication date: 1-Sep-2016.
  60. Duan Q and Kroese D (2016). Splitting for optimization, Computers and Operations Research, 73:C, (119-131), Online publication date: 1-Sep-2016.
  61. Joseph A and Bhatnagar S Revisiting the cross entropy method with applications in stochastic global optimization and reinforcement learning Proceedings of the Twenty-second European Conference on Artificial Intelligence, (1026-1034)
  62. Azim M, Aung Z, Xiao W, Khadkikar V and Jamalipour A (2016). SPSA-NC, Wireless Communications & Mobile Computing, 16:12, (1570-1587), Online publication date: 25-Aug-2016.
  63. Chen X, Chen Y, Zomaya A, Ranjan R and Hu S (2016). CEVP, The Journal of Supercomputing, 72:8, (3194-3209), Online publication date: 1-Aug-2016.
  64. Lin K and Marcus S (2016). Cumulative weighting optimization, Journal of Global Optimization, 65:3, (487-512), Online publication date: 1-Jul-2016.
  65. Jaderyan M and Khotanlou H (2016). Virulence Optimization Algorithm, Applied Soft Computing, 43:C, (596-618), Online publication date: 1-Jun-2016.
  66. Gal A, Roitman H and Sagi T From Diversity-based Prediction to Better Ontology & Schema Matching Proceedings of the 25th International Conference on World Wide Web, (1145-1155)
  67. ACM
    Belzner L Time-adaptive cross entropy planning Proceedings of the 31st Annual ACM Symposium on Applied Computing, (254-259)
  68. ACM
    Thomee B, Arapakis I and Shamma D (2016). Finding Social Points of Interest from Georeferenced and Oriented Online Photographs, ACM Transactions on Multimedia Computing, Communications, and Applications, 12:2, (1-23), Online publication date: 3-Mar-2016.
  69. Gao S and Chen W A note on the subset selection for simulation optimization Proceedings of the 2015 Winter Simulation Conference, (3768-3776)
  70. źIlka L and JurăźíăźEk F LecTrack Proceedings of the 18th International Conference on Text, Speech, and Dialogue - Volume 9302, (174-182)
  71. ACM
    Jaśkowski W, Szubert M, Liskowski P and Krawiec K High-Dimensional Function Approximation for Knowledge-Free Reinforcement Learning Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (567-573)
  72. ACM
    Malagò L and Pistone G Information Geometry of the Gaussian Distribution in View of Stochastic Optimization Proceedings of the 2015 ACM Conference on Foundations of Genetic Algorithms XIII, (150-162)
  73. ACM
    Wang H and Zhou X (2015). A Cross-Entropy Scheme for Mixtures, ACM Transactions on Modeling and Computer Simulation, 25:1, (1-20), Online publication date: 14-Jan-2015.
  74. Scherrer B, Ghavamzadeh M, Gabillon V, Lesner B and Geist M (2015). Approximate modified policy iteration and its application to the game of Tetris, The Journal of Machine Learning Research, 16:1, (1629-1676), Online publication date: 1-Jan-2015.
  75. ACM
    Papagiannopoulou C and Mezaris V Concept-based Image Clustering and Summarization of Event-related Image Collections Proceedings of the 1st ACM International Workshop on Human Centered Event Understanding from Multimedia, (23-28)
  76. ACM
    Hu J, Zhou E and Fan Q (2014). Model-Based Annealing Random Search with Stochastic Averaging, ACM Transactions on Modeling and Computer Simulation, 24:4, (1-23), Online publication date: 13-Aug-2014.
  77. ACM
    Roitman H, Hummel S and Kurland O Using the cross-entropy method to re-rank search results Proceedings of the 37th international ACM SIGIR conference on Research & development in information retrieval, (839-842)
  78. Nguyen D, Le Thi H and Pham Dinh T (2014). Solving the Multidimensional Assignment Problem by a Cross-Entropy method, Journal of Combinatorial Optimization, 27:4, (808-823), Online publication date: 1-May-2014.
  79. Jung T, Wehenkel L, Ernst D and Maes F (2014). Optimized look-ahead tree policies, International Journal of Adaptive Control and Signal Processing, 28:3-5, (255-289), Online publication date: 1-Mar-2014.
  80. Caserta M and Voíß S (2014). A hybrid algorithm for the DNA sequencing problem, Discrete Applied Mathematics, 163:P1, (87-99), Online publication date: 30-Jan-2014.
  81. Le Thi H, Nguyen D and Pham Dinh T (2014). A DC programming approach for planning a multisensor multizone search for a target, Computers and Operations Research, 41, (231-239), Online publication date: 1-Jan-2014.
  82. Chen X and Zhou E Population model-based optimization with sequential Monte Carlo Proceedings of the 2013 Winter Simulation Conference: Simulation: Making Decisions in a Complex World, (1004-1015)
  83. Wadman W, Crommelin D and Frank J Applying a splitting technique to estimate electrical grid reliability Proceedings of the 2013 Winter Simulation Conference: Simulation: Making Decisions in a Complex World, (577-588)
  84. ACM
    Wolpert D (2013). Ubiquity symposium: Evolutionary computation and the processes of life: what the no free lunch theorems really mean: how to improve search algorithms, Ubiquity, 2013:December, (1-15), Online publication date: 1-Dec-2013.
  85. Reijsbergen D, de Boer P, Scheinhardt W and Haverkort B Automated rare event simulation for stochastic petri nets Proceedings of the 10th international conference on Quantitative Evaluation of Systems, (372-388)
  86. Kaspi M and Raviv T (2013). Service-Oriented Line Planning and Timetabling for Passenger Trains, Transportation Science, 47:3, (295-311), Online publication date: 1-Aug-2013.
  87. ACM
    Chockler H, Even K and Yahav E Finding rare numerical stability errors in concurrent computations Proceedings of the 2013 International Symposium on Software Testing and Analysis, (12-22)
  88. ACM
    Lanillos P, Yañez-Zuluaga J, Ruz J and Besada-Portas E A bayesian approach for constrained multi-agent minimum time search in uncertain dynamic domains Proceedings of the 15th annual conference on Genetic and evolutionary computation, (391-398)
  89. ACM
    Mazloom M, Gavves E, van de Sande K and Snoek C Searching informative concept banks for video event detection Proceedings of the 3rd ACM conference on International conference on multimedia retrieval, (255-262)
  90. Calinon S, Kormushev P and Caldwell D (2013). Compliant skills acquisition and multi-optima policy search with EM-based reinforcement learning, Robotics and Autonomous Systems, 61:4, (369-379), Online publication date: 1-Apr-2013.
  91. ACM
    Chockler H, Ivrii A, Matsliah A, Rollini S and Sharygina N Using cross-entropy for satisfiability Proceedings of the 28th Annual ACM Symposium on Applied Computing, (1196-1203)
  92. ACM
    Schäfer C (2013). Particle Algorithms for Optimization on Binary Spaces, ACM Transactions on Modeling and Computer Simulation, 23:1, (1-25), Online publication date: 1-Jan-2013.
  93. Lam H Efficient importance sampling under partial information Proceedings of the Winter Simulation Conference, (1-12)
  94. Guerra R, Boza A, Gajate A and del Toro R Modified shared circuits model for manufacturing processes control Proceedings of the 2012 international conference on Brain Informatics, (232-242)
  95. Muñoz D and Muñoz D (2012). Algorithms for the generalized weighted frequency assignment problem, Computers and Operations Research, 39:12, (3256-3266), Online publication date: 1-Dec-2012.
  96. ACM
    Sankaranarayanan S and Fainekos G Falsification of temporal properties of hybrid systems using the cross-entropy method Proceedings of the 15th ACM international conference on Hybrid Systems: Computation and Control, (125-134)
  97. Ribeiro C and Resende M (2012). Path-relinking intensification methods for stochastic local search algorithms, Journal of Heuristics, 18:2, (193-214), Online publication date: 1-Apr-2012.
  98. Shahid M Cross entropy minimization for efficient estimation of SRAM failure rate Proceedings of the Conference on Design, Automation and Test in Europe, (230-235)
  99. Hu J and Wang C Discrete optimization via approximate annealing adaptive search with stochastic averaging Proceedings of the Winter Simulation Conference, (4206-4216)
  100. Zabinsky Z, Wang W, Prasetio Y, Ghate A and Yen J Adaptive probabilistic branch and bound for level set approximation Proceedings of the Winter Simulation Conference, (4151-4162)
  101. Blanchet J and Shi Y Efficient rare event simulation for heavy-tailed systems via cross entropy Proceedings of the Winter Simulation Conference, (516-527)
  102. Brereton T, Chan J and Kroese D Fitting mixture importance sampling distributions via improved cross-entropy Proceedings of the Winter Simulation Conference, (422-428)
  103. Blanchet J and Lam H Rare event simulation techniques Proceedings of the Winter Simulation Conference, (146-160)
  104. ACM
    Li X, Gavves E, Snoek C, Worring M and Smeulders A Personalizing automated image annotation using cross-entropy Proceedings of the 19th ACM international conference on Multimedia, (233-242)
  105. Peters T, Bulger D, Loi T, Yang J and Ma D (2011). Two-Step Cross-Entropy Feature Selection for Microarrays—Power Through Complementarity, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 8:4, (1148-1151), Online publication date: 1-Jul-2011.
  106. Oklander B and Sidi M Cross-entropy optimized cognitive radio policies Proceedings of the IFIP TC 6th international conference on Networking, (13-21)
  107. Gatti N and Restelli M Equilibrium approximation in simulation-based extensive-form games The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, (199-206)
  108. Botev Z and Kroese D (2011). The Generalized Cross Entropy Method, with Applications to Probability Density Estimation, Methodology and Computing in Applied Probability, 13:1, (1-27), Online publication date: 1-Mar-2011.
  109. ACM
    Malagò L, Matteucci M and Pistone G Towards the geometry of estimation of distribution algorithms based on the exponential family Proceedings of the 11th workshop proceedings on Foundations of genetic algorithms, (230-242)
  110. Hu J and Hu P An approximate annealing search algorithm to global optimization and its connection to stochastic approximation Proceedings of the Winter Simulation Conference, (1223-1234)
  111. Chen X and Zhou E Simulation method for solving hybrid influence diagrams in decision making Proceedings of the Winter Simulation Conference, (383-392)
  112. ACM
    Chen G, Sarrafzadeh A, Low C and Zhang L (2010). A self-organization mechanism based on cross-entropy method for P2P-like applications, ACM Transactions on Autonomous and Adaptive Systems, 5:4, (1-31), Online publication date: 1-Nov-2010.
  113. Gortázar F, Duarte A, Laguna M and Martí R (2010). Black box scatter search for general classes of binary optimization problems, Computers and Operations Research, 37:11, (1977-1986), Online publication date: 1-Nov-2010.
  114. Lin S (2010). Rank aggregation methods, WIREs Computational Statistics, 2:5, (555-570), Online publication date: 1-Sep-2010.
  115. Zhang Y, Zheng G, Ji C, Wong K, Edwards D and Cui T (2010). Near-optimal joint antenna selection for amplify-and-forward relay networks, IEEE Transactions on Wireless Communications, 9:8, (2401-2407), Online publication date: 1-Aug-2010.
  116. ACM
    Zhao X, Guo Y, Feng Z and Hu S Parallel hierarchical cross entropy optimization for on-chip decap budgeting Proceedings of the 47th Design Automation Conference, (843-848)
  117. Rubinstein R (2010). Randomized Algorithms with Splitting: Why the Classic Randomized Algorithms Do Not Work and How to Make them Work, Methodology and Computing in Applied Probability, 12:1, (1-50), Online publication date: 1-Mar-2010.
  118. Naeem M and Lee D A joint symbol detection algorithm efficient at low SNR for a multi-device STBC-MIMO system Proceedings of the 2010 IEEE conference on Radio and wireless symposium, (440-443)
  119. ACM
    He D, Lee L, Chen C, Fu M and Wasserkrug S (2010). Simulation optimization using the cross-entropy method with optimal computing budget allocation, ACM Transactions on Modeling and Computer Simulation, 20:1, (1-22), Online publication date: 1-Jan-2010.
  120. Hu J and Hu P On the performance of the cross-entropy method Winter Simulation Conference, (459-468)
  121. ACM
    Walter I, Cidon I, Kolodny A and Sigalov D The era of many-modules SoC Proceedings of the 2nd International Workshop on Network on Chip Architectures, (43-48)
  122. Bahukudumbi S and Chakrabarty K (2009). Power management using test-pattern ordering for wafer-level test during burn-in, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 17:12, (1730-1741), Online publication date: 1-Dec-2009.
  123. Rubinstein R (2009). The Gibbs Cloner for Combinatorial Optimization, Counting and Sampling, Methodology and Computing in Applied Probability, 11:4, (491-549), Online publication date: 1-Dec-2009.
  124. Zhou A, Zhang Q and Jin Y (2009). Approximating the set of Pareto-optimal solutions in both the decision and objective spaces by an estimation of distribution algorithm, IEEE Transactions on Evolutionary Computation, 13:5, (1167-1189), Online publication date: 1-Oct-2009.
  125. Zhang Y, Ji C, Malik W, O'Brien D and Edwards D (2009). Receive antenna selection for MIMO systems over correlated fading channels, IEEE Transactions on Wireless Communications, 8:9, (4393-4399), Online publication date: 1-Sep-2009.
  126. Simonin C, Le Cadre J and Dambreville F (2009). A hierarchical approach for planning a multisensor multizone search for a moving target, Computers and Operations Research, 36:7, (2179-2192), Online publication date: 1-Jul-2009.
  127. Isaacs J Stochastic orthogonal and nonorthogonal subspace basis pursuit Proceedings of the 2009 international joint conference on Neural Networks, (2496-2501)
  128. Polushina T Estimating optimal stopping rules in the multiple best choice problem with minimal summarized rank via the cross-entropy method Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (1668-1674)
  129. Chan J and Kroese D Randomized methods for solving the winner determination problem in combinatorial auctions Proceedings of the 40th Conference on Winter Simulation, (1344-1349)
  130. Zhou E, Fu M and Marcus S A particle filtering framework for randomized optimization algorithms Proceedings of the 40th Conference on Winter Simulation, (647-654)
  131. Kim S and Henderson S The mathematics of continuous-variable simulation optimization Proceedings of the 40th Conference on Winter Simulation, (122-132)
  132. Sigalov D and Shimkin N Cross-entropy based data association for multi target tracking Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools, (1-10)
  133. Boubezoul A, Paris S and Ouladsine M (2008). Application of the cross entropy method to the GLVQ algorithm, Pattern Recognition, 41:10, (3173-3178), Online publication date: 1-Oct-2008.
  134. Wierstra D, Schaul T, Peters J and Schmidhuber J Fitness Expectation Maximization Proceedings of the 10th International Conference on Parallel Problem Solving from Nature --- PPSN X - Volume 5199, (337-346)
  135. Botev Z and Kroese D (2008). Non-asymptotic Bandwidth Selection for Density Estimation of Discrete Data, Methodology and Computing in Applied Probability, 10:3, (435-451), Online publication date: 1-Sep-2008.
  136. ACM
    Frank J, Mannor S and Precup D Reinforcement learning in the presence of rare events Proceedings of the 25th international conference on Machine learning, (336-343)
  137. Rubinstein R (2008). Semi-Iterative Minimum Cross-Entropy Algorithms for Rare-Events, Counting, Combinatorial and Integer Programming, Methodology and Computing in Applied Probability, 10:2, (121-178), Online publication date: 1-Jun-2008.
  138. Ortiz-García E and Pérez-Bellido Á Hybrid cross-entropy method/Hopfield neural network for combinatorial optimization problems Proceedings of the 8th international conference on Intelligent data engineering and automated learning, (1160-1169)
  139. Evans G, Keith J and Kroese D Parallel cross-entropy optimization Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come, (2196-2202)
  140. Heegaard P and Sandmann W Ant-based approach for determining the change of measure in importance sampling Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come, (412-420)
  141. ACM
    Menzies T, Elrawas O, Hihn J, Feather M, Madachy R and Boehm B The business case for automated software engineering Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering, (303-312)
  142. Heegaard P and Sandmann W Evaluating differentiated quality of service parameters in optical packet switching Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, (162-174)
  143. Boubezoul A, Paris S and Ouladsine M Improving the GRLVQ algorithm by the cross entropy method Proceedings of the 17th international conference on Artificial neural networks, (199-208)
  144. Costa A, Jones O and Kroese D (2007). Convergence properties of the cross-entropy method for discrete optimization, Operations Research Letters, 35:5, (573-580), Online publication date: 1-Sep-2007.
  145. Oliphant L and Shavlik J Using Bayesian networks to direct stochastic search in inductive logic programming Proceedings of the 17th international conference on Inductive logic programming, (191-199)
  146. Zhang H and Fu M Applying model reference adaptive search to American-style option pricing Proceedings of the 38th conference on Winter simulation, (711-718)
  147. Kroese D, Porotsky S and Rubinstein R (2006). The Cross-Entropy Method for Continuous Multi-Extremal Optimization, Methodology and Computing in Applied Probability, 8:3, (383-407), Online publication date: 1-Sep-2006.
  148. Rubinstein R (2006). How Many Needles are in a Haystack, or How to Solve #P-Complete Counting Problems Fast, Methodology and Computing in Applied Probability, 8:1, (5-51), Online publication date: 1-Mar-2006.
  149. Fu M, Glover F and April J Simulation optimization Proceedings of the 37th conference on Winter simulation, (83-95)
  150. Wu J and Chung A Cross entropy Proceedings of the 8th international conference on Medical Image Computing and Computer-Assisted Intervention - Volume Part I, (229-237)
  151. ACM
    Mannor S, Peleg D and Rubinstein R The cross entropy method for classification Proceedings of the 22nd international conference on Machine learning, (561-568)
  152. Nariai S, Hui K and Kroese D Designing an optimal network using the cross-entropy method Proceedings of the 6th international conference on Intelligent Data Engineering and Automated Learning, (228-233)
  153. ACM
    Perelman L and Ostfeld A Water distribution systems optimal design using cross entropy Proceedings of the 7th annual conference on Genetic and evolutionary computation, (647-648)
  154. Rubinstein R (2005). A Stochastic Minimum Cross-Entropy Method for Combinatorial Optimization and Rare-event Estimation*, Methodology and Computing in Applied Probability, 7:1, (5-50), Online publication date: 1-Mar-2005.
  155. Botev Z and Kroese D Global likelihood optimization via the cross-entropy method with an application to mixture models Proceedings of the 36th conference on Winter simulation, (529-535)
  156. Kroese D and Rubinstein R (2004). The Transform Likelihood Ratio Method for Rare Event Simulation with Heavy Tails, Queueing Systems: Theory and Applications, 46:3/4, (317-351), Online publication date: 1-Mar-2004.
Contributors
  • Technion - Israel Institute of Technology
  • The University of Queensland

Reviews

Constantin S Chassapis

Rarely have I seen such a dense and straight to the point pedagogical monograph on such a modern subject. This excellent book, on the simulated cross-entropy method (CEM) pioneered by one of the authors (Rubinstein), is very well written, starting with an exposition on the notions to be used, continuing with examples and a detailed presentation of the variants of the method, and closing with a discussion of how CEM effectively attacks an impressive list of modern problems. These modern problems include combinatorial optimization problems (COP), like the traveling salesman problem (TSP); the quadratic assignment problem (QAP); the max-cut problem; the alignment of deoxyribonucleic acid (DNA) sequences, and noisy estimation problems, like the buffer allocation problem (BAP); noisy optimization; continuous multi-external optimization; machine learning; and clustering and vector quantization problems. The amazing thing is that such a diverse list of topics is attacked and solved by methodologies that all have, at their core, the same simple notions. These notions are briefly presented below. Assume that we are searching for the solution of an integral of the form A = I[f(x)g(x;u)dx] = E u[f] , where x , and u are multidimensional vectors. We also assume that no analytical solution is known. We use Monte Carlo simulation. We first try the "brute force" estimator, (1/N) Σi [f(x i)] , where the N points x i follow the g(x;u) distribution. The problem arises when f(x) is meaningful where the values x i are very rare, according to g . In this case, we might use an extremely large N to estimate the quantity A with an acceptable relative error. A clever approach is to find an importance sampling (IS) function h(x) , usually belonging to the family of the g(x;u) densities, and then attack an easier problem to solve: I[f(x) g(x)/h(x) h(x)dx] = E h[fg/h] . Now we go stochastic again, and use a first generation of N points { x i} that follow the h(x) distribution, and the estimator: (1/N) Σ i[f(x i) g(x i)/h(x i)] . The best way to use this estimator is to find the best h(x) to use, and this best, named g* , is equal to f(x)g(x;u)/A , since, when we put this in the summation above, we get (1/N)NA = A . The problem is that this best h is utopic, since A is unknown. If we then start from a nonoptimal h , the question is: "Can we use a generation of sample points x i so as to improve h , and then repeat the process with an ameliorated h __ __" This compels us to find a way to compare the h distributions with the initial g *. Here, the Kullback-Leibler distance (or cross-entropy) is used: D g (g;h) = I[ln(g(x)/h(x)) g(x)dx] = I[g lng dx] - I[g lnh dx] >= 0. So, what we are searching for is an h with the minimal D from g *; we are searching for the solution to the functional minimization problem minh{ D g *( g *; h )}, where the class of densities h is restricted to the family g(x;v) , such that minv{ Dg *( g *; g(x;v) }. Since the first term of D does not depend on v , this reduces to maximizing only I[g * lng(x;v)dx] with respect to v . Putting the expression for g * back we get: maxv{ I[(f(x)g(x;v)/A) lng(x;v)dx]} = maxv{ E u [f(x)lng(x;v)]} . But now we can again use the IS-approach on the last expectation integral with an IS-density like g(x;w) , to obtain: maxv{ E w [f(x)lng(x;v)g(x;u)/g(x;w)]} . Obviously, we perform this step because we want to create an iterative algorithm that will approximate g *, little-by-little, searching the u -space of g(x;u) . Now the last expression can be attacked stochastically, as we did for A , namely: v * = arg-maxv {(1/N) Σi[f(xi)lng( x i; v ) g (xi; u )/ g (xi; w )]} (a), where the x i follow the g(x;w) distribution. In typical applications, the part inside the brackets {} is a convex and differentiable function with respect to v , so v * can be found by solving the following system of equations: (1/ N ) Σi[ f ( x i) g ( x i; u )/ g ( x i; w )( d/dx )lng( x i; v )]} = 0. So, the main CE algorithm is: (1) Set t =1, v 0= u (2) Generate sample { x i } from the density g ( x ; v t -1) (3) Calculate f ( x i) and maybe do some tricks here (4) Solve the maximization problem (a) using v t -1 in place of w . Set v t = v (5) Set t = t +1 and go to 2, until satisfied (6) Estimate (1/ N ) Σ i[ f ( x i) g ( x i; u )/ g ( x i;v t)] using the latest x i set available. Step 3 and the "until satisfied" of step 5 need some clarification: since we stay in the family of the initial probability density function (pdf), there is strong potential that f ( x ) will still be meaningful for rare cases, and the initial problem remains, even under g ( x ; w ). The trick here is to go from f to a family of f s, specifically, to slightly redefine f at each iteration, so that, at each iteration, each v t will provide the optimal IS for the redefined f and the redefined A . Convergence criteria will be satisfied when the successive redefinitions of f drive it to the original f . COP problems are attacked by the CE method, by translating the original deterministic optimization into a related stochastic estimation problem, and then applying the rare-event machinery of the CE method. In general, however, choosing an appropriate parameterization and sampling scheme is more of an art than a science. The book contains exercises, extensive numerical examples, an extensive introduction into every subject (supported by an extensive literature survey), example programs, and an associated Web site, http://www.cemethod.org, with additional material, namely, programs, tutorials, papers, and links. Scientists involved in any of the problems mentioned above, students of the physical and engineering sciences, and any researcher involved in stochastic optimization and simulation should read this book. Readers will benefit from this book, both in inspiration, and in grasping the essence of a modern, extremely powerful, computational tool. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations