Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2739480.2754712acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
research-article

Operator Selection using Improved Dynamic Multi-Armed Bandit

Published: 11 July 2015 Publication History

Abstract

Evolutionary algorithms greatly benefit from an optimal application of the different genetic operators during the optimization process: thus, it is not surprising that several research lines in literature deal with the self-adapting of activation probabilities for operators. The current state of the art revolves around the use of the Multi-Armed Bandit (MAB) and Dynamic Multi-Armed bandit (D-MAB) paradigms, that modify the selection mechanism based on the rewards of the different operators. Such methodologies, however, update the probabilities after each operator's application, creating possible issues with positive feedbacks and impairing parallel evaluations, one of the strongest advantages of evolutionary computation in an industrial perspective. Moreover, D-MAB techniques often rely upon measurements of population diversity, that might not be applicable to all real-world scenarios. In this paper, we propose a generalization of the D-MAB approach, paired with a simple mechanism for operator management, that aims at removing several limitations of other D-MAB strategies, allowing for parallel evaluations and self-adaptive parameter tuning. Experimental results show that the approach is particularly effective with frameworks containing many different operators, even when some of them are ill-suited for the problem at hand, or are sporadically failing, as it commonly happens in the real world.

References

[1]
P. Auer, N. Cesa-Bianchi, and P. Fischer. Finite-time analysis of the multiarmed bandit problem. Machine learning, 47(2--3):235--256, 2002.
[2]
N. Cesa-Bianchi and G. Lugosi. Prediction, learning, and games. Cambridge University Press, 2006.
[3]
F. Corno, E. Sánchez, and G. Squillero. Evolving assembly programs: how games help microprocessor validation. Evolutionary Computation, IEEE Transactions on, 9(6):695--706, 2005.
[4]
L. DaCosta, A. Fialho, M. Schoenauer, and M. Sebag. Adaptive operator selection with dynamic multi-armed bandits. In Proceedings of the 10th annual conference on Genetic and evolutionary computation, pages 913--920. ACM, 2008.
[5]
K. Deb and D. E. Goldberg. An investigation of niche and species formation in genetic function optimization. In Proceedings of the 3rd International Conference on Genetic Algorithms, pages 42--50. Morgan Kaufmann Publishers Inc., 1989.
[6]
K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan. A fast and elitist multiobjective genetic algorithm: Nsga-ii. Evolutionary Computation, IEEE Transactions on, 6(2):182--197, 2002.
[7]
Á. Fialho, L. Da Costa, M. Schoenauer, and M. Sebag. Analyzing bandit-based adaptive operator selection mechanisms. Annals of Mathematics and Artificial Intelligence, 60(1--2):25--64, 2010.
[8]
S. Gandini, W. Ruzzarin, E. Sanchez, G. Squillero, and A. Tonda. A framework for automated detection of power-related software errors in industrial verification processes. Journal of Electronic Testing, 26(6):689--697, 2010.
[9]
N. Hansen and A. Ostermeier. Completely derandomized self-adaptation in evolution strategies. Evolutionary computation, 9(2):159--195, 2001.
[10]
D. V. Hinkley. Inference about the change-point from cumulative sum tests. Biometrika, 58(3):509--523, 1971.
[11]
T. L. Lai and H. Robbins. Asymptotically efficient adaptive allocation rules. Advances in applied mathematics, 6(1):4--22, 1985.
[12]
J. Maturana, Á. Fialho, F. Saubion, M. Schoenauer, and M. Sebag. Extreme compass and dynamic multi-armed bandits for adaptive operator selection. In Evolutionary Computation, 2009. CEC'09. IEEE Congress on, pages 365--372. IEEE, 2009.
[13]
J. Maturana, F. Lardeux, and F. Saubion. Autonomous operator management for evolutionary algorithms. Journal of Heuristics, 16(6):881--909, 2010.
[14]
J. Maturana and F. Saubion. A compass to guide genetic algorithms. In Parallel Problem Solving from Nature--PPSN X, pages 256--265. Springer, 2008.
[15]
R. Poli. A simple but theoretically-motivated method to control bloat in genetic programming. In Genetic Programming, pages 204--217. Springer, 2003.
[16]
E. Sanchez, M. Schillaci, and G. Squillero. Evolutionary Optimization: the μGP toolkit. Springer, 2011.
[17]
E. Sanchez, G. Squillero, and A. Tonda. Industrial applications of evolutionary algorithms, volume 34. Springer, 2012.
[18]
E. Sanchez, G. Squillero, and A. Tonda. Industrial applications of evolutionary algorithms, volume 34. Springer, 2012.
[19]
M. Schmidt and H. Lipson. Distilling free-form natural laws from experimental data. science, 324(5923):81--85, 2009.
[20]
A. Tonda, E. Lutton, and G. Squillero. Lamps: A test problem for cooperative coevolution. In Nature Inspired Cooperative Strategies for Optimization (NICSO 2011), pages 101--120. Springer, 2011.
[21]
J. M. Whitacre, T. Q. Pham, and R. A. Sarker. Use of statistical outlier detection method in adaptive evolutionary algorithms. In Proceedings of the 8th annual conference on Genetic and evolutionary computation, pages 1345--1352. ACM, 2006.

Cited By

View all
  • (2023)Automatically Choosing Selection Operator Based on Semantic Information in Evolutionary Feature ConstructionPRICAI 2023: Trends in Artificial Intelligence10.1007/978-981-99-7022-3_36(385-397)Online publication date: 10-Nov-2023
  • (2022)Evolutionary Multi-Armed Bandits with Genetic Thompson Sampling2022 IEEE Congress on Evolutionary Computation (CEC)10.1109/CEC55065.2022.9870279(1-8)Online publication date: 18-Jul-2022
  • (2021)Search Trajectory Networks Applied to the Cyclic Bandwidth Sum ProblemIEEE Access10.1109/ACCESS.2021.31260159(151266-151277)Online publication date: 2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
GECCO '15: Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation
July 2015
1496 pages
ISBN:9781450334723
DOI:10.1145/2739480
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 July 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. adaptivity
  2. evolutionary algorithms
  3. multi-armed bandit
  4. operator selection
  5. self-adapting

Qualifiers

  • Research-article

Conference

GECCO '15
Sponsor:

Acceptance Rates

GECCO '15 Paper Acceptance Rate 182 of 505 submissions, 36%;
Overall Acceptance Rate 1,669 of 4,410 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)5
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Automatically Choosing Selection Operator Based on Semantic Information in Evolutionary Feature ConstructionPRICAI 2023: Trends in Artificial Intelligence10.1007/978-981-99-7022-3_36(385-397)Online publication date: 10-Nov-2023
  • (2022)Evolutionary Multi-Armed Bandits with Genetic Thompson Sampling2022 IEEE Congress on Evolutionary Computation (CEC)10.1109/CEC55065.2022.9870279(1-8)Online publication date: 18-Jul-2022
  • (2021)Search Trajectory Networks Applied to the Cyclic Bandwidth Sum ProblemIEEE Access10.1109/ACCESS.2021.31260159(151266-151277)Online publication date: 2021
  • (2019)Dynamic Multi-Armed Bandit Algorithm for the Cyclic Bandwidth Sum ProblemIEEE Access10.1109/ACCESS.2019.29068407(40258-40270)Online publication date: 2019
  • (2019)Intelligent Adjustment of Game Properties at Run Time Using Multi-armed BanditsThe Computer Games Journal10.1007/s40869-019-00083-3Online publication date: 1-Aug-2019
  • (2018)Adaptive multiple crossover genetic algorithm to solve workforce scheduling and routing problemJournal of Heuristics10.1007/s10732-018-9385-xOnline publication date: 2-Aug-2018
  • (2018)Adaptive Multi-objective Local Search Algorithms for the Permutation Flowshop Scheduling ProblemLearning and Intelligent Optimization10.1007/978-3-030-05348-2_22(241-256)Online publication date: 10-Jun-2018
  • (2017)A Classification and Comparison of Credit Assignment Strategies in Multiobjective Adaptive Operator SelectionIEEE Transactions on Evolutionary Computation10.1109/TEVC.2016.260234821:2(294-314)Online publication date: 1-Apr-2017
  • (2017)Multi-objective Evolutionary Algorithms for Influence Maximization in Social NetworksApplications of Evolutionary Computation10.1007/978-3-319-55849-3_15(221-233)Online publication date: 25-Mar-2017
  • (2016)Identification and Rejuvenation of NBTI-Critical Logic Paths in Nanoscale CircuitsJournal of Electronic Testing: Theory and Applications10.1007/s10836-016-5589-x32:3(273-289)Online publication date: 1-Jun-2016
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media