No abstract available.
Cited By
- Kujanpää K, Pajarinen J and Ilin A Hybrid search for efficient planning with completeness guarantees Proceedings of the 37th International Conference on Neural Information Processing Systems, (22688-22701)
- Liu Z, Zhou G, He J, Marcucci T, Fei-Fei L, Wu J and Li Y Model-based control with sparse neural dynamics Proceedings of the 37th International Conference on Neural Information Processing Systems, (6280-6296)
- Ahn D and Zheng L Conditional Importance Sampling for Convex Rare-Event Sets Proceedings of the Winter Simulation Conference, (363-374)
- Reeb D, Patel K, Barsim K, Schiegg M and Gerwinn S Validation of composite systems by discrepancy propagation Proceedings of the Thirty-Ninth Conference on Uncertainty in Artificial Intelligence, (1730-1740)
- Rajeswar S, Mazzaglia P, Verbelen T, Piché A, Dhoedt B, Courville A and Lacoste A Mastering the unsupervised reinforcement learning benchmark from pixels Proceedings of the 40th International Conference on Machine Learning, (28598-28617)
- Motwani M and Brun Y Better Automatic Program Repair by Using Bug Reports and Tests Together Proceedings of the 45th International Conference on Software Engineering, (1225-1237)
- Guang J, Hong G, Chen X, Peng X, Chen L, Bai B and Zhang G Tail Quantile Estimation for Non-Preemptive Priority Queues Proceedings of the Winter Simulation Conference, (85-96)
- Mottahedi S and Pavlak G Constrained differentiable cross-entropy method for safe model-based reinforcement learning Proceedings of the 9th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, (40-48)
- Tufano R, Scalabrino S, Pascarella L, Aghajani E, Oliveto R and Bavota G Using reinforcement learning for load testing of video games Proceedings of the 44th International Conference on Software Engineering, (2303-2314)
- Corso A, Moss R, Koren M, Lee R and Kochenderfer M (2021). A Survey of Algorithms for Black-Box Safety Validation of Cyber-Physical Systems, Journal of Artificial Intelligence Research, 72, (377-428), Online publication date: 4-Jan-2022.
- Deo A and Murthy K Efficient black-box importance sampling for VaR and CVaR estimation Proceedings of the Winter Simulation Conference, (1-12)
- Marino J, Piché A, Ialongo A and Yue Y Iterative amortized policy optimization Proceedings of the 35th International Conference on Neural Information Processing Systems, (15667-15681)
- Yu S, Ahn S, Song L and Shin J RoMA Proceedings of the 35th International Conference on Neural Information Processing Systems, (4619-4631)
- Li S, Li M, Su J, Chen S, Yuan Z and Ye Q (2021). PP-PG: Combining Parameter Perturbation with Policy Gradient Methods for Effective and Efficient Explorations in Deep Reinforcement Learning, ACM Transactions on Intelligent Systems and Technology, 12:3, (1-21), Online publication date: 30-Jun-2021.
- Merani M, Croce D and Tinnirello I (2021). Rings for Privacy: An Architecture for Large Scale Privacy-Preserving Data Mining, IEEE Transactions on Parallel and Distributed Systems, 32:6, (1340-1352), Online publication date: 1-Jun-2021.
- Motwani M High-quality automated program repair Proceedings of the 43rd International Conference on Software Engineering: Companion Proceedings, (309-314)
- Tang S, Irissappane A, Oliehoek F and Zhang J Learning Complex Policy Distribution with CEM Guided Adversarial Hypernetwork Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems, (1308-1316)
- Nie X, Wang B, Yan P, Wu B and Gao C Key Point Defense and Target Threat Analysis Based on Data Fusion The 2nd International Conference on Computing and Data Science, (1-3)
- Pertsch K, Rybkin O, Ebert F, Finn C, Jayaraman D and Levine S Long-horizon visual planning with goal-conditioned hierarchical predictors Proceedings of the 34th International Conference on Neural Information Processing Systems, (17321-17333)
- Lee K, Lee B, Shin U and Kweon I An efficient asynchronous method for integrating evolutionary and gradient-based policy search Proceedings of the 34th International Conference on Neural Information Processing Systems, (10124-10135)
- Gangwani T, Zhou Y and Peng J Learning guidance rewards with trajectory-space smoothing Proceedings of the 34th International Conference on Neural Information Processing Systems, (822-832)
- Sabbioni L, Restelli M and Prampolini A Fast direct calibration of interest rate derivatives pricing models Proceedings of the First ACM International Conference on AI in Finance, (1-8)
- Alawieh M, Boning D and Pan D Wafer map defect patterns classification using deep selective learning Proceedings of the 57th ACM/EDAC/IEEE Design Automation Conference, (1-6)
- Emara S, Li B and Chen Y Eagle: Refining Congestion Control by Learning from the Experts IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, (676-685)
- Roitman H, Feigenblat G, Cohen D, Boni O and Konopnicki D Unsupervised Dual-Cascade Learning with Pseudo-Feedback Distillation for Query-Focused Extractive Summarization Proceedings of The Web Conference 2020, (2577-2584)
- Chan C, Aleti A, Heger A and Smith-Miles K Evolving stellar models to find the origins of our galaxy Proceedings of the Genetic and Evolutionary Computation Conference, (1129-1137)
- Chou T and Hsueh Y A Task-oriented Chatbot Based on LSTM and Reinforcement Learning Proceedings of the 2019 3rd International Conference on Natural Language Processing and Information Retrieval, (87-91)
- Sepehr A and Beigy H (2019). Viral Cascade Probability Estimation and Maximization in Diffusion Networks, IEEE Transactions on Knowledge and Data Engineering, 31:3, (589-600), Online publication date: 1-Mar-2019.
- Hu L and Andradóttir S (2018). An Asymptotically Optimal Set Approach for Simulation Optimization, INFORMS Journal on Computing, 31:1, (21-39), Online publication date: 1-Feb-2019.
- Dang D, Lehre P and Nguyen P (2019). Level-Based Analysis of the Univariate Marginal Distribution Algorithm, Algorithmica, 81:2, (668-702), Online publication date: 1-Feb-2019.
- Huang Z, Lam H and Zhao D Rare-event simulation without structural information Proceedings of the 2018 Winter Simulation Conference, (1826-1837)
- Gao Y, Chen L and Li B Post Proceedings of the 32nd International Conference on Neural Information Processing Systems, (9993-10002)
- O'Kelly M, Sinha A, Namkoong H, Duchi J and Tedrake R Scalable end-to-end autonomous vehicle testing via rare-event simulation Proceedings of the 32nd International Conference on Neural Information Processing Systems, (9849-9860)
- Liu Z, Yang Y, Zhou M and Li Z A Unified Cross-entropy Based Task Scheduling Algorithm for Heterogeneous Fog Networks Proceedings of the 1st ACM International Workshop on Smart Cities and Fog Computing, (1-6)
- Miarnaeimi F, Azizyan G and Rashki M (2018). Multi-level cross entropy optimizer (MCEO), Engineering with Computers, 34:4, (719-739), Online publication date: 1-Oct-2018.
- Katevas K, Arapakis I and Pielot M Typical phone use habits Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services, (1-13)
- Joseph A and Bhatnagar S (2018). An online prediction algorithm for reinforcement learning with linear function approximation using cross entropy method, Machine Language, 107:8-10, (1385-1429), Online publication date: 1-Sep-2018.
- Woltmann L, Thiele M and Lehner W Modeling Customers and Products with Word Embeddings from Receipt Data Proceedings of the 22nd International Database Engineering & Applications Symposium, (246-252)
- Fang K, Bai Y, Hinterstoisser S, Savarese S and Kalakrishnan M Multi-Task Domain Adaptation for Deep Learning of Instance Grasping from Simulation 2018 IEEE International Conference on Robotics and Automation (ICRA), (3516-3523)
- Fahimnia B, Davarzani H and Eshragh A (2018). Planning of complex supply chains, Computers and Operations Research, 89:C, (241-252), Online publication date: 1-Jan-2018.
- Kim Y, Gur Y and Kochenderfer M Heuristics for planning with rare catastrophic events Proceedings of the 2017 Winter Simulation Conference, (1-12)
- Zhang Q and Hu J A two-time-scale adaptive search algorithm for global optimization Proceedings of the 2017 Winter Simulation Conference, (1-11)
- Feigenblat G, Boni O, Roitman H and Konopnicki D SummIt Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, (2459-2462)
- Jiang S, Armaly A and McMillan C Automatically generating commit messages from diffs using neural machine translation Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, (135-146)
- Gonschorek T, Rabeler B, Ortmeier F and Schomburg D On improving rare event simulation for probabilistic safety analysis Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, (15-24)
- źMieja M and Wiercioch M (2017). Constrained clustering with a complex cluster structure, Advances in Data Analysis and Classification, 11:3, (493-518), Online publication date: 1-Sep-2017.
- Lin Y, Hong Z, Liao Y, Shih M, Liu M and Sun M Tactics of adversarial attack on deep reinforcement learning agents Proceedings of the 26th International Joint Conference on Artificial Intelligence, (3756-3762)
- Feigenblat G, Roitman H, Boni O and Konopnicki D Unsupervised Query-Focused Multi-Document Summarization using the Cross Entropy Method Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, (961-964)
- Liu Y and Hu S (2017). Renewable Energy Pricing Driven Scheduling in Distributed Smart Community Systems, IEEE Transactions on Parallel and Distributed Systems, 28:5, (1445-1456), Online publication date: 1-May-2017.
- Hirosue K, Ukawa S, Itoh Y, Onoye T and Hashimoto M GPGPU-based Highly Parallelized 3D Node Localization for Real-Time 3D Model Reproduction Proceedings of the 22nd International Conference on Intelligent User Interfaces, (173-178)
- Omidshafiei S, Agha-Mohammadi A, Amato C, Liu S, How J and Vian J (2017). Decentralized control of multi-robot partially observable Markov decision processes using belief space macro-actions, International Journal of Robotics Research, 36:2, (231-258), Online publication date: 1-Feb-2017.
- Ollivier Y, Arnold L, Auger A and Hansen N (2017). Information-geometric optimization algorithms, The Journal of Machine Learning Research, 18:1, (564-628), Online publication date: 1-Jan-2017.
- Kalir A and Tirkel I Scheduling preventive maintenance within a queue time for maximum throughput in semiconductor manufacturing Proceedings of the 2016 Winter Simulation Conference, (2750-2761)
- Joseph A and Bhatnagar S A randomized algorithm for continuous optimization Proceedings of the 2016 Winter Simulation Conference, (907-918)
- Fan Q and Hu J Simulation optimization via promising region search and surrogate model approximation Proceedings of the 2016 Winter Simulation Conference, (649-658)
- Borrotti M, Minervini G, De Lucrezia D and Poli I (2016). Nave Bayes ant colony optimization for designing high dimensional experiments, Applied Soft Computing, 49:C, (259-268), Online publication date: 1-Dec-2016.
- Li Y and Lyons K Word representation using a deep neural network Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, (268-279)
- Chen X, Jiao L, Li W and Fu X (2016). Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing, IEEE/ACM Transactions on Networking, 24:5, (2795-2808), Online publication date: 1-Oct-2016.
- Yager R and Petry F (2016). An intelligent quality-based approach to fusing multi-source probabilistic information, Information Fusion, 31:C, (127-136), Online publication date: 1-Sep-2016.
- Duan Q and Kroese D (2016). Splitting for optimization, Computers and Operations Research, 73:C, (119-131), Online publication date: 1-Sep-2016.
- Joseph A and Bhatnagar S Revisiting the cross entropy method with applications in stochastic global optimization and reinforcement learning Proceedings of the Twenty-second European Conference on Artificial Intelligence, (1026-1034)
- Azim M, Aung Z, Xiao W, Khadkikar V and Jamalipour A (2016). SPSA-NC, Wireless Communications & Mobile Computing, 16:12, (1570-1587), Online publication date: 25-Aug-2016.
- Chen X, Chen Y, Zomaya A, Ranjan R and Hu S (2016). CEVP, The Journal of Supercomputing, 72:8, (3194-3209), Online publication date: 1-Aug-2016.
- Lin K and Marcus S (2016). Cumulative weighting optimization, Journal of Global Optimization, 65:3, (487-512), Online publication date: 1-Jul-2016.
- Jaderyan M and Khotanlou H (2016). Virulence Optimization Algorithm, Applied Soft Computing, 43:C, (596-618), Online publication date: 1-Jun-2016.
- Gal A, Roitman H and Sagi T From Diversity-based Prediction to Better Ontology & Schema Matching Proceedings of the 25th International Conference on World Wide Web, (1145-1155)
- Belzner L Time-adaptive cross entropy planning Proceedings of the 31st Annual ACM Symposium on Applied Computing, (254-259)
- Thomee B, Arapakis I and Shamma D (2016). Finding Social Points of Interest from Georeferenced and Oriented Online Photographs, ACM Transactions on Multimedia Computing, Communications, and Applications, 12:2, (1-23), Online publication date: 3-Mar-2016.
- Gao S and Chen W A note on the subset selection for simulation optimization Proceedings of the 2015 Winter Simulation Conference, (3768-3776)
- źIlka L and JurăźíăźEk F LecTrack Proceedings of the 18th International Conference on Text, Speech, and Dialogue - Volume 9302, (174-182)
- Jaśkowski W, Szubert M, Liskowski P and Krawiec K High-Dimensional Function Approximation for Knowledge-Free Reinforcement Learning Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (567-573)
- Malagò L and Pistone G Information Geometry of the Gaussian Distribution in View of Stochastic Optimization Proceedings of the 2015 ACM Conference on Foundations of Genetic Algorithms XIII, (150-162)
- Wang H and Zhou X (2015). A Cross-Entropy Scheme for Mixtures, ACM Transactions on Modeling and Computer Simulation, 25:1, (1-20), Online publication date: 14-Jan-2015.
- Scherrer B, Ghavamzadeh M, Gabillon V, Lesner B and Geist M (2015). Approximate modified policy iteration and its application to the game of Tetris, The Journal of Machine Learning Research, 16:1, (1629-1676), Online publication date: 1-Jan-2015.
- Papagiannopoulou C and Mezaris V Concept-based Image Clustering and Summarization of Event-related Image Collections Proceedings of the 1st ACM International Workshop on Human Centered Event Understanding from Multimedia, (23-28)
- Hu J, Zhou E and Fan Q (2014). Model-Based Annealing Random Search with Stochastic Averaging, ACM Transactions on Modeling and Computer Simulation, 24:4, (1-23), Online publication date: 13-Aug-2014.
- Roitman H, Hummel S and Kurland O Using the cross-entropy method to re-rank search results Proceedings of the 37th international ACM SIGIR conference on Research & development in information retrieval, (839-842)
- Nguyen D, Le Thi H and Pham Dinh T (2014). Solving the Multidimensional Assignment Problem by a Cross-Entropy method, Journal of Combinatorial Optimization, 27:4, (808-823), Online publication date: 1-May-2014.
- Jung T, Wehenkel L, Ernst D and Maes F (2014). Optimized look-ahead tree policies, International Journal of Adaptive Control and Signal Processing, 28:3-5, (255-289), Online publication date: 1-Mar-2014.
- Caserta M and Voíß S (2014). A hybrid algorithm for the DNA sequencing problem, Discrete Applied Mathematics, 163:P1, (87-99), Online publication date: 30-Jan-2014.
- Le Thi H, Nguyen D and Pham Dinh T (2014). A DC programming approach for planning a multisensor multizone search for a target, Computers and Operations Research, 41, (231-239), Online publication date: 1-Jan-2014.
- Chen X and Zhou E Population model-based optimization with sequential Monte Carlo Proceedings of the 2013 Winter Simulation Conference: Simulation: Making Decisions in a Complex World, (1004-1015)
- Wadman W, Crommelin D and Frank J Applying a splitting technique to estimate electrical grid reliability Proceedings of the 2013 Winter Simulation Conference: Simulation: Making Decisions in a Complex World, (577-588)
- Wolpert D (2013). Ubiquity symposium: Evolutionary computation and the processes of life: what the no free lunch theorems really mean: how to improve search algorithms, Ubiquity, 2013:December, (1-15), Online publication date: 1-Dec-2013.
- Reijsbergen D, de Boer P, Scheinhardt W and Haverkort B Automated rare event simulation for stochastic petri nets Proceedings of the 10th international conference on Quantitative Evaluation of Systems, (372-388)
- Kaspi M and Raviv T (2013). Service-Oriented Line Planning and Timetabling for Passenger Trains, Transportation Science, 47:3, (295-311), Online publication date: 1-Aug-2013.
- Chockler H, Even K and Yahav E Finding rare numerical stability errors in concurrent computations Proceedings of the 2013 International Symposium on Software Testing and Analysis, (12-22)
- Lanillos P, Yañez-Zuluaga J, Ruz J and Besada-Portas E A bayesian approach for constrained multi-agent minimum time search in uncertain dynamic domains Proceedings of the 15th annual conference on Genetic and evolutionary computation, (391-398)
- Mazloom M, Gavves E, van de Sande K and Snoek C Searching informative concept banks for video event detection Proceedings of the 3rd ACM conference on International conference on multimedia retrieval, (255-262)
- Calinon S, Kormushev P and Caldwell D (2013). Compliant skills acquisition and multi-optima policy search with EM-based reinforcement learning, Robotics and Autonomous Systems, 61:4, (369-379), Online publication date: 1-Apr-2013.
- Chockler H, Ivrii A, Matsliah A, Rollini S and Sharygina N Using cross-entropy for satisfiability Proceedings of the 28th Annual ACM Symposium on Applied Computing, (1196-1203)
- Schäfer C (2013). Particle Algorithms for Optimization on Binary Spaces, ACM Transactions on Modeling and Computer Simulation, 23:1, (1-25), Online publication date: 1-Jan-2013.
- Lam H Efficient importance sampling under partial information Proceedings of the Winter Simulation Conference, (1-12)
- Guerra R, Boza A, Gajate A and del Toro R Modified shared circuits model for manufacturing processes control Proceedings of the 2012 international conference on Brain Informatics, (232-242)
- Muñoz D and Muñoz D (2012). Algorithms for the generalized weighted frequency assignment problem, Computers and Operations Research, 39:12, (3256-3266), Online publication date: 1-Dec-2012.
- Sankaranarayanan S and Fainekos G Falsification of temporal properties of hybrid systems using the cross-entropy method Proceedings of the 15th ACM international conference on Hybrid Systems: Computation and Control, (125-134)
- Ribeiro C and Resende M (2012). Path-relinking intensification methods for stochastic local search algorithms, Journal of Heuristics, 18:2, (193-214), Online publication date: 1-Apr-2012.
- Shahid M Cross entropy minimization for efficient estimation of SRAM failure rate Proceedings of the Conference on Design, Automation and Test in Europe, (230-235)
- Hu J and Wang C Discrete optimization via approximate annealing adaptive search with stochastic averaging Proceedings of the Winter Simulation Conference, (4206-4216)
- Zabinsky Z, Wang W, Prasetio Y, Ghate A and Yen J Adaptive probabilistic branch and bound for level set approximation Proceedings of the Winter Simulation Conference, (4151-4162)
- Blanchet J and Shi Y Efficient rare event simulation for heavy-tailed systems via cross entropy Proceedings of the Winter Simulation Conference, (516-527)
- Brereton T, Chan J and Kroese D Fitting mixture importance sampling distributions via improved cross-entropy Proceedings of the Winter Simulation Conference, (422-428)
- Blanchet J and Lam H Rare event simulation techniques Proceedings of the Winter Simulation Conference, (146-160)
- Li X, Gavves E, Snoek C, Worring M and Smeulders A Personalizing automated image annotation using cross-entropy Proceedings of the 19th ACM international conference on Multimedia, (233-242)
- Peters T, Bulger D, Loi T, Yang J and Ma D (2011). Two-Step Cross-Entropy Feature Selection for Microarrays—Power Through Complementarity, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 8:4, (1148-1151), Online publication date: 1-Jul-2011.
- Oklander B and Sidi M Cross-entropy optimized cognitive radio policies Proceedings of the IFIP TC 6th international conference on Networking, (13-21)
- Gatti N and Restelli M Equilibrium approximation in simulation-based extensive-form games The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, (199-206)
- Botev Z and Kroese D (2011). The Generalized Cross Entropy Method, with Applications to Probability Density Estimation, Methodology and Computing in Applied Probability, 13:1, (1-27), Online publication date: 1-Mar-2011.
- Malagò L, Matteucci M and Pistone G Towards the geometry of estimation of distribution algorithms based on the exponential family Proceedings of the 11th workshop proceedings on Foundations of genetic algorithms, (230-242)
- Hu J and Hu P An approximate annealing search algorithm to global optimization and its connection to stochastic approximation Proceedings of the Winter Simulation Conference, (1223-1234)
- Chen X and Zhou E Simulation method for solving hybrid influence diagrams in decision making Proceedings of the Winter Simulation Conference, (383-392)
- Chen G, Sarrafzadeh A, Low C and Zhang L (2010). A self-organization mechanism based on cross-entropy method for P2P-like applications, ACM Transactions on Autonomous and Adaptive Systems, 5:4, (1-31), Online publication date: 1-Nov-2010.
- Gortázar F, Duarte A, Laguna M and Martí R (2010). Black box scatter search for general classes of binary optimization problems, Computers and Operations Research, 37:11, (1977-1986), Online publication date: 1-Nov-2010.
- Lin S (2010). Rank aggregation methods, WIREs Computational Statistics, 2:5, (555-570), Online publication date: 1-Sep-2010.
- Zhang Y, Zheng G, Ji C, Wong K, Edwards D and Cui T (2010). Near-optimal joint antenna selection for amplify-and-forward relay networks, IEEE Transactions on Wireless Communications, 9:8, (2401-2407), Online publication date: 1-Aug-2010.
- Zhao X, Guo Y, Feng Z and Hu S Parallel hierarchical cross entropy optimization for on-chip decap budgeting Proceedings of the 47th Design Automation Conference, (843-848)
- Rubinstein R (2010). Randomized Algorithms with Splitting: Why the Classic Randomized Algorithms Do Not Work and How to Make them Work, Methodology and Computing in Applied Probability, 12:1, (1-50), Online publication date: 1-Mar-2010.
- Naeem M and Lee D A joint symbol detection algorithm efficient at low SNR for a multi-device STBC-MIMO system Proceedings of the 2010 IEEE conference on Radio and wireless symposium, (440-443)
- He D, Lee L, Chen C, Fu M and Wasserkrug S (2010). Simulation optimization using the cross-entropy method with optimal computing budget allocation, ACM Transactions on Modeling and Computer Simulation, 20:1, (1-22), Online publication date: 1-Jan-2010.
- Hu J and Hu P On the performance of the cross-entropy method Winter Simulation Conference, (459-468)
- Walter I, Cidon I, Kolodny A and Sigalov D The era of many-modules SoC Proceedings of the 2nd International Workshop on Network on Chip Architectures, (43-48)
- Bahukudumbi S and Chakrabarty K (2009). Power management using test-pattern ordering for wafer-level test during burn-in, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 17:12, (1730-1741), Online publication date: 1-Dec-2009.
- Rubinstein R (2009). The Gibbs Cloner for Combinatorial Optimization, Counting and Sampling, Methodology and Computing in Applied Probability, 11:4, (491-549), Online publication date: 1-Dec-2009.
- Zhou A, Zhang Q and Jin Y (2009). Approximating the set of Pareto-optimal solutions in both the decision and objective spaces by an estimation of distribution algorithm, IEEE Transactions on Evolutionary Computation, 13:5, (1167-1189), Online publication date: 1-Oct-2009.
- Zhang Y, Ji C, Malik W, O'Brien D and Edwards D (2009). Receive antenna selection for MIMO systems over correlated fading channels, IEEE Transactions on Wireless Communications, 8:9, (4393-4399), Online publication date: 1-Sep-2009.
- Simonin C, Le Cadre J and Dambreville F (2009). A hierarchical approach for planning a multisensor multizone search for a moving target, Computers and Operations Research, 36:7, (2179-2192), Online publication date: 1-Jul-2009.
- Isaacs J Stochastic orthogonal and nonorthogonal subspace basis pursuit Proceedings of the 2009 international joint conference on Neural Networks, (2496-2501)
- Polushina T Estimating optimal stopping rules in the multiple best choice problem with minimal summarized rank via the cross-entropy method Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (1668-1674)
- Chan J and Kroese D Randomized methods for solving the winner determination problem in combinatorial auctions Proceedings of the 40th Conference on Winter Simulation, (1344-1349)
- Zhou E, Fu M and Marcus S A particle filtering framework for randomized optimization algorithms Proceedings of the 40th Conference on Winter Simulation, (647-654)
- Kim S and Henderson S The mathematics of continuous-variable simulation optimization Proceedings of the 40th Conference on Winter Simulation, (122-132)
- Sigalov D and Shimkin N Cross-entropy based data association for multi target tracking Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools, (1-10)
- Boubezoul A, Paris S and Ouladsine M (2008). Application of the cross entropy method to the GLVQ algorithm, Pattern Recognition, 41:10, (3173-3178), Online publication date: 1-Oct-2008.
- Wierstra D, Schaul T, Peters J and Schmidhuber J Fitness Expectation Maximization Proceedings of the 10th International Conference on Parallel Problem Solving from Nature --- PPSN X - Volume 5199, (337-346)
- Botev Z and Kroese D (2008). Non-asymptotic Bandwidth Selection for Density Estimation of Discrete Data, Methodology and Computing in Applied Probability, 10:3, (435-451), Online publication date: 1-Sep-2008.
- Frank J, Mannor S and Precup D Reinforcement learning in the presence of rare events Proceedings of the 25th international conference on Machine learning, (336-343)
- Rubinstein R (2008). Semi-Iterative Minimum Cross-Entropy Algorithms for Rare-Events, Counting, Combinatorial and Integer Programming, Methodology and Computing in Applied Probability, 10:2, (121-178), Online publication date: 1-Jun-2008.
- Ortiz-García E and Pérez-Bellido Á Hybrid cross-entropy method/Hopfield neural network for combinatorial optimization problems Proceedings of the 8th international conference on Intelligent data engineering and automated learning, (1160-1169)
- Evans G, Keith J and Kroese D Parallel cross-entropy optimization Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come, (2196-2202)
- Heegaard P and Sandmann W Ant-based approach for determining the change of measure in importance sampling Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come, (412-420)
- Menzies T, Elrawas O, Hihn J, Feather M, Madachy R and Boehm B The business case for automated software engineering Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering, (303-312)
- Heegaard P and Sandmann W Evaluating differentiated quality of service parameters in optical packet switching Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, (162-174)
- Boubezoul A, Paris S and Ouladsine M Improving the GRLVQ algorithm by the cross entropy method Proceedings of the 17th international conference on Artificial neural networks, (199-208)
- Costa A, Jones O and Kroese D (2007). Convergence properties of the cross-entropy method for discrete optimization, Operations Research Letters, 35:5, (573-580), Online publication date: 1-Sep-2007.
- Oliphant L and Shavlik J Using Bayesian networks to direct stochastic search in inductive logic programming Proceedings of the 17th international conference on Inductive logic programming, (191-199)
- Zhang H and Fu M Applying model reference adaptive search to American-style option pricing Proceedings of the 38th conference on Winter simulation, (711-718)
- Kroese D, Porotsky S and Rubinstein R (2006). The Cross-Entropy Method for Continuous Multi-Extremal Optimization, Methodology and Computing in Applied Probability, 8:3, (383-407), Online publication date: 1-Sep-2006.
- Rubinstein R (2006). How Many Needles are in a Haystack, or How to Solve #P-Complete Counting Problems Fast, Methodology and Computing in Applied Probability, 8:1, (5-51), Online publication date: 1-Mar-2006.
- Fu M, Glover F and April J Simulation optimization Proceedings of the 37th conference on Winter simulation, (83-95)
- Wu J and Chung A Cross entropy Proceedings of the 8th international conference on Medical Image Computing and Computer-Assisted Intervention - Volume Part I, (229-237)
- Mannor S, Peleg D and Rubinstein R The cross entropy method for classification Proceedings of the 22nd international conference on Machine learning, (561-568)
- Nariai S, Hui K and Kroese D Designing an optimal network using the cross-entropy method Proceedings of the 6th international conference on Intelligent Data Engineering and Automated Learning, (228-233)
- Perelman L and Ostfeld A Water distribution systems optimal design using cross entropy Proceedings of the 7th annual conference on Genetic and evolutionary computation, (647-648)
- Rubinstein R (2005). A Stochastic Minimum Cross-Entropy Method for Combinatorial Optimization and Rare-event Estimation*, Methodology and Computing in Applied Probability, 7:1, (5-50), Online publication date: 1-Mar-2005.
- Botev Z and Kroese D Global likelihood optimization via the cross-entropy method with an application to mixture models Proceedings of the 36th conference on Winter simulation, (529-535)
- Kroese D and Rubinstein R (2004). The Transform Likelihood Ratio Method for Rare Event Simulation with Heavy Tails, Queueing Systems: Theory and Applications, 46:3/4, (317-351), Online publication date: 1-Mar-2004.
Index Terms
- The Cross Entropy Method: A Unified Approach To Combinatorial Optimization, Monte-carlo Simulation (Information Science and Statistics)
Recommendations
Hybridizing the cross-entropy method: An application to the max-cut problem
Cross-entropy has been recently proposed as a heuristic method for solving combinatorial optimization problems. We briefly review this methodology and then suggest a hybrid version with the goal of improving its performance. In the context of the well-...
A cross entropy based algorithm for reliability problems
The Cross Entropy method has recently been applied to combinatorial optimization problems with promising results. This paper proposes a Cross Entropy based algorithm for reliability optimization of complex systems, where one wants to maximize the ...
Some properties of Rényi entropy and Rényi entropy rate
In this paper, we define the conditional Renyi entropy and show that the so-called chain rule holds for the Renyi entropy. Then, we introduce a relation for the rate of Renyi entropy and use it to derive the rate of the Renyi entropy for an irreducible-...