Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 7-Day Trial for You or Your Team.

Learn More →

Exploration and exploitation in evolutionary algorithms: A survey

Exploration and exploitation in evolutionary algorithms: A survey Exploration and Exploitation in Evolutionary Algorithms: A Survey MATEJ CREPINSEK, University of Maribor SHIH-HSI LIU, California State University, Fresno MARJAN MERNIK, University of Maribor "Exploration and exploitation are the two cornerstones of problem solving by search." For more than a decade, Eiben and Schippers' advocacy for balancing between these two antagonistic cornerstones still greatly influences the research directions of evolutionary algorithms (EAs) [1998]. This article revisits nearly 100 existing works and surveys how such works have answered the advocacy. The article introduces a fresh treatment that classifies and discusses existing work within three rational aspects: (1) what and how EA components contribute to exploration and exploitation; (2) when and how exploration and exploitation are controlled; and (3) how balance between exploration and exploitation is achieved. With a more comprehensive and systematic understanding of exploration and exploitation, more research in this direction may be motivated and refined. Categories and Subject Descriptors: I.2.8 [Artificial Intelligence]: Problem Solving, Control Methods, and Search--Heuristic method General Terms: Algorithms Additional Key Words and Phrases: Diversity, exploration and exploitation, evolutionary algorithms ACM Reference Format: Crepin ek, M., Liu, S.-H., and Mernik, M. 2013. Exploration and exploitation in evolutionary algorithms: A s survey. ACM Comput. Surv. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM Computing Surveys (CSUR) Association for Computing Machinery

Exploration and exploitation in evolutionary algorithms: A survey

Loading next page...
 
/lp/association-for-computing-machinery/exploration-and-exploitation-in-evolutionary-algorithms-a-survey-u1Oq4As10R

References (185)

Publisher
Association for Computing Machinery
Copyright
Copyright © 2013 by ACM Inc.
ISSN
0360-0300
DOI
10.1145/2480741.2480752
Publisher site
See Article on Publisher Site

Abstract

Exploration and Exploitation in Evolutionary Algorithms: A Survey MATEJ CREPINSEK, University of Maribor SHIH-HSI LIU, California State University, Fresno MARJAN MERNIK, University of Maribor "Exploration and exploitation are the two cornerstones of problem solving by search." For more than a decade, Eiben and Schippers' advocacy for balancing between these two antagonistic cornerstones still greatly influences the research directions of evolutionary algorithms (EAs) [1998]. This article revisits nearly 100 existing works and surveys how such works have answered the advocacy. The article introduces a fresh treatment that classifies and discusses existing work within three rational aspects: (1) what and how EA components contribute to exploration and exploitation; (2) when and how exploration and exploitation are controlled; and (3) how balance between exploration and exploitation is achieved. With a more comprehensive and systematic understanding of exploration and exploitation, more research in this direction may be motivated and refined. Categories and Subject Descriptors: I.2.8 [Artificial Intelligence]: Problem Solving, Control Methods, and Search--Heuristic method General Terms: Algorithms Additional Key Words and Phrases: Diversity, exploration and exploitation, evolutionary algorithms ACM Reference Format: Crepin ek, M., Liu, S.-H., and Mernik, M. 2013. Exploration and exploitation in evolutionary algorithms: A s survey. ACM Comput. Surv.

Journal

ACM Computing Surveys (CSUR)Association for Computing Machinery

Published: Jun 1, 2013

There are no references for this article.