2007
DOI: 10.1007/s10710-007-9045-7
|View full text |Cite
|
Sign up to set email alerts
|

Detecting the epistatic structure of generalized embedded landscape

Abstract: Working under the premise that most optimizable functions are of bounded epistasis, this paper addresses the problem of discovering the linkage structure of a black-box function with a domain of arbitrary-cardinality under the assumption of bounded epistasis. To model functions of bounded epistasis, we develop a generalization of the mathematical model of ''embedded landscapes'' over domains of cardinality M. We then generalize the Walsh transform as a discrete Fourier transform, and develop algorithms for lin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…The behavior of these algorithms for other decomposable problems has been also studied from the perspective of ADFs [46,148]. Linkage identification methods have been analyzed using ADFs [19,24,128,165,190].…”
Section: Class Of Problemsmentioning
confidence: 99%
See 1 more Smart Citation
“…The behavior of these algorithms for other decomposable problems has been also studied from the perspective of ADFs [46,148]. Linkage identification methods have been analyzed using ADFs [19,24,128,165,190].…”
Section: Class Of Problemsmentioning
confidence: 99%
“…First and foremost, by model-building EAs, which create a representation of the relationships among the variables of the problem and use this representation to conduct a more efficient sampling of the search space. These algorithms have undergone rapid development in recent years [8,45,70,151,190,191]. Significant research has been conducted in the field of estimation of distribution algorithms (EDAs) [70,106] to better exploit information about the problem structure while solving the optimization problem.…”
Section: Introductionmentioning
confidence: 99%
“…Prior information [1,56,91,96] and perturbation methods [63,121,132,133] are other ways of collecting information about the interactions.…”
Section: Learning the Structurementioning
confidence: 99%
“…A GEL is k-bounded epistatic if it can be written as the sum of subfunction each of whose number of variables is at most k. It has recently shown the close relationship between Fourier coefficients and the structure of k-bounded GEL [17,18]. …”
Section: Theorem 1 (Sum Of Power Of Roots Of One)mentioning
confidence: 99%