2011
DOI: 10.1007/978-1-4614-1770-5_1
|View full text |Cite
|
Sign up to set email alerts
|

What’s in an Evolved Name? The Evolution of Modularity via Tag-Based Reference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…The lawnmower problem, and other versions of the CCP, have been extensively studied in the field of GP, but a review of GP techniques is beyond the scope of this paper. However, we highlight an observation that was revealed for a version of the CCP with obstacles [35]. In this study the meanings of evolved behavioral modules were investigated, and it was found that optimal solutions contained modules that encoded short action sequences which were then iterated to solve the CCP.…”
Section: Dirty Regionmentioning
confidence: 78%
“…The lawnmower problem, and other versions of the CCP, have been extensively studied in the field of GP, but a review of GP techniques is beyond the scope of this paper. However, we highlight an observation that was revealed for a version of the CCP with obstacles [35]. In this study the meanings of evolved behavioral modules were investigated, and it was found that optimal solutions contained modules that encoded short action sequences which were then iterated to solve the CCP.…”
Section: Dirty Regionmentioning
confidence: 78%
“…Several involved the random selection of subtrees to create modules: Koza (1992a) proposed the use of a subtree encapsulation operator, which consists of randomly selecting a subtree from an individual to create a terminal primitive that encapsulated the subtree; Pollack (1992, 1994) proposed the Genetic Library Builder (GLiB) system, which employs mutation operators that randomly select subtrees to create modules (compress operator) that can be later expanded (expand operator); similar compress and expand operators to create and expand modules were more recently proposed by Walker and Miller (2008) in the context of Embedded Cartesian Genetic Programming (ECGP), with the extension of the use of module-altering operators (module point mutation, add-input, add-output, remove-input and remove-output operators); Spector et al (2011aSpector et al ( ,b, 2012 proposed the use of the concept of 'tags' to label fragments of code that can be later reused by referencing the same label-while this is similar to the use of a compress operator, it provides the flexibility of partial name matches (a label will match the closest matching tag).…”
Section: Modulatisation In Genetic Programmingmentioning
confidence: 99%
“…The "closest match" semantics ensures that any reference to a tag will retrieve something as long as something has been tagged, and the number and targets of these references may grow gradually over evolutionary time. The results of previous studies have shown that this leads to problem-solving efforts for the lawnmower and "dirt-sensing, obstacle-avoiding robot" problems that scale well with problem size, indicating that tag-based modularity may be a powerful while nonetheless simple method for evolving modular programs more generally [24,21]. But because tree-based representations are currently more popular than Push among genetic programming researchers and practitioners, the extent to which such results can be obtained in tree-based genetic programming is clearly of interest.…”
Section: Tags In Pushmentioning
confidence: 99%
“…A recently-developed alternative technique for evolving programs that use modules, based on the use of "tags," has shown some promise insofar as it permits arbitrary architectures to evolve, even though the changes that must be made to the genetic programming system are relatively few and relatively simple [24,21]. The relevant notion of "tag" comes from the work of Holland, who used the term to denote initially arbitrary identifiers that come to have meaning over time in many different kinds of complex adaptive systems [5,6].…”
Section: Introductionmentioning
confidence: 99%