. Achab, Another strategy, left for further work, is to use specific policy based on extreme value estimates, 2013.

F. Specifically, , 2015.

M. Achab, S. Clémençon, and A. Garivier, Anne Sabourin, and Claire Vernade. Max k-armed bandit: On the extremehunter algorithm and beyond, Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp.389-404, 2017.

P. Auer, Using confidence bounds for exploitation-exploration trade-offs, Journal of Machine Learning Research, vol.3, pp.397-422, 2002.

R. James-s-bergstra, Y. Bardenet, B. Bengio, and . Kégl, Algorithms for hyperparameter optimization, Advances in neural information processing systems, pp.2546-2554, 2011.

P. Brazdil and C. , Metalearning and algorithm selection: progress, state of the art and introduction to the 2018 special issue, Machine Learning, vol.107, issue.1, pp.1-14, 2018.

S. Bubeck, R. Munos, G. Stoltz, and C. Szepesvári, X-armed bandits, Journal of Machine Learning Research, vol.12, pp.1655-1695, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00450235

S. Bubeck, N. Cesa-bianchi, and G. Lugosi, Bandits with heavy tail, IEEE Transactions on Information Theory, vol.59, issue.11, pp.7711-7717, 2013.

R. Caruana, A. Niculescu-mizil, G. Crew, and A. Ksikes, Ensemble selection from libraries of models, Proceedings of the twenty-first international conference on Machine learning, p.18, 2004.

G. Chaslot, S. Bakkes, I. Szita, and P. Spronck, Monte-carlo tree search: A new framework for game ai, 2008.

B. Chen, H. Wu, W. Mo, I. Chattopadhyay, and H. Lipson, Autostacker: A compositional evolutionary learning system, vol.03, 2018.

A. Couëtoux, J. Hoock, N. Sokolovska, O. Teytaud, and N. Bonnard, Continuous upper confidence trees, International Conference on Learning and Intelligent Optimization, pp.433-445, 2011.

M. Feurer, A. Klein, K. Eggensperger, J. Springenberg, M. Blum et al., Efficient and robust automated machine learning, Advances in Neural Information Processing Systems, vol.28, pp.2962-2970, 2015.
DOI : 10.1007/978-3-030-05318-5_6

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-030-05318-5_6.pdf

R. Gaudel and M. Sebag, Feature selection as a one-player game, International Conference on Machine Learning, pp.359-366, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00484049

I. Guyon, K. Bennett, G. Cawley, H. J. Escalante, S. Escalera et al., Design of the 2015 chalearn automl challenge, Neural Networks (IJCNN), 2015 International Joint Conference on, pp.1-8, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01381164

I. Guyon, W. Tu, H. J. Escalante, Y. Chen, G. Shi et al., Automatic machine learning challenge 2018: Towards ai for everyone, 2018.

K. He, X. Zhang, S. Ren, and J. Sun, Deep residual learning for image recognition, Proceedings of the IEEE conference on computer vision and pattern recognition, pp.770-778, 2016.

F. Hutter, H. Holger, K. Hoos, and . Leyton-brown, Sequential model-based optimization for general algorithm configuration, International Conference on Learning and Intelligent Optimization, pp.507-523, 2011.
DOI : 10.1007/978-3-642-25566-3_40

URL : http://www.cs.ubc.ca/spider/hutter/papers/10-TR-SMAC.pdf

A. Karpathy, G. Toderici, S. Shetty, T. Leung, R. Sukthankar et al., Large-scale video classification with convolutional neural networks, Proceedings of the IEEE conference on Computer Vision and Pattern Recognition, pp.1725-1732, 2014.
DOI : 10.1109/cvpr.2014.223

URL : http://www.cs.cmu.edu/~rahuls/pub/cvpr2014-deepvideo-rahuls.pdf

A. Klein, S. Falkner, S. Bartels, P. Hennig, and F. Hutter, Fast bayesian optimization of machine learning hyperparameters on large datasets, 2016.

L. Kocsis and C. Szepesvári, Bandit based monte-carlo planning, Machine Learning: ECML 2006, pp.282-293, 2006.
DOI : 10.1007/11871842_29

URL : https://link.springer.com/content/pdf/10.1007%2F11871842_29.pdf

A. Krizhevsky, I. Sutskever, and G. E. Hinton, Imagenet classification with deep convolutional neural networks, Advances in Neural Information Processing Systems, vol.25, pp.1097-1105, 2012.
DOI : 10.1145/3065386

URL : http://dl.acm.org/ft_gateway.cfm?id=3065386&type=pdf

L. Li, K. Jamieson, and G. Desalvo, Afshin Rostamizadeh, and Ameet Talwalkar. Hyperband: Bandit-based configuration evaluation for hyperparameter optimization, 2016.

V. Mnih, K. Kavukcuoglu, D. Silver, A. Graves, I. Antonoglou et al., Playing atari with deep reinforcement learning, 2013.

R. S. Olson, N. Bartley, R. J. Urbanowicz, and J. H. Moore, Evaluation of a tree-based pipeline optimization tool for automating data science, Proceedings of the Genetic and Evolutionary Computation Conference 2016, GECCO '16, pp.485-492, 2016.

F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion et al., Scikit-learn: Machine learning in Python, Journal of Machine Learning Research, vol.12, pp.2825-2830, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650905

K. Shaoqing-ren, R. He, J. Girshick, and . Sun, Faster r-cnn: Towards realtime object detection with region proposal networks, Advances in neural information processing systems, pp.91-99, 2015.

F. Ricci, L. Rokach, and B. Shapira, Introduction to recommender systems handbook, Recommender systems handbook, pp.1-35, 2011.

D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre et al., Mastering the game of go with deep neural networks and tree search, nature, vol.529, issue.7587, pp.484-489, 2016.

J. Snoek, O. Rippel, K. Swersky, R. Kiros, N. Satish et al., Scalable bayesian optimization using deep neural networks, International Conference on Machine Learning, pp.2171-2180, 2015.

K. Swersky, J. Snoek, and R. Adams, Freeze-thaw bayesian optimization, 2014.

C. Thornton, F. Hutter, H. Holger, K. Hoos, and . Leyton-brown, Auto-weka: Combined selection and hyperparameter optimization of classification algorithms, Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pp.847-855, 2013.

Y. Wang, J. Audibert, and R. Munos, Algorithms for infinitely many-armed bandits, Advances in Neural Information Processing Systems, pp.1729-1736, 2009.

M. Wistuba, Finding competitive network architectures within a day using uct, 2017.