Use of variance estimation in the multi-armed bandit problem, NIPS 2006 Workshop on On-line Trading of Exploration and Exploitation, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00203496
Using confidence bounds for exploitationexploration trade-offs, The Journal of Machine Learning Research, vol.3, pp.397-422, 2003. ,
Finite time analysis of the multiarmed bandit problem, Machine Learning, vol.47, issue.2/3, pp.235-256, 2002. ,
DOI : 10.1023/A:1013689704352
Continuous Lunches Are Free Plus the Design of??Optimal Optimization Algorithms, Algorithmica, vol.1, issue.1 ,
DOI : 10.1007/s00453-008-9244-5
URL : https://hal.archives-ouvertes.fr/inria-00369788
On a modification of chebyshev's inequality and of the error formula of laplace. Original publication, Ann. Sci. Inst. Sav. Ukraine, Sect. Math, vol.1, issue.31, pp.38-49, 1924. ,
Pure Exploration in Multi-armed Bandits Problems, ALT, pp.23-37, 2009. ,
DOI : 10.1090/S0002-9904-1952-09620-8
On the huge benefit of quasi-random mutations for multimodal optimization with application to grid-based tuning of neurocontrollers, ESANN, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00380125
Monte-Carlo Strategies for Computer Go, Proceedings of the 18th BeNeLux Conference on Artificial Intelligence, pp.83-91, 2006. ,
Efficient Selectivity and Backup Operators in Monte-Carlo Tree Search, Proceedings of the 5th International Conference on Computers and Games, 2006. ,
DOI : 10.1007/978-3-540-75538-8_7
URL : https://hal.archives-ouvertes.fr/inria-00116992
Efficient Selectivity and Backup Operators in Monte-Carlo Tree Search, Proceedings of the 5th International Conference on Computers and Games, 2006. ,
DOI : 10.1007/978-3-540-75538-8_7
URL : https://hal.archives-ouvertes.fr/inria-00116992
Bandit-based optimization on graphs with application to library performance tuning, Proceedings of the 26th Annual International Conference on Machine Learning, ICML '09, 2009. ,
DOI : 10.1145/1553374.1553468
URL : https://hal.archives-ouvertes.fr/inria-00379523
A simple sequentially rejective multiple test procedure. scand. j. statistic, pp.65-70, 1979. ,
Bandit-Based Genetic Programming, LLNCS, 2010. ,
DOI : 10.1007/978-3-642-12148-7_23
URL : https://hal.archives-ouvertes.fr/inria-00452887
Multiple comparisons, theory and methods, 1996. ,
Bandit based montecarlo planning, 15th European Conference on Machine Learning (ECML), pp.282-293, 2006. ,
The Computational Intelligence of MoGo Revealed in Taiwan's Computer Go Tournaments, IEEE Transactions on Computational Intelligence, 2009. ,
Empirical Bernstein stopping, Proceedings of the 25th international conference on Machine learning, ICML '08, pp.672-679, 2008. ,
DOI : 10.1145/1390156.1390241
URL : https://hal.archives-ouvertes.fr/hal-00834983
Relevance estimation and value calibration of evolutionary algorithm par ameters, International Joint Conference on Artificial Intelligence (IJCAI'07), pp.975-980, 2007. ,
Variance reduction in meta-EDA, Proceedings of the 9th annual conference on Genetic and evolutionary computation , GECCO '07, pp.627-627, 2007. ,
DOI : 10.1145/1276958.1277087
A comparison of random field theory and permutation methods for the statistical analysis of MEG data, NeuroImage, vol.25, issue.2, pp.355-368, 2005. ,
DOI : 10.1016/j.neuroimage.2004.09.040
Optimal active learning through billiards and upper confidence trees in continous domains, Proceedings of the ECML conference, 2009. ,
Modifications of UCT and sequence-like simulations for Monte-Carlo Go, 2007 IEEE Symposium on Computational Intelligence and Games, pp.175-182, 2007. ,
DOI : 10.1109/CIG.2007.368095
No free lunch theorems for optimization, IEEE Transactions on Evolutionary Computation, vol.1, issue.1, pp.67-82, 1997. ,
DOI : 10.1109/4235.585893