cs0402032/paper.bbl
1: \begin{thebibliography}{}
2: 
3: \bibitem[\protect\citeauthoryear{Ackley}{Ackley}{1987}]{Ackley:87b}
4: Ackley, D.~H. (1987).
5: \newblock An empirical study of bit vector function optimization.
6: \newblock {\em Genetic {A}lgorithms and {S}imulated {A}nnealing\/}, 170--204.
7: 
8: \bibitem[\protect\citeauthoryear{Buntine}{Buntine}{1991}]{Buntine:91}
9: Buntine, W.~L. (1991).
10: \newblock Theory refinement of {B}ayesian networks.
11: \newblock {\em Proceedings of the Uncertainty in Artificial Intelligence
12:   (UAI-91)\/}, 52--60.
13: 
14: \bibitem[\protect\citeauthoryear{Chickering, Heckerman, \& Meek}{Chickering
15:   et~al.}{1997}]{Chickering:97}
16: Chickering, D.~M., Heckerman, D., \& Meek, C. (1997).
17: \newblock {\em A {B}ayesian approach to learning {B}ayesian networks with local
18:   structure} (Technical Report MSR-TR-97-07).
19: \newblock Redmond, WA: Microsoft Research.
20: 
21: \bibitem[\protect\citeauthoryear{Cooper \& Herskovits}{Cooper \&
22:   Herskovits}{1992}]{Cooper:92}
23: Cooper, G.~F., \& Herskovits, E.~H. (1992).
24: \newblock A {B}ayesian method for the induction of probabilistic networks from
25:   data.
26: \newblock {\em Machine Learning\/},~{\em 9\/}, 309--347.
27: 
28: \bibitem[\protect\citeauthoryear{Deb \& Goldberg}{Deb \&
29:   Goldberg}{1994}]{Deb:94b}
30: Deb, K., \& Goldberg, D.~E. (1994).
31: \newblock Sufficient conditions for deceptive and easy binary functions.
32: \newblock {\em Annals of Mathematics and Artificial Intelligence\/},~{\em
33:   10\/}, 385--408.
34: 
35: \bibitem[\protect\citeauthoryear{Friedman \& Goldszmidt}{Friedman \&
36:   Goldszmidt}{1999}]{Friedman:99}
37: Friedman, N., \& Goldszmidt, M. (1999).
38: \newblock Learning {B}ayesian networks with local structure.
39: \newblock In Jordan, M.~I. (Ed.), {\em Graphical models} (pp.\  421--459).
40:   Cambridge, MA: MIT Press.
41: 
42: \bibitem[\protect\citeauthoryear{Goldberg}{Goldberg}{1989}]{Goldberg:89d}
43: Goldberg, D.~E. (1989).
44: \newblock {\em Genetic algorithms in search, optimization, and machine
45:   learning}.
46: \newblock Reading, MA: Addison-Wesley.
47: 
48: \bibitem[\protect\citeauthoryear{Heckerman, Geiger, \& Chickering}{Heckerman
49:   et~al.}{1994}]{Heckerman+al:94}
50: Heckerman, D., Geiger, D., \& Chickering, D.~M. (1994).
51: \newblock {\em Learning {B}ayesian networks: {T}he combination of knowledge and
52:   statistical data} (Technical Report MSR-TR-94-09).
53: \newblock Redmond, WA: Microsoft Research.
54: 
55: \bibitem[\protect\citeauthoryear{Holland}{Holland}{1975}]{Holland:75a}
56: Holland, J.~H. (1975).
57: \newblock {\em Adaptation in natural and artificial systems}.
58: \newblock Ann Arbor, MI: University of Michigan Press.
59: 
60: \bibitem[\protect\citeauthoryear{Howard \& Matheson}{Howard \&
61:   Matheson}{1981}]{Howard:81}
62: Howard, R.~A., \& Matheson, J.~E. (1981).
63: \newblock Influence diagrams.
64: \newblock In Howard, R.~A., \& Matheson, J.~E. (Eds.), {\em Readings on the
65:   principles and applications of decision analysis}, Volume~II (pp.\
66:   721--762). Menlo Park, CA: Strategic Decisions Group.
67: 
68: \bibitem[\protect\citeauthoryear{Pearl}{Pearl}{1988}]{Pearl:88}
69: Pearl, J. (1988).
70: \newblock {\em Probabilistic reasoning in intelligent systems: {N}etworks of
71:   plausible inference}.
72: \newblock San Mateo, CA: Morgan Kaufmann.
73: 
74: \bibitem[\protect\citeauthoryear{Pelikan}{Pelikan}{2002}]{Pelikan:thesis}
75: Pelikan, M. (2002).
76: \newblock {\em Bayesian optimization algorithm: {F}rom single level to
77:   hierarchy}.
78: \newblock Doctoral dissertation, University of Illinois at Urbana-Champaign,
79:   Urbana, IL.
80: \newblock Also {IlliGAL Report No.} 2002023.
81: 
82: \bibitem[\protect\citeauthoryear{Pelikan \& Goldberg}{Pelikan \&
83:   Goldberg}{2001}]{Pelikan:01*}
84: Pelikan, M., \& Goldberg, D.~E. (2001).
85: \newblock Escaping hierarchical traps with competent genetic algorithms.
86: \newblock {\em Proceedings of the {G}enetic and {E}volutionary {C}omputation
87:   {C}onference ({GECCO}-2001)\/}, 511--518.
88: \newblock Also {IlliGAL Report No.} 2000020.
89: 
90: \bibitem[\protect\citeauthoryear{Pelikan \& Goldberg}{Pelikan \&
91:   Goldberg}{2003}]{Pelikan:03b}
92: Pelikan, M., \& Goldberg, D.~E. (2003).
93: \newblock A hierarchy machine: {L}earning to optimize from nature and humans.
94: \newblock {\em Complexity\/},~{\em 8\/}(5).
95: 
96: \bibitem[\protect\citeauthoryear{Pelikan, Goldberg, \& Cant{\'{u}}-Paz}{Pelikan
97:   et~al.}{1999}]{Pelikan:99a}
98: Pelikan, M., Goldberg, D.~E., \& Cant{\'{u}}-Paz, E. (1999).
99: \newblock {BOA}: The {B}ayesian optimization algorithm.
100: \newblock {\em Proceedings of the {G}enetic and {E}volutionary {C}omputation
101:   {C}onference ({GECCO}-99)\/},~{\em I\/}, 525--532.
102: \newblock Also {IlliGAL Report No.} 99003.
103: 
104: \bibitem[\protect\citeauthoryear{Pelikan, Goldberg, \& Lobo}{Pelikan
105:   et~al.}{2002}]{Pelikan:02}
106: Pelikan, M., Goldberg, D.~E., \& Lobo, F. (2002).
107: \newblock A survey of optimization by building and using probabilistic models.
108: \newblock {\em Computational Optimization and Applications\/},~{\em 21\/}(1),
109:   5--20.
110: \newblock Also {IlliGAL Report No.} 99018.
111: 
112: \bibitem[\protect\citeauthoryear{Pelikan, Goldberg, \& Sastry}{Pelikan
113:   et~al.}{2001}]{Pelikan:01a*}
114: Pelikan, M., Goldberg, D.~E., \& Sastry, K. (2001).
115: \newblock Bayesian optimization algorithm, decision graphs, and {O}ccam's
116:   razor.
117: \newblock {\em Proceedings of the {G}enetic and {E}volutionary {C}omputation
118:   {C}onference ({GECCO}-2001)\/}, 519--526.
119: \newblock Also {IlliGAL Report No.} 2000020.
120: 
121: \bibitem[\protect\citeauthoryear{Sastry, Goldberg, \& Pelikan}{Sastry
122:   et~al.}{2001}]{Sastry:01}
123: Sastry, K., Goldberg, D.~E., \& Pelikan, M. (2001).
124: \newblock Don't evaluate, inherit.
125: \newblock {\em Proceedings of the {G}enetic and {E}volutionary {C}omputation
126:   {C}onference ({GECCO}-2001)\/}, 551--558.
127: \newblock Also {IlliGAL Report No.} 2001013.
128: 
129: \bibitem[\protect\citeauthoryear{Schwarz}{Schwarz}{1978}]{Schwarz78a}
130: Schwarz, G. (1978).
131: \newblock Estimating the dimension of a model.
132: \newblock {\em The Annals of Statistics\/},~{\em 6\/}, 461--464.
133: 
134: \bibitem[\protect\citeauthoryear{Smith, Dike, \& Stegmann}{Smith
135:   et~al.}{1995}]{SmithR:94}
136: Smith, R.~E., Dike, B.~A., \& Stegmann, S.~A. (1995).
137: \newblock Fitness inheritance in genetic algorithms.
138: \newblock {\em Proceedings of the ACM Symposium on Applied Computing\/},
139:   345--350.
140: 
141: \bibitem[\protect\citeauthoryear{Zheng, Julstrom, \& Cheng}{Zheng
142:   et~al.}{1997}]{Zheng:97}
143: Zheng, X., Julstrom, B., \& Cheng, W. (1997).
144: \newblock Design of vector quantization codebooks using a genetic algorithm.
145: \newblock In {\em Proceedings of the International Conference on Evolutionary
146:   Computation ({ICEC}-97)} (pp.\  525--529). Picataway, NJ: IEEE Press.
147: 
148: \end{thebibliography}
149: