Perceptron Trees: A Case Study in Hybrid Concept Representations, National Conference on Artificial Intelligence, pp.601-606, 1988. ,
DOI : 10.1023/A:1022699900025
Generalizing from Case Studies: A Case Study, Proceedings of the 9th International Workshop on Machine Learning, pp.1-10, 1992. ,
DOI : 10.1016/B978-1-55860-247-2.50006-1
Understanding Random SAT: Beyond the Clauses-to-Variables Ratio, Principles and Practice of Constraint Programming CP 2004, pp.438-452, 2004. ,
DOI : 10.1007/978-3-540-30201-8_33
Hydra-mip: automated algorithm configuration and selection for mixed integer programming, RCRA Workshop on Experimental Evaluation of Algorithms for Solving Problems with Combinatorial Explosion at the International Joint Conference on Artificial Intelligence (IJCAI), 2011. ,
Algorithm Selection for Combinatorial Search Problems: A Survey, 1210. ,
DOI : 10.1007/978-3-642-31612-8_18
A Principled Method for Exploiting Opening Books, Computers and Games, pp.136-144, 2011. ,
DOI : 10.1007/978-3-642-17928-0_13
URL : https://hal.archives-ouvertes.fr/inria-00484043
Hedging algorithms and repeated matrix games, ECML Workshop on Machine Learning and Data Mining In and Around Games, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00975943
Self-Adaptation of Playing Strategies in General Game Playing, IEEE Transactions on Computational Intelligence and AI in Games, vol.6, issue.4, p.2014 ,
DOI : 10.1109/TCIAIG.2013.2275163
Towards a formal framework for comparing constraint satisfaction problem formulations, 1996. ,
Confronting hardness using a hybrid approach, Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm , SODA '06, pp.1-10, 2006. ,
DOI : 10.1145/1109557.1109558
Satzilla: Portfoliobased algorithm selection for sat, J. Artif. Intell. Res.(JAIR), vol.32, pp.565-606, 2008. ,
Voronoi coverage control with time-driven communication for mobile sensing networks with obstacles, IEEE Conference on Decision and Control and European Control Conference, pp.1980-1985, 2011. ,
DOI : 10.1109/CDC.2011.6160574
Representation in case-based reasoning applied to control reconfiguration Applications and Theoretical Aspects, ser. Lecture Notes in Computer Science, P. Perner, Advances in Data Mining, pp.113-120 ,
Algorithm Selection and Scheduling, 17th International Conference on Principles and Practice of Constraint Programming, pp.454-469, 2011. ,
DOI : 10.1007/978-3-642-23786-7_35
Learning dynamic algorithm portfolios, Annals of Mathematics and Artificial Intelligence, vol.18, issue.2, pp.295-328, 2006. ,
DOI : 10.1007/s10472-006-9036-z
Dynamic Algorithm Selection Using Reinforcement Learning, 2006 International Workshop on Integrating AI and Data Mining, pp.18-25, 2006. ,
DOI : 10.1109/AIDM.2006.4
Some games and machines for playing them Rand Corporation , Tech. Rep. D-1164 Linear programming and the theory of games, Activity Analysis of Production and Allocation, Koopmans, 1951. ,
A sublinear-time randomized approximation algorithm for matrix games, Operations Research Letters, vol.18, issue.2, pp.53-58, 1995. ,
DOI : 10.1016/0167-6377(95)00032-0
Gambling in a rigged casino: The adversarial multi-armed bandit problem, Proceedings of IEEE 36th Annual Foundations of Computer Science, pp.322-331, 1995. ,
DOI : 10.1109/SFCS.1995.492488
Coevolutionary Computation, Artificial Life, vol.3, issue.4, pp.355-375, 1995. ,
DOI : 10.1007/BF00203032
Discovering Chinese Chess Strategies through Coevolutionary Approaches, 2007 IEEE Symposium on Computational Intelligence and Games, pp.360-367, 2007. ,
DOI : 10.1109/CIG.2007.368121
Coevolving partial strategies for the game of go, International Conference on Genetic and Evolutionary Methods, 2008. ,
Learning to solve qbf, Proceedings of the 22nd National Conference on Artificial Intelligence. AAAI, pp.255-260, 2007. ,
Asymptotically efficient adaptive allocation rules, Advances in Applied Mathematics, vol.6, issue.1, pp.4-22, 1985. ,
DOI : 10.1016/0196-8858(85)90002-8
Finite time analysis of the multiarmed bandit problem, Machine Learning, pp.235-256, 2002. ,
Exploration-exploitation trade-off using variance estimates in multi-armed bandits, Theoretical Computer Science, 2008. ,
Efficient Selectivity and Backup Operators in Monte-Carlo Tree Search, Proceedings of the 5th International Conference on Computers and Games, pp.72-83, 2006. ,
DOI : 10.1007/978-3-540-75538-8_7
URL : https://hal.archives-ouvertes.fr/inria-00116992
Backgammon Inside Backgammon, p.4, 1980. ,