• R-MAX

  • Referenced in 32 articles [sw02539]
  • built-in mechanism for resolving the exploration vs. exploitation dilemma. (3) It formally justifies...
  • CIXL2

  • Referenced in 19 articles [sw03302]
  • optimization of the balance between exploration and exploitation in the search process. In order...
  • VTDIRECT95

  • Referenced in 11 articles [sw05290]
  • different problem scales and optimization (exploration vs. exploitation) goals. Dynamic data structures are used...
  • RALF

  • Referenced in 4 articles [sw33955]
  • time-varying trade-off among different exploration and exploitation sampling criteria that is learned online ... provide different sampling criteria for exploration as well as exploitation. We propose a novel exploration...
  • UCLID

  • Referenced in 25 articles [sw04657]
  • UCLID explored to-date include microprocessor design verification, analyzing software for security exploits, and verifying...
  • GGSA

  • Referenced in 5 articles [sw18531]
  • well-balanced mechanism for enhancing exploration and exploitation abilities. In this paper, we adapt...
  • hABCDE

  • Referenced in 7 articles [sw14869]
  • achieve better compromise between the exploration and the exploitation. Based on the above explanation, this...
  • GBO

  • Referenced in 2 articles [sw40814]
  • enhanced capabilities of exploration, exploitation, convergence, and effective avoidance of local optima. The second phase...
  • NILS

  • Referenced in 7 articles [sw20669]
  • tradeoff between the exploitation of neutrality and the exploration of new parts of the search...
  • FEMOEA

  • Referenced in 3 articles [sw19640]
  • helps to maintain a balance between exploration and exploitation of the search space. Additionally...
  • Honey badger algorithm

  • Referenced in 1 article [sw40622]
  • honey finding approaches are formulated into exploration and exploitation phases in HBA. Moreover, with controlled ... terms of convergence speed and exploration-exploitation balance, as compared to other methods used...
  • DTSMA

  • Referenced in 1 article [sw42106]
  • disadvantages such as insufficient balance between exploration and exploitation, and easy to fall into local ... mutation balances is used enhanced the exploration and exploitation ability. In addition, a new exploitation...
  • XSpeed

  • Referenced in 5 articles [sw20159]
  • space exploration of continuous systems with linear dynamics and non-deterministic inputs. XSpeed exploits ... speed up reachability analysis. A parallel exploration algorithm with multiple initial sets in partitions...
  • epiACO

  • Referenced in 1 article [sw41508]
  • adaptively guide ant behaviors of exploration and exploitation. The memory based strategy is designed...
  • LS-II

  • Referenced in 1 article [sw31401]
  • improves its original capacities of exploration and exploitation of the search space. In order...
  • TGView3D

  • Referenced in 2 articles [sw32443]
  • graph viewer op- timized for exploring theory graphs. To exploit the three spatial dimen- sions...
  • Snowball

  • Referenced in 8 articles [sw18567]
  • regular English sentences. This data is best exploited infavailable as arelational table that we could ... precise queries or running data mining tasks.We explore a technique for extracting such tables from...
  • Hypermax

  • Referenced in 1 article [sw35101]
  • optimizer that trades off between explore-style and exploit-style strategies in an intelligent manner...
  • ARVis

  • Referenced in 8 articles [sw06648]
  • association rules. It allows the user to explore large sets of rules freely by focusing ... prototype system called ARVis. It exploits the user’s focus to guide the generation...