{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:08Z","timestamp":1740122648785,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T00:00:00Z","timestamp":1524528000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s10489-018-1172-8","type":"journal-article","created":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T05:57:04Z","timestamp":1524549424000},"page":"3735-3747","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Bayesian network based solution scheme for the constrained Stochastic On-line Equi-Partitioning Problem"],"prefix":"10.1007","volume":"48","author":[{"given":"Sondre","family":"Glimsdal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7287-030X","authenticated-orcid":false,"given":"Ole-Christoffer","family":"Granmo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,24]]},"reference":[{"issue":"2","key":"1172_CR1","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.ejor.2006.07.009","volume":"182","author":"R Koster de","year":"2007","unstructured":"de Koster R, Le-Duc T, Roodbergen KJ (2007) Design and control of warehouse order picking: a literature review. Eur J Oper Res 182(2):481\u2013501. [Online]. Available: http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0377221706006473","journal-title":"Eur J Oper Res"},{"key":"1172_CR2","volume-title":"Facilities planning","author":"JA Tompkins","year":"2010","unstructured":"Tompkins JA (2010) Facilities planning. Wiley, New York"},{"key":"1172_CR3","doi-asserted-by":"crossref","unstructured":"Hahsler M, Hornik K, Reutterer T (2006) Implications of probabilistic data modeling for mining association rules. In: From data and information analysis to knowledge engineering. Springer, Berlin, pp 598\u2013605","DOI":"10.1007\/3-540-31314-1_73"},{"issue":"5","key":"1172_CR4","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1109\/12.53585","volume":"39","author":"W Gale","year":"1990","unstructured":"Gale W, Das S, Yu C T (1990) Improvements to an algorithm for equipartitioning. IEEE Trans Comput 39(5):706\u2013710","journal-title":"IEEE Trans Comput"},{"issue":"1","key":"1172_CR5","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/12.75146","volume":"37","author":"B Oommen","year":"1988","unstructured":"Oommen B, Ma D (1988) Deterministic learning automata solutions to the equipartitioning problem. IEEE Trans Comput 37(1):2\u201313","journal-title":"IEEE Trans Comput"},{"issue":"3","key":"1172_CR6","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TNN.2005.845141","volume":"16","author":"R Xu","year":"2005","unstructured":"Xu R, Wunsch D et al (2005) Survey of clustering algorithms. IEEE Trans Neural Netw 16(3):645\u2013678","journal-title":"IEEE Trans Neural Netw"},{"key":"1172_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-28349-8_2","volume-title":"A survey of clustering data mining techniques in Grouping multidimensional data","author":"P Berkhin","year":"2006","unstructured":"Berkhin P (2006) A survey of clustering data mining techniques in Grouping multidimensional data. Springer, Berlin, pp 25\u201371"},{"key":"1172_CR8","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.jocs.2017.08.008","volume":"24","author":"A Shirvani","year":"2017","unstructured":"Shirvani A, Oommen B J (2017) On enhancing the object migration automaton using the pursuit paradigm. J Comput Sci 24:329\u2013342","journal-title":"J Comput Sci"},{"key":"1172_CR9","doi-asserted-by":"crossref","unstructured":"Hammer M, Chan A (1976) Index selection in a self-adaptive data base management system. In: Proceedings of the 1976 ACM SIGMOD international conference on management of data. ACM, pp 1\u20138","DOI":"10.1145\/509383.509385"},{"key":"1172_CR10","unstructured":"Yu C T, Siu M K, Lam K, Tai F (1981) Adaptive clustering schemes: general framework. In: Proceedings of the IEEE COMPSAC conference. IEEE, pp 81\u201389"},{"key":"1172_CR11","unstructured":"Ciu D, Ma Y (1986) Object partitioning by using learning automata. Ph.D. dissertation, Carleton University"},{"key":"1172_CR12","unstructured":"Mamaghani A S, Meybodi MR (2009) Clustering of software systems using new hybrid algorithms. In: Ninth IEEE international conference on computer and information technology, 2009. CIT\u201909, vol 1. IEEE, pp 20\u201325"},{"issue":"6","key":"1172_CR13","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1109\/21.135704","volume":"21","author":"BJ Oommen","year":"1991","unstructured":"Oommen B J, Valiveti R S, Zgierski J R (1991) An adaptive learning solution to the keyboard optimization problem. IEEE Trans Syst Man Cybern 21(6):1608\u20131618","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"3","key":"1172_CR14","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1137\/070697720","volume":"40","author":"C Daskalakis","year":"2011","unstructured":"Daskalakis C, Karp R M, Mossel E, Riesenfeld S J, Verbin E (2011) Sorting and selection in posets. SIAM J Comput 40(3):597\u2013622","journal-title":"SIAM J Comput"},{"issue":"6","key":"1172_CR15","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1007\/s00224-006-1350-7","volume":"39","author":"K Andreev","year":"2006","unstructured":"Andreev K, Racke H (2006) Balanced graph partitioning. Theory Comput Syst 39(6):929\u2013939","journal-title":"Theory Comput Syst"},{"key":"1172_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7997-1_22","volume-title":"Quadratic assignment problems","author":"RE Burkard","year":"2013","unstructured":"Burkard R E (2013) Quadratic assignment problems. Springer, Berlin"},{"issue":"1","key":"1172_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10479-011-0983-3","volume":"191","author":"P Galinier","year":"2011","unstructured":"Galinier P, Boujbel Z, Fernandes M C (2011) An efficient memetic algorithm for the graph partitioning problem. Ann Oper Res 191(1):1\u201322","journal-title":"Ann Oper Res"},{"key":"1172_CR18","doi-asserted-by":"crossref","unstructured":"Kim J, Hwang I, Kim Y-H, Moon B-R (2011) Genetic approaches for graph partitioning: a survey. In: Proceedings of the 13th annual conference on genetic and evolutionary computation. ACM, pp 473\u2013480","DOI":"10.1145\/2001576.2001642"},{"issue":"4","key":"1172_CR19","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/TKDE.2009.110","volume":"22","author":"U Gupta","year":"2010","unstructured":"Gupta U, Ranganathan N (2010) A game theoretic approach for simultaneous compaction and equipartitioning of spatial data sets. IEEE Trans Knowl Data Eng 22(4):465\u2013478","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1172_CR20","unstructured":"Meila M, Shi J (2001) Learning segmentation by random walks. In: Advances in neural information processing systems, pp 873\u2013879"},{"key":"1172_CR21","doi-asserted-by":"crossref","unstructured":"Yu S X, Shi J (2003) Multiclass spectral clustering. In: Proceedings of the ninth IEEE international conference on computer vision - volume 2, ser. ICCV \u201903. [Online]. Available: http:\/\/dl.acm.org\/citation.cfm?id=946247.946658 . IEEE Computer Society, Washington, DC, p 313","DOI":"10.1109\/ICCV.2003.1238361"},{"issue":"6","key":"1172_CR22","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1109\/TSMCB.2002.1049608","volume":"32","author":"M Agache","year":"2002","unstructured":"Agache M, Oommen B J (2002) Generalized pursuit learning schemes: new families of continuous and discretized learning automata. IEEE Trans Syst Man Cybern, Part B (Cybern) 32(6):738\u2013749","journal-title":"IEEE Trans Syst Man Cybern, Part B (Cybern)"},{"issue":"3","key":"1172_CR23","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/3477.931507","volume":"31","author":"BJ Oommen","year":"2001","unstructured":"Oommen B J, Agache M (2001) Continuous and discretized pursuit learning schemes: various algorithms and their comparison. IEEE Trans Syst Man Cybern, Part B (Cybern) 31(3):277\u2013287","journal-title":"IEEE Trans Syst Man Cybern, Part B (Cybern)"},{"key":"1172_CR24","volume-title":"Probabilistic graphical models: principles and techniques","author":"D Koller","year":"2009","unstructured":"Koller D, Friedman N (2009) Probabilistic graphical models: principles and techniques. MIT Press, Cambridge"},{"key":"1172_CR25","unstructured":"Yuan C, Lu T-C, Druzdzel M J (2004) Annealed map. In: Proceedings of the 20th conference on uncertainty in artificial intelligence. AUAI Press, pp 628\u2013635"},{"issue":"3\/4","key":"1172_CR26","doi-asserted-by":"publisher","first-page":"285","DOI":"10.2307\/2332286","volume":"25","author":"WR Thompson","year":"1933","unstructured":"Thompson W R (1933) On the likelihood that one unknown probability exceeds another in view of the evidence of two samples. Biometrika 25(3\/4):285\u2013294","journal-title":"Biometrika"},{"issue":"1","key":"1172_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000024","volume":"5","author":"S Bubeck","year":"2012","unstructured":"Bubeck S, Cesa-Bianchi N (2012) Regret analysis of stochastic and nonstochastic multi-armed bandit problems. Mach Learn 5(1):1\u2013122","journal-title":"Mach Learn"},{"issue":"2","key":"1172_CR28","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1108\/17563781011049179","volume":"3","author":"O-C Granmo","year":"2010","unstructured":"Granmo O-C (2010) Solving two-armed bernoulli bandit problems using a Bayesian learning automaton. Int J Intell Comput Cybern 3(2):207\u2013234","journal-title":"Int J Intell Comput Cybern"},{"key":"1172_CR29","unstructured":"Chapelle O, Li L (2011) An empirical evaluation of thompson sampling. In: Shawe-Taylor J, Zemel R S, Bartlett P L, Pereira F, Weinberger K Q (eds) Advances in neural information processing systems, vol 24. Curran Associates Inc., pp 2249\u20132257"},{"key":"1172_CR30","unstructured":"Agrawal S, Goyal N (2012) Analysis of thompson sampling for the multi-armed bandit problem. In: Conference on learning theory, COLT"},{"key":"1172_CR31","unstructured":"Agrawal S, Goyal N (2013) Further optimal regret bounds for thompson sampling. In: Proceedings of the sixteenth international conference on artificial intelligence and statistics, pp 99\u2013107"},{"key":"1172_CR32","unstructured":"Agrawal S, Goyal N (2013) Thompson sampling for contextual bandits with linear payoffs. In: Proceedings of the 30th international conference on machine learning (ICML-13), pp 127\u2013135"},{"key":"1172_CR33","unstructured":"Glimsdal S, Granmo O-C (2013) Gaussian process based optimistic knapsack sampling with applications to stochastic resource allocation. In: Proceedings of the 24th midwest artificial intelligence and cognitive science conference 2013. CEUR Workshop Proceedings, pp 43\u201350"},{"issue":"4","key":"1172_CR34","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/s10489-012-0346-z","volume":"38","author":"O-C Granmo","year":"2013","unstructured":"Granmo O-C, Glimsdal S (2013) Accelerated bayesian learning for decentralized two-armed bandit based decision making with applications to the goore game. Appl Intell 38(4):479\u2013488","journal-title":"Appl Intell"},{"issue":"2","key":"1172_CR35","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s10489-015-0682-x","volume":"44","author":"L Jiao","year":"2016","unstructured":"Jiao L, Zhang X, Oommen B J, Granmo O-C (2016) Optimizing channel selection for cognitive radio networks using a distributed bayesian learning automata-based approach. Appl Intell 44(2):307\u2013321","journal-title":"Appl Intell"},{"key":"1172_CR36","unstructured":"Tolpin D, Wood F (2015) Maximum a posteriori estimation by search in probabilistic programs. In: Eighth annual symposium on combinatorial search"},{"key":"1172_CR37","unstructured":"Selman B, Kautz HA, Cohen B, Noise strategies for improving local search (1994). In: AAAI, vol 94, pp 337\u2013343"},{"key":"1172_CR38","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ins.2012.12.051","volume":"233","author":"P Larra\u00f1aga","year":"2013","unstructured":"Larra\u00f1aga P, Karshenas H, Bielza C, Santana R (2013) A review on evolutionary algorithms in bayesian network learning and inference tasks. Inf Sci 233:109\u2013125","journal-title":"Inf Sci"},{"issue":"1","key":"1172_CR39","doi-asserted-by":"publisher","first-page":"1760005","DOI":"10.1142\/S0218213017600053","volume":"26","author":"T Soh","year":"2017","unstructured":"Soh T, Banbara M, Tamura N (2017) Proposal and evaluation of hybrid encoding of csp to sat integrating order and log encodings. Int J Artif Intell Tools 26(1):1760005","journal-title":"Int J Artif Intell Tools"},{"key":"1172_CR40","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1007\/978-0-387-30164-8_630","volume-title":"Particle swarm optimization in encyclopedia of machine learning","author":"J Kennedy","year":"2011","unstructured":"Kennedy J (2011) Particle swarm optimization in encyclopedia of machine learning. Springer, Berlin, pp 760\u2013766"},{"issue":"1","key":"1172_CR41","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0792-66","volume":"267","author":"JH Holland","year":"1992","unstructured":"Holland J H (1992) Genetic algorithms. Sci Am 267(1):66\u201372","journal-title":"Sci Am"},{"issue":"4","key":"1172_CR42","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCI.2006.329691","volume":"1","author":"M Dorigo","year":"2006","unstructured":"Dorigo M, Birattari M, Stutzle T (2006) Ant colony optimization. IEEE Comput Intell Mag 1(4):28\u201339","journal-title":"IEEE Comput Intell Mag"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-018-1172-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-018-1172-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-018-1172-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T07:30:40Z","timestamp":1720251040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-018-1172-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,24]]},"references-count":42,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["1172"],"URL":"https:\/\/doi.org\/10.1007\/s10489-018-1172-8","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2018,4,24]]},"assertion":[{"value":"24 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}