<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Statistical Analysis of the Features of a Hybrid Local Search Algorithm For Course Timetabling Problems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
				<date type="published" when="2008-12-13">13 December 2008</date>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Ruggero</forename><surname>Bellio</surname></persName>
							<email>bellio@dss.uniud.it</email>
							<affiliation key="aff0">
								<orgName type="department">Dipartimento di Scienze Statistiche</orgName>
								<orgName type="institution">Università di Udine via</orgName>
								<address>
									<addrLine>Treppo 18</addrLine>
									<postCode>I-33100</postCode>
									<settlement>Udine</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Luca</forename><forename type="middle">Di</forename><surname>Gaspero</surname></persName>
							<email>l.digaspero@uniud.it</email>
							<affiliation key="aff1">
								<orgName type="department" key="dep1">Dipartimento di Ingegneria Elettrica</orgName>
								<orgName type="department" key="dep2">Gestionale e Meccanica</orgName>
								<orgName type="institution">Università di Udine via delle</orgName>
								<address>
									<addrLine>Scienze 208</addrLine>
									<postCode>I-33100</postCode>
									<settlement>Udine</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrea</forename><surname>Schaerf</surname></persName>
							<email>schaerf@uniud.it</email>
							<affiliation key="aff1">
								<orgName type="department" key="dep1">Dipartimento di Ingegneria Elettrica</orgName>
								<orgName type="department" key="dep2">Gestionale e Meccanica</orgName>
								<orgName type="institution">Università di Udine via delle</orgName>
								<address>
									<addrLine>Scienze 208</addrLine>
									<postCode>I-33100</postCode>
									<settlement>Udine</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="laboratory">Experimental Evaluation of Algorithms for Solving Problems with Combinatorial Explosion Udine</orgName>
								<address>
									<postCode>12</postCode>
									<settlement>Italy</settlement>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A Statistical Analysis of the Features of a Hybrid Local Search Algorithm For Course Timetabling Problems</title>
					</analytic>
					<monogr>
						<imprint>
							<date type="published" when="2008-12-13">13 December 2008</date>
						</imprint>
					</monogr>
					<idno type="MD5">F05AFCD86F8BCC47AAAA79A3FA794C2D</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-19T17:53+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this work we study a hybrid local search algorithm for the solution of timetabling problems, and we undertake a systematic statistical study of the relative influence of the relevant features on the performances of the algorithm. In particular, we apply statistical methods for the design and analysis of experiments. This work is still ongoing, and its ultimate objective is to develop a procedure for obtaining the best combination of parameters for the algorithm for a given instance and predicting them for the unseen ones.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>In the last years the research in metaheuristic seems to have reached a certain level of maturity. Indeed, we witness an evolution from articles proposing new metaheuristics or the handcrafted application of existing ones, to papers addressing engineering methodologies for applying those methods and evaluating their behavior.</p><p>With this respect, one fundamental issue and a recent trend of research concerns the analysis of this kind of algorithm (see, e.g., <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b11">12]</ref>). Indeed, many metaheuristics are stochastic in nature and need a careful investigation by means of statistically sound techniques in order to characterize their behavior.</p><p>In this paper we look through this lens at the features of a hybrid local search algorithm, based on a complex combination of simulated annealing and dynamic tabu search. The study focuses on a basic timetabling problem, namely the course timetabling problem formulation used for the International Timetabling Competition (ITC-2007) as track 3 <ref type="bibr" target="#b2">[3]</ref>, named Curriculum-Based Course Timetabling (CB-CTT). The instances upon which the algorithm is experimented are also the official ones of the competition.</p><p>The remainder of the paper is organized as follows: In Section 2 we provide the definition of the problem and in Section 3 we illustrate the basic local search model for solving it and the two basic components of the hybrid algorithm. The outcomes of the statistical analyses we performed are reported in Section 4. Finally in Section 5 we summarize what we have done and point out the directions for future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Problem definition</head><p>The basic features of CB-CTT are presented in the ITC-2007 web site and in a companion technical report <ref type="bibr" target="#b2">[3]</ref>; however, in order to make this paper self-contained, we present here the full problem definition. The problem consists of the following basic entities: Days, Timeslots, and Periods. We are given a number of teaching days in the week (typically 5 or 6). Each day is split in a fixed number of timeslots, which is equal for all days. A period is a pair composed of a day and a timeslot. The total number of scheduling periods is the product of the days times the day timeslots.</p><p>Courses and Teachers. Each course consists of a fixed number of lectures to be scheduled in distinct periods, it is attended by a given number of students, and is taught by a teacher. For each course there is a minimum number of days that the lectures of the course should be spread in, moreover there are some periods in which the course cannot be scheduled.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Rooms.</head><p>Each room has a capacity, expressed in terms of number of available seats, and a location expressed as an integer value representing a separate building. Some rooms may be not suitable for some courses (because they miss some equipment).</p><p>Curricula. A curriculum is a group of courses such that any pair of courses in the group have students in common. Based on curricula, we have the conflicts between courses and other soft constraints.</p><p>The solution of the problem is an assignment of a period (day and timeslot) and a room to all lectures of each course that satisfies a set of constraints.</p><p>The constraints are split in two categories:</p><p>• Hard constraints: these are constraints that must be always satisfied in any feasible solution of the problem.</p><p>• Soft constraints (or objectives): they are preferential features that a solution should have. Differently from the hard ones, soft constraints can be violated at the price of worsening the quality of the solution.</p><p>In the following we detail these two categories of constraints for the problem taken into consideration.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Hard constraints</head><p>(H1) Lectures: All lectures of a course must be scheduled, and they must be assigned to distinct periods. A violation occurs if a lecture is not scheduled or two lectures are in the same period.</p><p>(H2) Conflicts: Lectures of courses in the same curriculum or taught by the same teacher must be all scheduled in different periods. Two conflicting lectures in the same period represent one violation. Three conflicting lectures count as 3 violations: one for each pair.</p><p>(H3) RoomOccupancy: Two lectures cannot take place in the same room in the same period. Two lectures in the same room at the same period represent one violation. Any extra lecture in the same period and room counts as one more violation.</p><p>(H4) Availability: If the teacher of the course is not available to teach that course at a given period, then no lecture of the course can be scheduled at that period. Each lecture in a period unavailable for that course is one violation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Soft Constraints</head><p>(S1) RoomCapacity: For each lecture, the number of students that attend the course must be less or equal than the number of seats of all the rooms that host its lectures.</p><p>(S2) MinWorkingDays: The lectures of each course must be spread into the given minimum number of days. Each day below the minimum counts as 1 violation.</p><p>(S3) IsolatedLectures: Lectures belonging to a curriculum should be adjacent to each other (i.e., in consecutive periods). For a given curriculum we account for a violation every time there is one lecture not adjacent to any other lecture within the same day. Each isolated lecture in a curriculum counts as 1 violation.</p><p>(S4) RoomStability: All lectures of a course should be given in the same room. Each distinct room used for the lectures of a course, but the first, counts as 1 violation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Local Search for CB-CTT</head><p>In order to design a local search algorithm for the problem we have to specify some basic local search entities, namely the search space, the neighborhood relation and the cost function.</p><p>The search space we consider is composed of all the assignment for which the hard constraints ( <ref type="formula" target="#formula_1">1</ref>) and (4) hold. States for which the hard constraints (2) and ( <ref type="formula">3</ref>) do not hold are allowed, but are penalized within the cost function.</p><p>As for the neighborhood relation, we employ two neighborhoods. For the Move neighborhood, given a reference solution, we consider as neighbors all the solutions in which a lecture is moved to a different room and/or to a different timeslot. Only the moves that lead to an empty room/timeslot pair are allowed. The Swap neighborhood considers as neighbors of a given solution those solutions that have the room/time assignments of a pair of lectures exchanged. The two neighborhoods are combined by means of the set-union operator.</p><p>The cost function is a weighted sum of the violations of the aforementioned hard constraints and the violations of the soft constraints. In order to give precedence to feasibility over the objectives, hard constraints are assigned the weight w H , which is a value greater than the maximum value of soft constraints violations.</p><p>In the following we describe in some detail the metaheuristics employed in this study, namely Simulated Annealing and Dynamic Tabu Search, and we illustrate the high-level strategy for combining them.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Simulated Annealing</head><p>Simulated Annealing (SA) <ref type="bibr" target="#b5">[6]</ref> is a metaheuristic whose name comes after an analogy with a simulated controlled cooling of a collection of hot vibrating atoms. The idea is based on accepting non-improving moves with probability that decreases with time.</p><p>The process starts by creating a random initial solution and randomly generating at each iteration a neighbor of the current solution. The new solution is accepted and becomes the current one if either it is an improving one or with probability e −∆f /T , where T is a value called the temperature. The temperature T is initially set to an appropriately high value T 0 . After a fixed number of iterations, the temperature is decreased by the cooling rate γ, so that at each cooling step n, T n = γ × T n−1 . The procedure stops when the temperature reaches a low-temperature region, that is when no solution that increases the cost function is accepted anymore. In this case we say that the system is frozen.</p><p>The control parameters of the procedure are summarized in Table <ref type="table" target="#tab_0">1</ref>.</p><p>Parameter </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Dynamic Tabu Search</head><p>Tabu Search <ref type="bibr" target="#b3">[4]</ref> is a meta-heuristic method in which a fundamental role is played by keeping track of features of previously visited solutions.</p><p>The basic mechanism of Tabu Search is quite simple: at each iteration a subset of the neighborhood of the current solution is explored and the neighbor that gives the minimum value of the cost function becomes the new current solution independently of the fact that its value is better or worse than the current solution.</p><p>The neighborhood subset is induced by the so-called tabu list, i.e., a list of moves that are forbidden to be performed. The tabu list comprises the last moves (to prevent cycling), and it is run as a queue; that is, whenever a new move is accepted as the new current solution, the oldest one is discarded.</p><p>In our implementation we adopt the robust TS mechanism for managing the tabu list, that is the size of the tabu list is variable and each performed move remains in the list for a number of iterations randomly selected in the range [k−δ, k+δ],</p><p>where k and δ are parameters of the method. Moreover, at each iteration the full neighborhood is traversed and all non-tabu neighbors are evaluated. A move is considered as tabu if a move in the list involves the same lecture. The stop criterion we adopt is based on the number of iterations since the last improvement.</p><p>Our TS algorithm is dynamic (DTS) in the sense that it changes continuously the shape of the cost function in an adaptive way, thus causing the search trajectory to pass through infeasible states and visit states that have a different structure than the previously visited ones. Namely, the weight of each hard component is let to vary according to the so-called shifting penalty mechanism: if for a number k of consecutive iterations all constraints of that component are satisfied (resp. not satisfied), then the weight is divided (multiplied) by a factor α. Besides α, we also consider the minimum (w min ), the maximum (w max ), and the initial weight (w start ) of the hard constraints.</p><p>In order to reduce the number of free control parameters, we set some of the parameters values according to the results of a preliminary screening experiment (see Sect.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Combination of metaheuristics</head><p>In this work we study a high-level search control strategy that hybridize the basic local search components. This idea is an instantiation of Hoos and Stützle's Generalized Local Search Machines (GLSM) [5, Chapter 3], which is a formal framework for describing search control by clearly separating it from the search components. In this framework, the basic search components are represented as states (i.e., nodes) of a Finite State Machine, whereas the transitions (i.e., edges) correspond to conditions for modeling the search control.</p><p>In Figure <ref type="figure">1</ref> we describe the high-level control strategy for combining SA and DTS. The notation employed in the figure is quite similar to the one used by UML state diagrams. The search starts from an initial random state built by the IS component; when this component has finished it unconditionally passes its solution to DTS, which searches until the number of iterations without improvement has reached the maximum value allowed (i.e., its stopping condition becomes true). Whenever this happens, DTS passes its best solution to SA, which runs until its temperature is higher than the minimum value T min . Then SA returns its best solution to DTS, which starts again its search. The whole strategy is stopped from either DTS or SA when an overall timeout τ has expired.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Statistical Analyses</head><p>The statistical analyses of a timetabling algorithm requires a sequence of steps. Broadly speaking, they include preliminary screening, selection of a suitable experimental design, data analysis and final validation. The use of</p><formula xml:id="formula_0">• IS DTS SA • ii &gt; max ii T n ≤ T min rt &gt; τ rt &gt; τ</formula><p>Figure <ref type="figure">1</ref>: A schematic illustration of the high-level strategy for combining SA and DTS a statistical software is largely advisable, and our choice is given by the R statistical software <ref type="bibr" target="#b8">[9]</ref>. The single steps of the analysis are given as follows.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Preliminary screening</head><p>At first, a screening experiment was run to eliminate unimportant algorithm parameters. In detail we executed SA and DTS with several "extreme" settings of each parameter (keeping the other parameters at fixed "reasonable" values) and we analyzed whether this has any impact in terms of the produced solutions. We eliminate from the study those parameters that seem not to be sensitive to the values assigned.</p><p>After this step, we identified the most crucial parameters for minimizing the total cost. Studying only few parameters is clearly a simplification, but this allowed us to achieve a better understanding of the problem under investigation. However, we kept in mind more general extensions, searching a methodology which could be useful in more challenging settings.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Experimental design</head><p>The experimental design should be targeted to the goal of the analysis. In order to analyse the role of algorithm parameters on the resulting performances, it is useful to follow the principle of Response Surface Methodology (RSM). The idea is to approximate the scaled cost (output) as a quadratic function of the algorithm parameters (inputs). More precisely, if the algorithm has h parameters under study, x = x 1 , . . . , x h , each coded in the range [−1, 1], the meta-model for the scaled cost is given by</p><formula xml:id="formula_1">g(x, β) = β 0 + h i=1 β i x i + 2h i=h+1 β i x 2 i + h−1 i=1 h j&gt;i β i,j x i x j ,<label>(1)</label></formula><p>where the coefficients β are unknown parameters to be estimated from the data. Designs commonly used in RSM, such as Central Composite Designs (CCD) are excellent for detecting interactions and quadratic terms, but do not provide information about all portions of the experimental region. In many cases, it might be preferable to make use of space-filling designs, which spread points evenly throughout the experimental region <ref type="bibr" target="#b10">[11]</ref>. In particular, we adopt the modern solution given by Nearly Orthogonal and Space-filling Latin Hypercubes, introduced by <ref type="bibr" target="#b1">[2]</ref>. NOLH are space-filling designs which provide a nearly orthogonal design matrix when used in a first-order regression model. Their main property is that they are particular suitable also for large h, reducing drastically the number of input combinations (n) required. For example, n = 33 suffices for NOLH with 2 ≤ h ≤ 6, while for h = 5 a typical CCD already requires n = 3 5 = 243. For each instance, we then ran a NOLH with 65 design points, and 10 replications for each design points. Despite the suggestion that random seed should be taken as a blocking factor <ref type="bibr" target="#b9">[10]</ref>, preliminary experimentation suggested this was not strongly required for the algorithm under study.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Data analysis</head><p>Statistical analyses have to be performed by considering the results of experiments carried out for several different instances (20 in our case). In order to pool together the results obtained from different instances, a sensible strategy is to use a response variable which is a scaled version of the total cost, suitably normalized using the best available result for each instance. Namely, if z denotes the total cost and z * the best result, we took as response variable y defined as</p><formula xml:id="formula_2">y = c 0 + Φ −1 1 − z * + c 1 z + c 2 1 s .</formula><p>Here c 0 , c 1 and c 2 are suitable constants ensuring that the resulting y is always positive, Φ(•) is the standard normal distribution function, and s is an instance-specific estimate of scale. The monotonic increasing transformation defining the scaled cost y has the effect of obtaining results which are comparable across the different instances. Moreover, for the scaled cost the assumptions required by the statistical methods suitable for our framework are to a good extent satisfied. The experiments are still ongoing at the time of writing, and only some partial results are already available. Some features are readily detectable, such as the presence of a large amount of heterogeneity between instances and the strong effect of algorithm parameters on the resulting performances. Cooling rate appears to be by far the most important tuning parameter. In the following, we illustrate the methodology that will be used for the analysis of the experimental data.</p><p>First of all, our aim is to pool all the instances together, which is sensible since it can be argued that there is a common structure. The methodological tool for pooling together the results of different instances is given by random coefficient models, an extension of the usual mixed effects ANOVA model already proposed by Bang-Jensen et al. <ref type="bibr">(SLS 2007</ref>; see also <ref type="bibr" target="#b7">[8]</ref>). Mixed models provide smoothed estimates of instance-specific models coefficients, by taking advantage of the common structure assumed for all the data. The details are as follows. If i is the index for the instance (i = 1, . . . , I), j is the index for the design point (j = 1, . . . , J), and k is the index for the different random seed (k = 1, . . . , K), the model is</p><formula xml:id="formula_3">y ijk = g(x ij , β i ) + u k + ε ijk .</formula><p>Here g(x ij , β i ) is the the function (1) used for modelling the mean scaled cost as a function of algorithm parameter and instance-specific coefficients β i . The further step is to assume that β = β + b i , where β is a fixed effect and b i are random deviations, often (but not necessarily) assumed to be normally distributed. Furthermore, u k ∼ N (0, σ 2 u ), ε ijk ∼ N (0, σ 2 e ). All the random terms are independent of one another. When the random seed effect is dropped, as the various runs are not blocked on seed, then σ 2 u = 0. The model can be fitted as illustrated in <ref type="bibr" target="#b7">[8]</ref>. The estimates obtained in such way should be preferable to those obtained in instance-specific analyses. Hopefully, for most of the instances the fitted approximating surface should display a minimum point within the acceptable operating region for the algorithm parameters.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4">Final validation</head><p>The final step will be devoted to verify that the results obtained by means of the RSM correspond to an algorithm combinations that actually is more advantageous than alternatives ones. Methodologically, however, rather than considering a single point, it is more correct to consider confidence regions for the optimal point. The size of the confidence region provides an effective method for summarising how informative is the RSM for the problem at hand. Furthermore, the fitted model can be used to study the relation between the optimal tuning of algorithm parameters and instance features. This can be of some importance for predicting the performance of the algorithm for unseen instances.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions and future work</head><p>This work is still ongoing and we fully accomplished only two of the four phases described in the previous section. At present, therefore, our main contribution is of methodological nature. We still are waiting for the full data to be analyzed to shed light on the relevant features of the algorithm studied. Nevertheless, preliminary results on a simplified version of the algorithm <ref type="bibr" target="#b0">[1]</ref> (namely employing only the DTS metaheuristic) seem to be promising to this respect.</p><p>Our short-term roadmap is quite straightforward: we plan to finish the computational experiments and the data analysis in a few weeks. As a midterm goal, instead, we plan to test the proposed methodology also on other problems. This will allow to assess some general validity of the procedure or, instead, will prompt for modifications.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>4 . 1 )</head><label>41</label><figDesc>whose aim is to eliminate the non-influential parameters. The control parameters for DTS and the values of the unim-Parameter Parameter Description name value k -Central value of the tabu list range δ 5 Width of the tabu list range α -Modification factor of the dynamic adaptive modification w start 1.0 Starting weight w min 0.0005 Minimum weight w max 1.0 Maximum weight max ii -Maximum number of iterations without improvement</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 :</head><label>1</label><figDesc>Control parameters of the Simulated Annealing metaheuristic</figDesc><table><row><cell>name</cell><cell>Description</cell></row><row><cell>T 0</cell><cell>Starting temperature</cell></row><row><cell>T min</cell><cell>Ending temperature</cell></row><row><cell>γ</cell><cell>Cooling rate in the geometric scheme T n = γ × T n−1</cell></row><row><cell>n</cell><cell>Number of neighbors sampled at each temperature level</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 :</head><label>2</label><figDesc>Control parameters of the Dynamic Tabu Search metaheuristic, the dash indicates free parameters portant ones are summarized in Table2.</figDesc><table /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A statistical analysis of the features of a dynamic tabu search algorithm for course timetabling problems</title>
		<author>
			<persName><forename type="first">Ruggero</forename><surname>Bellio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Luca</forename><surname>Di Gaspero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrea</forename><surname>Schaerf</surname></persName>
		</author>
		<ptr target="http://w1.cirrelt.ca/~patat2008/PATAT_7_PROCEEDINGS/Papers/Schaerf-HC1a.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 7th International Conference on Pratice and Theory of Automated Timetabling (PATAT-2008)</title>
				<editor>
			<persName><forename type="first">Edmund</forename><forename type="middle">K</forename><surname>Burke</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Michel</forename><surname>Gendreau</surname></persName>
		</editor>
		<meeting>the 7th International Conference on Pratice and Theory of Automated Timetabling (PATAT-2008)</meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note>Electronic proceedings</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Efficient nearly orthogonal and space-filling latin hypercubes</title>
		<author>
			<persName><forename type="first">Thomas</forename><forename type="middle">M</forename><surname>Cioppa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Thomas</forename><forename type="middle">W</forename><surname>Lucas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Technometrics</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="page" from="45" to="55" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">Di</forename><surname>Luca</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Barry</forename><surname>Gaspero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrea</forename><surname>Mccollum</surname></persName>
		</author>
		<author>
			<persName><surname>Schaerf</surname></persName>
		</author>
		<idno>ITC-2007</idno>
		<ptr target="http://www.cs.qub.ac.uk/itc2007/" />
		<title level="m">The second international timetabling competition (ITC-2007): Curriculum-based course timetabling (track 3</title>
				<meeting><address><addrLine>Belfast (UK)</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007-08">August 2007</date>
		</imprint>
		<respStmt>
			<orgName>School of Electronics, Electrical Engineering and Computer Science, Queens University</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report QUB/</note>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Tabu search</title>
		<author>
			<persName><forename type="first">Fred</forename><surname>Glover</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Manuel</forename><surname>Laguna</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1997">1997</date>
			<publisher>Kluwer Academic Publishers</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><surname>Holger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Thomas</forename><surname>Hoos</surname></persName>
		</author>
		<author>
			<persName><surname>Stützle</surname></persName>
		</author>
		<title level="m">Stochastic Local Search -Foundations and Applications</title>
				<meeting><address><addrLine>San Francisco, CA (USA</addrLine></address></meeting>
		<imprint>
			<publisher>Morgan Kaufmann Publishers</publisher>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Optimization by simulated annealing</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kirkpatrick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">D</forename><surname>Gelatt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Jr</surname></persName>
		</author>
		<author>
			<persName><surname>Vecchi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science</title>
		<imprint>
			<biblScope unit="volume">220</biblScope>
			<biblScope unit="page" from="671" to="680" />
			<date type="published" when="1983">1983</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m">Proceedings of the Workshop on Empirical Methods for the Analysis of Algorithms, EMAA 2006</title>
				<editor>
			<persName><forename type="first">Luís</forename><surname>Paquete</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Marco</forename><surname>Chiarandini</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Dario</forename><surname>Basso</surname></persName>
		</editor>
		<meeting>the Workshop on Empirical Methods for the Analysis of Algorithms, EMAA 2006<address><addrLine>Reykjavik, Iceland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006-09-09">September 9 2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Mixed-Effects Models in S and S-Plus</title>
		<author>
			<persName><forename type="first">C</forename><surname>José</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Douglas</forename><forename type="middle">M</forename><surname>Pinheiro</surname></persName>
		</author>
		<author>
			<persName><surname>Bates</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">Core</forename><surname>Development</surname></persName>
		</author>
		<author>
			<persName><surname>Team</surname></persName>
		</author>
		<title level="m">R: A Language and Environment for Statistical Computing</title>
				<meeting><address><addrLine>Vienna, Austria</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note>R Foundation for Statistical Computing</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Screening the parameters affecting heuristic performance</title>
		<author>
			<persName><forename type="first">Enda</forename><surname>Ridge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Daniel</forename><surname>Kudenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">GECCO</title>
				<editor>
			<persName><forename type="first">Hod</forename><surname>Lipson</surname></persName>
		</editor>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page">180</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Modern Experimental Design</title>
		<author>
			<persName><forename type="first">Thomas</forename><forename type="middle">P</forename><surname>Ryan</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>John Wiley &amp; Sons</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Engineering Stochastic Local Search Algorithms. Designing, Implementing and Analyzing Effective Heuristics</title>
		<author>
			<persName><forename type="first">Thomas</forename><surname>Stützle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mauro</forename><surname>Birattari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Holger</forename><forename type="middle">H</forename><surname>Hoos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SLS</title>
		<imprint>
			<biblScope unit="volume">4638</biblScope>
			<date type="published" when="2007">2007. 2007</date>
			<publisher>Springer Verlag</publisher>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
