Towards Automated Knowledge Transfer in Evolutionary Multitasking via Large Language Models
arXiv:2409.04270v2 Announce Type: replace Abstract: Evolutionary multi-task optimization (EMTO) is an advanced optimization paradigm that improves search efficiency by enabling knowledge transfer across multiple tasks solved in parallel. Accordingly, a broad range of knowledge transfer methods (KTMs) have been developed as integral components of EMTO algorithms, most of which are tailored to specific problem settings. However, the design of effective KTMs typically relies on substantial domain expertise and careful manual customization, as different EMTO scenarios require distinct transfer strategies to achieve performance gains. Meanwhile, recent advances in large language models (LLMs) have demonstrated strong capabilities in autonomous programming and algorithm synthesis, opening up new
View PDF HTML (experimental)
Abstract:Evolutionary multi-task optimization (EMTO) is an advanced optimization paradigm that improves search efficiency by enabling knowledge transfer across multiple tasks solved in parallel. Accordingly, a broad range of knowledge transfer methods (KTMs) have been developed as integral components of EMTO algorithms, most of which are tailored to specific problem settings. However, the design of effective KTMs typically relies on substantial domain expertise and careful manual customization, as different EMTO scenarios require distinct transfer strategies to achieve performance gains. Meanwhile, recent advances in large language models (LLMs) have demonstrated strong capabilities in autonomous programming and algorithm synthesis, opening up new possibilities for automating the design of optimization solvers. Motivated by this, in this paper, we propose a Self-guided Knowledge Transfer Design (SKTD) framework that leverages LLMs to autonomously generate knowledge transfer methods (KTMs) as algorithmic components within EMTO. By enabling data-driven and self-adaptive construction of transfer strategies, SKTD facilitates effective knowledge reuse across heterogeneous tasks and diverse EMTO scenarios. To the best of our knowledge, this work represents the first attempt to automate the generation of KTMs for EMTO. Extensive experiments on well-established EMTO benchmarks with varying degrees of task similarity demonstrate that the proposed SKTD consistently achieves superior or highly competitive performance compared with both the state-of-the-art program search approach and manually designed EMTO methods, in terms of optimization effectiveness and cross-scenario generalization.
Comments: 25 pages
Subjects:
Neural and Evolutionary Computing (cs.NE)
Cite as: arXiv:2409.04270 [cs.NE]
(or arXiv:2409.04270v2 [cs.NE] for this version)
https://doi.org/10.48550/arXiv.2409.04270
arXiv-issued DOI via DataCite
Submission history
From: Yuxiao Huang [view email] [v1] Fri, 6 Sep 2024 13:25:43 UTC (3,180 KB) [v2] Tue, 31 Mar 2026 14:19:16 UTC (661 KB)
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
modellanguage modelbenchmarkThe Stages of AI Grief
<blockquote> <p><strong>Assumed audience:</strong> People who work with AI daily — or are starting to — and have complicated feelings about it.</p> </blockquote> <p>I don't think I've ever had so much fun in my programming career as I do now. Which is strange, because a few weeks ago I was in a very different place. I was watching - in horror - as the machine on my desk was taking over my craft. Like most people I guess, I derive quite a lot of my identity from that craft; hence the horror. (Let's ignore for now whether that's a good thing or not.)</p> <p>I just watched it melt away. Like a block of ice in the sun; inexorable. In that moment it felt like I was witnessing an emerging god: an uncontrollable force in the sky asserts its influence over all it touches, and every day, it touches
Implementing Zero Trust Architecture for Unmanaged IoT at the Network Edge
<h2> Why Unmanaged IoT Is the Weakest Link in Your Network </h2> <p>The proliferation of Internet of Things (IoT) devices across enterprise environments has created a security paradox. Organizations deploy thousands of connected devices—IP cameras, building automation controllers, medical equipment, industrial sensors, point-of-sale terminals—to drive operational efficiency. Yet the vast majority of these devices are <strong>unmanaged</strong>: they cannot run endpoint agents, accept security patches on schedule, or participate in traditional identity frameworks. According to industry estimates, over 75% of IoT devices in production environments operate without any form of endpoint security.</p> <p>This creates a massive blind spot. Traditional perimeter-based security assumes that everyth
Transforming Raspberry Pi into an AI-Native Edge IDS for SMBs
<h2> The SMB Security Gap: Why the Edge Matters </h2> <p>Small and Medium Businesses (SMBs) are frequently described as the "soft underbelly" of the global supply chain. While large enterprises invest millions in centralized Security Operations Centers (SOCs) and high-end hardware, SMBs often operate with lean IT teams and limited budgets. However, the threats they face—ranging from sophisticated ransomware-as-a-service to targeted lateral movement—are just as potent. The traditional approach of backhauling all traffic to a central firewall is increasingly obsolete in a world of distributed work and IoT expansion. This is where <strong>how to set up IDS on raspberry pi</strong> becomes a critical question for cost-conscious security engineers.</p> <p>In the contemporary digital ecosystem,
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Models
The Stages of AI Grief
<blockquote> <p><strong>Assumed audience:</strong> People who work with AI daily — or are starting to — and have complicated feelings about it.</p> </blockquote> <p>I don't think I've ever had so much fun in my programming career as I do now. Which is strange, because a few weeks ago I was in a very different place. I was watching - in horror - as the machine on my desk was taking over my craft. Like most people I guess, I derive quite a lot of my identity from that craft; hence the horror. (Let's ignore for now whether that's a good thing or not.)</p> <p>I just watched it melt away. Like a block of ice in the sun; inexorable. In that moment it felt like I was witnessing an emerging god: an uncontrollable force in the sky asserts its influence over all it touches, and every day, it touches
Unlock the Power of Private AI: Build a Local RAG Pipeline with LangGraph, Ollama & Vector Databases
<blockquote> <p>I created a new website: <a href="https://programmingcentral.vercel.app/books/typescript/" rel="noopener noreferrer">Free Access to the 8 Volumes on Typescript & AI Masterclass</a>, no registration required. Choose Volume and chapter on the menu on the left. 160 Chapters and hundreds of quizzes at the end of chapters.</p> </blockquote> <p>Retrieval-Augmented Generation (RAG) is revolutionizing how we interact with AI, allowing models to provide more informed and contextually relevant answers. But what if you need to keep your data private and secure? This guide dives into building a <strong>Private RAG pipeline</strong> – a self-contained AI system that operates entirely on your machine, leveraging local embeddings, vector stores, and Large Language Models (LLMs). We'll
Stop Using Elaborate Personas: Research Shows They Degrade Claude Code Output
<blockquote> <p>Scientific research reveals common Claude Code prompting practices—like elaborate personas and multi-agent teams—are measurably wrong and hurt performance.</p> </blockquote> <h1> Stop Using Elaborate Personas: Research Shows They Degrade Claude Code Output </h1> <p>A developer who read 17 academic papers on agentic AI workflows has published findings that contradict much of the common advice circulating in the Claude Code community. The research-backed principles suggest developers are actively harming their output quality with popular prompting patterns.</p> <h2> What The Research Says — Counterintuitive Findings </h2> <p>The key findings, distilled from papers including PRISM persona research and DeepMind (2025) studies, are actionable for any Claude Code user:</p> <ol> <
Interpretability and implicit model semantics in biomedicine and deep learning - Nature
<a href="https://news.google.com/rss/articles/CBMiX0FVX3lxTE1zT3N6bS1OX2V5VXFUSldsVnJYVXJrSW1iS1NtSVpoMVVDUHVHcnkwSEFwc0lkYzc4VEpZMUJveGM1WjB6SU1UdUcxS2ViOGk0WFpKeXVlMDROeEFwelhz?oc=5" target="_blank">Interpretability and implicit model semantics in biomedicine and deep learning</a> <font color="#6f6f6f">Nature</font>
Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!