Sign Up to like & get
recommendations!
1
Published in 2022 at "Applied Intelligence"
DOI: 10.1007/s10489-021-02387-2
Abstract: Stochastic multi-armed bandit (MAB) mechanisms are widely used in sponsored search auctions, crowdsourcing, online procurement, etc. Existing stochastic MAB mechanisms with a deterministic payment rule, proposed in the literature, necessarily suffer a regret of Ω…
read more here.
Keywords:
multi armed;
sponsored search;
dominant strategy;
search auctions ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Journal of Statistical Planning and Inference"
DOI: 10.1016/j.jspi.2020.07.008
Abstract: Abstract In recent years, the multi-armed bandit problem regains popularity especially for the case with covariates since it has new applications in customized services such as personalized medicine. To deal with the bandit problem with…
read more here.
Keywords:
armed bandit;
bandit;
multi armed;
problem covariates ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Journal of the Operational Research Society"
DOI: 10.1080/01605682.2018.1546650
Abstract: Abstract We present a method to solve the problem of choosing a set of adverts to display to each of a sequence of web users. The objective is to maximise user clicks over time and…
read more here.
Keywords:
web;
multi armed;
state uncertainty;
armed bandit ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "Royal Society Open Science"
DOI: 10.1098/rsos.171377
Abstract: Sequential portfolio selection has attracted increasing interest in the machine learning and quantitative finance communities in recent years. As a mathematical framework for reinforcement learning policies, the stochastic multi-armed bandit problem addresses the primary difficulty…
read more here.
Keywords:
portfolio;
multi armed;
risk;
armed bandit ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3244070
Abstract: This study discusses how agents in a time-varying distributed network can converge to the global minimizer of a time-varying graph network. Each agent knows only the local loss of its observation and must cooperate constructively…
read more here.
Keywords:
time;
network;
non convex;
armed bandit ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2019.2941482
Abstract: In this letter, the efficient dissemination of content in a socially-aware cache-enabled hybrid network using multi-armed bandit learning theory is analyzed. Specifically, an overlay cellular network over a vehicular social network is considered, where commuters…
read more here.
Keywords:
multi armed;
cache;
bandit learning;
vehicular social ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Cognitive Communications and Networking"
DOI: 10.1109/tccn.2020.3012445
Abstract: In the edge computing paradigm, mobile devices offload the computational tasks to an edge server by routing the required data over the wireless network. The full potential of edge computing becomes realized only if a…
read more here.
Keywords:
multi armed;
problem;
edge computing;
energy ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Software Engineering"
DOI: 10.1109/tse.2020.2992428
Abstract: Continuous Integration (CI) environments have been increasingly adopted in the industry to allow frequent integration of software changes, making software evolution faster and cost-effective. In such environments, Test Case Prioritization (TCP) techniques play an important…
read more here.
Keywords:
test case;
armed bandit;
test;
approach ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Vehicular Technology"
DOI: 10.1109/tvt.2022.3199606
Abstract: In this paper, we investigate the joint user pairing and power coefficient allocation for unmanned aerial vehicle (UAV) systems which employ non-orthogonal multiple access (NOMA) to communicate with multiple ground users. Aiming to maximize achievable…
read more here.
Keywords:
user pairing;
power;
armed bandit;
pairing power ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Wireless Communications"
DOI: 10.1109/twc.2020.3008091
Abstract: By exploiting the computing power and local data of distributed clients, federated learning (FL) features ubiquitous properties such as reduction of communication overhead and preserving data privacy. In each communication round of FL, the clients…
read more here.
Keywords:
multi armed;
client scheduling;
bandit based;
federated learning ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "Problems of Information Transmission"
DOI: 10.1134/s0032946018010076
Abstract: We consider the minimax setting for the two-armed bandit problem with normally distributed incomes having a priori unknown mathematical expectations and variances. This setting naturally arises in optimization of batch data processing where two alternative…
read more here.
Keywords:
data processing;
armed bandit;
two armed;
batch data ... See more keywords