Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2018 at "Machine Learning"
DOI: 10.1007/s10994-018-5758-5
Abstract: We present algorithms for solving multi-armed and linear-contextual bandit tasks in the face of adversarial corruptions in the arm responses. Traditional algorithms for solving these problems assume that nothing but mild, e.g., i.i.d. sub-Gaussian, noise…
read more here.
Keywords:
learning corruption;
corruption tolerant;
algorithms;
bandit ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Journal of Economic Behavior and Organization"
DOI: 10.1016/j.jebo.2021.06.006
Abstract: Abstract I conduct an experimental investigation of observational (social) learning in a simple two-armed bandit framework where the models are based on Bayesian reasoning and non-Bayesian count heuristics providing different predictions. The agents can choose…
read more here.
Keywords:
observational learning;
test observational;
cascade test;
bandit cascade ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Journal of Statistical Planning and Inference"
DOI: 10.1016/j.jspi.2020.07.008
Abstract: Abstract In recent years, the multi-armed bandit problem regains popularity especially for the case with covariates since it has new applications in customized services such as personalized medicine. To deal with the bandit problem with…
read more here.
Keywords:
armed bandit;
bandit;
multi armed;
problem covariates ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Neurocomputing"
DOI: 10.1016/j.neucom.2021.03.072
Abstract: Abstract Implicit feedback such as clicks and favorites has been widely studied and applied to recommender systems due to its low collection cost and rich hidden information. In this paper, the recommendation based on implicit…
read more here.
Keywords:
problem;
feedback;
implicit feedback;
model ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Probability in the Engineering and Informational Sciences"
DOI: 10.1017/s0269964817000146
Abstract: In a rare life-threatening disease setting the number of patients in the trial is a high proportion of all patients with the condition (if not all of them). Further, this number is usually not enough…
read more here.
Keywords:
trial;
bandit;
life threatening;
number ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3229645
Abstract: Proactively caching content at the network edge is particularly effective in high-mobility vehicular networks, where intermittent connection is the major challenge for seamless content transmission. The objective of this paper is to achieve proactive caching…
read more here.
Keywords:
proactive caching;
mab;
vehicular networks;
bandit ... See more keywords
Photo by garri from unsplash
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Journal of Selected Topics in Quantum Electronics"
DOI: 10.1109/jstqe.2019.2929217
Abstract: Decision making in dynamically changing uncertain environments is one of the most important elements in information and communications technology, in applications ranging from resource assignment in data centers to wireless communications and search functions. Here,…
read more here.
Keywords:
making photonics;
problem;
decision making;
photonics ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Control Systems Letters"
DOI: 10.1109/lcsys.2023.3279788
Abstract: This letter considers a cooperative decision-making method for an adversarial bandit problem on open multi-agent systems. In an open multi-agent system, the network configuration changes dynamically as agents freely enter and leave the network. We…
read more here.
Keywords:
open multi;
agent systems;
multi;
bandit ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2022.3164939
Abstract: Reconfigurable intelligent surface (RIS) and unmanned aerial vehicle (UAV) are anticipated as talented technologies to extend the range of millimeter wave (mmWave) communications. In this letter, a UAV equipped with RIS (UAV-RIS) is used to…
read more here.
Keywords:
energy;
millimeter wave;
bandit;
energy aware ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Vehicular Technology Magazine"
DOI: 10.1109/mvt.2023.3237940
Abstract: Establishing and maintaining millimeter-wave (mm-wave) links are challenging due to the changing environment and the high sensibility of mm-wave signals to user mobility and channel conditions. mm-Wave link configuration problems often involve a search for…
read more here.
Keywords:
configuration;
millimeter wave;
bandit;
link configuration ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Automatic Control"
DOI: 10.1109/tac.2020.3030883
Abstract: Distributed bandit online convex optimization with time-varying coupled inequality constraints is considered, motivated by a repeated game between a group of learners and an adversary. The learners attempt to minimize a sequence of global loss…
read more here.
Keywords:
tex math;
bandit;
inline formula;