Articles with "bandit learning" as a keyword



Photo from archive.org

Corruption-tolerant bandit learning

Sign Up to like & get
recommendations!
Published in 2018 at "Machine Learning"

DOI: 10.1007/s10994-018-5758-5

Abstract: We present algorithms for solving multi-armed and linear-contextual bandit tasks in the face of adversarial corruptions in the arm responses. Traditional algorithms for solving these problems assume that nothing but mild, e.g., i.i.d. sub-Gaussian, noise… read more here.

Keywords: learning corruption; corruption tolerant; algorithms; bandit ... See more keywords
Photo by hajjidirir from unsplash

Multi-Armed Bandit Learning for Cache Content Placement in Vehicular Social Networks

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2019.2941482

Abstract: In this letter, the efficient dissemination of content in a socially-aware cache-enabled hybrid network using multi-armed bandit learning theory is analyzed. Specifically, an overlay cellular network over a vehicular social network is considered, where commuters… read more here.

Keywords: multi armed; cache; bandit learning; vehicular social ... See more keywords
Photo by hajjidirir from unsplash

Calibrated Bandit Learning for Decentralized Task Offloading in Ultra-Dense Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2022.3152262

Abstract: The integration of mobile edge computing (MEC) into an ultra-dense network (UDN) can provide ubiquitous task offloading services to computation-demanding users leveraging densely deployed micro base stations. The conventional multi-user task offloading strategies are performed… read more here.

Keywords: decentralized task; bandit learning; task; task offloading ... See more keywords
Photo by hajjidirir from unsplash

Adaptive Relay Selection Strategy in Underwater Acoustic Cooperative Networks: A Hierarchical Adversarial Bandit Learning Approach

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2021.3112967

Abstract: Relay selection solutions for underwater acoustic cooperative networks suffer significant performance degradation as they fail to adapt to incomplete information, noisy interference and overwhelming dynamics. To address this challenge, a hierarchical adversarial multi-armed bandit learning… read more here.

Keywords: hierarchical adversarial; bandit learning; relay; relay selection ... See more keywords