-
1
-
-
0029513526
-
Gambling in a rigged casino: The adversarial multi-armed bandit problem
-
P. Auer, N. Cesa-Bianchi, Y. Freund and R. E. Schapire, "Gambling in a rigged casino: The adversarial multi-armed bandit problem," in Proc. of the 36rd IEEE Annual Symposium on Foundations of Computer Science (FOCS), 1995.
-
Proc. of the 36rd IEEE Annual Symposium on Foundations of Computer Science (FOCS), 1995
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.E.4
-
2
-
-
0037709910
-
The non-stochastic multi-armed bandit problem
-
Jan.
-
P. Auer, N. Cesa-Bianchi, Y. Freund and R. E. Schapire, "The non-stochastic multi-armed bandit problem," SIAM Journal on COmputing, vol.32, pp.48-77, Jan. 2001.
-
(2001)
SIAM Journal on COmputing
, vol.32
, pp. 48-77
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.E.4
-
3
-
-
3242800461
-
Collaboration of untrusting peers with changing interests
-
B. Awerbuch, B. P. Shamir, D. Peleg and M. Tuttle, "Collaboration of untrusting peers with changing interests," in Proc. of ACM Conference on Electronic Commerce (EC), 2004.
-
Proc. of ACM Conference on Electronic Commerce (EC), 2004
-
-
Awerbuch, B.1
Shamir, B.P.2
Peleg, D.3
Tuttle, M.4
-
4
-
-
32144449055
-
Collaboration with strangers to find own perferences
-
B. Awerbuch, Y. Azar, and Z. Lotker, B. P. Shamir and M. Tuttle, "Collaboration with strangers to find own perferences," in Proc. of ACM Symposium on Parallelism in Algorithms and Architectures, 2005.
-
Proc. of ACM Symposium on Parallelism in Algorithms and Architectures, 2005
-
-
Awerbuch, B.1
Azar, Y.2
Lotker, Z.3
Shamir, B.P.4
Tuttle, M.5
-
5
-
-
55549106448
-
Competitive collaborative learning
-
Dec.
-
B. Awerbuch and R. Kleinberg, "Competitive collaborative learning," Journal of Computer and System Sciences, vol.74, no.8, pp.1271-1288, Dec. 2008.
-
(2008)
Journal of Computer and System Sciences
, vol.74
, Issue.8
, pp. 1271-1288
-
-
Awerbuch, B.1
Kleinberg, R.2
-
6
-
-
0034826231
-
Spectral analysis of data
-
Y. Azar, A. Fiat, A. Karlin, F. McSherry and J. Saia, "Spectral analysis of data," in Proc. of the 33rd ACM Symposium on Theory of Computing (STOC), 2001
-
Proc. of the 33rd ACM Symposium on Theory of Computing (STOC), 2001
-
-
Azar, Y.1
Fiat, A.2
Karlin, A.3
McSherry, F.4
Saia, J.5
-
8
-
-
77951523456
-
Exact matrix completion via convex optimization
-
to appear in
-
E. J. Candés and B. Recht, "Exact matrix completion via convex optimization," to appear in Found. of Comput. Math., 2008.
-
(2008)
Found. of Comput. Math.
-
-
Candés, E.J.1
Recht, B.2
-
10
-
-
34548591004
-
Applications of machine learning to cognitive radio networks
-
Aug.
-
C. Clancy, J. Hecker, E. Stuntebeck and T. O'Shea, "Applications of machine learning to cognitive radio networks," IEEE Wireless Communications, vol.14, no.4, pp.47-52, Aug. 2007.
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.4
, pp. 47-52
-
-
Clancy, C.1
Hecker, J.2
Stuntebeck, E.3
O'Shea, T.4
-
12
-
-
34547750388
-
Cooperative spectrum sensing in cognitive radio - Part I: Two user networks
-
June
-
G. Ganesan and Y. Li, "Cooperative spectrum sensing in cognitive radio - Part I: Two user networks," IEEE Trans. Wireless Commun., Vol.6, pp.2204-2213, June 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, pp. 2204-2213
-
-
Ganesan, G.1
Li, Y.2
-
15
-
-
84976668719
-
Using collaborative filtering to weave an information tapestry
-
Dec.
-
D. Goldberg, D. Nichols, B. M. Oki and D. Terry, "Using collaborative filtering to weave an information tapestry," Communications of the ACM, vol.35, no.12, pp.61-70, Dec. 1992.
-
(1992)
Communications of the ACM
, vol.35
, Issue.12
, pp. 61-70
-
-
Goldberg, D.1
Nichols, D.2
Oki, B.M.3
Terry, D.4
-
17
-
-
0002899547
-
Asymptotic efficient adaptive allocation rules
-
T. L. Lai and H. Robbin, "Asymptotic efficient adaptive allocation rules," Advances in Applied Mathematics, vol.6, pp.4-22, 1985.
-
(1985)
Advances in Applied Mathematics
, vol.6
, pp. 4-22
-
-
Lai, T.L.1
Robbin, H.2
-
18
-
-
70349656809
-
Medium access in cognitive radio networks: A competitive multi-armed bandit framework
-
L. Lai, H. Jiang and H. V. Poor, "Medium access in cognitive radio networks: A competitive multi-armed bandit framework," in Proc. of Asilomar Conference on Signals, Systems and Computers, 2008.
-
Proc. of Asilomar Conference on Signals, Systems and Computers, 2008
-
-
Lai, L.1
Jiang, H.2
Poor, H.V.3
-
22
-
-
65249087826
-
Spectrum access games and strategic learning in cognitive radio networks for delay-critical applications
-
April
-
M. Schaar and F. Fu, "Spectrum access games and strategic learning in cognitive radio networks for delay-critical applications," Proceedings of The IEEE, vol.97, no.2, pp. 720-740, April 2009.
-
(2009)
Proceedings of the IEEE
, vol.97
, Issue.2
, pp. 720-740
-
-
Schaar, M.1
Fu, F.2
-
23
-
-
62149141554
-
MobHinter: Epidemic collaborative filtering and self-organization in mobile ad-hoc networks
-
R. Schifanella, A. Panisson, C. Gena and G. Ruffo, "MobHinter: Epidemic collaborative filtering and self-organization in mobile ad-hoc networks," in Proc. of ACM Conference Recommender Systems (RecSys), 2008.
-
Proc. of ACM Conference Recommender Systems (RecSys), 2008
-
-
Schifanella, R.1
Panisson, A.2
Gena, C.3
Ruffo, G.4
-
24
-
-
70449488903
-
Spatial statistics of spectrum usage: From measurements to spectrum models
-
M. Wellens, J. Riihijärvi, M. Gordziel and P. Mähönen, "Spatial statistics of spectrum usage: From measurements to spectrum models," in Proc. of IEEE International Conference on Communications (ICC), 2009.
-
Proc. of IEEE International Conference on Communications (ICC), 2009
-
-
Wellens, M.1
Riihijärvi, J.2
Gordziel, M.3
Mähönen, P.4
-
25
-
-
34548580972
-
A decision-theoretic framework for opportunistic spectrum access
-
Aug.
-
Q. Zhao and A. Swami, "A decision-theoretic framework for opportunistic spectrum access," IEEE Wireless Communications Magazine, vol. 14, pp. 14-20, Aug. 2007.
-
(2007)
IEEE Wireless Communications Magazine
, vol.14
, pp. 14-20
-
-
Zhao, Q.1
Swami, A.2
|