메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1152-1160

Sequential learning for optimal monitoring of multi-channel wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL ASSIGNMENT; EFFICIENT LEARNING; MULTI ARMED BANDIT; MULTI-CHANNEL; NOVEL TECHNIQUES; NUMBER OF ARMS; SEQUENTIAL LEARNING; TIME SLOTS;

EID: 79960873049     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2011.5934892     Document Type: Conference Paper
Times cited : (46)

References (28)
  • 1
    • 84966203785 scopus 로고
    • Some aspects of the sequential design of experiments
    • Robbins H., "Some aspects of the sequential design of experiments," Bulletin of the American Mathematical Society, vol. 58, pp. 527-535, 1952.
    • (1952) Bulletin of the American Mathematical Society , vol.58 , pp. 527-535
    • Robbins, H.1
  • 2
    • 0002899547 scopus 로고
    • Asymptotically efficient adaptive allocation rules
    • T L Lai and H. Robbins, "Asymptotically efficient adaptive allocation rules," Advances in Applied Mathematics, vol. 6, no. 1, pp. 4-22, 1985.
    • (1985) Advances in Applied Mathematics , vol.6 , Issue.1 , pp. 4-22
    • Lai, T.L.1    Robbins, H.2
  • 3
    • 0036568025 scopus 로고    scopus 로고
    • Finite-time analysis of the multiarmed bandit problem
    • Peter Auer, Nicolò Cesa-Bianchi, and Paul Fischer, "Finite-time analysis of the multiarmed bandit problem," Mach. Learn., vol. 47, no. 2-3, pp. 235-256, 2002.
    • (2002) Mach. Learn. , vol.47 , Issue.2-3 , pp. 235-256
    • Auer, P.1    Nicolò, C.-B.2    Fischer, P.3
  • 4
    • 0036041531 scopus 로고    scopus 로고
    • Characterizing user behavior and network performance in a public wireless LAN
    • Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl, and P. Venkat Rangan, "Characterizing user behavior and network performance in a public wireless LAN," SIGMETRICS Perform. Eval. Rev., vol. 30, no. 1, pp. 195-205, 2002.
    • (2002) SIGMETRICS Perform. Eval. Rev. , vol.30 , Issue.1 , pp. 195-205
    • Balachandran, A.1    Voelker, G.M.2    Bahl, P.3    Rangan, P.V.4
  • 5
    • 11244321489 scopus 로고    scopus 로고
    • The changing usage of a mature campus-wide wireless network
    • Tristan Henderson, David Kotz, and Ilya Abyzov, "The changing usage of a mature campus-wide wireless network," in Mobicom, 2004, pp. 187-201.
    • (2004) Mobicom , pp. 187-201
    • Henderson, T.1    Kotz, D.2    Abyzov, I.3
  • 9
    • 77954025061 scopus 로고    scopus 로고
    • Optimal monitoring in multichannel multi-radio wireless mesh networks
    • Dong-Hoon Shin and Saurabh Bagchi, "Optimal monitoring in multichannel multi-radio wireless mesh networks," in MobiHoc, 2009, pp. 229-238.
    • (2009) MobiHoc , pp. 229-238
    • Shin, D.-H.1    Bagchi, S.2
  • 10
    • 35048858805 scopus 로고    scopus 로고
    • Maximum coverage problem with group budget constraints and applications
    • Chandra Chekuri and Amit Kumar, "Maximum coverage problem with group budget constraints and applications," in APPROX, 2004, pp. 72-83.
    • (2004) APPROX , pp. 72-83
    • Chekuri, C.1    Kumar, A.2
  • 12
    • 0000616723 scopus 로고
    • Sample mean based index policies with o(log n) regret for the multi-armed bandit problem
    • Rajeev Agrawal, "Sample mean based index policies with o(log n) regret for the multi-armed bandit problem," Advances in Applied Probability, 1995.
    • (1995) Advances in Applied Probability
    • Agrawal, R.1
  • 13
    • 77953111834 scopus 로고    scopus 로고
    • Linearly parameterized bandits
    • Paat Rusmevichientong and John N. Tsitsiklis, "Linearly parameterized bandits," Math. Oper. Res., vol. 35, no. 2, pp. 395-411, 2010.
    • (2010) Math. Oper. Res. , vol.35 , Issue.2 , pp. 395-411
    • Rusmevichientong, P.1    Tsitsiklis, J.N.2
  • 14
    • 84898072179 scopus 로고    scopus 로고
    • Stochastic linear optimization under bandit feedback
    • V Dani, TP Hayes, and SM Kakade, "Stochastic linear optimization under bandit feedback," in COLT-2008, 2008, pp. 355-366.
    • (2008) COLT-2008 , pp. 355-366
    • Dani, V.1    Hayes, T.P.2    Kakade, S.M.3
  • 19
    • 77953320021 scopus 로고    scopus 로고
    • Opportunistic spectrum access with multiple users: Learning under competition
    • San Deigo, USA, Mar.
    • A. Anandkumar, N. Michael, and A.K. Tang, "Opportunistic Spectrum Access with Multiple Users: Learning under Competition," in Proc. of IEEE INFOCOM, San Deigo, USA, Mar. 2010.
    • (2010) Proc. of IEEE INFOCOM
    • Anandkumar, A.1    Michael, N.2    Tang, A.K.3
  • 20
    • 77953180719 scopus 로고    scopus 로고
    • Learning multiuser channel allocations in cognitive radio networks: A combinatorial multi-armed bandit formulation
    • Yi Gai, B. Krishnamachari, and R. Jain, "Learning multiuser channel allocations in cognitive radio networks: A combinatorial multi-armed bandit formulation," in New Frontiers in Dynamic Spectrum, 2010 IEEE Symposium on, 6-9 2010, pp. 1-9.
    • (2010) New Frontiers in Dynamic Spectrum, 2010 IEEE Symposium On, 6-9 , pp. 1-9
    • Yi, G.1    Krishnamachari, B.2    Jain, R.3
  • 21
    • 84978422134 scopus 로고    scopus 로고
    • Fine-grained network time synchronization using reference broadcasts
    • Jeremy Elson, Lewis Girod, and Deborah Estrin, "Fine-grained network time synchronization using reference broadcasts," SIGOPS Oper. Syst. Rev., vol. 36, no. SI, pp. 147-163, 2002.
    • (2002) SIGOPS Oper. Syst. Rev. , vol.36 , Issue.SI , pp. 147-163
    • Elson, J.1    Girod, L.2    Estrin, D.3
  • 22
    • 0023453059 scopus 로고
    • Asymptotically efficient allocation rules for the multiarmed bandit problem with multiple playspart i: I.i.d. rewards
    • nov
    • V. Anantharam, P. Varaiya, and J. Walrand, "Asymptotically efficient allocation rules for the multiarmed bandit problem with multiple playspart i: I.i.d. rewards," Automatic Control, IEEE Transactions on, vol. 32, no. 11, pp. 968-976, nov 1987.
    • (1987) Automatic Control, IEEE Transactions on , vol.32 , Issue.11 , pp. 968-976
    • Anantharam, V.1    Varaiya, P.2    Walrand, J.3
  • 24
    • 62949181077 scopus 로고    scopus 로고
    • Exploration-exploitation tradeoff using variance estimates in multi-armed bandits
    • J.-Y. Audibert, R. Munos, and Cs. Szepesvári, "Exploration- exploitation tradeoff using variance estimates in multi-armed bandits," Theoretical Computer Science, vol. 410, no. 19, pp. 1876-1902, 2009.
    • (2009) Theoretical Computer Science , vol.410 , Issue.19 , pp. 1876-1902
    • Audibert, J.-Y.1    Munos, R.2    Szepesvári, Cs.3
  • 26
    • 70049104217 scopus 로고    scopus 로고
    • On upper-confidence bound policies for non-stationary bandit problems
    • Dec
    • A Garivier and E Moulines, "On upper-confidence bound policies for non-stationary bandit problems," Tech. Rep., LTCI, Dec 2008.
    • (2008) Tech. Rep., LTCI
    • Garivier, A.1    Moulines, E.2
  • 27
    • 84898061746 scopus 로고    scopus 로고
    • Combinatorial bandits
    • S. Dasgupta and A. Klivans, Eds.
    • N. Cesa-Bianchi and G. Lugosi, "Combinatorial bandits," in COLT 2009, S. Dasgupta and A. Klivans, Eds., 2009.
    • (2009) COLT 2009
    • Cesa-Bianchi, N.1    Lugosi, G.2
  • 28
    • 0024089489 scopus 로고
    • Asymptotically efficient adaptive allocation rules for the multiarmed bandit problem with switching cost
    • R. Agrawal, M.V. Hedge, and D. Teneketzis, "Asymptotically efficient adaptive allocation rules for the multiarmed bandit problem with switching cost," IEEE Transactions on Automatic Control, vol. 33, no. 10, pp. 899-906, 1988.
    • (1988) IEEE Transactions on Automatic Control , vol.33 , Issue.10 , pp. 899-906
    • Agrawal, R.1    Hedge, M.V.2    Teneketzis, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.