-
1
-
-
84966203785
-
Some aspects of the sequential design of experiments
-
Robbins H., "Some aspects of the sequential design of experiments," Bulletin of the American Mathematical Society, vol. 58, pp. 527-535, 1952.
-
(1952)
Bulletin of the American Mathematical Society
, vol.58
, pp. 527-535
-
-
Robbins, H.1
-
2
-
-
0002899547
-
Asymptotically efficient adaptive allocation rules
-
T L Lai and H. Robbins, "Asymptotically efficient adaptive allocation rules," Advances in Applied Mathematics, vol. 6, no. 1, pp. 4-22, 1985.
-
(1985)
Advances in Applied Mathematics
, vol.6
, Issue.1
, pp. 4-22
-
-
Lai, T.L.1
Robbins, H.2
-
3
-
-
0036568025
-
Finite-time analysis of the multiarmed bandit problem
-
Peter Auer, Nicolò Cesa-Bianchi, and Paul Fischer, "Finite-time analysis of the multiarmed bandit problem," Mach. Learn., vol. 47, no. 2-3, pp. 235-256, 2002.
-
(2002)
Mach. Learn.
, vol.47
, Issue.2-3
, pp. 235-256
-
-
Auer, P.1
Nicolò, C.-B.2
Fischer, P.3
-
4
-
-
0036041531
-
Characterizing user behavior and network performance in a public wireless LAN
-
Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl, and P. Venkat Rangan, "Characterizing user behavior and network performance in a public wireless LAN," SIGMETRICS Perform. Eval. Rev., vol. 30, no. 1, pp. 195-205, 2002.
-
(2002)
SIGMETRICS Perform. Eval. Rev.
, vol.30
, Issue.1
, pp. 195-205
-
-
Balachandran, A.1
Voelker, G.M.2
Bahl, P.3
Rangan, P.V.4
-
5
-
-
11244321489
-
The changing usage of a mature campus-wide wireless network
-
Tristan Henderson, David Kotz, and Ilya Abyzov, "The changing usage of a mature campus-wide wireless network," in Mobicom, 2004, pp. 187-201.
-
(2004)
Mobicom
, pp. 187-201
-
-
Henderson, T.1
Kotz, D.2
Abyzov, I.3
-
6
-
-
11244319474
-
A framework for wireless LAN monitoring and its applications WiSe'04
-
Jihwang Yeo, Moustafa Youssef, and Ashok Agrawala, "A framework for wireless LAN monitoring and its applications," in WiSe "04: Proceedings of the 3rd ACM workshop on Wireless security, 2004, pp. 70-79.
-
(2004)
Proceedings of the 3rd ACM Workshop on Wireless Security
, pp. 70-79
-
-
Yeo, J.1
Youssef, M.2
Agrawala, A.3
-
7
-
-
29244439923
-
Measurement-based characterization of 802.11 in a hotspot setting
-
Maya Rodrig, Charles Reis, Ratul Mahajan, David Wetherall, and John Zahorjan, "Measurement-based characterization of 802.11 in a hotspot setting," in Proceedings of the 2005 ACM SIGCOMM workshop on Experimental approaches to wireless network design and analysis, 2005, pp. 5-10.
-
(2005)
Proceedings of the 2005 ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis
, pp. 5-10
-
-
Rodrig, M.1
Reis, C.2
Mahajan, R.3
Wetherall, D.4
Zahorjan, J.5
-
8
-
-
43949099400
-
Jigsaw: Solving the puzzle of enterprise 802.11 analysis
-
Yu-Chung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage, "Jigsaw: solving the puzzle of enterprise 802.11 analysis," in SIGCOMM, 2006.
-
(2006)
SIGCOMM
-
-
Cheng, Y.-C.1
Bellardo, J.2
Benkö, P.3
Snoeren, A.C.4
Voelker, G.M.5
Savage, S.6
-
9
-
-
77954025061
-
Optimal monitoring in multichannel multi-radio wireless mesh networks
-
Dong-Hoon Shin and Saurabh Bagchi, "Optimal monitoring in multichannel multi-radio wireless mesh networks," in MobiHoc, 2009, pp. 229-238.
-
(2009)
MobiHoc
, pp. 229-238
-
-
Shin, D.-H.1
Bagchi, S.2
-
10
-
-
35048858805
-
Maximum coverage problem with group budget constraints and applications
-
Chandra Chekuri and Amit Kumar, "Maximum coverage problem with group budget constraints and applications," in APPROX, 2004, pp. 72-83.
-
(2004)
APPROX
, pp. 72-83
-
-
Chekuri, C.1
Kumar, A.2
-
11
-
-
78649278542
-
On quality of monitoring for multi-channel wireless infrastructure networks
-
Arun Chhetri, Huy Nguyen, Gabriel Scalosub, and Rong Zheng, "On quality of monitoring for multi-channel wireless infrastructure networks," in The ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2010.
-
(2010)
The ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
-
-
Chhetri, A.1
Nguyen, H.2
Scalosub, G.3
Zheng, R.4
-
12
-
-
0000616723
-
Sample mean based index policies with o(log n) regret for the multi-armed bandit problem
-
Rajeev Agrawal, "Sample mean based index policies with o(log n) regret for the multi-armed bandit problem," Advances in Applied Probability, 1995.
-
(1995)
Advances in Applied Probability
-
-
Agrawal, R.1
-
13
-
-
77953111834
-
Linearly parameterized bandits
-
Paat Rusmevichientong and John N. Tsitsiklis, "Linearly parameterized bandits," Math. Oper. Res., vol. 35, no. 2, pp. 395-411, 2010.
-
(2010)
Math. Oper. Res.
, vol.35
, Issue.2
, pp. 395-411
-
-
Rusmevichientong, P.1
Tsitsiklis, J.N.2
-
14
-
-
84898072179
-
Stochastic linear optimization under bandit feedback
-
V Dani, TP Hayes, and SM Kakade, "Stochastic linear optimization under bandit feedback," in COLT-2008, 2008, pp. 355-366.
-
(2008)
COLT-2008
, pp. 355-366
-
-
Dani, V.1
Hayes, T.P.2
Kakade, S.M.3
-
15
-
-
33748442333
-
Regret minimization under partial monitoring
-
N. Cesa-Bianchi, G. Lugosi, and G. Stoltz, "Regret minimization under partial monitoring," Mathematics of Operations Research, vol. 31, pp. 562-580, 2006.
-
(2006)
Mathematics of Operations Research
, vol.31
, pp. 562-580
-
-
Cesa-Bianchi, N.1
Lugosi, G.2
Stoltz, G.3
-
16
-
-
57849152837
-
-
CoRR, vol. abs/0710.1385
-
Lifeng Lai, Hesham El Gamal, Hai Jiang, and H. Vincent Poor, "Cognitive medium access: Exploration, exploitation and competition," CoRR, vol. abs/0710.1385, 2007.
-
(2007)
Cognitive Medium Access: Exploration, Exploitation and Competition
-
-
Lai, L.1
El Gamal, H.2
Jiang, H.3
Poor, H.V.4
-
17
-
-
70349656809
-
Medium access in cognitive radio networks: A competitive multi-armed bandit framework
-
Lifeng Lai, Hai Jiang, and H.V. Poor, "Medium access in cognitive radio networks: A competitive multi-armed bandit framework," in Signals, Systems and Computers, 2008 42nd Asilomar Conference on, 26-29 2008, pp. 98-102.
-
(2008)
Signals, Systems and Computers, 2008 42nd Asilomar Conference On, 26-29
, pp. 98-102
-
-
Lai, L.1
Jiang, H.2
Poor, H.V.3
-
19
-
-
77953320021
-
Opportunistic spectrum access with multiple users: Learning under competition
-
San Deigo, USA, Mar.
-
A. Anandkumar, N. Michael, and A.K. Tang, "Opportunistic Spectrum Access with Multiple Users: Learning under Competition," in Proc. of IEEE INFOCOM, San Deigo, USA, Mar. 2010.
-
(2010)
Proc. of IEEE INFOCOM
-
-
Anandkumar, A.1
Michael, N.2
Tang, A.K.3
-
20
-
-
77953180719
-
Learning multiuser channel allocations in cognitive radio networks: A combinatorial multi-armed bandit formulation
-
Yi Gai, B. Krishnamachari, and R. Jain, "Learning multiuser channel allocations in cognitive radio networks: A combinatorial multi-armed bandit formulation," in New Frontiers in Dynamic Spectrum, 2010 IEEE Symposium on, 6-9 2010, pp. 1-9.
-
(2010)
New Frontiers in Dynamic Spectrum, 2010 IEEE Symposium On, 6-9
, pp. 1-9
-
-
Yi, G.1
Krishnamachari, B.2
Jain, R.3
-
21
-
-
84978422134
-
Fine-grained network time synchronization using reference broadcasts
-
Jeremy Elson, Lewis Girod, and Deborah Estrin, "Fine-grained network time synchronization using reference broadcasts," SIGOPS Oper. Syst. Rev., vol. 36, no. SI, pp. 147-163, 2002.
-
(2002)
SIGOPS Oper. Syst. Rev.
, vol.36
, Issue.SI
, pp. 147-163
-
-
Elson, J.1
Girod, L.2
Estrin, D.3
-
22
-
-
0023453059
-
Asymptotically efficient allocation rules for the multiarmed bandit problem with multiple playspart i: I.i.d. rewards
-
nov
-
V. Anantharam, P. Varaiya, and J. Walrand, "Asymptotically efficient allocation rules for the multiarmed bandit problem with multiple playspart i: I.i.d. rewards," Automatic Control, IEEE Transactions on, vol. 32, no. 11, pp. 968-976, nov 1987.
-
(1987)
Automatic Control, IEEE Transactions on
, vol.32
, Issue.11
, pp. 968-976
-
-
Anantharam, V.1
Varaiya, P.2
Walrand, J.3
-
23
-
-
38149013086
-
Tuning bandit algorithms in stochastic environments
-
Springer
-
J-Y Audibert, R. Munos, and Cs. Szepesvári, "Tuning bandit algorithms in stochastic environments," in Algorithmic Learning Theory - 18th International Conference, ALT 2007. 2007, pp. 150-165, Springer.
-
(2007)
Algorithmic Learning Theory - 18th International Conference, ALT 2007.
, pp. 150-165
-
-
Audibert, J.-Y.1
Munos, R.2
Szepesvári, Cs.3
-
24
-
-
62949181077
-
Exploration-exploitation tradeoff using variance estimates in multi-armed bandits
-
J.-Y. Audibert, R. Munos, and Cs. Szepesvári, "Exploration- exploitation tradeoff using variance estimates in multi-armed bandits," Theoretical Computer Science, vol. 410, no. 19, pp. 1876-1902, 2009.
-
(2009)
Theoretical Computer Science
, vol.410
, Issue.19
, pp. 1876-1902
-
-
Audibert, J.-Y.1
Munos, R.2
Szepesvári, Cs.3
-
26
-
-
70049104217
-
On upper-confidence bound policies for non-stationary bandit problems
-
Dec
-
A Garivier and E Moulines, "On upper-confidence bound policies for non-stationary bandit problems," Tech. Rep., LTCI, Dec 2008.
-
(2008)
Tech. Rep., LTCI
-
-
Garivier, A.1
Moulines, E.2
-
27
-
-
84898061746
-
Combinatorial bandits
-
S. Dasgupta and A. Klivans, Eds.
-
N. Cesa-Bianchi and G. Lugosi, "Combinatorial bandits," in COLT 2009, S. Dasgupta and A. Klivans, Eds., 2009.
-
(2009)
COLT 2009
-
-
Cesa-Bianchi, N.1
Lugosi, G.2
-
28
-
-
0024089489
-
Asymptotically efficient adaptive allocation rules for the multiarmed bandit problem with switching cost
-
R. Agrawal, M.V. Hedge, and D. Teneketzis, "Asymptotically efficient adaptive allocation rules for the multiarmed bandit problem with switching cost," IEEE Transactions on Automatic Control, vol. 33, no. 10, pp. 899-906, 1988.
-
(1988)
IEEE Transactions on Automatic Control
, vol.33
, Issue.10
, pp. 899-906
-
-
Agrawal, R.1
Hedge, M.V.2
Teneketzis, D.3
|