-
1
-
-
84966203785
-
Some aspects of the sequential design of experiments
-
H. Robbins, "Some Aspects of the Sequential Design of Experiments," Bulletin of the American Mathematical Society, vol. 58, no. 5, 1952, pp. 527-35.
-
(1952)
Bulletin of the American Mathematical Society
, vol.58
, Issue.5
, pp. 527-535
-
-
Robbins, H.1
-
2
-
-
84873932839
-
Learning in a changing world: Restless multiarmed bandit with unknown dynamics
-
Mar.
-
H. Liu, K. Liu, and Q. Zhao, "Learning in a Changing World: Restless Multiarmed Bandit with Unknown Dynamics," IEEE Trans. Info. Theory, vol. 59, no. 3, Mar. 2013., pp. 1902-16
-
(2013)
IEEE Trans. Info. Theory
, vol.59
, Issue.3
, pp. 1902-1916
-
-
Liu, H.1
Liu, K.2
Zhao, Q.3
-
3
-
-
84891584370
-
-
Wiley, 2nd ed
-
J. Gittins, K. Glazebrook, and R. Weber, Multi-Armed Bandit Allocation Indices, Wiley, 2nd ed., 2011.
-
(2011)
Multi-Armed Bandit Allocation Indices
-
-
Gittins, J.1
Glazebrook, K.2
Weber, R.3
-
4
-
-
78650720102
-
Approximation algorithms for restless bandit problems
-
S. Guha, K. Munagala, and P. Shi, "Approximation Algorithms for Restless Bandit Problems," J. ACM, vol. 58, no. 1, 2010, pp. 3.
-
(2010)
J. ACM
, vol.58
, Issue.1
, pp. 3
-
-
Guha, S.1
Munagala, K.2
Shi, P.3
-
5
-
-
0343441515
-
Restless bandits, linear programming relaxations, and a primal-dual index heuristic
-
D. Bertsimas and J. Nino-Mora, "Restless Bandits, Linear Programming Relaxations, and a Primal-Dual Index Heuristic," Operations Research, vol. 48, no. 1, 2000, p. 2000.
-
(2000)
Operations Research
, vol.48
, Issue.1
, pp. 2000
-
-
Bertsimas, D.1
Nino-Mora, J.2
-
6
-
-
84874045238
-
Regret analysis of stochastic and nonstochastic multi-armed bandit problems
-
S. Bubeck and N. Cesa-Bianchi, "Regret Analysis of Stochastic and Nonstochastic Multi-Armed Bandit Problems," Foundations and Trends in Machine Learning, vol. 5, no. 1, 2012, pp. 1-122.
-
(2012)
Foundations and Trends in Machine Learning
, vol.5
, Issue.1
, pp. 1-122
-
-
Bubeck, S.1
Cesa-Bianchi, N.2
-
8
-
-
84862291603
-
Regret bounds for sleeping experts and bandits
-
R.D. Kleinberg, A. Niculescu-mizil, and Y. Sharma, "Regret Bounds for Sleeping Experts and Bandits," Proc. Conf. Learning Theory, 2008, pp. 425-36.
-
(2008)
Proc. Conf. Learning Theory
, pp. 425-436
-
-
Kleinberg, R.D.1
Niculescu-Mizil, A.2
Sharma, Y.3
-
10
-
-
84940981845
-
Joint channel selection and power control in infrastructureless wireless networks: A multi-player multiarmed bandit framework
-
S. Maghsudi and S. Stanczak, "Joint Channel Selection and Power Control in Infrastructureless Wireless Networks: A Multi-Player Multiarmed Bandit Framework," IEEE Trans. Vehic. Tech., vol. PP, 2014.
-
(2014)
IEEE Trans. Vehic. Tech.
, vol.PP
-
-
Maghsudi, S.1
Stanczak, S.2
-
11
-
-
84924874250
-
Channel selection for network-assisted D2D communication via no-regret bandit learning with calibrated forecasting
-
Mar.
-
S. Maghsudi and S. Stanczak, "Channel Selection for Network-Assisted D2D Communication via No-Regret Bandit Learning with Calibrated Forecasting," IEEE Trans. Wireless Commun., vol. 14, no. 3, Mar. 2015, pp. 1309-22.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.3
, pp. 1309-1322
-
-
Maghsudi, S.1
Stanczak, S.2
-
12
-
-
84888868630
-
Convergent learning algorithms for unknown reward games
-
A.C. Chapman et al., "Convergent Learning Algorithms for Unknown Reward Games," SIAM J. Control and Optimization, vol. 51, no. 4, 2013, pp. 3154-80.
-
(2013)
SIAM J. Control and Optimization
, vol.51
, Issue.4
, pp. 3154-3180
-
-
Chapman, A.C.1
-
13
-
-
33947670351
-
Transmission scheduling for sensor network lifetime maximization: A shortest path bandit formulation
-
May
-
Y. Chen et al., "Transmission Scheduling for Sensor Network Lifetime Maximization: A Shortest Path Bandit Formulation," Proc. IEEE Int'l. Conf. Acoustics, Speech and Signal Processing, May 2006, vol. 4, pp. IV-IV.
-
(2006)
Proc. IEEE Int'l. Conf. Acoustics, Speech and Signal Processing
, vol.4
, pp. IV-IV
-
-
Chen, Y.1
-
14
-
-
84905215819
-
Transmission mode selection for network-assisted device to device communication: A levy-bandit approach
-
May
-
S. Maghsudi and S. Stanczak, "Transmission Mode Selection for Network-Assisted Device to Device Communication: A Levy-Bandit Approach," Proc. IEEE Int'l. Conf. Acoustics, Speech and Signal Processing, May 2014, pp. 7009-13.
-
(2014)
Proc. IEEE Int'l. Conf. Acoustics, Speech and Signal Processing
, pp. 7009-7013
-
-
Maghsudi, S.1
Stanczak, S.2
-
15
-
-
84925863075
-
Multi-access communications with energy harvesting: A multi-armed bandit model and the optimality of the myopic policy
-
March
-
P. Blasco and D. Gunduz, "Multi-Access Communications with Energy Harvesting: A Multi-Armed Bandit Model and the Optimality of the Myopic Policy," IEEE JSAC, vol. 33, no. 3, March 2015, pp. 585-97.
-
(2015)
IEEE JSAC
, vol.33
, Issue.3
, pp. 585-597
-
-
Blasco, P.1
Gunduz, D.2
-
17
-
-
84855425212
-
Towards optimal adaptive UFH-based anti-jamming wireless communication
-
Jan.
-
Q. Wang et al., "Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication," IEEE JSAC, vol. 30, no. 1, Jan. 2012, pp. 16-30.
-
(2012)
IEEE JSAC
, vol.30
, Issue.1
, pp. 16-30
-
-
Wang, Q.1
-
18
-
-
84903758940
-
Evolution toward 5G multi-tier cellular wireless networks: An interference management perspective
-
June
-
E. Hossain et al., "Evolution toward 5G Multi-Tier Cellular Wireless Networks: An Interference Management Perspective," IEEE Wireless Commun., vol. 21, no. 3, June 2014, pp. 118-27.
-
(2014)
IEEE Wireless Commun.
, vol.21
, Issue.3
, pp. 118-127
-
-
Hossain, E.1
-
19
-
-
78249288447
-
Algorithms for adversarial bandit problems with multiple plays
-
Oct.
-
T. Uchiya, A. Nakamura, and M. Kudo, "Algorithms for Adversarial Bandit Problems with Multiple Plays," Algorithmic Learning Theory, Oct 2010, pp. 375-89.
-
(2010)
Algorithmic Learning Theory
, pp. 375-389
-
-
Uchiya, T.1
Nakamura, A.2
Kudo, M.3
|