메뉴 건너뛰기




Volumn 23, Issue 3, 2016, Pages 64-73

Multi-armed bandits with application to 5G small cells

Author keywords

[No Author keywords available]

Indexed keywords

ENERGY EFFICIENCY; MOBILE TELECOMMUNICATION SYSTEMS; WIRELESS NETWORKS;

EID: 84977071217     PISSN: 15361284     EISSN: None     Source Type: Journal    
DOI: 10.1109/MWC.2016.7498076     Document Type: Article
Times cited : (135)

References (19)
  • 1
    • 84966203785 scopus 로고
    • Some aspects of the sequential design of experiments
    • H. Robbins, "Some Aspects of the Sequential Design of Experiments," Bulletin of the American Mathematical Society, vol. 58, no. 5, 1952, pp. 527-35.
    • (1952) Bulletin of the American Mathematical Society , vol.58 , Issue.5 , pp. 527-535
    • Robbins, H.1
  • 2
    • 84873932839 scopus 로고    scopus 로고
    • Learning in a changing world: Restless multiarmed bandit with unknown dynamics
    • Mar.
    • H. Liu, K. Liu, and Q. Zhao, "Learning in a Changing World: Restless Multiarmed Bandit with Unknown Dynamics," IEEE Trans. Info. Theory, vol. 59, no. 3, Mar. 2013., pp. 1902-16
    • (2013) IEEE Trans. Info. Theory , vol.59 , Issue.3 , pp. 1902-1916
    • Liu, H.1    Liu, K.2    Zhao, Q.3
  • 4
    • 78650720102 scopus 로고    scopus 로고
    • Approximation algorithms for restless bandit problems
    • S. Guha, K. Munagala, and P. Shi, "Approximation Algorithms for Restless Bandit Problems," J. ACM, vol. 58, no. 1, 2010, pp. 3.
    • (2010) J. ACM , vol.58 , Issue.1 , pp. 3
    • Guha, S.1    Munagala, K.2    Shi, P.3
  • 5
    • 0343441515 scopus 로고    scopus 로고
    • Restless bandits, linear programming relaxations, and a primal-dual index heuristic
    • D. Bertsimas and J. Nino-Mora, "Restless Bandits, Linear Programming Relaxations, and a Primal-Dual Index Heuristic," Operations Research, vol. 48, no. 1, 2000, p. 2000.
    • (2000) Operations Research , vol.48 , Issue.1 , pp. 2000
    • Bertsimas, D.1    Nino-Mora, J.2
  • 6
    • 84874045238 scopus 로고    scopus 로고
    • Regret analysis of stochastic and nonstochastic multi-armed bandit problems
    • S. Bubeck and N. Cesa-Bianchi, "Regret Analysis of Stochastic and Nonstochastic Multi-Armed Bandit Problems," Foundations and Trends in Machine Learning, vol. 5, no. 1, 2012, pp. 1-122.
    • (2012) Foundations and Trends in Machine Learning , vol.5 , Issue.1 , pp. 1-122
    • Bubeck, S.1    Cesa-Bianchi, N.2
  • 10
    • 84940981845 scopus 로고    scopus 로고
    • Joint channel selection and power control in infrastructureless wireless networks: A multi-player multiarmed bandit framework
    • S. Maghsudi and S. Stanczak, "Joint Channel Selection and Power Control in Infrastructureless Wireless Networks: A Multi-Player Multiarmed Bandit Framework," IEEE Trans. Vehic. Tech., vol. PP, 2014.
    • (2014) IEEE Trans. Vehic. Tech. , vol.PP
    • Maghsudi, S.1    Stanczak, S.2
  • 11
    • 84924874250 scopus 로고    scopus 로고
    • Channel selection for network-assisted D2D communication via no-regret bandit learning with calibrated forecasting
    • Mar.
    • S. Maghsudi and S. Stanczak, "Channel Selection for Network-Assisted D2D Communication via No-Regret Bandit Learning with Calibrated Forecasting," IEEE Trans. Wireless Commun., vol. 14, no. 3, Mar. 2015, pp. 1309-22.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.3 , pp. 1309-1322
    • Maghsudi, S.1    Stanczak, S.2
  • 12
    • 84888868630 scopus 로고    scopus 로고
    • Convergent learning algorithms for unknown reward games
    • A.C. Chapman et al., "Convergent Learning Algorithms for Unknown Reward Games," SIAM J. Control and Optimization, vol. 51, no. 4, 2013, pp. 3154-80.
    • (2013) SIAM J. Control and Optimization , vol.51 , Issue.4 , pp. 3154-3180
    • Chapman, A.C.1
  • 13
    • 33947670351 scopus 로고    scopus 로고
    • Transmission scheduling for sensor network lifetime maximization: A shortest path bandit formulation
    • May
    • Y. Chen et al., "Transmission Scheduling for Sensor Network Lifetime Maximization: A Shortest Path Bandit Formulation," Proc. IEEE Int'l. Conf. Acoustics, Speech and Signal Processing, May 2006, vol. 4, pp. IV-IV.
    • (2006) Proc. IEEE Int'l. Conf. Acoustics, Speech and Signal Processing , vol.4 , pp. IV-IV
    • Chen, Y.1
  • 14
    • 84905215819 scopus 로고    scopus 로고
    • Transmission mode selection for network-assisted device to device communication: A levy-bandit approach
    • May
    • S. Maghsudi and S. Stanczak, "Transmission Mode Selection for Network-Assisted Device to Device Communication: A Levy-Bandit Approach," Proc. IEEE Int'l. Conf. Acoustics, Speech and Signal Processing, May 2014, pp. 7009-13.
    • (2014) Proc. IEEE Int'l. Conf. Acoustics, Speech and Signal Processing , pp. 7009-7013
    • Maghsudi, S.1    Stanczak, S.2
  • 15
    • 84925863075 scopus 로고    scopus 로고
    • Multi-access communications with energy harvesting: A multi-armed bandit model and the optimality of the myopic policy
    • March
    • P. Blasco and D. Gunduz, "Multi-Access Communications with Energy Harvesting: A Multi-Armed Bandit Model and the Optimality of the Myopic Policy," IEEE JSAC, vol. 33, no. 3, March 2015, pp. 585-97.
    • (2015) IEEE JSAC , vol.33 , Issue.3 , pp. 585-597
    • Blasco, P.1    Gunduz, D.2
  • 17
    • 84855425212 scopus 로고    scopus 로고
    • Towards optimal adaptive UFH-based anti-jamming wireless communication
    • Jan.
    • Q. Wang et al., "Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication," IEEE JSAC, vol. 30, no. 1, Jan. 2012, pp. 16-30.
    • (2012) IEEE JSAC , vol.30 , Issue.1 , pp. 16-30
    • Wang, Q.1
  • 18
    • 84903758940 scopus 로고    scopus 로고
    • Evolution toward 5G multi-tier cellular wireless networks: An interference management perspective
    • June
    • E. Hossain et al., "Evolution toward 5G Multi-Tier Cellular Wireless Networks: An Interference Management Perspective," IEEE Wireless Commun., vol. 21, no. 3, June 2014, pp. 118-27.
    • (2014) IEEE Wireless Commun. , vol.21 , Issue.3 , pp. 118-127
    • Hossain, E.1
  • 19
    • 78249288447 scopus 로고    scopus 로고
    • Algorithms for adversarial bandit problems with multiple plays
    • Oct.
    • T. Uchiya, A. Nakamura, and M. Kudo, "Algorithms for Adversarial Bandit Problems with Multiple Plays," Algorithmic Learning Theory, Oct 2010, pp. 375-89.
    • (2010) Algorithmic Learning Theory , pp. 375-389
    • Uchiya, T.1    Nakamura, A.2    Kudo, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.