Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Decentralized Task Offloading in Edge Computing: A Multi-User Multi-Armed Bandit Approach
Wang, Xiong, Ye, Jiancheng, Lui, John C.S.
Published in Annual Joint Conference of the IEEE Computer and Communications Societies (02.05.2022)
Published in Annual Joint Conference of the IEEE Computer and Communications Societies (02.05.2022)
Get full text
Conference Proceeding
An optimal bidimensional multi-armed bandit auction for multi-unit procurement
Bhat, Satyanath, Jain, Shweta, Gujar, Sujit, Narahari, Y.
Published in Annals of mathematics and artificial intelligence (01.01.2019)
Published in Annals of mathematics and artificial intelligence (01.01.2019)
Get full text
Journal Article
Interactive Restless Multi-armed Bandit Game and Swarm Intelligence Effect
Yoshida, Shunsuke, Hisakado, Masato, Mori, Shintaro
Published in New generation computing (01.08.2016)
Published in New generation computing (01.08.2016)
Get full text
Journal Article
Multi-armed Bandit Model Based on Time-variant Budgets
Lin, Bao-ling, Jia, Ri-heng, Lin, Fei-long, Zheng, Zhong-long, Li, Ming-lu
Published in Ji suan ji ke xue (01.01.2022)
Get full text
Published in Ji suan ji ke xue (01.01.2022)
Journal Article
Multi-class boosting for the analysis of multiple incomplete views on microbiome data
Simeon, Andrea, Radovanović, Miloš, Lončar-Turukalo, Tatjana, Ceci, Michelangelo, Brdar, Sanja, Pio, Gianvito
Published in BMC bioinformatics (14.05.2024)
Published in BMC bioinformatics (14.05.2024)
Get full text
Journal Article
Functional Sequential Treatment Allocation
Kock, Anders Bredahl, Preinerstorfer, David, Veliyev, Bezirgen
Published in Journal of the American Statistical Association (14.09.2022)
Published in Journal of the American Statistical Association (14.09.2022)
Get full text
Journal Article
Learning to Detect an Odd Markov Arm
Karthik, P. N., Sundaresan, Rajesh
Published in IEEE transactions on information theory (01.07.2020)
Published in IEEE transactions on information theory (01.07.2020)
Get full text
Journal Article
Greedy algorithms for stochastic monotone k-submodular maximization under full-bandit feedback
Sun, Xin, Guo, Tiande, Han, Congying, Zhang, Hongyang
Published in Journal of combinatorial optimization (01.01.2025)
Published in Journal of combinatorial optimization (01.01.2025)
Get full text
Journal Article
Computation offloading based on incomplete information in edge computing networks
Zheng, Xiao, Tahir, Muhammad, Frnda, Jaroslav, Anwar, Muhammad Shahid, Choi, Ahyoung, Kumar, Rajesh
Published in Cluster computing (01.11.2025)
Published in Cluster computing (01.11.2025)
Get full text
Journal Article
Modeling implicit feedback based on bandit learning for recommendation
Yan, Cairong, Xian, Junli, Wan, Yongquan, Wang, Pengwei
Published in Neurocomputing (Amsterdam) (04.08.2021)
Published in Neurocomputing (Amsterdam) (04.08.2021)
Get full text
Journal Article
A central limit theorem, loss aversion and multi-armed bandits
Chen, Zengjing, Epstein, Larry G., Zhang, Guodong
Published in Journal of economic theory (01.04.2023)
Published in Journal of economic theory (01.04.2023)
Get full text
Journal Article
Grand challenges for ambient intelligence and implications for design contexts and smart societies
Published in Journal of ambient intelligence and smart environments
(01.01.2019)
Get full text
Journal Article
Best Arm Identification in Restless Markov Multi-Armed Bandits
Karthik, P. N., Reddy, Kota Srinivas, Tan, Vincent Y. F.
Published in IEEE transactions on information theory (01.05.2023)
Published in IEEE transactions on information theory (01.05.2023)
Get full text
Journal Article
Treatment recommendation with distributional targets
Kock, Anders Bredahl, Preinerstorfer, David, Veliyev, Bezirgen
Published in Journal of econometrics (01.06.2023)
Published in Journal of econometrics (01.06.2023)
Get full text
Journal Article
Asymptotically Optimal Lagrangian Priority Policy for Deadline Scheduling With Processing Rate Limits
Hao, Liangliang, Xu, Yunjian, Tong, Lang
Published in IEEE transactions on automatic control (01.01.2022)
Published in IEEE transactions on automatic control (01.01.2022)
Get full text
Journal Article
An online algorithm for the risk-aware restless bandit
Xu, Jianyu, Chen, Lujie, Tang, Ou
Published in European journal of operational research (16.04.2021)
Published in European journal of operational research (16.04.2021)
Get full text
Journal Article