Decision-theoretic distributed channel selection for opportunistic spectrum access: Strategies, challenges and solutions

Y Xu, A Anpalagan, Q Wu, L Shen… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
Opportunistic spectrum access (OSA) has been regarded as the most promising approach to
solve the paradox between spectrum scarcity and waste. Intelligent decision making is key …

[图书][B] Bandit algorithms

T Lattimore, C Szepesvári - 2020 - books.google.com
Decision-making in the face of uncertainty is a significant challenge in machine learning,
and the multi-armed bandit model is a commonly used framework to address it. This …

Multi-armed bandit-based client scheduling for federated learning

W Xia, TQS Quek, K Guo, W Wen… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
By exploiting the computing power and local data of distributed clients, federated learning
(FL) features ubiquitous properties such as reduction of communication overhead and …

Combinatorial multi-armed bandit: General framework and applications

W Chen, Y Wang, Y Yuan - International conference on …, 2013 - proceedings.mlr.press
We define a general framework for a large class of combinatorial multi-armed bandit (CMAB)
problems, where simple arms with unknown istributions form\em super arms. In each round …

Cascading bandits: Learning to rank in the cascade model

B Kveton, C Szepesvari, Z Wen… - … conference on machine …, 2015 - proceedings.mlr.press
A search engine usually outputs a list of K web pages. The user examines this list, from the
first web page to the last, and chooses the first attractive page. This model of user behavior …

Tight regret bounds for stochastic combinatorial semi-bandits

B Kveton, Z Wen, A Ashkan… - Artificial Intelligence …, 2015 - proceedings.mlr.press
A stochastic combinatorial semi-bandit is an online learning problem where at each step a
learning agent chooses a subset of ground items subject to constraints, and then observes …

Combinatorial sleeping bandits with fairness constraints

F Li, J Liu, B Ji - IEEE Transactions on Network Science and …, 2019 - ieeexplore.ieee.org
The multi-armed bandit (MAB) model has been widely adopted for studying many practical
optimization problems (network resource allocation, ad placement, crowdsourcing, etc.) with …

Techniques employed in distributed cognitive radio networks: a survey on routing intelligence

R Priyadarshi, RR Kumar, Z Ying - Multimedia Tools and Applications, 2024 - Springer
In order to meet the growing needs for wireless communication in dynamic and diverse
circumstances, Cognitive Radio Networks (CRNs) have evolved as a transformational …

Combinatorial multi-armed bandit and its extension to probabilistically triggered arms

W Chen, Y Wang, Y Yuan, Q Wang - Journal of Machine Learning …, 2016 - jmlr.org
In the past few years, differential privacy has become a standard concept in the area of
privacy. One of the most important problems in this field is to answer queries while …

Combinatorial bandits revisited

R Combes… - Advances in neural …, 2015 - proceedings.neurips.cc
This paper investigates stochastic and adversarial combinatorial multi-armed bandit
problems. In the stochastic setting under semi-bandit feedback, we derive a problem-specific …