Academic literature on the topic 'Sleeping Bandits'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sleeping Bandits.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Sleeping Bandits"
Li, Fengjiao, Jia Liu, and Bo Ji. "Combinatorial Sleeping Bandits With Fairness Constraints." IEEE Transactions on Network Science and Engineering 7, no. 3 (July 1, 2020): 1799–813. http://dx.doi.org/10.1109/tnse.2019.2954310.
Full textKleinberg, Robert, Alexandru Niculescu-Mizil, and Yogeshwer Sharma. "Regret bounds for sleeping experts and bandits." Machine Learning 80, no. 2-3 (April 29, 2010): 245–72. http://dx.doi.org/10.1007/s10994-010-5178-7.
Full textChoi, Sanghee, and Hyeong Soo Chang. "Combining Multiple Strategies for Sleeping Bandits with Stochastic Rewards and Availability." Journal of KIISE 44, no. 1 (January 15, 2017): 63–70. http://dx.doi.org/10.5626/jok.2017.44.1.63.
Full textChang, Hyeong Soo. "Sleeping experts and bandits approach to constrained Markov decision processes." Automatica 63 (January 2016): 182–86. http://dx.doi.org/10.1016/j.automatica.2015.10.015.
Full textMohamed, Ehab Mahmoud, Sherief Hashima, Kohei Hatano, Saud Alhajaj Aldossari, Mahdi Zareei, and Mohamed Rihan. "Two-Hop Relay Probing in WiGig Device-to-Device Networks Using Sleeping Contextual Bandits." IEEE Wireless Communications Letters 10, no. 7 (July 2021): 1581–85. http://dx.doi.org/10.1109/lwc.2021.3074972.
Full textAli, Samad, Aidin Ferdowsi, Walid Saad, Nandana Rajatheva, and Jussi Haapola. "Sleeping Multi-Armed Bandit Learning for Fast Uplink Grant Allocation in Machine Type Communications." IEEE Transactions on Communications 68, no. 8 (August 2020): 5072–86. http://dx.doi.org/10.1109/tcomm.2020.2989338.
Full textLi, Le, and Benjamin Guedj. "Sequential Learning of Principal Curves: Summarizing Data Streams on the Fly." Entropy 23, no. 11 (November 18, 2021): 1534. http://dx.doi.org/10.3390/e23111534.
Full textKOMBA, E. K., S. N. KIBONA, A. K. AMBWENE, J. R. STEVENS, and W. C. GIBSON. "Genetic diversity among Trypanosoma brucei rhodesiense isolates from Tanzania." Parasitology 115, no. 6 (December 1997): 571–79. http://dx.doi.org/10.1017/s0031182097001856.
Full textTolar, Jakub, In-Hyun Park, Lily Xia, Mark Osborn, Ron T. McElmurry, Paul J. Orchard, George Q. Daley, and Bruce R. Blazar. "Patient-Specific Induced Pluripotent Stem Cells in Hurler Syndrome." Blood 112, no. 11 (November 16, 2008): 386. http://dx.doi.org/10.1182/blood.v112.11.386.386.
Full textRamirez, Francisco E., Jill Siebold, Kathelyn Antuna, Albert Sanchez, and Neil Nedley. "Abstract 471: Lifestyle Interventions Stop Metabolic Syndrome." Arteriosclerosis, Thrombosis, and Vascular Biology 36, suppl_1 (May 2016). http://dx.doi.org/10.1161/atvb.36.suppl_1.471.
Full textDissertations / Theses on the topic "Sleeping Bandits"
Saha, Aadirupa. "Battle of Bandits: Online Learning from Subsetwise Preferences and Other Structured Feedback." Thesis, 2020. https://etd.iisc.ac.in/handle/2005/5184.
Full textChatterjee, Aritra. "A Study of Thompson Sampling Approach for the Sleeping Multi-Armed Bandit Problem." Thesis, 2017. http://etd.iisc.ac.in/handle/2005/3631.
Full textChatterjee, Aritra. "A Study of Thompson Sampling Approach for the Sleeping Multi-Armed Bandit Problem." Thesis, 2017. http://etd.iisc.ernet.in/2005/3631.
Full textBook chapters on the topic "Sleeping Bandits"
Thomson, Peter. "Across the Sleeping Land." In Sacred Sea. Oxford University Press, 2007. http://dx.doi.org/10.1093/oso/9780195170511.003.0022.
Full textConference papers on the topic "Sleeping Bandits"
Li, Fengjiao, Jia Liu, and Bo Ji. "Combinatorial Sleeping Bandits with Fairness Constraints." In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. IEEE, 2019. http://dx.doi.org/10.1109/infocom.2019.8737461.
Full textKuchibhotla, Vivek, P. Harshitha, and Divitha Elugoti. "Combinatorial Sleeping Bandits with Fairness Constraints and Long-Term Non-Availability of Arms." In 2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2020. http://dx.doi.org/10.1109/iceca49313.2020.9297371.
Full textAli, Samad, Aidin Ferdowsi, Walid Saad, and Nandana Rajatheva. "Sleeping Multi-Armed Bandits for Fast Uplink Grant Allocation in Machine Type Communications." In 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 2018. http://dx.doi.org/10.1109/glocomw.2018.8644350.
Full textYancey, Kevin P., and Burr Settles. "A Sleeping, Recovering Bandit Algorithm for Optimizing Recurring Notifications." In KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3394486.3403351.
Full text