Literatura académica sobre el tema "Multi-armed bandit formulation"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Multi-armed bandit formulation".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Multi-armed bandit formulation"
Dzhoha, A. S. "Sequential resource allocation in a stochastic environment: an overview and numerical experiments". Bulletin of Taras Shevchenko National University of Kyiv. Series: Physics and Mathematics, n.º 3 (2021): 13–25. http://dx.doi.org/10.17721/1812-5409.2021/3.1.
Texto completoZayas-Cabán, Gabriel, Stefanus Jasin y Guihua Wang. "An asymptotically optimal heuristic for general nonstationary finite-horizon restless multi-armed, multi-action bandits". Advances in Applied Probability 51, n.º 03 (septiembre de 2019): 745–72. http://dx.doi.org/10.1017/apr.2019.29.
Texto completoRoy Chaudhuri, Arghya y Shivaram Kalyanakrishnan. "Regret Minimisation in Multi-Armed Bandits Using Bounded Arm Memory". Proceedings of the AAAI Conference on Artificial Intelligence 34, n.º 06 (3 de abril de 2020): 10085–92. http://dx.doi.org/10.1609/aaai.v34i06.6566.
Texto completoAi, Jing y Alhussein A. Abouzeid. "Opportunistic spectrum access based on a constrained multi-armed bandit formulation". Journal of Communications and Networks 11, n.º 2 (abril de 2009): 134–47. http://dx.doi.org/10.1109/jcn.2009.6391388.
Texto completoBagheri, Saeed y Anna Scaglione. "The Restless Multi-Armed Bandit Formulation of the Cognitive Compressive Sensing Problem". IEEE Transactions on Signal Processing 63, n.º 5 (marzo de 2015): 1183–98. http://dx.doi.org/10.1109/tsp.2015.2389620.
Texto completoLi, Xinbin, Jiajia Liu, Lei Yan, Song Han y Xinping Guan. "Relay Selection for Underwater Acoustic Sensor Networks: A Multi-User Multi-Armed Bandit Formulation". IEEE Access 6 (2018): 7839–53. http://dx.doi.org/10.1109/access.2018.2801350.
Texto completoHo, Chien-Ju, Aleksandrs Slivkins y Jennifer Wortman Vaughan. "Adaptive Contract Design for Crowdsourcing Markets: Bandit Algorithms for Repeated Principal-Agent Problems". Journal of Artificial Intelligence Research 55 (3 de febrero de 2016): 317–59. http://dx.doi.org/10.1613/jair.4940.
Texto completoCavenaghi, Emanuele, Gabriele Sottocornola, Fabio Stella y Markus Zanker. "Non Stationary Multi-Armed Bandit: Empirical Evaluation of a New Concept Drift-Aware Algorithm". Entropy 23, n.º 3 (23 de marzo de 2021): 380. http://dx.doi.org/10.3390/e23030380.
Texto completoLi, Xinbin, Xianglin Xu, Lei Yan, Haihong Zhao y Tongwei Zhang. "Energy-Efficient Data Collection Using Autonomous Underwater Glider: A Reinforcement Learning Formulation". Sensors 20, n.º 13 (4 de julio de 2020): 3758. http://dx.doi.org/10.3390/s20133758.
Texto completoMohamed, Ehab Mahmoud, Mohammad Alnakhli, Sherief Hashima y Mohamed Abdel-Nasser. "Distribution of Multi MmWave UAV Mounted RIS Using Budget Constraint Multi-Player MAB". Electronics 12, n.º 1 (20 de diciembre de 2022): 12. http://dx.doi.org/10.3390/electronics12010012.
Texto completoTesis sobre el tema "Multi-armed bandit formulation"
Ghalme, Ganesh Sambhaji. "Algorithms for Social Good in Online Platforms with Guarantees on Honest Participation and Fairness". Thesis, 2020. https://etd.iisc.ac.in/handle/2005/4573.
Texto completoCapítulos de libros sobre el tema "Multi-armed bandit formulation"
Pini, Giovanni, Arne Brutschy, Gianpiero Francesca, Marco Dorigo y Mauro Birattari. "Multi-armed Bandit Formulation of the Task Partitioning Problem in Swarm Robotics". En Lecture Notes in Computer Science, 109–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32650-9_10.
Texto completoActas de conferencias sobre el tema "Multi-armed bandit formulation"
Bouneffouf, Djallel, Irina Rish, Guillermo Cecchi y Raphaël Féraud. "Context Attentive Bandits: Contextual Bandit with Restricted Context". En Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/203.
Texto completoAvrachenkov, Konstantin, Laura Cottatellucci y Lorenzo Maggi. "Slow fading channel selection: A restless multi-armed bandit formulation". En 2012 9th International Symposium on Wireless Communication Systems (ISWCS 2012). IEEE, 2012. http://dx.doi.org/10.1109/iswcs.2012.6328535.
Texto completoCheung, Mei Yi, Joshua Leighton y Franz S. Hover. "Multi-armed bandit formulation for autonomous mobile acoustic relay adaptive positioning". En 2013 IEEE International Conference on Robotics and Automation (ICRA). IEEE, 2013. http://dx.doi.org/10.1109/icra.2013.6631165.
Texto completoFeki, Afef y Veronique Capdevielle. "Autonomous resource allocation for dense LTE networks: A Multi Armed Bandit formulation". En 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC 2011). IEEE, 2011. http://dx.doi.org/10.1109/pimrc.2011.6140047.
Texto completoBarbato, Antimo, Lin Chen, Fabio Martignon y Stefano Paris. "A multi-armed bandit formulation for distributed appliances scheduling in smart grids". En 2014 IEEE Online Conference on Green Communications (OnlineGreencomm). IEEE, 2014. http://dx.doi.org/10.1109/onlinegreencom.2014.7114418.
Texto completoGai, Yi, Bhaskar Krishnamachari y Rahul Jain. "Learning Multiuser Channel Allocations in Cognitive Radio Networks: A Combinatorial Multi-Armed Bandit Formulation". En 2010 IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (IEEE DySPAN). IEEE, 2010. http://dx.doi.org/10.1109/dyspan.2010.5457857.
Texto completoChen, Kun, Kechao Cai, Longbo Huang y John C. S. Lui. "Beyond the Click-Through Rate: Web Link Selection with Multi-level Feedback". En Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/459.
Texto completoElSayed, Karim A., Ilias Bilionis y Jitesh H. Panchal. "Evaluating Heuristics in Engineering Design: A Reinforcement Learning Approach". En ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-70425.
Texto completo