2012
DOI: 10.1561/9781601986276
|View full text |Cite
|
Sign up to set email alerts
|

Regret Analysis of Stochastic and Nonstochastic Multi-armed Bandit Problems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

14
1,345
0
5

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 1,082 publications
(1,364 citation statements)
references
References 85 publications
14
1,345
0
5
Order By: Relevance
“…An enormous body of work has accumulated over the years. While various subsets of this work have been covered in depth in several books and surveys (Berry and Fristedt, 1985;Cesa-Bianchi and Lugosi, 2006;Gittins et al, 2011;Bubeck and Cesa-Bianchi, 2012), this book provides a more textbook-like treatment of the subject.…”
Section: Prefacementioning
confidence: 99%
“…An enormous body of work has accumulated over the years. While various subsets of this work have been covered in depth in several books and surveys (Berry and Fristedt, 1985;Cesa-Bianchi and Lugosi, 2006;Gittins et al, 2011;Bubeck and Cesa-Bianchi, 2012), this book provides a more textbook-like treatment of the subject.…”
Section: Prefacementioning
confidence: 99%
“…At the th time slot, the genetic algorithm will be used to obtain the minimum value of 2 when each mobile device's battery energy level is sufficient for local execution or offloaded execution. Otherwise, the key-value pair method will be used by virtue of -greedy policy [17] .…”
Section: ∑̃mentioning
confidence: 99%
“…if , = 1 then 15: obtain the th mobile device and the corresponding th MEC server, then insert them into the map with key and value . 16: end if 17 Obtain the key-value pair " -" with the minimum server ( ).…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…In the context of learning bandits, we like to mention the work [36], where optimal control in a changing environment is studied. Here, the laws according to which the bandits evolve and receive reward/cost, are not known to the decision maker [14]. In [36] it is assumed that the (unknown) laws depend on the modulated environment.…”
Section: Related Workmentioning
confidence: 99%