Author of the publication

Multi-Player Multi-Armed Bandits with Finite Shareable Resources Arms: Learning Algorithms & Applications.

, , and . IJCAI, page 3537-3543. ijcai.org, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum Networks with Multiple Service Providers: Transport Layer Protocols and Research Opportunities., , , , and . IEEE Netw., 36 (5): 56-62 (2022)Design and Analysis of Incentive and Reputation Mechanisms for Online Crowdsourcing Systems., , and . ACM Trans. Model. Perform. Evaluation Comput. Syst., 1 (3): 13:1-13:27 (2016)Fed-CVLC: Compressing Federated Learning Communications with Variable-Length Codes., , , , and . CoRR, (2024)Exploiting non-uniform program execution time to evade record/replay forensic analysis., , and . Comput. Secur., (2020)Generalized Contextual Bandits With Latent Features: Algorithms and Applications., , and . IEEE Trans. Neural Networks Learn. Syst., 34 (8): 4763-4775 (August 2023)A Reinforcement Learning Approach to Price Cloud Resources With Provable Convergence Guarantees., and . IEEE Trans. Neural Networks Learn. Syst., 33 (12): 7448-7460 (2022)Social Visibility Optimization in OSNs with Anonymity Guarantees: Modeling, Algorithms and Applications., , and . ICDE, page 2063-2068. IEEE, (2021)Heterogeneous Information Assisted Bandit Learning: Theory and Application., , and . ICDE, page 2135-2140. IEEE, (2021)Deriving an Optimal Synchronization Interval for Supporting View Consistency in a Distributed Virtual Environment., , and . Multimedia Information Systems, page 99-106. (1999)Incentive and service differentiation in P2P networks: a game theoretic approach., , , and . IEEE/ACM Trans. Netw., 14 (5): 978-991 (2006)