Context-aware proactive content caching with service differentiation in wireless networks
Content caching in small base stations or wireless infostations is considered to be a suitable
approach to improve the efficiency in wireless content delivery. Placing the optimal content …
approach to improve the efficiency in wireless content delivery. Placing the optimal content …
May AI? Design ideation with cooperative contextual bandits
Design ideation is a prime creative activity in design. However, it is challenging to support
computationally due to its quickly evolving and exploratory nature. The paper presents …
computationally due to its quickly evolving and exploratory nature. The paper presents …
Distributed clustering of linear bandits in peer to peer networks
We provide two distributed confidence ball algorithms for solving linear bandit problems in
peer to peer networks with limited communication capabilities. For the first, we assume that …
peer to peer networks with limited communication capabilities. For the first, we assume that …
Spatio–temporal edge service placement: A bandit learning approach
Shared edge computing platforms deployed at the radio access network are expected to
significantly improve the quality-of-service delivered by application service providers (ASPs) …
significantly improve the quality-of-service delivered by application service providers (ASPs) …
Imagesense: An intelligent collaborative ideation tool to support diverse human-computer partnerships
Professional designers create mood boards to explore, visualize, and communicate hard-to-
express ideas. We present ImageCascade, an intelligent, collaborative ideation tool that …
express ideas. We present ImageCascade, an intelligent, collaborative ideation tool that …
Delay and cooperation in nonstochastic bandits
We study networks of communicating learning agents that cooperate to solve a common
nonstochastic bandit problem. Agents use an underlying communication network to get …
nonstochastic bandit problem. Agents use an underlying communication network to get …
Distributed gradient descent algorithm robust to an arbitrary number of byzantine attackers
X Cao, L Lai - IEEE Transactions on Signal Processing, 2019 - ieeexplore.ieee.org
Due to the growth of modern dataset size and the desire to harness computing power of
multiple machines, there is a recent surge of interest in the design of distributed machine …
multiple machines, there is a recent surge of interest in the design of distributed machine …
Blockchain-enabled contextual online learning under local differential privacy for coronary heart disease diagnosis in mobile edge computing
Due to the increasing medical data for coronary heart disease (CHD) diagnosis, how to
assist doctors to make proper clinical diagnosis has attracted considerable attention …
assist doctors to make proper clinical diagnosis has attracted considerable attention …
Safe linear thompson sampling with side information
The design and performance analysis of bandit algorithms in the presence of stage-wise
safety or reliability constraints has recently garnered significant interest. In this work, we …
safety or reliability constraints has recently garnered significant interest. In this work, we …
Budget-constrained edge service provisioning with demand estimation via bandit learning
Shared edge computing platforms, which enable Application Service Providers (ASPs) to
deploy applications in close proximity to mobile users are providing ultra-low latency and …
deploy applications in close proximity to mobile users are providing ultra-low latency and …