Spatio–Temporal Edge Service Placement: A Bandit Learning Approach
暂无分享,去创建一个
Shaolei Ren | Jie Xu | Pan Zhou | Lixing Chen | Shaolei Ren | Pan Zhou | Jie Xu | Lixing Chen
[1] Valentina Cacchiani,et al. A Branch-and-Bound Algorithm for the Knapsack Problem with Conflict Graph , 2017, INFORMS J. Comput..
[2] Jie Xu,et al. Collaborative Service Caching for Edge Computing in Dense Small Cell Networks , 2017, ArXiv.
[3] Bhaskar Krishnamachari,et al. Combinatorial Network Optimization With Unknown Variables: Multi-Armed Bandits With Linear Rewards and Individual Observations , 2010, IEEE/ACM Transactions on Networking.
[4] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[5] Nirwan Ansari,et al. Workload Allocation in Hierarchical Cloudlet Networks , 2018, IEEE Communications Letters.
[6] Aleksandrs Slivkins,et al. Contextual Bandits with Similarity Information , 2009, COLT.
[7] R. Agrawal. Sample mean based index policies by O(log n) regret for the multi-armed bandit problem , 1995, Advances in Applied Probability.
[8] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[9] Wei Chu,et al. A contextual-bandit approach to personalized news article recommendation , 2010, WWW '10.
[10] Berker Agir,et al. A machine-learning based approach to privacy-aware information-sharing in mobile social networks , 2016, Pervasive Mob. Comput..
[11] Mhand Hifi,et al. An algorithm for the disjunctively constrained knapsack problem , 2012 .
[12] Takeo Yamada,et al. Heuristic and Exact Algorithms for the Disjunctively Constrained Knapsack Problem , 2002 .
[13] Peter J. Bentley,et al. Investigating Country Differences in Mobile App User Behavior and Challenges for Software Engineering , 2015, IEEE Transactions on Software Engineering.
[14] Xiaoyan Zhu,et al. Contextual Combinatorial Bandit and its Application on Diversified Online Recommendation , 2014, SDM.
[15] Anja Klein,et al. Context-Aware Proactive Content Caching With Service Differentiation in Wireless Networks , 2016, IEEE Transactions on Wireless Communications.
[16] Mihaela van der Schaar,et al. Distributed Online Learning via Cooperative Contextual Bandits , 2013, IEEE Transactions on Signal Processing.
[17] T. L. Lai Andherbertrobbins. Asymptotically Efficient Adaptive Allocation Rules , 2022 .
[18] Jie Xu,et al. Joint Service Caching and Task Offloading for Mobile Edge Computing in Dense Networks , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[19] R. Agrawal,et al. Multi-armed bandit problems with multiple plays and switching cost , 1990 .
[20] Tristan Henderson,et al. Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.
[21] Qi Zhang,et al. Dynamic Service Placement in Geographically Distributed Clouds , 2013, IEEE J. Sel. Areas Commun..
[22] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[23] Tarik Taleb,et al. Mobile Edge Computing Potential in Making Cities Smarter , 2017, IEEE Communications Magazine.
[24] Shuai Li,et al. Contextual Combinatorial Cascading Bandits , 2016, ICML.
[25] Anind K. Dey,et al. Managing Personal Information Disclosure in Ubiquitous Computing Environments , 2003 .
[26] David Bernstein,et al. Containers and Cloud: From LXC to Docker to Kubernetes , 2014, IEEE Cloud Computing.
[27] Randy H. Katz,et al. Dynamic Replica Placement for Scalable Content Delivery , 2002, IPTPS.
[28] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[29] Shaolei Ren,et al. Online Learning for Offloading and Autoscaling in Energy Harvesting Mobile Edge Computing , 2017, IEEE Transactions on Cognitive Communications and Networking.
[30] Dusit Niyato,et al. A Dynamic Offloading Algorithm for Mobile Computing , 2012, IEEE Transactions on Wireless Communications.
[31] Claus Pahl,et al. Containerization and the PaaS Cloud , 2015, IEEE Cloud Computing.
[32] Alexandros G. Dimakis,et al. FemtoCaching: Wireless Content Delivery Through Distributed Caching Helpers , 2013, IEEE Transactions on Information Theory.
[33] J. Walrand,et al. Asymptotically efficient allocation rules for the multiarmed bandit problem with multiple plays-Part II: Markovian rewards , 1987 .
[34] Khaled Ben Letaief,et al. Delay-optimal computation task scheduling for mobile-edge computing systems , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[35] Vikram Krishnamurthy,et al. A Distributed Coalition Game Approach to Femto-Cloud Formation , 2019, IEEE Transactions on Cloud Computing.
[36] Wei Chen,et al. Combinatorial Multi-Armed Bandit: General Framework and Applications , 2013, ICML.
[37] Xiaowei Yang,et al. CloudCmp: comparing public cloud providers , 2010, IMC '10.
[38] Jie Xu,et al. Socially trusted collaborative edge computing in ultra dense networks , 2017, SEC.