暂无分享,去创建一个
[1] Hai Jiang,et al. Medium access in cognitive radio networks: A competitive multi-armed bandit framework , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.
[2] Olivier Teytaud,et al. Modification of UCT with Patterns in Monte-Carlo Go , 2006 .
[3] Motoichi Ohtsu,et al. Decision making based on optical excitation transfer via near-field interactions between quantum dots , 2014 .
[4] Bee-Chung Chen,et al. Explore/Exploit Schemes for Web Content Optimization , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[5] Motoichi Ohtsu,et al. Decision Maker based on Nanoscale Photo-excitation Transfer , 2013, Scientific reports.
[6] Song-Ju Kim,et al. Tug-of-war model for the two-bandit problem: Nonlocally-correlated parallel exploration via resource conservation , 2010, Biosyst..
[8] Donald W. Davies. The Bombe a Remarkable Logic Machine , 1999, Cryptologia.
[9] Song-Ju Kim,et al. Tug-of-War Model for Multi-armed Bandit Problem , 2010, UC.
[10] Tim Roughgarden,et al. Selfish routing and the price of anarchy , 2005 .
[11] Song-Ju Kim,et al. Amoeba-inspired algorithm for cognitive medium access , 2014 .
[12] H. Vincent Poor,et al. Cognitive Medium Access: Exploration, Exploitation, and Competition , 2007, IEEE Transactions on Mobile Computing.
[13] Song-Ju Kim,et al. Efficient decision-making by volume-conserving physical object , 2014, ArXiv.
[14] Song-Ju Kim,et al. Amoeba-inspired Tug-of-War algorithms for exploration-exploitation dilemma in extended Bandit Problem , 2014, Biosyst..
[15] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.