In this paper, we consider a remote inference system, where a neural net...
The modern Mixed Reality devices that make the Metaverse viable can also...
In this paper, we study the role of feedback in online learning with
swi...
As Augmented Reality (AR) devices become more prevalent and commercially...
A new timeliness metric, called Age-of-Information (AoI), has recently
a...
In this paper, we study kernelized bandits with distributed biased feedb...
Convolution neural networks (CNNs) have achieved remarkable success, but...
Breathing disorders such as sleep apnea is a critical disorder that affe...
In image super-resolution, both pixel-wise accuracy and perceptual fidel...
Powered by advances in deep learning (DL) techniques, machine learning a...
In this paper, we study the problem of global reward maximization with o...
In this paper, we consider a discrete-time information-update system, wh...
Multi-exit architectures consist of a backbone and branch classifiers th...
Video deblurring has achieved remarkable progress thanks to the success ...
We study a stochastic bandit problem with a general unknown reward funct...
Fueled by advances in distributed deep learning (DDL), recent years have...
Recent years have witnessed a rapid growth of distributed machine learni...
In this paper, we study the problem of fair worker selection in Federate...
Structured pruning is a commonly used technique in deploying deep neural...
In recent years, to sustain the resource-intensive computational needs f...
The compression of deep neural networks (DNNs) to reduce inference cost
...
Submodularity is an important property of set functions and has been
ext...
Sparsity-inducing regularization problems are ubiquitous in machine lear...
The Age-of-Information (AoI) is a new performance metric recently propos...
The Age-of-Information (AoI) has recently been proposed as an important
...
Network function virtualization (NFV) is an emerging design paradigm tha...
Generative adversarial networks (GANs) has proven hugely successful in
v...
The multi-armed bandit (MAB) model has been widely adopted for studying ...
With the advent of Network Function Virtualization (NFV), network servic...
The last decade has witnessed an unprecedented growth in the demand for
...
With the advent of Network Function Virtualization (NFV), Physical Netwo...