Recently, there has been extensive study of cooperative multi-agent
mult...
We study the multi-fidelity multi-armed bandit (MF-MAB), an extension of...
In traditional machine learning, it is trivial to conduct model evaluati...
We study contextual combinatorial bandits with probabilistically trigger...
Conversational contextual bandits elicit user preferences by occasionall...
This paper studies a cooperative multi-agent multi-armed stochastic band...
Template mining is one of the foundational tasks to support log analysis...
Blind Quantum Computation (BQC) is a delegation computing protocol that
...
Distributed access control is a crucial component for massive machine ty...
This paper leverages machine learned predictions to design online algori...
The online knapsack problem is a classic online resource allocation prob...
Contextual multi-armed bandit (MAB) is an important sequential
decision-...
In this paper, we study the combinatorial semi-bandits (CMAB) and focus ...
We generalize the multiple-play multi-armed bandits (MP-MAB) problem wit...
Multi-player multi-armed bandits (MMAB) study how decentralized players
...
In this paper, we consider a new network security game wherein an attack...
Mobile edge computing facilitates users to offload computation tasks to ...
In decentralized learning, a network of nodes cooperate to minimize an
o...
Multi-layered network exploration (MuLaNE) problem is an important probl...
Mobile edge computing (MEC) facilitates computation offloading to edge
s...
We study the online restless bandit problem, where the state of each arm...
For NFV systems, the key design space includes the function chaining for...
Online influence maximization has attracted much attention as a way to
m...
A fundamental question for companies is: How to make good decisions with...
Contextual bandit algorithms have gained increasing popularity in recomm...
Estimating set similarity and detecting highly similar sets are fundamen...
This paper focuses on helping network providers to carry out network cap...
Cardinality constrained submodular function maximization, which aims to
...
We introduce the community exploration problem that has many real-world
...
Graphlets are defined as k-node connected induced subgraph patterns. For...
Emerging new applications demand the current Internet to provide new
fun...
The web link selection problem is to select a small subset of web links ...
In-network caching is recognized as an effective solution to offload con...
Pioneered by Google's Pregel, many distributed systems have been develop...
This paper presents GRASTA (Grassmannian Robust Adaptive Subspace Tracki...