Multi-user lax communications: a multi-armed bandit approach

被引:0
|
作者
Avner, Orly [1 ]
Mannor, Shie [1 ]
机构
[1] Technion Israel Inst Technol, IL-32000 Haifa, Israel
关键词
COGNITIVE RADIO;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Inspired by cognitive radio networks, we consider a setting where multiple users share several channels modeled as a multi-user multi-armed bandit (MAB) problem. The characteristics of each channel are unknown and are different for each user. Each user can choose between the channels, but her success depends on the particular channel chosen as well as on the selections of other users: if two users select the same channel their messages collide and none of them manages to send any data. Our setting is fully distributed, so there is no central control. As in many communication systems, the users cannot set up a direct communication protocol, so information exchange must be limited to a minimum. We develop an algorithm for learning a stable configuration for the multi-user MAB problem. We further offer both convergence guarantees and experiments inspired by real communication networks, including comparison to state-of-the-art algorithms.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Multi-Armed Bandit-Based User Network Node Selection
    Gao, Qinyan
    Xie, Zhidong
    SENSORS, 2024, 24 (13)
  • [32] Combinatorial Multi-Armed Bandit Based User Recruitment in Mobile Crowdsensing
    Wang, Hengzhi
    Yang, Yongjian
    Wang, En
    Liu, Wenbin
    Xu, Yuanbo
    Wu, Jie
    2020 17TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2020,
  • [33] A Batched Multi-Armed Bandit Approach to News Headline Testing
    Mao, Yizhi
    Chen, Miao
    Wagle, Abhinav
    Pan, Junwei
    Natkovich, Michael
    Matheson, Don
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 1966 - 1973
  • [34] MABAT: A Multi-Armed Bandit Approach for Threat-Hunting
    Dekel, Liad
    Leybovich, Ilia
    Zilberman, Polina
    Puzis, Rami
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 477 - 490
  • [35] A Multi-Armed Bandit Approach to Wireless Information and Power Transfer
    Xing, Yuan
    Qian, Yuchen
    Dong, Liang
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (04) : 886 - 889
  • [36] A multi-armed bandit approach for exploring partially observed networks
    Kaushalya Madhawa
    Tsuyoshi Murata
    Applied Network Science, 4
  • [37] A Bayesian Multi-armed Bandit Approach for Identifying Human Vulnerabilities
    Miehling, Erik
    Xiao, Baicen
    Poovendran, Radha
    Basar, Tamer
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018, 2018, 11199 : 521 - 539
  • [38] Multi-Armed Bandit for Species Discovery: A Bayesian Nonparametric Approach
    Battiston, Marco
    Favaro, Stefano
    Teh, Yee Whye
    JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 2018, 113 (521) : 455 - 466
  • [39] A multi-armed bandit approach for exploring partially observed networks
    Madhawa, Kaushalya
    Murata, Tsuyoshi
    APPLIED NETWORK SCIENCE, 2019, 4 (01)
  • [40] A Multi-armed Bandit Approach to Online Spatial Task Assignment
    Hassan, Umair ul
    Curry, Edward
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 212 - 219