Multi-user lax communications: a multi-armed bandit approach

被引:0
|
作者
Avner, Orly [1 ]
Mannor, Shie [1 ]
机构
[1] Technion Israel Inst Technol, IL-32000 Haifa, Israel
关键词
COGNITIVE RADIO;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Inspired by cognitive radio networks, we consider a setting where multiple users share several channels modeled as a multi-user multi-armed bandit (MAB) problem. The characteristics of each channel are unknown and are different for each user. Each user can choose between the channels, but her success depends on the particular channel chosen as well as on the selections of other users: if two users select the same channel their messages collide and none of them manages to send any data. Our setting is fully distributed, so there is no central control. As in many communication systems, the users cannot set up a direct communication protocol, so information exchange must be limited to a minimum. We develop an algorithm for learning a stable configuration for the multi-user MAB problem. We further offer both convergence guarantees and experiments inspired by real communication networks, including comparison to state-of-the-art algorithms.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] A user selection algorithm for aggregating electric vehicle demands based on a multi-armed bandit approach
    Hu, Qinran
    Zhang, Nianchu
    Quan, Xiangjun
    Bai, Linquan
    Wang, Qi
    Chen, Xinyi
    IET ENERGY SYSTEMS INTEGRATION, 2021, 3 (03) : 295 - 305
  • [42] Multi-Armed Bandit Beam Alignment and Tracking for Mobile Millimeter Wave Communications
    Booth, Matthew B.
    Suresh, Vinayak
    Michelusi, Nicolo
    Love, David J.
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (07) : 1244 - 1248
  • [43] ON MULTI-ARMED BANDIT PROBLEM WITH NUISANCE PARAMETER
    孙嘉阳
    Science China Mathematics, 1986, (05) : 464 - 475
  • [44] Multi-armed bandit algorithms and empirical evaluation
    Vermorel, J
    Mohri, M
    MACHINE LEARNING: ECML 2005, PROCEEDINGS, 2005, 3720 : 437 - 448
  • [45] UAV-Assisted Emergency Communications: An Extended Multi-Armed Bandit Perspective
    Lin, Yu
    Wang, Tianyu
    Wang, Shaowei
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (05) : 938 - 941
  • [46] Sustainable Cooperative Coevolution with a Multi-Armed Bandit
    De Rainville, Francois-Michel
    Sebag, Michele
    Gagne, Christian
    Schoenauer, Marc
    Laurendeau, Denis
    GECCO'13: PROCEEDINGS OF THE 2013 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2013, : 1517 - 1524
  • [47] Identifying Outlier Arms in Multi-Armed Bandit
    Zhuang, Honglei
    Wang, Chi
    Wang, Yifan
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 30 (NIPS 2017), 2017, 30
  • [48] Characterizing Truthful Multi-Armed Bandit Mechanisms
    Babaioff, Moshe
    Sharma, Yogeshwer
    Slivkins, Aleksandrs
    10TH ACM CONFERENCE ON ELECTRONIC COMMERCE - EC 2009, 2009, : 79 - 88
  • [49] Robust control of the multi-armed bandit problem
    Caro, Felipe
    Das Gupta, Aparupa
    ANNALS OF OPERATIONS RESEARCH, 2022, 317 (02) : 461 - 480
  • [50] Anytime Algorithms for Multi-Armed Bandit Problems
    Kleinberg, Robert
    PROCEEDINGS OF THE SEVENTHEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2006, : 928 - 936