9781627056380-1627056386-Multi-Armed Bandits: Theory and Applications to Online Learning in Networks (Synthesis Lectures on Communication Networks, 22)

Multi-Armed Bandits: Theory and Applications to Online Learning in Networks (Synthesis Lectures on Communication Networks, 22)

ISBN-13: 9781627056380
ISBN-10: 1627056386
Author: Qing Zhao, R. Srikant
Publication date: 2019
Publisher: Morgan & Claypool Publishers
Format: Paperback 166 pages
FREE US shipping

Book details

ISBN-13: 9781627056380
ISBN-10: 1627056386
Author: Qing Zhao, R. Srikant
Publication date: 2019
Publisher: Morgan & Claypool Publishers
Format: Paperback 166 pages

Summary

Multi-Armed Bandits: Theory and Applications to Online Learning in Networks (Synthesis Lectures on Communication Networks, 22) (ISBN-13: 9781627056380 and ISBN-10: 1627056386), written by authors Qing Zhao, R. Srikant, was published by Morgan & Claypool Publishers in 2019. With an overall rating of 4.2 stars, it's a notable title among other AI & Machine Learning (Computer Science) books. You can easily purchase or rent Multi-Armed Bandits: Theory and Applications to Online Learning in Networks (Synthesis Lectures on Communication Networks, 22) (Paperback) from BooksRun, along with many other new and used AI & Machine Learning books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

Multi-armed bandit problems pertain to optimal sequential decision making and learning in unknown environments.

Since the first bandit problem posed by Thompson in 1933 for the application of clinical trials, bandit problems have enjoyed lasting attention from multiple research communities and have found a wide range of applications across diverse domains. This book covers classic results and recent development on both Bayesian and frequentist bandit problems. We start in Chapter 1 with a brief overview on the history of bandit problems, contrasting the two schools--Bayesian and frequentis --of approaches and highlighting foundational results and key applications. Chapters 2 and 4 cover, respectively, the canonical Bayesian and frequentist bandit models. In Chapters 3 and 5, we discuss major variants of the canonical bandit models that lead to new directions, bring in new techniques, and broaden the applications of this classical problem. In Chapter 6, we present several representative application examples in communication networks and social-economic systems, aiming to illuminate the connections between the Bayesian and the frequentist formulations of bandit problems and how structural results pertaining to one may be leveraged to obtain solutions under the other.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book