CCN Interest Forwarding Strategy as Multi-Armed Bandit Model with Delays

被引:0
|
作者
Avrachenkov, Konstantin [1 ]
Jacko, Peter [2 ]
机构
[1] INRIA Sophia Antipolis, Biot, France
[2] BCAM, Bilbao, Spain
关键词
PROBABILITY-INEQUALITIES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider Content Centric Network (CCN) interest forwarding problem as a Multi-Armed Bandit (MAB) problem with delays. We investigate the transient behaviour of the epsilon-greedy, tuned epsilon-greedy and Upper Confidence Bound (UCB) interest forwarding policies. Surprisingly, for all the three policies very short initial exploratory phase is needed. We demonstrate that the tuned epsilon-greedy algorithm is nearly as good as the UCB algorithm, commonly reported as the best currently available algorithm. We prove the uniform logarithmic bound for the tuned epsilon-greedy algorithm in the presence of delays. In addition to its immediate application to CCN interest forwarding, the new theoretical results for MAB problem with delays represent significant theoretical advances in machine learning discipline.
引用
收藏
页码:38 / 43
页数:6
相关论文
共 50 条
  • [21] Multi-armed Bandit with Additional Observations
    Yun D.
    Ahn S.
    Proutiere A.
    Shin J.
    Yi Y.
    2018, Association for Computing Machinery, 2 Penn Plaza, Suite 701, New York, NY 10121-0701, United States (46): : 53 - 55
  • [22] A Dynamic Observation Strategy for Multi-agent Multi-armed Bandit Problem
    Madhushani, Udari
    Leonard, Naomi Ehrich
    2020 EUROPEAN CONTROL CONFERENCE (ECC 2020), 2020, : 1677 - 1682
  • [23] muMAB: A Multi-Armed Bandit Model for Wireless Network Selection
    Boldrini, Stefano
    De Nardis, Luca
    Caso, Giuseppe
    Le, Mai T. P.
    Fiorina, Jocelyn
    Di Benedetto, Maria-Gabriella
    ALGORITHMS, 2018, 11 (02)
  • [24] Contextual Multi-armed Bandit Algorithm for Semiparametric Reward Model
    Kim, Gi-Soo
    Paik, Myunghee Cho
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 97, 2019, 97
  • [25] Tug-of-War Model for Multi-armed Bandit Problem
    Kim, Song-Ju
    Aono, Masashi
    Hara, Masahiko
    UNCONVENTIONAL COMPUTATION, PROCEEDINGS, 2010, 6079 : 69 - +
  • [26] ON MULTI-ARMED BANDIT PROBLEM WITH NUISANCE PARAMETER
    孙嘉阳
    Science China Mathematics, 1986, (05) : 464 - 475
  • [27] Multi-armed bandit algorithms and empirical evaluation
    Vermorel, J
    Mohri, M
    MACHINE LEARNING: ECML 2005, PROCEEDINGS, 2005, 3720 : 437 - 448
  • [28] Sustainable Cooperative Coevolution with a Multi-Armed Bandit
    De Rainville, Francois-Michel
    Sebag, Michele
    Gagne, Christian
    Schoenauer, Marc
    Laurendeau, Denis
    GECCO'13: PROCEEDINGS OF THE 2013 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2013, : 1517 - 1524
  • [29] Identifying Outlier Arms in Multi-Armed Bandit
    Zhuang, Honglei
    Wang, Chi
    Wang, Yifan
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 30 (NIPS 2017), 2017, 30
  • [30] Characterizing Truthful Multi-Armed Bandit Mechanisms
    Babaioff, Moshe
    Sharma, Yogeshwer
    Slivkins, Aleksandrs
    10TH ACM CONFERENCE ON ELECTRONIC COMMERCE - EC 2009, 2009, : 79 - 88