Skip to main content

Sequential Learning and Decision-Making in Wireless Resource Management

  • Book
  • © 2016

Overview

  • Emphasizes intuition rather than laborious proofs
  • Provides a recipe for applying theoretical tools to real-world problems
  • Treats both theoretical and practical aspects of the sequential learning and decision making framework
  • Covers many representative applications in wireless networks
  • Includes supplementary material: sn.pub/extras

Part of the book series: Wireless Networks (WN)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (8 chapters)

  1. Theory

  2. Applications

Keywords

About this book

This book lays out the theoretical foundation of the so-called multi-armed bandit (MAB) problems and puts it in the context of resource management in wireless networks. Part I of the book presents the formulations, algorithms and performance of three forms of MAB problems, namely, stochastic, Markov and adversarial. Covering all three forms of MAB problems makes this book unique in the field. Part II of the book provides detailed discussions of representative applications of the sequential learning framework in cognitive radio networks, wireless LANs and wireless mesh networks. 


Both individuals in industry and those in the wireless research community will benefit from this comprehensive and timely treatment of these topics. Advanced-level students studying communications engineering and networks will also find the content valuable and accessible.




Authors and Affiliations

  • Department of Computing, McMaster University, Hamilton, Canada

    Rong Zheng

  • School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, China

    Cunqing Hua

Bibliographic Information

Publish with us