Proceedings of the 2012 International Symposium on Nonlinear Theory and its Applications
2012
Session Number:C1L-C
Session:
Number:590
Tug-of-war Model for Competitive Multi-armed Bandit Problem: Amoeba-inspired Algorithm for Cognitive Medium Access
Song-Ju Kim, Masashi Aono, Etsushi Nameda, Masahiko Hara,
pp.590-593
Publication Date:
Online ISSN:2188-5079
[1] S. -J. Kim, M. Aono, M. Hara, UC2009, LNCS 5715, Springer, p.289, 2009.
[2] S. -J. Kim, M. Aono, M. Hara, UC2010, LNCS 6079, Springer, pp.69-80, 2010.
[3] S. -J. Kim, M. Aono, M. Hara, BioSystems vol.101, pp.29-36, 2010.
[4] S. -J. Kim, M. Aono, M. Hara, Proc. of NOLTA2010, pp.520-523, 2010.
[5] S. -J. Kim, E. Nameda, M. Aono, M. Hara, Proc. of NOLTA2011, pp.176-179, 2011.
[6] S. -J. Kim, M. Aono, E. Nameda, M. Hara, Technical Report of IEICE (CCS-2011-025), pp.36-41, [in Japanese], 2011.
[7] M. Dorigo, L. M. Gambardella, Artificial Life vol.5 no. 2, pp.137-172, 1999.
[8] D. Karaboga, Technical Report-TR06, Erciyes University, 2005.
[9] M. Aono, Y. Hirata, M. Hara, K. Aihara, New Generation Computing vol.27, pp.129-157, 2009.
[10] M. Aono, Y. Hirata, M. Hara, K. Aihara, UC2009, LNCS 5715, Springer, pp.56-69, 2009.
[11] P. Auer, N. Cesa-Bianchi, P. Fischer, Machine Learning vol.47, pp.235-256, 2002.
[12] L. Kocsis, C. Szepesvári, ECML2006, LNAI 4212, Springer, pp.282-293, 2006.
[13] S. Gelly, Y. Wang, R. Munos, O. Teytaud, RR-6062-INRIA, pp.1-19, 2006.
[14] L. Lai, H. Jiang, H. V. Poor, Proc. of IEEE 42nd Asilomar Conference on Signals, System and Computers, pp.98-102, 2008.
[15] L. Lai, H. E. Gamal, H. Jiang, H. V. Poor, IEEE Trans. on Mobile Computing, vol.10 no.2, pp.239-253, 2011.
[16] T. Roughgarden, “Selfish routing and the price of anarchy”, The MIT Press, Cambridge, (2005).