Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (6)

Search Parameters:
Keywords = regret matching

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 974 KiB  
Article
Thompson Sampling for Non-Stationary Bandit Problems
by Han Qi, Fei Guo and Li Zhu
Entropy 2025, 27(1), 51; https://doi.org/10.3390/e27010051 - 9 Jan 2025
Viewed by 1620
Abstract
Non-stationary multi-armed bandit (MAB) problems have recently attracted extensive attention. We focus on the abruptly changing scenario where reward distributions remain constant for a certain period and change at unknown time steps. Although Thompson sampling (TS) has shown success in non-stationary settings, there [...] Read more.
Non-stationary multi-armed bandit (MAB) problems have recently attracted extensive attention. We focus on the abruptly changing scenario where reward distributions remain constant for a certain period and change at unknown time steps. Although Thompson sampling (TS) has shown success in non-stationary settings, there is currently no regret bound analysis for TS with uninformative priors. To address this, we propose two algorithms, discounted TS and sliding-window TS, designed for sub-Gaussian reward distributions. For these algorithms, we establish an upper bound for the expected regret by bounding the expected number of times a suboptimal arm is played. We show that the regret upper bounds of both algorithms are O~(TBT), where T is the time horizon and BT is the number of breakpoints. This upper bound matches the lower bound for abruptly changing problems up to a logarithmic factor. Empirical comparisons with other non-stationary bandit algorithms highlight the competitive performance of our proposed methods. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

13 pages, 475 KiB  
Article
Mate Choice Plurality, Choice Overload, and Singlehood: Are More Options Always Better?
by Menelaos Apostolou, Loukia Constantinidou and Antonios Kagialis
Behav. Sci. 2024, 14(8), 703; https://doi.org/10.3390/bs14080703 - 12 Aug 2024
Cited by 1 | Viewed by 2998
Abstract
A lack of options can make it challenging for individuals to find a desirable intimate partner. Conversely, an abundance of choices might lead to mate choice overload, making it difficult to determine the most suitable match. Additionally, having numerous alternatives after entering a [...] Read more.
A lack of options can make it challenging for individuals to find a desirable intimate partner. Conversely, an abundance of choices might lead to mate choice overload, making it difficult to determine the most suitable match. Additionally, having numerous alternatives after entering a relationship could undermine its stability by decreasing satisfaction with the current partner. The present research aimed to examine the effects of mate choice plurality on singlehood status and the willingness to stay in a relationship within the Greek cultural context. Specifically, we employed closed-ended questionnaires, which included instruments developed using AI, with a sample of 804 Greek-speaking participants. We found that participants who perceived they had a wider range of potential romantic partners reported a lower likelihood of being single. Furthermore, more perceived mate choices were associated with fewer years spent as single. However, mate choice plurality was also linked to higher choice overload, which, in turn, increased the likelihood of being single rather than in an intimate relationship. Moreover, more perceived mate choices were associated with more regrets about being in the current relationship. These regrets were linked to lower relationship satisfaction and ultimately contributed to a decreased willingness to stay in the relationship. Notably, this indirect effect was significant only for male participants. Full article
(This article belongs to the Special Issue Psychology of Mate Choice, Romantic Relationships and Sexuality)
Show Figures

Figure 1

14 pages, 1185 KiB  
Article
A New Cooperative Game—Theoretic Approach for Customer-Owned Energy Storage
by Maria O. Hanna, Mostafa F. Shaaban and Magdy M. A. Salama
Sustainability 2022, 14(6), 3676; https://doi.org/10.3390/su14063676 - 21 Mar 2022
Viewed by 2144
Abstract
The increasing demand for energy storage systems (ESSs) alongside the continuous enhancements to storage technology have been of great positive impact on the electric grid. Their unceasing development has been driven by the need to accommodate increased penetration of renewable energy resources and [...] Read more.
The increasing demand for energy storage systems (ESSs) alongside the continuous enhancements to storage technology have been of great positive impact on the electric grid. Their unceasing development has been driven by the need to accommodate increased penetration of renewable energy resources and defer capital investments, among other benefits. Moreover, ESSs have played a key role in the grid’s ability to cope with its ever-shifting load profiles, resulting in large economic gain for ESS owners. For this reason, this prospective study was designed to investigate privately-owned energy storage hubs (ESHs) and their interactions with potential customers as well as with the electric grid. This research examined two contrasting interaction approaches for customer-owned stationary energy storage hubs: a cooperative and a non-cooperative game-theoretic approach. The goal of the cooperative technique is to conduce to a correlated equilibrium increasing the social welfare of all players involved using a regret matching algorithm. On the other hand, in the non-cooperative approach, modeled as an ascending price-clinching auction, each player acts greedily, maximizing only their individual welfare. Implementing both case studies resulted in important insights into ESH players’ interactions and provided contrasting methods of modeling their behaviors. Finally, depending on the application at hand, the choice of one approach may be more realistic than the other. Full article
Show Figures

Figure 1

44 pages, 3216 KiB  
Review
A Systematic Review of Smart Real Estate Technology: Drivers of, and Barriers to, the Use of Digital Disruptive Technologies and Online Platforms
by Fahim Ullah, Samad M. E. Sepasgozar and Changxin Wang
Sustainability 2018, 10(9), 3142; https://doi.org/10.3390/su10093142 - 3 Sep 2018
Cited by 165 | Viewed by 48940
Abstract
Real estate needs to improve its adoption of disruptive technologies to move from traditional to smart real estate (SRE). This study reviews the adoption of disruptive technologies in real estate. It covers the applications of nine such technologies, hereby referred to as the [...] Read more.
Real estate needs to improve its adoption of disruptive technologies to move from traditional to smart real estate (SRE). This study reviews the adoption of disruptive technologies in real estate. It covers the applications of nine such technologies, hereby referred to as the Big9. These are: drones, the internet of things (IoT), clouds, software as a service (SaaS), big data, 3D scanning, wearable technologies, virtual and augmented realities (VR and AR), and artificial intelligence (AI) and robotics. The Big9 are examined in terms of their application to real estate and how they can furnish consumers with the kind of information that can avert regrets. The review is based on 213 published articles. The compiled results show the state of each technology’s practice and usage in real estate. This review also surveys dissemination mechanisms, including smartphone technology, websites and social media-based online platforms, as well as the core components of SRE: sustainability, innovative technology and user centredness. It identifies four key real estate stakeholders—consumers, agents and associations, government and regulatory authorities, and complementary industries—and their needs, such as buying or selling property, profits, taxes, business and/or other factors. Interactions between these stakeholders are highlighted, and the specific needs that various technologies address are tabulated in the form of a what, who and how analysis to highlight the impact that the technologies have on key stakeholders. Finally, stakeholder needs as identified in the previous steps are matched theoretically with six extensions of the traditionally accepted technology adoption model (TAM), paving the way for a smoother transition to technology-based benefits for consumers. The findings pertinent to the Big9 technologies in the form of opportunities, potential losses and exploitation levels (OPLEL) analyses highlight the potential utilisation of each technology for addressing consumers’ needs and minimizing their regrets. Additionally, the tabulated findings in the form of what, how and who links the Big9 technologies to core consumers’ needs and provides a list of resources needed to ensure proper information dissemination to the stakeholders. Such high-quality information can bridge the gap between real estate consumers and other stakeholders and raise the state of the industry to a level where its consumers have fewer or no regrets. The study, being the first to explore real estate technologies, is limited by the number of research publications on the SRE technologies that has been compensated through incorporation of online reports. Full article
(This article belongs to the Special Issue Real Estate Economics, Management and Investments)
Show Figures

Figure 1

19 pages, 696 KiB  
Article
Wireless Networks under a Backoff Attack: A Game Theoretical Perspective
by Juan Parras and Santiago Zazo
Sensors 2018, 18(2), 404; https://doi.org/10.3390/s18020404 - 30 Jan 2018
Cited by 8 | Viewed by 3263
Abstract
We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of the sensors of the network are malicious and deviate from the defined contention mechanism. We use Bianchi’s network model to study the impact of the [...] Read more.
We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of the sensors of the network are malicious and deviate from the defined contention mechanism. We use Bianchi’s network model to study the impact of the malicious sensors on the total network throughput, showing that it causes the throughput to be unfairly distributed among sensors. We model this conflict using game theory tools, where each sensor is a player. We obtain analytical solutions and propose an algorithm, based on Regret Matching, to learn the equilibrium of the game with an arbitrary number of players. Our approach is validated via simulations, showing that our theoretical predictions adjust to reality. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

17 pages, 258 KiB  
Article
Characterizing the Asymptotic Per-Symbol Redundancy of Memoryless Sources over Countable Alphabets in Terms of Single-Letter Marginals
by Maryam Hosseini and Narayana Santhanam
Entropy 2014, 16(7), 4168-4184; https://doi.org/10.3390/e16074168 - 23 Jul 2014
Cited by 1 | Viewed by 4571
Abstract
The minimum expected number of bits needed to describe a random variable is its entropy, assuming knowledge of the distribution of the random variable. On the other hand, universal compression describes data supposing that the underlying distribution is unknown, but that it belongs [...] Read more.
The minimum expected number of bits needed to describe a random variable is its entropy, assuming knowledge of the distribution of the random variable. On the other hand, universal compression describes data supposing that the underlying distribution is unknown, but that it belongs to a known set Ρ of distributions. However, since universal descriptions are not matched exactly to the underlying distribution, the number of bits they use on average is higher, and the excess over the entropy used is the redundancy. In this paper, we study the redundancy incurred by the universal description of strings of positive integers (Z+), the strings being generated independently and identically distributed (i.i.d.) according an unknown distribution over Z+ in a known collection P. We first show that if describing a single symbol incurs finite redundancy, then P is tight, but that the converse does not always hold. If a single symbol can be described with finite worst-case regret (a more stringent formulation than redundancy above), then it is known that describing length n i.i.d. strings only incurs vanishing (to zero) redundancy per symbol as n increases. On the contrary, we show it is possible that the description of a single symbol from an unknown distribution of P incurs finite redundancy, yet the description of length n i.i.d. strings incurs a constant (> 0) redundancy per symbol encoded. We then show a sufficient condition on single-letter marginals, such that length n i.i.d. samples will incur vanishing redundancy per symbol encoded. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Back to TopTop