Filters








6 Hits in 6.5 sec

A Multiarmed Bandit Incentive Mechanism for Crowdsourcing Demand Response in Smart Grids

Shweta Jain, Balakrishnan Narayanaswamy, Y. Narahari
2014 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
Motivated by the need to reduce costs arising from electricity shortage and renewable energy fluctuations, we propose a novel multiarmed bandit mechanism for demand response (MAB-MDR) which makes monetary  ...  Such mechanisms can be effectively deployed in smart grids using new information and control architecture innovations and lead to welcome savings in energy costs.  ...  This work offers a first step in modeling incentive offers in smart grids to make consumers participate in achieving better demand response thus leading to savings in energy costs and opens up many challenging  ... 
doi:10.1609/aaai.v28i1.8806 fatcat:456qxzenarh2tkg6k6ztezgpx4

Combinatorial Bandits for Incentivizing Agents with Dynamic Preferences [article]

Tanner Fiez, Shreyas Sekar, Liyuan Zheng, Lillian J. Ratliff
2018 arXiv   pre-print
We propose a multi-armed bandit framework for matching incentives to users, whose preferences are unknown a priori and evolving dynamically in time, in a resource constrained environment.  ...  For this algorithm, we provide theoretical bounds on the regret and demonstrate its performance via both synthetic and realistic (matching supply and demand in a bike-sharing platform) examples.  ...  Fiez was also supported in part by an NDSEG Fellowship.  ... 
arXiv:1807.02297v1 fatcat:hc6vr34atnb7jbzomfbymuipwm

Reports of the 2016 AAAI Workshop Program

Stefano Albrecht, Bruno Bouchard, John S. Brownstein, David L. Buckeridge, Cornelia Caragea, Kevin M. Carter, Adnan Darwiche, Blaz Fortuna, Yannick Francillette, Sébastien Gaboury, C. Lee Giles, Marko Grobelnik (+23 others)
2016 The AI Magazine  
Security (WS-16-03), Artificial Intelligence for Smart Grids and Smart Buildings (WS-16-04), Beyond NP (WS-16-05), Computer Poker and Imperfect Information Games (WS-16-06), Declarative Learning Based  ...  Programming (WS-16-07), Expanding the Boundaries of Health Informatics Using AI (WS-16-08), Incentives and Trust in Electronic Communities (WS-16-09), Knowledge Extraction from Text (WS-16-10), Multiagent  ...  ; recommendations for a multiarmed bandit approach to quickly structure and configure honeypots; and using game theory for incentivizing participants in sharing information while incorporating timely updates  ... 
doi:10.1609/aimag.v37i3.2680 fatcat:gutumrsprzg2vngp77hezwyuz4

2021 Index IEEE Internet of Things Journal Vol. 8

2021 IEEE Internet of Things Journal  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  -that appeared in this periodical during 2021, and items from previous years that were commented upon or corrected in 2021.  ...  ., +, JIoT June 15, 2021 9706-9716 Privacy-Preserving Collaborative Learning for Multiarmed Bandits in IoT.  ... 
doi:10.1109/jiot.2022.3141840 fatcat:42a2qzt4jnbwxihxp6rzosha3y

A Survey on Spectrum Management for Unmanned Aerial Vehicles (UAVs)

Mohammed A. Jasim, Hazim Shakhatreh, Nazli Siasi, Ahmad Sawalmeh, Adel Aldalbahi, Ala Al-Fuqaha
2021 IEEE Access  
Motivated by this observation, this article presents a comprehensive survey on spectrum management for UAV operations.  ...  Existing surveys mostly focus on UAV applications, channel models, and security challenges, with a lack of studies on spectrum management in the context of UAV networks.  ...  Furthermore, the MAB scheme can be extended into a multi-player, multiarmed bandit game (MP-MAB), where the reward extracted by any player relies on the specific decisions of other players.  ... 
doi:10.1109/access.2021.3138048 fatcat:2h5ls7ywo5g3bbz454gqatvkw4

Stampede Theory: Mapping and Treating Dangerous Misinformation at Scale [article]

Philip Gregory Feldman, Maryland Shared Open Access Repository, Wayne ; Lutters
2021
In stampedes, social influence becomes the dominant factor, outweighing environmental cues and creating a subjective reality.  ...  These sequences create trajectories in belief space. Individuals using similar terms at the same time have a high social influence. Agents whose tex [...]  ...  crowdsourced this problem, incorporating millions of responses from all over the world.  ... 
doi:10.13016/m2z6zo-m1lc fatcat:it6nkrwunrazzcijvcvt2saity