|
[1] I. Bogunovic, J. Scarlett, and V. Cevher, “Time-varying gaussian process bandit optimiza- tion,” in Artificial Intelligence and Statistics. PMLR, 2016, pp. 314–323. [2] C. K. Williams and C. E. Rasmussen, “Gaussian processes for machine learning,” vol. 2, no. 3, 2006. [3] N. Srinivas, A. Krause, S. M. Kakade, and M. W. Seeger, “Information-theoretic regret bounds for gaussian process optimization in the bandit setting,” IEEE transactions on in- formation theory, vol. 58, no. 5, pp. 3250–3265, 2012. [4] E. Contal, V. Perchet, and N. Vayatis, “Gaussian process optimization with mutual infor- mation,” in International Conference on Machine Learning. PMLR, 2014, pp. 253–261. [5] A. Krause and C. Ong, “Contextual gaussian process bandit optimization,” Advances in Neural Information Processing Systems, vol. 24, 2011. [6] J. M. Hernández-Lobato, M. W. Hoffman, and Z. Ghahramani, “Predictive entropy search for efficient global optimization of black-box functions,” Advances in Neural Information Processing Systems, vol. 27, 2014. [7] Z. Wang and S. Jegelka, “Max-value entropy search for efficient bayesian optimization,” in International Conference on Machine Learning. PMLR, 2017, pp. 3627–3635. [8] S. Belakaria, A. Deshwal, N. K. Jayakodi, and J. R. Doppa, “Uncertainty-aware search framework for multi-objective bayesian optimization,” in Proceedings of the AAAI Con- ference on Artificial Intelligence, vol. 34, no. 06, 2020, pp. 10 044–10 052. [9] A. Klein, S. Falkner, S. Bartels, P. Hennig, and F. Hutter, “Fast bayesian optimization of machine learning hyperparameters on large datasets,” in Artificial intelligence and statis- tics. PMLR, 2017, pp. 528–536. [10] H. Imamura, N. Charoenphakdee, F. Futami, I. Sato, J. Honda, and M. Sugiyama, “Time- varying gaussian process bandit optimization with non-constant evaluation time,” arXiv preprint arXiv:2003.04691, 2020. [11] A. Verma and M. K. Hanawal, “Stochastic network utility maximization with unknown utilities: Multi-armed bandits approach,” in IEEE INFOCOM 2020-IEEE Conference on Computer Communications. IEEE, 2020, pp. 189–198. [12] X. Fu and E. Modiano, “Learning-num: Network utility maximization with unknown util- ity functions and queueing delay,” in Proceedings of the Twenty-second International Sym- posium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, 2021, pp. 21–30. [13] X. Fu and E. Modiano, “Elastic job scheduling with unknown utility functions,” vol. 49, no. 3. ACM New York, NY, USA, 2022, pp. 67–68. [14] P. I. Frazier, “A tutorial on bayesian optimization,” arXiv preprint arXiv:1807.02811, 2018. [15] M. Thomas and A. T. Joy, Elements of information theory. Wiley-Interscience, 2006. [16] R. A. Horn and C. R. Johnson, Matrix analysis. Cambridge university press, 2012. [17] M. F. Huber, T. Bailey, H. Durrant-Whyte, and U. D. Hanebeck, “On entropy approxi- mation for gaussian mixture random vectors,” in 2008 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems. IEEE, 2008, pp. 181–188.
|