41,929 research outputs found
One Kind of Multiple Dimensional Markovian BSDEs with Stochastic Linear Growth Generators
In this article, we deal with a multiple dimensional coupled Markovian BSDEs
system with stochastic linear growth generators with respect to volatility
processes. An existence result is provided by using approximation techniques.Comment: arXiv admin note: text overlap with arXiv:1412.121
Joint Trajectory and Communication Design for UAV-Enabled Multiple Access
Unmanned aerial vehicles (UAVs) have attracted significant interest recently
in wireless communication due to their high maneuverability, flexible
deployment, and low cost. This paper studies a UAV-enabled wireless network
where the UAV is employed as an aerial mobile base station (BS) to serve a
group of users on the ground. To achieve fair performance among users, we
maximize the minimum throughput over all ground users by jointly optimizing the
multiuser communication scheduling and UAV trajectory over a finite horizon.
The formulated problem is shown to be a mixed integer non-convex optimization
problem that is difficult to solve in general. We thus propose an efficient
iterative algorithm by applying the block coordinate descent and successive
convex optimization techniques, which is guaranteed to converge to at least a
locally optimal solution. To achieve fast convergence and stable throughput, we
further propose a low-complexity initialization scheme for the UAV trajectory
design based on the simple circular trajectory. Extensive simulation results
are provided which show significant throughput gains of the proposed design as
compared to other benchmark schemes.Comment: Submitted for possible publicatio
A Bandit Approach to Maximum Inner Product Search
There has been substantial research on sub-linear time approximate algorithms
for Maximum Inner Product Search (MIPS). To achieve fast query time,
state-of-the-art techniques require significant preprocessing, which can be a
burden when the number of subsequent queries is not sufficiently large to
amortize the cost. Furthermore, existing methods do not have the ability to
directly control the suboptimality of their approximate results with
theoretical guarantees. In this paper, we propose the first approximate
algorithm for MIPS that does not require any preprocessing, and allows users to
control and bound the suboptimality of the results. We cast MIPS as a Best Arm
Identification problem, and introduce a new bandit setting that can fully
exploit the special structure of MIPS. Our approach outperforms
state-of-the-art methods on both synthetic and real-world datasets.Comment: AAAI 201
- …
