Chinese Restaurant Game
نویسندگان
چکیده
منابع مشابه
Choose Early or Choose Wisely - A Chinese Restaurant Game Approach
Agents in a network often face situations requiring them to make decisions without sufficient information. In such situations, they may postpone their decisions in order to observe and collect more information through learning from other agents. In this paper, we discuss the advantages of the postponement strategy from a gametheoretic perspective. We propose an extension to Chinese Restaurant G...
متن کاملNotes 18 : Chinese Restaurant Process
We begin with a proof of the ESF. This is essentially Kingman’s proof (understanding ESF was the main motivation for his introduction of the coalescent). Proof: Let Π be the partition generated by the infinite-alleles model on n sample. We call each set in Π a cluster. Assume there are k clusters. Looking backwards in time, to obtain Π it must be that each cluster undergoes a sequence of coales...
متن کاملDistance dependent Chinese restaurant processes
We develop the distance dependent Chinese restaurant process, a flexible class of distributions over partitions that allows for dependencies between the elements. This class can be used to model many kinds of dependencies between data in infinite clustering models, including dependencies arising from time, space, and network connectivity. We examine the properties of the distance dependent CRP,...
متن کاملChinese Restaurant Game - Part I: Theory of Learning with Negative Network Externality
In a social network, agents are intelligent and have the capability to make decisions to maximize their utilities. They can either make wise decisions by taking advantages of other agents’ experiences through learning, or make decisions earlier to avoid competitions from huge crowds. Both these two effects, social learning and negative network externality, play important roles in the decision p...
متن کاملA Chinese restaurant game for learning and decision making in cognitive radio networks
In cognitive radio networks, secondary users (SUs) are allowed to opportunistically exploit the licensed channels. Once finding the spectrum holes, SUs need to share the available licensed channels. Therefore, one of the critical challenges for fully utilizing the spectrum resources is how the SUs obtain accurate information about the primary users’ (PUs’) activities and make right decisions on...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Signal Processing Letters
سال: 2012
ISSN: 1070-9908,1558-2361
DOI: 10.1109/lsp.2012.2225425