Alert button
Picture for Zixian Yang

Zixian Yang

Alert button

Learning-Based Pricing and Matching for Two-Sided Queues

Add code
Bookmark button
Alert button
Mar 17, 2024
Zixian Yang, Lei Ying

Figure 1 for Learning-Based Pricing and Matching for Two-Sided Queues
Figure 2 for Learning-Based Pricing and Matching for Two-Sided Queues
Figure 3 for Learning-Based Pricing and Matching for Two-Sided Queues
Figure 4 for Learning-Based Pricing and Matching for Two-Sided Queues
Viaarxiv icon

Online Nonstochastic Control with Adversarial and Static Constraints

Add code
Bookmark button
Alert button
Feb 05, 2023
Xin Liu, Zixian Yang, Lei Ying

Figure 1 for Online Nonstochastic Control with Adversarial and Static Constraints
Figure 2 for Online Nonstochastic Control with Adversarial and Static Constraints
Figure 3 for Online Nonstochastic Control with Adversarial and Static Constraints
Figure 4 for Online Nonstochastic Control with Adversarial and Static Constraints
Viaarxiv icon

MaxWeight With Discounted UCB: A Provably Stable Scheduling Policy for Nonstationary Multi-Server Systems With Unknown Statistics

Add code
Bookmark button
Alert button
Sep 02, 2022
Zixian Yang, R. Srikant, Lei Ying

Figure 1 for MaxWeight With Discounted UCB: A Provably Stable Scheduling Policy for Nonstationary Multi-Server Systems With Unknown Statistics
Figure 2 for MaxWeight With Discounted UCB: A Provably Stable Scheduling Policy for Nonstationary Multi-Server Systems With Unknown Statistics
Figure 3 for MaxWeight With Discounted UCB: A Provably Stable Scheduling Policy for Nonstationary Multi-Server Systems With Unknown Statistics
Figure 4 for MaxWeight With Discounted UCB: A Provably Stable Scheduling Policy for Nonstationary Multi-Server Systems With Unknown Statistics
Viaarxiv icon

Exploration, Exploitation, and Engagement in Multi-Armed Bandits with Abandonment

Add code
Bookmark button
Alert button
May 26, 2022
Zixian Yang, Xin Liu, Lei Ying

Figure 1 for Exploration, Exploitation, and Engagement in Multi-Armed Bandits with Abandonment
Figure 2 for Exploration, Exploitation, and Engagement in Multi-Armed Bandits with Abandonment
Figure 3 for Exploration, Exploitation, and Engagement in Multi-Armed Bandits with Abandonment
Figure 4 for Exploration, Exploitation, and Engagement in Multi-Armed Bandits with Abandonment
Viaarxiv icon