Search Results for author: William Chang

Found 6 papers, 1 papers with code

Finite-Time Frequentist Regret Bounds of Multi-Agent Thompson Sampling on Sparse Hypergraphs

1 code implementation24 Dec 2023 Tianyuan Jin, Hao-Lun Hsu, William Chang, Pan Xu

Specifically, we assume there is a local reward for each hyperedge, and the reward of the joint arm is the sum of these local rewards.

Computational Efficiency Thompson Sampling

Optimal Cooperative Multiplayer Learning Bandits with Noisy Rewards and No Communication

no code implementations10 Nov 2023 William Chang, Yuanhao Lu

Based on the actions selected by all players, the team of players receives a reward.

Bode Integral Limitation For Irrational Systems

no code implementations20 Nov 2022 William Chang, Fariba Ariaei, Edmond Jonckheere

Bode integrals of sensitivity and sensitivity-like functions along with complementary sensitivity and complementary sensitivity-like functions are conventionally used for describing performance limitations of a feedback control system.

Approximation Capabilities of Neural Networks using Morphological Perceptrons and Generalizations

no code implementations16 Jul 2022 William Chang, Hassan Hamad, Keith M. Chugg

Furthermore, we consider proposed signed-max-sum and max-star-sum generalizations of morphological ANNs and show that these variants also do not have universal approximation capabilities.

Online Learning for Cooperative Multi-Player Multi-Armed Bandits

no code implementations7 Sep 2021 William Chang, Mehdi Jafarnia-Jahromi, Rahul Jain

For the first setting, we propose a UCB-inspired algorithm that achieves $O(\log T)$ regret whether the rewards are IID or Markovian.

Multi-Armed Bandits

Toward Automatic Threat Recognition for Airport X-ray Baggage Screening with Deep Convolutional Object Detection

no code implementations13 Dec 2019 Kevin J Liang, John B. Sigman, Gregory P. Spell, Dan Strellis, William Chang, Felix Liu, Tejas Mehta, Lawrence Carin

We show performance of our models on held-out evaluation sets, analyze several design parameters, and demonstrate the potential of such systems for automated detection of threats that can be found in airports.

object-detection Object Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.