Show simple item record

On the optimality of the Gittins index rule for multi-armed bandits with multiple plays

dc.contributor.authorPandelis, Dimitrios G.en_US
dc.contributor.authorTeneketzis, Demosthenisen_US
dc.date.accessioned2006-09-08T19:42:32Z
dc.date.available2006-09-08T19:42:32Z
dc.date.issued1999-12en_US
dc.identifier.citationPandelis, Dimitrios G.; Teneketzis, Demosthenis; (1999). "On the optimality of the Gittins index rule for multi-armed bandits with multiple plays." Mathematical Methods of Operations Research 50(3): 449-461. <http://hdl.handle.net/2027.42/41854>en_US
dc.identifier.issn1432-2994en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/41854
dc.description.abstractWe investigate the general multi-armed bandit problem with multiple servers. We determine a condition on the reward processes sufficient to guarantee the optimality of the strategy that operates at each instant of time the projects with the highest Gittins indices. We call this strategy the Gittins index rule for multi-armed bandits with multiple plays, or briefly the Gittins index rule. We show by examples that: (i) the aforementioned sufficient condition is not necessary for the optimality of the Gittins index rule; and (ii) when the sufficient condition is relaxed the Gittins index rule is not necessarily optimal. Finally, we present an application of the general results to the multiserver scheduling of parallel queues without arrivals.en_US
dc.format.extent115851 bytes
dc.format.extent3115 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypetext/plain
dc.language.isoen_US
dc.publisherSpringer-Verlag Berlin Heidelbergen_US
dc.subject.otherLegacyen_US
dc.subject.otherKey Words: Multi-armed Banditsen_US
dc.subject.otherGittins Indexen_US
dc.titleOn the optimality of the Gittins index rule for multi-armed bandits with multiple playsen_US
dc.typeArticleen_US
dc.subject.hlbsecondlevelIndustrial and Operations Engineeringen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.description.peerreviewedPeer Revieweden_US
dc.contributor.affiliationumDepartment of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI 48109-2122, USA (e-mail:teneket@eecs.umich.edu), US,en_US
dc.contributor.affiliationotherERIM International, Inc., P.O. Box 134001, Ann Arbor, MI 48113-4001, USA (e-mail: pandelis@erim-int.com), US,en_US
dc.contributor.affiliationumcampusAnn Arboren_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/41854/1/186-50-3-449_90500449.pdfen_US
dc.identifier.doihttp://dx.doi.org/10.1007/s001860050080en_US
dc.identifier.sourceMathematical Methods of Operations Researchen_US
dc.owningcollnameInterdisciplinary and Peer-Reviewed


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.