We consider the stochastic contextual bandit problem under the high dimensional linear model. We focus on the case where the action space is finite and random, with each action associated with a ra…
The weighted nearest neighbors (WNN) estimator has been popularly used as a flexible and easy-to-implement nonparametric tool for mean regression estimation. The bagging technique is an elegant way…
Problem definition: In many resource scheduling problems for services with scheduled starting and completion times (e.g., airport gate assignment), a common approach is to maintain appropriate buff…
We have theoretically investigated the polarization-dependent ultrashort pulse amplification in erbium-doped fluoride fibers. The numerical model is based on the coupled generalized nonlinear SchrÃ…
To adapt to the new characteristics of communication traffic distribution, a detection scheme suitable for medium-to-short-reach optical communication system is urgently needed. The receiver should…
There has recently been a surge on the methodological development for optimal individualized treatment rule (ITR) estimation. The standard methods in the literature are designed to maximize the pot…
Decoy-state method has greatly filled in loopholes from multi-photon pulses in the field of quantum key distribution (QKD) and it has been employed in almost all practical QKD systems in recent yea…
Nowadays, the demand for high-speed information transmission is increasing rapidly. Visible light communication (VLC) based on light-emitting diodes (LEDs) is supposed as a potential candidate for …
As the broadband applications continue rising, the solutions of high-speed passive optical network (PON) with large power budget are highly desired. Direct detection scheme combined with digital si…
In order to improve the fabrication robustness of the inverse-designed devices that have complex topology structures, we propose an optimization technique, named as structure transformation (ST), t…