Building on previous expertise of the investigators on loss networks and multi-armed bandits respectively, we investigate how to allocate resources to requests so that the weighted proportion of denied requests is minimized.
Building on previous expertise of the investigators on loss networks and multi-armed bandits respectively, we investigate how to allocate resources to requests so that the weighted proportion of denied requests is minimized.