Picture for Manjesh K. Hanawal

Manjesh K. Hanawal

SplitEE: Early Exit in Deep Neural Networks with Split Computing

Add code
Sep 17, 2023
Viaarxiv icon

UB3: Best Beam Identification in Millimeter Wave Systems via Pure Exploration Unimodal Bandits

Add code
Dec 26, 2022
Viaarxiv icon

Unsupervised Early Exit in DNNs with Multiple Exits

Add code
Sep 20, 2022
Figure 1 for Unsupervised Early Exit in DNNs with Multiple Exits
Figure 2 for Unsupervised Early Exit in DNNs with Multiple Exits
Figure 3 for Unsupervised Early Exit in DNNs with Multiple Exits
Figure 4 for Unsupervised Early Exit in DNNs with Multiple Exits
Viaarxiv icon

Exploiting Side Information for Improved Online Learning Algorithms in Wireless Networks

Add code
Feb 16, 2022
Figure 1 for Exploiting Side Information for Improved Online Learning Algorithms in Wireless Networks
Figure 2 for Exploiting Side Information for Improved Online Learning Algorithms in Wireless Networks
Figure 3 for Exploiting Side Information for Improved Online Learning Algorithms in Wireless Networks
Figure 4 for Exploiting Side Information for Improved Online Learning Algorithms in Wireless Networks
Viaarxiv icon

Continuous Time Bandits With Sampling Costs

Add code
Jul 12, 2021
Figure 1 for Continuous Time Bandits With Sampling Costs
Figure 2 for Continuous Time Bandits With Sampling Costs
Figure 3 for Continuous Time Bandits With Sampling Costs
Viaarxiv icon

Federated Learning for Intrusion Detection in IoT Security: A Hybrid Ensemble Approach

Add code
Jun 25, 2021
Figure 1 for Federated Learning for Intrusion Detection in IoT Security: A Hybrid Ensemble Approach
Figure 2 for Federated Learning for Intrusion Detection in IoT Security: A Hybrid Ensemble Approach
Figure 3 for Federated Learning for Intrusion Detection in IoT Security: A Hybrid Ensemble Approach
Figure 4 for Federated Learning for Intrusion Detection in IoT Security: A Hybrid Ensemble Approach
Viaarxiv icon

Stochastic Multi-Armed Bandits with Control Variates

Add code
May 09, 2021
Figure 1 for Stochastic Multi-Armed Bandits with Control Variates
Figure 2 for Stochastic Multi-Armed Bandits with Control Variates
Figure 3 for Stochastic Multi-Armed Bandits with Control Variates
Figure 4 for Stochastic Multi-Armed Bandits with Control Variates
Viaarxiv icon

Censored Semi-Bandits for Resource Allocation

Add code
Apr 12, 2021
Figure 1 for Censored Semi-Bandits for Resource Allocation
Figure 2 for Censored Semi-Bandits for Resource Allocation
Figure 3 for Censored Semi-Bandits for Resource Allocation
Figure 4 for Censored Semi-Bandits for Resource Allocation
Viaarxiv icon

Learning to Optimize Energy Efficiency in Energy Harvesting Wireless Sensor Networks

Add code
Dec 30, 2020
Figure 1 for Learning to Optimize Energy Efficiency in Energy Harvesting Wireless Sensor Networks
Figure 2 for Learning to Optimize Energy Efficiency in Energy Harvesting Wireless Sensor Networks
Figure 3 for Learning to Optimize Energy Efficiency in Energy Harvesting Wireless Sensor Networks
Figure 4 for Learning to Optimize Energy Efficiency in Energy Harvesting Wireless Sensor Networks
Viaarxiv icon

Online Algorithm for Unsupervised Sequential Selection with Contextual Information

Add code
Oct 23, 2020
Figure 1 for Online Algorithm for Unsupervised Sequential Selection with Contextual Information
Figure 2 for Online Algorithm for Unsupervised Sequential Selection with Contextual Information
Figure 3 for Online Algorithm for Unsupervised Sequential Selection with Contextual Information
Figure 4 for Online Algorithm for Unsupervised Sequential Selection with Contextual Information
Viaarxiv icon