From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.toke.dk (mail.toke.dk [IPv6:2001:470:dc45:1000::1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id AAD573B2A3 for ; Sun, 12 Feb 2017 16:00:12 -0500 (EST) Received: from mail.toke.dk (localhost.localdomain [127.0.0.1]) by mail.toke.dk (Postfix) with ESMTPS id 218E16EC49; Sun, 12 Feb 2017 22:00:11 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=toke.dk; s=20161023; t=1486933211; bh=QnKnAgZ2KzT33EMYNjFwko0mI3tHXk9/VjEFsplf+P8=; h=From:To:Cc:Subject:References:Date:In-Reply-To:From; b=iXg4Xcu2IRtSwIWzSuuQywHIYOBlJTLrlfuOpylPFU8uB8lDTQYQTcHWtjEIAnpxd WdNdzQxdvgYVSiLL8GBu2jgE3sG8GMSXF9r7pu2Gi1X4eNH7VXJq/7rSUqvbAWUBau IQOVX6E1537tWY5wmNixB8RqCKNfa42DBUZPUo2tj8+LiNrVIREQe7hPkGlv+EI+Gb 32oOyxdYPCSh4CdxHfDc0q7Yp41bRarLAaLMCNW08tvrlMVRhhD3tpyVcoDyijyj6k YytzRzDOYdkTC4my5pWR7yBK+o5DXEhQDbpHSS770iwR0HO9TleV4l65kpimrKnzLa DD4C7mm26D14Q== Received: by alrua-x1.borgediget.toke.dk (Postfix, from userid 1000) id 028871976A; Sun, 12 Feb 2017 22:00:10 +0100 (CET) From: =?utf-8?Q?Toke_H=C3=B8iland-J=C3=B8rgensen?= To: David Lang Cc: mab-wifi@lists.bufferbloat.net References: Date: Sun, 12 Feb 2017 22:00:10 +0100 In-Reply-To: (David Lang's message of "Sun, 12 Feb 2017 01:34:55 -0800 (PST)") X-Clacks-Overhead: GNU Terry Pratchett Message-ID: <8760kfrup1.fsf@toke.dk> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Subject: Re: [mab-wifi] please post starting info X-BeenThere: mab-wifi@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: Multi-armed-bandit WiFi rate control List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 12 Feb 2017 21:00:18 -0000 David Lang writes: > Please post links to what tests have been done, what the strategy is, > etc. As a starting point, see these two blog posts by Bj=C3=B6rn from a while back: http://www.openias.org/bayesian-wifi-rate-control and http://www.openias.org/bayesian-wifi-materials-and-methods And here's some prior work: https://people.kth.se/~alepro/pdf/infocom2014.pdf or https://arxiv.org/pdf/= 1307.7309.pdf And our github repository with a bit of data and a skeleton research paper (with only a few paragraphs of text thus far): https://github.com/bjornsing/bayesian-wifi And here are the algorithm implementations I was talking about: https://www.math.univ-toulouse.fr/~agarivie/Telecom/bandits/ -Toke