Advanced search
Showing result 1 - 5 of 89 swedish dissertations matching the above criteria.
-
1. Machine Learning for Wireless Link Adaptation : Supervised and Reinforcement Learning Theory and Algorithms
Abstract : Wireless data communication is a complex phenomenon. Wireless links encounter random, time-varying, channel effects that are challenging to predict and compensate. Hence, to optimally utilize the channel, wireless links adapt the data transmission parameters in real time. READ MORE
-
2. Systematic Data-Driven Continual Self-Learning
Abstract : There is a lot of unexploited potential in using data-driven and self-learning methods to dramatically improve automatic decision-making and control in complex industrial systems. So far, and on a relatively small scale, these methods have demonstrated some potential to achieve performance gains for the automated tuning of complex distributed systems. READ MORE
-
3. Efficient Communication via Reinforcement Learning
Abstract : Why do languages partition mental concepts into words the way the do? Recent works have taken a information-theoretic view on human language and suggested that it is shaped by the need for efficient communication. This means that human language is shaped by a simultaneous pressure for being informative, while also being simple in order to minimize the cognitive load. READ MORE
-
4. Reliable and Efficient Distributed Machine Learning
Abstract : With the ever-increasing penetration and proliferation of various smart Internet of Things (IoT) applications, machine learning (ML) is envisioned to be a key technique for big-data-driven modelling and analysis. Since massive data generated from these IoT devices are commonly collected and stored in a distributed manner, ML at the networks, e.g. READ MORE
-
5. Robust and Efficient Federated Learning for IoT Security
Abstract : The widespread adoption of Internet of Things (IoT) devices has led to substantial progress across various industrial sectors, including healthcare, transportation, and manufacturing. However, these devices also introduce significant security vulnerabilities because they are often deployed without adequate security measures, making them susceptible to cyber threats. READ MORE