-
1
-
-
0345224411
-
The continuum-armed bandit problem
-
Agrawal R. The continuum-armed bandit problem. SIAM J. Control Optim. 33 (1995) 1926-1951
-
(1995)
SIAM J. Control Optim.
, vol.33
, pp. 1926-1951
-
-
Agrawal, R.1
-
2
-
-
0037709910
-
The nonstochastic multiarmed bandit problem
-
Auer P., Cesa-Bianchi N., Freund Y., and Schapire R. The nonstochastic multiarmed bandit problem. SIAM J. Comput. 32 1 (2002) 48-77
-
(2002)
SIAM J. Comput.
, vol.32
, Issue.1
, pp. 48-77
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.4
-
3
-
-
25844480881
-
-
B. Awerbuch, D. Holmer, H. Rubens, R. Kleinberg, Provably competitive adaptive routing, in: Proceedings of the 31st IEEE INFOCOM, vol. 1, Miami, 2005, pp. 631-641
-
-
-
-
4
-
-
4544345025
-
-
B. Awerbuch, R. Kleinberg, Adaptive routing with end-to-end feedback: Distributed learning and geometric approaches, in: Proceedings of the 36th ACM Symposium on Theory of Computing, Chicago, 2004, pp. 45-53
-
-
-
-
5
-
-
1142268836
-
-
B. Awerbuch, Y. Mansour, Adapting to a reliable network path, in: Proceedings of the 22nd Annual Symposium on Principles of Distributed Computing, Boston, 2003, pp. 360-367
-
-
-
-
6
-
-
84968497774
-
Sylverter's identity and multistep integers preserving Gaussian elimination
-
Bareiss E.H. Sylverter's identity and multistep integers preserving Gaussian elimination. Math. Comp. 22 (1968) 565-578
-
(1968)
Math. Comp.
, vol.22
, pp. 565-578
-
-
Bareiss, E.H.1
-
7
-
-
35448992997
-
-
J. Barnett, N. Srebro, Personal communication, February 2005
-
-
-
-
8
-
-
0002610737
-
On a routing problem
-
Bellman R. On a routing problem. Quart. Appl. Math. 16 1 (1958) 87-90
-
(1958)
Quart. Appl. Math.
, vol.16
, Issue.1
, pp. 87-90
-
-
Bellman, R.1
-
10
-
-
21844443150
-
An algebraic approach to practical and scalable overlay network monitoring
-
ACM Press, New York, NY
-
Chen Y., Bindel D., Song H., and Katz R.H. An algebraic approach to practical and scalable overlay network monitoring. SIGCOMM '04: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (2004), ACM Press, New York, NY 55-66
-
(2004)
SIGCOMM '04: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 55-66
-
-
Chen, Y.1
Bindel, D.2
Song, H.3
Katz, R.H.4
-
11
-
-
0004116989
-
-
MIT Press, Cambridge, MA
-
Cormen T.H., Leiserson C.E., Rivest R.L., and Stein C. Introduction to Algorithms. second ed. (2001), MIT Press, Cambridge, MA
-
(2001)
Introduction to Algorithms. second ed.
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
12
-
-
33244456637
-
-
V. Dani, T. Hayes, Robbing the bandit: Less regret in online geometric optimization against an adaptive adversary, in: Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithms, Miami, 2006, pp. 937-943
-
-
-
-
13
-
-
20744454447
-
-
A. Flaxman, A. Kalai, H.B. McMahan, Online convex optimization in the bandit setting: Gradient descent without a gradient, in: Proceedings of the 16th Annual ACM-SIAM Symposium on Discrete Algorithms, Vancouver, 2005, pp. 385-394
-
-
-
-
15
-
-
0031211090
-
A decision-theoretic generalization of on-line learning and an application to boosting
-
Freund Y., and Schapire R. A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. System Sci. 55 1 (1997) 119-139
-
(1997)
J. Comput. System Sci.
, vol.55
, Issue.1
, pp. 119-139
-
-
Freund, Y.1
Schapire, R.2
-
16
-
-
0002955623
-
A dynamic allocation index for the sequential design of experiments
-
Gani J., Sakadi K., and Vinczo I. (Eds), North-Holland, Amsterdam
-
Gittins J.C., and Jones D.M. A dynamic allocation index for the sequential design of experiments. In: Gani J., Sakadi K., and Vinczo I. (Eds). Progress in Statistics (1974), North-Holland, Amsterdam 241-266
-
(1974)
Progress in Statistics
, pp. 241-266
-
-
Gittins, J.C.1
Jones, D.M.2
-
17
-
-
0001976283
-
Approximation to Bayes risk in repeated play
-
Hannan J. Approximation to Bayes risk in repeated play. Contrib. Theory Games 3 (1957) 97-139
-
(1957)
Contrib. Theory Games
, vol.3
, pp. 97-139
-
-
Hannan, J.1
-
18
-
-
24644463787
-
Efficient algorithms for online decision problems
-
Kalai A., and Vempala S. Efficient algorithms for online decision problems. J. Comput. System Sci. 71 (2005) 291-307
-
(2005)
J. Comput. System Sci.
, vol.71
, pp. 291-307
-
-
Kalai, A.1
Vempala, S.2
-
19
-
-
84898981061
-
Nearly tight bounds for the continuum-armed bandit problem
-
Saul L.K., Weiss Y., and Bottou L. (Eds), MIT Press, Cambridge, MA
-
Kleinberg R. Nearly tight bounds for the continuum-armed bandit problem. In: Saul L.K., Weiss Y., and Bottou L. (Eds). Advances in Neural Information Processing Systems 17, Proceedings of NIPS 2004 (2005), MIT Press, Cambridge, MA 697-704
-
(2005)
Advances in Neural Information Processing Systems 17, Proceedings of NIPS 2004
, pp. 697-704
-
-
Kleinberg, R.1
-
20
-
-
0002899547
-
Asymptotically efficient adaptive allocations rules
-
Lai T.L., and Robbins H. Asymptotically efficient adaptive allocations rules. Adv. in Appl. Math. 6 (1985) 4-22
-
(1985)
Adv. in Appl. Math.
, vol.6
, pp. 4-22
-
-
Lai, T.L.1
Robbins, H.2
-
21
-
-
35148838877
-
The weighted majority algorithm
-
Littlestone N., and Warmuth M. The weighted majority algorithm. Inform. and Comput. 108 2 (1994) 212-260
-
(1994)
Inform. and Comput.
, vol.108
, Issue.2
, pp. 212-260
-
-
Littlestone, N.1
Warmuth, M.2
-
22
-
-
9444257628
-
Online geometric optimization in the bandit setting against an adaptive adversary
-
Proceedings of the 17th Annual Conference on Learning Theory, COLT, Springer-Verlag
-
McMahan H.B., and Blum A. Online geometric optimization in the bandit setting against an adaptive adversary. Proceedings of the 17th Annual Conference on Learning Theory, COLT. Lecture Notes in Comput. Sci. vol. 3120 (2004), Springer-Verlag 109-123
-
(2004)
Lecture Notes in Comput. Sci.
, vol.3120
, pp. 109-123
-
-
McMahan, H.B.1
Blum, A.2
-
23
-
-
0742269309
-
Computing the unmeasured: An algebraic approach to Internet mapping
-
Shavitt Y., Sun X., Wool A., and Yener B. Computing the unmeasured: An algebraic approach to Internet mapping. IEEE J. Select. Areas Commun. 22 1 (2004) 67-78
-
(2004)
IEEE J. Select. Areas Commun.
, vol.22
, Issue.1
, pp. 67-78
-
-
Shavitt, Y.1
Sun, X.2
Wool, A.3
Yener, B.4
-
24
-
-
3142657664
-
Path kernels and multiplicative updates
-
Takimoto E., and Warmuth M. Path kernels and multiplicative updates. J. Mach. Learn. Res. 4 (2003) 773-818
-
(2003)
J. Mach. Learn. Res.
, vol.4
, pp. 773-818
-
-
Takimoto, E.1
Warmuth, M.2
-
25
-
-
1942484421
-
-
M. Zinkevich, Online convex programming and generalized infinitesimal gradient ascent, in: Proceedings of the 20th International Conference on Machine Learning, 2003, pp. 928-936
-
-
-
|