-
1
-
-
0036568025
-
Finite-time analysis of the multiarmed bandit problem
-
DOI 10.1023/A:1013689704352, Computational Learning Theory
-
Auer, P.; Cesa-Bianchi, N.; and Fischer, P. 2002. Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2-3):235-256. (Pubitemid 34126111)
-
(2002)
Machine Learning
, vol.47
, Issue.2-3
, pp. 235-256
-
-
Auer, P.1
Cesa-Bianchi, N.2
Fischer, P.3
-
2
-
-
84863406076
-
Mortal multi-armed bandits
-
Chakrabarti, D.; Kumar, R.; Radlinski, F.; and Upfal, E. 2008. Mortal multi-armed bandits. In Neural Information Processing Systems, 273-280.
-
(2008)
Neural Information Processing Systems
, pp. 273-280
-
-
Chakrabarti, D.1
Kumar, R.2
Radlinski, F.3
Upfal, E.4
-
3
-
-
33748336500
-
A survey of web information extraction systems
-
Chang, C.; Kayed, M.; Girgis, M.; Shaalan, K.; et al. 2006. A survey of web information extraction systems. IEEE transactions on knowledge and data engineering 18(10):1411.
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.10
, pp. 1411
-
-
Chang, C.1
Kayed, M.2
Girgis, M.3
Shaalan, K.4
-
4
-
-
84856196261
-
Link prediction in social networks using computationally efficient topological features
-
IEEE
-
Fire, M.; Tenenboim, L.; Lesser, O.; Puzis, R.; Rokach, L.; and Elovici, Y. 2011. Link prediction in social networks using computationally efficient topological features. In Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom), 73-80. IEEE.
-
(2011)
Privacy, Security, Risk and Trust (Passat), 2011 Ieee Third International Conference on and 2011 Ieee Third International Conference on Social Computing (Socialcom)
, pp. 73-80
-
-
Fire, M.1
Tenenboim, L.2
Lesser, O.3
Puzis, R.4
Rokach, L.5
Elovici, Y.6
-
6
-
-
84863926971
-
Universal web pages content parser
-
of Communications in Computer and Information Science. Springer Berlin Heidelberg
-
Pawlas, P.; Domanski, A.; and Domanska, J. 2012. Universal web pages content parser. In Computer Networks, volume 291 of Communications in Computer and Information Science. Springer Berlin Heidelberg. 130-138.
-
(2012)
Computer Networks
, vol.291
, pp. 130-138
-
-
Pawlas, P.1
Domanski, A.2
Domanska, J.3
-
7
-
-
84893549814
-
Some aspects of the sequential design of experiments
-
Springer
-
Robbins, H. 1985. Some aspects of the sequential design of experiments. In Herbert Robbins Selected Papers. Springer. 169-177.
-
(1985)
Herbert Robbins Selected Papers
, pp. 169-177
-
-
Robbins, H.1
-
8
-
-
34248003261
-
Structural equivalence: Meaning and definition, computation and application
-
Sailer, L. D. 1978. Structural equivalence: Meaning and definition, computation and application. Social Networks 1 (1):73-90.
-
(1978)
Social Networks
, vol.1
, Issue.1
, pp. 73-90
-
-
Sailer, L.D.1
-
9
-
-
84898895187
-
Target oriented network intelligence collection for the social web
-
Stem, R.; Samama, L.; Puzis, R.; Felner, A.; Bnaya, Z.; and Beja, T. 2013. Target oriented network intelligence collection for the social web. In AAAI AIW.
-
(2013)
AAAI AIW
-
-
Stem, R.1
Samama, L.2
Puzis, R.3
Felner, A.4
Bnaya, Z.5
Beja, T.6
-
10
-
-
78650756423
-
A combination approach to web user profiling
-
Tang, J.; Yao, L.; Zhang, D.; and Zhang, J. 2010. A combination approach to web user profiling. ACM Trans. Knowl. Discov. Data 5(1):2:1-2:44.
-
(2010)
ACM Trans. Knowl. Discov. Data
, vol.5
, Issue.1
-
-
Tang, J.1
Yao, L.2
Zhang, D.3
Zhang, J.4
-
12
-
-
0001043843
-
Restless bandits: Activity allocation in a changing world
-
Whittle, P. 1988. Restless bandits: Activity allocation in a changing world. Journal of applied probability 287-298.
-
(1988)
Journal of Applied Probability
, pp. 287-298
-
-
Whittle, P.1
|