-
1
-
-
84864970677
-
Best arm identification in multi-armed bandits
-
J.-Y. Audibert, S. Bubeck, and R. Munos. Best arm identification in multi-armed bandits. In COLT, 2010.
-
(2010)
COLT
-
-
Audibert, J.-Y.1
Bubeck, S.2
Munos, R.3
-
2
-
-
0036568025
-
Finite-time analysis of the multiarmed bandit problem
-
P. Auer, N. Cesa-Bianchi, and P. Fischer. Finite-time analysis of the multiarmed bandit problem. Machine learning, 47(2-3):235-256, 2002.
-
(2002)
Machine Learning
, vol.47
, Issue.2-3
, pp. 235-256
-
-
Auer, P.1
Cesa-Bianchi, N.2
Fischer, P.3
-
3
-
-
0037709910
-
The nonstochastic multiarmed bandit problem
-
P. Auer, N. Cesa-Bianchi, Y. Freund, and R. E. Schapire. The nonstochastic multiarmed bandit problem. SIAM Journal on Computing, 32(1):48-77, 2002.
-
(2002)
SIAM Journal on Computing
, vol.32
, Issue.1
, pp. 48-77
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.E.4
-
4
-
-
0000735685
-
Two theorems in graph theory
-
C. Berge. Two theorems in graph theory. PNAS, 1957.
-
(1957)
PNAS
-
-
Berge, C.1
-
5
-
-
84874045238
-
Regret analysis of stochastic and nonstochastic multi-armed bandit problems
-
S. Bubeck and N. Cesa-Bianchi. Regret analysis of stochastic and nonstochastic multi-armed bandit problems. Foundations and Trends in Machine Learning, 5:1-122, 2012.
-
(2012)
Foundations and Trends in Machine Learning
, vol.5
, pp. 1-122
-
-
Bubeck, S.1
Cesa-Bianchi, N.2
-
6
-
-
79952624396
-
Pure exploration in finitely-armed and continuous-armed bandits
-
S. Bubeck, R. Munos, and G. Stoltz. Pure exploration in finitely-armed and continuous-armed bandits. Theoretical Computer Science, 412:1832-1852, 2010.
-
(2010)
Theoretical Computer Science
, vol.412
, pp. 1832-1852
-
-
Bubeck, S.1
Munos, R.2
Stoltz, G.3
-
7
-
-
84887470752
-
Towards minimax policies for online linear optimization with bandit feedback
-
S. Bubeck, N. Cesa-bianchi, S. M. Kakade, S. Mannor, N. Srebro, and R. C. Williamson. Towards minimax policies for online linear optimization with bandit feedback. In COLT, 2012.
-
(2012)
COLT
-
-
Bubeck, S.1
Cesa-Bianchi, N.2
Kakade, S.M.3
Mannor, S.4
Srebro, N.5
Williamson, R.C.6
-
8
-
-
84897498871
-
Multiple identifications in multi-armed bandits
-
S. Bubeck, T. Wang, and N. Viswanathan. Multiple identifications in multi-armed bandits. In ICML, pages 258-265, 2013.
-
(2013)
ICML
, pp. 258-265
-
-
Bubeck, S.1
Wang, T.2
Viswanathan, N.3
-
9
-
-
84861620768
-
Combinatorial bandits
-
N. Cesa-Bianchi and G. Lugosi. Combinatorial bandits. JCSS, 78(5):1404-1422, 2012.
-
(2012)
JCSS
, vol.78
, Issue.5
, pp. 1404-1422
-
-
Cesa-Bianchi, N.1
Lugosi, G.2
-
10
-
-
84897515317
-
Combinatorial multi-armed bandit: General framework and applications
-
W. Chen, Y. Wang, and Y. Yuan. Combinatorial multi-armed bandit: General framework and applications. In ICML, pages 151-159, 2013.
-
(2013)
ICML
, pp. 151-159
-
-
Chen, W.1
Wang, Y.2
Yuan, Y.3
-
11
-
-
33745295134
-
Action elimination and stopping conditions for the multi-armed bandit and reinforcement learning problems
-
E. Even-Dar, S. Mannor, and Y. Mansour. Action elimination and stopping conditions for the multi-armed bandit and reinforcement learning problems. JMLR, 2006.
-
(2006)
JMLR
-
-
Even-Dar, E.1
Mannor, S.2
Mansour, Y.3
-
13
-
-
84877730309
-
Best arm identification: A unified approach to fixed budget and fixed confidence
-
V. Gabillon, M. Ghavamzadeh, and A. Lazaric. Best arm identification: A unified approach to fixed budget and fixed confidence. In NIPS, 2012.
-
(2012)
NIPS
-
-
Gabillon, V.1
Ghavamzadeh, M.2
Lazaric, A.3
-
14
-
-
84937875026
-
Thompson sampling for complex online problems
-
A. Gopalan, S. Mannor, and Y. Mansour. Thompson sampling for complex online problems. In ICML, pages 100-108, 2014.
-
(2014)
ICML
, pp. 100-108
-
-
Gopalan, A.1
Mannor, S.2
Mansour, Y.3
-
15
-
-
84901440623
-
Best-arm identification algorithms for multi-armed bandits in the fixed confidence setting
-
IEEE
-
K. Jamieson and R. Nowak. Best-arm identification algorithms for multi-armed bandits in the fixed confidence setting. In Information Sciences and Systems (CISS), pages 1-6. IEEE, 2014.
-
(2014)
Information Sciences and Systems (CISS)
, pp. 1-6
-
-
Jamieson, K.1
Nowak, R.2
-
16
-
-
84960170507
-
Lil'UCB: An optimal exploration algorithm for multi-armed bandits
-
K. Jamieson, M. Malloy, R. Nowak, and S. Bubeck. lil'UCB: An optimal exploration algorithm for multi-armed bandits. COLT, 2014.
-
(2014)
COLT
-
-
Jamieson, K.1
Malloy, M.2
Nowak, R.3
Bubeck, S.4
-
18
-
-
77956526578
-
Efficient selection of multiple bandit arms: Theory and practice
-
S. Kalyanakrishnan and P. Stone. Efficient selection of multiple bandit arms: Theory and practice. In ICML, pages 511-518, 2010.
-
(2010)
ICML
, pp. 511-518
-
-
Kalyanakrishnan, S.1
Stone, P.2
-
19
-
-
84867131498
-
PAC subset selection in stochastic multi-armed bandits
-
S. Kalyanakrishnan, A. Tewari, P. Auer, and P. Stone. PAC subset selection in stochastic multi-armed bandits. In ICML, pages 655-662, 2012.
-
(2012)
ICML
, pp. 655-662
-
-
Kalyanakrishnan, S.1
Tewari, A.2
Auer, P.3
Stone, P.4
-
20
-
-
84939611219
-
Information complexity in bandit subset selection
-
E. Kaufmann and S. Kalyanakrishnan. Information complexity in bandit subset selection. In COLT, 2013.
-
(2013)
COLT
-
-
Kaufmann, E.1
Kalyanakrishnan, S.2
-
21
-
-
84923299004
-
Matroid bandits: Fast combinatorial optimization with learning
-
B. Kveton, Z. Wen, A. Ashkan, H. Eydgahi, and B. Eriksson. Matroid bandits: Fast combinatorial optimization with learning. In UAI, 2014.
-
(2014)
UAI
-
-
Kveton, B.1
Wen, Z.2
Ashkan, A.3
Eydgahi, H.4
Eriksson, B.5
-
22
-
-
0002899547
-
Asymptotically efficient adaptive allocation rules
-
T. L. Lai and H. Robbins. Asymptotically efficient adaptive allocation rules. Advances in applied mathematics, 6(1):4-22, 1985.
-
(1985)
Advances in Applied Mathematics
, vol.6
, Issue.1
, pp. 4-22
-
-
Lai, T.L.1
Robbins, H.2
-
23
-
-
84919902752
-
Combinatorial partial monitoring game with linear feedback and its application
-
T. Lin, B. Abrahao, R. Kleinberg, J. Lui, and W. Chen. Combinatorial partial monitoring game with linear feedback and its application. In ICML, 2014.
-
(2014)
ICML
-
-
Lin, T.1
Abrahao, B.2
Kleinberg, R.3
Lui, J.4
Chen, W.5
-
24
-
-
30044441333
-
The sample complexity of exploration in the multi-armed bandit problem
-
S. Mannor and J. N. Tsitsiklis. The sample complexity of exploration in the multi-armed bandit problem. The Journal of Machine Learning Research, 5:623-648, 2004.
-
(2004)
The Journal of Machine Learning Research
, vol.5
, pp. 623-648
-
-
Mannor, S.1
Tsitsiklis, J.N.2
-
25
-
-
84898073198
-
The online loop-free stochastic shortest-path problem
-
G. Neu, A. György, and C. Szepesvári. The online loop-free stochastic shortest-path problem. In COLT, pages 231-243, 2010.
-
(2010)
COLT
, pp. 231-243
-
-
Neu, G.1
György, A.2
Szepesvári, C.3
-
27
-
-
34250634870
-
-
Manuscript, Yale University, Dept. of Statist., New Haven, Connecticut
-
D. Pollard. Asymptopia. Manuscript, Yale University, Dept. of Statist., New Haven, Connecticut, 2000.
-
(2000)
Asymptopia
-
-
Pollard, D.1
-
29
-
-
0003778293
-
-
John Wiley & Sons New York
-
S. M. Ross. Stochastic processes, Volume 2. John Wiley & Sons New York, 1996.
-
(1996)
Stochastic Processes
, vol.2
-
-
Ross, S.M.1
-
30
-
-
13944259535
-
Measuring ISP topologies with rocketfuel
-
N. Spring, R. Mahajan, and D. Wetherall. Measuring ISP topologies with rocketfuel. ACM SIGCOMM Computer Communication Review, 32(4):133-145, 2002.
-
(2002)
ACM SIGCOMM Computer Communication Review
, vol.32
, Issue.4
, pp. 133-145
-
-
Spring, N.1
Mahajan, R.2
Wetherall, D.3
-
31
-
-
84919921416
-
Optimal PAC multiple arm identification with applications to crowdsourcing
-
Y. Zhou, X. Chen, and J. Li. Optimal PAC multiple arm identification with applications to crowdsourcing. In ICML, 2014.
-
(2014)
ICML
-
-
Zhou, Y.1
Chen, X.2
Li, J.3
|