Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning of Depth Two Neural Networks with Constant Fan-In at the Hidden Nodes (Extended Abstract)., , , and . COLT, page 333-343. ACM, (1996)PAC-Bayes-Bernstein Inequality for Martingales and its Application to Multiarmed Bandits, , , , and . CoRR, (2011)PAC-Bayesian Analysis of the Exploration-Exploitation Trade-off, , , , , and . CoRR, (2011)Workshop summary: On-line learning with limited feedback., , , , , and . ICML, volume 382 of ACM International Conference Proceeding Series, page 8. ACM, (2009)On-Line Learning of Rectangles in Noisy Environments.. COLT, page 253-261. ACM, (1993)Upper-Confidence-Bound Algorithms for Active Learning in Multi-armed Bandits., , , , and . ALT, volume 6925 of Lecture Notes in Computer Science, page 189-203. Springer, (2011)Achieving Optimal Dynamic Regret for Non-stationary Bandits without Prior Information., , , , , , and . COLT, volume 99 of Proceedings of Machine Learning Research, page 159-163. PMLR, (2019)Learning with Malicious Noise.. Encyclopedia of Algorithms, Springer, (2008)Pareto Front Identification from Stochastic Bandit Feedback., , , and . AISTATS, volume 51 of JMLR Workshop and Conference Proceedings, page 939-947. JMLR.org, (2016)Autonomous exploration for navigating in non-stationary CMPs., , , and . CoRR, (2019)