Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatial outlier detection: random walk based approaches., , and . GIS, page 370-379. ACM, (2010)Achieving Near-Optimal Individual Regret & Low Communications in Multi-Agent Bandits., , , , , , and . ICLR, OpenReview.net, (2023)Contextual Combinatorial Bandits with Probabilistically Triggered Arms., , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 22559-22593. PMLR, (2023)Human-in-the-loop online just-in-time software defect prediction., , , , and . CoRR, (2023)Batch-Size Independent Regret Bounds for Combinatorial Semi-Bandits with Probabilistically Triggered Arms or Independent Arms., , , , , and . NeurIPS, (2022)A spatio-temporal-textual crime search engine., , and . GIS, page 528-529. ACM, (2010)Learning With Guarantee Via Constrained Multi-Armed Bandit: Theory and Network Applications., , , and . IEEE Trans. Mob. Comput., 22 (9): 5346-5358 (September 2023)Analysis for Smart Urban Management Event Based on SARIMA and Spatiotemporal Clustering., , and . ICBDR, page 182-186. ACM, (2018)Mutant reduction evaluation: what is there and what is missing?, , , , , , , , and . CoRR, (2021)Federated Contextual Cascading Bandits with Asynchronous Communication and Heterogeneous Users., , , , , , and . AAAI, page 20596-20603. AAAI Press, (2024)