Author of the publication

Generic Exploration and K-armed Voting Bandits.

, , , and . ICML (2), volume 28 of JMLR Workshop and Conference Proceedings, page 91-99. JMLR.org, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LISTEN: A System for Locating and Tracking Individual Speakers., , , , , , and . FG, page 283-288. IEEE Computer Society, (1996)Reinforcement Learning Algorithm Selection., and . ICLR (Poster), OpenReview.net, (2018)Generic Exploration and K-armed Voting Bandits., , , and . ICML (2), volume 28 of JMLR Workshop and Conference Proceedings, page 91-99. JMLR.org, (2013)Une méthode d'interprétation de scores., and . EGC, volume RNTI-E-9 of Revue des Nouvelles Technologies de l'Information, page 191-192. Cépaduès-Éditions, (2007)Reinforcement Learning Techniques for Optimized Channel Hopping in IEEE 802.15.4-TSCH Networks., , , , , and . MSWiM, page 99-107. ACM, (2018)Massive multi-player multi-armed bandits for IoT networks: An application on LoRa networks., , , , and . Ad Hoc Networks, (December 2023)Contact personalization using a score understanding method., , and . IJCNN, page 649-654. IEEE, (2008)Driven Forward Features Selection: A Comparative Study on Neural Networks., and . ICONIP (2), volume 4233 of Lecture Notes in Computer Science, page 693-702. Springer, (2006)Toward Skills Dialog Orchestration with Online Learning., , , , , and . ICASSP, page 3600-3604. IEEE, (2021)Horizontal Scaling in Cloud Using Contextual Bandits., , , , and . Euro-Par, volume 12820 of Lecture Notes in Computer Science, page 285-300. Springer, (2021)