Author of the publication

Linear Bandits in Unknown Environments.

, , and . ECML/PKDD (2), volume 9852 of Lecture Notes in Computer Science, page 282-298. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Text Segmentation to Enhance the Cluster Hypothesis., , , and . AIMSA, volume 5253 of Lecture Notes in Computer Science, page 69-82. Springer, (2008)A Neural Tangent Kernel Perspective of GANs., , , , , and . CoRR, (2021)Fairness without the Sensitive Attribute via Causal Variational Autoencoder., , and . IJCAI, page 696-702. ijcai.org, (2022)Grounding Large Language Models in Interactive Environments with Online Reinforcement Learning., , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 3676-3713. PMLR, (2023)Stochastic Latent Residual Video Prediction., , , , and . ICML, volume 119 of Proceedings of Machine Learning Research, page 3233-3246. PMLR, (2020)Discriminative Adversarial Search for Abstractive Summarization., , , , and . ICML, volume 119 of Proceedings of Machine Learning Research, page 8555-8564. PMLR, (2020)Exact and Efficient Temporal Steering of Software Behavioral Model Inference., , , and . ICECCS, page 166-175. IEEE Computer Society, (2014)Improving Robustness of Deep Reinforcement Learning Agents: Environment Attack based on the Critic Network., , and . IJCNN, page 1-8. IEEE, (2022)On Evaluation Methodologies for Text Segmentation Algorithms., , , and . ICTAI (2), page 19-26. IEEE Computer Society, (2007)0-7695-3015-X.IRnator: A Framework for Discovering Users Needs from Sets of Suggestions., , and . ICTIR, page 138-143. ACM, (2022)