@dblp

Meta-learning of Exploration/Exploitation Strategies: The Multi-armed Bandit Case.

, , and . ICAART (Revised Selected Papers), volume 358 of Communications in Computer and Information Science, page 100-115. Springer, (2012)

Links and resources

Tags