Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Last Switch Dependent Bandits with Monotone Payoff Functions., , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 10265-10284. PMLR, (2023)Contextual Pandora's Box., , , , and . AAAI, page 10944-10952. AAAI Press, (2024)Non-Stationary Bandits under Recharging Payoffs: Improved Planning with Sublinear Regret., , and . NeurIPS, (2022)Asymptotically-Optimal Gaussian Bandits with Side Observations., , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 1057-1077. PMLR, (2022)Contextual Blocking Bandits., , , and . CoRR, (2020)Recurrent Submodular Welfare and Matroid Blocking Semi-Bandits., and . NeurIPS, page 23334-23346. (2021)A constant-factor approximation for generalized malleable scheduling under $M ^$-concave processing speeds., , and . Math. Program., 206 (1): 515-539 (July 2024)Learning To Maximize Welfare with a Reusable Resource., , , and . SIGMETRICS (Abstracts), page 111-112. ACM, (2022)Malleable scheduling beyond identical machines., , and . J. Sched., 26 (5): 425-442 (October 2023)Combinatorial Blocking Bandits with Stochastic Delays., , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 404-413. PMLR, (2021)