Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graphical Models for Bandit Problems., , and . UAI, page 1-10. AUAI Press, (2011)Gradient Methods for Stackelberg Games., , and . UAI, AUAI Press, (2016)Online Learning and Profit Maximization from Revealed Preferences., , , , and . CoRR, (2014)Budgeted Prediction with Expert Advice., , , and . AAAI, page 2490-2496. AAAI Press, (2015)Threshold Bandits, With and Without Censored Feedback., , and . NIPS, page 4889-4897. (2016)Understanding the Effects of Batching in Online Active Learning., , , and . AISTATS, volume 108 of Proceedings of Machine Learning Research, page 3482-3492. PMLR, (2020)Large-Scale Bandit Problems and KWIK Learning., , , and . ICML (1), volume 28 of JMLR Workshop and Conference Proceedings, page 588-596. JMLR.org, (2013)Building an Integrated CBR-Big Data Oriented Architecture for Case-Based Reasoning Systems.. ICCBR (Workshops), volume 2028 of CEUR Workshop Proceedings, page 189-193. CEUR-WS.org, (2017)Budget Optimization for Sponsored Search: Censored Learning in MDPs., , , and . UAI, page 54-63. AUAI Press, (2012)Bounding User Contributions: A Bias-Variance Trade-off in Differential Privacy., , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 263-271. PMLR, (2019)