Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How can AI Automate End-to-End Data Science?, , , , , , , , , and 2 other author(s). CoRR, (2019)Survey on Applications of Multi-Armed and Contextual Bandits., , and . CEC, page 1-8. IEEE, (2020)Hybrid-ε-greedy for Mobile Context-Aware Recommender System., , and . PAKDD (1), volume 7301 of Lecture Notes in Computer Science, page 468-479. Springer, (2012)Using multi-armed bandits to learn ethical priorities for online AI systems., , , and . IBM J. Res. Dev., 63 (4/5): 1:1-1:13 (2019)Toward Optimal Solution for the Context-Attentive Bandit Problem., , , , and . IJCAI, page 3493-3500. ijcai.org, (2021)SupervisorBot: NLP-Annotated Real-Time Recommendations of Psychotherapy Treatment Strategies with Deep Reinforcement Learning., , and . IJCAI, page 7149-7153. ijcai.org, (2023)Online Hyper-Parameter Tuning for the Contextual Bandit., and . ICASSP, page 3445-3449. IEEE, (2021)Double-Linear Thompson Sampling for Context-Attentive Bandits., , , , and . ICASSP, page 3450-3454. IEEE, (2021)Linear Upper Confident Bound with Missing Reward: Online Learning with Less Data., , and . IJCNN, page 1-6. IEEE, (2022)Optimal Exploitation of Clustering and History Information in Multi-armed Bandit., , , and . IJCAI, page 2016-2022. ijcai.org, (2019)