Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boosting word error rates., and . ICASSP (5), page 501-504. IEEE, (2005)Bandits Meet Mechanism Design to Combat Clickbait in Online Recommendation., , , and . CoRR, (2023)Near-optimal Optimistic Reinforcement Learning using Empirical Bernstein Inequalities., , and . CoRR, (2019)Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security., , and . ACM Conference on Computer and Communications Security, page 1702. ACM, (2015)Sparse Reward Processes. (2012)cite arxiv:1201.2555Comment: 15 pages, 2 figures.ABC Reinforcement Learning., and . ICML (3), volume 28 of JMLR Workshop and Conference Proceedings, page 684-692. JMLR.org, (2013)Algorithms and Bounds for Rollout Sampling Approximate Policy Iteration., and . EWRL, volume 5323 of Lecture Notes in Computer Science, page 27-40. Springer, (2008)Robust Bayesian Reinforcement Learning through Tight Lower Bounds.. EWRL, volume 7188 of Lecture Notes in Computer Science, page 177-188. Springer, (2011)Bayesian Fairness., , , and . AAAI, page 509-516. AAAI Press, (2019)On the Differential Privacy of Bayesian Inference., , and . AAAI, page 2365-2371. AAAI Press, (2016)