Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid-ε-greedy for Mobile Context-Aware Recommender System., , and . PAKDD (1), volume 7301 of Lecture Notes in Computer Science, page 468-479. Springer, (2012)How can AI Automate End-to-End Data Science?, , , , , , , , , and 2 other author(s). CoRR, (2019)Survey on Applications of Multi-Armed and Contextual Bandits., , and . CEC, page 1-8. IEEE, (2020)Using multi-armed bandits to learn ethical priorities for online AI systems., , , and . IBM J. Res. Dev., 63 (4/5): 1:1-1:13 (2019)Linear Upper Confident Bound with Missing Reward: Online Learning with Less Data., , and . IJCNN, page 1-6. IEEE, (2022)Toward Optimal Solution for the Context-Attentive Bandit Problem., , , , and . IJCAI, page 3493-3500. ijcai.org, (2021)SupervisorBot: NLP-Annotated Real-Time Recommendations of Psychotherapy Treatment Strategies with Deep Reinforcement Learning., , and . IJCAI, page 7149-7153. ijcai.org, (2023)Double-Linear Thompson Sampling for Context-Attentive Bandits., , , , and . ICASSP, page 3450-3454. IEEE, (2021)Online Hyper-Parameter Tuning for the Contextual Bandit., and . ICASSP, page 3445-3449. IEEE, (2021)Optimal Exploitation of Clustering and History Information in Multi-armed Bandit., , , and . IJCAI, page 2016-2022. ijcai.org, (2019)