Author of the publication

Arm Space Decomposition as a Strategy for Tackling Large Scale Multi-armed Bandit Problems.

, , and . ICMLA (1), page 252-257. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of an Algorithm for Concurrency Control in Replicated Database Systems., and . SIGMETRICS, page 159-169. ACM, (1986)Study of Network Dynamics., , and . Computer Networks and ISDN Systems, 26 (3): 371-378 (1993)O(N * sqrt(N)) Decentralized Commit Protocols., and . Symposium on Reliability in Distributed Software and Database Systems, page 104-110. IEEE Computer Society, (1986)A Token-Based Resiliency Control Scheme in Replicated Database Systems., and . Symposium on Reliability in Distributed Software and Database Systems, page 199-206. IEEE Computer Society, (1986)An Accurate Technique for Measuring the Wireless Side of Wireless Networks., , and . WiTMeMo, USENIX Association, (2013)Schedulability-Oriented Replication of Periodic Tasks in Distributed Real-Time Systems., , and . ICDCS, page 196-203. IEEE Computer Society, (1995)A Comparative Evaluation of Local Area Communication Technology., , and . SIGMETRICS Perform. Evaluation Rev., 10 (2): 37-47 (1981)Parametric Real-time Scheduling in Distributes Environments., and . PDPTA, page 796-802. CSREA Press, (2002)Handling Samples Correlation in the Horus System., and . INFOCOM, page 1023-1031. IEEE, (2004)Models of Memory Scheduling., and . SOSP, page 217-222. ACM, (1975)Operating System Review 9(5), Special Issue.