Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving Near-Optimal Individual Regret & Low Communications in Multi-Agent Bandits., , , , , , and . ICLR, OpenReview.net, (2023)Contextual Combinatorial Bandits with Probabilistically Triggered Arms., , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 22559-22593. PMLR, (2023)Spatial outlier detection: random walk based approaches., , and . GIS, page 370-379. ACM, (2010)Human-in-the-loop online just-in-time software defect prediction., , , , and . CoRR, (2023)A spatio-temporal-textual crime search engine., , and . GIS, page 528-529. ACM, (2010)Batch-Size Independent Regret Bounds for Combinatorial Semi-Bandits with Probabilistically Triggered Arms or Independent Arms., , , , , and . NeurIPS, (2022)Analysis for Smart Urban Management Event Based on SARIMA and Spatiotemporal Clustering., , and . ICBDR, page 182-186. ACM, (2018)Mutant reduction evaluation: what is there and what is missing?, , , , , , , , and . CoRR, (2021)Learning With Guarantee Via Constrained Multi-Armed Bandit: Theory and Network Applications., , , and . IEEE Trans. Mob. Comput., 22 (9): 5346-5358 (September 2023)Federated Contextual Cascading Bandits with Asynchronous Communication and Heterogeneous Users., , , , , , and . AAAI, page 20596-20603. AAAI Press, (2024)