Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Concave Utility Reinforcement Learning with Zero-Constraint Violations., , and . Trans. Mach. Learn. Res., (2022)Stochastic Top K-Subset Bandits with Linear Space and Non-Linear Feedback with Applications to Social Influence Maximization., , , and . Trans. Data Sci., 2 (4): 38:1-38:39 (2021)Encoders and Decoders for Quantum Expander Codes Using Machine Learning., , and . CoRR, (2019)Statistical interconnect metrics for physical-design optimization., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 25 (7): 1273-1288 (2006)Multi-Agent Multi-Armed Bandits with Limited Communication., , and . CoRR, (2021)Learning-Based Online QoE Optimization in Multi-Agent Video Streaming., , , and . Algorithms, 15 (7): 227 (2022)Achieving Zero Constraint Violation for Constrained Reinforcement Learning via Primal-Dual Approach., , , , and . AAAI, page 3682-3689. AAAI Press, (2022)Escaping Saddle Points for Zeroth-order Non-convex Optimization using Estimated Gradient Descent., , and . CISS, page 1-6. IEEE, (2020)An explore-then-commit algorithm for submodular maximization under full-bandit feedback., , , , and . UAI, volume 180 of Proceedings of Machine Learning Research, page 1541-1551. PMLR, (2022)DART: aDaptive Accept RejecT for non-linear top-K subset identification., , , and . CoRR, (2020)