Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-Dependent Clustering in Exploration-Exploitation Algorithms., , , and . CoRR, (2015)A Polyhedral Approach for the Staff Rostering Problem., and . Manag. Sci., 50 (3): 381-393 (2004)The stable set polytope of claw-free graphs with large stability number., , and . Electron. Notes Discret. Math., (2010)On the Way to Perfection: Primal Operations for Stable Sets in Graphs., , , , and . The Sharpest Cut, volume 4 of MPS-SIAM series on optimization, SIAM, (2004)Beyond Logarithmic Bounds in Online Learning., , and . AISTATS, volume 22 of JMLR Proceedings, page 823-831. JMLR.org, (2012)Active Learning with Disagreement Graphs., , , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 1379-1387. PMLR, (2019)Measures to Address the Lack of Portability of the RF Fingerprints for Radiometric Identification., , , and . NTMS, page 1-5. IEEE, (2018)Delay and Cooperation in Nonstochastic Bandits., , , and . COLT, volume 49 of JMLR Workshop and Conference Proceedings, page 605-622. JMLR.org, (2016)Experiments with a hybrid interior point/combinatorial approach for network flow problems., and . Optim. Methods Softw., 22 (4): 573-585 (2007)Nonstochastic Bandits with Composite Anonymous Feedback., , , , and . J. Mach. Learn. Res., (2022)