Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Approach on the Colon Wall Segmentation and Its' Application., , , , , , , , and . CARE@MICCAI, volume 8899 of Lecture Notes in Computer Science, page 34-45. Springer, (2014)Maintaining Equilibria During Exploration in Sponsored Search Auctions., , , and . WINE, volume 4858 of Lecture Notes in Computer Science, page 119-130. Springer, (2007)Scalable Bilinear π Learning Using State and Action Features., , and . CoRR, (2018)On the Prior Sensitivity of Thompson Sampling., and . CoRR, (2015)Evaluation of Explore-Exploit Policies in Multi-result Ranking Systems., , and . CoRR, (2015)Workshop summary: Results of the 2009 reinforcement learning competition., , , , and . ICML, volume 382 of ACM International Conference Proceeding Series, page 6. ACM, (2009)The adaptive k-meteorologists problem and its application to structure learning and feature selection in reinforcement learning., , and . ICML, volume 382 of ACM International Conference Proceeding Series, page 249-256. ACM, (2009)Analyzing feature generation for value-function approximation., , , and . ICML, volume 227 of ACM International Conference Proceeding Series, page 737-744. ACM, (2007)Toward Minimax Off-policy Value Estimation., , and . AISTATS, volume 38 of JMLR Workshop and Conference Proceedings, JMLR.org, (2015)Provably Optimal Algorithms for Generalized Linear Contextual Bandits., , and . ICML, volume 70 of Proceedings of Machine Learning Research, page 2071-2080. PMLR, (2017)