Author of the publication

Pure exploration in finitely-armed and continuous-armed bandits.

, , and . Theor. Comput. Sci., 412 (19): 1832-1852 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Local Profiles of Trees., and . J. Graph Theory, 81 (2): 109-119 (2016)A law of robustness for two-layers neural networks., , and . CoRR, (2020)A note on the Bayesian regret of Thompson Sampling with an arbitrary prior, and . CoRR, (2013)X-Armed Bandits, , , and . CoRR, (2010)Kernel-based methods for bandit convex optimization., , and . CoRR, (2016)Multi-scale Online Learning: Theory and Applications to Online Auctions and Pricing., , , and . J. Mach. Learn. Res., (2019)Towards Minimax Policies for Online Linear Optimization with Bandit Feedback., , and . COLT, volume 23 of JMLR Proceedings, page 41.1-41.14. JMLR.org, (2012)The entropic barrier: a simple and optimal universal self-concordant barrier., and . COLT, volume 40 of JMLR Workshop and Conference Proceedings, page 279. JMLR.org, (2015)Most Correlated Arms Identification., and . COLT, volume 35 of JMLR Workshop and Conference Proceedings, page 623-637. JMLR.org, (2014)Bandit Convex Optimization: \(T\) Regret in One Dimension., , , and . COLT, volume 40 of JMLR Workshop and Conference Proceedings, page 266-278. JMLR.org, (2015)