Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Confidence-Based Algorithm for Structured Bandits., , and . AISTATS, volume 108 of Proceedings of Machine Learning Research, page 3175-3185. PMLR, (2020)Risk-Averse Trust Region Optimization for Reward-Volatility Reduction., , , , and . IJCAI, page 4583-4589. ijcai.org, (2020)Special Track on AI in FinTech.Policy gradient approaches for multi-objective sequential decision making., , , , and . IJCNN, page 2323-2330. IEEE, (2014)Piecewise constant reinforcement learning for robotic applications., , and . ICINCO-ICSO, page 214-221. INSTICC Press, (2007)978-972-8865-82-5.Equilibrium approximation in simulation-based extensive-form games., and . AAMAS, page 199-206. IFAAMAS, (2011)ARLO: A framework for Automated Reinforcement Learning., , , , and . Expert Syst. Appl., (August 2023)Best Arm Identification for Stochastic Rising Bandits., , , , and . CoRR, (2023)Exploiting History Data for Nonstationary Multi-armed Bandit., , , , , and . ECML/PKDD (1), volume 12975 of Lecture Notes in Computer Science, page 51-66. Springer, (2021)Budgeted Multi-Armed Bandit in Continuous Action Space., , , and . ECAI, volume 285 of Frontiers in Artificial Intelligence and Applications, page 560-568. IOS Press, (2016)Unsupervised Reinforcement Learning in Multiple Environments., , and . AAAI, page 7850-7858. AAAI Press, (2022)