From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Beyond myopic inference in big data pipelines., , , и . KDD, стр. 86-94. ACM, (2013)Counterfactual Risk Minimization: Learning from Logged Bandit Feedback., и . ICML, том 37 из JMLR Workshop and Conference Proceedings, стр. 814-823. JMLR.org, (2015)Deep Learning with Logged Bandit Feedback., , и . ICLR (Poster), OpenReview.net, (2018)Improved Image Wasserstein Attacks and Defenses., , , и . CoRR, (2020)REVEAL 2020: Bandit and Reinforcement Learning from User Interactions., , , , , и . RecSys, стр. 628-629. ACM, (2020)Unbiased Ranking Evaluation on a Budget., , и . WWW (Companion Volume), стр. 935-937. ACM, (2015)Temporal corpus summarization using submodular word coverage., , , и . CIKM, стр. 754-763. ACM, (2012)Metareasoning in Modular Software Systems: On-the-Fly Configuration using Reinforcement Learning with Rich Contextual Representations., , , , , , и . CoRR, (2019)Large-scale Validation of Counterfactual Learning Methods: A Test-Bed., , , , и . CoRR, (2016)Provably Good Batch Off-Policy Reinforcement Learning Without Great Exploration., , , и . NeurIPS, (2020)