Author of the publication

Multi-armed bandit problems with dependent arms.

, , and . ICML, volume 227 of ACM International Conference Proceeding Series, page 721-728. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SURE: Robust, Explainable, and Fair Classification without Sensitive Attributes.. KDD, page 179-189. ACM, (2023)Mortal Multi-Armed Bandits., , , and . NIPS, page 273-280. Curran Associates, Inc., (2008)Threshold Conditions for Arbitrary Cascade Models on Arbitrary Networks., , , , and . ICDM, page 537-546. IEEE Computer Society, (2011)Mining broad latent query aspects from search sessions., , and . KDD, page 867-876. ACM, (2009)The paths more taken: matching DOM trees to search logs for accurate webpage clustering., and . WWW, page 211-220. ACM, (2010)Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint., , , and . SRDS, page 25-34. IEEE Computer Society, (2003)Consistent Nonparametric Methods for Network Assisted Covariate Estimation., , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 7435-7446. PMLR, (2021)Kronecker graphs: An approach to modeling networks, , , , and . The Journal of Machine Learning Research, (2010)Estimating Mixed Memberships with Sharp Eigenvector Deviations., , and . CoRR, (2017)Overlapping Clustering Models, and One (class) SVM to Bind Them All., , and . NeurIPS, page 2130-2140. (2018)