Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Observe Before Play: Multi-armed Bandit with Pre-observations., , and . CoRR, (2019)RF-Rhythm: Secure and Usable Two-Factor RFID Authentication., , , , , , , , and . INFOCOM, page 2194-2203. IEEE, (2020)SmartWAZ: Design and Implementation of a Smart WiFi Access System Assisted by Zigbee., , and . IEEE Access, (2019)The Online Pause and Resume Problem: Optimal Algorithms and An Application to Carbon-Aware Load Shifting., , , , , , and . CoRR, (2023)Hierarchical Conversational Preference Elicitation with Bandit Feedback., , , , , and . CIKM, page 2827-2836. ACM, (2022)Datanet: Enabling Seamless, Metered and Trusted Internet Connectivity without Subscriptions., , , , and . ICC Workshops, page 1-6. IEEE, (2021)Contextual Combinatorial Bandits with Probabilistically Triggered Arms., , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 22559-22593. PMLR, (2023)CoRAST: Towards Foundation Model-Powered Correlated Data Analysis in Resource-Constrained CPS and IoT., , , , and . CoRR, (2024)Learning-enabled Networked Systems.. SIGMETRICS Perform. Evaluation Rev., 51 (3): 66-69 (January 2024)Batch-Size Independent Regret Bounds for Combinatorial Semi-Bandits with Probabilistically Triggered Arms or Independent Arms., , , , , and . NeurIPS, (2022)