Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatial outlier detection: random walk based approaches., , and . GIS, page 370-379. ACM, (2010)Contextual Combinatorial Bandits with Probabilistically Triggered Arms., , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 22559-22593. PMLR, (2023)Achieving Near-Optimal Individual Regret & Low Communications in Multi-Agent Bandits., , , , , , and . ICLR, OpenReview.net, (2023)Combinatorial Multivariant Multi-Armed Bandits with Applications to Episodic Reinforcement Learning and Beyond., , , , , , , , , and . CoRR, (2024)Analysis for Smart Urban Management Event Based on SARIMA and Spatiotemporal Clustering., , and . ICBDR, page 182-186. ACM, (2018)Spatial categorical outlier detection: pair correlation function based approach., , and . GIS, page 465-468. ACM, (2011)Robust Prediction and Outlier Detection for Spatial Datasets., , and . ICDM, page 469-478. IEEE Computer Society, (2012)Online Competitive Influence Maximization., , , , and . AISTATS, volume 151 of Proceedings of Machine Learning Research, page 11472-11502. PMLR, (2022)Cost-Effective Online Multi-LLM Selection with Versatile Reward Models., , , , and . CoRR, (2024)Federated Contextual Cascading Bandits with Asynchronous Communication and Heterogeneous Users., , , , , , and . AAAI, page 20596-20603. AAAI Press, (2024)