Author of the publication

Best-arm identification algorithms for multi-armed bandits in the fixed confidence setting.

, and . CISS, page 1-6. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparing human-centric and robot-centric sampling for robot deep learning from demonstrations., , , , , , , and . ICRA, page 358-365. IEEE, (2017)Nearly Optimal Algorithms for Level Set Estimation., , , , , and . AISTATS, volume 151 of Proceedings of Machine Learning Research, page 7625-7658. PMLR, (2022)Best Arm Identification with Safety Constraints., , and . AISTATS, volume 151 of Proceedings of Machine Learning Research, page 9114-9146. PMLR, (2022)Mosaic: A Sample-Based Database System for Open World Query Processing., , , , , and . CoRR, (2019)Sparse Dueling Bandits., , , and . AISTATS, volume 38 of JMLR Workshop and Conference Proceedings, JMLR.org, (2015)Best-of-K-bandits., , and . COLT, volume 49 of JMLR Workshop and Conference Proceedings, page 1440-1489. JMLR.org, (2016)Top Arm Identification in Multi-Armed Bandits with Batch Arm Pulls., , , and . AISTATS, volume 51 of JMLR Workshop and Conference Proceedings, page 139-148. JMLR.org, (2016)A framework for Multi-A(rmed)/B(andit) Testing with Online FDR Control., , , and . NIPS, page 5957-5966. (2017)Query Complexity of Derivative-Free Optimization., , and . NIPS, page 2681-2689. (2012)Training a support vector machine to classify signals in a real environment given clean training data., , , and . ICASSP, page 2214-2217. IEEE, (2010)