From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Beyond myopic inference in big data pipelines., , , и . KDD, стр. 86-94. ACM, (2013)Deep Learning with Logged Bandit Feedback., , и . ICLR (Poster), OpenReview.net, (2018)Counterfactual Risk Minimization: Learning from Logged Bandit Feedback., и . ICML, том 37 из JMLR Workshop and Conference Proceedings, стр. 814-823. JMLR.org, (2015)Improved Image Wasserstein Attacks and Defenses., , , и . CoRR, (2020)REVEAL 2020: Bandit and Reinforcement Learning from User Interactions., , , , , и . RecSys, стр. 628-629. ACM, (2020)Unbiased Ranking Evaluation on a Budget., , и . WWW (Companion Volume), стр. 935-937. ACM, (2015)How to Solve Contextual Goal-Oriented Problems with Offline Datasets?, , , , и . CoRR, (2024)Large-scale Validation of Counterfactual Learning Methods: A Test-Bed., , , , и . CoRR, (2016)Counterfactual Risk Minimization., и . WWW (Companion Volume), стр. 939-941. ACM, (2015)Metareasoning in Modular Software Systems: On-the-Fly Configuration using Reinforcement Learning with Rich Contextual Representations., , , , , , и . CoRR, (2019)