共 37 条
- [1] Thompson WR., On the likelihood that one unknown probability exceeds another in view of the evidence of two samples, Biometrika, 25, 3–4, pp. 285-294, (1933)
- [2] Wang LM, Huang HK, Chai YM., Choosing multi-issue negotiating object based on trust and K-armed bandit problem, Ruan Jian Xue Bao/Journal of Software, 17, 12, pp. 2537-2546, (2006)
- [3] Li LH, Chu W, Langford J, Schapire RE., A contextual-bandit approach to personalized news article recommendation, Proc. of the 19th Int’l Conf. on World Wide Web, pp. 661-670, (2010)
- [4] Bnaya Z, Puzis R, Stern R, Felner A., Bandit algorithms for social network queries, Proc. of the 2013 Int’l Conf. on Social Computing, pp. 148-153, (2013)
- [5] Chen W, Wang YJ, Yuan Y., Combinatorial multi-armed bandit: General framework, results and applications, Proc. of the 30th Int’l Conf. on Machine Learning, pp. 151-159, (2013)
- [6] Lai TL, Robbins H., Asymptotically efficient adaptive allocation rules, Advances in Applied Mathematics, 6, 1, pp. 4-22, (1985)
- [7] Auer P, Cesa-Bianchi N, Fischer P., Finite-time analysis of the multiarmed bandit problem, Machine Learning, 47, 2–3, pp. 235-256, (2002)
- [8] Mannor S, Shamir O., From bandits to experts: On the value of side-observations, Proc. of the 24th Int’l Conf. on Neural Information Processing Systems, pp. 684-692, (2011)
- [9] Alon N, Cesa-Bianchi N, Gentile C, Mannor S, Mansour Y, Shamir O., Nonstochastic multi-armed bandits with graph-structured feedback, SIAM Journal on Computing, 46, 6, pp. 1785-1826, (2017)
- [10] Caron S, Kveton B, Lelarge M, Bhagat S., Leveraging side observations in stochastic bandits, Proc. of the 28th Conf. on Uncertainty in Artificial Intelligence, pp. 142-151, (2012)