Author:
Paruchuri Praveen,Gujar Sujit
Publisher
Springer International Publishing
Reference64 articles.
1. Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2–3), 235–256 (2002)
2. Babaioff, M., Kleinberg, R.D., Slivkins, A.: Truthful mechanisms with implicit payment computation. In: Eleventh ACM Conference on Electronic Commerce, pp. 43–52. ACM (2010)
3. Babaioff, M., Sharma, Y., Slivkins, A.: Characterizing truthful multi-armed bandit mechanisms: extended abstract. In: Tenth ACM Conference on Electronic Commerce, pp. 79–88. ACM (2009)
4. Basilico, N., Gatti, N., Amigoni., F.: Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In: AAMAS, pp. 57–64 (2009)
5. Brown, G., Carlyle, M., Salmeron, J., Wood., K.: Defending critical infrastructure. Interfaces 36(6), 530–544 (2006)