Author:
Deng Kun,Zheng Yaling,Bourke Chris,Scott Stephen,Masciale Julie
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference38 articles.
1. Abe, N., & Mamitsuka, H. (1998). Query learning strategies using boosting and bagging. In ICML ’98 Proceedings of the fifteenth international conference on machine learning (pp. 1–10).
2. Antos, A., Grover, V., & Szepesvári, C. (2008). Active learning in multi-armed bandits. In ALT ’08: Proceedings of the 19th international conference on algorithmic learning theory (pp. 287–302). Berlin: Springer.
3. Asuncion, A., & Newman, D. (2009). UCI machine learning repository. http://www.ics.uci.edu/~mlearn/MLRepository.html .
4. Auer, P., Cesa-Bianchi, N., & Fischer, P. (2002a). Finite-time analysis of the multiarmed bandit problem. Machine Learning, 47, 235–256.
5. Auer, P., Cesa-Bianchi, N., Freund, Y., & Schapire, R. E. (2002b). The non-stochastic multi-armed bandit problem. SIAM Journal on Computing, 32, 48–77.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献