Author:
Chen Yuetao,Qiu Keni,Chen Li,Jia Haipeng,Zhang Yunquan,Xiao Limin,Liu Lei
Publisher
Springer Science and Business Media LLC
Subject
Information Systems,Hardware and Architecture,Computer Science Applications,Computer Science (miscellaneous)
Reference42 articles.
1. Agrawal, S., Goyal, N.: Thompson sampling for contextual bandits with linear payoffs (2012)
2. Arulraj, J., Pavlo, A.: How to build a non-volatile memory database management system. Proceedings of the 2017 ACM International Conference on Management of Data. SIGMOD ’17, pp. 1753–1758. Association for Computing Machinery, New York, NY, USA (2017). https://doi.org/10.1145/3035918.3054780
3. Azimi, R., Tam, D.K., Soares, L., Stumm, M.: Enhancing operating system support for multicore processors by using hardware performance monitoring. SIGOPS Oper. Syst. Rev. 43(2), 56–65 (2009). https://doi.org/10.1145/1531793.1531803
4. Auer, P.: Using confidence bounds for exploitation-exploration trade-offs. J. Mach. Learn. Res. 3(Nov), 397–422 (2002)
5. Ban, A.N.: Spearman correlation. (2019)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献