1. [n.d.]. The network simulator --- ns2. http://www.isi.edu/nsnam/ns/. [n.d.]. The network simulator --- ns2. http://www.isi.edu/nsnam/ns/.
2. Delayed information and action in on-line algorithms
3. N. Andelman Y. Mansour and A. Zhu. 2003. Competitive queueing policies for QoS switches. In SODA. 761--770. N. Andelman Y. Mansour and A. Zhu. 2003. Competitive queueing policies for QoS switches. In SODA. 761--770.
4. J. Audibert and S. Bubeck. 2010. Best Arm Identification in Multi-Armed Bandits. In COLT. https://www.microsoft.com/en-us/research/publication/best-arm-identification-multi-armed-bandits/ J. Audibert and S. Bubeck. 2010. Best Arm Identification in Multi-Armed Bandits. In COLT. https://www.microsoft.com/en-us/research/publication/best-arm-identification-multi-armed-bandits/
5. Exploration–exploitation tradeoff using variance estimates in multi-armed bandits