1. Balancing Exploration and Exploitation
2. IntentStreams
3. Beyond Relevance
4. Using confidence bounds for exploitation-exploration trade-off's;Auer P.;Journal of Machine Learning Research 3,2002
5. P. Auer N. Cesa-Bianchi and P. Fischer. 2002. Finite-time analysis of the multi- armed bandit problem. Machine learning 47 2--3 (2002) 235--256. 10.1023/A:1013689704352 P. Auer N. Cesa-Bianchi and P. Fischer. 2002. Finite-time analysis of the multi- armed bandit problem. Machine learning 47 2--3 (2002) 235--256. 10.1023/A:1013689704352