Top-keXtremeContextualBanditswithArmHierarchyRajatSen1AlexanderRakhlin23LexingYing43RahulKidambi3DeanFoster3DanielHill3InderjitS.Dhillon53Abstract1.IntroductionMotivatedbymodernapplications,suchaso...
ProbabilisticSequentialShrinking:ABestArmIdentificationAlgorithmforStochasticBanditswithCorruptionsZixinZhong1WangChiCheung23VincentY.F.Tan134Abstractofoptions,sayL=10,todesignanear-optimalvaccine....
BestArmIdentificationinGraphicalBilinearBanditsGeovaniRizk12AlbertThomas2IgorColin2RidaLaraki13YannChevaleyre1Abstractagent(e.g.,alltheconfigurationparametersoftheantennas),andreceivesanassociatedg...
RobustOutlierArmIdentificationYinglunZhu1SumeetKatariya2RobertNowak1Abstractobservedvalues,thebanditalgorithmhastodecidewhichitemtosampleateverytimet,soastoidentifytheoptimalWestudytheproblemofRobu...
BestArmIdentificationforCascadingBanditsintheFixedConfidenceSettingZixinZhong1WangChiCheung23VincentY.F.Tan134Abstractnextoneotherwise.Thisprocessstopswhensheclicksononeiteminthelistorifnoitemiscli...
FeasibleArmIdentificationJulianKatz-Samuels1ClaytonScott1AbstractagoodArmaremulti-dimensionalinnature.Forexam-ple,incrowdsourcingitisimportanttodistinguishgoodWeintroducethefeasibleArmidentificatio...
BestArmIdentificationinLinearBanditswithLinearDimensionDependencyChaoTao1Sau´lA.Blanco1YuanZhou123Abstract2017a;2014;Kalyanakrishnan&Stone,2010;Zhouetal.,2014)).WestudythebestArmidentificationprob...