Improved Algorithms for Linear Stochastic Bandits, Neural Information Processing Systems, 2011. ,
Competing in the Dark: An Efficient Algorithm for Bandit Linear Optimization, Conference on Learning Theory, 2008. ,
From Bandits to Experts: A Tale of Domination and Independence, NIPS, 2013. ,
Using confidence bounds for exploitationexploration trade-offs, Journal of Machine Learning Research, vol.3, pp.397-422, 2002. ,
Improved Regret Bounds for the Stochastic Multi-Armed Bandit Problem, Periodica Mathematica Hungarica, 2010. ,
Weighted sums of certain dependent random variables, Tohoku Mathematical Journal, vol.19, issue.3, pp.357-367, 1967. ,
DOI : 10.2748/tmj/1178243286
Emergence of scaling in random networks, Science, vol.286, issue.11, 1999. ,
Regularization and Semi-Supervised Learning on Large Graphs, Conference on Learning Theory, 2004. ,
Manifold Regularization: A Geometric Framework for Learning from Labeled and Unlabeled Examples, Journal of Machine Learning Research, vol.7, pp.2399-2434, 2006. ,
A learning agent for wireless news access, Proceedings of the 5th international conference on Intelligent user interfaces , IUI '00, pp.33-36, 2000. ,
DOI : 10.1145/325737.325768
Xarmed bandits, Journal of Machine Learning Research, vol.12, pp.1587-1627, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00450235
Towards minimax policies for online linear optimization with bandit feedback, COLT, 2012. ,
Leveraging Side Observations in Stochastic Bandits, Uncertainty in Artificial Intelligence, pp.142-151, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-01270324
A Gang of Bandits, NIPS, 2013. ,
Apolo, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, 2011. ,
DOI : 10.1145/1978942.1978967
Contextual Bandits with Linear Payoff Functions, AISTATS, 2011. ,
Stochastic Linear Optimization under Bandit Feedback, The 21st Annual Conference on Learning Theory, 2008. ,
Parallelizing Exploration-Exploitation Tradeoffs with Gaussian Process Bandit Optimization, ICML, 2012. ,
A matrix factorization technique with trust propagation for recommendation in social networks, Proceedings of the fourth ACM conference on Recommender systems, RecSys '10, 2010. ,
DOI : 10.1145/1864708.1864736
Recommender Systems: An Introduction, 2010. ,
DOI : 10.1017/CBO9780511763113
Matrix Completion from a Few Entries, IEEE International Symposium on Information Theory, pp.324-328, 2009. ,
Multi-armed bandit problems in metric spaces, 40th ACM symposium on Theory Of Computing, 2008. ,
Combinatorial preconditioners and multilevel solvers for problems in computer vision and image processing, Computer Vision and Image Understanding, vol.115, issue.12, pp.1638-1646, 2011. ,
DOI : 10.1016/j.cviu.2011.05.013
A contextual-bandit approach to personalized news article recommendation, Proceedings of the 19th international conference on World wide web, WWW '10, 2010. ,
DOI : 10.1145/1772690.1772758
Birds of a Feather: Homophily in Social Networks, Annual Review of Sociology, vol.27, issue.1, pp.415-444, 2001. ,
DOI : 10.1146/annurev.soc.27.1.415
A Variant of Azuma's Inequality for Martingales with Subgaussian Tails. CoRR, abs, 1110. ,
Contextual Bandits with Similarity Information, Proceedings of the 24th annual Conference On Learning Theory, pp.1-27, 2009. ,
Gaussian Process Optimization in the Bandit Setting: No Regret and Experimental Design, Proceedings of International Conference on Machine Learning, 2010. ,
Finite-Time Analysis of Kernelised Contextual Bandits, Uncertainty in Artificial Intelligence, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00826946
The Schur complement and its applications, 2005. ,
DOI : 10.1007/b105056
Semi-Supervised Learning Literature Survey, 2008. ,