暂无分享,去创建一个
[1] Axthonv G. Oettinger,et al. IEEE Transactions on Information Theory , 1998 .
[2] Robert M Thrall,et al. Mathematics of Operations Research. , 1978 .
[3] C. L. Nikias,et al. Signal processing with fractional lower order moments: stable processes and their applications , 1993, Proc. IEEE.
[4] Shipra Agrawal,et al. Further Optimal Regret Bounds for Thompson Sampling , 2012, AISTATS.
[5] R. Munos,et al. Kullback–Leibler upper confidence bounds for optimal sequential allocation , 2012, 1210.1136.
[6] Benjamin Van Roy,et al. Learning to Optimize via Posterior Sampling , 2013, Math. Oper. Res..
[7] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[8] Lihong Li,et al. An Empirical Evaluation of Thompson Sampling , 2011, NIPS.
[9] Sattar Vakili,et al. Deterministic Sequencing of Exploration and Exploitation for Multi-Armed Bandit Problems , 2011, IEEE Journal of Selected Topics in Signal Processing.
[10] Michael R. Lyu,et al. Almost Optimal Algorithms for Linear Stochastic Bandits with Heavy-Tailed Payoffs , 2018, NeurIPS.
[11] S. Godsill,et al. Bayesian inference for time series with heavy-tailed symmetric α-stable noise processes , 1999 .
[12] Andres Muñoz Medina,et al. No-Regret Algorithms for Heavy-Tailed Linear Bandits , 2016, ICML.
[13] Kaiming He,et al. Exploring the Limits of Weakly Supervised Pretraining , 2018, ECCV.
[14] M. West. On scale mixtures of normal distributions , 1987 .
[15] J. Nolan,et al. Modeling financial data with stable distributions , 2003 .
[16] A. Lee Swindlehurst,et al. IEEE Journal of Selected Topics in Signal Processing Inaugural Issue: [editor-in-chief's message] , 2007, J. Sel. Topics Signal Processing.
[17] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[18] Shipra Agrawal,et al. Analysis of Thompson Sampling for the Multi-armed Bandit Problem , 2011, COLT.
[19] Michael I. Jordan,et al. Advances in Neural Information Processing Systems 30 , 1995 .
[20] Ravi Kumar,et al. A characterization of online browsing behavior , 2010, WWW '10.
[21] W. R. Thompson. ON THE LIKELIHOOD THAT ONE UNKNOWN PROBABILITY EXCEEDS ANOTHER IN VIEW OF THE EVIDENCE OF TWO SAMPLES , 1933 .
[22] Rémi Munos,et al. Thompson Sampling for 1-Dimensional Exponential Family Bandits , 2013, NIPS.
[23] John C. Frain. Studies on the application of the alpha-stable distribution in economics , 2009 .
[24] Nicolò Cesa-Bianchi,et al. Bandits With Heavy Tail , 2012, IEEE Transactions on Information Theory.
[25] Carey L. Williamson,et al. A tale of the tails: Power-laws in internet measurements , 2013, IEEE Network.
[26] P. Carr,et al. The Finite Moment Log Stable Process and Option Pricing , 2003 .
[27] Michael R. Lyu,et al. Pure Exploration of Multi-Armed Bandits with Heavy-Tailed Payoffs , 2018, UAI.
[28] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[29] C. Mallows,et al. A Method for Simulating Stable Random Variables , 1976 .
[30] K. Roeder,et al. Journal of the American Statistical Association: Comment , 2006 .
[31] F. e.. Calcul des Probabilités , 1889, Nature.
[32] M. Taqqu,et al. Financial Risk and Heavy Tails , 2003 .
[33] Juliana Freire,et al. Proceedings of the 19th international conference on World wide web , 2010, WWW 2010.
[34] Bin Yu,et al. Artificial intelligence and statistics , 2018, Frontiers of Information Technology & Electronic Engineering.