Finite time analysis of the multiarmed bandit problem, Machine Learning, vol.47, issue.2/3, pp.235-256, 2002. ,
DOI : 10.1023/A:1013689704352
Analytical approximations for real values of the Lambert W-function, Mathematics and Computers in Simulation, vol.53, issue.1-2, pp.95-103, 2000. ,
DOI : 10.1016/S0378-4754(00)00172-5
Optimal Adaptive Policies for Sequential Allocation Problems, Advances in Applied Mathematics, vol.17, issue.2, pp.122-142, 1996. ,
DOI : 10.1006/aama.1996.0007
"You Might Also Like:" Privacy Risks of Collaborative Filtering, 2011 IEEE Symposium on Security and Privacy, pp.231-246, 2011. ,
DOI : 10.1109/SP.2011.40
Private and Continual Release of Statistics, Automata, Languages and Programming, pp.405-417, 2010. ,
DOI : 10.1145/2043621.2043626
Asymptotic behavior of minimal-exploration allocation policies: Almost sure, arbitrarily slow growing regret. arXiv preprint arXiv:1505.02865. Dimitrakakis Robust and private Bayesian inference, Algorithmic Learning Theory, 2014. ,
The Algorithmic Foundations of Differential Privacy, Foundations and Trends?? in Theoretical Computer Science, vol.9, issue.3-4, pp.211-407, 2013. ,
DOI : 10.1561/0400000042
Calibrating Noise to Sensitivity in Private Data Analysis, Proceedings of the Third Conference on Theory of Cryptography , TCC'06, pp.265-284, 2006. ,
DOI : 10.1007/11681878_14
Boosting and Differential Privacy, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp.51-60, 2010. ,
DOI : 10.1109/FOCS.2010.12
Differential Privacy, ICALP, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Differentially private online learning, COLT 2012 -The 25th Annual Conference on Learning Theory, pp.1-24, 2012. ,
Privacy Violations Using Microtargeted Ads: A Case Study, 2010 IEEE International Conference on Data Mining Workshops, pp.474-482, 2010. ,
DOI : 10.1109/ICDMW.2010.137
Asymptotically efficient adaptive allocation rules, Advances in Applied Mathematics, vol.6, issue.1, pp.4-22, 1985. ,
DOI : 10.1016/0196-8858(85)90002-8