P. Auer, N. Cesa-bianchi, and P. Fischer, Finite time analysis of the multiarmed bandit problem, Machine Learning, vol.47, issue.2/3, pp.235-256, 2002.
DOI : 10.1023/A:1013689704352

D. Barry, J. Parlange, L. Li, H. Prommer, C. Cunningham et al., Analytical approximations for real values of the Lambert W-function, Mathematics and Computers in Simulation, vol.53, issue.1-2, pp.95-103, 2000.
DOI : 10.1016/S0378-4754(00)00172-5

A. N. Burnetas and M. N. Katehakis, Optimal Adaptive Policies for Sequential Allocation Problems, Advances in Applied Mathematics, vol.17, issue.2, pp.122-142, 1996.
DOI : 10.1006/aama.1996.0007

J. A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten, and V. Shmatikov, "You Might Also Like:" Privacy Risks of Collaborative Filtering, 2011 IEEE Symposium on Security and Privacy, pp.231-246, 2011.
DOI : 10.1109/SP.2011.40

T. H. Chan, E. Shi, and D. Song, Private and Continual Release of Statistics, Automata, Languages and Programming, pp.405-417, 2010.
DOI : 10.1145/2043621.2043626

W. Cowan, M. N. Katehakis, A. Mitrokotsa, and B. Rubinstein, Asymptotic behavior of minimal-exploration allocation policies: Almost sure, arbitrarily slow growing regret. arXiv preprint arXiv:1505.02865. Dimitrakakis Robust and private Bayesian inference, Algorithmic Learning Theory, 2014.

C. Dwork, R. , and A. , The Algorithmic Foundations of Differential Privacy, Foundations and Trends?? in Theoretical Computer Science, vol.9, issue.3-4, pp.211-407, 2013.
DOI : 10.1561/0400000042

C. Dwork, F. Mcsherry, K. Nissim, and A. Smith, Calibrating Noise to Sensitivity in Private Data Analysis, Proceedings of the Third Conference on Theory of Cryptography , TCC'06, pp.265-284, 2006.
DOI : 10.1007/11681878_14

C. Dwork, G. N. Rothblum, and S. Vadhan, Boosting and Differential Privacy, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp.51-60, 2010.
DOI : 10.1109/FOCS.2010.12

C. Dwork, Differential Privacy, ICALP, pp.1-12, 2006.
DOI : 10.1007/11787006_1

P. Jain, P. Kothari, and A. Thakurta, Differentially private online learning, COLT 2012 -The 25th Annual Conference on Learning Theory, pp.1-24, 2012.

A. Korolova, Privacy Violations Using Microtargeted Ads: A Case Study, 2010 IEEE International Conference on Data Mining Workshops, pp.474-482, 2010.
DOI : 10.1109/ICDMW.2010.137

T. L. Lai and H. Robbins, Asymptotically efficient adaptive allocation rules, Advances in Applied Mathematics, vol.6, issue.1, pp.4-22, 1985.
DOI : 10.1016/0196-8858(85)90002-8