Improved algorithms for linear stochastic bandits, Neural Information Processing Systems, p.9, 2011. ,
Thompson sampling for contextual bandits with linear payoffs, International Conference on Machine Learning, p.18, 2013. ,
Fast randomized kernel methods with statistical guarantees, Neural Information Processing Systems, 2015. ,
Online learning with feedback graphs: Beyond bandits, Conference on Learning Theory, pp.24-34, 2015. ,
Nonstochastic multi-armed bandits with graph-structured feedback, 2014. ,
From bandits to experts: A tale of domination and independence, Neural Information Processing Systems, pp.26-28, 2013. ,
Diversified utility maximization for recommendations, Conference on Recommender Systems, 2014. ,
Minimax policies for adversarial and stochastic bandits, Conference on Learning Theory, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00834882
Regret in Online Combinatorial Optimization, Mathematics of Operations Research, vol.39, issue.1, pp.31-45, 2014. ,
DOI : 10.1287/moor.2013.0598
Best arm identification in multi-armed bandits, Conference on Learning Theory, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00654404
Using confidence bounds for exploitation-exploration trade-offs, In: Journal of Machine Learning Research, vol.3, issue.19, pp.397-422, 2002. ,
Finite-time analysis of the multiarmed bandit problem, Machine Learning 47.2-3, pp.235-256, 2002. ,
The nonstochastic multi-armed bandit problem, In: Journal on Computing, vol.321, issue.27, pp.48-77, 2002. ,
UCB revisited: Improved regret bounds for the stochastic multi-armed bandit problem, Periodica Mathematica Hungarica, vol.5, issue.1-2, 2010. ,
DOI : 10.1007/s10998-010-3055-6
Online Stochastic Optimization under Correlated Bandit Feedback, International Conference on Machine Learning, pp.63-67, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01080138
Weighted sums of certain dependent random variables, Tohoku Mathematical Journal, vol.19, issue.3, pp.357-367, 1967. ,
DOI : 10.2748/tmj/1178243286
Learning from Neighbours, Review of Economic Studies, vol.65, issue.3, pp.595-621, 1998. ,
DOI : 10.1111/1467-937X.00059
Online influence maximization in non-stationary Social Networks, 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 2016. ,
DOI : 10.1109/IWQoS.2016.7590438
Emergence of scaling in random networks, Science, vol.286, pp.11-37, 1999. ,
Partial Monitoring???Classification, Regret Bounds, and Algorithms, Mathematics of Operations Research, vol.39, issue.4, pp.967-997, 2014. ,
DOI : 10.1287/moor.2014.0663
Minimax regret of finite partial-monitoring games in stochastic environments, Conference on Learning Theory, 2011. ,
Regularization and semi-supervised learning on large graphs, Conference on Learning Theory, 2004. ,
Manifold regularization: A geometric framework for learning from labeled and unlabeled examples, Journal of Machine Learning Research, vol.7, pp.2399-2434, 2006. ,
Bandit problems with infinitely many arms, The Annals of Statistics, vol.25, issue.5, pp.2103-2116, 1997. ,
DOI : 10.1214/aos/1069362389
Introduction to linear optimization, Athena Scientific, 1997. ,
A learning agent for wireless news access, Proceedings of the 5th international conference on Intelligent user interfaces , IUI '00, 2000. ,
DOI : 10.1145/325737.325768
Social network search as a volatile multi-armed bandit problem, Human Journal 2.2, pp.84-98, 2013. ,
Two-target algorithms for infinite-armed bandits with Bernoulli rewards, Neural Information Processing Systems, pp.71-75, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00920045
Pure exploration in finitely-armed and continuous-armed bandits, Theoretical Computer Science 412, pp.1832-1852, 2011. ,
DOI : 10.1016/j.tcs.2010.12.059
URL : https://hal.archives-ouvertes.fr/hal-00609550
Stochastic bandits with side observations on networks, International Conference on Measurement and Modeling of Computer Systems, p.33, 2014. ,
Adaptive-treed bandits, Bernoulli 21, pp.2289-2307, 2015. ,
DOI : 10.3150/14-BEJ644SUPP
Optimal Adaptive Policies for Sequential Allocation Problems, Advances in Applied Mathematics, vol.17, issue.2, pp.122-142, 1996. ,
DOI : 10.1006/aama.1996.0007
Analysis of Nyström method with sequential ridge leverage scores, In: Uncertainty in Artificial Intelligence, 2016. ,
Leveraging side observations in stochastic bandits, In: Uncertainty in Artificial Intelligence, vol.39, p.33, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-01270324
Simple regret for infinitely many armed bandits, International Conference on Machine Learning, pp.74-76, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01153538
Challenging the empirical mean and empirical variance: A deviation study, Annales de l'Institut Henri Poincaré, Probabilités et Statistiques, pp.1148-1185, 2012. ,
DOI : 10.1214/11-AIHP454
URL : https://hal.archives-ouvertes.fr/hal-00517206
Delay and cooperation in nonstochastic bandits, Conference on Learning Theory, 2016. ,
A gang of bandits, Neural Information Processing Systems, pp.20-39, 2013. ,
Prediction, learning, and games, 2006. ,
DOI : 10.1017/CBO9780511546921
Apolo, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, 2011. ,
DOI : 10.1145/1978942.1978967
Scalable influence maximization for prevalent viral marketing in large-scale social networks, Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '10, 2010. ,
DOI : 10.1145/1835804.1835934
Combinatorial multi-armed bandit and its extension to probabilistically triggered arms, Journal of Machine Learning Research, vol.17, 2016. ,
Contextual bandits with linear payoff functions, International Conference on Artificial Intelligence and Statistics, pp.19-51, 2011. ,
Online learning with feedback graphs without the graphs, International Conference on Machine Learning, 2016. ,
Unimodal bandits: Regret lower bounds and optimal algorithms, International Conference on Machine Learning, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01092662
Stochastic process bandits: Upper confidence bounds algorithms via generic chaining, 2016. ,
Bandit algorithms for tree search, In: Uncertainty in Artificial Intelligence, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00150207
Efficient Selectivity and Backup Operators in Monte-Carlo Tree Search, Computers and games 4630, pp.72-83, 2007. ,
DOI : 10.1007/978-3-540-75538-8_7
URL : https://hal.archives-ouvertes.fr/inria-00116992
Parallelizing exploration-exploitation tradeoffs in Gaussian process bandit optimization, International Conference on Machine Learning, 2012. ,
Submodular Functions, Matroids, and Certain Polyhedra, Combinatorial Structures and Their Applications, pp.69-87, 1970. ,
DOI : 10.1007/3-540-36478-1_2
Rules of Thumb for Social Learning, Journal of Political Economy, vol.101, issue.4, pp.612-643, 1993. ,
DOI : 10.1086/261890
On random graphs, In: Publicationes Mathematicae, vol.6, pp.290-297, 1959. ,
Networked bandits with disjoint linear payoffs, Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '14, 2014. ,
DOI : 10.1145/2623330.2623672
Multistage campaigning in social networks, Neural Information Processing Systems, 2016. ,
Submodular functions and optimization. Annals of discrete mathematics, 2005. ,
Adaptive submodular maximization in bandit setting, Neural Information Processing Systems, 2013. ,
Combinatorial Network Optimization With Unknown Variables: Multi-Armed Bandits With Linear Rewards and Individual Observations, IEEE/ACM Transactions on Networking, vol.20, issue.5, pp.1466-1478, 2012. ,
DOI : 10.1109/TNET.2011.2181864
Bayesian learning in social networks, Games and Economic Behavior, vol.45, issue.2, pp.329-346, 2003. ,
DOI : 10.1016/S0899-8256(03)00144-1
Modification of UCT with patterns in Monte-Carlo Go, p.117266, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00117266
Online clustering of bandits, International Conference on Machine Learning, p.21, 2014. ,
Ising Bandits with Side Information, European Conference on Machine Learning, 2015. ,
DOI : 10.1007/978-3-319-23528-8_28
Community structure in social and biological networks, Proceedings of the National Academy of Sciences, vol.99, issue.12, pp.7821-7827, 2002. ,
DOI : 10.1073/pnas.122653799
Black-box optimization of noisy functions with unknown smoothness, Neural Information Processing Systems, pp.63-65, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01222915
Online Spectral Learning on a Graph with Bandit Feedback, 2014 IEEE International Conference on Data Mining, p.20, 2014. ,
DOI : 10.1109/ICDM.2014.72
Online submodular set cover, ranking, and repeated active learning, Neural Information Processing Systems, 2011. ,
Collaborative filtering as a multiarmed bandit, NIPS Workshop on Machine Learning for eCommerce, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01256254
Classification with kernel Mahalanobis distance classifiers Advances in Data Analysis, Data Handling and Business Intelligence, pp.351-361, 2010. ,
Approximation to Bayes risk in repeated play, Contributions to the theory of games 3, pp.97-139, 1957. ,
Feature Selection and Dimensionality Reduction in Genomics and Proteomics, Fundamentals of Data Mining in Genomics and Proteomics, 2006. ,
DOI : 10.1007/978-0-387-47509-7_7
URL : https://hal.archives-ouvertes.fr/hal-00643496
Recommender systems: An introduction, 2010. ,
DOI : 10.1017/CBO9780511763113
Efficient algorithms for online decision problems, Journal of Computer and System Sciences, vol.713, pp.291-307, 2005. ,
Efficient Thompson sampling for online matrix-factorization recommendation, Neural Information Processing Systems, 2015. ,
Maximizing the spread of influence through a social network, Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '03, p.137, 2003. ,
DOI : 10.1145/956750.956769
Multi-armed bandit problems in metric spaces, Symposium on Theory Of Computing, pp.63-66, 2008. ,
Online learning with Erd? os-Rényi side-observation graphs, In: Uncertainty in Artificial Intelligence, vol.36, p.35, 2016. ,
Efficient learning by implicit exploration in bandit problems with side observations, Neural Information Processing Systems, pp.30-32, 2014. ,
Spectral Thompson sampling, AAAI Conference on Artificial Intelligence, p.8, 2014. ,
Bandit Based Monte-Carlo Planning, European Conference on Machine Learning, p.63, 2006. ,
DOI : 10.1007/11871842_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.1296
Collaborative learning of stochastic bandits over a social network, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2016. ,
DOI : 10.1109/ALLERTON.2016.7852375
Hedging structured concepts, Conference on Learning Theory, pp.28-29, 2010. ,
Distributed clustering of linear bandits in peer to peer networks, International Conference on Machine Learning, 2016. ,
Combinatorial preconditioners and multilevel solvers for problems in computer vision and image processing, Computer Vision and Image Understanding, vol.11512, pp.1638-1646, 2011. ,
Matroid bandits: Fast combinatorial optimization with learning, In: Uncertainty in Artificial Intelligence, pp.58-60, 2014. ,
Learning to act greedily: Polymatroid semi-bandits, Journal of Machine Learning Research, pp.47-60, 2016. ,
Online influence maximization, In: Knowledge Discovery and Data mining, 2015. ,
A contextual-bandit approach to personalized news article recommendation, Proceedings of the 19th international conference on World wide web, WWW '10, pp.16-18, 2010. ,
DOI : 10.1145/1772690.1772758
Efficient hyperparameter optimization and infinitely many armed bandits, 2016. ,
Collaborative Filtering Bandits, Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, SIGIR '16, 2016. ,
DOI : 10.1145/2911451.2911548
Active search and bandits on graphs using sigma-optimality, In: Uncertainty in Artificial Intelligence, 2015. ,
From bandits to experts: On the value of side-observations, Neural Information Processing Systems, pp.23-26, 2011. ,
Bandits and Recommender Systems, First International Workshop on Machine Learning, Optimization, and Big Data, 2015. ,
DOI : 10.1007/978-3-319-27926-8_29
URL : https://hal.archives-ouvertes.fr/hal-01256033
Birds of a Feather: Homophily in Social Networks, Annual Review of Sociology, vol.27, issue.1, pp.415-444, 2001. ,
DOI : 10.1146/annurev.soc.27.1.415
Optimal flows in networks with multiple sources and sinks, Mathematical Programming, vol.9, issue.1, pp.97-107, 1974. ,
DOI : 10.1007/BF01585506
Optimistic optimization of deterministic functions without the knowledge of its smoothness, Neural Information Processing Systems, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00830143
Signal processing techniques for interpolation in graph structured data, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013. ,
DOI : 10.1109/ICASSP.2013.6638704
Learnability of influence in networks, Neural Information Processing Systems, 2015. ,
Explore no more: Improved high-probability regret bounds for non-stochastic bandits, Neural Information Processing Systems, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01223501
An Efficient Algorithm for Learning with Semi-bandit Feedback, Algorithmic Learning Theory, 2013. ,
DOI : 10.1007/978-3-642-40935-6_17
Combinatorial Optimization, 1998. ,
Bandits attack function optimization, 2014 IEEE Congress on Evolutionary Computation (CEC), p.69, 2014. ,
DOI : 10.1109/CEC.2014.6900558
URL : https://hal.archives-ouvertes.fr/hal-00978637
Exploration-exploitation trade-offs via probabilistic matrix factorization, pp.10-3929, 2014. ,
Less is more: Nyström computational regularization, Neural Information Processing Systems, 2015. ,
Training gradient boosting machines using curve-fitting and information-theoretic features for causal direction detection, NIPS Workshop on Causality, 2013. ,
Learning with kernels: Support vector machines, regularization, optimization, and beyond, 2001. ,
Prediction with limited advice and multiarmed bandits with paid observations, International Conference on Machine Learning, 2014. ,
Kernel methods for pattern analysis, pp.49-53, 2004. ,
DOI : 10.1017/CBO9780511809682
Mastering the game of Go with deep neural networks and tree search, Nature, vol.34, issue.7587, pp.529-7587, 2016. ,
DOI : 10.1038/nature16961
Information gathering in networks via active exploration, In: International Joint Conferences on Artificial Intelligence, 2015. ,
Multi-armed bandits on implicit metric spaces, Neural Information Processing Systems, p.64, 2011. ,
Gaussian process optimization in the bandit setting: No regret and experimental design, International Conference on Machine Learning, pp.47-52, 2010. ,
Optimistic planning in Markov decision processes using a generative model, Neural Information Processing Systems, 2014. ,
ON THE LIKELIHOOD THAT ONE UNKNOWN PROBABILITY EXCEEDS ANOTHER IN VIEW OF THE EVIDENCE OF TWO SAMPLES, Biometrika, vol.25, issue.3-4, pp.285-294, 1933. ,
DOI : 10.1093/biomet/25.3-4.285
A bandit method using probabilistic matrix factorization in recommendation, Journal of Shanghai Jiaotong University (Science), vol.14, issue.5, pp.535-539, 2015. ,
DOI : 10.1007/s12204-015-1618-7
Stochastic simultaneous optimistic optimization, International Conference on Machine Learning, p.67, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00789606
Finite- Time Analysis of Kernelised Contextual Bandits, Ilias Flaounas, and Nelo Cristianini, pp.47-52, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00826946
Spectral bandits for smooth graph functions, International Conference on Machine Learning, pp.18-39, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00986818
Adaptive influence maximization in social networks: Why commit when you can adapt? Technical report, 2016. ,
Influence maximization with bandits, NIPS workshop on Networks in the Social and Information Sciences 2015, 2015. ,
Algorithms for infinitely many-armed bandits, Neural Information Processing Systems, pp.71-75, 2008. ,
Collective dynamics of small-world networks, Nature, vol.393, issue.6684, pp.440-442, 1998. ,
DOI : 10.1038/30918
Sequential Bayesian search, International Conference on Machine Learning, 2013. ,
Influence maximization with semi-bandit feedback, 2016. ,
On the abstract properties of linear dependence, American Journal of Mathematics, vol.573, pp.509-533, 1935. ,
Online learning with Gaussian payoffs and side observations, Neural Information Processing Systems, pp.31-34, 2015. ,
Unimodal bandits, International Conference on Machine Learning, p.21, 2011. ,
Linear submodular bandits and their application to diversified retrieval, Neural Information Processing Systems, 2011. ,
The Schur complement and its applications, 2005. ,
DOI : 10.1007/b105056
Semi-supervised learning literature survey, 2008. ,