{"_id":"fL6jawvaSxsgDKpqa","bibbaseid":"jamieson-malloy-nowak-bubeck-lilucbanoptimalexplorationalgorithmformultiarmedbandits-2014","downloads":0,"creationDate":"2018-07-06T20:22:33.224Z","title":"lil' UCB : An Optimal Exploration Algorithm for Multi-Armed Bandits","author_short":["Jamieson, K. G.","Malloy, M.","Nowak, R. D.","Bubeck, S."],"year":2014,"bibtype":"inproceedings","biburl":"https://www.cse.iitb.ac.in/~arghya/unifiedbibtex.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Kevin","G."],"propositions":[],"lastnames":["Jamieson"],"suffixes":[]},{"firstnames":["Matthew"],"propositions":[],"lastnames":["Malloy"],"suffixes":[]},{"firstnames":["Robert","D."],"propositions":[],"lastnames":["Nowak"],"suffixes":[]},{"firstnames":["S'ebastien"],"propositions":[],"lastnames":["Bubeck"],"suffixes":[]}],"title":"lil' UCB : An Optimal Exploration Algorithm for Multi-Armed Bandits","booktitle":"Proceedings of The 27th Conference on Learning Theory, COLT 2014, Barcelona, Spain, June 13-15, 2014","pages":"423–439","year":"2014","crossref":"DBLP:conf/colt/2014","url":"http://jmlr.org/proceedings/papers/v35/jamieson14.html","timestamp":"Tue, 12 Jul 2016 21:51:13 +0200","biburl":"http://dblp.uni-trier.de/rec/bib/conf/colt/JamiesonMNB14","bibsource":"dblp computer science bibliography, http://dblp.org","bib2html_rescat":"Bandits","bibtex":"@inproceedings{Jamieson+MNB:2014,\n author = {Kevin G. Jamieson and Matthew Malloy and Robert D. Nowak and S{'{e}}bastien Bubeck},\n title = {lil' {UCB} : An Optimal Exploration Algorithm for Multi-Armed Bandits},\n booktitle = {Proceedings of The 27th Conference on Learning Theory, {COLT} 2014, Barcelona, Spain, June 13-15, 2014},\n pages = {423--439},\n year = {2014}, crossref = {DBLP:conf/colt/2014},\n url = {http://jmlr.org/proceedings/papers/v35/jamieson14.html},\n timestamp = {Tue, 12 Jul 2016 21:51:13 +0200},\n biburl = {http://dblp.uni-trier.de/rec/bib/conf/colt/JamiesonMNB14},\n bibsource = {dblp computer science bibliography, http://dblp.org},\n bib2html_rescat = {Bandits}, \n} \n\n","author_short":["Jamieson, K. G.","Malloy, M.","Nowak, R. D.","Bubeck, S."],"key":"Jamieson+MNB:2014","id":"Jamieson+MNB:2014","bibbaseid":"jamieson-malloy-nowak-bubeck-lilucbanoptimalexplorationalgorithmformultiarmedbandits-2014","role":"author","urls":{"Paper":"http://jmlr.org/proceedings/papers/v35/jamieson14.html"},"downloads":0,"html":""},"search_terms":["lil","ucb","optimal","exploration","algorithm","multi","armed","bandits","jamieson","malloy","nowak","bubeck"],"keywords":[],"authorIDs":[],"dataSources":["CXhSbkYign8PEgMD2"]}