ZIYU-DEEP / Awesome-Papers-on-Combinatorial-Semi-Bandit-ProblemsLinks
A curated list on papers about combinatorial multi-armed bandit problems.
☆17Updated 4 years ago
Alternatives and similar repositories for Awesome-Papers-on-Combinatorial-Semi-Bandit-Problems
Users that are interested in Awesome-Papers-on-Combinatorial-Semi-Bandit-Problems are comparing it to the libraries listed below
Sorting:
- Study NeuralUCB and regret analysis for contextual bandit with neural decision☆99Updated 4 years ago
- In this notebook several classes of multi-armed bandits are implemented. This includes epsilon greedy, UCB, Linear UCB (Contextual bandit…☆89Updated 5 years ago
- Dynamic Pricing BwK Problem and Reinforcement Learning☆31Updated 7 years ago
- ☆48Updated 5 years ago
- Code for the WSDM '20 paper, Learning Individual Causal Effects from Networked Observational Data.☆77Updated 4 years ago
- ☆14Updated 2 years ago
- More about the exploration-exploitation tradeoff with harder bandits☆24Updated 6 years ago
- Code for the experiments of Matrix Factorization Bandit☆24Updated 6 years ago
- (ICML2020) “Counterfactual Cross-Validation: Stable Model Selection Procedure for Causal Inference Models’’☆31Updated 2 years ago
- ☆39Updated 6 years ago
- Implementation of various multi-armed bandits algorithms on a 10-arm testbed.☆38Updated 5 years ago
- Code the AAAI 2019 paper "Melding the Data-Decisions Pipeline: Decision-Focused Learning for Combinatorial Optimization"☆35Updated 4 years ago
- ☆13Updated 3 years ago
- ☆27Updated 5 years ago
- Code and data for decision making under strategic behavior, NeurIPS 2020 & Management Science 2024.☆29Updated last year
- A general framework for learning spatio-temporal point processes via reinforcement learning☆30Updated 4 years ago
- ☆33Updated 5 years ago
- Replication Code for Paper "Stochastic Optimization Forests".☆21Updated 4 years ago
- Implementation of Optimal Auctions through Deep Learning☆134Updated 6 years ago
- (WSDM2022 Best Paper Award Runner-Up) "Doubly Robust Off-Policy Evaluation for Ranking Policies under the Cascade Behavior Model"☆13Updated 2 years ago
- ☆12Updated 6 years ago
- Implementation of paper Long-Term Effect Estimation with Surrogate Representation☆13Updated 5 years ago
- (RecSys2020) "Doubly Robust Estimator for Ranking Metrics with Post-Click Conversions"☆24Updated 2 years ago
- This repository contains codes for paper: Generalized Linear Bandits with Local Differential Privacy by Yuxuan Han, Zhipeng Liang, Yang W…☆16Updated 4 years ago
- An official JAX-based code for our NeuraLCB paper, "Offline Neural Contextual Bandits: Pessimism, Optimization and Generalization", ICLR…☆13Updated 3 years ago
- ☆30Updated 5 years ago
- All you need for MATH5411 Advanced Probability, 2020 Fall, HKUST, Lecturer BAO Zhigang.☆56Updated 5 years ago
- Multi Armed Bandits implementation using the Yahoo! Front Page Today Module User Click Log Dataset☆99Updated 4 years ago
- Implementation of inventory control policy parameters computation algorithms☆19Updated 3 years ago
- Link to paper: https://www.ssrn.com/abstract=3804655☆14Updated 4 years ago