☆15Dec 14, 2020Updated 5 years ago
Alternatives and similar repositories for sd_bandits
Users that are interested in sd_bandits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for our paper "Top-K Contextual Bandits with Equity of Exposure" published at RecSys 2021.☆15Aug 2, 2021Updated 4 years ago
- Source code for our paper "Pessimistic Decision-Making for Recommender Systems" published at ACM TORS, and RecSys 2021.☆11Dec 15, 2022Updated 3 years ago
- (WSDM2022 Best Paper Award Runner-Up) "Doubly Robust Off-Policy Evaluation for Ranking Policies under the Cascade Behavior Model"☆13Jul 16, 2023Updated 2 years ago
- (RecSys2020) "Doubly Robust Estimator for Ranking Metrics with Post-Click Conversions"☆23Mar 25, 2023Updated 3 years ago
- Accelerated Confergence for Counterfactual Learning to Rank☆17Jan 21, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Cold Start Similar Artists Ranking with Gravity-Inspired Graph Autoencoders (RecSys 2021)☆19Oct 17, 2021Updated 4 years ago
- Source code and data from the RecSys 2020 article "Carousel Personalization in Music Streaming Apps with Contextual Bandits" by W. Bendad…☆59Sep 30, 2020Updated 5 years ago
- Estimators to perform off-policy evaluation☆13Sep 3, 2024Updated last year
- (ICTIR2020) "Unbiased Pairwise Learning from Biased Implicit Feedback"☆19Nov 21, 2022Updated 3 years ago
- [ WSDM '22 ] On Sampling Collaborative Filtering Datasets☆20Jan 13, 2022Updated 4 years ago
- Offline evaluation of multi-armed bandit algorithms☆23Dec 1, 2020Updated 5 years ago
- Source code from our RecSys 2020 paper: "Making neural network interpretable with attribution: application to implicit signals prediction…☆14Oct 2, 2020Updated 5 years ago
- Implementation of safe offline bandit algorithms.☆10Oct 27, 2019Updated 6 years ago
- (SIGIR2020) “Asymmetric Tri-training for Debiasing Missing-Not-At-Random Explicit Feedback’’☆21Nov 21, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code for RecSys'19 paper: Leveraging Post-click Feedback for Content Recommendations☆15Jul 28, 2021Updated 4 years ago
- Semi-synthetic experiments to test several approaches for off-policy evaluation and optimization of slate recommenders.☆43Nov 2, 2017Updated 8 years ago
- (WSDM2020) "Unbiased Recommender Learning from Missing-Not-At-Random Implicit Feedback"☆30Nov 21, 2022Updated 3 years ago
- Code for the paper "Optimal Off-Policy Evaluation from Multiple Logging Policies"☆15Jul 17, 2021Updated 4 years ago
- Experiments codes for SIGIR '20 paper "A General Knowledge Distillation Framework for Counterfactual Recommendation via Uniform Data"☆34May 18, 2020Updated 5 years ago
- ☆32Feb 21, 2025Updated last year
- ☆88Jul 30, 2024Updated last year
- ☆13Jun 25, 2021Updated 4 years ago
- This repository contains the scripts used during my participation on CIKM Cup 2016 (see http://cikmcup.org/ and https://competitions.coda…☆11Nov 4, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Vowpal Wabbit examples and tutorials☆21Jan 20, 2022Updated 4 years ago
- (ICML2022) Off-Policy Evaluation for Large Action Spaces via Embeddings☆21Jul 27, 2022Updated 3 years ago
- Python code to reproduce the experiments presented in the paper Multilingual Music Genre Embeddings for Effective Cross-Lingual Music Ite…☆11Nov 13, 2020Updated 5 years ago
- A Pytorch implementation of "Deep Learning with Logged Bandit Feedback"☆10Aug 22, 2018Updated 7 years ago
- Research team website☆12Oct 7, 2025Updated 5 months ago
- Implementation of multi-armed bandits in Julia☆12Jan 12, 2020Updated 6 years ago
- Starter kit for getting started in the NIPS 2017 Criteo Ad Placement Challenge☆18Nov 10, 2017Updated 8 years ago
- Learning to Rank in PyTorch☆91Jan 2, 2024Updated 2 years ago
- ☆10Jul 8, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- (ICML2020) “Counterfactual Cross-Validation: Stable Model Selection Procedure for Causal Inference Models’’☆31Mar 24, 2023Updated 3 years ago
- Code to reproduce the experiments presented in the article "Data-Efficient Playlist Captioning With Musical and Linguistic Knowledge" (EM…☆18Dec 21, 2022Updated 3 years ago
- A python implementation of Dueling Bandit Gradient Descent (DBGD)☆24Jan 23, 2019Updated 7 years ago
- Using multiple sensor modalities to improve exploration for robotic manipulation tasks with sparse rewards☆10Sep 17, 2019Updated 6 years ago
- Python library of Dynamic Treatment Regimes☆10Oct 26, 2020Updated 5 years ago
- This is an implementation of the Dual Learning Algorithm with multi-layer feed-forward neural network for online unbiased learning to ran…☆89Feb 1, 2023Updated 3 years ago
- AuctionGym is a simulation environment that enables reproducible evaluation of bandit and reinforcement learning methods for online adver…☆187Feb 11, 2026Updated last month