Academic literature on the topic 'Time banditry'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Time banditry.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Time banditry"

1

Brock Baskin, Meagan E., Victoria McKee, and M. Ronald Buckley. "Time Banditry and Impression Management Behavior." Journal of Leadership & Organizational Studies 24, no. 1 (2016): 39–54. http://dx.doi.org/10.1177/1548051816661479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mahmood, Neamat Ali. "Theft and Banditry in Iraq during the reign of the Ottomans from the lens of the Travelers." Twejer 4, no. 1 (2021): 1157–92. http://dx.doi.org/10.31918/twejer.2141.26.

Full text
Abstract:
Travelers’ books are considered one of the most reliable historical sources for recognizing and the descriptions of those cities they passed through. And also, they are significant references for determining theft and banditry in the last decade of new history. This research is a modest attempt to track impressions of foreign travelers who traveled to Iraqi cities in modern era whether from road routes or river. Registering theft and banditry misbehaviour in the ruling time of Ottoman Empire while they visited Iraqi cities. It is worth mentioning, most of the travelers took notes about their c
APA, Harvard, Vancouver, ISO, and other styles
3

Martin, Laura E., Meagan E. Brock, M. Ronald Buckley, and David J. Ketchen. "Time banditry: Examining the purloining of time in organizations." Human Resource Management Review 20, no. 1 (2010): 26–34. http://dx.doi.org/10.1016/j.hrmr.2009.03.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brock, Meagan E., Laura E. Martin, and M. Ronald Buckley. "Time Theft in Organizations: The development of the Time Banditry Questionnaire." International Journal of Selection and Assessment 21, no. 3 (2013): 309–21. http://dx.doi.org/10.1111/ijsa.12040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

MYRHOROD, Violetta, and Oksana VOLODINA. "Banditry (article 257 of the Criminal Code of Ukraine), robbery (article 187 of the Criminal Code of Ukraine), extortion (article 189 of the Criminal Code of Ukraine) and problems of the relationship between these crimes." Economics. Finances. Law, no. 5/2 (May 26, 2021): 13–17. http://dx.doi.org/10.37634/efp.2021.5(2).2.

Full text
Abstract:
This paper examines the relationship between banditry, robbery committed by an organized, armed group of people and extortion, and the main normative sources of domestic legislation. In addition, official statistics provided to the Prosecutor General's Office of Ukraine were examined to assess the prevalence and risk of banditry. The author analyzes the features of the corpus delicti, their qualifications, and problematic issues in the application of this knowledge in the practice of law enforcement and judicial authorities. The articles cover certain aspects of robbery, such as burglary and v
APA, Harvard, Vancouver, ISO, and other styles
6

Brock Baskin, Meagan E., and Victoria McKee. "Employee perceptions of climate as an antecedent of time banditry in the workplace." International Journal of Selection and Assessment 27, no. 1 (2019): 83–89. http://dx.doi.org/10.1111/ijsa.12236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kamali```, Mohammad Hashim. "Terrorism, Banditry and Hirabah: Advancing New Shariah Perspectives." ICR Journal 8, no. 1 (2017): 11–34. http://dx.doi.org/10.52282/icr.v8i1.210.

Full text
Abstract:
Hirabah is the nearest Shariah legal concept to terrorism. Modern technological change, however, has altered the nature of this crime so much that corresponding adjustments in the law of hirabah are inevitable. Remote control devices, precision device-timing, vastly destructive weapons, and even suicide bombings were not considered by early Muslim jurists in their scholastic articulations of hirabah. The Qur’anic conception of this crime, on the other hand, is broad enough to accommodate the needed adjustments, and which is what this article attempts to do – in other words, to reconnect the fi
APA, Harvard, Vancouver, ISO, and other styles
8

Brown, Nathan. "Brigands and State Building: The Invention of Banditry in Modern Egypt." Comparative Studies in Society and History 32, no. 2 (1990): 258–81. http://dx.doi.org/10.1017/s0010417500016480.

Full text
Abstract:
A late nineteenth-century epidemic of banditry seems to have swept through the Egyptian countryside, at least according to the writings and actions of influential Egyptians at that time. Contemporary newspapers recounted daily episodes in which gangs composed of between six and sixty or seventy members raided large estates, robbed travelling merchants, and organized local protection rackets. The threat to public security drew the greatest attention in the decade following the British occupation of Egypt in 1882.
APA, Harvard, Vancouver, ISO, and other styles
9

Freeman, Ashley Thomas. "Bushrangers, itinerant teachers and constructing educational policy in 1860s New South Wales." History of Education Review 48, no. 1 (2019): 15–30. http://dx.doi.org/10.1108/her-12-2017-0027.

Full text
Abstract:
Purpose The purpose of this paper is to examine how rural outlaws, known in the Australian context as bushrangers, impacted on the introduction of itinerant teaching in sparsely settled areas under the Council of Education in the colony of New South Wales. In July 1867 the evolving process for establishing half-time schools was suddenly disrupted when itinerant teaching diverged down an unexpected and uncharted path. As a result the first two itinerant teachers were appointed and taught in an irregular manner that differed significantly from regulation and convention. The catalyst was a series
APA, Harvard, Vancouver, ISO, and other styles
10

Otekunrin, Olutosin A. "Is Africa Ready for the SDG 2 (Zero Hunger) Target by 2030?" Current Agriculture Research Journal 9, no. 1 (2021): 01–03. http://dx.doi.org/10.12944/carj.9.1.01.

Full text
Abstract:
In recent time, the prevalence of hunger, malnutrition and food insecurity have increased in most African countries as the continent continued to experience rising number of people that are undernourished. This paper reveals the progress of African region in pursuit of SDG 2 target by 2030 considering both the global and Africa SDG threshold (rating) in 2019. The SDG2 target achievement in Africa is facing serious obstacles such as high level of poverty, unemployment, social exclusion, corruption, banditry, kidnapping, conflicts, and terrorism. With enormous challenges confronting Africa, can
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Time banditry"

1

Tracà, Stefano. "Regulating exploration in multi-armed bandit problems with time patterns and dying arms." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/119353.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center, 2018.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 65-70).<br>In retail, there are predictable yet dramatic time-dependent patterns in customer behavior, such as periodic changes in the number of visitors, or increases in customers just before major holidays. The standard paradigm of multi-armed bandit analysis does not take these known patterns into account. This means that for applications in retail, where prices are fixed for periods of tim
APA, Harvard, Vancouver, ISO, and other styles
2

Louëdec, Jonathan. "Stratégies de bandit pour les systèmes de recommandation." Thesis, Toulouse 3, 2016. http://www.theses.fr/2016TOU30257/document.

Full text
Abstract:
Les systèmes de recommandation actuels ont besoin de recommander des objets pertinents aux utilisateurs (exploitation), mais pour cela ils doivent pouvoir également obtenir continuellement de nouvelles informations sur les objets et les utilisateurs encore peu connus (exploration). Il s'agit du dilemme exploration/exploitation. Un tel environnement s'inscrit dans le cadre de ce que l'on appelle " apprentissage par renforcement ". Dans la littérature statistique, les stratégies de bandit sont connues pour offrir des solutions à ce dilemme. Les contributions de cette thèse multidisciplinaire ada
APA, Harvard, Vancouver, ISO, and other styles
3

Selent, Douglas A. "Creating Systems and Applying Large-Scale Methods to Improve Student Remediation in Online Tutoring Systems in Real-time and at Scale." Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-dissertations/308.

Full text
Abstract:
"A common problem shared amongst online tutoring systems is the time-consuming nature of content creation. It has been estimated that an hour of online instruction can take up to 100-300 hours to create. Several systems have created tools to expedite content creation, such as the Cognitive Tutors Authoring Tool (CTAT) and the ASSISTments builder. Although these tools make content creation more efficient, they all still depend on the efforts of a content creator and/or past historical. These tools do not take full advantage of the power of the crowd. These issues and challenges faced by on
APA, Harvard, Vancouver, ISO, and other styles
4

Cloete, Adrian. "Situated Information and Communication Moralities : An Investigation into the Personal Use of the Internet in the Office Workplace." Thèse, 2016. http://hdl.handle.net/1866/19522.

Full text
Abstract:
Cette thèse remet en question la perception négative, dominante dans la littérature et largement répandue dans les organisations, de l'utilisation personnelle d'Internet au travail. Une étude de cas a été réalisée auprès d’environ 80 d’employés et superviseurs dans un bureau d’un département du gouvernement canadien. La thèse confirme que, non seulement ces employés de bureau transgressaient-ils régulièrement des règles explicites conçus pour cadrer l’utilisation des technologies d’information et de communication (TIC), ces comportements étaient largement tolérés au sein du département. L’a
APA, Harvard, Vancouver, ISO, and other styles
5

(8787767), Stanton N. Hudja. "Essays on Experimental Economics and Innovation." Thesis, 2020.

Find full text
Abstract:
My dissertation consists of four chapters. In the first chapter, I use a laboratory experiment to analyze how individuals resolve an exploration versus exploitation trade-off. The experiment implements a single-agent exponential bandit model. I find that, as predicted, subjects respond to changes in the prior belief, safe action, and discount factor. However, I commonly find that subjects give up on exploration earlier than predicted. I estimate a structural model that allows for risk aversion, base rate neglect/conservatism, and probability mis-weighting. I find support for risk aversion, con
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Time banditry"

1

Hillstrand, Andy. Time Bandit. Random House Publishing Group, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

ill, Jessell Tim, ed. The Hawk Bandits of Tarkoom. Scholastic, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Abbott, Tony. The hawk bandits of Tarkoom. Scholastic, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

ill, To Vivienne, ed. The case of the time-capsule bandit. Simon & Schuster Books for Young Readers, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

The not-quite-ready-for-prime-time bandits. Dell Pub., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

S, Hanson John, ed. Bandits, prophets & messiahs: Popular movements in the time of Jesus. Trinity Press International, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

S, Hanson John, ed. Bandits, prophets, and messiahs: Popular movements in the time of Jesus. Winston Press, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Horsley, Richard A. Bandits, prophets, and messiahs: Popular movements in the time of Jesus. Winston Press, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Horsley, Richard A. Bandits, prophets, and messiahs: Popular movements in the time of Jesus. Harper & Row, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Horsley, Richard A. Bandits, prophets, and messiahs: Popular movements in the time of Jesus. Harper & Row, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Time banditry"

1

Berry, Donald A., and Bert Fristedt. "Continuous-time bandits." In Bandit problems. Springer Netherlands, 1985. http://dx.doi.org/10.1007/978-94-015-3711-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Komiyama, Junpei, and Tao Qin. "Time-Decaying Bandits for Non-stationary Systems." In Web and Internet Economics. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13129-0_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bento, José, Stratis Ioannidis, S. Muthukrishnan, and Jinyun Yan. "A Time and Space Efficient Algorithm for Contextual Linear Bandits." In Advanced Information Systems Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40988-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pittioni, Davide, and Tomaž Gregorc. "“Time Bandits”: Time as a Factor of the “Criminalisation of Legality” of Asylum Seekers. An Example from Trieste, Italy." In Ius Gentium: Comparative Perspectives on Law and Justice. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43732-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Walrand, Jean. "Perspective and Complements." In Probability in Electrical Engineering and Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49995-2_15.

Full text
Abstract:
AbstractWe have explored a number of topics motivated by concrete applications. It is time to stitch together these ideas into a complete panorama. In addition, we provide some complements.Section 15.1 discusses the general question of inference: what can one deduce from observations? Section 15.2 explains the important notion of sufficient statistic: what is the relevant data in a set of observations? Section 15.3 presents the theory of Markov chains where the number of states is infinite. Section 15.4 explains the Poisson process. Section 15.5 discusses the boosting algorithm for choosing among experts. What drug should you further research; what noisy channel should one use? These are examples of multi-armed bandit problems. In such problems one faces the trade-off between exploiting known possibilities versus exploring potentially more rewarding but less well understood alternatives. Section 15.6 explains a key results for such multi-armed bandit problems. Information Theory studies the limits of communication systems: how fast can one transmit bits reliably over a noisy channel? How many bits should be transmitted to convey some information? Section 15.7 introduces some key concepts and results of Information Theory. When estimating the likelihood of errors or the reliability of some estimates, one usually has to calculate bounds on the probability that a random variable exceeds a given value. Section 15.8 discusses some useful probability bounds. Section 15.9 explains the main ideas of the theory of martingales and shows how it provides a proof of the law of large numbers.
APA, Harvard, Vancouver, ISO, and other styles
6

Antony, Robert J. "The Structures of Crime." In Unruly People. Hong Kong University Press, 2016. http://dx.doi.org/10.5790/hongkong/9789888208951.003.0006.

Full text
Abstract:
Chapter 6 begins the second part of this study with an examination of the structures of collective crime. The author begins with explanations of the various Chinese terms that have been used in the past to depict what in English is called “banditry” and next move on to present a typology of sworn brotherhood associations common in Guangdong in the mid-Qing period. Much of the remaining discussion focuses on recruitment methods and organizational attributes of bandit gangs and sworn brotherhoods. Here I consider several types of bandit organizations, such as formal and informal gangs, and the close relationships that sworn brotherhoods had with banditry in Guangdong during that time.
APA, Harvard, Vancouver, ISO, and other styles
7

Antony, Robert J. "The Laboring Poor and Banditry." In Unruly People. Hong Kong University Press, 2016. http://dx.doi.org/10.5790/hongkong/9789888208951.003.0007.

Full text
Abstract:
While the archival records reveal little about the psychology of criminals and criminality, they do shed important light on the identities and personal backgrounds of bandits. In Chapter 7 the author examines the social composition of members of bandit gangs and sworn brotherhoods: age, marital status, geographic mobility, and occupations. Significantly, and contrary to the usual interpretation of banditry in the scholarly literature, the evidence from Guangdong demonstrates that banditry was not merely an occupation of younger men but also of older, more mature adults, many of whom were married with families. Most convicted bandits and brotherhood members came from China’s laboring poor, those individuals who were highly mobile, lived on the fringe of respectable society, and earned only a subsistence living. The fact that such a large number of bandits and brotherhood members were mature working family men suggests that they turned to crime in times of desperation or as a necessary supplement to honest work. Unemployment and chronic underemployment, the author maintains, forced many among the working poor to commit crime; stealing became an important, though normally only occasional, part of their livelihoods and life cycles.
APA, Harvard, Vancouver, ISO, and other styles
8

Van Young, Eric. "An Ordered and Prosperous Republic." In A Life Together. Yale University Press, 2021. http://dx.doi.org/10.12987/yale/9780300233919.003.0013.

Full text
Abstract:
Returned to power by an uprising at the end of 1829 in which he took a central organizational role, Alamán’s chief time (1830-1832) as the principal minister in the national government under President Anastasio Bustamante is detailed in this chapter. The minister’s efforts to centralize the national government and impose political stability as much as possible through the neutering of state governments, suppression of political dissent, and censorship of the press are examined. Among the problems he confronted in this high tide of his political influence were the suppression of endemic banditry, the American colonization of Texas, and the ambitions of the ever-unquiet Santa Anna. Alamán’s constant lament regarding the terrible state of the country is highlighted. Considerable attention is paid to his domestic life and the lives of his children, including a plan (never acted upon) for the family to emigrate to Britain.
APA, Harvard, Vancouver, ISO, and other styles
9

Antony, Robert J. "The Qing Code and Special Judicial Legislation." In Unruly People. Hong Kong University Press, 2016. http://dx.doi.org/10.5790/hongkong/9789888208951.003.0010.

Full text
Abstract:
Chapter 10 begins the final section on state and local law enforcement with a discussion on the promulgation of several crucial Qing laws. Although officials and other observers throughout the eighteenth century frequently complained about Guangdong’s lawlessness, it was not until the 1780s that the central government began to enact specific laws to deal with bandits, sworn brotherhoods, and social disorder in the province. Between 1780 and 1845, a time when officials perceived a rising crime wave in the province, the government passed at least twelve special substatutes to handle the problems in Guangdong and neighboring provinces. The burst of special legislation during those years was both an indication of a rise in bandit and brotherhood activity in Guangdong as well as the deep concerns that the state had about maintaining law and order.
APA, Harvard, Vancouver, ISO, and other styles
10

Ødegaard, Cecilie Vindal. "SOCIAL BANDITRY AND THE LEGAL IN THE CORPORATE STATE OF PERU." In After the Pink Tide. Berghahn Books, 2020. http://dx.doi.org/10.2307/j.ctv1k5317j.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Time banditry"

1

Xie, Miao, Wotao Yin, and Huan Xu. "AutoBandit: A Meta Bandit Online Learning System." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/719.

Full text
Abstract:
Recently online multi-armed bandit (MAB) is growing rapidly, as novel problem settings and algorithms motivated by various practical applications are being studied, building on the top of the classic bandit problem. However, identifying the best bandit algorithm from lots of potential candidates for a given application is not only time-consuming but also relying on human expertise, which hinders the practicality of MAB. To alleviate this problem, this paper outlines an intelligent system called AutoBandit, equipped with many out-of-the-box MAB algorithms, for automatically and adaptively choos
APA, Harvard, Vancouver, ISO, and other styles
2

Peng, Yi, Miao Xie, Jiahao Liu, et al. "A Practical Semi-Parametric Contextual Bandit." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/450.

Full text
Abstract:
Classic multi-armed bandit algorithms are inefficient for a large number of arms. On the other hand, contextual bandit algorithms are more efficient, but they suffer from a large regret due to the bias of reward estimation with finite dimensional features. Although recent studies proposed semi-parametric bandits to overcome these defects, they assume arms' features are constant over time. However, this assumption rarely holds in practice, since real-world problems often involve underlying processes that are dynamically evolving over time especially for the special promotions like Singles' Day
APA, Harvard, Vancouver, ISO, and other styles
3

Deshpande, Harsh, Vishal Jain, and Sharayu Moharir. "Contextual Bandits Evolving Over Finite Time." In 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, 2020. http://dx.doi.org/10.1109/comsnets48256.2020.9027425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Yang, and Mingyan Liu. "Crowd Learning: Improving Online Decision Making Using Crowdsourced Data." In Twenty-Sixth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/45.

Full text
Abstract:
We analyze an online learning problem that arises in crowdsourcing systems for users facing crowdsourced data: a user at each discrete time step t can choose K out of a total of N options (bandits), and receives randomly generated rewards dependent on user-specific and option-specific statistics unknown to the user. Each user aims to maximize her expected total rewards over a certain time horizon through a sequence of exploration and exploitation steps. Different from the typical regret/bandit learning setting, in this case a user may also exploit crowdsourced information to augment her learni
APA, Harvard, Vancouver, ISO, and other styles
5

Vakili, Sattar, Qing Zhao, and Yuan Zhou. "Time-varying stochastic multi-armed bandit problems." In 2014 48th Asilomar Conference on Signals, Systems and Computers. IEEE, 2014. http://dx.doi.org/10.1109/acssc.2014.7094845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cuvelier, Thibaut, Richard Combes, and Eric Gourdin. "Statistically Efficient, Polynomial-Time Algorithms for Combinatorial Semi-Bandits." In SIGMETRICS '21: ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems. ACM, 2021. http://dx.doi.org/10.1145/3410220.3453926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Cheng, Luo Luo, Weinan Zhang, Yong Yu, and Yijiang Lian. "Efficient and Robust High-Dimensional Linear Contextual Bandits." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/588.

Full text
Abstract:
The linear contextual bandits is a sequential decision-making problem where an agent decides among sequential actions given their corresponding contexts. Since large-scale data sets become more and more common, we study the linear contextual bandits in high-dimensional situations. Recent works focus on employing matrix sketching methods to accelerating contextual bandits. However, the matrix approximation error will bring additional terms to the regret bound. In this paper we first propose a novel matrix sketching method which is called Spectral Compensation Frequent Directions (SCFD). Then we
APA, Harvard, Vancouver, ISO, and other styles
8

Yekkehkhany, Ali, Ebrahim Arian, Mohammad Hajiesmaili, and Rakesh Nagi. "Risk-Averse Explore-Then-Commit Algorithms for Finite-Time Bandits." In 2019 IEEE 58th Conference on Decision and Control (CDC). IEEE, 2019. http://dx.doi.org/10.1109/cdc40024.2019.9142286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Lu-Ning, Xin Zuo, Jian-Wei Liu, Wei-Min Li, and Nobuyasu Ito. "Comments on “Finite-Time Analysis of the Multiarmed Bandit Problem”." In 2019 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2019. http://dx.doi.org/10.1109/icmlc48188.2019.8949232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zeng, Chunqiu, Qing Wang, Shekoofeh Mokhtari, and Tao Li. "Online Context-Aware Recommendation with Time Varying Multi-Armed Bandit." In KDD '16: The 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2016. http://dx.doi.org/10.1145/2939672.2939878.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Time banditry"

1

Henn, Soeren, Christian Mastaki Mugaruka, Miguel Ortiz, Raúl Sánchez de la Sierra, and David Qihang Wu. On the Ends of the State: Stationary Bandits and the Time Horizon in Eastern Congo. National Bureau of Economic Research, 2021. http://dx.doi.org/10.3386/w28631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!