Picture for Ali Tajer

Ali Tajer

Preference-centric Bandits: Optimality of Mixtures and Regret-efficient Algorithms

Add code
Apr 30, 2025
Figure 1 for Preference-centric Bandits: Optimality of Mixtures and Regret-efficient Algorithms
Figure 2 for Preference-centric Bandits: Optimality of Mixtures and Regret-efficient Algorithms
Figure 3 for Preference-centric Bandits: Optimality of Mixtures and Regret-efficient Algorithms
Figure 4 for Preference-centric Bandits: Optimality of Mixtures and Regret-efficient Algorithms
Viaarxiv icon

Real-Time Risky Fault-Chain Search using Time-Varying Graph RNNs

Add code
Mar 12, 2025
Figure 1 for Real-Time Risky Fault-Chain Search using Time-Varying Graph RNNs
Figure 2 for Real-Time Risky Fault-Chain Search using Time-Varying Graph RNNs
Figure 3 for Real-Time Risky Fault-Chain Search using Time-Varying Graph RNNs
Figure 4 for Real-Time Risky Fault-Chain Search using Time-Varying Graph RNNs
Viaarxiv icon

Risk-sensitive Bandits: Arm Mixture Optimality and Regret-efficient Algorithms

Add code
Mar 11, 2025
Figure 1 for Risk-sensitive Bandits: Arm Mixture Optimality and Regret-efficient Algorithms
Figure 2 for Risk-sensitive Bandits: Arm Mixture Optimality and Regret-efficient Algorithms
Figure 3 for Risk-sensitive Bandits: Arm Mixture Optimality and Regret-efficient Algorithms
Figure 4 for Risk-sensitive Bandits: Arm Mixture Optimality and Regret-efficient Algorithms
Viaarxiv icon

RL for Mitigating Cascading Failures: Targeted Exploration via Sensitivity Factors

Add code
Nov 27, 2024
Figure 1 for RL for Mitigating Cascading Failures: Targeted Exploration via Sensitivity Factors
Figure 2 for RL for Mitigating Cascading Failures: Targeted Exploration via Sensitivity Factors
Figure 3 for RL for Mitigating Cascading Failures: Targeted Exploration via Sensitivity Factors
Figure 4 for RL for Mitigating Cascading Failures: Targeted Exploration via Sensitivity Factors
Viaarxiv icon

Linear Causal Bandits: Unknown Graph and Soft Interventions

Add code
Nov 04, 2024
Figure 1 for Linear Causal Bandits: Unknown Graph and Soft Interventions
Figure 2 for Linear Causal Bandits: Unknown Graph and Soft Interventions
Figure 3 for Linear Causal Bandits: Unknown Graph and Soft Interventions
Figure 4 for Linear Causal Bandits: Unknown Graph and Soft Interventions
Viaarxiv icon

Cascading Failure Prediction via Causal Inference

Add code
Oct 24, 2024
Figure 1 for Cascading Failure Prediction via Causal Inference
Figure 2 for Cascading Failure Prediction via Causal Inference
Figure 3 for Cascading Failure Prediction via Causal Inference
Figure 4 for Cascading Failure Prediction via Causal Inference
Viaarxiv icon

Combinatorial Multi-armed Bandits: Arm Selection via Group Testing

Add code
Oct 14, 2024
Viaarxiv icon

Interventional Causal Discovery in a Mixture of DAGs

Add code
Jun 12, 2024
Figure 1 for Interventional Causal Discovery in a Mixture of DAGs
Figure 2 for Interventional Causal Discovery in a Mixture of DAGs
Figure 3 for Interventional Causal Discovery in a Mixture of DAGs
Figure 4 for Interventional Causal Discovery in a Mixture of DAGs
Viaarxiv icon

Linear Causal Representation Learning from Unknown Multi-node Interventions

Add code
Jun 09, 2024
Figure 1 for Linear Causal Representation Learning from Unknown Multi-node Interventions
Figure 2 for Linear Causal Representation Learning from Unknown Multi-node Interventions
Viaarxiv icon

Improved Bound for Robust Causal Bandits with Linear Models

Add code
May 13, 2024
Figure 1 for Improved Bound for Robust Causal Bandits with Linear Models
Viaarxiv icon