Alert button
Picture for Krishna Jagannathan

Krishna Jagannathan

Alert button

IIT Madras

A Survey of Risk-Aware Multi-Armed Bandits

Add code
Bookmark button
Alert button
May 12, 2022
Vincent Y. F. Tan, Prashanth L. A., Krishna Jagannathan

Viaarxiv icon

Online Estimation and Optimization of Utility-Based Shortfall Risk

Add code
Bookmark button
Alert button
Nov 16, 2021
Arvind S. Menon, Prashanth L. A., Krishna Jagannathan

Viaarxiv icon

Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits

Add code
Bookmark button
Alert button
Aug 28, 2020
Anmol Kagrecha, Jayakrishnan Nair, Krishna Jagannathan

Figure 1 for Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits
Figure 2 for Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits
Figure 3 for Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits
Figure 4 for Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits
Viaarxiv icon

Bandit algorithms: Letting go of logarithmic regret for statistical robustness

Add code
Bookmark button
Alert button
Jun 22, 2020
Kumar Ashutosh, Jayakrishnan Nair, Anmol Kagrecha, Krishna Jagannathan

Viaarxiv icon

Constrained regret minimization for multi-criterion multi-armed bandits

Add code
Bookmark button
Alert button
Jun 17, 2020
Anmol Kagrecha, Jayakrishnan Nair, Krishna Jagannathan

Figure 1 for Constrained regret minimization for multi-criterion multi-armed bandits
Figure 2 for Constrained regret minimization for multi-criterion multi-armed bandits
Figure 3 for Constrained regret minimization for multi-criterion multi-armed bandits
Viaarxiv icon

A Framework for End-to-End Deep Learning-Based Anomaly Detection in Transportation Networks

Add code
Bookmark button
Alert button
Nov 20, 2019
Neema Davis, Gaurav Raina, Krishna Jagannathan

Figure 1 for A Framework for End-to-End Deep Learning-Based Anomaly Detection in Transportation Networks
Figure 2 for A Framework for End-to-End Deep Learning-Based Anomaly Detection in Transportation Networks
Figure 3 for A Framework for End-to-End Deep Learning-Based Anomaly Detection in Transportation Networks
Figure 4 for A Framework for End-to-End Deep Learning-Based Anomaly Detection in Transportation Networks
Viaarxiv icon

LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory

Add code
Bookmark button
Alert button
Sep 13, 2019
Neema Davis, Gaurav Raina, Krishna Jagannathan

Figure 1 for LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory
Figure 2 for LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory
Figure 3 for LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory
Figure 4 for LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory
Viaarxiv icon

Distribution oblivious, risk-aware algorithms for multi-armed bandits with unbounded rewards

Add code
Bookmark button
Alert button
Jun 03, 2019
Anmol Kagrecha, Jayakrishnan Nair, Krishna Jagannathan

Figure 1 for Distribution oblivious, risk-aware algorithms for multi-armed bandits with unbounded rewards
Figure 2 for Distribution oblivious, risk-aware algorithms for multi-armed bandits with unbounded rewards
Viaarxiv icon

Grids versus Graphs: Partitioning Space for Improved Taxi Demand-Supply Forecasts

Add code
Bookmark button
Alert button
Feb 18, 2019
Neema Davis, Gaurav Raina, Krishna Jagannathan

Figure 1 for Grids versus Graphs: Partitioning Space for Improved Taxi Demand-Supply Forecasts
Figure 2 for Grids versus Graphs: Partitioning Space for Improved Taxi Demand-Supply Forecasts
Figure 3 for Grids versus Graphs: Partitioning Space for Improved Taxi Demand-Supply Forecasts
Figure 4 for Grids versus Graphs: Partitioning Space for Improved Taxi Demand-Supply Forecasts
Viaarxiv icon

Risk-aware Multi-armed Bandits Using Conditional Value-at-Risk

Add code
Bookmark button
Alert button
Jan 04, 2019
Ravi Kumar Kolla, Prashanth L A, Krishna Jagannathan

Figure 1 for Risk-aware Multi-armed Bandits Using Conditional Value-at-Risk
Figure 2 for Risk-aware Multi-armed Bandits Using Conditional Value-at-Risk
Viaarxiv icon