Alert button
Picture for Lihong Li

Lihong Li

Alert button

Sample-efficient Nonstationary Policy Evaluation for Contextual Bandits

Add code
Bookmark button
Alert button
Oct 16, 2012
Miroslav Dudik, Dumitru Erhan, John Langford, Lihong Li

Figure 1 for Sample-efficient Nonstationary Policy Evaluation for Contextual Bandits
Figure 2 for Sample-efficient Nonstationary Policy Evaluation for Contextual Bandits
Figure 3 for Sample-efficient Nonstationary Policy Evaluation for Contextual Bandits
Viaarxiv icon

Incremental Model-based Learners With Formal Learning-Time Guarantees

Add code
Bookmark button
Alert button
Jun 27, 2012
Alexander L. Strehl, Lihong Li, Michael L. Littman

Figure 1 for Incremental Model-based Learners With Formal Learning-Time Guarantees
Viaarxiv icon

CORL: A Continuous-state Offset-dynamics Reinforcement Learner

Add code
Bookmark button
Alert button
Jun 13, 2012
Emma Brunskill, Bethany Leffler, Lihong Li, Michael L. Littman, Nicholas Roy

Figure 1 for CORL: A Continuous-state Offset-dynamics Reinforcement Learner
Figure 2 for CORL: A Continuous-state Offset-dynamics Reinforcement Learner
Figure 3 for CORL: A Continuous-state Offset-dynamics Reinforcement Learner
Viaarxiv icon

A Bayesian Sampling Approach to Exploration in Reinforcement Learning

Add code
Bookmark button
Alert button
May 09, 2012
John Asmuth, Lihong Li, Michael L. Littman, Ali Nouri, David Wingate

Figure 1 for A Bayesian Sampling Approach to Exploration in Reinforcement Learning
Figure 2 for A Bayesian Sampling Approach to Exploration in Reinforcement Learning
Figure 3 for A Bayesian Sampling Approach to Exploration in Reinforcement Learning
Figure 4 for A Bayesian Sampling Approach to Exploration in Reinforcement Learning
Viaarxiv icon

A Contextual-Bandit Approach to Personalized News Article Recommendation

Add code
Bookmark button
Alert button
Mar 01, 2012
Lihong Li, Wei Chu, John Langford, Robert E. Schapire

Figure 1 for A Contextual-Bandit Approach to Personalized News Article Recommendation
Figure 2 for A Contextual-Bandit Approach to Personalized News Article Recommendation
Figure 3 for A Contextual-Bandit Approach to Personalized News Article Recommendation
Figure 4 for A Contextual-Bandit Approach to Personalized News Article Recommendation
Viaarxiv icon

Unbiased Offline Evaluation of Contextual-bandit-based News Article Recommendation Algorithms

Add code
Bookmark button
Alert button
Mar 01, 2012
Lihong Li, Wei Chu, John Langford, Xuanhui Wang

Figure 1 for Unbiased Offline Evaluation of Contextual-bandit-based News Article Recommendation Algorithms
Figure 2 for Unbiased Offline Evaluation of Contextual-bandit-based News Article Recommendation Algorithms
Figure 3 for Unbiased Offline Evaluation of Contextual-bandit-based News Article Recommendation Algorithms
Figure 4 for Unbiased Offline Evaluation of Contextual-bandit-based News Article Recommendation Algorithms
Viaarxiv icon

Contextual Bandit Algorithms with Supervised Learning Guarantees

Add code
Bookmark button
Alert button
Oct 27, 2011
Alina Beygelzimer, John Langford, Lihong Li, Lev Reyzin, Robert E. Schapire

Viaarxiv icon

Doubly Robust Policy Evaluation and Learning

Add code
Bookmark button
Alert button
May 06, 2011
Miroslav Dudik, John Langford, Lihong Li

Figure 1 for Doubly Robust Policy Evaluation and Learning
Figure 2 for Doubly Robust Policy Evaluation and Learning
Figure 3 for Doubly Robust Policy Evaluation and Learning
Figure 4 for Doubly Robust Policy Evaluation and Learning
Viaarxiv icon

Refining Recency Search Results with User Click Feedback

Add code
Bookmark button
Alert button
Mar 19, 2011
Taesup Moon, Wei Chu, Lihong Li, Zhaohui Zheng, Yi Chang

Figure 1 for Refining Recency Search Results with User Click Feedback
Figure 2 for Refining Recency Search Results with User Click Feedback
Figure 3 for Refining Recency Search Results with User Click Feedback
Figure 4 for Refining Recency Search Results with User Click Feedback
Viaarxiv icon

Learning from Logged Implicit Exploration Data

Add code
Bookmark button
Alert button
Jun 14, 2010
Alex Strehl, John Langford, Sham Kakade, Lihong Li

Figure 1 for Learning from Logged Implicit Exploration Data
Viaarxiv icon