Material to “ Online Clustering of Bandits ”

نویسندگان

  • Claudio Gentile
  • Shuai Li
  • Giovanni Zappella
چکیده

This supplementary material contains all proofs and technical details omitted from the main text, along with ancillary comments, discussion about related work, and extra experimental results. 1. Proof of Theorem 1 The following sequence of lemmas are of preliminary importance. The first one needs extra variance conditions on the process X generating the context vectors. We find it convenient to introduce the node counterpart to TCBj,t−1(x), and the cluster counterpart to T̃CBi,t−1. Given round t, node i ∈ V , and cluster index j ∈ {1, . . . ,mt}, we let TCBi,t−1(x) = √ x⊤M−1 i,t−1x ( σ √ 2 log |Mi,t−1| δ/2 + 1 ) T̃CBj,t−1 = σ √ 2d log t+ 2 log(2/δ) + 1 √ 1 +Aλ(T̄j,t−1, δ/(2m+1d)) ,

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Online Clustering of Contextual Cascading Bandits

We consider a new setting of online clustering of contextual cascading bandits, an online learning problem where the underlying cluster structure over users is unknown and needs to be learned from a random prefix feedback. More precisely, a learning agent recommends an ordered list of items to a user, who checks the list and stops at the first satisfactory item, if any. We propose an algorithm ...

متن کامل

Online Clustering of Bandits

We introduce a novel algorithmic approach to content recommendation based on adaptive clustering of exploration-exploitation (“bandit”) strategies. We provide a sharp regret analysis of this algorithm in a standard stochastic noise setting, demonstrate its scalability properties, and prove its effectiveness on a number of artificial and real-world datasets. Our experiments show a significant in...

متن کامل

BotOnus: an online unsupervised method for Botnet detection

Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...

متن کامل

Online Context-Dependent Clustering in Recommendations based on Exploration-Exploitation Algorithms

We investigate two context-dependent clustering techniques for content recommendation based on exploration-exploitation strategies in contextual multiarmed bandit settings. Our algorithms dynamically group users based on the items under consideration and, possibly, group items based on the similarity of the clusterings induced over the users. The resulting algorithm thus takes advantage of pref...

متن کامل

Context-Aware Bandits

We propose an efficient Context-Aware clustering of Bandits (CAB) algorithm,which can capture collaborative effects. CAB can be easily deployed in a real-world recommendation system, where multi-armed bandits have been shown toperform well in particular with respect to the cold-start problem. CAB utilizes acontext-aware clustering augmented by exploration-exploitation strategies...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014