
Inferential Induction: Joint Bayesian Estimation of MDPs and Value Functions
Bayesian reinforcement learning (BRL) offers a decisiontheoretic soluti...
read it

Nearoptimal Bayesian Solution For Unknown Discrete Markov Decision Process
We tackle the problem of acting in an unknown finite and discrete Markov...
read it

Nearoptimal Reinforcement Learning using Bayesian Quantiles
We study modelbased reinforcement learning in finite communicating Mark...
read it

Epistemic RiskSensitive Reinforcement Learning
We develop a framework for interacting with uncertain environments in re...
read it

NearOptimal Online Egalitarian learning in General Sum Repeated Matrix Games
We study twoplayer general sum repeated finite games where the rewards ...
read it

Differential Privacy for Multiarmed Bandits: What Is It and What Is Its Cost?
We introduce a number of privacy definitions for the multiarmed bandit ...
read it

Nearoptimal Optimistic Reinforcement Learning using Empirical Bernstein Inequalities
We study modelbased reinforcement learning in an unknown finite communi...
read it

Randomised Bayesian LeastSquares Policy Iteration
We introduce Bayesian leastsquares policy iteration (BLSPI), an offpol...
read it

Deeper & Sparser Exploration
We address the problem of efficient exploration by proposing a new meta ...
read it

On The Differential Privacy of Thompson Sampling With Gaussian Prior
We show that Thompson Sampling with Gaussian Prior as detailed by Algori...
read it

Subjective fairness: Fairness is in the eye of the beholder
We analyze different notions of fairness in decision making when the und...
read it

Thompson Sampling For Stochastic Bandits with Graph Feedback
We present a novel extension of Thompson Sampling for stochastic sequent...
read it

Achieving Privacy in the Adversarial MultiArmed Bandit
In this paper, we improve the previously best known regret bound to achi...
read it

On the Differential Privacy of Bayesian Inference
We study how to communicate findings of Bayesian inference to third part...
read it

Algorithms for Differentially Private MultiArmed Bandits
We present differentially private algorithms for the stochastic MultiAr...
read it

Generalised Entropy MDPs and Minimax Regret
Bayesian methods suffer from the problem of how to specify prior beliefs...
read it

Probabilistic inverse reinforcement learning in unknown environments
We consider the problem of learning by demonstration from agents acting ...
read it

Bayesian Differential Privacy through Posterior Sampling
Differential privacy formalises privacypreserving mechanisms that provi...
read it

Cover Tree Bayesian Reinforcement Learning
This paper proposes an online treebased Bayesian approach for reinforce...
read it

ABC Reinforcement Learning
This paper introduces a simple, general framework for likelihoodfree Ba...
read it

MonteCarlo utility estimates for Bayesian reinforcement learning
This paper introduces a set of algorithms for MonteCarlo Bayesian reinf...
read it

Personalized News Recommendation with Context Trees
The profusion of online news articles makes it difficult to find interes...
read it

Sparse Reward Processes
We introduce a class of learning problems where the agent is presented w...
read it

Bayesian multitask inverse reinforcement learning
We generalise the problem of inverse reinforcement learning to multiple ...
read it

Robust Bayesian reinforcement learning through tight lower bounds
In the Bayesian approach to sequential decision making, exact calculatio...
read it

Preference elicitation and inverse reinforcement learning
We state the problem of inverse reinforcement learning in terms of prefe...
read it

Complexity of stochastic branch and bound methods for belief tree search in Bayesian reinforcement learning
There has been a lot of recent work on Bayesian methods for reinforcemen...
read it

Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classif...
read it

Intrusion Detection Using CostSensitive Classification
Intrusion Detection is an invaluable part of computer networks defense. ...
read it

Algorithms and Bounds for Rollout Sampling Approximate Policy Iteration
Several approximate policy iteration schemes without value functions, wh...
read it
Christos Dimitrakakis
verfied profile
Professor at the University of Oslo, Researcher at Chalmers university of technology