This paper reports the results of a study of Web usage of 139 users over a 8 month period of time. It uses a longitudinal Web log analysis of the URLs accessed during 33916 user-d...
Mario Christ, Steffan Baron, Ramayya Krishnan, Dan...
Traditionally, companies aiming to achieve competition among suppliers have used sealed bidding procedures in their sourcing processes. The advances in information technology and i...
This paper presents Pandora, a network monitoring platform that captures packets using purely passive techniques. Pandora addresses current needs for improving Internet middleware...
We consider approximate policy evaluation for finite state and action Markov decision processes (MDP) in the off-policy learning context and with the simulation-based least square...
We introduce and analyze a natural algorithm for multi-venue exploration from censored data, which is motivated by the Dark Pool Problem of modern quantitative finance. We prove t...
Kuzman Ganchev, Yuriy Nevmyvaka, Michael Kearns, J...