Please use this identifier to cite or link to this item:
http://arks.princeton.edu/ark:/88435/dsp01b5644r63g
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Bubeck, Sébastien | - |
dc.contributor.author | Korać, Damjan | - |
dc.date.accessioned | 2013-07-12T15:32:11Z | - |
dc.date.available | 2013-07-12T15:32:11Z | - |
dc.date.created | 2013-06 | - |
dc.date.issued | 2013-07-12 | - |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/dsp01b5644r63g | - |
dc.description.abstract | We explore, in increasing complexity, various strategies for addressing the Multi- Armed Bandit Problem in order to find the algorithm that maximizes the clickthrough rate in the Exploration and Exploitation Challenge 3 competition. The data used result from the actions of web site visitors who clicked on news articles, and we utilize different policies to decide how to optimally display the various articles. We implement several policies and find a score for two versions of each algorithm: one that is primed on test data and one that encounters the actual competition data without any prior knowledge. An Upper Con dence Bound strategy proves to outperform other algorithms for the tuned trials, and a more recent policy with bounded regrets serves as the best out of the box strategy. | en_US |
dc.format.extent | 84 pages | en_US |
dc.language.iso | en_US | en_US |
dc.title | A Survey of Strategies for the Multi-Armed Bandit Problem | en_US |
dc.type | Princeton University Senior Theses | - |
pu.date.classyear | 2013 | en_US |
pu.department | Operations Research and Financial Engineering | en_US |
pu.pdf.coverpage | SeniorThesisCoverPage | - |
dc.rights.accessRights | Walk-in Access. This thesis can only be viewed on computer terminals at the <a href=http://mudd.princeton.edu>Mudd Manuscript Library</a>. | - |
pu.mudd.walkin | yes | - |
Appears in Collections: | Operations Research and Financial Engineering, 2000-2020 |
Files in This Item:
File | Size | Format | |
---|---|---|---|
Korac Damjan Thesis.pdf | 1.85 MB | Adobe PDF | Request a copy |
Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.