no code implementations • 8 Jun 2020 • Gal Bahar, Omer Ben-Porat, Kevin Leyton-Brown, Moshe Tennenholtz
A recent body of work addresses safety constraints in explore-and-exploit systems.
no code implementations • ICML 2020 • Gal Bahar, Omer Ben-Porat, Kevin Leyton-Brown, Moshe Tennenholtz
Recommendation systems often face exploration-exploitation tradeoffs: the system can only learn about the desirability of new options by recommending them to some user.