Vote for your favorite mineral in #MinCup25! - Topaz vs. Kyanite
It's a battle of high-pressure colourful beauties of #topaz vs #kyanite. Which can stand the heat of round 1?
Log InRegister
Quick Links : The Mindat ManualThe Rock H. Currier Digital LibraryMindat Newsletter [Free Download]
Home PageAbout MindatThe Mindat ManualHistory of MindatCopyright StatusWho We AreContact UsAdvertise on Mindat
Donate to MindatCorporate SponsorshipSponsor a PageSponsored PagesMindat AdvertisersAdvertise on Mindat
Learning CenterWhat is a mineral?The most common minerals on earthInformation for EducatorsMindat ArticlesThe ElementsThe Rock H. Currier Digital LibraryGeologic Time
Minerals by PropertiesMinerals by ChemistryAdvanced Locality SearchRandom MineralRandom LocalitySearch by minIDLocalities Near MeSearch ArticlesSearch GlossaryMore Search Options
Search For:
Mineral Name:
Locality Name:
Keyword(s):
 
The Mindat ManualAdd a New PhotoRate PhotosLocality Edit ReportCoordinate Completion ReportAdd Glossary Item
Mining CompaniesStatisticsUsersMineral MuseumsClubs & OrganizationsMineral Shows & EventsThe Mindat DirectoryDevice SettingsThe Mineral Quiz
Photo SearchPhoto GalleriesSearch by ColorNew Photos TodayNew Photos YesterdayMembers' Photo GalleriesPast Photo of the Day GalleryPhotography

Austin, Edward; Morgan, Lucy E. (2025) Detecting changes and anomalies in nonstationary contextual bandits with an application to task categorisation. Information Sciences, 717. doi:10.1016/j.ins.2025.122270

Advanced
   -   Only viewable:
Reference TypeJournal (article/letter/editorial)
TitleDetecting changes and anomalies in nonstationary contextual bandits with an application to task categorisation
JournalInformation Sciences
AuthorsAustin, EdwardAuthor
Morgan, Lucy E.Author
Year2025 (November)Volume717
PublisherElsevier BV
DOIdoi:10.1016/j.ins.2025.122270Search in ResearchGate
Generate Citation Formats
Mindat Ref. ID18441490Long-form Identifiermindat:1:5:18441490:1
GUID0
Full ReferenceAustin, Edward; Morgan, Lucy E. (2025) Detecting changes and anomalies in nonstationary contextual bandits with an application to task categorisation. Information Sciences, 717. doi:10.1016/j.ins.2025.122270
Plain TextAustin, Edward; Morgan, Lucy E. (2025) Detecting changes and anomalies in nonstationary contextual bandits with an application to task categorisation. Information Sciences, 717. doi:10.1016/j.ins.2025.122270
In(2025) Information Sciences Vol. 717. Elsevier BV

References Listed

These are the references the publisher has listed as being connected to the article. Please check the article itself for the full list of references which may differ. Not all references are currently linkable within the Digital Library.

Not Yet Imported: Computer Science & IT Research Journal - journal-article : 10.51594/csitrj.v5i1.700

If you would like this item imported into the Digital Library, please contact us quoting Journal ID
Not Yet Imported: - journal-article : 10.1109/MNET.001.2100405

If you would like this item imported into the Digital Library, please contact us quoting Journal ID
Not Yet Imported: Advances in Applied Mathematics - journal-article : 10.1016/0196-8858(85)90002-8

If you would like this item imported into the Digital Library, please contact us quoting Journal ID
Not Yet Imported: - journal-article : 10.1016/j.trc.2019.07.020

If you would like this item imported into the Digital Library, please contact us quoting Journal ID
Not Yet Imported: - journal-article : 10.1109/MWC.2016.7498076

If you would like this item imported into the Digital Library, please contact us quoting Journal ID
Moradipari (2018) Learning to dynamically price electricity demand based on multi-armed bandits , 917
Mate (2021) Risk-aware interventions in public health: planning with restless multi-armed bandits , 880
He ()
Lin (2018) Contextual bandit with adaptive feature extraction , 937
Xu (2020) Contextual-bandit based personalized recommendation with time-varying user interests vol. 34, 6518
Luo (2018) Efficient contextual bandits in non-stationary worlds , 1739
Zhu ()
Wirth (2023) Contextual multi-armed bandits for non-stationary heterogeneous mobile edge computing , 1
Not Yet Imported: - journal-article : 10.1007/s11222-022-10112-3

If you would like this item imported into the Digital Library, please contact us quoting Journal ID
Wu (2018) Learning contextual bandits in a non-stationary environment , 495
Not Yet Imported: - journal-article : 10.1109/OJSP.2024.3386490

If you would like this item imported into the Digital Library, please contact us quoting Journal ID
Chen (2019) A new algorithm for non-stationary contextual bandits: efficient, optimal and parameter-free , 696
Baheri (2025) Mathematics Multilevel constrained bandits: a hierarchical upper confidence bound approach with safety guarantees 13, 149
Ghoorchian (2024) IEEE Open J. Signal Process. Contextual multi-armed bandit with costly feature observation in non-stationary environments , 1
Chen (2021) Combinatorial semi-bandit in the non-stationary environment , 865
Liu (2022) Adv. Neural Inf. Process. Syst. Non-stationary bandits with knapsacks 35, 16522
Min (2024) IEEE Trans. Veh. Technol. Beam alignment for non-stationary environments using a novel time-varying structured bandit , 1
Chen (2022) Online and distribution-free robustness: regression and contextual bandits with Huber contamination , 684
Niss (2020) What you see may not be what you get: ucb bandit algorithms robust to ε-contamination vol. 124, 450
Zhao ()
Mathieu (2024) Trans. Mach. Learn. Res. J. Bandits corrupted by nature: lower bounds on regret and robust optimistic algorithms
Lattimore (2020)
Cao (2019) Nearly optimal adaptive procedure with change detection for piecewise-stationary bandit , 418
Not Yet Imported: - journal-article : 10.1002/sam.11586

If you would like this item imported into the Digital Library, please contact us quoting Journal ID
Not Yet Imported: - journal-article : 10.1023/A:1013689704352

If you would like this item imported into the Digital Library, please contact us quoting Journal ID
Oh (2021) Multinomial logit contextual bandits: provable optimality and practicality vol. 35, 9205
Not Yet Imported: IEEE Access - journal-article : 10.1109/ACCESS.2021.3114430

If you would like this item imported into the Digital Library, please contact us quoting Journal ID
Pires (2024) IEEE Trans. Mach. Learn. Commun. Netw. On learning suitable caching policies for in-network caching
Han (2025) IEEE Open J. Commun. Soc. Bandit-based multiple access approach for multi-link operation in heterogeneous dynamic networks
Chen (2025) Application of Multi-Armed Bandit Algorithm in Quantitative Finance vol. 73, 01011
Kim (2023) A gans-based approach for stock price anomaly detection and investment risk management , 1
Not Yet Imported: Information Systems Research - journal-article : 10.1287/isre.2022.1191

If you would like this item imported into the Digital Library, please contact us quoting Journal ID


See Also

These are possibly similar items as determined by title/reference text matching only.

 
and/or  
Mindat.org is an outreach project of the Hudson Institute of Mineralogy, a 501(c)(3) not-for-profit organization.
Copyright © mindat.org and the Hudson Institute of Mineralogy 1993-2025, except where stated. Most political location boundaries are © OpenStreetMap contributors. Mindat.org relies on the contributions of thousands of members and supporters. Founded in 2000 by Jolyon Ralph.
To cite: Ralph, J., Von Bargen, D., Martynov, P., Zhang, J., Que, X., Prabhu, A., Morrison, S. M., Li, W., Chen, W., & Ma, X. (2025). Mindat.org: The open access mineralogy database to accelerate data-intensive geoscience research. American Mineralogist, 110(6), 833–844. doi:10.2138/am-2024-9486.
Privacy Policy - Terms & Conditions - Contact Us / DMCA issues - Report a bug/vulnerability Current server date and time: September 13, 2025 07:39:19
Go to top of page