Results 71 to 80 of about 33,931 (272)
ABSTRACT Customer incivility (CI) increasingly shapes service work, from frontline hospitality staff to digital agents in retail and banking. This study applies the PRISMA protocol to review 112 empirical articles published between 2009 and 2025. Using the Theory, Context, Characteristics and Methods (TCCM) framework, we synthesise key findings and ...
Maqsood H. Bhutto +3 more
wiley +1 more source
Multi-Dimensional Arms for Combinatorial Multi-Armed Bandit
The multi-armed bandit (MAB) problem with concave rewards has indeed become a significant area of research in recent years. In MAB problem, maximizing total rewards within a fixed number of pulls is a common objective.
Qi Li, Lijun Cai
doaj +1 more source
Optimizing Ad Recommendations Using A Bayesian Multi-Armed Bandit Approach [PDF]
The contextual multi-armed bandit problem in online advertising recommendation represents a core challenge in recommender systems. Traditional approaches, including Linear Upper Confidence Bound (LinUCB) and Feature-based Collaborative Filtering ...
Zeng Yijian
doaj +1 more source
Robustness of Anytime Bandit Policies [PDF]
This paper studies the deviations of the regret in a stochastic multi-armed bandit problem. When the total number of plays n is known beforehand by the agent, Audibert et al.
Audibert, Jean-Yves, Salomon, Antoine
core +3 more sources
Human at the Center: A Framework for Human‐Driven AI Development
Abstract Artificial Intelligence (AI) systems increasingly shape many aspects of daily life, influencing our jobs, finances, healthcare, and online content. This expansion has led to the rise of human–AI systems, where humans communicate, collaborate, or otherwise interact with AI, such as using AI outputs to make decisions.
Danniell Hu +6 more
wiley +1 more source
Multi-objective Contextual Multi-armed Bandit with a Dominant Objective
In this paper, we propose a new multi-objective contextual multi-armed bandit (MAB) problem with two objectives, where one of the objectives dominates the other objective.
Tekin, Cem, Turgay, Eralp
core +3 more sources
The characteristics of a vertical n–p–i–p heterostructure transistor device, which exhibits a voltage‐tunable transition between Gaussian and sigmoid functions, are investigated. The mixed state of the transfer curve enables the utilization of both exploitation and exploration, improving computational performance in reinforcement learning tasks ...
Jisoo Park +7 more
wiley +1 more source
Multi-armed bandit-based adaptive control of advertising in social networks
In a rapidly changing marketing environment, to ensure the success of an advertising campaign, it is necessary to minimize the time from the idea of advertising to the implementation of communication.
О. Shtovba
doaj +1 more source
Exploration vs Exploitation vs Safety: Risk-averse Multi-Armed Bandits [PDF]
Motivated by applications in energy management, this paper presents the Multi-Armed Risk-Aware Bandit (MARAB) algorithm. With the goal of limiting the exploration of risky arms, MARAB takes as arm quality its conditional value at risk.
Galichet, Nicolas +2 more
core +3 more sources
Multi-armed bandits for resource efficient, online optimization of language model pre-training: the use case of dynamic masking [PDF]
Iñigo Urteaga +3 more
openalex +1 more source

