• Shi L, Wang J and Wu T. Statistical inference on multi-armed bandits with delayed feedback. Proceedings of the 40th International Conference on Machine Learning. (31328-31352).

    /doi/10.5555/3618408.3619705

  • Liberali G and Ferecatu A. (2022). Morphing for Consumer Dynamics. Marketing Science. 41:4. (769-794). Online publication date: 1-Jul-2022.

    https://doi.org/10.1287/mksc.2021.1346

  • Bistritz I and Leshem A. (2021). Game of Thrones. Mathematics of Operations Research. 46:1. (159-178). Online publication date: 1-Feb-2021.

    https://doi.org/10.1287/moor.2020.1051

  • Yemini M, Leshem A and Somekh-Baruch A. Restless Hidden Markov Bandit with Linear Rewards. 2020 59th IEEE Conference on Decision and Control (CDC). (1183-1189).

    https://doi.org/10.1109/CDC42340.2020.9304511

  • Schwartz E, Bradlow E and Fader P. (2017). Customer Acquisition via Display Advertising Using Multi-Armed Bandit Experiments. Marketing Science. 36:4. (500-522). Online publication date: 1-Jul-2017.

    https://doi.org/10.1287/mksc.2016.1023

  • Xu M, Liu G and Guan J. (2015). Towards a secure medium access control protocol for cluster-based underwater wireless sensor networks. International Journal of Distributed Sensor Networks. 2015. (40-40). Online publication date: 1-Jan-2015.

    https://doi.org/10.1155/2015/325474

  • Yu F and Tang H. (2010). Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks. Wireless Networks. 16:8. (2169-2178). Online publication date: 1-Nov-2010.

    https://doi.org/10.1007/s11276-010-0250-6