Protected: Course Assignment

There is no excerpt because this is a protected post.

[Seminar] Learning Diverse Rankings with Multi-Armed Bandits

Learning diverse rankings with multi-armed bandits The original paper, http://portal.acm.org/citation.cfm?id=1390255 @inproceedings{Radlinski:2008:LDR:1390156.1390255, author = {Radlinski, Filip and Kleinberg, Robert and Joachims, Thorsten}, title = {Learning diverse rankings with multi-armed bandits}, booktitle = {Proceedings of the 25th international conference on Machine learning}, series = {ICML ’08}, year = {2008}, isbn = {978-1-60558-205-4}, location = {Helsinki, Finland}, pages = {784–791}, numpages = {8}, url = {http://doi.acm.org/10.1145/1390156.1390255}, doi = {http://doi.acm.org/10.1145/1390156.1390255}, acmid = {1390255}, publisher = [...]

ECIR2011 Tutorial: Risk Management in Information Retrieval

Jun Wang, University College London and Kevyn Collins-Thompson, Microsoft Research 1. Course objectives Risk modelling and management are a new concept in Information Retrieval (IR) modelling. The new way of  thinking has significantly departed from the classic information retrieval methodologies originated from the Probability Ranking Principle, the Robertson- Spärck Jones model (the resulting BM25 formula), and the [...]