Second Order Methods for Bandit Optimization and Control