Second Order Methods for Bandit Optimization and Control

Open in new window