Picture for Dean Foster

Dean Foster

University of Pennsylvania

How Does Critical Batch Size Scale in Pre-training?

Add code
Oct 29, 2024
Viaarxiv icon

A Study on the Calibration of In-context Learning

Add code
Dec 11, 2023
Viaarxiv icon

AI safety by debate via regret minimization

Add code
Dec 08, 2023
Viaarxiv icon

Learning an Inventory Control Policy with General Inventory Arrival Dynamics

Add code
Oct 26, 2023
Viaarxiv icon

Contextual Bandits for Evaluating and Improving Inventory Control Policies

Add code
Oct 24, 2023
Figure 1 for Contextual Bandits for Evaluating and Improving Inventory Control Policies
Viaarxiv icon

Scaling Laws for Imitation Learning in NetHack

Add code
Jul 18, 2023
Viaarxiv icon

Deep Inventory Management

Add code
Oct 06, 2022
Figure 1 for Deep Inventory Management
Figure 2 for Deep Inventory Management
Figure 3 for Deep Inventory Management
Figure 4 for Deep Inventory Management
Viaarxiv icon

Assessment of Treatment Effect Estimators for Heavy-Tailed Data

Add code
Dec 19, 2021
Figure 1 for Assessment of Treatment Effect Estimators for Heavy-Tailed Data
Figure 2 for Assessment of Treatment Effect Estimators for Heavy-Tailed Data
Figure 3 for Assessment of Treatment Effect Estimators for Heavy-Tailed Data
Figure 4 for Assessment of Treatment Effect Estimators for Heavy-Tailed Data
Viaarxiv icon

Variance Reduction in Training Forecasting Models with Subgroup Sampling

Add code
Mar 02, 2021
Figure 1 for Variance Reduction in Training Forecasting Models with Subgroup Sampling
Figure 2 for Variance Reduction in Training Forecasting Models with Subgroup Sampling
Figure 3 for Variance Reduction in Training Forecasting Models with Subgroup Sampling
Figure 4 for Variance Reduction in Training Forecasting Models with Subgroup Sampling
Viaarxiv icon

Top-$k$ eXtreme Contextual Bandits with Arm Hierarchy

Add code
Feb 15, 2021
Figure 1 for Top-$k$ eXtreme Contextual Bandits with Arm Hierarchy
Figure 2 for Top-$k$ eXtreme Contextual Bandits with Arm Hierarchy
Figure 3 for Top-$k$ eXtreme Contextual Bandits with Arm Hierarchy
Figure 4 for Top-$k$ eXtreme Contextual Bandits with Arm Hierarchy
Viaarxiv icon