Picture for Konstantina Christakopoulou

Konstantina Christakopoulou

Agents Thinking Fast and Slow: A Talker-Reasoner Architecture

Add code
Oct 10, 2024
Viaarxiv icon

Large Language Models for User Interest Journeys

Add code
May 24, 2023
Viaarxiv icon

Reward Shaping for User Satisfaction in a REINFORCE Recommender

Add code
Sep 30, 2022
Figure 1 for Reward Shaping for User Satisfaction in a REINFORCE Recommender
Figure 2 for Reward Shaping for User Satisfaction in a REINFORCE Recommender
Figure 3 for Reward Shaping for User Satisfaction in a REINFORCE Recommender
Figure 4 for Reward Shaping for User Satisfaction in a REINFORCE Recommender
Viaarxiv icon

Rethinking Reinforcement Learning for Recommendation: A Prompt Perspective

Add code
Jun 15, 2022
Figure 1 for Rethinking Reinforcement Learning for Recommendation: A Prompt Perspective
Figure 2 for Rethinking Reinforcement Learning for Recommendation: A Prompt Perspective
Figure 3 for Rethinking Reinforcement Learning for Recommendation: A Prompt Perspective
Figure 4 for Rethinking Reinforcement Learning for Recommendation: A Prompt Perspective
Viaarxiv icon

Towards Content Provider Aware Recommender Systems: A Simulation Study on the Interplay between User and Provider Utilities

Add code
May 06, 2021
Figure 1 for Towards Content Provider Aware Recommender Systems: A Simulation Study on the Interplay between User and Provider Utilities
Figure 2 for Towards Content Provider Aware Recommender Systems: A Simulation Study on the Interplay between User and Provider Utilities
Figure 3 for Towards Content Provider Aware Recommender Systems: A Simulation Study on the Interplay between User and Provider Utilities
Figure 4 for Towards Content Provider Aware Recommender Systems: A Simulation Study on the Interplay between User and Provider Utilities
Viaarxiv icon

Adversarial Recommendation: Attack of the Learned Fake Users

Add code
Sep 21, 2018
Figure 1 for Adversarial Recommendation: Attack of the Learned Fake Users
Figure 2 for Adversarial Recommendation: Attack of the Learned Fake Users
Figure 3 for Adversarial Recommendation: Attack of the Learned Fake Users
Figure 4 for Adversarial Recommendation: Attack of the Learned Fake Users
Viaarxiv icon

Glass-Box Program Synthesis: A Machine Learning Approach

Add code
Sep 25, 2017
Figure 1 for Glass-Box Program Synthesis: A Machine Learning Approach
Figure 2 for Glass-Box Program Synthesis: A Machine Learning Approach
Figure 3 for Glass-Box Program Synthesis: A Machine Learning Approach
Figure 4 for Glass-Box Program Synthesis: A Machine Learning Approach
Viaarxiv icon

Recommendation under Capacity Constraints

Add code
Mar 12, 2017
Figure 1 for Recommendation under Capacity Constraints
Figure 2 for Recommendation under Capacity Constraints
Figure 3 for Recommendation under Capacity Constraints
Figure 4 for Recommendation under Capacity Constraints
Viaarxiv icon