Applying Multi-armed Bandit Strategies to Change of Collaboration Patterns at Runtime