{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T18:26:18Z","timestamp":1725992778219},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030014209"},{"type":"electronic","value":"9783030014216"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01421-6_32","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T16:50:11Z","timestamp":1537894211000},"page":"326-336","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Con-CNAME: A Contextual Multi-armed Bandit Algorithm for Personalized Recommendations"],"prefix":"10.1007","author":[{"given":"Xiaofang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qian","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Tieke","family":"He","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"32_CR1","unstructured":"Sutton, R.S., Barto, A.G.: Introduction to reinforcement learning. Mach. Learn. 16(1), 285\u2013286 (2005)"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Li, S., Karatzoglou, A., Gentile, C.: Collaborative filtering bandits. In: International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 539\u2013548 (2016)","DOI":"10.1145\/2911451.2911548"},{"key":"32_CR3","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-34481-7_43","volume-title":"Neural Information Processing","author":"Sepehr Eghbali","year":"2012","unstructured":"Eghbali, S., Ashtiani, M.H.Z., Ahmadabadi, M.N., et al.: Bandit-based structure learning for bayesian network classifiers. In: International Conference on Neural Information Processing, pp. 349\u2013356 (2012)"},{"issue":"3","key":"32_CR4","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/245108.245121","volume":"40","author":"P Resnick","year":"1997","unstructured":"Resnick, P., Varian, H.R.: Recommender systems. Commun. ACM 40(3), 56\u201358 (1997)","journal-title":"Commun. ACM"},{"issue":"3","key":"32_CR5","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/245108.245124","volume":"40","author":"M Balabanovi\u0107","year":"1997","unstructured":"Balabanovi\u0107, M., Shoham, Y.: Fab: content-based, collaborative recommendation. Commun. ACM 40(3), 66\u201372 (1997)","journal-title":"Commun. ACM"},{"issue":"2","key":"32_CR6","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2), 235\u2013256 (2002)","journal-title":"Mach. Learn."},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Liu, J., Dolan, P., Pedersen, E.R.: Personalized news recommendation based on click behavior. In: International Conference on Intelligent User Interfaces, pp. 31\u201340 (2010)","DOI":"10.1145\/1719970.1719976"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Dhanda, M., Verma, V.: Personalized recommendation approach for academic literature using high-utility itemset mining technique. Progress in Intelligent Computing Techniques: Theory, Practice, and Applications (2018)","DOI":"10.1007\/978-981-10-3376-6_27"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Schein, A.I., Popescul, A., Ungar, L.H., et al.: Methods and metrics for cold-start recommendations. In: Proceedings of ACM SIGIR Conference on Research & Development in Information Retrieval, vol. 39(5), 253\u2013260 (2002)","DOI":"10.1145\/564376.564421"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Mary, J., Gaudel, R., Philippe, P.: Bandits warm-up cold recommender systems. Computer Science (2014)","DOI":"10.1007\/978-3-319-27926-8_29"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Tang, L., Jiang, Y., Li, L., Li, T.: Ensemble contextual bandits for personalized recommendation. In: RecSys, pp. 73\u201380 (2014)","DOI":"10.1145\/2645710.2645732"},{"issue":"6","key":"32_CR12","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TKDE.2005.99","volume":"17","author":"G Adomavicius","year":"2005","unstructured":"Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Trans. Knowl. Data Eng. 17(6), 734\u2013749 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"32_CR13","first-page":"1265","volume":"6","author":"G Shani","year":"2005","unstructured":"Shani, G., Heckerman, D., Brafman, R.I.: An MDP-based recommender system. J. Mach. Learn. Res. 6(1), 1265\u20131295 (2005)","journal-title":"J. Mach. Learn. Res."},{"key":"32_CR14","unstructured":"Ren, Z., Krogh, B.H.: State aggregation in markov decision processes. In: IEEE Conference on Decision and Control, pp. 3819\u20133824 (2002)"},{"key":"32_CR15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546921","volume-title":"Prediction, Learning, and Games","author":"N Cesa-Bianchi","year":"2006","unstructured":"Cesa-Bianchi, N., Lugosi, G.: Prediction, Learning, and Games. Cambridge University Press, Cambridge (2006)"},{"key":"32_CR16","unstructured":"Cesa-Bianchi, N., Fischer, P.: Finite-time regret bounds for the multi-armed bandit problem. In: ICML, pp. 100\u2013108 (1998)"},{"issue":"42","key":"32_CR17","first-page":"1","volume":"23","author":"S Bubeck","year":"2012","unstructured":"Bubeck, S., Slivkins, A.: The best of both worlds: stochastic and adversarial bandits. J. Mach. Learn. Res. 23(42), 1\u201323 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"32_CR18","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-1-4899-7637-6_6","volume-title":"Recommender Systems Handbook","author":"Gediminas Adomavicius","year":"2015","unstructured":"Adomavicius, G., Tuzhilin, A.: Context-aware recommender systems. In: Recommender Systems Handbook, pp. 191\u2013226 (2015)"},{"issue":"1","key":"32_CR19","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/1055709.1055714","volume":"23","author":"G Adomavicius","year":"2005","unstructured":"Adomavicius, G., Sankaranarayanan, R., Sen, S., Tuzhilin, A.: Incorporating contextual information in recommender systems using a multidimensional approach. ACM Trans. Inf. Syst. 23(1), 103\u2013145 (2005)","journal-title":"ACM Trans. Inf. Syst."},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Li, L., Chu, W., Langford, J., Schapire, R. E.: A contextual-bandit approach to personalized news article recommendation. In: World Wide Web, pp. 661\u2013670 (2010)","DOI":"10.1145\/1772690.1772758"},{"issue":"3","key":"32_CR21","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1109\/TSC.2014.2365795","volume":"9","author":"L Song","year":"2016","unstructured":"Song, L., Tekin, C., Schaar, M.V.D.: Online learning in large-scale contextual recommender systems. IEEE Trans. Serv. Comput. 9(3), 433\u2013445 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"18","key":"32_CR22","doi-asserted-by":"publisher","first-page":"7400","DOI":"10.1016\/j.eswa.2013.07.041","volume":"40","author":"AMH Jo\u015be","year":"2013","unstructured":"Jo\u015be, A.M.H., Vargas, A.M.: Linear bayes policy for learning in contextual-bandits. Expert Syst. Appl. 40(18), 7400\u20137406 (2013)","journal-title":"Expert Syst. Appl."},{"key":"32_CR23","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/978-3-319-70087-8_83","volume-title":"Neural Information Processing","author":"Qian Zhou","year":"2017","unstructured":"Zhou, Q., Zhang, X.F, Xu, J., et al.: Large-scale bandit approaches for recommender systems. In: International Conference on Neural Information Processing, pp. 811\u2013821 (2017)"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Machine Learning \u2013 ICANN 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01421-6_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T17:32:24Z","timestamp":1571938344000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01421-6_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030014209","9783030014216"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01421-6_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icann2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-nns.org\/icann2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"easyacademia.org","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"360","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"139","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"28","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"In addition there are 41 full poster papers and 11 short poster papers included in the proceedings","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}