{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:09:57Z","timestamp":1775282997768,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030017125","type":"print"},{"value":"9783030017132","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01713-2_3","type":"book-chapter","created":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T14:22:06Z","timestamp":1542982926000},"page":"29-43","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Incentive Compatible Proactive Skill Posting in Referral Networks"],"prefix":"10.1007","author":[{"given":"Ashiqur R.","family":"KhudaBukhsh","sequence":"first","affiliation":[]},{"given":"Jaime G.","family":"Carbonell","sequence":"additional","affiliation":[]},{"given":"Peter J.","family":"Jansen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,14]]},"reference":[{"key":"3_CR1","first-page":"1620","volume":"2016","author":"AR KhudaBukhsh","year":"2016","unstructured":"KhudaBukhsh, A.R., Jansen, P.J., Carbonell, J.G.: Distributed learning in expert referral networks. Eur. Conf. Artif. Intell. (ECAI) 2016, 1620\u20131621 (2016)","journal-title":"Eur. Conf. Artif. Intell. (ECAI)"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-3-319-50127-7_52","volume-title":"AI 2016: Advances in Artificial Intelligence","author":"AR KhudaBukhsh","year":"2016","unstructured":"KhudaBukhsh, A.R., Carbonell, J.G., Jansen, P.J.: Proactive skill posting in referral networks. In: Kang, B.H., Bai, Q. (eds.) AI 2016. LNCS (LNAI), vol. 9992, pp. 585\u2013596. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-50127-7_52"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Huang, L., Joseph, A.D., Nelson, B., Rubinstein, B.I., Tygar, J.: Adversarial machine learning. In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, pp. 43\u201358. ACM (2011)","DOI":"10.1145\/2046684.2046692"},{"issue":"2\u20133","key":"3_CR4","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2\u20133), 235\u2013256 (2002)","journal-title":"Mach. Learn."},{"key":"3_CR5","unstructured":"Chakrabarti, D., Kumar, R., Radlinski, F., Upfal, E.: Mortal multi-armed bandits. In: Advances in Neural Information Processing Systems, pp. 273\u2013280 (2009)"},{"key":"3_CR6","unstructured":"Xia, Y., Li, H., Qin, T., Yu, N., Liu, T.: Thompson sampling for Budgeted Multi-armed Bandits. CoRR abs\/1505.00146 (2015)"},{"key":"3_CR7","unstructured":"Tran-Thanh, L., Chapman, A.C., Rogers, A., Jennings, N.R.: Knapsack based optimal policies for budget-limited multi-armed bandits. In: Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence (2012)"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-319-59294-7_13","volume-title":"Multi-Agent Systems and Agreement Technologies","author":"AR KhudaBukhsh","year":"2017","unstructured":"KhudaBukhsh, A.R., Carbonell, J.G., Jansen, P.J.: Proactive-DIEL in evolving referral networks. In: Criado Pacheco, N., Carrascosa, C., Osman, N., Juli\u00e1n Inglada, V. (eds.) EUMAS\/AT -2016. LNCS (LNAI), vol. 10207, pp. 148\u2013156. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59294-7_13"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-319-60438-1_29","volume-title":"Foundations of Intelligent Systems","author":"AR KhudaBukhsh","year":"2017","unstructured":"KhudaBukhsh, A.R., Carbonell, J.G., Jansen, P.J.: Robust learning in expert networks: a\u00a0comparative analysis. In: Kryszkiewicz, M., Appice, A., \u015al\u0119zak, D., Rybinski, H., Skowron, A., Ra\u015b, Z.W. (eds.) ISMIS 2017. LNCS (LNAI), vol. 10352, pp. 292\u2013301. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60438-1_29"},{"key":"3_CR10","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4168.001.0001","volume-title":"Learning in Embedded Systems","author":"LP Kaelbling","year":"1993","unstructured":"Kaelbling, L.P.: Learning in Embedded Systems. MIT Press, Cambridge (1993)"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1613\/jair.301","volume":"4","author":"LP Kaelbling","year":"1996","unstructured":"Kaelbling, L.P., Littman, M.L., Moore, A.P.: Reinforcement learning: a survey. J. Artif. Intell. Res. 4, 237\u2013285 (1996)","journal-title":"J. Artif. Intell. Res."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Donmez, P., Carbonell, J.G., Schneider, J.: Efficiently learning the accuracy of labeling sources for selective sampling. In: Proceedings of KDD 2009, p. 259 (2009)","DOI":"10.1145\/1557019.1557053"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/11856214_5","volume-title":"Recent Advances in Intrusion Detection","author":"J Newsome","year":"2006","unstructured":"Newsome, J., Karp, B., Song, D.: Paragraph: thwarting signature learning by training maliciously. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 81\u2013105. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11856214_5"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: IEEE European Symposium on Security and Privacy (EuroS&P), pp. 372\u2013387. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.36"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Babaioff, M., Sharma, Y., Slivkins, A.: Characterizing truthful multi-armed bandit mechanisms. In: Proceedings of the 10th ACM conference on Electronic commerce, pp. 79\u201388. ACM (2009)","DOI":"10.1145\/1566374.1566386"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Biswas, A., Jain, S., Mandal, D., Narahari, Y.: A truthful budget feasible multi-armed bandit mechanism for crowdsourcing time critical tasks. In: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, pp. 1101\u20131109 (2015)","DOI":"10.65109\/MCWB1736"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Tran-Thanh, L., Stein, S., Rogers, A., Jennings, N.R.: Efficient crowdsourcing of unknown experts using multi-armed bandits. In: European Conference on Artificial Intelligence, pp. 768\u2013773 (2012)","DOI":"10.3233\/978-1-61499-098-7-768"},{"key":"3_CR18","unstructured":"Xia, Y., Qin, T., Ma, W., Yu, N., Liu, T.Y.: Budgeted multi-armed bandits with multiple plays. In: Proceedings of 25th International Joint Conference on Artificial Intelligence (2016)"},{"key":"3_CR19","unstructured":"Xia, Y., Ding, W., Zhang, X.D., Yu, N., Qin, T.: Budgeted bandit problems with continuous random costs. In: Proceedings of the 7th Asian Conference on Machine Learning, pp. 317\u2013332 (2015)"},{"issue":"3","key":"3_CR20","first-page":"279","volume":"8","author":"CJ Watkins","year":"1992","unstructured":"Watkins, C.J., Dayan, P.: Q-Learning. Mach. Learn. 8(3), 279\u2013292 (1992)","journal-title":"Mach. Learn."},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.artint.2015.11.002","volume":"232","author":"AR KhudaBukhsh","year":"2016","unstructured":"KhudaBukhsh, A.R., Xu, L., Hoos, H.H., Leyton-Brown, K.: Satenstein: automatically building local search SAT solvers from components. Artif. Intell. 232, 20\u201342 (2016)","journal-title":"Artif. Intell."}],"container-title":["Lecture Notes in Computer Science","Multi-Agent Systems and Agreement Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01713-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:30:34Z","timestamp":1775280634000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01713-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017125","9783030017132"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01713-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}