{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T12:03:44Z","timestamp":1759147424275,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030816346"},{"type":"electronic","value":"9783030816353"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-81635-3_31","type":"book-chapter","created":{"date-parts":[[2021,7,16]],"date-time":"2021-07-16T23:08:20Z","timestamp":1626476900000},"page":"380-392","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Contextual Multi-armed Bandit Approach Based on Implicit Feedback for Online Recommendation"],"prefix":"10.1007","author":[{"given":"Yongquan","family":"Wan","sequence":"first","affiliation":[]},{"given":"Junli","family":"Xian","sequence":"additional","affiliation":[]},{"given":"Cairong","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,17]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Bouneffouf, D., Rish, I.: A survey on practical applications of multi-armed and contextual bandits, arXiv: 1904.10040 (2019)","DOI":"10.1109\/CEC48606.2020.9185782"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Wang, L., Wang, C., Wang, K., et al.: Biucb: a contextual bandit algorithm for cold-start and diversified recommendation. In: International Conference on Big Knowledge (ICBK), pp. 248\u2013253. IEEE, Piscataway, NJ (2017)","DOI":"10.1109\/ICBK.2017.49"},{"key":"31_CR3","unstructured":"Agrawal, S., Goyal, N.: Analysis of Thompson sampling for the multi-armed bandit problem. In: Conference on Learning Theory (COLT), pp. 39.1\u201339.26. Springer, London, England (2012)"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Kaufmann, E., Korda, N.: Thompson sampling: an asymptotically optimal finite time analysis. In: Algorithmic Learning Theory, pp. 199\u2013213. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-34106-9_18"},{"key":"31_CR5","unstructured":"Gopalan, A., Mannor, S., Mansour, Y.: Thompson sampling for complex online problems. In: International Conference on Machine Learning, pp.100\u2013108. ACM, New York (2014)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Li, L., Chu, W., Langford, J., et al.: A contextual bandit approach to personalized news article recommendation. In: 19th International Conference on World Wide Web, pp. 661\u2013670. ACM, New York (2010)","DOI":"10.1145\/1772690.1772758"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Mahajan, D., Rastogi, R., Tiwari, C., et al.: LogUCB: an explore-exploit algorithm for comments recommendation. In: ACM International Conference Proceeding Series, pp. 6\u201315. ACM, New York (2012)","DOI":"10.1145\/2396761.2396767"},{"key":"31_CR8","unstructured":"Agrawal, S., Goyal, N.: Thompson sampling for contextual bandits with linear payoffs. In: 30th International Conference on Machine Learning, pp. 127\u2013135. ACM, New York, NY, USA (2013)"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zhou, Q. He, T., et al.: Con-CNAME: a contextual multi-armed bandit algorithm for personalized recommendations. In: International Conference on Artificial Neural Networks, pp. 326\u2013336. Springer, Cham (2018)","DOI":"10.1007\/978-3-030-01421-6_32"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Zeng, C., Wang, Q., Mokhtari, S., et al.: Online context-aware recommendation with time varying multi-armed bandit. In: International Conference on Knowledge Discovery and Data Mining (KDD\u201916), pp. 2025\u20132034. ACM, New York (2016)","DOI":"10.1145\/2939672.2939878"},{"key":"31_CR11","unstructured":"Hariri, N., Mobasher, B., Burke, R.: Adapting to user preference changes in interactive recommendation. In: International Conference on Artificial Intelligence (IJCAI\u201915), pp. 4268\u20134274. AAAI Press, Menlo Park (2015)"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Brod\u00e9n, B., Hammar, M., Nilsson, B.J., et al.: Ensemble recommendations via Thompson sampling: an experimental study within e-commerce. In: 23rd International Conference on Intelligent User Interfaces, pp. 19\u201329. ACM, New York (2018)","DOI":"10.1145\/3172944.3172967"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Hsieh, C.C., Neufeld, J., King, T., et al.: Efficient approximate Thompson sampling for search query recommendation. In: 30th Annual ACM Symposium on Applied Computing (SAC\u201915), pp. 740\u2013746. ACM, New York (2015)","DOI":"10.1145\/2695664.2695748"},{"issue":"4","key":"31_CR14","first-page":"1","volume":"9","author":"B Brod\u00e9n","year":"2019","unstructured":"Brod\u00e9n, B., Hammar, M., et al.: A bandit-based ensemble framework for exploration\/exploitation of diverse recommendation components: an experimental study within e-commerce. ACM Trans. Interactive Intell. Syst. 9(4), 1\u201339 (2019)","journal-title":"ACM Trans. Interactive Intell. Syst."},{"key":"31_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-319-90092-6_14","volume-title":"Social Information Access","author":"D Jannach","year":"2018","unstructured":"Jannach, D., Lerche, L., Zanker, M.: Recommending based on implicit feedback. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 510\u2013569. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-90092-6_14"},{"issue":"9","key":"31_CR16","first-page":"1953","volume":"25","author":"J Yin","year":"2014","unstructured":"Yin, J., Wang, Z., Li, Q., et al.: Personalized recommendation based on large-scale implicit feedback. J. Softw. (in Chinese) 25(9), 1953\u20131966 (2014)","journal-title":"J. Softw. (in Chinese)"},{"issue":"1","key":"31_CR17","first-page":"52","volume":"39","author":"Z Wang","year":"2016","unstructured":"Wang, Z., Li, Q., Wang, J., et al.: Real-time personalized recommendation based on implicit user feedback data stream. Chinese J. Comput. 39(1), 52\u201364 (2016)","journal-title":"Chinese J. Comput."}],"container-title":["Communications in Computer and Information Science","Knowledge Management in Organizations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-81635-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,16]],"date-time":"2021-07-16T23:19:06Z","timestamp":1626477546000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-81635-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030816346","9783030816353"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-81635-3_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KMO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Management in Organizations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kaohsiung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"kmo2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.kmo2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"86","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}