{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:06:58Z","timestamp":1743016018569,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030930486"},{"type":"electronic","value":"9783030930493"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-93049-3_12","type":"book-chapter","created":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T06:00:24Z","timestamp":1641016824000},"page":"140-151","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Self-organized Hawkes Processes"],"prefix":"10.1007","author":[{"given":"Shen","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Hongteng","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"issue":"19","key":"12_CR1","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1016\/j.tcs.2009.01.016","volume":"410","author":"JY Audibert","year":"2009","unstructured":"Audibert, J.Y., Munos, R., Szepesv\u00e1ri, C.: Exploration-exploitation tradeoff using variance estimates in multi-armed bandits. Theoret. Comput. Sci. 410(19), 1876\u20131902 (2009)","journal-title":"Theoret. Comput. Sci."},{"issue":"1","key":"12_CR2","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1137\/S0097539701398375","volume":"32","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Freund, Y., Schapire, R.E.: The nonstochastic multiarmed bandit problem. SIAM J. Comput. 32(1), 48\u201377 (2002)","journal-title":"SIAM J. Comput."},{"issue":"01","key":"12_CR3","doi-asserted-by":"publisher","first-page":"1550005","DOI":"10.1142\/S2382626615500057","volume":"1","author":"E Bacry","year":"2015","unstructured":"Bacry, E., Mastromatteo, I., Muzy, J.F.: Hawkes processes in finance. Market Microstruct. Liquidity 1(01), 1550005 (2015)","journal-title":"Market Microstruct. Liquidity"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Balakrishnan, A., Bouneffouf, D., Mattei, N., Rossi, F.: Incorporating behavioral constraints in online AI systems. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 3\u201311 (2019)","DOI":"10.1609\/aaai.v33i01.33013"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Bouneffouf, D., Parthasarathy, S., Samulowitz, H., Wistub, M.: Optimal exploitation of clustering and history information in multi-armed bandit. arXiv preprint arXiv:1906.03979 (2019)","DOI":"10.24963\/ijcai.2019\/279"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Chen, S., Moore, J.L., Turnbull, D., Joachims, T.: Playlist prediction via metric embedding. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 714\u2013722 (2012)","DOI":"10.1145\/2339530.2339643"},{"key":"12_CR7","unstructured":"Cheng, C., Yang, H., Lyu, M.R., King, I.: Where you like to go next: successive point-of-interest recommendation. In: Twenty-Third International Joint Conference on Artificial Intelligence (2013)"},{"key":"12_CR8","unstructured":"Chu, W., Li, L., Reyzin, L., Schapire, R.: Contextual bandits with linear payoff functions. In: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, pp. 208\u2013214. JMLR Workshop and Conference Proceedings (2011)"},{"key":"12_CR9","first-page":"2292","volume":"26","author":"M Cuturi","year":"2013","unstructured":"Cuturi, M.: Sinkhorn distances: lightspeed computation of optimal transport. Adv. Neural. Inf. Process. Syst. 26, 2292\u20132300 (2013)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Daley, D.J., Vere-Jones, D., et al.: An Introduction to the Theory of Point Processes: Volume II: General Theory and Structure. Springer, New York (2008)","DOI":"10.1007\/978-0-387-49835-5"},{"key":"12_CR11","unstructured":"Farajtabar, M., Rodriguez, M.G., Zamani, M., Du, N., Zha, H., Song, L.: Back to the past: source identification in diffusion networks from partially observed cascades. In: Artificial Intelligence and Statistics, pp. 232\u2013240. PMLR (2015)"},{"key":"12_CR12","unstructured":"Farajtabar, M., et al.: Fake news mitigation via point process based intervention. In: International Conference on Machine Learning, pp. 1097\u20131106. PMLR (2017)"},{"key":"12_CR13","unstructured":"Gimelfarb, M., Sanner, S., Lee, C.G.: $$\\{$$$$\\backslash $$epsilon$$\\}$$-bmc: a bayesian ensemble approach to epsilon-greedy exploration in model-free reinforcement learning. arXiv preprint arXiv:2007.00869 (2020)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Lee, J., Bengio, S., Kim, S., Lebanon, G., Singer, Y.: Local collaborative ranking. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 85\u201396 (2014)","DOI":"10.1145\/2566486.2567970"},{"key":"12_CR15","unstructured":"Luo, D., Xu, H., Zhen, Y., Ning, X., Zha, H., Yang, X., Zhang, W.: Multi-task multi-dimensional hawkes processes for modeling event sequences. In: Proceedings of the 24th International Conference on Artificial Intelligence, pp. 3685\u20133691 (2015)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"McAuley, J., Targett, C., Shi, Q., Van Den Hengel, A.: Image-based recommendations on styles and substitutes. In: Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 43\u201352 (2015)","DOI":"10.1145\/2766462.2767755"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Ning, X., Karypis, G.: Slim: sparse linear methods for top-n recommender systems. In: 2011 IEEE 11th International Conference on Data Mining, pp. 497\u2013506. IEEE (2011)","DOI":"10.1109\/ICDM.2011.134"},{"issue":"401","key":"12_CR18","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1080\/01621459.1988.10478560","volume":"83","author":"Y Ogata","year":"1988","unstructured":"Ogata, Y.: Statistical models for earthquake occurrences and residual analysis for point processes. J. Am. Stat. Assoc. 83(401), 9\u201327 (1988)","journal-title":"J. Am. Stat. Assoc."},{"key":"12_CR19","unstructured":"Rendle, S., Freudenthaler, C., Gantner, Z., Schmidt-Thieme, L.: Bpr: Bayesian personalized ranking from implicit feedback. arXiv preprint arXiv:1205.2618 (2012)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Rendle, S., Freudenthaler, C., Schmidt-Thieme, L.: Factorizing personalized markov chains for next-basket recommendation. In: Proceedings of the 19th International Conference on World Wide Web, pp. 811\u2013820 (2010)","DOI":"10.1145\/1772690.1772773"},{"issue":"5","key":"12_CR21","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1090\/S0002-9904-1952-09620-8","volume":"58","author":"H Robbins","year":"1952","unstructured":"Robbins, H.: Some aspects of the sequential design of experiments. Bull. Am. Math. Soc. 58(5), 527\u2013535 (1952)","journal-title":"Bull. Am. Math. Soc."},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Wang, P., Guo, J., Lan, Y., Xu, J., Wan, S., Cheng, X.: Learning hierarchical representation model for nextbasket recommendation. In: Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 403\u2013412 (2015)","DOI":"10.1145\/2766462.2767694"},{"key":"12_CR23","unstructured":"Xu, H., Carin, L., Zha, H.: Learning registered point processes from idiosyncratic observations. In: International Conference on Machine Learning, pp. 5443\u20135452. PMLR (2018)"},{"key":"12_CR24","unstructured":"Xu, H., Farajtabar, M., Zha, H.: Learning granger causality for hawkes processes. In: International Conference on Machine Learning, pp. 1717\u20131726. PMLR (2016)"},{"key":"12_CR25","unstructured":"Xu, H., Luo, D., Chen, X., Carin, L.: Benefits from superposed hawkes processes. In: International Conference on Artificial Intelligence and Statistics, pp. 623\u2013631. PMLR (2018)"},{"key":"12_CR26","unstructured":"Xu, H., Luo, D., Zha, H.: Learning hawkes processes from short doubly-censored event sequences. In: International Conference on Machine Learning, pp. 3831\u20133840. PMLR (2017)"},{"key":"12_CR27","unstructured":"Xu, H., Luo, D., Zha, H.: Hawkes processes on graphons. arXiv preprint arXiv:2102.02741 (2021)"},{"issue":"1","key":"12_CR28","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/TKDE.2016.2618925","volume":"29","author":"H Xu","year":"2016","unstructured":"Xu, H., Wu, W., Nemati, S., Zha, H.: Patient flow prediction via discriminative learning of mutually-correcting processes. IEEE Trans. Knowl. Data Eng. 29(1), 157\u2013171 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Yu, F., Liu, Q., Wu, S., Wang, L., Tan, T.: A dynamic recurrent model for next basket recommendation. In: Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 729\u2013732 (2016)","DOI":"10.1145\/2911451.2914683"},{"key":"12_CR30","unstructured":"Zhang, Q., Lipani, A., Kirnap, O., Yilmaz, E.: Self-attentive hawkes processes. arXiv preprint arXiv:1907.07561 (2019)"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zhang, M., Liu, Y., Tat-Seng, C., Zhang, Y., Ma, S.: Task-based recommendation on a web-scale. In: 2015 IEEE International Conference on Big Data (Big Data), pp. 827\u2013836. IEEE (2015)","DOI":"10.1109\/BigData.2015.7363829"},{"key":"12_CR32","unstructured":"Zhou, K., Zha, H., Song, L.: Learning social infectivity in sparse low-rank networks using multi-dimensional hawkes processes. In: Artificial Intelligence and Statistics, pp. 641\u2013649. PMLR (2013)"},{"key":"12_CR33","unstructured":"Zuo, S., Jiang, H., Li, Z., Zhao, T., Zha, H.: Transformer hawkes process. In: International Conference on Machine Learning, pp. 11692\u201311702. PMLR (2020)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93049-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T06:25:59Z","timestamp":1641018359000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93049-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030930486","9783030930493"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93049-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CICAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CAAI International Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cicai2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cicai.caai.cn\/#\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"307","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"105","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}