{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:13:35Z","timestamp":1766733215205,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031059803"},{"type":"electronic","value":"9783031059810"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-05981-0_26","type":"book-chapter","created":{"date-parts":[[2022,5,9]],"date-time":"2022-05-09T12:02:50Z","timestamp":1652097770000},"page":"326-337","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Parametric Bandits for\u00a0Search Engine Marketing Optimisation"],"prefix":"10.1007","author":[{"given":"Marco","family":"Gigli","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Stella","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,10]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, S.: Recent advances in multiarmed bandits for sequential decision making. Oper. Res. Manage. Sci. Age Anal. 167\u2013188 (2019)","DOI":"10.1287\/educ.2019.0204"},{"key":"26_CR2","unstructured":"Agrawal, S., Goyal, N.: Thompson sampling for contextual bandits with linear payoffs. In: ICML, pp. 127\u2013135. PMLR (2013)"},{"issue":"3","key":"26_CR3","doi-asserted-by":"publisher","first-page":"380","DOI":"10.3390\/e23030380","volume":"23","author":"E Cavenaghi","year":"2021","unstructured":"Cavenaghi, E., Sottocornola, G., Stella, F., Zanker, M.: Non stationary multi-armed bandit: empirical evaluation of a new concept drift-aware algorithm. Entropy 23(3), 380 (2021)","journal-title":"Entropy"},{"key":"26_CR4","first-page":"2249","volume":"24","author":"O Chapelle","year":"2011","unstructured":"Chapelle, O., Li, L.: An empirical evaluation of Thompson sampling. Adv. Neural Inf. Process. Syst. 24, 2249\u20132257 (2011)","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"50","key":"26_CR5","first-page":"1","volume":"17","author":"W Chen","year":"2016","unstructured":"Chen, W., Wang, Y., Yuan, Y., Wang, Q.: Combinatorial multi-armed bandit and its extension to probabilistically triggered arms. JMLR 17(50), 1\u201333 (2016)","journal-title":"JMLR"},{"key":"26_CR6","unstructured":"Chu, W., Li, L., Reyzin, L., Schapire, R.: Contextual bandits with linear payoff functions. In: AISTATS 2011, pp. 208\u2013214. PLMR (2011)"},{"key":"26_CR7","unstructured":"Filippi, S., Cappe, O., Garivier, A., Szepesv\u00e1ri, C.: Parametric bandits: the generalized linear case. In: NIPS, vol. 23, pp. 586\u2013594 (2010)"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Gammelli, D., Peled, I., Rodrigues, F., Pacino, D., Kurtaran, H.A., Pereira, F.C.: Estimating latent demand of shared mobility through censored Gaussian processes. Transp. Res. Part C Emerg. Technol. 120, 102775 (2020)","DOI":"10.1016\/j.trc.2020.102775"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Geyik, S.C., Saxena, A., Dasdan, A.: Multi-touch attribution based budget allocation in online advertising. In: Proceedings of the Eighth International Workshop on Data Mining for Online Advertising, pp. 1\u20139 (2014)","DOI":"10.1145\/2648584.2648586"},{"key":"26_CR10","unstructured":"Google Ads: Google Ads Help (2021). https:\/\/support.google.com\/google-ads, see: answer\/1704396, answer\/1722122, answer\/2616012"},{"key":"26_CR11","doi-asserted-by":"publisher","unstructured":"Harrell, F.E.: Regression Modeling Strategies: with Applications to Linear Models, Logistic Regression, and Survival Analysis, vol. 608. Springer, New York (2001). https:\/\/doi.org\/10.1007\/978-1-4757-3462-1","DOI":"10.1007\/978-1-4757-3462-1"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Nuara, A., Trov\u00f2, F., Gatti, N., Restelli, M.: A combinatorial-bandit algorithm for the online joint bid\/budget optimization of pay-per-click advertising campaigns. In: Thirty-Second AAAI Conference on Artificial Intelligence, April 2018","DOI":"10.1609\/aaai.v32i1.11888"},{"key":"26_CR13","unstructured":"Nuara, A., Trov\u00f2, F., Gatti, N., Restelli, M.: Online joint bid\/daily budget optimization of internet advertising campaigns. arXiv preprint arXiv:2003.01452 (2020)"},{"key":"26_CR14","unstructured":"PwC: IAB Internet advertising revenue report, Full year 2020 results, April 2021"},{"key":"26_CR15","unstructured":"Riquelme, C., Tucker, G., Snoek, J.: Deep Bayesian bandits showdown: An empirical comparison of Bayesian deep networks for Thompson sampling. arXiv:1802.09127 (2018)"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Russo, D., Van Roy, B., Kazerouni, A., Osband, I., Wen, Z.: A tutorial on Thompson sampling. arXiv:1707.02038 (2017)","DOI":"10.1561\/9781680834710"},{"key":"26_CR17","unstructured":"Srinivas, N., Krause, A., Kakade, S.M., Seeger, M.: Gaussian process optimization in the bandit setting: No regret and experimental design. arXiv:0912.3995 (2009)"},{"key":"26_CR18","unstructured":"Stan Development Team: Stan modeling language users guide and reference manual, version 2.28 (2019)"},{"issue":"3\/4","key":"26_CR19","doi-asserted-by":"publisher","first-page":"285","DOI":"10.2307\/2332286","volume":"25","author":"WR Thompson","year":"1933","unstructured":"Thompson, W.R.: On the likelihood that one unknown probability exceeds another in view of the evidence of two samples. Biometrika 25(3\/4), 285\u2013294 (1933)","journal-title":"Biometrika"},{"key":"26_CR20","unstructured":"Valko, M., Korda, N., Munos, R., Flaounas, I., Cristianini, N.: Finite-time analysis of kernelised contextual bandits. arXiv:1309.6869 (2013)"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Varian, H.R., Harris, C.: The VCG auction in theory and practice. Am. Econ. Rev. 104(5), 442\u201345 (2014)","DOI":"10.1257\/aer.104.5.442"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Williams, C.K., Rasmussen, C.E.: Gaussian Processes for Machine Learning, vol. 2. MIT Press, Cambridge (2006)","DOI":"10.7551\/mitpress\/3206.001.0001"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-05981-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T13:41:54Z","timestamp":1710337314000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-05981-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031059803","9783031059810"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-05981-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chengdu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/pakdd.net\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"558","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"121","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.75","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.45","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}