{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:14:08Z","timestamp":1742951648302,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031812408"},{"type":"electronic","value":"9783031812415"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81241-5_3","type":"book-chapter","created":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T13:46:07Z","timestamp":1735652767000},"page":"34-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Resource Allocation via\u00a0Bayesian Optimization: an\u00a0Efficient Alternative to\u00a0Semi-Bandit Feedback"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1431-576X","authenticated-orcid":false,"given":"Antonio","family":"Candelieri","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,1]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Archetti, F., Candelieri, A.: Bayesian optimization and data science. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-24494-1","DOI":"10.1007\/978-3-030-24494-1"},{"key":"3_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2019.06.006","volume":"96","author":"H Bakker","year":"2020","unstructured":"Bakker, H., Dunke, F., Nickel, S.: A structuring review on multi-stage optimization under uncertainty: aligning concepts from theory and practice. Omega 96, 102080 (2020)","journal-title":"Omega"},{"key":"3_CR3","unstructured":"Balcan, M.F., Dick, T., Pegden, W.: Semi-bandit optimization in the dispersed setting. In: Conference on Uncertainty in Artificial Intelligence, pp. 909\u2013918. PMLR (2020)"},{"key":"3_CR4","unstructured":"Barrier, A., Garivier, A., Stoltz, G.: On best-arm identification with a fixed budget in non-parametric multi-armed bandits. In: International Conference on Algorithmic Learning Theory. pp. 136\u2013181. PMLR (2023)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Berk, J., Gupta, S., Rana, S., Venkatesh, S.: Randomised gaussian process upper confidence bound for Bayesian optimisation. In: Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence, pp. 2284\u20132290 (2021)","DOI":"10.24963\/ijcai.2020\/316"},{"key":"3_CR6","unstructured":"Brandt, J., Haddenhorst, B., Bengs, V., H\u00fcllermeier, E.: Finding optimal arms in non-stochastic combinatorial bandits with semi-bandit feedback and finite budget. arXiv preprint arXiv:2202.04487 (2022)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Candelieri, A.: A gentle introduction to Bayesian optimization. In: 2021 Winter Simulation Conference (WSC), pp. 1\u201316. IEEE (2021)","DOI":"10.1109\/WSC52266.2021.9715413"},{"issue":"2","key":"3_CR8","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s10898-019-00860-4","volume":"79","author":"A Candelieri","year":"2021","unstructured":"Candelieri, A.: Sequential model based optimization of partially defined functions under unknown constraints. J. Global Optim. 79(2), 281\u2013303 (2021)","journal-title":"J. Global Optim."},{"key":"3_CR9","unstructured":"Candelieri, A., Ponti, A., Giordani, I., Archetti, F.: On the use of Wasserstein distance in the distributional analysis of human decision making under uncertainty. Ann. Math. Artif. Intell., 1\u201322 (2022)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Carpentier, P., Chancelier, J.P., Cohen, G., De\u00a0Lara, M.: Stochastic multi-stage optimization. Probability Theory and Stochastic Modelling 75 (2015)","DOI":"10.1007\/978-3-319-18138-7"},{"key":"3_CR11","unstructured":"Chen, W., Wang, L., Zhao, H., Zheng, K.: Combinatorial semi-bandit in the non-stationary environment. In: Uncertainty in Artificial Intelligence, pp. 865\u2013875. PMLR (2021)"},{"key":"3_CR12","unstructured":"Dagan, Y., Koby, C.: A better resource allocation algorithm with semi-bandit feedback. In: Algorithmic Learning Theory, pp. 268\u2013320. PMLR (2018)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Frazier, P.I.: Bayesian optimization. In: Recent Advances in Optimization and modeling of contemporary problems, pp. 255\u2013278. Informs (2018)","DOI":"10.1287\/educ.2018.0188"},{"key":"3_CR14","unstructured":"Gelbart, M.A., Snoek, J., Adams, R.P.: Bayesian optimization with unknown constraints. In: 30th Conference on Uncertainty in Artificial Intelligence, UAI 2014, pp. 250\u2013259. AUAI Press (2014)"},{"key":"3_CR15","unstructured":"Gelbart, M.A.: Constrained Bayesian optimization and applications. Ph.D. thesis (2015)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Gramacy, R.B.: Surrogates: Gaussian process modeling, design, and optimization for the applied sciences. Chapman and Hall\/CRC (2020)","DOI":"10.1201\/9780367815493"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Gunjan, A., Bhattacharyya, S.: A brief review of portfolio optimization techniques. Artif. Intell. Rev., 1\u201340 (2022)","DOI":"10.1007\/s10462-022-10273-7"},{"key":"3_CR18","unstructured":"Jourdan, M., Mutn\u1ef3, M., Kirschner, J., Krause, A.: Efficient pure exploration for combinatorial bandits with semi-bandit feedback. In: Algorithmic Learning Theory, pp. 805\u2013849. PMLR (2021)"},{"key":"3_CR19","unstructured":"Lattimore, T., Crammer, K., Szepesv\u00e1ri, C.: Optimal resource allocation with semi-bandit feedback. arXiv preprint arXiv:1406.3840 (2014)"},{"key":"3_CR20","unstructured":"Lattimore, T., Crammer, K., Szepesv\u00e1ri, C.: Linear multi-resource allocation with semi-bandit feedback. In: Advances in Neural Information Processing Systems, vol. 28 (2015)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Lattimore, T., Szepesv\u00e1ri, C.: Bandit algorithms. Cambridge University Press (2020)","DOI":"10.1017\/9781108571401"},{"issue":"2","key":"3_CR22","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1214\/18-BA1110","volume":"14","author":"B Letham","year":"2019","unstructured":"Letham, B., Karrer, B., Ottoni, G., Bakshy, E.: Constrained Bayesian optimization with noisy experiments. Bayesian Anal. 14(2), 495\u2013519 (2019)","journal-title":"Bayesian Anal."},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Liu, B., Rao, Y., Lu, J., Zhou, J., Hsieh, C.J.: Multi-proxy Wasserstein classifier for image classification. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a035, pp. 8618\u20138626 (2021)","DOI":"10.1609\/aaai.v35i10.17045"},{"key":"3_CR24","doi-asserted-by":"publisher","unstructured":"Neu, G., Bart\u00f3k, G.: An efficient algorithm for learning with semi-bandit feedback. In: International Conference on Algorithmic Learning Theory, pp. 234\u2013248. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-642-40935-6_17","DOI":"10.1007\/978-3-642-40935-6_17"},{"issue":"1","key":"3_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ejor.2006.12.006","volume":"185","author":"M Patriksson","year":"2008","unstructured":"Patriksson, M.: A survey on the continuous nonlinear resource allocation problem. Eur. J. Oper. Res. 185(1), 1\u201346 (2008)","journal-title":"Eur. J. Oper. Res."},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Peyr\u00e9, G., Cuturi, M., et\u00a0al.: Computational optimal transport: with applications to data science. Found. Trends\u00ae Mach. Learn. 11(5-6), 355\u2013607 (2019)","DOI":"10.1561\/2200000073"},{"issue":"12","key":"3_CR27","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.3390\/w13121625","volume":"13","author":"A Ponti","year":"2021","unstructured":"Ponti, A., Candelieri, A., Archetti, F.: A new evolutionary approach to optimal sensor placement in water distribution networks. Water 13(12), 1625 (2021)","journal-title":"Water"},{"key":"3_CR28","volume":"10","author":"A Ponti","year":"2021","unstructured":"Ponti, A., Candelieri, A., Archetti, F.: A Wasserstein distance based multiobjective evolutionary algorithm for the risk aware optimization of sensor placement. Intell. Syst. Appl. 10, 200047 (2021)","journal-title":"Intell. Syst. Appl."},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Slivkins, A., et\u00a0al.: Introduction to multi-armed bandits. Found. Trends\u00ae Mach. Learn. 12(1-2), 1\u2013286 (2019)","DOI":"10.1561\/2200000068"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Sonkar, S., Kharat, M.: A review on resource allocation and VM scheduling techniques and a model for efficient resource management in cloud computing environment. In: 2016 International Conference on ICT in Business Industry & Government (ICTBIG), pp.\u00a01\u20137. IEEE (2016)","DOI":"10.1109\/ICTBIG.2016.7892646"},{"issue":"5","key":"3_CR31","doi-asserted-by":"publisher","first-page":"3250","DOI":"10.1109\/TIT.2011.2182033","volume":"58","author":"N Srinivas","year":"2012","unstructured":"Srinivas, N., Krause, A., Kakade, S.M., Seeger, M.W.: Information-theoretic regret bounds for gaussian process optimization in the bandit setting. IEEE Trans. Inf. Theory 58(5), 3250\u20133265 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"3_CR32","unstructured":"Thananjeyan, B., Kandasamy, K., Stoica, I., Jordan, M., Goldberg, K., Gonzalez, J.: Resource allocation in multi-armed bandit exploration: Overcoming sublinear scaling with adaptive parallelism. In: International Conference on Machine Learning, pp. 10236\u201310246. PMLR (2021)"},{"key":"3_CR33","unstructured":"Verma, A., Hanawal, M., Rajkumar, A., Sankaran, R.: Censored Semi-Bandits: a framework for resource allocation with censored feedback. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"3_CR34","doi-asserted-by":"publisher","unstructured":"Villani, C.: The Wasserstein distances. In: Optimal Transport, pp. 93\u2013111. Springer (2009). https:\/\/doi.org\/10.1007\/978-3-642-40935-6_17","DOI":"10.1007\/978-3-642-40935-6_17"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Vinothina, V.V., Sridaran, R., Ganapathi, P.: A survey on resource allocation strategies in cloud computing. Int. J. Adv. Comput. Sci. Appl. 3(6) (2012)","DOI":"10.14569\/IJACSA.2012.030616"},{"issue":"6","key":"3_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00805-3","volume":"2","author":"C Wang","year":"2021","unstructured":"Wang, C., Long, S., Zeng, R., Lu, Y.: Imputation method for fetal heart rate signal evaluation based on optimal transport theory. SN Comput. Sci. 2(6), 1\u201312 (2021)","journal-title":"SN Comput. Sci."},{"key":"3_CR37","unstructured":"Wang, S., Chen, W.: Thompson sampling for combinatorial semi-bandits. In: International Conference on Machine Learning, pp. 5114\u20135122. PMLR (2018)"},{"key":"3_CR38","unstructured":"Wen, Z., Kveton, B., Ashkan, A.: Efficient learning in large-scale combinatorial semi-bandits. In: International Conference on Machine Learning, pp. 1113\u20131122. PMLR (2015)"},{"key":"3_CR39","volume-title":"Gaussian Processes for Machine Learning","author":"CK Williams","year":"2006","unstructured":"Williams, C.K., Rasmussen, C.E.: Gaussian Processes for Machine Learning, vol. 2. MIT Press, Cambridge, MA (2006)"},{"issue":"1","key":"3_CR40","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/s10479-020-03630-8","volume":"292","author":"P Xidonas","year":"2020","unstructured":"Xidonas, P., Steuer, R., Hassapis, C.: Robust portfolio optimization: a categorized bibliographic review. Ann. Oper. Res. 292(1), 533\u2013552 (2020)","journal-title":"Ann. Oper. Res."},{"issue":"2","key":"3_CR41","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s10115-016-0951-y","volume":"50","author":"A Yousafzai","year":"2017","unstructured":"Yousafzai, A., et al.: Cloud resource allocation schemes: review, taxonomy, and opportunities. Knowl. Inf. Syst. 50(2), 347\u2013381 (2017)","journal-title":"Knowl. Inf. Syst."},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Zhang, D., et al.: Domain-oriented language modeling with adaptive hybrid masking and optimal transport alignment. In: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp. 2145\u20132153 (2021)","DOI":"10.1145\/3447548.3467215"},{"key":"3_CR43","unstructured":"Zhang, J., Liu, T., Tao, D.: An optimal transport analysis on generalization in deep learning. IEEE Trans. Neural Netw. Learn. Syst. (2021)"},{"issue":"5","key":"3_CR44","doi-asserted-by":"publisher","first-page":"2460","DOI":"10.3390\/su13052460","volume":"13","author":"S Zhang","year":"2021","unstructured":"Zhang, S., Huang, K., Yuan, Y.: Spare parts inventory management: a literature review. Sustainability 13(5), 2460 (2021)","journal-title":"Sustainability"},{"issue":"1","key":"3_CR45","doi-asserted-by":"publisher","first-page":"26","DOI":"10.13165\/VSE-15-5-1-03","volume":"5","author":"S Ziukov","year":"2015","unstructured":"Ziukov, S.: A literature review on models of inventory management under uncertainty. Bus. Syst. Econ. 5(1), 26\u201335 (2015)","journal-title":"Bus. Syst. Econ."}],"container-title":["Lecture Notes in Computer Science","Numerical Computations: Theory and Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81241-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T14:02:49Z","timestamp":1735653769000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81241-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031812408","9783031812415"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81241-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NUMTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Numerical Computations: Theory and Algorithms","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pizzo Calabro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"numta2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.numta.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}