{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:15:48Z","timestamp":1775283348475,"version":"3.50.1"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319131283","type":"print"},{"value":"9783319131290","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13129-0_40","type":"book-chapter","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T06:08:41Z","timestamp":1417414121000},"page":"460-466","source":"Crossref","is-referenced-by-count":2,"title":["Time-Decaying Bandits for Non-stationary Systems"],"prefix":"10.1007","author":[{"given":"Junpei","family":"Komiyama","sequence":"first","affiliation":[]},{"given":"Tao","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","unstructured":"Abbasi-Yadkori, Y., P\u00e1l, D., Szepesv\u00e1ri, C.: Improved algorithms for linear stochastic bandits. In: NIPS, pp. 2312\u20132320 (2011)"},{"key":"40_CR2","unstructured":"Abe, N., Long, P.M.: Associative reinforcement learning using linear probabilistic concepts. In: ICML, pp. 3\u201311 (1999)"},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Agarwal, D., Chen, B.C., Elango, P.: Spatio-temporal models for estimating click-through rate. In: WWW, pp. 21\u201330 (2009)","DOI":"10.1145\/1526709.1526713"},{"key":"40_CR4","unstructured":"Agrawal, S., Goyal, N.: Thompson sampling for contextual bandits with linear payoffs. In: ICML (3). JMLR Proceedings, vol.\u00a028, pp. 127\u2013135. JMLR.org (2013)"},{"key":"40_CR5","first-page":"397","volume":"3","author":"P. Auer","year":"2002","unstructured":"Auer, P.: Using confidence bounds for exploitation-exploration trade-offs. Journal of Machine Learning Research\u00a03, 397\u2013422 (2002)","journal-title":"Journal of Machine Learning Research"},{"key":"40_CR6","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P. Auer","year":"2002","unstructured":"Auer, P., Cesa-bianchi, N., Fischer, P.: Finite-time Analysis of the Multiarmed Bandit Problem. Machine Learning\u00a047, 235\u2013256 (2002)","journal-title":"Machine Learning"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Auer, P., Freund, Y., Schapire, R.E.: The non-stochastic multi-armed bandit problem. Siam Journal on Computing (2002)","DOI":"10.1137\/S0097539701398375"},{"key":"40_CR8","unstructured":"Chou, K.C., Lin, H.T.: Balancing between estimated reward and uncertainty during news article recommendation for ICML 2012 exploration and exploitation challenge. ICML 2012 Workshop: Exploration and Exploitation\u00a03 (2012)"},{"key":"40_CR9","unstructured":"Dani, V., Hayes, T.P., Kakade, S.M.: Stochastic linear optimization under bandit feedback. In: COLT, pp. 355\u2013366 (2008)"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Li, L., Chu, W., Langford, J., Schapire, R.E.: A contextual-bandit approach to personalized news article recommendation. In: WWW, pp. 661\u2013670 (2010)","DOI":"10.1145\/1772690.1772758"},{"key":"40_CR11","unstructured":"Cesa-Bianchi, N., Gentile, C., Zappella, G.: A Gang of Bandits. In: NIPS (2013)"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"Wu, F., Huberman, B.A.: Novelty and collective attention. Tech. rep., Proceedings of National Academy of Sciences (2007)","DOI":"10.2139\/ssrn.989672"},{"key":"40_CR13","unstructured":"Yahoo!: Yahoo! Webscope dataset R6A\/R6B. ydata-frontpage-todaymodule-clicks (2011), \n                    \n                      http:\/\/webscope.sandbox.yahoo.com\/"}],"container-title":["Lecture Notes in Computer Science","Web and Internet Economics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13129-0_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T16:49:39Z","timestamp":1559062179000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13129-0_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319131283","9783319131290"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13129-0_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}