{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:03:15Z","timestamp":1743087795608,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319930367"},{"type":"electronic","value":"9783319930374"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93037-4_10","type":"book-chapter","created":{"date-parts":[[2018,6,19]],"date-time":"2018-06-19T16:00:13Z","timestamp":1529424013000},"page":"115-127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fast Converging Multi-armed Bandit Optimization Using Probabilistic Graphical Model"],"prefix":"10.1007","author":[{"given":"Chen","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Kohei","family":"Watanabe","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Hirate","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,20]]},"reference":[{"issue":"3","key":"10_CR1","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s10994-011-5257-4","volume":"85","author":"J Honda","year":"2011","unstructured":"Honda, J., Takemura, A.: An asymptotically optimal policy for finite support models in the multiarmed bandit problem. Mach. Learn. 85(3), 361\u2013391 (2011)","journal-title":"Mach. Learn."},{"key":"10_CR2","unstructured":"Maes, F., Wehenkel, L., Ernst, D.: Learning to play K-armed bandit problems. In: Proceedings of ICAART (2012)"},{"key":"10_CR3","series-title":"Monographs on Statistics and Applied Probability. GMR:1051482","doi-asserted-by":"publisher","DOI":"10.1201\/9780203492024","volume-title":"Gaussian Markov Random Fields: Theory and Applications","author":"H Rue","year":"2005","unstructured":"Rue, H., Held, L.: Gaussian Markov Random Fields: Theory and Applications. Monographs on Statistics and Applied Probability. GMR:1051482. Chapman & Hall\/CRC, Boca Raton (2005)"},{"key":"10_CR4","unstructured":"Srinivas, N., Krause, A., Kakade, S., Seeger, M.: Gaussian process optimization in the bandit setting: no regret and experimental design. In: Proceedings of ICML (2010)"},{"key":"10_CR5","unstructured":"Agrawal, S., Goyal, N.: Thompson sampling for contextual bandits with linear payoffs. In: Proceedings of ICML (2013)"},{"key":"10_CR6","unstructured":"Sui, Y., Gotovos, A., Burdick, J., Krause, A.: Safe exploration for optimization with Gaussian processes. In: Proceedings of ICML (2015)"},{"key":"10_CR7","unstructured":"Djolonga, J., Krause, A., Cevher, V.: High-dimensional Gaussian process bandits. In: Proceedings of NIPS (2013)"},{"key":"10_CR8","unstructured":"Wang, Z., Zhou, B., Jegelka, S.: Optimization as estimation with Gaussian processes in bandit settings. In: Proceedings of AISTATS (2016)"},{"key":"10_CR9","first-page":"3873","volume":"15","author":"T Desautels","year":"2014","unstructured":"Desautels, T., Krause, A., Burdick, J.W.: Parallelizing exploration-exploitation tradeoffs in Gaussian process bandit optimization. J. Mach. Learn. Res. 15, 3873\u20133923 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"10_CR10","unstructured":"Wu, Y., Gy\u00f6rgy, A., Szepesv\u00e1ri, C.: Online learning with Gaussian payoffs and side observations. In: Proceedings of NIPS (2015)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Li, L., Chu, W., Langford, J., Schapire, R.E.: A contextual-bandit approach to personalized news article recommendation. In: Proceedings of WWW (2010)","DOI":"10.1145\/1772690.1772758"},{"issue":"5","key":"10_CR12","doi-asserted-by":"publisher","first-page":"3250","DOI":"10.1109\/TIT.2011.2182033","volume":"58","author":"N Srinivas","year":"2012","unstructured":"Srinivas, N., Krause, A., Kakade, S.M., Seeger, M.W.: Information-theoretic regret bounds for Gaussian process optimization in the bandit setting. IEEE Trans. Inf. Theory 58(5), 3250\u20133265 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Vanchinathan, H.P., Nikolic, I., De Bona, F., Krause, A.: Explore-exploit in top-N recommender systems via Gaussian processes. In: Proceedings of RecSys (2014)","DOI":"10.1145\/2645710.2645733"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-319-23461-8_9","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"J Schreiter","year":"2015","unstructured":"Schreiter, J., Nguyen-Tuong, D., Eberts, M., Bischoff, B., Markert, H., Toussaint, M.: Safe exploration for active learning with Gaussian processes. In: Bifet, A., May, M., Zadrozny, B., Gavalda, R., Pedreschi, D., Bonchi, F., Cardoso, J., Spiliopoulou, M. (eds.) ECML PKDD 2015. LNCS (LNAI), vol. 9286, pp. 133\u2013149. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23461-8_9"},{"key":"10_CR15","unstructured":"Chapelle, O., Li, L.: An empirical evaluation of Thompson sampling. In: Proceedings of NIPS (2011)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Zeng, C., Wang, Q., Mokhtari, S., Li, T.: Online context-aware recommendation with time varying multi-armed bandit. In: Proceedings of KDD (2016)","DOI":"10.1145\/2939672.2939878"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Nguyen, T.V., Karatzoglou, A., Baltrunas, L.: Gaussian process factorization machines for context-aware recommendations. In: Proceedings of SIGIR (2014)","DOI":"10.1145\/2600428.2609623"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-642-04414-4_7","volume-title":"Algorithmic Learning Theory","author":"S Bubeck","year":"2009","unstructured":"Bubeck, S., Munos, R., Stoltz, G.: Pure exploration in multi-armed bandits problems. In: Gavald\u00e0, R., Lugosi, G., Zeugmann, T., Zilles, S. (eds.) ALT 2009. LNCS (LNAI), vol. 5809, pp. 23\u201337. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04414-4_7"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93037-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T10:46:43Z","timestamp":1710326803000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-93037-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319930367","9783319930374"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93037-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"20 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/prada-research.net\/pakdd18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}