{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T11:45:21Z","timestamp":1750938321496,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319947754"},{"type":"electronic","value":"9783319947761"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94776-1_4","type":"book-chapter","created":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T01:48:06Z","timestamp":1530236886000},"page":"39-50","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Contextual Dependent Click Bandit Algorithm for Web Recommendation"],"prefix":"10.1007","author":[{"given":"Weiwen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Shuai","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shengyu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,29]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29659-3","volume-title":"Recommender Systems","author":"CC Aggarwal","year":"2016","unstructured":"Aggarwal, C.C.: Recommender Systems. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-319-29659-3"},{"doi-asserted-by":"crossref","unstructured":"Richardson, M., Dominowska, E., Ragno, R.: Predicting clicks: estimating the click-through rate for new ads. In: Proceedings of the 16th International Conference on World Wide Web, pp. 521\u2013530. ACM (2007)","key":"4_CR2","DOI":"10.1145\/1242572.1242643"},{"doi-asserted-by":"crossref","unstructured":"Rendle, S.: Factorization machines. In: 2010 IEEE 10th International Conference on Data Mining (ICDM), pp. 995\u20131000. IEEE (2010)","key":"4_CR3","DOI":"10.1109\/ICDM.2010.127"},{"issue":"1","key":"4_CR4","first-page":"7","volume":"11","author":"X Wang","year":"2014","unstructured":"Wang, X., Wang, Y., Hsu, D., Wang, Y.: Exploration in interactive personalized music recommendation: a reinforcement learning approach. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 11(1), 7 (2014)","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl. (TOMM)"},{"key":"4_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/9780470980033","volume-title":"Multi-armed Bandit Allocation Indices","author":"J Gittins","year":"2011","unstructured":"Gittins, J., Glazebrook, K., Weber, R.: Multi-armed Bandit Allocation Indices. Wiley, Hoboken (2011)"},{"doi-asserted-by":"crossref","unstructured":"Li, L., Chu, W., Langford, J., Schapire, R.E.: A contextual-bandit approach to personalized news article recommendation. In: Proceedings of the 19th International Conference on World Wide Web, pp. 661\u2013670. ACM (2010)","key":"4_CR6","DOI":"10.1145\/1772690.1772758"},{"issue":"2","key":"4_CR7","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1214\/14-STS504","volume":"30","author":"SS Villar","year":"2015","unstructured":"Villar, S.S., Bowden, J., Wason, J.: Multi-armed bandit models for the optimal design of clinical trials: benefits and challenges. Stat. Sci.: Rev. J. Inst. Math. Stat. 30(2), 199 (2015)","journal-title":"Stat. Sci.: Rev. J. Inst. Math. Stat."},{"issue":"3","key":"4_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00654ED1V01Y201507ICR043","volume":"7","author":"Aleksandr Chuklin","year":"2015","unstructured":"Chuklin, A., Markov, I., de Rijke, M.: Click models for web search. Synth. Lect. Inf. Concepts, Retrieval, Serv. 7(3), 1\u2013115 (2015)","journal-title":"Synthesis Lectures on Information Concepts, Retrieval, and Services"},{"unstructured":"Kveton, B., Wen, Z., Ashkan, A., Szepesvari, C.: Cascading bandits: learning to rank in the cascade model. In: Proceedings of the 32th International Conference on Machine Learning (2015)","key":"4_CR9"},{"unstructured":"Kveton, B., Wen, Z., Ashkan, A., Szepesvari, C.: Combinatorial cascading bandits. In: Advances in Neural Information Processing Systems, pp. 1450\u20131458 (2015)","key":"4_CR10"},{"unstructured":"Li, S., Wang, B., Zhang, S., Chen, W.: Contextual combinatorial cascading bandits. In: Proceedings of The 33rd International Conference on Machine Learning, pp. 1245\u20131253 (2016)","key":"4_CR11"},{"doi-asserted-by":"crossref","unstructured":"Guo, F., Liu, C., Wang, Y.M.: Efficient multiple-click models in web search. In: Proceedings of the Second ACM International Conference on Web Search and Data Mining, pp. 124\u2013131. ACM (2009)","key":"4_CR12","DOI":"10.1145\/1498759.1498818"},{"unstructured":"Abbasi-Yadkori, Y., P\u00e1l, D., Szepesv\u00e1ri, C.: Improved algorithms for linear stochastic bandits. In: Advances in Neural Information Processing Systems, pp. 2312\u20132320 (2011)","key":"4_CR13"},{"unstructured":"Li, L., Chu, W., Langford, J., Moon, T., Wang, X.: An unbiased offline evaluation of contextual bandit algorithms with generalized linear models. In: Proceedings of the Workshop on On-line Trading of Exploration and Exploitation vol. 2, pp. 19\u201336 (2012)","key":"4_CR14"},{"unstructured":"Katariya, S., Kveton, B., Szepesv\u00e1ri, C., Wen, Z.: DCM bandits: learning to rank with multiple clicks. In: Proceedings of The 33rd International Conference on Machine Learning (2016)","key":"4_CR15"},{"unstructured":"Li, L., Lu, Y., Zhou, D.: Provable optimal algorithms for generalized linear contextual bandits. In: Proceedings of The 34rd International Conference on Machine Learning (2017)","key":"4_CR16"},{"unstructured":"Filippi, S., Cappe, O., Garivier, A., Szepesv\u00e1ri, C.: Parametric bandits: the generalized linear case. In: Advances in Neural Information Processing Systems, pp. 586\u2013594 (2010)","key":"4_CR17"},{"issue":"2","key":"4_CR18","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1137\/1031049","volume":"31","author":"WW Hager","year":"1989","unstructured":"Hager, W.W.: Updating the inverse of a matrix. SIAM Rev. 31(2), 221\u2013239 (1989)","journal-title":"SIAM Rev."},{"unstructured":"Yandex: Yandex personalized web search challenge (2013)","key":"4_CR19"}],"container-title":["Lecture Notes in Computer Science","Computing and Combinatorics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94776-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:32:39Z","timestamp":1710347559000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-94776-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319947754","9783319947761"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94776-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"29 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COCOON","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Computing and Combinatorics Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qing Dao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cocoon2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cocoon2018.sdu.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}