{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:45:38Z","timestamp":1743108338439,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662489949"},{"type":"electronic","value":"9783662489956"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/2.5"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-48995-6_27","type":"book-chapter","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T18:37:29Z","timestamp":1449599849000},"page":"370-383","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Incentivizing Exploration with Heterogeneous Value of Money"],"prefix":"10.1007","author":[{"given":"Li","family":"Han","sequence":"first","affiliation":[]},{"given":"David","family":"Kempe","sequence":"additional","affiliation":[]},{"given":"Ruixin","family":"Qiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"unstructured":"Auer, P., Cesa-Bianchi, N., Freund, Y., Schapire, R.E.: Gambling in a rigged casino: the adversarial multi-armed banditproblem. In: Proceedings of the 36th IEEE Symposium on Foundations of Computer Science, pp. 322\u2013331 (1995)","key":"27_CR1"},{"issue":"1","key":"27_CR2","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1137\/S0097539701398375","volume":"32","author":"P Auer","year":"2003","unstructured":"Auer, P., Cesa-Bianchi, N., Freund, Y., Schapire, R.E.: The nonstochastic multiarmed bandit problem. SIAM J. Comput. 32(1), 48\u201377 (2003)","journal-title":"SIAM J. Comput."},{"key":"27_CR3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex Optimization","author":"S Boyd","year":"2004","unstructured":"Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)"},{"doi-asserted-by":"crossref","unstructured":"Frazier, P., Kempe, D., Kleinberg, J., Kleinberg, R.: Incentivizing exploration. In: Proceedings of the 16th ACM Conference on Economics and Computation, pp. 5\u201322 (2014)","key":"27_CR4","DOI":"10.1145\/2600057.2602897"},{"key":"27_CR5","volume-title":"Multi-Armed Bandit Allocation Indices","author":"JC Gittins","year":"1989","unstructured":"Gittins, J.C.: Multi-Armed Bandit Allocation Indices. Wiley, New York (1989)"},{"key":"27_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/9780470980033","volume-title":"Multi-Armed Bandit Allocation Indices","author":"JC Gittins","year":"2011","unstructured":"Gittins, J.C., Glazebrook, K.D., Weber, R.: Multi-Armed Bandit Allocation Indices, 2nd edn. Wiley, New York (2011)","edition":"2"},{"unstructured":"Gittins, J.C., Jones, D.M.: A dynamic allocation index for the sequential design of experiments. In: Gani, J. (ed.) Progress in Statistics, pp. 241\u2013266 (1974)","key":"27_CR7"},{"doi-asserted-by":"crossref","unstructured":"Ho, C.J., Slivkins, A., Vaughan, J.W.: Adaptive contract design for crowdsourcing markets: bandit algorithms for repeated principal-agent problems. In: Proceedings of the 16th ACM Conf. on Economics and Computation, pp. 359\u2013376 (2014)","key":"27_CR8","DOI":"10.1145\/2600057.2602880"},{"doi-asserted-by":"crossref","unstructured":"Katehakis, M.N., Veinott Jr., A.F.: The multi-armed bandit problem: decomposition and computation. Math. Oper. Res. 12(2), 262\u2013268 (1987)","key":"27_CR9","DOI":"10.1287\/moor.12.2.262"},{"doi-asserted-by":"crossref","unstructured":"Kremer, I., Mansour, Y., Perry, M.: Implementing the \u201cwisdom of the crowd\u201d. In: Proceedings of the 15th ACM Conf. on Electronic Commerce, pp. 605\u2013606 (2013)","key":"27_CR10","DOI":"10.1145\/2482540.2482542"},{"issue":"1","key":"27_CR11","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/0196-8858(85)90002-8","volume":"6","author":"TL Lai","year":"1985","unstructured":"Lai, T.L., Robbins, H.E.: Asymptotically efficient adaptive allocation rules. Adv. Appl. Math. 6(1), 4\u201322 (1985)","journal-title":"Adv. Appl. Math."},{"doi-asserted-by":"crossref","unstructured":"Mansour, Y., Slivkins, A., Syrgkanis, V.: Bayesian incentive-compatible bandit exploration. In: Proceedings of the 17th ACM Conference on Economics and Computation, pp. 565\u2013582 (2015)","key":"27_CR12","DOI":"10.1145\/2764468.2764508"},{"key":"27_CR13","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1090\/S0002-9904-1952-09620-8","volume":"58","author":"HE Robbins","year":"1952","unstructured":"Robbins, H.E.: Some aspects of the sequential design of experiments. Bull. Am. Math. Soc. 58, 527\u2013535 (1952)","journal-title":"Bull. Am. Math. Soc."},{"doi-asserted-by":"crossref","unstructured":"Singla, A., Krause, A.: Truthful incentives in crowdsourcing tasks using regret minimization mechanisms. In: 22nd International World Wide Web Conference, pp. 1167\u20131178 (2013)","key":"27_CR14","DOI":"10.1145\/2488388.2488490"},{"issue":"2","key":"27_CR15","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/2692359.2692364","volume":"12","author":"A Slivkins","year":"2013","unstructured":"Slivkins, A., Wortman Vaughan, J.: Online decision making in crowdsourcing markets: theoretical challenges (position paper). ACM SIGecam Exch. 12(2), 4\u201323 (2013)","journal-title":"ACM SIGecam Exch."},{"key":"27_CR16","doi-asserted-by":"publisher","first-page":"355","DOI":"10.2307\/1882010","volume":"87","author":"M Spence","year":"1973","unstructured":"Spence, M.: Job market signaling. Q. J. Econ. 87, 355\u2013374 (1973)","journal-title":"Q. J. Econ."},{"issue":"2","key":"27_CR17","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1111\/j.2517-6161.1980.tb01111.x","volume":"42","author":"P Whittle","year":"1980","unstructured":"Whittle, P.: Multi-armed bandits and the Gittins index. J. Roy. Stat. Soc. Ser. B (Methodol.) 42(2), 143\u2013149 (1980)","journal-title":"J. Roy. Stat. Soc. Ser. B (Methodol.)"}],"container-title":["Lecture Notes in Computer Science","Web and Internet Economics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-48995-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T22:13:32Z","timestamp":1718230412000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-48995-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662489949","9783662489956"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-48995-6_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}