{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T19:10:10Z","timestamp":1749928210384,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819681693","type":"print"},{"value":"9789819681709","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8170-9_20","type":"book-chapter","created":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T18:50:00Z","timestamp":1749927000000},"page":"253-264","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Differentiable Good Arm Identification"],"prefix":"10.1007","author":[{"given":"Yun-Da","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Tzu-Hsien","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Shou-De","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,15]]},"reference":[{"key":"20_CR1","unstructured":"Abbasi-Yadkori, Y., P\u00e1l, D., Szepesv\u00e1ri, C.: Improved algorithms for linear stochastic bandits. In: Advances in Neural Information Processing Systems, pp. 2312\u20132320 (2011)"},{"key":"20_CR2","unstructured":"Audibert, J.Y., Bubeck, S., Munos, R.: Best arm identification in multi-armed bandits. In: COLT, pp. 41\u201353. Citeseer (2010)"},{"issue":"2","key":"20_CR3","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2), 235\u2013256 (2002)","journal-title":"Mach. Learn."},{"key":"20_CR4","unstructured":"Auer, P., Cesa-Bianchi, N., Freund, Y., Schapire, R.E.: Gambling in a rigged casino: the adversarial multi-armed bandit problem. In: Proceedings of IEEE 36th Annual Foundations of Computer Science, pp. 322\u2013331. IEEE (1995)"},{"issue":"4","key":"20_CR5","first-page":"1","volume":"5","author":"FM Harper","year":"2015","unstructured":"Harper, F.M., Konstan, J.A.: The MovieLens datasets: history and context. ACM Trans. Interact. Intell. Syst. (TIIS) 5(4), 1\u201319 (2015)","journal-title":"ACM Trans. Interact. Intell. Syst. (TIIS)"},{"key":"20_CR6","doi-asserted-by":"publisher","unstructured":"Hoeffding, W.: Probability inequalities for sums of bounded random variables. In: Fisher, N.I., Sen, P.K. (eds.) The Collected Works of Wassily Hoeffding, pp. 409\u2013426. Springer (1994). https:\/\/doi.org\/10.1007\/978-1-4612-0865-5_26","DOI":"10.1007\/978-1-4612-0865-5_26"},{"key":"20_CR7","unstructured":"Kalyanakrishnan, S., Tewari, A., Auer, P., Stone, P.: Pac subset selection in stochastic multi-armed bandits. In: ICML, vol.\u00a012, pp. 655\u2013662 (2012)"},{"issue":"5","key":"20_CR8","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1007\/s10994-019-05784-4","volume":"108","author":"H Kano","year":"2019","unstructured":"Kano, H., Honda, J., Sakamaki, K., Matsuura, K., Nakamura, A., Sugiyama, M.: Good arm identification via bandit feedback. Mach. Learn. 108(5), 721\u2013745 (2019). https:\/\/doi.org\/10.1007\/s10994-019-05784-4","journal-title":"Mach. Learn."},{"key":"20_CR9","unstructured":"Kveton, B., Szepesvari, C., Vaswani, S., Wen, Z., Lattimore, T., Ghavamzadeh, M.: Garbage in, reward out: Bootstrapping exploration in multi-armed bandits. In: International Conference on Machine Learning, pp. 3601\u20133610. PMLR (2019)"},{"key":"20_CR10","unstructured":"Lattimore, T., Szepesv\u00e1ri, C.: Bandit Algorithms. preprint (2018)"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Lattimore, T., Szepesv\u00e1ri, C.: Bandit Algorithms. Cambridge University Press (2020)","DOI":"10.1017\/9781108571401"},{"key":"20_CR12","unstructured":"Locatelli, A., Gutzeit, M., Carpentier, A.: An optimal algorithm for the thresholding bandit problem. In: International Conference on Machine Learning, pp. 1690\u20131698. PMLR (2016)"},{"key":"20_CR13","unstructured":"Locatelli, A., Gutzeit, M., Carpentier, A.: An optimal algorithm for the thresholding bandit problem. In: Balcan, M.F., Weinberger, K.Q. (eds.) Proceedings of The 33rd International Conference on Machine Learning. Proceedings of Machine Learning Research, vol.\u00a048, pp. 1690\u20131698. PMLR, New York, New York, USA (20\u201322 Jun 2016), https:\/\/proceedings.mlr.press\/v48\/locatelli16.html"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Mnih, V., Szepesv\u00e1ri, C., Audibert, J.Y.: Empirical Bernstein stopping. In: Proceedings of the 25th international conference on Machine learning, pp. 672\u2013679 (2008)","DOI":"10.1145\/1390156.1390241"},{"key":"20_CR15","unstructured":"Osband, I., Van\u00a0Roy, B.: Bootstrapped Thompson sampling and deep exploration. arXiv preprint arXiv:1507.00300 (2015)"},{"key":"20_CR16","unstructured":"Russo, D.: Simple Bayesian algorithms for best arm identification. In: Conference on Learning Theory, pp. 1417\u20131418. PMLR (2016)"},{"key":"20_CR17","unstructured":"Saito, Yuta, S.A.: Large-scale open dataset, pipeline, and benchmark for bandit algorithms. arXiv preprint arXiv:2008.07146 (2020)"},{"key":"20_CR18","unstructured":"Valko, M., Korda, N., Munos, R., Flaounas, I., Cristianini, N.: Finite-time analysis of kernelised contextual bandits. arXiv preprint arXiv:1309.6869 (2013)"},{"key":"20_CR19","unstructured":"Yang, K., Toni, L.: Differentiable linear bandit algorithm. arXiv preprint arXiv:2006.03000 (2020)"},{"key":"20_CR20","unstructured":"Zhou, D., Li, L., Gu, Q.: Neural contextual bandits with UCB-based exploration. In: International Conference on Machine Learning, pp. 11492\u201311502. PMLR (2020)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8170-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T18:50:10Z","timestamp":1749927010000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8170-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819681693","9789819681709"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8170-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pakdd2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}