{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T19:10:10Z","timestamp":1749928210687,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819681693","type":"print"},{"value":"9789819681709","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8170-9_21","type":"book-chapter","created":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T18:50:16Z","timestamp":1749927016000},"page":"265-277","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LinearAPT: An Adaptive Algorithm for\u00a0the\u00a0Fixed-Budget Thresholding Linear Bandit Problem"],"prefix":"10.1007","author":[{"given":"Yun-Ang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yun-Da","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Shou-De","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,15]]},"reference":[{"key":"21_CR1","unstructured":"Chen, S., Lin, T., King, I., Lyu, M.R., Chen, W.: Combinatorial pure exploration of multi-armed bandits. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N., Weinberger, K. (eds.) Advances in Neural Information Processing Systems, vol.\u00a027. Curran Associates, Inc. (2014). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2014\/file\/e56954b4f6347e897f954495eab16a88-Paper.pdf"},{"key":"21_CR2","unstructured":"Cheshire, J., Menard, P., Carpentier, A.: The influence of shape constraints on the thresholding bandit problem. In: Abernethy, J., Agarwal, S. (eds.) Proceedings of Thirty Third Conference on Learning Theory. Proceedings of Machine Learning Research, vol.\u00a0125, pp. 1228\u20131275. PMLR, 09\u201312 July 2020. https:\/\/proceedings.mlr.press\/v125\/cheshire20a.html"},{"key":"21_CR3","unstructured":"Cheshire, J., Menard, P., Carpentier, A.: Problem dependent view on structured thresholding bandit problems. In: Meila, M., Zhang, T. (eds.) Proceedings of the 38th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol.\u00a0139, pp. 1846\u20131854. PMLR, 18\u201324 July 2021. https:\/\/proceedings.mlr.press\/v139\/cheshire21a.html"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Da\u00a0Tsai, Y., De\u00a0Lin, S.: Fast online inference for nonlinear contextual bandit based on generative adversarial network. arXiv preprint arXiv:2202.08867 (2022)","DOI":"10.2139\/ssrn.4616034"},{"key":"21_CR5","unstructured":"Degenne, R., Menard, P., Shang, X., Valko, M.: Gamification of pure exploration for linear bandits. In: Daum\u00e9, H., Singh, A. (eds.) Proceedings of the 37th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol.\u00a0119, pp. 2432\u20132442. PMLR, 13\u201318 July 2020. https:\/\/proceedings.mlr.press\/v119\/degenne20a.html"},{"key":"21_CR6","unstructured":"Dud\u00edk, M., Langford, J., Li, L.: Doubly robust policy evaluation and learning. arXiv preprint arXiv:1103.4601 (2011)"},{"key":"21_CR7","unstructured":"Garivier, A., M\u00e9nard, P., Rossi, L., Menard, P.: Thresholding bandit for dose-ranging: the impact of monotonicity (2018)"},{"key":"21_CR8","unstructured":"Gotovos, A., Casati, N., Hitz, G., Krause, A.: Active learning for level set estimation. In: Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence, IJCAI 2013, pp. 1344\u20131350. AAAI Press (2013)"},{"key":"21_CR9","unstructured":"LeJeune, D., Dasarathy, G., Baraniuk, R.: Thresholding graph bandits with GrAPL. In: Chiappa, S., Calandra, R. (eds.) Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics. Proceedings of Machine Learning Research, vol.\u00a0108, pp. 2476\u20132485. PMLR, 26\u201328 August 2020. https:\/\/proceedings.mlr.press\/v108\/lejeune20a.html"},{"key":"21_CR10","unstructured":"Locatelli, A., Gutzeit, M., Carpentier, A.: An optimal algorithm for the thresholding bandit problem. In: Balcan, M.F., Weinberger, K.Q. (eds.) Proceedings of The 33rd International Conference on Machine Learning. Proceedings of Machine Learning Research, vol.\u00a048, pp. 1690\u20131698. PMLR, New York, USA, 20\u201322 June 2016. https:\/\/proceedings.mlr.press\/v48\/locatelli16.html"},{"key":"21_CR11","unstructured":"Mason, B., Camilleri, R., Mukherjee, S., Jamieson, K., Nowak, R., Jain, L.: Nearly optimal algorithms for level set estimation. arXiv preprint arXiv:2111.01768 (2021)"},{"key":"21_CR12","unstructured":"Mason, B., Jain, L., Tripathy, A., Nowak, R.: Finding all $$\\epsilon $$-good arms in stochastic bandits. In: Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M., Lin, H. (eds.) Advances in Neural Information Processing Systems, vol.\u00a033, pp. 20707\u201320718. Curran Associates, Inc. (2020). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2020\/file\/edf0320adc8658b25ca26be5351b6c4a-Paper.pdf"},{"key":"21_CR13","unstructured":"R\u00e9da, C., Kaufmann, E., Delahaye-Duriez, A.: Top-m identification for linear bandits. In: Banerjee, A., Fukumizu, K. (eds.) Proceedings of The 24th International Conference on Artificial Intelligence and Statistics. Proceedings of Machine Learning Research, vol.\u00a0130, pp. 1108\u20131116. PMLR, 13\u201315 April 2021. https:\/\/proceedings.mlr.press\/v130\/reda21a.html"},{"key":"21_CR14","unstructured":"Soare, M., Lazaric, A., Munos, R.: Best-arm identification in linear bandits. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N., Weinberger, K. (eds.) Advances in Neural Information Processing Systems, vol.\u00a027. Curran Associates, Inc. (2014). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2014\/file\/f387624df552cea2f369918c5e1e12bc-Paper.pdf"},{"key":"21_CR15","unstructured":"Soare, M., Lazaric, A., Munos, R.: Best-arm identification in linear bandits. CoRR abs\/1409.6110 (2014). http:\/\/arxiv.org\/abs\/1409.6110"},{"key":"21_CR16","unstructured":"Tao, C., Blanco, S., Peng, J., Zhou, Y.: Thresholding bandit with optimal aggregate regret. In: Wallach, H., Larochelle, H., Beygelzimer, A., d\u2019Alch\u00e9-Buc, F., Fox, E., Garnett, R. (eds.) Advances in Neural Information Processing Systems, vol.\u00a032. Curran Associates, Inc. (2019). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2019\/file\/9a0684d9dad4967ddd09594511de2c52-Paper.pdf"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Tsai, T.H., Tsai, Y.D., Lin, S.D.: lil\u2019HDoC: an algorithm for good arm identification under small threshold gap. arXiv preprint arXiv:2401.15879 (2024)","DOI":"10.1007\/978-981-97-2262-4_7"},{"key":"21_CR18","unstructured":"Tsai, Y.D., Tsai, T.H., Lin, S.D.: Differential good arm identification. arXiv preprint arXiv:2303.07154 (2023)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8170-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T18:50:24Z","timestamp":1749927024000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8170-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819681693","9789819681709"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8170-9_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pakdd2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}