{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T22:10:19Z","timestamp":1713996619406},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,5,31]],"date-time":"2012-05-31T00:00:00Z","timestamp":1338422400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mach Learn"],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1007\/s10994-012-5299-2","type":"journal-article","created":{"date-parts":[[2012,5,30]],"date-time":"2012-05-30T17:12:20Z","timestamp":1338397940000},"page":"59-90","source":"Crossref","is-referenced-by-count":10,"title":["New algorithms for budgeted learning"],"prefix":"10.1007","volume":"90","author":[{"given":"Kun","family":"Deng","sequence":"first","affiliation":[]},{"given":"Yaling","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Bourke","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Scott","sequence":"additional","affiliation":[]},{"given":"Julie","family":"Masciale","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,31]]},"reference":[{"key":"5299_CR1","first-page":"1","volume-title":"ICML\u00a0\u201998 Proceedings of the fifteenth international conference on machine learning","author":"N. Abe","year":"1998","unstructured":"Abe, N., & Mamitsuka, H. (1998). Query learning strategies using boosting and bagging. In ICML\u00a0\u201998 Proceedings of the fifteenth international conference on machine learning (pp.\u00a01\u201310)."},{"key":"5299_CR2","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/978-3-540-87987-9_25","volume-title":"ALT\u00a0\u201908: Proceedings of the 19th international conference on algorithmic learning theory","author":"A. Antos","year":"2008","unstructured":"Antos, A., Grover, V., & Szepesv\u00e1ri, C. (2008). Active learning in multi-armed bandits. In ALT\u00a0\u201908: Proceedings of the 19th international conference on algorithmic learning theory (pp.\u00a0287\u2013302). Berlin: Springer."},{"key":"5299_CR3","unstructured":"Asuncion, A., & Newman, D. (2009). UCI machine learning repository. http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html ."},{"key":"5299_CR4","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P. Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., & Fischer, P. (2002a). Finite-time analysis of the multiarmed bandit problem. Machine Learning, 47, 235\u2013256.","journal-title":"Machine Learning"},{"key":"5299_CR5","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1137\/S0097539701398375","volume":"32","author":"P. Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Freund, Y., & Schapire, R. E. (2002b). The non-stochastic multi-armed bandit problem. SIAM Journal on Computing, 32, 48\u201377.","journal-title":"SIAM Journal on Computing"},{"key":"5299_CR6","unstructured":"Bubeck, S., Munos, R., & Stoltz, G. (2008). Pure exploration for multi-armed bandit problems. arXiv:0802.2655 ."},{"key":"5299_CR7","first-page":"111","volume-title":"Proceedings of the 17th international conference on machine learning","author":"C. Campbell","year":"2000","unstructured":"Campbell, C., Cristianini, N., & Smola, A. (2000). Query learning with large margin classifiers. In Proceedings of the 17th international conference on machine learning (pp.\u00a0111\u2013118)."},{"key":"5299_CR8","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1109\/ICDM.2006.12","volume-title":"Proceedings of the sixth IEEE international conference on data mining","author":"M. Culver","year":"2006","unstructured":"Culver, M., Kun, D., & Scott, S. (2006). Active learning to maximize area under the ROC curve. In Proceedings of the sixth IEEE international conference on data mining (pp.\u00a0149\u2013158)."},{"key":"5299_CR9","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1109\/ICDM.2007.91","volume-title":"ICDM\u00a0\u201907: proceedings of the 2007 seventh IEEE international conference on data mining","author":"K. Deng","year":"2007","unstructured":"Deng, K., Bourke, C., Scott, S., Sunderman, J., & Zheng, Y. (2007). Bandit-based algorithms for budgeted learning. In ICDM\u00a0\u201907: proceedings of the 2007 seventh IEEE international conference on data mining (pp.\u00a0463\u2013468). Washington: IEEE Comput. Soc."},{"key":"5299_CR10","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1111\/j.2517-6161.1979.tb01068.x","volume":"41","author":"J. C. Gittins","year":"1979","unstructured":"Gittins, J. C. (1979). Bandit processes and dynamic allocation indices. Journal of the Royal Statistical Society. Series B. Methodological, 41, 148\u2013177.","journal-title":"Journal of the Royal Statistical Society. Series B. Methodological"},{"key":"5299_CR11","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1145\/1142351.1142380","volume-title":"PODS\u00a0\u201906: proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems","author":"A. Goel","year":"2006","unstructured":"Goel, A., Guha, S., & Munagala, K. (2006). Asking the right questions: model-driven optimization using probes. In PODS\u00a0\u201906: proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems (pp.\u00a0203\u2013212). New York: ACM."},{"key":"5299_CR12","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1137\/1.9781611973068.3","volume-title":"SODA\u00a0\u201909: proceedings of the nineteenth annual ACM-SIAM symposium on discrete algorithms","author":"A. Goel","year":"2009","unstructured":"Goel, A., Khanna, S., & Null, B. (2009). The ratio index for budgeted learning, with applications. In SODA\u00a0\u201909: proceedings of the nineteenth annual ACM-SIAM symposium on discrete algorithms (pp.\u00a018\u201327). Philadelphia: SIAM."},{"key":"5299_CR13","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/S0004-3702(02)00209-6","volume":"139","author":"R. Greiner","year":"2002","unstructured":"Greiner, R., Grove, A. J., & Roth, D. (2002). Learning cost-sensitive active classifiers. Artificial Intelligence, 139, 137\u2013174.","journal-title":"Artificial Intelligence"},{"key":"5299_CR14","first-page":"104","volume-title":"ACM symposium on theory of computing","author":"S. Guha","year":"2007","unstructured":"Guha, S., & Munagala, K. (2007). Approximation algorithms for budgeted learning problems. In ACM symposium on theory of computing (pp.\u00a0104\u2013113)."},{"key":"5299_CR15","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.jcss.2004.10.016","volume":"71","author":"A. Kalai","year":"2005","unstructured":"Kalai, A., & Vempala, S. (2005). Efficient algorithms for online decision problems. Journal of Computer and System Sciences, 71, 291\u2013307.","journal-title":"Journal of Computer and System Sciences"},{"key":"5299_CR16","volume-title":"Proceedings of the ACM SIGKDD workshop on utility-based data mining","author":"A. Kapoor","year":"2005","unstructured":"Kapoor, A., & Greiner, R. (2005a). Budgeted learning of bounded active classifiers. In Proceedings of the ACM SIGKDD workshop on utility-based data mining. Held in conjunction with the 11th ACM SIGKDD international conference on knowledge discovery and data mining (KDD 2005)."},{"key":"5299_CR17","first-page":"170","volume-title":"15th European conference on machine learning (ECML)","author":"A. Kapoor","year":"2005","unstructured":"Kapoor, A., & Greiner, R. (2005b). Learning and classifying under hard budgets. In 15th European conference on machine learning (ECML) (pp.\u00a0170\u2013181)."},{"key":"5299_CR18","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/1089827.1089829","volume-title":"Proceedings of the ACM SIGKDD workshop on utility-based data mining","author":"A. Kapoor","year":"2005","unstructured":"Kapoor, A., & Greiner, R. (2005c). Reinforcement learning for active model selection. In Proceedings of the ACM SIGKDD workshop on utility-based data mining (pp.\u00a017\u201323). Held in conjunction with the 11th ACM SIGKDD international conference on knowledge discovery and data mining (KDD 2005)."},{"key":"5299_CR19","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/0196-8858(85)90002-8","volume":"6","author":"T. L. Lai","year":"1985","unstructured":"Lai, T. L., & Robbins, H. (1985). Asymptotically efficient adaptive allocation rules. Advances in Applied Mathematics, 6, 4\u201322.","journal-title":"Advances in Applied Mathematics"},{"key":"5299_CR20","first-page":"3","volume-title":"Proceedings of the 17th annual international ACM SIGIR conference on research and development in information retrieval","author":"D. Lewis","year":"1994","unstructured":"Lewis, D., & Gale, W. (1994). A sequential algorithm for training text classifiers. In Proceedings of the 17th annual international ACM SIGIR conference on research and development in information retrieval (pp.\u00a03\u201312)."},{"key":"5299_CR21","unstructured":"Li, L. (2009). Budgeted parameter learning of generative Bayesian networks. Master\u2019s thesis, University of Alberta."},{"key":"5299_CR22","first-page":"378","volume-title":"Proceedings of the 19th annual conference on uncertainty in artificial intelligence (UAI-03)","author":"D. J. Lizotte","year":"2003","unstructured":"Lizotte, D. J., Madani, O., & Greiner, R. (2003). Budgeted learning of na\u00efve-Bayes classifiers. In Proceedings of the 19th annual conference on uncertainty in artificial intelligence (UAI-03) (pp.\u00a0378\u2013385)."},{"key":"5299_CR23","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1007\/978-3-540-74958-5_63","volume-title":"Machine learning: ECML 2007","author":"R. Lomasky","year":"2007","unstructured":"Lomasky, R., Brodley, C., Aernecke, M., Walt, D., & Friedl, M. (2007). Active class selection. In Machine learning: ECML 2007 (pp.\u00a0640\u2013647). Berlin: Springer."},{"key":"5299_CR24","first-page":"357","volume-title":"Proceedings of the 20th conference on uncertainty in artificial intelligence","author":"O. Madani","year":"2004","unstructured":"Madani, O., Lizotte, D., & Greiner, R. (2004). Active model selection. In Proceedings of the 20th conference on uncertainty in artificial intelligence (pp.\u00a0357\u2013365). Banff, Canada."},{"key":"5299_CR25","first-page":"584","volume-title":"ICML \u201904: Proceedings of the twenty-first international conference on machine learning","author":"P. Melville","year":"2004","unstructured":"Melville, P., & Mooney, R. J. (2004). Diverse ensembles for active learning. In ICML \u201904: Proceedings of the twenty-first international conference on machine learning (pp.\u00a0584\u2013591)."},{"key":"5299_CR26","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1109\/ICDM.2004.10075","volume-title":"Fourth IEEE international conference on data mining","author":"P. Melville","year":"2004","unstructured":"Melville, P., Saar-Tsechansky, M., Provost, F., & Mooney, R. (2004). Active feature-value acquisition for classifier induction. In Fourth IEEE international conference on data mining (pp.\u00a0483\u2013486)."},{"key":"5299_CR27","first-page":"4","volume-title":"Fifth IEEE international conference on data mining","author":"P. Melville","year":"2005","unstructured":"Melville, P., Saar-Tsechansky, M., Provost, F., & Mooney, R. (2005). An expected utility approach to active feature-value acquisition. In Fifth IEEE international conference on data mining (p.\u00a04)."},{"key":"5299_CR28","doi-asserted-by":"crossref","first-page":"946","DOI":"10.1145\/1401890.1402003","volume-title":"Proceeding of the 14th ACM SIGKDD international conference on knowledge discovery and data mining","author":"P. Melville","year":"2008","unstructured":"Melville, P., Rosset, S., & Lawrence, R. D. (2008). Customer targeting models using actively-selected web content. In Proceeding of the 14th ACM SIGKDD international conference on knowledge discovery and data mining (pp.\u00a0946\u2013953). New York: ACM."},{"key":"5299_CR29","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1090\/S0002-9904-1952-09620-8","volume":"55","author":"H. Robbins","year":"1952","unstructured":"Robbins, H. (1952). Some aspects of the sequential design of experiments. Bulletin of the American Mathematical Society, 55, 527\u2013535.","journal-title":"Bulletin of the American Mathematical Society"},{"key":"5299_CR30","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1287\/mnsc.1080.0952","volume":"55","author":"M. Saar-Tsechansky","year":"2009","unstructured":"Saar-Tsechansky, M., Melville, P., & Provost, F. (2009). Active feature-value acquisition. Management Science, 55, 664\u2013684.","journal-title":"Management Science"},{"key":"5299_CR31","first-page":"839","volume-title":"Proceedings of the 17th international conference on machine learning","author":"G. Schohn","year":"2000","unstructured":"Schohn, G., & Cohn, D. (2000). Less is more: Active learning with support vector machines. In Proceedings of the 17th international conference on machine learning (pp.\u00a0839\u2013846)."},{"key":"5299_CR32","unstructured":"Settles, B. (2009). Active learning literature survey (Technical Report 1648). University of Wisconsin\u2013Madison."},{"key":"5299_CR33","first-page":"45","volume":"2","author":"S. Tong","year":"2001","unstructured":"Tong, S., & Koller, D. (2001). Support vector machine active learning with applications to text classification. Journal of Machine Learning Research, 2, 45\u201366.","journal-title":"Journal of Machine Learning Research"},{"key":"5299_CR34","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1145\/1143844.1143965","volume-title":"Proceedings of the 23rd international conference on machine learning","author":"S. Veeramachaneni","year":"2006","unstructured":"Veeramachaneni, S., Olivetti, E., & Avesani, P. (2006). Active sampling for detecting irrelevant features. In Proceedings of the 23rd international conference on machine learning (pp.\u00a0961\u2013968)."},{"key":"5299_CR35","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1145\/1102351.1102472","volume-title":"ICML 2005","author":"T. Wang","year":"2005","unstructured":"Wang, T., Lizotte, D., Bowling, M., & Schuurmans, D. (2005). Bayesian sparse sampling for on-line reward optimization. In ICML 2005 (pp.\u00a0956\u2013963)."},{"issue":"6","key":"5299_CR36","doi-asserted-by":"crossref","first-page":"80","DOI":"10.2307\/3001968","volume":"1","author":"F. Wilcoxon","year":"1945","unstructured":"Wilcoxon, F. (1945). Individual comparisons by ranking methods. Biometrics Bulletin, 1(6), 80\u201383.","journal-title":"Biometrics Bulletin"},{"key":"5299_CR37","volume-title":"Data mining: Practical machine learning tools and techniques","author":"I. H. Witten","year":"2005","unstructured":"Witten, I. H., & Frank, E. (2005). Data mining: Practical machine learning tools and techniques (2nd\u00a0ed.). San Francisco: Morgan Kaufmann.","edition":"2"},{"key":"5299_CR38","first-page":"562","volume-title":"Proceedings of the IEEE international conference on data minding","author":"Z. Zheng","year":"2002","unstructured":"Zheng, Z., & Padmanabhan, B. (2002). On active learning for data acquisition. In Proceedings of the IEEE international conference on data minding (pp.\u00a0562\u2013570)."}],"container-title":["Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-012-5299-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10994-012-5299-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-012-5299-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T21:40:34Z","timestamp":1713994834000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10994-012-5299-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,31]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"alternative-id":["5299"],"URL":"https:\/\/doi.org\/10.1007\/s10994-012-5299-2","relation":{},"ISSN":["0885-6125","1573-0565"],"issn-type":[{"value":"0885-6125","type":"print"},{"value":"1573-0565","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5,31]]}}}