{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:45:28Z","timestamp":1740134728064,"version":"3.37.3"},"reference-count":52,"publisher":"Informa UK Limited","issue":"4","funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["DMS-1914632"],"award-info":[{"award-number":["DMS-1914632"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF CSSI","award":["2004571"],"award-info":[{"award-number":["2004571"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["DMS-2210729"],"award-info":[{"award-number":["DMS-2210729"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Technometrics"],"published-print":{"date-parts":[[2022,10,2]]},"DOI":"10.1080\/00401706.2022.2125443","type":"journal-article","created":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T13:19:57Z","timestamp":1663334397000},"page":"513-523","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["TSEC: A Framework for Online Experimentation under Experimental Constraints"],"prefix":"10.1080","volume":"64","author":[{"given":"Simon","family":"Mak","sequence":"first","affiliation":[{"name":"Department of Statistical Science, Duke University, Durham, NC"}]},{"given":"Yuanshuo","family":"Zhao","sequence":"additional","affiliation":[{"name":"Uber Technologies Inc., San Francisco, CA"}]},{"given":"Lavonne","family":"Hoang","sequence":"additional","affiliation":[{"name":"Department of Statistical Science, Duke University, Durham, NC"}]},{"given":"C. F. Jeff","family":"Wu","sequence":"additional","affiliation":[{"name":"H. Milton Stewart School of Industrial &amp; Systems Engineering, Georgia Institute of Technology, Atlanta, GA"}]}],"member":"301","published-online":{"date-parts":[[2022,11,8]]},"reference":[{"key":"e_1_3_1_2_1","first-page":"39.1","volume-title":"Proceedings of the 25th Annual Conference on Learning Theory","author":"Agrawal S.","year":"2012","unstructured":"Agrawal, S., and Goyal, N. (2012), \u201cAnalysis of Thompson Sampling for the Multi-Armed Bandit Problem,\u201d in Proceedings of the 25th Annual Conference on Learning Theory, eds. S. Mannor, N. Srebro, and R. C. Williamson, pp. 39.1\u201339.26."},{"doi-asserted-by":"publisher","key":"e_1_3_1_3_1","DOI":"10.1080\/01621459.1993.10476321"},{"key":"e_1_3_1_4_1","volume-title":"Landing Page Optimization: The Definitive Guide to Testing and Tuning for Conversions","author":"Ash T.","year":"2012","unstructured":"Ash, T., Ginty, M., and Page, R. (2012), Landing Page Optimization: The Definitive Guide to Testing and Tuning for Conversions (2nd ed.), Alameda, CA: SYBEX Inc.","edition":"2"},{"unstructured":"Audibert J.-Y. and Bubeck S. (2010) \u201cBest Arm Identification in Multi-Armed Bandits \u201d in Proceedings of the 23rd Annual Conference on Learning Theory (COLT).","key":"e_1_3_1_5_1"},{"key":"e_1_3_1_6_1","first-page":"397","article-title":"\u201cUsing Confidence Bounds for Exploitation-Exploration Trade-Offs","volume":"3","author":"Auer P.","year":"2002","unstructured":"Auer, P. (2002), \u201cUsing Confidence Bounds for Exploitation-Exploration Trade-Offs,\u201d Journal of Machine Learning Research, 3, 397\u2013422.","journal-title":"Journal of Machine Learning Research"},{"doi-asserted-by":"publisher","key":"e_1_3_1_7_1","DOI":"10.2469\/faj.v48.n5.28"},{"doi-asserted-by":"publisher","key":"e_1_3_1_8_1","DOI":"10.1016\/B978-0-444-50897-3.50008-0"},{"doi-asserted-by":"crossref","unstructured":"Bubeck S. and Cesa-Bianchi N. (2012) \u201cRegret Analysis of Stochastic and Nonstochastic Multi-Armed Bandit Problems \u201d arXiv preprint arXiv:1204.5721.","key":"e_1_3_1_9_1","DOI":"10.1561\/9781601986276"},{"unstructured":"Burtini G. Loeppky J. and Lawrence R. (2015) \u201cA Survey of Online Experiment Design with the Stochastic Multi-Armed Bandit \u201d arXiv e-prints arXiv:1510.00757.","key":"e_1_3_1_10_1"},{"key":"e_1_3_1_11_1","first-page":"2249","article-title":"\u201cAn Empirical Evaluation of Thompson Sampling","author":"Chapelle O.","year":"2011","unstructured":"Chapelle, O., and Li, L. (2011), \u201cAn Empirical Evaluation of Thompson Sampling,\u201d in Advances in Neural Information Processing Systems, pp. 2249\u20132257.","journal-title":"Advances in Neural Information Processing Systems"},{"doi-asserted-by":"publisher","key":"e_1_3_1_12_1","DOI":"10.1080\/00401706.1997.10485156"},{"unstructured":"Combes R. Magureanu S. and Proutiere A. (2017) \u201cMinimal Exploration in Structured Stochastic Bandits \u201d arXiv preprint arXiv:1711.00400.","key":"e_1_3_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_1_14_1","DOI":"10.1609\/aaai.v27i1.8637"},{"unstructured":"Djolonga J. Krause A. and Cevher V. (2013) \u201cHigh-Dimensional Gaussian Process Bandits \u201d in Advances in Neural Information Processing Systems (Vol. 26).","key":"e_1_3_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_1_16_1","DOI":"10.1023\/A:1014091514039"},{"key":"e_1_3_1_17_1","first-page":"1079","article-title":"\u201cAction Elimination and Stopping Conditions for the Multi-Armed Bandit and Reinforcement Learning Problems","volume":"7","author":"Even-Dar E.","year":"2006","unstructured":"Even-Dar, E., Mannor, S., and Mansour, Y. (2006), \u201cAction Elimination and Stopping Conditions for the Multi-Armed Bandit and Reinforcement Learning Problems,\u201d Journal of Machine Learning Research, 7, 1079\u20131105.","journal-title":"Journal of Machine Learning Research"},{"doi-asserted-by":"publisher","key":"e_1_3_1_18_1","DOI":"10.1201\/b16018"},{"doi-asserted-by":"publisher","key":"e_1_3_1_19_1","DOI":"10.1214\/ss\/1177011136"},{"doi-asserted-by":"publisher","key":"e_1_3_1_20_1","DOI":"10.1002\/9780470980033"},{"unstructured":"Gupta S. Chaudhari S. Joshi G. and Ya\u011fan O. (2019) \u201cMulti-Armed Bandits with Correlated Arms \u201d arXiv preprint arXiv:1911.03959.","key":"e_1_3_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_1_22_1","DOI":"10.1109\/JSAIT.2020.3041246"},{"key":"e_1_3_1_23_1","volume-title":"Orthogonal Arrays: Theory and Applications","author":"Hedayat A. S.","year":"2012","unstructured":"Hedayat, A. S., Sloane, N. J. A., and Stufken, J. (2012), Orthogonal Arrays: Theory and Applications, New York: Springer."},{"doi-asserted-by":"publisher","key":"e_1_3_1_24_1","DOI":"10.1214\/009053604000001147"},{"unstructured":"Jiang H. Li J. and Qiao M. (2017) \u201cPractical Algorithms for Best-k Identification in Multi-Armed Bandits \u201d arXiv preprint arXiv:1705.06894.","key":"e_1_3_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_3_1_26_1","DOI":"10.1198\/004017005000000652"},{"doi-asserted-by":"publisher","key":"e_1_3_1_27_1","DOI":"10.1073\/pnas.92.19.8584"},{"doi-asserted-by":"publisher","key":"e_1_3_1_28_1","DOI":"10.1023\/A:1017984413808"},{"key":"e_1_3_1_29_1","volume-title":"Advances in Neural Information Processing Systems","author":"Krause A.","year":"2011","unstructured":"Krause, A., and Ong, C. (2011), \u201cContextual Gaussian Process Bandit Optimization,\u201d in Advances in Neural Information Processing Systems (Vol. 24)."},{"doi-asserted-by":"publisher","key":"e_1_3_1_30_1","DOI":"10.1016\/0196-8858(85)90002-8"},{"unstructured":"Lattimore T. and Munos R. (2014) \u201cBounded Regret for Finite-Armed Structured Bandits \u201d in Advances in Neural Information Processing Systems (Vol. 27) pp. 550\u2013558.","key":"e_1_3_1_31_1"},{"doi-asserted-by":"publisher","key":"e_1_3_1_32_1","DOI":"10.1002\/cplx.20123"},{"doi-asserted-by":"publisher","key":"e_1_3_1_33_1","DOI":"10.1080\/00401706.2019.1593246"},{"doi-asserted-by":"publisher","key":"e_1_3_1_34_1","DOI":"10.2307\/2975974"},{"doi-asserted-by":"publisher","key":"e_1_3_1_35_1","DOI":"10.18637\/jss.v042.i09"},{"doi-asserted-by":"publisher","key":"e_1_3_1_36_1","DOI":"10.1007\/978-1-4899-3242-6"},{"key":"e_1_3_1_37_1","volume-title":"A Modern Theory of Factorial Design","author":"Mukerjee R.","year":"2007","unstructured":"Mukerjee, R., and Wu, C. F. J. (2007), A Modern Theory of Factorial Design, New York: Springer."},{"doi-asserted-by":"publisher","key":"e_1_3_1_38_1","DOI":"10.1145\/1273496.1273587"},{"doi-asserted-by":"publisher","key":"e_1_3_1_39_1","DOI":"10.1561\/2200000070"},{"doi-asserted-by":"crossref","unstructured":"Ryan J. A. and Ulrich J. M. (2008) \u201cquantmod: Quantitative Financial Modelling Framework \u201d R package version 0.3-5 . http:\/\/www.quantmod.com; http:\/\/r-forge.r-project.org\/projects\/quantmod.","key":"e_1_3_1_40_1","DOI":"10.32614\/CRAN.package.quantmod"},{"doi-asserted-by":"publisher","key":"e_1_3_1_41_1","DOI":"10.1002\/asmb.874"},{"doi-asserted-by":"publisher","key":"e_1_3_1_42_1","DOI":"10.3905\/jpm.1994.409501"},{"key":"e_1_3_1_43_1","first-page":"1983","volume-title":"International Joint Conference on Artificial Intelligence","author":"Shen W.","year":"2016","unstructured":"Shen, W., and Wang, J. (2016), \u201cPortfolio Blending via Thompson Sampling,\u201d in International Joint Conference on Artificial Intelligence, pp. 1983\u20131989."},{"key":"e_1_3_1_44_1","first-page":"974","volume-title":"International Joint Conference on Artificial Intelligence","author":"Shen W.","year":"2015","unstructured":"Shen, W., Wang, J., Jiang, Y.-G., and Zha, H. (2015), \u201cPortfolio Choices with Orthogonal Bandit Learning,\u201d in International Joint Conference on Artificial Intelligence, pp. 974\u2013980."},{"doi-asserted-by":"publisher","key":"e_1_3_1_45_1","DOI":"10.1109\/TNN.1998.712192"},{"doi-asserted-by":"publisher","key":"e_1_3_1_46_1","DOI":"10.1093\/biomet\/25.3-4.285"},{"unstructured":"Torossian L. Picheny V. and Durrande N. (2020) \u201cBayesian Quantile and Expectile Optimisation \u201d arXiv preprint arXiv:2001.04833.","key":"e_1_3_1_47_1"},{"key":"e_1_3_1_48_1","first-page":"510","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Wang Z.","year":"2018","unstructured":"Wang, Z., Zhou, R., and Shen, C. (2018), \u201cRegional Multi-Armed Bandits,\u201d in International Conference on Artificial Intelligence and Statistics, pp. 510\u2013518. PMLR."},{"key":"e_1_3_1_49_1","volume-title":"Bandit Algorithms for Website Optimization","author":"White J.","year":"2012","unstructured":"White, J. (2012), Bandit Algorithms for Website Optimization, Sebastopol, CA: O\u2019Reilly Media."},{"key":"e_1_3_1_50_1","volume-title":"Experiments: Planning, Analysis, and Optimization","author":"Wu C. F. J.","year":"2009","unstructured":"Wu, C. F. J., and Hamada, M. (2009), Experiments: Planning, Analysis, and Optimization (2nd ed.), Hoboken, NJ: Wiley.","edition":"2"},{"key":"e_1_3_1_51_1","first-page":"279","volume-title":"Statistical Design and Analysis of Industrial Experiments","author":"Wu C. F. J.","year":"1990","unstructured":"Wu, C. F. J., Mao, S. S., and Ma, F. S. (1990), \u201cSEL: A Search Method based on Orthogonal Arrays,\u201d in Statistical Design and Analysis of Industrial Experiments, ed. S. Ghosh, pp. 279\u2013310, New York: Marcel Dekker."},{"doi-asserted-by":"publisher","key":"e_1_3_1_52_1","DOI":"10.1609\/aaai.v32i1.11629"},{"unstructured":"Zhu M. Zheng X. Wang Y. Li Y. and Liang Q. (2019) \u201cAdaptive Portfolio by Solving Multi-Armed Bandit via Thompson Sampling \u201d arXiv preprint arXiv:1911.05309.","key":"e_1_3_1_53_1"}],"container-title":["Technometrics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00401706.2022.2125443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T00:38:19Z","timestamp":1728002299000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00401706.2022.2125443"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,2]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,10,2]]}},"alternative-id":["10.1080\/00401706.2022.2125443"],"URL":"https:\/\/doi.org\/10.1080\/00401706.2022.2125443","relation":{},"ISSN":["0040-1706","1537-2723"],"issn-type":[{"type":"print","value":"0040-1706"},{"type":"electronic","value":"1537-2723"}],"subject":[],"published":{"date-parts":[[2022,10,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utch20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utch20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-01-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-26","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}