{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:59:49Z","timestamp":1730195989687,"version":"3.28.0"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,26]]},"DOI":"10.1109\/allerton58177.2023.10313452","type":"proceedings-article","created":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T18:48:25Z","timestamp":1699987705000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Bounded (O(1)) Regret Recommendation Learning via Synthetic Controls Oracle"],"prefix":"10.1109","author":[{"given":"Enoch Hyunwook","family":"Kang","sequence":"first","affiliation":[{"name":"University of Washington"}]},{"given":"P. R.","family":"Kumar","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v42i3.18140"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1080.0974"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2018.0800"},{"key":"ref4","first-page":"420","article-title":"Causal personalization in music streaming apps with contextual bandits","volume-title":"ACM RecSys conference","author":"Bendada"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2645710.2645732"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767707"},{"article-title":"Latent contextual bandits and their application to personalized recommendations for new users","year":"2016","author":"Zhou","key":"ref7"},{"key":"ref8","first-page":"4377","article-title":"Sublinear optimal policy value estimation in contextual bandits","volume-title":"AISTATS","author":"Kong"},{"issue":"1","key":"ref9","first-page":"5928","article-title":"A contextual bandit bake-off","volume":"22","author":"Bietti","year":"2021","journal-title":"The Journal of Machine Learning Research"},{"key":"ref10","first-page":"3199","article-title":"Beyond ucb: Optimal and efficient contextual bandits with regression oracles","volume-title":"ICML","author":"Foster"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"article-title":"Estimation considerations in contextual bandits","year":"2017","author":"Dimakopoulou","key":"ref12"},{"key":"ref13","first-page":"208","article-title":"Contextual bandits with linear payoff functions","volume-title":"AISTATS, JMLR Workshop and Conference Proceedings","author":"Chu"},{"article-title":"Instance-dependent complexity of contextual bandits and reinforcement learning: A disagreement-based perspective","year":"2020","author":"Foster","key":"ref14"},{"key":"ref15","first-page":"3536","article-title":"Adaptive exploration in linear contextual bandit","volume-title":"AISTATS","author":"Hao"},{"key":"ref16","first-page":"8371","article-title":"Leveraging good representations in linear contextual bandits","volume-title":"ICML","author":"Papini"},{"key":"ref17","article-title":"Stochastic multi-armed-bandit problem with non-stationary rewards","volume":"27","author":"Besbes","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref18","article-title":"Weighted linear bandits for non-stationary environments","volume":"32","author":"Russac","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"article-title":"Algorithms for non-stationary generalized linear bandits","year":"2020","author":"Russac","key":"ref19"},{"key":"ref20","first-page":"746","article-title":"A simple approach for non-stationary linear bandits","volume-title":"AISTATS","author":"Zhao"},{"key":"ref21","first-page":"1739","article-title":"Efficient contextual bandits in non-stationary worlds","volume-title":"Conference On Learning Theory","author":"Luo"},{"key":"ref22","first-page":"696","article-title":"A new algorithm for non-stationary contextual bandits: Efficient, optimal and parameter-free","volume-title":"Conference on Learning Theory","author":"Chen"},{"article-title":"Smooth nonstationary bandits","year":"2023","author":"Jia","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4115833"},{"article-title":"Adaptive experimental design and counterfactual inference","year":"2022","author":"Fiez","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1983.tb01242.x"},{"key":"ref27","first-page":"2392","article-title":"Stochastic linear contextual bandits with diverse contexts","volume-title":"AISTATS","author":"Wu"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2009.ap08746"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1198\/jbes.2009.07333"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3386\/w22791"},{"issue":"1","key":"ref31","first-page":"802","article-title":"Robust synthetic control","volume":"19","author":"Amjad","year":"2018","journal-title":"The Journal of Machine Learning Research"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1257\/jel.20191450"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2021.1929245"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2021.1965613"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.2.3"},{"article-title":"Scalable representation learning in linear contextual bandits with constant regret guarantees","year":"2022","author":"Tirinzoni","key":"ref36"},{"key":"ref37","first-page":"7871","article-title":"On the complexity of representation learning in contextual linear bandits","volume-title":"AISTATS","author":"Tirinzoni"},{"article-title":"Few-shot learning via learning the representation, provably","year":"2020","author":"Du","key":"ref38"},{"article-title":"Synthetically controlled bandits","year":"2022","author":"Farias","key":"ref39"},{"article-title":"Synthetic interventions","year":"2020","author":"Agarwal","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3982\/ECTA20720"},{"key":"ref42","first-page":"798","article-title":"Incentivizing exploration by heterogeneous users","volume-title":"Conference On Learning Theory","author":"Chen"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313649"},{"volume-title":"Probability and random processes.","year":"2020","author":"Grimmett","key":"ref44"},{"key":"ref45","article-title":"Over 60,000 tracks are now uploaded to spotify every day. that\u2019s nearly one per second","volume-title":"Music Business Worldwide","author":"Ingham","year":"2021"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/BF02124750"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/allerton58177.2023.10313452"},{"issue":"Nov","key":"ref48","first-page":"397","article-title":"Using confidence bounds for exploitation-exploration trade-offs","volume":"3","author":"Auer","year":"2002","journal-title":"Journal of Machine Learning Research"},{"volume-title":"Game theory.","year":"1991","author":"Fudenberg","key":"ref49"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/BF02124750"}],"event":{"name":"2023 59th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2023,9,26]]},"location":"Monticello, IL, USA","end":{"date-parts":[[2023,9,29]]}},"container-title":["2023 59th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10313338\/10313355\/10313452.pdf?arnumber=10313452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T16:32:02Z","timestamp":1709397122000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10313452\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,26]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/allerton58177.2023.10313452","relation":{},"subject":[],"published":{"date-parts":[[2023,9,26]]}}}