{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T21:02:24Z","timestamp":1773176544511,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:00:00Z","timestamp":1671235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:00:00Z","timestamp":1671235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,17]]},"DOI":"10.1109\/bigdata55660.2022.10325847","type":"proceedings-article","created":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T19:00:29Z","timestamp":1702321229000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["Exploration Trade-offs in Web Recommender Systems"],"prefix":"10.1109","author":[{"given":"Ricardo","family":"Baeza-Yates","sequence":"first","affiliation":[{"name":"Northeastern University,Institute for Experiential AI,CA,USA"}]},{"given":"Giovanni","family":"Delnevo","sequence":"additional","affiliation":[{"name":"University of Bologna,Department of Computer Science and Engineering,Bologna,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3209581"},{"key":"ref2","volume-title":"The Filter Bubble: What the Internet Is Hiding from You","author":"Pariser","year":"2011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.52"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109866"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3451964.3451966"},{"issue":"2","key":"ref6","article-title":"The hidden side effects of recommendation systems","volume":"60","author":"Adomavicius","year":"2019","journal-title":"MIT Sloan Management Review"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2307\/2332286"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1952-09620-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314288"},{"key":"ref10","first-page":"3646","article-title":"Latent contextual bandits and their application to personalized recommendations for new users","volume-title":"Twenty-Fifth International Joint Conference on Artificial Intelligence","author":"Zhou"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412152"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314309"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109912"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICITSI.2018.8696023"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-019-00181-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-017-9312-z"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.18297\/etd\/3182"},{"key":"ref19","article-title":"Multi-sided exposure bias in recommendation","author":"Abdollahpouri","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4067\/S0718-18762017000300004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112887"},{"key":"ref22","article-title":"A framework for fairness in two-sided marketplaces","author":"Basu","year":"2020"},{"key":"ref23","article-title":"Fairness and diversity for rankings in two-sided markets","author":"Wang","year":"2020"},{"key":"ref24","article-title":"Recommender systems fairness evaluation via generalized cross entropy","author":"Deldjoo","year":"2019"},{"key":"ref25","article-title":"A comparative study of counterfactual estimators","author":"Nedelec","year":"2017"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3272027"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52485-2_1"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3564284"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jspi.2011.02.015"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.1998.10480550"},{"issue":"2","key":"ref31","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1013689704352","article-title":"Finite-time analysis of the multiarmed bandit problem","volume":"47","author":"Auer","year":"2002","journal-title":"Machine learning"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24412-4_16"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3240323.3240387"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412209"}],"event":{"name":"2022 IEEE International Conference on Big Data (Big Data)","location":"Osaka, Japan","start":{"date-parts":[[2022,12,17]]},"end":{"date-parts":[[2022,12,20]]}},"container-title":["2022 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10020192\/10020156\/10325847.pdf?arnumber=10325847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T23:51:29Z","timestamp":1703029889000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10325847\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,17]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/bigdata55660.2022.10325847","relation":{},"subject":[],"published":{"date-parts":[[2022,12,17]]}}}