{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:44:31Z","timestamp":1729619071763,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,24]]},"DOI":"10.1109\/ciss50987.2021.9400269","type":"proceedings-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T03:11:36Z","timestamp":1619061096000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["On Logarithmic Regret for Bandits with Knapsacks"],"prefix":"10.1109","author":[{"given":"Wenbo","family":"Ren","sequence":"first","affiliation":[]},{"given":"Jia","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ness B.","family":"Shroff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Thompson sampling for budgeted multi-armed bandits","year":"2015","author":"xia","key":"ref33"},{"key":"ref32","first-page":"317","article-title":"Budgeted bandit problems with continuous random costs","author":"xia","year":"0","journal-title":"Asian Conference on Machine Learning"},{"key":"ref31","first-page":"433","article-title":"Algorithms with logarithmic or sublinear regret for constrained contextual bandits","author":"wu","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E101.A.662"},{"key":"ref35","first-page":"1380","article-title":"Linear submodular bandits with a knapsack constraint","author":"yu","year":"0","journal-title":"Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.079"},{"key":"ref10","first-page":"7","volume":"5","author":"berry","year":"1985","journal-title":"Bandit Problems Sequential Allocation of Experiments (Monographs on Statistics and Applied Probability)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1120.1103"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1561\/9781601986276"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1609\/aaai.v27i1.8637","article-title":"Multi-armed bandit with budget constraint and variable costs","volume":"13","author":"ding","year":"2013","journal-title":"AAAI"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2018.1755"},{"journal-title":"Logarithmic regret bounds for bandits with knapsacks","year":"2015","author":"flajolet","key":"ref15"},{"key":"ref16","first-page":"359","article-title":"The KL-UCB algorithm for bounded stochastic bandits and beyond","author":"garivier","year":"0","journal-title":"Proceedings of the 24th Annual Conference on Learning Theory"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0865-5_26"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2003.1238232"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374475"},{"journal-title":"Epsilon-first policies for budget-limited multi-armed bandits","year":"2010","author":"tran-thanh","key":"ref28"},{"key":"ref4","first-page":"39","article-title":"Analysis of Thompson sampling for the multi-armed bandit problem","author":"agrawal","year":"0","journal-title":"Conference on Learning Theory"},{"journal-title":"Dynamic ad allocation Bandits with budgets","year":"2013","author":"slivkins","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2600057.2602844"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"journal-title":"Knapsack Based Optimal Policies for Budget-Limited Multi-Armed Bandits","year":"2012","author":"tran-thanh","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10998-010-3055-6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.30"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2559152"},{"key":"ref2","first-page":"3450","article-title":"Linear contextual bandits with knapsacks","volume":"29","author":"agrawal","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/sim.4780140302"},{"key":"ref1","first-page":"39","article-title":"Learning with limited rounds of adaptivity: Coin tossing, multi-armed bandits, and ranking from pairwise comparisons","author":"agarwal","year":"0","journal-title":"Conference on Learning Theory"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"journal-title":"Probability and Computing Randomization and Probabilistic Techniques in Algorithms and Data Analysis","year":"2017","author":"mitzenmacher","key":"ref22"},{"key":"ref21","volume":"2","author":"luenberger","year":"1984","journal-title":"Linear and Nonlinear Programming"},{"key":"ref24","first-page":"1760","article-title":"Combinatorial semi-bandits with knapsacks","author":"sankararaman","year":"0","journal-title":"International Conference on Artificial Intelligence and Statistics"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2004.03.002"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/asmb.874"},{"journal-title":"Advances in Bandits with Knapsacks","year":"2020","author":"sankararaman","key":"ref25"}],"event":{"name":"2021 55th Annual Conference on Information Sciences and Systems (CISS)","start":{"date-parts":[[2021,3,24]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2021,3,26]]}},"container-title":["2021 55th Annual Conference on Information Sciences and Systems (CISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9400188\/9400208\/09400269.pdf?arnumber=9400269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,25]],"date-time":"2022-12-25T03:43:44Z","timestamp":1671939824000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9400269\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,24]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/ciss50987.2021.9400269","relation":{},"subject":[],"published":{"date-parts":[[2021,3,24]]}}}