{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T19:46:36Z","timestamp":1766087196063,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1109\/comsnets.2017.7945378","type":"proceedings-article","created":{"date-parts":[[2017,6,12]],"date-time":"2017-06-12T16:44:12Z","timestamp":1497285852000},"page":"206-213","source":"Crossref","is-referenced-by-count":6,"title":["Restless bandits that hide their hand and recommendation systems"],"prefix":"10.1109","author":[{"given":"Rahul","family":"Meshram","sequence":"first","affiliation":[]},{"given":"Aditya","family":"Gopalan","sequence":"additional","affiliation":[]},{"given":"D.","family":"Manjunath","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/9780470980033"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.17.9.587"},{"key":"ref12","volume":"1","author":"bertsekas","year":"1995","journal-title":"Dynamic Programming and Optimal Control"},{"key":"ref13","volume":"2","author":"bertsekas","year":"1995","journal-title":"Dynamic Programming and Optimal Control"},{"key":"ref14","article-title":"On the Whittle index for restless multi-armed hidden markov bandits","author":"meshram","year":"2016","journal-title":"ArXiv"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/25.3-4.285"},{"key":"ref16","first-page":"39.1","article-title":"Analysis of Thompson sampling for the multi-armed bandit problem","volume":"23","author":"agrawal","year":"2012","journal-title":"JMLR Workshop and Conf Proc"},{"key":"ref17","article-title":"Thompson sampling for complex online problems","author":"gopalan","year":"2014","journal-title":"Proc ICML"},{"key":"ref18","article-title":"Thompson sampling for learning parameterized Markov decision processes","author":"gopalan","year":"2015","journal-title":"Proc COLT"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7799381"},{"key":"ref4","article-title":"Context-aware music recommendation based on latent topic sequential patterns","author":"hariri","year":"2012","journal-title":"Proc ACM RecSys"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"ref6","article-title":"Adaptive playlists from hidden Markov bandits","author":"meshram","year":"2016","journal-title":"ArXiv"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403456"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1017\/S0021900200040420"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1287\/moor.24.2.293"},{"key":"ref2","article-title":"The epoch-greedy algorithm for contextual multi-armed bandits","author":"langford","year":"2007","journal-title":"Proc NIPS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2044061"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2068950"}],"event":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2017,1,4]]},"location":"Bengaluru, India","end":{"date-parts":[[2017,1,8]]}},"container-title":["2017 9th International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7938017\/7945334\/07945378.pdf?arnumber=7945378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,27]],"date-time":"2017-06-27T19:58:04Z","timestamp":1498593484000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7945378\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2017.7945378","relation":{},"subject":[],"published":{"date-parts":[[2017,1]]}}}