{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:19:23Z","timestamp":1740201563058,"version":"3.37.3"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100006769","name":"Russian Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006769","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,6]]},"DOI":"10.1109\/comsnets63942.2025.10885731","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:05:58Z","timestamp":1740081958000},"page":"748-756","source":"Crossref","is-referenced-by-count":0,"title":["Fixed Budget Bayesian Best Arm Identification in Unimodal Bandits"],"prefix":"10.1109","author":[{"given":"Debamita","family":"Ghosh","sequence":"first","affiliation":[{"name":"IIT,IITB-Monash Research Academy,Bombay,India"}]},{"given":"Manjesh Kumar","family":"Hanawal","sequence":"additional","affiliation":[{"name":"IIT,MLioNS Lab, IEOR,Bombay,India"}]},{"given":"Nikola","family":"Zlatanov","sequence":"additional","affiliation":[{"name":"Innopolis University,Russia"}]}],"member":"263","reference":[{"article-title":"A survey on practical applications of multi-armed and contextual bandits","year":"2019","author":"Bouneffouf","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/9781108571401"},{"key":"ref3","article-title":"Action elimination and stopping conditions for the multi-armed bandit and reinforcement learning problems","volume":"7","author":"Even-Dar","year":"2006"},{"key":"ref4","article-title":"Best-arm identification in linear bandits","volume":"27","author":"Soare","year":"2014","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref5","first-page":"1238","article-title":"Almost optimal exploration in multi-armed bandits","volume-title":"International Conference on Machine Learning","author":"Karnin"},{"key":"ref6","first-page":"590","article-title":"Tight (lower) bounds for the fixed budget best arm identification bandit problem","volume-title":"Conference on Learning Theory","author":"Carpentier"},{"issue":"1","key":"ref7","first-page":"1","article-title":"On the complexity of best-arm identification in multi-armed bandit models","volume":"17","author":"Kaufmann","year":"2016","journal-title":"Joural of Machine Learning Research"},{"key":"ref8","article-title":"Best arm identification: A unified approach to fixed budget and fixed confidence","volume":"25","author":"Gabillon","year":"2012","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref9","first-page":"975","article-title":"Lipschitz bandits: Regret lower bound and optimal algorithms","volume-title":"Conference on Learning Theory","author":"Magureanu"},{"key":"ref10","article-title":"Minimal exploration in structured stochastic bandits","volume":"30","author":"Combes","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref11","first-page":"41","article-title":"Unimodal bandits","volume-title":"Proceedings of the 28th International Conference on International Conference on Machine Learning","author":"Yu"},{"key":"ref12","first-page":"1846","article-title":"Problem dependent view on structured thresholding bandit problems","volume-title":"International Conference on Machine Learning","author":"Cheshire"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486279"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.electstud.2010.09.001"},{"volume-title":"Microeconomic Theory","year":"2005","author":"Wetzstein","key":"ref15"},{"key":"ref16","article-title":"An empirical evaluation of thompson sampling","volume":"24","author":"Chapelle","year":"2011","journal-title":"Advances in neural information processing systems"},{"key":"ref17","first-page":"365","article-title":"On correlation and budget constraints in model-based bandit optimization with application to automatic machine learning","volume-title":"Artificial Intelligence and Statistics","author":"Hoffman","year":"2014"},{"key":"ref18","first-page":"1417","article-title":"Simple bayesian algorithms for best arm identification","volume-title":"Conference on Learning Theory","author":"Russo"},{"article-title":"On best-arm identification with a fixed budget in non-parametric multi-armed bandits","year":"2022","author":"Barrier","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500373"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Fall49728.2020.9348641"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2307\/2332286"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34106-9_18"},{"article-title":"Empirical bayes regret minimization","year":"2019","author":"Hsu","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1561\/9781680834710"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2014.0650"},{"issue":"1","key":"ref27","first-page":"2442","article-title":"An information-theoretic analysis of thompson sampling","volume":"17","author":"Russo","year":"2016","journal-title":"The Journal of Machine Learning Research"},{"key":"ref28","first-page":"I\u2013521","article-title":"Unimodal bandits: Regret lower bounds and optimal algorithms","volume-title":"Proceedings of the 31st International Conference on International Conference on Machine Learning","volume":"32","author":"Combes"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10797"},{"key":"ref30","first-page":"862","article-title":"Solving bernoulli rank-one bandits with unimodal thompson sampling","volume-title":"Algorithmic Learning Theory","author":"Trinh","year":"2020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3295360"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.10.1287.17315"},{"key":"ref33","article-title":"Linear multi-resource allocation with semi-bandit feedback","volume":"28","author":"Lattimore","year":"2015","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref34","first-page":"1377","article-title":"Fraud regulating policy for e-commerce via constrained contextual bandits","volume-title":"Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems","author":"Hu"},{"key":"ref35","first-page":"1823","article-title":"Fixed-confidence guarantees for bayesian best-arm identification","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Shang"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2016.1494"},{"key":"ref37","article-title":"Improving the expected improvement algorithm","volume":"30","author":"Qin","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref38","article-title":"Learning to optimize via information-directed sampling","volume":"27","author":"Russo","year":"2014","journal-title":"Advances in Neural Information Processing Systems"},{"article-title":"Adaptivity and confounding in multi-armed bandit experiments","year":"2022","author":"Qin","key":"ref39"},{"key":"ref40","article-title":"Rate-optimal bayesian simple regret in best arm identification","author":"Komiyama","year":"2023","journal-title":"Mathematics of Operations Research"},{"article-title":"Introduction to probability, statistics, and random processes","year":"2016","author":"Pishro-Nik","key":"ref41"},{"article-title":"Bayesian fixed-budget best-arm identification","year":"2022","author":"Atsidakou","key":"ref42"},{"key":"ref43","first-page":"41","article-title":"Best arm identification in multi-armed bandits","volume-title":"COLT","author":"Audibert"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2706192"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2024.3395129"}],"event":{"name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","start":{"date-parts":[[2025,1,6]]},"location":"Bengaluru, India","end":{"date-parts":[[2025,1,10]]}},"container-title":["2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10885406\/10885547\/10885731.pdf?arnumber=10885731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:25:46Z","timestamp":1740122746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10885731\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,6]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/comsnets63942.2025.10885731","relation":{},"subject":[],"published":{"date-parts":[[2025,1,6]]}}}