{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:44:24Z","timestamp":1771699464258,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada (NSERC)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100009192","name":"Alberta Innovates","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100009192","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361498","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T14:38:38Z","timestamp":1703515118000},"page":"0751-0756","source":"Crossref","is-referenced-by-count":2,"title":["Adaptive Sequence Learning: Contextual Multi-armed Bandit Approach"],"prefix":"10.1109","author":[{"given":"Danny","family":"Nguyen","sequence":"first","affiliation":[{"name":"School of Computing and Information Systems, Athabasca University,Athabasca,Alberta,Canada"}]},{"given":"Leo","family":"Howard","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Athabasca University,Athabasca,Alberta,Canada"}]},{"given":"Hongxin","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Computing, University of Eastern Finland,Joensuu,Finland"}]},{"given":"Fuhua","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Athabasca University,Athabasca,Alberta,Canada"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Intelligent and Adaptive Learning Systems: Technology Enhanced Support for Learners and Teachers","author":"Graf","year":"2011","journal-title":"Information Science Reference"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-11647-6_65"},{"key":"ref3","first-page":"397","article-title":"Using confidence bounds for exploitation-exploration trade-offs","volume":"3","author":"Auer","year":"2002","journal-title":"Journal of Machine Learning Research"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113596"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105618"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-020-10133-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISCID.2012.133"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC47050.2019.9064104"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78270-2_49"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2595495"},{"key":"ref11","article-title":"Reinforcement Learning Based on Contextual Bandits for Personalized Online Learning Recommendation Systes","author":"Wachanrawan","year":"2020","journal-title":"Springer Nature"},{"key":"ref12","article-title":"A lom research agenda","volume-title":"The twefth international word wide web conference (WWW2003)","author":"Duval"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-01039-2","volume-title":"Learning Spaces: Interdisciplinary Applied Mathematics.","author":"Falmagne","year":"2011"},{"key":"ref14","article-title":"A survey of online experiment design with the stochastic multi-armed bandit","author":"Giuseppe","year":"2015","journal-title":"arXiv preprint"},{"key":"ref15","article-title":"Adapting multi-armed bandits policies to contextual bandits scenarios","author":"David","year":"2019","journal-title":"arXiv"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","location":"Abu Dhabi, United Arab Emirates","start":{"date-parts":[[2023,11,14]]},"end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361498.pdf?arnumber=10361498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T15:33:05Z","timestamp":1705073585000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361498","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}