{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:32:30Z","timestamp":1729639950655,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/ijcnn.2014.6889484","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T14:30:33Z","timestamp":1410359433000},"page":"2690-2697","source":"Crossref","is-referenced-by-count":11,"title":["Scalarization based Pareto optimal set of arms identification algorithms"],"prefix":"10.1109","author":[{"given":"Madalina M.","family":"Drugan","sequence":"first","affiliation":[]},{"given":"Ann","family":"Nowe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"Risk-aversion in multi-armed bandits","author":"sani","year":"2013","journal-title":"CoRR"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MCDM.2013.6595442"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2463372.2463433"},{"key":"3","article-title":"Hypervolume-based multi-objective reinforcement learning","author":"van moffaert","year":"2013","journal-title":"Proc of Evolutionary Multiobjective Optimization (EMO)"},{"key":"2","article-title":"Efficient reinforcement learning with multiple reward functions for randomized clinical trial analysis","author":"lizotte","year":"2010","journal-title":"Proceedings of the Twenty-Seventh International Conference on Machine Learning (ICML)"},{"key":"10","first-page":"59","article-title":"Hoeffding races: Accelerating model selection search for classification and function approximation","volume":"6","author":"maron","year":"1994","journal-title":"Advances in neural information processing systems"},{"key":"1","article-title":"Designing multi-objective multi-armed bandits: An analysis","author":"drugan","year":"2013","journal-title":"International Journal Conference on Neural Networks (IJCNN"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2003.810758"},{"key":"6","article-title":"Multiple identifications in multi-armed bandits","author":"bubeck","year":"2013","journal-title":"Proc of International Conference on Machine Learning (ICML'13)"},{"key":"5","article-title":"Best arm identification in multi-armed bandits","author":"audibert","year":"2010","journal-title":"Conference on Learning Theory (COLT '10)"},{"key":"4","first-page":"1","article-title":"Multi-objective Monte Carlo tree search","author":"wang","year":"2012","journal-title":"Asian Conference on Machine Learning"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ADPRL.2007.368183"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-79159-1","author":"eichfelder","year":"2008","journal-title":"Adaptive Scalarization Methods in Multiobjective Optimization"}],"event":{"name":"2014 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2014,7,6]]},"location":"Beijing, China","end":{"date-parts":[[2014,7,11]]}},"container-title":["2014 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6880678\/6889358\/06889484.pdf?arnumber=6889484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:17:18Z","timestamp":1602688638000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6889484"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2014.6889484","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}