{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:08:35Z","timestamp":1729616915127,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/ijcnn.2017.7965958","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T17:41:30Z","timestamp":1499708490000},"page":"976-983","source":"Crossref","is-referenced-by-count":0,"title":["Risk-averse trees for learning from logged bandit feedback"],"prefix":"10.1109","author":[{"given":"Francesco","family":"Trovo","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Paladino","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Simone","sequence":"additional","affiliation":[]},{"given":"Marcello","family":"Restelli","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Gatti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0201-y"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502529"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280392"},{"key":"ref13","first-page":"208","article-title":"Contextual bandits with linear payoff functions","author":"chu","year":"2011","journal-title":"AISTATS"},{"key":"ref14","first-page":"93","article-title":"Random forest for the contextual bandit problem","author":"f\u00e9raud","year":"2016","journal-title":"AISTATS"},{"key":"ref15","first-page":"1046","article-title":"Multi-armed bandit problems with history","author":"shivaswamy","year":"2012","journal-title":"AISTATS"},{"key":"ref16","volume":"1","author":"mas-colell","year":"1995","journal-title":"Microeconomic Theory"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1533\/9780857099440"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1963.10500830"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.01.016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"ref3","first-page":"1587","article-title":"Automatic ad format selection via contextual bandits","author":"tang","year":"2013","journal-title":"CIKM"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557040"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"ref5"},{"key":"ref8","first-page":"3275","article-title":"Risk-aversion in multi-armed bandits","author":"sani","year":"2012","journal-title":"NIPS"},{"key":"ref7","first-page":"1731","article-title":"Batch learning from logged bandit feedback through counterfactual risk minimization","volume":"16","author":"swaminathan","year":"2015","journal-title":"Journal of Machine Learning Research"},{"key":"ref2","article-title":"Multi-armed bandit for pricing","author":"trov\u00f2","year":"2015","journal-title":"EWRL"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742564"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1142\/9097","author":"rokach","year":"2014","journal-title":"Data Mining with Decision Trees Theory and Applications"},{"key":"ref20","first-page":"592","article-title":"On bayesian upper confidence bounds for bandit problems","author":"kaufmann","year":"2012","journal-title":"AISTATS"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107359949.008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2307\/2332286"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"}],"event":{"name":"2017 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2017,5,14]]},"location":"Anchorage, AK, USA","end":{"date-parts":[[2017,5,19]]}},"container-title":["2017 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958416\/7965814\/07965958.pdf?arnumber=7965958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,29]],"date-time":"2019-09-29T06:24:49Z","timestamp":1569738289000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7965958\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2017.7965958","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}