{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T22:28:55Z","timestamp":1768343335919,"version":"3.49.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/iros.2017.8202168","type":"proceedings-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T17:12:59Z","timestamp":1513271579000},"page":"273-278","source":"Crossref","is-referenced-by-count":15,"title":["Visual detection of opportunities to exploit contact in grasping using contextual multi-armed bandits"],"prefix":"10.1109","author":[{"given":"Clemens","family":"Eppner","sequence":"first","affiliation":[]},{"given":"Oliver","family":"Brock","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1177\/0278364912445831"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"132:1","DOI":"10.1145\/2766969","article-title":"Stable Constrained Dynamics","volume":"34","author":"tournier","year":"2015","journal-title":"ACM Trans Graph"},{"key":"ref31","first-page":"13","article-title":"SOFA - an Open Source Framework for Medical Simulation","volume":"125","author":"allard","year":"2007","journal-title":"MMVR 15"},{"key":"ref30","author":"zhou","year":"2015","journal-title":"A survey on contextual multi-armed bandits"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/s120201437"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICHR.2010.5686321"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2015.7139886"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2014.6942539"},{"key":"ref13","article-title":"Planning and resilient execution of policies for manipulation in contact with actuation uncertainty","author":"phillips-grafflin","year":"2016","journal-title":"Workshop on the Algorithmic Foundations of Robotics (WAFR)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2015.7139793"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-013-9366-8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/0278364915577105"},{"key":"ref17","author":"pinto","year":"2015","journal-title":"Supersizing self-supervision Learning to grasp from 50k tries and 700 robot hours"},{"key":"ref18","author":"levine","year":"2016","journal-title":"Learning hand-eye coordination for robotic grasping with deep learning and large-scale data collection"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/BF00117446"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48482-5_14"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/0278364915592961"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1145\/571647.571648","article-title":"Shape distributions","volume":"21","author":"osada","year":"2002","journal-title":"ACM Trans Graph"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1177\/0278364909360852"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1214\/aos\/1015362186","article-title":"Randomized allocation with nonparametric estimation for a multi-armed bandit problem with covariates","volume":"30","author":"yang","year":"2002","journal-title":"The Annals of Statistics"},{"key":"ref29","first-page":"2755","article-title":"Efficient and robust automated machine learning","author":"feurer","year":"2015","journal-title":"Proc of NIPS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5110-1_13"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2013.2289018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2009.5152473"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913518998"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2009.5152709"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/0278364914559753"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2011.07.013"},{"key":"ref22","first-page":"397","article-title":"Using confidence bounds for exploitation-exploration tradeoffs","volume":"3","author":"auer","year":"2002","journal-title":"Journal of Machine Learning Research"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2010.06.001"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2016.7487342"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CoASE.2015.7294140"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46430-1_12"},{"key":"ref25","article-title":"Autonomously acquiring instance-based object models from experience","author":"oberlin","year":"2015","journal-title":"Proc of ISRR"}],"event":{"name":"2017 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS)","location":"Vancouver, BC","start":{"date-parts":[[2017,9,24]]},"end":{"date-parts":[[2017,9,28]]}},"container-title":["2017 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119304\/8202121\/08202168.pdf?arnumber=8202168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T21:48:36Z","timestamp":1570484916000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8202168\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/iros.2017.8202168","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}