{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:01:22Z","timestamp":1725577282829},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,17]]},"DOI":"10.1109\/itw48936.2021.9611510","type":"proceedings-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T21:46:27Z","timestamp":1637703987000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Multi-Armed Bandit Problem with the Optimal Arm Depending on a Hidden Markov Model"],"prefix":"10.1109","author":[{"given":"Talha Cihad","family":"Gulcu","sequence":"first","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ALLERTON.2010.5707118"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/78.969499"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/ICASSP.1999.761360"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1007\/978-3-319-67235-9_19"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.sorms.2015.03.001"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/3164539"},{"key":"ref12","first-page":"395","article-title":"PCC: Re-architecting congestion control for consistent high performance","author":"dong","year":"2015","journal-title":"12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15)"},{"key":"ref13","first-page":"343","article-title":"PCC vivace: Online-learning congestion control","author":"dong","year":"2018","journal-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)"},{"key":"ref14","first-page":"127","article-title":"Thompson sampling for contextual bandits with linear payoffs","author":"agrawal","year":"2013","journal-title":"International Conference on Machine Learning"},{"key":"ref15","first-page":"1638","article-title":"Taming the monster: A fast and simple algorithm for contextual bandits","author":"agarwal","year":"2014","journal-title":"International Conference on Machine Learning"},{"key":"ref16","article-title":"A survey on contextual multi-armed bandits","author":"zhou","year":"2015","journal-title":"arXiv preprint arXiv 1508 03326"},{"key":"ref17","article-title":"Stochastic contextual bandits with known reward functions","author":"sakulkar","year":"2016","journal-title":"arXiv preprint arXiv 1605 07761"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/1273496.1273587"},{"key":"ref19","first-page":"365","article-title":"On correlation and budget constraints in model-based bandit optimization with application to automatic machine learning","author":"hoffman","year":"2014","journal-title":"Artificial Intelligence and Statistics"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/3-540-45435-7_18"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/1935826.1935878"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1002\/9780470980033"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/1390156.1390255"},{"key":"ref6","first-page":"3347","article-title":"A latent source model for online collaborative filtering","author":"bresler","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1145\/1772690.1772758","article-title":"A contextual-bandit approach to personalized news article recommendation","author":"li","year":"2010","journal-title":"Proceedings of the 19th International Conference on World Wide Web"},{"key":"ref29","article-title":"A multi-armed bandit approach for online expert selection in markov decision processes","author":"mazumdar","year":"2017","journal-title":"arXiv preprint arXiv 1707 05373"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2911451.2911548"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/2964791.2901469"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1186\/1750-1172-3-11"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/0196-8858(85)90002-8"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2229012.2229026"},{"key":"ref20","first-page":"1763","article-title":"Minimal exploration in structured stochastic bandits","author":"combes","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref22","first-page":"510","article-title":"Regional multi-armed bandits","author":"wang","year":"2018","journal-title":"International Conference on Artificial Intelligence and Statistics"},{"key":"ref21","first-page":"136","article-title":"Latent bandits","author":"maillard","year":"2014","journal-title":"International Conference on Machine Learning"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/JSAIT.2020.3041246"},{"key":"ref23","article-title":"Multi-armed bandits with correlated arms","author":"gupta","year":"2019","journal-title":"arXiv preprint arXiv 1911 12945"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/ICASSP40776.2020.9054429"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/ALLERTON.2018.8635924"}],"event":{"name":"2021 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2021,10,17]]},"location":"Kanazawa, Japan","end":{"date-parts":[[2021,10,21]]}},"container-title":["2021 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9611366\/9611357\/09611510.pdf?arnumber=9611510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:52:07Z","timestamp":1652201527000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9611510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/itw48936.2021.9611510","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]}}}