{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T19:43:38Z","timestamp":1740167018635,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,6,6]],"date-time":"2016-06-06T00:00:00Z","timestamp":1465171200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000943","name":"Commonwealth Scientific and Industrial Research Organisation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000943","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EPJ Data Sci."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1140\/epjds\/s13688-016-0082-4","type":"journal-article","created":{"date-parts":[[2016,6,6]],"date-time":"2016-06-06T13:34:17Z","timestamp":1465220057000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Bandit strategies in social search: the case of the DARPA red balloon challenge"],"prefix":"10.1140","volume":"5","author":[{"given":"Haohui","family":"Chen","sequence":"first","affiliation":[]},{"given":"Iyad","family":"Rahwan","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Cebrian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,6]]},"reference":[{"issue":"9","key":"82_CR1","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0074628","volume":"8","author":"A Rutherford","year":"2013","unstructured":"Rutherford A et al. (2013) Targeted social mobilization in a global manhunt. PLoS ONE 8(9):e74628","journal-title":"PLoS ONE"},{"key":"82_CR2","volume-title":"Proceedings of the 31st ACM international conference on design of communication","author":"L Potts","year":"2013","unstructured":"Potts L, Harrison A (2013) Interfaces as rhetorical constructions: reddit and 4chan during the Boston marathon bombings. In: Proceedings of the 31st ACM international conference on design of communication"},{"issue":"2","key":"82_CR3","doi-asserted-by":"crossref","first-page":"407","DOI":"10.25300\/MISQ\/2013\/37.2.05","volume":"37","author":"O Oh","year":"2013","unstructured":"Oh O, Agrawal M, Rao HR (2013) Community intelligence and social media services: a rumor theoretic analysis of tweets during social crises. MIS Q 37(2):407","journal-title":"MIS Q"},{"key":"82_CR4","volume-title":"Proceedings of the conference on empirical methods in natural language processing","author":"E Aramaki","year":"2011","unstructured":"Aramaki E, Maskawa S, Morita M (2011) Twitter catches the flu: detecting influenza epidemics using Twitter. In: Proceedings of the conference on empirical methods in natural language processing"},{"issue":"2","key":"82_CR5","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1007\/s10791-012-9203-2","volume":"16","author":"R Munro","year":"2013","unstructured":"Munro R (2013) Crowdsourcing and the crisis-affected community. Inf Retr 16(2):210","journal-title":"Inf Retr"},{"issue":"3","key":"82_CR6","doi-asserted-by":"crossref","DOI":"10.1126\/sciadv.1500779","volume":"2","author":"Y Kryvasheyeu","year":"2016","unstructured":"Kryvasheyeu Y, Chen H, Obradovich N (2016) Rapid assessment of disaster damage using social media activity. Sci Adv 2(3):e1500779","journal-title":"Sci Adv"},{"issue":"2","key":"82_CR7","first-page":"180","volume":"35","author":"D Bawden","year":"2009","unstructured":"Bawden D, Robinson L (2009) The dark side of information: overload, anxiety and other paradoxes and pathologies. J\u00a0Inf Sci 35(2):180","journal-title":"J\u00a0Inf Sci"},{"key":"82_CR8","volume-title":"Proceedings of the 22nd international conference on World Wide Web companion","author":"A Gupta","year":"2013","unstructured":"Gupta A et al. (2013) Faking sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy. In: Proceedings of the 22nd international conference on World Wide Web companion"},{"key":"82_CR9","unstructured":"Starbird K et al (2014) Rumors, false flags, and digital vigilantes: misinformation on Twitter after the 2013 Boston Marathon bombing. iConference"},{"key":"82_CR10","volume-title":"Proceedings of the companion publication of the 23rd international conference on World Wide Web companion","author":"C Boididou","year":"2014","unstructured":"Boididou C et al. (2014) Challenges of computational verification in social multimedia. In: Proceedings of the companion publication of the 23rd international conference on World Wide Web companion"},{"key":"82_CR11","volume-title":"2011 IEEE third international conference on privacy, security, risk and trust (PASSAT) and 2011 IEEE third international conference on social computing (SocialCom)","author":"KR Canini","year":"2011","unstructured":"Canini KR, Suh B, Pirolli PL (2011) Finding credible information sources in social networks based on content and social structure. In: 2011 IEEE third international conference on privacy, security, risk and trust (PASSAT) and 2011 IEEE third international conference on social computing (SocialCom)"},{"issue":"4","key":"82_CR12","doi-asserted-by":"crossref","first-page":"693","DOI":"10.5465\/AMJ.2006.22083026","volume":"49","author":"AK Gupta","year":"2006","unstructured":"Gupta AK, Smith KG, Shalley CE (2006) The interplay between exploration and exploitation. Acad Manag J 49(4):693","journal-title":"Acad Manag J"},{"key":"82_CR13","unstructured":"DARPA. DARPA Network Challenge Project Report. http:\/\/www.eecs.harvard.edu\/cs286r\/courses\/fall10\/papers\/ProjectReport.pdf . Accessed 2016-03-19"},{"issue":"2","key":"82_CR14","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/MMUL.2010.40","volume":"17","author":"JR Smith","year":"2010","unstructured":"Smith JR (2010) The red balloon. IEEE Multimed 17(2):2","journal-title":"IEEE Multimed"},{"issue":"2","key":"82_CR15","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1111\/j.2517-6161.1979.tb01068.x","volume":"41","author":"JC Gittins","year":"1979","unstructured":"Gittins JC (1979) Bandit processes and dynamic allocation indices. J R Stat Soc, Ser B, Methodol 41(2):148","journal-title":"J R Stat Soc, Ser B, Methodol"},{"issue":"1","key":"82_CR16","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/0196-8858(85)90002-8","volume":"6","author":"T Lai","year":"1985","unstructured":"Lai T, Robbins H (1985) Asymptotically efficient adaptive allocation rules. Adv Appl Math 6(1):4","journal-title":"Adv Appl Math"},{"key":"82_CR17","unstructured":"DARPA. DARPA Network Challenge. http:\/\/archive.darpa.mil\/networkchallenge\/ . Accessed 2016-03-19"},{"key":"82_CR18","volume-title":"Proceedings of the 1968 23rd ACM national conference, ACM \u201968","author":"D Shepard","year":"1968","unstructured":"Shepard D (1968) A two-dimensional interpolation function for irregularly-spaced data. In: Proceedings of the 1968 23rd ACM national conference, ACM \u201968"},{"key":"82_CR19","doi-asserted-by":"crossref","unstructured":"Jolliffe I (2005) Principal Component Analysis. Wiley Online Library","DOI":"10.1002\/0470013192.bsa501"},{"issue":"6004","key":"82_CR20","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1126\/science.1193147","volume":"330","author":"A Woolley","year":"2010","unstructured":"Woolley A et al. (2010) Evidence for a collective intelligence factor in the performance of human groups. Science 330(6004):686","journal-title":"Science"},{"issue":"10","key":"82_CR21","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1109\/9.7243","volume":"33","author":"R Agrawal","year":"1988","unstructured":"Agrawal R, Hedge MV (1988) Asymptotically efficient adaptive allocation rules for the multiarmed bandit problem with switching cost. IEEE Trans Autom Control 33(10):899","journal-title":"IEEE Trans Autom Control"},{"issue":"3","key":"82_CR22","doi-asserted-by":"crossref","first-page":"529","DOI":"10.2307\/3213982","volume":"25","author":"L Benkherouf","year":"1988","unstructured":"Benkherouf L, Bather JA (1988) Oil exploration: sequential decisions in the face of uncertainty. J Appl Probab 25(3):529","journal-title":"J Appl Probab"},{"issue":"3","key":"82_CR23","doi-asserted-by":"crossref","first-page":"641","DOI":"10.2307\/1910412","volume":"47","author":"ML Weitzman","year":"1979","unstructured":"Weitzman ML (1979) Optimal search for the best alternative. Econometrica 47(3):641","journal-title":"Econometrica"},{"issue":"6","key":"82_CR24","doi-asserted-by":"crossref","first-page":"1594","DOI":"10.1287\/mnsc.2014.1961","volume":"60","author":"JR Hauser","year":"2014","unstructured":"Hauser JR, Liberali G, Urban GL (2014) Website morphing 2.0: switching costs, partial exposure, random exit, and when to morph. Manag Sci 60(6):1594","journal-title":"Manag Sci"},{"issue":"2","key":"82_CR25","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1287\/mksc.1080.0459","volume":"28","author":"JR Hauser","year":"2009","unstructured":"Hauser JR et al. (2009) Website morphing. Mark Sci 28(2):202","journal-title":"Mark Sci"},{"issue":"1","key":"82_CR26","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.jcss.2007.04.016","volume":"74","author":"B Awerbuch","year":"2008","unstructured":"Awerbuch B, Kleinberg R (2008) Online linear optimization and adaptive routing. J Comput Syst Sci 74(1):97","journal-title":"J Comput Syst Sci"},{"key":"82_CR27","volume-title":"Proceedings of the sixteenth annual ACM-SIAM symposium on discrete algorithms, SODA \u201905","author":"AD Flaxman","year":"2005","unstructured":"Flaxman AD, Kalai AT, McMahan HB (2005) Online convex optimization in the bandit setting: gradient descent without a gradient. In: Proceedings of the sixteenth annual ACM-SIAM symposium on discrete algorithms, SODA \u201905"},{"key":"82_CR28","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/11564096_42","volume-title":"Machine learning: ECML 2005","author":"J Vermorel","year":"2005","unstructured":"Vermorel J, Mohri M (2005) Multi-armed bandit algorithms and empirical evaluation. In: Machine learning: ECML 2005. Springer, Berlin, p\u00a0437"},{"issue":"2\u20133","key":"82_CR29","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer P, Cesa-Bianchi N, Fischer P (2002) Finite-time analysis of the multiarmed bandit problem. Mach Learn 47(2\u20133):235","journal-title":"Mach Learn"},{"key":"82_CR30","volume-title":"Individual choice behavior: a theoretical analysis","author":"RD Luce","year":"2012","unstructured":"Luce RD (2012) Individual choice behavior: a theoretical analysis. Courier Dover Publications, New York"},{"key":"82_CR31","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4168.001.0001","volume-title":"Learning in embedded systems","author":"LP Kaelbling","year":"1993","unstructured":"Kaelbling LP (1993) Learning in embedded systems. MIT press, Cambridge"},{"key":"82_CR32","unstructured":"Richland Community College. Stats: Introduction to Estimation. https:\/\/people.richland.edu\/james\/lecture\/m170\/ch08-int.html . Accessed 2016-03-22"},{"issue":"4","key":"82_CR33","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/1924421.1924441","volume":"54","author":"JC Tang","year":"2011","unstructured":"Tang JC et al. (2011) Reflecting on the DARPA red balloon challenge. Commun ACM 54(4):78","journal-title":"Commun ACM"}],"container-title":["EPJ Data Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-016-0082-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1140\/epjds\/s13688-016-0082-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-016-0082-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T11:14:00Z","timestamp":1718622840000},"score":1,"resource":{"primary":{"URL":"http:\/\/epjdatascience.springeropen.com\/articles\/10.1140\/epjds\/s13688-016-0082-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,6]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["82"],"URL":"https:\/\/doi.org\/10.1140\/epjds\/s13688-016-0082-4","relation":{},"ISSN":["2193-1127"],"issn-type":[{"type":"electronic","value":"2193-1127"}],"subject":[],"published":{"date-parts":[[2016,6,6]]},"article-number":"20"}}