{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T00:00:05Z","timestamp":1776470405397,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,26]],"date-time":"2010-04-26T00:00:00Z","timestamp":1272240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,26]]},"DOI":"10.1145\/1772690.1772758","type":"proceedings-article","created":{"date-parts":[[2010,4,27]],"date-time":"2010-04-27T12:45:48Z","timestamp":1272372348000},"page":"661-670","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1364,"title":["A contextual-bandit approach to personalized news article recommendation"],"prefix":"10.1145","author":[{"given":"Lihong","family":"Li","sequence":"first","affiliation":[{"name":"Yahooo! Labs, Santa Clara, CA, USA"}]},{"given":"Wei","family":"Chu","sequence":"additional","affiliation":[{"name":"Yahoo! Labs, Santa Clara, CA, USA"}]},{"given":"John","family":"Langford","sequence":"additional","affiliation":[{"name":"Yahoo! Labs, New York, NY, USA"}]},{"given":"Robert E.","family":"Schapire","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-003-1038-1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.52"},{"key":"e_1_3_2_1_3_1","first-page":"17","volume-title":"Advances in Neural Information Processing Systems 21","author":"Agarwal D.","year":"2009","unstructured":"D. Agarwal , B.-C. Chen , P. Elango , N. Motgi , S.-T. Park , R. Ramakrishnan , S. Roy , and J. Zachariah . Online models for content optimization . In Advances in Neural Information Processing Systems 21 , pages 17 -- 24 , 2009 . D. Agarwal, B.-C. Chen, P. Elango, N. Motgi, S.-T. Park, R. Ramakrishnan, S. Roy, and J. Zachariah. Online models for content optimization. In Advances in Neural Information Processing Systems 21, pages 17--24, 2009."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.2307\/1427934"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321488"},{"key":"e_1_3_2_1_6_1","first-page":"397","article-title":"Using confidence bounds for exploitation-exploration trade-offs","volume":"3","author":"Auer P.","year":"2002","unstructured":"P. Auer . Using confidence bounds for exploitation-exploration trade-offs . Journal of Machine Learning Research , 3 : 397 -- 422 , 2002 . P. Auer. Using confidence bounds for exploitation-exploration trade-offs. Journal of Machine Learning Research, 3:397--422, 2002.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-3711-7","volume-title":"Bandit Problems: Sequential Allocation of Experiments. Monographs on Statistics and Applied Probability","author":"Berry D. A.","year":"1985","unstructured":"D. A. Berry and B. Fristedt . Bandit Problems: Sequential Allocation of Experiments. Monographs on Statistics and Applied Probability . Chapman and Hall , 1985 . D. A. Berry and B. Fristedt. Bandit Problems: Sequential Allocation of Experiments. Monographs on Statistics and Applied Probability. Chapman and Hall, 1985."},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-72079-9","volume-title":"The Adaptive Web -- Methods and Strategies of Web Personalization","author":"Brusilovsky P.","year":"2007","unstructured":"P. Brusilovsky , A. Kobsa , and W. Nejdl , editors . The Adaptive Web -- Methods and Strategies of Web Personalization , volume 4321 of Lecture Notes in Computer Science . Springer Berlin \/ Heidelberg , 2007 . P. Brusilovsky, A. Kobsa, and W. Nejdl, editors. The Adaptive Web -- Methods and Strategies of Web Personalization, volume 4321 of Lecture Notes in Computer Science. Springer Berlin \/ Heidelberg, 2007."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11577935_7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526802"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557138"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242610"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1979.tb01068.x"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390212"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"e_1_3_2_1_18_1","first-page":"20","article-title":"The epoch-greedy algorithm for contextual multi-armed bandits","author":"Langford J.","year":"2008","unstructured":"J. Langford and T. Zhang . The epoch-greedy algorithm for contextual multi-armed bandits . In Advances in Neural Information Processing Systems 20 , 2008 . J. Langford and T. Zhang. The epoch-greedy algorithm for contextual multi-armed bandits. In Advances in Neural Information Processing Systems 20, 2008.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_19_1","volume-title":"Information Theory, Inference, and Learning Algorithms","author":"MacKay D. J. C.","year":"2003","unstructured":"D. J. C. MacKay . Information Theory, Inference, and Learning Algorithms . Cambridge University Press , 2003 . D. J. C. MacKay. Information Theory, Inference, and Learning Algorithms. Cambridge University Press, 2003."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/5254.784084"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150490"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/UKSIM.2008.86"},{"key":"e_1_3_2_1_23_1","first-page":"759","volume-title":"Proc. of the 17th Interational Conf. on Machine Learning","author":"Precup D.","year":"2000","unstructured":"D. Precup , R. S. Sutton , and S. P. Singh . Eligibility traces for off-policy policy evaluation . In Proc. of the 17th Interational Conf. on Machine Learning , pages 759 -- 766 , 2000 . D. Precup, R. S. Sutton, and S. P. Singh. Eligibility traces for off-policy policy evaluation. In Proc. of the 17th Interational Conf. on Machine Learning, pages 759--766, 2000."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1952-09620-8"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337035"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/25.3-4.285"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. of the 25th Conf. on Uncertainty in Artificial Intelligence","author":"Walsh T. J.","year":"2009","unstructured":"T. J. Walsh , I. Szita , C. Diuk , and M. L. Littman . Exploring compact reinforcement-learning representations with linear regression . In Proc. of the 25th Conf. on Uncertainty in Artificial Intelligence , 2009 . T. J. Walsh, I. Szita, C. Diuk, and M. L. Littman. Exploring compact reinforcement-learning representations with linear regression. In Proc. of the 25th Conf. on Uncertainty in Artificial Intelligence, 2009."}],"event":{"name":"WWW '10: The 19th International World Wide Web Conference","location":"Raleigh North Carolina USA","acronym":"WWW '10"},"container-title":["Proceedings of the 19th international conference on World wide web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1772690.1772758","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1772690.1772758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:34Z","timestamp":1750246774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1772690.1772758"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,26]]},"references-count":27,"alternative-id":["10.1145\/1772690.1772758","10.1145\/1772690"],"URL":"https:\/\/doi.org\/10.1145\/1772690.1772758","relation":{},"subject":[],"published":{"date-parts":[[2010,4,26]]},"assertion":[{"value":"2010-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}