{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:26Z","timestamp":1750306946281,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,25]],"date-time":"2013-08-25T00:00:00Z","timestamp":1377388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,25]]},"DOI":"10.1145\/2492517.2492541","type":"proceedings-article","created":{"date-parts":[[2014,1,14]],"date-time":"2014-01-14T13:40:06Z","timestamp":1389706806000},"page":"620-627","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Choosing which message to publish on social networks"],"prefix":"10.1145","author":[{"given":"Ricardo","family":"Lage","sequence":"first","affiliation":[{"name":"Aalborg University, Denmark"}]},{"given":"Ludovic","family":"Denoyer","sequence":"additional","affiliation":[{"name":"University Pierre et Marie Curie (UPMC-CNRS)"}]},{"given":"Patrick","family":"Gallinari","sequence":"additional","affiliation":[{"name":"University Pierre et Marie Curie (UPMC-CNRS)"}]},{"given":"Peter","family":"Dolog","sequence":"additional","affiliation":[{"name":"Aalborg University, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2013,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0023"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"L. Boratto and S. Carta \"State-of-the-art in group recommendation and new approaches for automatic identification of groups \" in Information Retrieval and Mining in Distributed Environments ser. Studies in Computational Intelligence A. Soro E. Vargiu G. Armano and G. Paddeu Eds. Springer Berlin \/ Heidelberg 2011 vol. 324 pp. 1--20.  L. Boratto and S. Carta \"State-of-the-art in group recommendation and new approaches for automatic identification of groups \" in Information Retrieval and Mining in Distributed Environments ser. Studies in Computational Intelligence A. Soro E. Vargiu G. Armano and G. Paddeu Eds. Springer Berlin \/ Heidelberg 2011 vol. 324 pp. 1--20.","DOI":"10.1007\/978-3-642-16089-9_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963504"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348372"},{"key":"e_1_3_2_1_5_1","volume-title":"May","author":"Lin J.","year":"2012","unstructured":"J. Lin and G. Mishne , \" A study of \"Churn\" in tweets and real-time search queries,\" in Sixth International AAAI Conference on Weblogs and Social Media , May 2012 . {Online}. Available: http:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM12\/paper\/view\/4599 J. Lin and G. Mishne, \"A study of \"Churn\" in tweets and real-time search queries,\" in Sixth International AAAI Conference on Weblogs and Social Media, May 2012. {Online}. Available: http:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM12\/paper\/view\/4599"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-006-9008-3"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526802"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188078"},{"key":"e_1_3_2_1_9_1","volume-title":"An introduction","author":"Barto R. S. S.","year":"1998","unstructured":"R. S. S. Barto and A. G. , \"Reinforcement learning : An introduction ,\" 1998 . R. S. S. Barto and A. G., \"Reinforcement learning: An introduction,\" 1998."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1952-09620-8"},{"key":"e_1_3_2_1_12_1","volume-title":"The epoch-greedy algorithm for multi-armed bandits with side information","author":"Langford J.","year":"2007","unstructured":"J. Langford and T. Zhang , \" The epoch-greedy algorithm for multi-armed bandits with side information ,\" 2007 . {Online}. Available: http:\/\/dblp.uni-trier.de\/rec\/bibtex\/conf\/nips\/LangfordZ07 J. Langford and T. Zhang, \"The epoch-greedy algorithm for multi-armed bandits with side information,\" 2007. {Online}. Available: http:\/\/dblp.uni-trier.de\/rec\/bibtex\/conf\/nips\/LangfordZ07"},{"key":"e_1_3_2_1_13_1","volume-title":"Conf. on Neural Information Processing Systems, NIPS","author":"Chapelle O.","year":"2011","unstructured":"O. Chapelle and L. V. Li , \" An empirical evaluation of thompson sampling,\" in 25th Annu . Conf. on Neural Information Processing Systems, NIPS , Granada, Spain , 2011 . O. Chapelle and L. V. Li, \"An empirical evaluation of thompson sampling,\" in 25th Annu. Conf. on Neural Information Processing Systems, NIPS, Granada, Spain, 2011."},{"key":"e_1_3_2_1_14_1","first-page":"2609","article-title":"Learning to optimize via posterior sampling","volume":"1301","author":"Russo D.","year":"2013","unstructured":"D. Russo and B. V. Roy , \" Learning to optimize via posterior sampling ,\" CoRR , vol. abs\/ 1301 . 2609 , 2013 . D. Russo and B. V. Roy, \"Learning to optimize via posterior sampling,\" CoRR, vol. abs\/1301.2609, 2013.","journal-title":"CoRR"},{"key":"e_1_3_2_1_15_1","volume-title":"Thompson sampling for contextual bandits with linear payoffs,\" arXiv preprint arXiv:1209.3352","author":"Agrawal S.","year":"2012","unstructured":"S. Agrawal and N. Goyal , \" Thompson sampling for contextual bandits with linear payoffs,\" arXiv preprint arXiv:1209.3352 , 2012 . S. Agrawal and N. Goyal, \"Thompson sampling for contextual bandits with linear payoffs,\" arXiv preprint arXiv:1209.3352, 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2245456"},{"key":"e_1_3_2_1_18_1","volume-title":"Please spread.\" ACM Press","author":"Wang S.","year":"2012","unstructured":"S. Wang , X. Zhou , Z. Wang , and M. Zhang , \" Please spread.\" ACM Press , 2012 , p. 19. {Online}. Available: http:\/\/dl2.acm.org\/citation.cfm?id=2390140 S. Wang, X. Zhou, Z. Wang, and M. Zhang, \"Please spread.\" ACM Press, 2012, p. 19. {Online}. Available: http:\/\/dl2.acm.org\/citation.cfm?id=2390140"},{"key":"e_1_3_2_1_19_1","first-page":"539","volume-title":"WINE'10","author":"Borodin A.","year":"2010","unstructured":"A. Borodin , Y. Filmus , and J. Oren , \" Threshold models for competitive influence in social networks,\" in Proceedings of the 6th international conference on Internet and network economics, ser . WINE'10 . Berlin, Heidelberg : Springer-Verlag, 2010 , pp. 539 -- 550 . A. Borodin, Y. Filmus, and J. Oren, \"Threshold models for competitive influence in social networks,\" in Proceedings of the 6th international conference on Internet and network economics, ser. WINE'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 539--550."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188254"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36973-5_7"},{"key":"e_1_3_2_1_23_1","volume-title":"A nonparametric method for early detection of trending topics","author":"Nikolov S.","year":"2012","unstructured":"S. Nikolov and D. Shah , \" A nonparametric method for early detection of trending topics ,\" 2012 . S. Nikolov and D. Shah, \"A nonparametric method for early detection of trending topics,\" 2012."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature07634"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2010.12.007"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935878"}],"event":{"name":"ASONAM '13: Advances in Social Networks Analysis and Mining 2013","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"],"location":"Niagara Ontario Canada","acronym":"ASONAM '13"},"container-title":["Proceedings of the 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2492517.2492541","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2492517.2492541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:58Z","timestamp":1750235758000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2492517.2492541"}},"subtitle":["a contextual bandit approach"],"short-title":[],"issued":{"date-parts":[[2013,8,25]]},"references-count":26,"alternative-id":["10.1145\/2492517.2492541","10.1145\/2492517"],"URL":"https:\/\/doi.org\/10.1145\/2492517.2492541","relation":{},"subject":[],"published":{"date-parts":[[2013,8,25]]},"assertion":[{"value":"2013-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}