{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:15:50Z","timestamp":1775283350007,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T00:00:00Z","timestamp":1431907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,18]]},"DOI":"10.1145\/2740908.2742562","type":"proceedings-article","created":{"date-parts":[[2016,2,6]],"date-time":"2016-02-06T00:01:06Z","timestamp":1454716866000},"page":"929-934","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Counterfactual Estimation and Optimization of Click Metrics in Search Engines"],"prefix":"10.1145","author":[{"given":"Lihong","family":"Li","sequence":"first","affiliation":[{"name":"Microsoft Corp, Redmond, WA, USA"}]},{"given":"Shunbao","family":"Chen","sequence":"additional","affiliation":[{"name":"Microsoft Corp, Redmond, WA, USA"}]},{"given":"Jim","family":"Kleban","sequence":"additional","affiliation":[{"name":"Facebook Inc., Seattle, WA, USA"}]},{"given":"Ankur","family":"Gupta","sequence":"additional","affiliation":[{"name":"Microsoft Corp, Redmon, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Modern Information Retrieval: The Concepts and Technology behind Search","author":"Baeza-Yates Ricardo","year":"2011","unstructured":"Ricardo Baeza-Yates and Berthier Ribeiro-Neto . Modern Information Retrieval: The Concepts and Technology behind Search . Addison-Wesley Professional , 2 nd edition, 2011 . Ricardo Baeza-Yates and Berthier Ribeiro-Neto. Modern Information Retrieval: The Concepts and Technology behind Search. Addison-Wesley Professional, 2nd edition, 2011.","edition":"2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394251.1394261"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557040"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2567709.2567766"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835809"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2094072.2094078"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526711"},{"key":"e_1_3_2_1_8_1","volume-title":"EMNLP","author":"Cucerzan Silviu","year":"2004","unstructured":"Silviu Cucerzan and Eric Brill . Spelling correction as an iterative process that exploits the collective knowledge of Web users . In EMNLP , 2004 . Silviu Cucerzan and Eric Brill. Spelling correction as an iterative process that exploits the collective knowledge of Web users. In EMNLP, 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1498759.1498825"},{"key":"e_1_3_2_1_10_1","volume-title":"ICML","author":"Dud\u00edk Miroslav","year":"2011","unstructured":"Miroslav Dud\u00edk , John Langford , and Lihong Li . Doubly robust policy evaluation and learning . In ICML , 2011 . Miroslav Dud\u00edk, John Langford, and Lihong Li. Doubly robust policy evaluation and learning. In ICML, 2011."},{"key":"e_1_3_2_1_11_1","volume-title":"COLING","author":"Gao Jianfeng","year":"2010","unstructured":"Jianfeng Gao , Xiaolong Li , Daniel Micol , Chris Quirk , and Xu Sun . A large scale ranker-based system for search query spelling correction . In COLING , 2010 . Jianfeng Gao, Xiaolong Li, Daniel Micol, Chris Quirk, and Xu Sun. A large scale ranker-based system for search query spelling correction. In COLING, 2010."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526712"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433419"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1986.10478354"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/582415.582418"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0114-1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1345448.1345472"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390223"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935878"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685311"},{"key":"e_1_3_2_1_23_1","volume-title":"AISTATS","author":"Nikunj","year":"2001","unstructured":"Nikunj C. Oza and Stuart Russell. Online bagging and boosting . In AISTATS , 2001 . Nikunj C. Oza and Stuart Russell. Online bagging and boosting. In AISTATS, 2001."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/567498.567526"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963419"},{"key":"e_1_3_2_1_26_1","volume-title":"Covariate Shift and Local Learning by Distribution Matching","author":"Candela Joaquin","year":"2008","unstructured":"Joaquin Qui\\ nonero- Candela , Masashi Sugiyama , Anton Schwaighofer , and Neil D. Lawrence , editors . Covariate Shift and Local Learning by Distribution Matching . MIT Press , 2008 . Joaquin Qui\\ nonero-Candela, Masashi Sugiyama, Anton Schwaighofer, and Neil D. Lawrence, editors. Covariate Shift and Local Learning by Distribution Matching. MIT Press, 2008."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551507086989"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935930"},{"key":"e_1_3_2_1_29_1","volume-title":"NIPS 23","author":"Strehl Alexander L.","year":"2010","unstructured":"Alexander L. Strehl , John Langford , Lihong Li , and Sham M. Kakade . Learning from logged implicit exploration data . In NIPS 23 , 2010 . Alexander L. Strehl, John Langford, Lihong Li, and Sham M. Kakade. Learning from logged implicit exploration data. In NIPS 23, 2010."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2514700"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721831.1721835"},{"key":"e_1_3_2_1_32_1","volume-title":"Text REtrieval Conference. http:\/\/trec.nist.gov.","author":"The TREC.","unstructured":"TREC. The Text REtrieval Conference. http:\/\/trec.nist.gov. TREC. The Text REtrieval Conference. http:\/\/trec.nist.gov."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/383952.383992"}],"event":{"name":"WWW '15: 24th International World Wide Web Conference","location":"Florence Italy","acronym":"WWW '15","sponsor":["IW3C2 International World Wide Web Conference Committee","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 24th International Conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2740908.2742562","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2740908.2742562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:24Z","timestamp":1750227144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2740908.2742562"}},"subtitle":["A Case Study"],"short-title":[],"issued":{"date-parts":[[2015,5,18]]},"references-count":32,"alternative-id":["10.1145\/2740908.2742562","10.1145\/2740908"],"URL":"https:\/\/doi.org\/10.1145\/2740908.2742562","relation":{},"subject":[],"published":{"date-parts":[[2015,5,18]]},"assertion":[{"value":"2015-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}