{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T02:28:43Z","timestamp":1774060123578,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,15]],"date-time":"2015-06-15T00:00:00Z","timestamp":1434326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,15]]},"DOI":"10.1145\/2764468.2764508","type":"proceedings-article","created":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T18:43:54Z","timestamp":1434134634000},"page":"565-582","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Bayesian Incentive-Compatible Bandit Exploration"],"prefix":"10.1145","author":[{"given":"Yishay","family":"Mansour","sequence":"first","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"given":"Aleksandrs","family":"Slivkins","sequence":"additional","affiliation":[{"name":"Microsoft Research, New York, NY, USA"}]},{"given":"Vasilis","family":"Syrgkanis","sequence":"additional","affiliation":[{"name":"Microsoft Research, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Agarwal A. Hsu D. Kale S. Langford J. Li L. and Schapire R. 2014. Taming the monster: A fast and simple algorithm for contextual bandits. In 31st ICML.  Agarwal A. Hsu D. Kale S. Langford J. Li L. and Schapire R. 2014. Taming the monster: A fast and simple algorithm for contextual bandits. In 31st ICML."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2724705"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1566374.1566386"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.30"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Bergemann D. and Said M. 2011. Dynamic auctions: A survey. In Wiley Encyclopedia of Operations Research and Management Science. John Wiley & Sons.  Bergemann D. and Said M. 2011. Dynamic auctions: A survey. In Wiley Encyclopedia of Operations Research and Management Science. John Wiley & Sons.","DOI":"10.1002\/9780470400531.eorms0270"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1080.0640"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-0262.00022"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"e_1_3_2_1_11_1","unstructured":"Che Y.-K. and H\u00f6rner J. 2013. Optimal design for social learning. Working paper.  Che Y.-K. and H\u00f6rner J. 2013. Optimal design for social learning. Working paper."},{"key":"e_1_3_2_1_12_1","unstructured":"Dudik M. Hsu D. Kale S. Karampatziakis N. Langford J. Reyzin L. and Zhang T. 2011. Efficient optimal leanring for contextual bandits. In 27th UAI.  Dudik M. Hsu D. Kale S. Karampatziakis N. Langford J. Reyzin L. and Zhang T. 2011. Efficient optimal leanring for contextual bandits. In 27th UAI."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Ely J. Frankel A. and Kamenica E. 2015. Suspense and Surprise. J. of Political Economy. forthcoming.  Ely J. Frankel A. and Kamenica E. 2015. Suspense and Surprise. J. of Political Economy. forthcoming.","DOI":"10.1086\/677350"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248547.1248586"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600057.2602897"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Gittins J. Glazebrook K. and Weber R. 2011. Multi-Armed Bandit Allocation Indices. John Wiley & Sons.  Gittins J. Glazebrook K. and Weber R. 2011. Multi-Armed Bandit Allocation Indices. John Wiley & Sons.","DOI":"10.1002\/9780470980033"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"H\u00f6rner J. and Skrzypacz A. 2015. Selling Information. J. of Political Economy. forthcoming.  H\u00f6rner J. and Skrzypacz A. 2015. Selling Information. J. of Political Economy. forthcoming.","DOI":"10.1086\/688874"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.101.6.2590"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0262.2005.00564.x"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1086\/676597"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"e_1_3_2_1_23_1","unstructured":"Langford J. and Zhang T. 2007. The Epoch-Greedy Algorithm for Contextual Multi-armed Bandits. In 21st NIPS.  Langford J. and Zhang T. 2007. The Epoch-Greedy Algorithm for Contextual Multi-armed Bandits. In 21st NIPS."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.2011.01688.x"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2764468.2764508"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1086\/657922"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2692359.2692364"}],"event":{"name":"EC '15: ACM Conference on Economics and Computation","location":"Portland Oregon USA","acronym":"EC '15","sponsor":["SIGecom Special Interest Group on Economics and Computation"]},"container-title":["Proceedings of the Sixteenth ACM Conference on Economics and Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2764468.2764508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2764468.2764508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:20Z","timestamp":1750273460000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2764468.2764508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,15]]},"references-count":27,"alternative-id":["10.1145\/2764468.2764508","10.1145\/2764468"],"URL":"https:\/\/doi.org\/10.1145\/2764468.2764508","relation":{},"subject":[],"published":{"date-parts":[[2015,6,15]]},"assertion":[{"value":"2015-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}