{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:09:53Z","timestamp":1775912993775,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,2]],"date-time":"2018-02-02T00:00:00Z","timestamp":1517529600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1247637, IIS-1513692, IIS-1615706"],"award-info":[{"award-number":["IIS-1247637, IIS-1513692, IIS-1615706"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,2,2]]},"DOI":"10.1145\/3018661.3018699","type":"proceedings-article","created":{"date-parts":[[2017,2,2]],"date-time":"2017-02-02T15:09:48Z","timestamp":1486048188000},"page":"781-789","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":387,"title":["Unbiased Learning-to-Rank with Biased Feedback"],"prefix":"10.1145","author":[{"given":"Thorsten","family":"Joachims","sequence":"first","affiliation":[{"name":"Cornell University, ITHACA, NY, USA"}]},{"given":"Adith","family":"Swaminathan","sequence":"additional","affiliation":[{"name":"Cornell University, ITHACA, NY, USA"}]},{"given":"Tobias","family":"Schnabel","sequence":"additional","affiliation":[{"name":"Cornell University, ITHACA, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,2,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883033"},{"key":"e_1_3_2_1_2_1","volume-title":"Large-scale validation and analysis of interleaved search evaluation. ACM Transactions on Information Systems (TOIS), 30(1):6:1--6:41","author":"Chapelle O.","year":"2012","unstructured":"O. Chapelle, T. Joachims, F. Radlinski, and Y. Yue. Large-scale validation and analysis of interleaved search evaluation. ACM Transactions on Information Systems (TOIS), 30(1):6:1--6:41, 2012."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526711"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02294-4"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341545"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433419"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1952.10483446"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139025751"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775067"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150429"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229179.1229181"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390223"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935878"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119013563"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000016"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/3120137.3120149"},{"key":"e_1_3_2_1_17_1","first-page":"837","volume-title":"International Conference on Machine Learning (ICML)","author":"Raman K.","year":"2013","unstructured":"K. Raman, T. Joachims, P. Shivaswamy, and T. Schnabel. Stable coactive learning via perturbation. In International Conference on Machine Learning (ICML), pages 837--845, 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242643"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/70.1.41"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970398.2970410"},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Machine Learning (ICML)","author":"Schnabel T.","year":"2016","unstructured":"T. Schnabel, A. Swaminathan, A. Singh, N. Chandak, and T. Joachims. Recommendations as treatments: Debiasing learning and evaluation. In International Conference on Machine Learning (ICML), 2016."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835804"},{"key":"e_1_3_2_1_23_1","volume-title":"Report on the need for and provision of an 'ideal' information retrieval test collection. Technical report","author":"Sparck-Jones K.","year":"1975","unstructured":"K. Sparck-Jones and C. J. V. Rijsbergen. Report on the need for and provision of an 'ideal' information retrieval test collection. Technical report, University of Cambridge, 1975."},{"key":"e_1_3_2_1_24_1","first-page":"2217","volume-title":"Conference on Neural Information Processing Systems (NIPS)","author":"Strehl A. L.","year":"2010","unstructured":"A. L. Strehl, J. Langford, L. Li, and S. Kakade. Learning from logged implicit exploration data. In Conference on Neural Information Processing Systems (NIPS), pages 2217--2225, 2010."},{"key":"e_1_3_2_1_25_1","volume-title":"Sep","author":"Swaminathan A.","year":"2015","unstructured":"A. Swaminathan and T. Joachims. Batch learning from logged bandit feedback through counterfactual risk minimization. Journal of Machine Learning Research (JMLR), 16:1731--1755, Sep 2015."},{"key":"e_1_3_2_1_26_1","volume-title":"Statistical Learning Theory","author":"Vapnik V.","year":"1998","unstructured":"V. Vapnik. Statistical Learning Theory. Wiley, Chichester, GB, 1998."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2009934"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911537"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835824"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553527"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772793"}],"event":{"name":"WSDM 2017: Tenth ACM International Conference on Web Search and Data Mining","location":"Cambridge United Kingdom","acronym":"WSDM 2017","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the Tenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018661.3018699","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018661.3018699","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018661.3018699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:37:36Z","timestamp":1763458656000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018661.3018699"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,2]]},"references-count":31,"alternative-id":["10.1145\/3018661.3018699","10.1145\/3018661"],"URL":"https:\/\/doi.org\/10.1145\/3018661.3018699","relation":{},"subject":[],"published":{"date-parts":[[2017,2,2]]},"assertion":[{"value":"2017-02-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}